Configuration management

Results: 2112



#Item
431BMC / BMC Software / Business service management / Configuration management database

BMC_EBC_Welcome_Brochure2

Add to Reading List

Source URL: media.cms.bmc.com

Language: English - Date: 2012-04-20 03:58:58
432Computing / BIOS / Open standards / Advanced Configuration and Power Interface / Electric power / Sleep mode / Power management / Universal Serial Bus / Advanced power management / Computer hardware / Energy conservation / System software

Introduction Device Configuration Activate Functions

Add to Reading List

Source URL: openbsd.md5.com.ar

Language: English - Date: 2011-10-10 05:29:34
433Analog circuits / Capacitor / Energy storage / Power supply / Scattering parameters / Electronic engineering / Electronics / Electromagnetism

Power Management IC for Security Camera System CXA3840WR Description CXA3840WR is the power management IC for security camera system. CXA3840WR has the optimized configuration for CCTV security camera system with CCD im

Add to Reading List

Source URL: www.sony.net

Language: English - Date: 2012-06-21 03:37:14
434Manufacturing / Management / Inventory / Marketing / Just in time / Configuration management / Maintenance /  repair /  and operations / Supply chain / Business / Technology / Supply chain management

for Suppliers to Shipbuilders R4i BuildPoint... the smarter production line for suppliers to the shipbuilding industry Streamline the configuration and production of your products

Add to Reading List

Source URL: www.absolutedata.com

Language: English - Date: 2011-08-24 21:13:14
435Technical communication / Security Content Automation Protocol / Computer file formats / Open formats / Federal Information Security Management Act / Extensible Configuration Checklist Description Format / XML / XHTML / Specification / Computing / Computer security / Markup languages

Specification for the Extensible Configuration Checklist Description Format (XCCDF)

Add to Reading List

Source URL: scap.nist.gov

Language: English
436Information Technology Infrastructure Library / Incident management / Service desk / Change management / Problem management / Issue tracking system / Help desk / Configuration management / Change request / Information technology management / Project management / Information technology

Product Data Sheet “The Novo Service Desk has helped streamline processes, reduce costs, provide better metrics, and run a more efficient

Add to Reading List

Source URL: www.novosolutions.com

Language: English - Date: 2012-08-08 12:36:48
437Configuration files / Microsoft Windows / DOS memory management / CONFIG.SYS / OS/2 / AUTOEXEC.BAT / DOS / Drive letter assignment / Windows 95 / Computing / Computer architecture / Software

______________________________________________________________________ Alpha/GammaVIEW/EXPERT Information on Software Installation for AlphaVIEW / AlphaEXPERT GammaVIEW / GammaEXPERT run under WIN 95 / WIN 98 /

Add to Reading List

Source URL: www.saphymo.de

Language: English - Date: 2013-03-05 05:54:35
438Software / Multi-agent systems / Computer network security / Internet Information Services / Network management / System administration / Dynamic Host Configuration Protocol / SQL Slammer / Simple Network Management Protocol / Computing / System software / Internet standards

Cyber terrorism/warfare A packet can’t fly a plane… Typical types of attack: –Denial of service –Breeching the perimeter

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:30
439Concurrent computing / IT asset management / Standards / Information Technology Infrastructure Library / Configuration management / Data center / Software development process / Information technology management / Computing / Method engineering

How to Build Your ITAM Roadmap By Mara Zeldin, Alsbridge http://www.alsbridge.com/

Add to Reading List

Source URL: www.itassetmanagement.net

Language: English - Date: 2012-07-24 02:09:24
440Field-programmable gate array / Xilinx / Symmetric-key algorithm / Key / Public-key cryptography / Block cipher / Brute-force attack / Partial re-configuration / Cryptography / Key management / Reconfigurable computing

Appears in Proceedings: IEEE International Conference on Field-Programmable Technology – ICFPT 2007, IEEE, pp. 169–176, ISBN7, 2008. Dynamic Intellectual Property Protection for Reconfigurable Device

Add to Reading List

Source URL: www.bmoeller.de

Language: English - Date: 2008-06-04 18:22:14
UPDATE