Configuration management

Results: 2112



#Item
451Systems engineering process / Configuration management / Systems science / Systems theory / Systems engineering / Entity-relationship model / Constraint satisfaction

What makes the Difference? Basic Characteristics of Configuration Lothar Hotz HITeC e.V., University of Hamburg, Germany Abstract This paper focuses on configuration as a process

Add to Reading List

Source URL: kogs-www.informatik.uni-hamburg.de

Language: English - Date: 2013-12-30 04:55:26
452Configuration management / Method engineering / Technical communication / Asset management / Maintenance /  repair /  and operations / Provisioning / Enterprise asset management / Information technology management / Technology / Management

Through Life Support: Command and Control for Complex Assets Maximizing Asset Availability with R4i BuildPoint WHITEPAPER

Add to Reading List

Source URL: www.absolutedata.com

Language: English - Date: 2011-03-20 20:10:00
453Technology / Configuration management / KACE Networks / Remote administration software / K1000 / Dell / Google Chrome OS / Infrastructure optimization / Computing / Information technology management / System administration

Dell Software Lockup Logo

Add to Reading List

Source URL: www.kace.com

Language: English - Date: 2015-01-28 14:45:17
454Crime prevention / Electronic commerce / National security / Secure communication / Deep configuration assessment / Application firewall / Computer network security / Security / Computer security

AlgoSec BusinessFlow ® Data Center Application Connectivity Management Managing Complex Application Connectivity Requirements

Add to Reading List

Source URL: www.algosec.com

Language: English - Date: 2014-07-07 06:08:21
455Software architecture / Software / Java Management Extensions / Unix / Configuration file / Information technology management / Computing / Distributed computing architecture / Gemstone

SysAdminGuide_GemFireEnterprise.book

Add to Reading List

Source URL: www.gemstone.com

Language: English - Date: 2008-04-25 19:19:52
456National security / Federal Information Security Management Act / Risk management framework / Security controls / Information security / Critical infrastructure protection / Vulnerability / Configuration management / SCADA / Computer security / Data security / Security

The Anatomy of an Effective Cyber Security Solution

Add to Reading List

Source URL: ftp2.bentley.com

Language: English - Date: 2011-07-13 15:20:18
457

iTop-Anwendungsszenario: Lizenz-Management Configuration Management Database (Kern der Applikation) +

Add to Reading List

Source URL: www.itomig.de

- Date: 2015-01-27 11:44:19
    458Software architecture / Java Management Extensions / Configuration file / Server / Software / Information technology management / Computing / Distributed computing architecture / Gemstone

    For Immediate release: January 15, 2015 Falmouth, Cape Cod, MA Harmon-Marino LIVE

    Add to Reading List

    Source URL: cdn.seacrestbeachhotel.com

    Language: English - Date: 2015-01-28 20:17:35
    459Software architecture / Java Management Extensions / Configuration file / Server / Software / Information technology management / Computing / Distributed computing architecture / Gemstone

    GemFire Enterprise System Administrator's Guide

    Add to Reading List

    Source URL: www.gemstone.com

    Language: English - Date: 2009-01-08 20:07:27
    460Information technology management / CFEngine / Configuration management / USENIX / DevOps / X Window System / Mark Burgess / Large Installation System Administration Conference / Software / System software / System administration

    26 Short Topics in System Administration

    Add to Reading List

    Source URL: www.usenix.org

    Language: English - Date: 2015-05-25 17:14:49
    UPDATE