Feeds

Configuration management: a guru speaks

Get in on the action

Providing a secure and efficient Helpdesk

Seminar We make no secret of the fact that Configuration Management (CM) is fundamental to IT governance generally [declaration of interest: which is why the author of this piece is on the committee of the BCS Configuration Management Specialist Group (CMSG)]. But even in the CMSG, people do not always agree on exactly what CM is - and how wide its scope is.

This is particularly an issue for developers who may see it as "just" version control (implemented in Subversion or Perforce, perhaps).

That's certainly part of it, but you have to be careful that some corporate suit doesn't impose a heavyweight and over-controlling configuration management system on you, which does a lot more than just version control, but which slows down code production. So you do need to be aware of the issues.

Now there's a chance to get an insight into Configuration Management (in the context of ITIL v3) from Shirley Lacy (author, with Ivor Macfarlane, Service Transition book for ITIL V3 and a member of the British Standards committee for developing the BS 15000 IT Service Management standard).

This free CMSG event is held on 11 October at the BCS Offices at 5 Southampton St, London. Register here. Be the developer who can take an active part in the discussion when the bosses start imposing development management standards. ®

Internet Security Threat Report 2014

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.