Configuration Management Simplified

The recently standardized NETCONF configuration management protocol, with the NETCONF-oriented data modeling language called YANG, can simplify network configuration management. Learn how the two technologies work, and how they can be used to support transactional capabilities and rollback management—so next-generation configuration management systems are simpler and more understandable than current systems.

Featured Software Research:

The Skillsoft Impact Analysis: The Fast Track to Gaining Powerful Insights into the Strengths and Opportunities of Your Elearning Investment

In this age of big data, decision makers on all levels are clamoring for business-driven data regarding the effectiveness of human capital investments. Hard quantifiable evidence, like business impact or ROI, can be complex and seem out of reach in the face of rapid change and constrained L&D resources. This paper introduces a simplified process and toolkit, and shares some of the key findings uncovered since its inception. Read More

Enable Enterprise-Grade Unified Communications Experience with Cloud-Delivered WAN

  • Source: VeloCloud, Inc.
  • Written By:
  • Published:
Delivering a combination of voice, video, and data is bandwidth-intensive and requires complex network configuration to ensure the delivery of these time-sensitive applications. This whitepaper covers recent wide area network (WAN) technology trends.

Learn about a cloud-delivered WAN solution that enables enterprises to roll out and support unified communications (UC) without the cost and complexity of a traditional WAN. Enterprises can enjoy the advantage of a simple yet powerful management... Read More

The Guide to Google Apps Training Part Four: Advanced Security Configuration and Compliance

Google offers protection of your information with its sophisticated data and encryption centers. But now that you’ve become comfortable with the tools and basic security settings for Google Apps, you can get more in-depth and establish other security settings on your own. This next level of control allows you to review the settings for the core of Google Apps and gives you even better protection over your data with the ability to configure security parameters for associated apps.

In this... Read More

You may also be interested in these related documents:

Enterprise Configuration Management for Risk Mitigation

Enterprise configuration management (ECM) is a process to capture data and dependencies about an information technology (IT) infrastructure and to create an audit trail of changes against that infrastructure. The ECM process manages the revision and status of all the digital assets in an IT infrastructure. This white paper by Chris Kincaid from Configuration Management, Inc. discusses the benefits of ECM for risk mitigation. Read More

Configuration Intelligence Initiative

Today’s configuration management tools focus on collecting and reporting statistics, logs, and failures, but fail to address the need for analyzing this data to determine best practices for improving efficiencies. That’s why Configuresoft has developed software that enables you to link core systems configuration and change management disciplines into actionable analytics. Find out how it can work for you. Read More

Nortel Networks Succession Communication Server for Enterprise 1000

Companies establishing a pure Internet protocol (IP) environment can benefit from the capabilities that are only supported by IP telephony, including a simplified cabling infrastructure; dynamic host configuration protocol (DHCP)-enabled IP telephones that provide easier moves, adds, and changes; and support for 802.11 wireless devices, as well as the support of unified messaging, unified management, and web-based call center applications. Read More
 
comments powered by Disqus