Configuration Management Simplified

The recently standardized NETCONF configuration management protocol, with the NETCONF-oriented data modeling language called YANG, can simplify network configuration management. Learn how the two technologies work, and how they can be used to support transactional capabilities and rollback management—so next-generation configuration management systems are simpler and more understandable than current systems.

Featured Software Research:

Creating Effective Configuration Rules

When you have a sales catalog that contains configurable products, it can become difficult and unwieldy to manage all of the possible ways that the products can be configured. And yet, you need salespeople to configure products correctly so that their quotes are complete and accurate, and your customers are happy. These best practices can help you create more effective configuration rules that work. Read More

Enable Enterprise-Grade Unified Communications Experience with Cloud-Delivered WAN

  • Source: VeloCloud, Inc.
  • Written By:
  • Published:
Delivering a combination of voice, video, and data is bandwidth-intensive and requires complex network configuration to ensure the delivery of these time-sensitive applications. This whitepaper covers recent wide area network (WAN) technology trends.

Learn about a cloud-delivered WAN solution that enables enterprises to roll out and support unified communications (UC) without the cost and complexity of a traditional WAN. Enterprises can enjoy the advantage of a simple yet powerful management platform that provides insight into application usage and the underlying network conditions, while the WAN dynamically reacts to optimize usage. Read More

The Guide to Google Apps Training Part Four: Advanced Security Configuration and Compliance

Google offers protection of your information with its sophisticated data and encryption centers. But now that you’ve become comfortable with the tools and basic security settings for Google Apps, you can get more in-depth and establish other security settings on your own. This next level of control allows you to review the settings for the core of Google Apps and gives you even better protection over your data with the ability to configure security parameters for associated apps.

In this Google Apps Guide, get detailed information about commonly asked questions regarding Google security topics. Learn how to set levels of calendar sharing internally and externally, how to configure and restrict collaboration capabilities of Google Docs on- and off-line, and how to execute configurations of Gmail access for mobile device management and compliance for even more protection. A step-by-step process is provided for the creation and facilitation of groups, as well as granting or revoking a user’s individual permissions for security access to third-party apps. Review, enable (or disable), and configure a series of core Google Services, including: Chrome management, Google+, Google Vault, and Google Apps Marketplace. The Google Apps Guide also describes how to enable or disable some non-core extra Google Apps.  Read More

You may also be interested in these related documents:

Enterprise Configuration Management for Risk Mitigation

Enterprise configuration management (ECM) is a process to capture data and dependencies about an information technology (IT) infrastructure and to create an audit trail of changes against that infrastructure. The ECM process manages the revision and status of all the digital assets in an IT infrastructure. This white paper by Chris Kincaid from Configuration Management, Inc. discusses the benefits of ECM for risk mitigation. Read More

Configuration Intelligence Initiative

Today’s configuration management tools focus on collecting and reporting statistics, logs, and failures, but fail to address the need for analyzing this data to determine best practices for improving efficiencies. That’s why Configuresoft has developed software that enables you to link core systems configuration and change management disciplines into actionable analytics. Find out how it can work for you. Read More

Nortel Networks Succession Communication Server for Enterprise 1000

Companies establishing a pure Internet protocol (IP) environment can benefit from the capabilities that are only supported by IP telephony, including a simplified cabling infrastructure; dynamic host configuration protocol (DHCP)-enabled IP telephones that provide easier moves, adds, and changes; and support for 802.11 wireless devices, as well as the support of unified messaging, unified management, and web-based call center applications. Read More
 
comments powered by Disqus