May 12, 2017
IT pros can easily list off CMDB benefits. But when it comes to convincing the business to pay for a CMDB implementation, you'll need to discuss ROI.
December 01, 2016
Most IT pros know what a CMDB is, but mastering the database and asset management is difficult -- though not impossible.
August 24, 2016
Having firmly established itself in the IT service management business, ServiceNow hopes its workflow platform will bring the same level of success in IT operations management.
June 11, 2015
AOL shares the lessons it learned from a project to rid its data centers of 14,805 zombie servers that saved the company about $10 million.
CMDB Get Started
Bring yourself up to speed with our introductory content
VM sprawl plagues the virtualized environments of many organizations. The key to overcoming it is incorporating automation and orchestration in your sprawl management plan. Continue Reading
With network change and configuration management (NCCM), enterprises aim to standardize the way they implement network change without disturbing existing systems. That often means using NCCM tools to map and archive the entire network and its components. Continue Reading
This Information Technology Infrastructure Library (ITIL) guide has all you need to know about ITIL best practices, implementation, certification, training and tools. Learn about the ITIL framework and IT change management from our compilation of resources in this guide. Continue Reading
Evaluate CMDB Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Configuration management processes speed deployments, but tools that know effective licenses and data storage details aid in another area that businesses are keen to get right. Continue Reading
An NMS provides real-time feedback about operations and performance. A CMDB maintains relationships between components of an environment. Should we have both? Continue Reading
In the wake of the October 2016 Dyn attacks, IT organizations must consider IoT security, and truly integrate security into their CMDB and CM planning. Continue Reading
Learn to apply best practices and optimize your operations.
The creation of too many VMs and the continued existence of unused VMs plague modern IT infrastructure. This three-part guide looks at the ongoing battle against virtual machine sprawl, with a focus on strategies and tools for tracking VM lifecycles. Servers can be virtualized so easily, a reality that is both a blessing and a curse. Unneeded VMs waste an organization’s resources and can create licensing complications. To combat these inefficiencies, IT teams should put specific controls in place and adopt strategies that prevent VM sprawl. This guide emphasizes the importance of business policies that require users to justify the need for and duration of a VM. Without reasonable controls in place, VMs will proliferate and, over time, diminish the effectiveness of a virtualized infrastructure.
While many organizations have adopted sound practices for deploying virtual machines, they have not succeeded in effectively managing these virtualized environments. As a result, they are confronting server sprawl and losing the full benefit of their virtualization investments. Products exist to address this issue; some are from major virtualization vendors and others from third-party vendors. Combined with firm policies, these products can assist admins in managing VM sprawl, if not stopping it altogether.Continue Reading
SAP Solution Manager's monitoring tools are only one way companies can use SolMan to improve system performance, writes expert Chris Kernaghan. Continue Reading
DCIM software has evolved from building information modeling (BIM) systems into a broader category of data center management. Continue Reading
Problem Solve CMDB Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
CMDB discovery tools have been around for quite a long time because their need is pretty obvious. Organizations are generally understaffed to do the daily work. Many just do not staff to ... Continue Reading
Visibility is crucial for countering internet of things dangers. Learn how to discover what IoT devices are touching your network and what threats they may pose. Continue Reading
Companies leading the charge on building private clouds are making use of service catalogs and configuration management databases to support the rapid change enabled by cloud-based IT services. Continue Reading