Improvement of it infrastructure management by using configuration management and maturity models: A systematic literature review and a critical analysis

JP Serrano, RF Pereira - Organizacija, 2020 - sciendo.com
Background and purpose: This research aims to investigate which benefits one may expect
using Maturity Models in Configuration Management (CM) domain. CM is a support process …

An overview of IBM service management

A Ganek, K Kloeckner - IBM Systems Journal, 2007 - ieeexplore.ieee.org
Information technology has become a key enabler for businesses in a wide variety of sectors
(such as banking and health care) and is increasingly used to deliver their services. For …

From a technology-oriented to a service-oriented approach to IT management

AJ Keel, MA Orr, RR Hernandez… - IBM Systems …, 2007 - ieeexplore.ieee.org
In this paper we focus on information technology service management (ITSM), a new
direction for managing information technology (IT) organizations that requires a change from …

A method and implementation to define and provision variable composite applications, and its usage in cloud computing

R Mietzner - 2010 - elib.uni-stuttgart.de
The trend to outsource applications not critical to an enterprise's core business has driven
the emergence of a new type of IT service providers. These service providers run and …

AMADEUS: towards the AutoMAteD secUrity teSting

ÁJ Varela-Vaca, RM Gasca… - Proceedings of the 24th …, 2020 - dl.acm.org
The proper configuration of systems has become a fundamental factor to avoid cybersecurity
risks. Thereby, the analysis of cybersecurity vulnerabilities is a mandatory task, but the …

Integrated change and configuration management

C Ward, V Aggarwal, M Buco, E Olsson… - IBM systems …, 2007 - ieeexplore.ieee.org
This paper provides a summary of the best-practice change-management and configuration-
management processes that express a core which conforms to ITIL® and discusses how …

A method to select IT service management processes for improvement

A Shrestha, A Cater-Steel, M Toleman… - JITTA: Journal of …, 2014 - search.proquest.com
Although process improvement is crucial for organizations that seek quality in their
operations, there is a lack of explicit guidance on how to select the critical processes to …

System and method for self policing of authorized configuration by end points

HH Madduri - US Patent 8,413,130, 2013 - Google Patents
6986133 B2 1/2006 O'Brien et al... 717/173 age is received by the computer system. The
change package 6,993,650 B2* 1/2006 Landers et al... 713,100 includes a change to the …

IBM service management architecture

D Lindquist, H Madduri, CJ Paul… - IBM Systems …, 2007 - ieeexplore.ieee.org
In this paper we describe the IBM Service Management (ISM) architecture, a service-
oriented architecture designed to automate and simplify the management of business …

Analysis of effects of a software maintenance patch on configuration items of a CMDB

BR Matthiesen - US Patent 8,302,088, 2012 - Google Patents
Embodiments of the invention provide a method, a system and a computer program product
for analyzing the effect of a Software maintenance patch on configuration items of a CMDB …