Home > Articles > Information Technology

Information Technology

921 Items

Sort by Date | Title

Are You Ready for Computing in the Cloud?
Sep 3, 2008
Michael Miller examines the pros and cons of cloud computing and analyzes what types of users benefit most from what cloud computing offers.
Arming Yourself with Bulletproof Processes
Jan 4, 2002
The best defense of an IT infrastructure often involves having an effective offense. Understanding how to create, implement, and manage bulletproof processes leads to one of the most potent offenses an infrastructure professional can employ.
art_gore_outsourcing
Jan 1, 2003
ASP Customer Service and Technical Support
Dec 21, 2001
John Harney outlines what you should expect from you Application Service Provider in terms of customer and tech support — from the moment you log on to their web page to review their product, to testing, training, maintenance, and upgrades.
Assessing Tools for Maintaining Command and Control in a Disaster
Aug 10, 2007
Here are some tips to prepare you and your IT team in case of emergency.
Attacks from Outside the Operating System
Mar 29, 2002
This excerpt from Andy Tanenbaum's Modern Operating Systems looks at some of the operating systems aspects of external threats, primarily focusing on viruses, worms, mobile code, and Java applets.
Authentication
Sep 21, 2001
Authentication means proving that a user is who he claims to be – and then making sure he accesses only what he's allowed to. Mandy Andress discusses the types of authentication available to your organization and tells where they work best.
Authentication Auditing in Windows 2000
Jul 29, 2005
Authentication auditing is an essential part of protecting your Windows computers from intrusion. The big problem in Windows auditing is trying to understand what's going on, without drowning in a flood of irrelevant or useless information. If you let it do so, Windows will bury you in event notifications. Figuring out what's going on from those notifications can be a real chore. Rick Cook provides specific suggestions to start making your auditing process more informative.
Automating the Data Center: The First Steps Make All the Difference
Jul 30, 2001
Can your business really stay online 24 hours a day, 7 days a week? Howie Lyke examines issues and strategies.
Availability: Requirements and Measurement
Oct 19, 2001
It's really the end user who determines whether a system is "available," according to Michael Hawkins. In this article, he explains how to determine realistic availability definitions and requirements.
Avoiding Enterprise Project Failures
Jun 4, 2004
Judith M. Myerson, a systems and architect engineer, discusses enterprise project failures and talks about some solutions. She includes Enterprise Application Integration (EAI) applications and web services as a supplement to EAI as examples.
Avoiding Mistakes That Can Destroy Your Organization
Oct 22, 2004
Avoiding Telecom Sabotage, Part 1 of 2
Jun 15, 2009
Leo A. Wrobel and Sharon M. Wrobel remind us that not only are some disasters not natural - they're actually deliberate. In part 1 of this two-part series, they consider the wide-ranging effects of telecom sabotage, including business losses and interruption of emergency services.
Avoiding Telecom Sabotage, Part 2 of 2
Jun 22, 2009
Leo A. Wrobel and Sharon M. Wrobel conclude their series on avoiding the hazards of deliberate telephone sabotage with some suggestions about other communications options (some of them free!) that you should include in your First Alert procedures.
Back to the Beginning: Unlocking Greatness with Values-Based Leadership
Jun 6, 2003
James Despain describes his journey — and the many problems and challenges he encountered — as a plant manager for a major manufacturing company. These experiences sowed the seeds of his movement to values-based leadership.
Backup and Restore Technologies for Windows
Aug 15, 2003
Take a look at the evolution of backup applications for Windows. You will see where the applications have been, and what sort of features and requirements they have now.
Backup Basics Part 1: Demystifying Server and Workstation Backup Methods
Jun 16, 2006
Understanding the options for backing up servers and workstations is important for any technician or system/server administrator. But for new IT staff, all the details about how backups work and how to configure them can be confusing. In this first article in a three-part series, Ryan Faas demystifies the various types of backups that can be performed on servers and workstations using most backup applications.
Backup Basics Part 2: Demystifying Backup Media
Jun 30, 2006
In part two of a three-part series on backup basics, Ryan Faas continues to demystify backup options for new technicians and server/systems administrators. This time, the topic is choosing the media in which to store your backups. Find out the pros and cons of tape, hard drives, and RAID arrays; using network storage; and archiving using CDs or DVDs.
Backup Basics Part 3: General Tips for a Backup Strategy
Jul 14, 2006
Knowing how to configure backup applications and select backup media is half the battle of designing a successful backup strategy. The other half is choosing how and when to back up the specific pieces of data that are stored on your servers, share points, and workstations. In this final article of his series on backup basics for new technicians and administrators, Ryan Faas offers some suggestions to help you make these important decisions.
BAM! Part 2: Smarter Choices Require Better Information
Dec 5, 2003
Are you making critical business decisions based on old data? This common problem can be mitigated by using business activity monitoring (BAM) to get up-to-date information, which you can use to make more savvy choices.

<< < Prev Page 2 3 4 5 6 Next >