- Are You Ready for Computing in the Cloud?
- Sep 3, 2008
- Michael Miller examines the pros and cons of cloud computing and analyzes what types of users benefit most from what cloud computing offers.
|
- Arming Yourself with Bulletproof Processes
- Jan 4, 2002
- The best defense of an IT infrastructure often involves having an effective offense. Understanding how to create, implement, and manage bulletproof processes leads to one of the most potent offenses an infrastructure professional can employ.
|
- art_gore_outsourcing
- Jan 1, 2003
|
- ASP Customer Service and Technical Support
- Dec 21, 2001
- John Harney outlines what you should expect from you Application Service Provider in terms of customer and tech support from the moment you log on to their web page to review their product, to testing, training, maintenance, and upgrades.
|
- Assessing Tools for Maintaining Command and Control in a Disaster
- Aug 10, 2007
- Here are some tips to prepare you and your IT team in case of emergency.
|
- Attacks from Outside the Operating System
- Mar 29, 2002
- This excerpt from Andy Tanenbaum's Modern Operating Systems looks at some of the operating systems aspects of external threats, primarily focusing on viruses, worms, mobile code, and Java applets.
|
- Authentication
- Sep 21, 2001
- Authentication means proving that a user is who he claims to be – and then making sure he accesses only what he's allowed to. Mandy Andress discusses the types of authentication available to your organization and tells where they work best.
|
- Authentication Auditing in Windows 2000
- Jul 29, 2005
- Authentication auditing is an essential part of protecting your Windows computers from intrusion. The big problem in Windows auditing is trying to understand what's going on, without drowning in a flood of irrelevant or useless information. If you let it do so, Windows will bury you in event notifications. Figuring out what's going on from those notifications can be a real chore. Rick Cook provides specific suggestions to start making your auditing process more informative.
|
- Automating the Data Center: The First Steps Make All the Difference
- Jul 30, 2001
- Can your business really stay online 24 hours a day, 7 days a week? Howie Lyke examines issues and strategies.
|
- Availability: Requirements and Measurement
- Oct 19, 2001
- It's really the end user who determines whether a system is "available," according to Michael Hawkins. In this article, he explains how to determine realistic availability definitions and requirements.
|
- Avoiding Enterprise Project Failures
- Jun 4, 2004
- Judith M. Myerson, a systems and architect engineer, discusses enterprise project failures and talks about some solutions. She includes Enterprise Application Integration (EAI) applications and web services as a supplement to EAI as examples.
|
- Avoiding Mistakes That Can Destroy Your Organization
- Oct 22, 2004
|
- Avoiding Telecom Sabotage, Part 1 of 2
- Jun 15, 2009
- Leo A. Wrobel and Sharon M. Wrobel remind us that not only are some disasters not natural - they're actually deliberate. In part 1 of this two-part series, they consider the wide-ranging effects of telecom sabotage, including business losses and interruption of emergency services.
|
- Avoiding Telecom Sabotage, Part 2 of 2
- Jun 22, 2009
- Leo A. Wrobel and Sharon M. Wrobel conclude their series on avoiding the hazards of deliberate telephone sabotage with some suggestions about other communications options (some of them free!) that you should include in your First Alert procedures.
|
- Back to the Beginning: Unlocking Greatness with Values-Based Leadership
- Jun 6, 2003
- James Despain describes his journey and the many problems and challenges he encountered as a plant manager for a major manufacturing company. These experiences sowed the seeds of his movement to values-based leadership.
|
- Backup and Restore Technologies for Windows
- Aug 15, 2003
- Take a look at the evolution of backup applications for Windows. You will see where the applications have been, and what sort of features and requirements they have now.
|
- Backup Basics Part 1: Demystifying Server and Workstation Backup Methods
- Jun 16, 2006
- Understanding the options for backing up servers and workstations is important for any technician or system/server administrator. But for new IT staff, all the details about how backups work and how to configure them can be confusing. In this first article in a three-part series, Ryan Faas demystifies the various types of backups that can be performed on servers and workstations using most backup applications.
|
- Backup Basics Part 2: Demystifying Backup Media
- Jun 30, 2006
- In part two of a three-part series on backup basics, Ryan Faas continues to demystify backup options for new technicians and server/systems administrators. This time, the topic is choosing the media in which to store your backups. Find out the pros and cons of tape, hard drives, and RAID arrays; using network storage; and archiving using CDs or DVDs.
|
- Backup Basics Part 3: General Tips for a Backup Strategy
- Jul 14, 2006
- Knowing how to configure backup applications and select backup media is half the battle of designing a successful backup strategy. The other half is choosing how and when to back up the specific pieces of data that are stored on your servers, share points, and workstations. In this final article of his series on backup basics for new technicians and administrators, Ryan Faas offers some suggestions to help you make these important decisions.
|
- BAM! Part 2: Smarter Choices Require Better Information
- Dec 5, 2003
- Are you making critical business decisions based on old data? This common problem can be mitigated by using business activity monitoring (BAM) to get up-to-date information, which you can use to make more savvy choices.
|