Home > Articles > Information Technology

Information Technology

921 Items

Sort by Date | Title

Ten New Features for Report Users in IBM Cognos 10 Report Studio
Dec 5, 2011
Instead of just focusing on the major features of IBM Cognos 10 Report Studio, Roger Johnson, coauthor of IBM Cognos 10 Report Studio: Practical Examples, looks at some lesser-known tools and object properties to further enhance your Report Studio projects.
System Center Opalis Integration Server 6.3 Unleashed: Architectural Design
Oct 25, 2011
This chapter expands on the basic OIS architecture and explains how the components interact with one another during policy execution. It also discusses the major deployment models and identifies where each model would be most beneficial. In addition to architecture, this chapter reviews how the various security models affect an OIS deployment.
Service Intelligence: Improving Your Bottom Line with the Power of IT Service Management
Aug 31, 2011
In this chapter, Sharon Taylor looks at the basic ingredients of services and service practices. She also covers the basics of ITSM terminology to help shape your understanding of dialogue you need to have with IT Service Providers (ITSPs) to ensure service assets are exploited to the benefit of the business bottom line.
The Scariest (Disaster) Book I Have Ever Read, Part III
Aug 17, 2011
The most terrifying weapon facing the U.S. may already be in our enemies hands. Are you prepared for the ultimate disaster? In Part III of his three-part series, author Leo Wrobel explains exactly which systems would be affected by an electromagnetic pulse, how they would be affected, and to what degree.
MOF, ITIL, and Service Manager
Aug 16, 2011
This chapter discusses the service management processes specified in the Microsoft Operations Framework (MOF) and Information Technology Information Library (ITIL) supported by System Center Service Manager, including Incident, Problem, Change, and Configuration Management.
The Scariest (Disaster) Book I Have Ever Read, Part II
Aug 10, 2011
The most terrifying weapon facing the U.S. may already be in our enemies hands. Are you prepared for the ultimate disaster? In Part II of his three-part series, author Leo Wrobel explains how you can best prepare yourself for an electromagnetic pulse.
The Scariest (Disaster) Book I Have Ever Read, Part I
Aug 4, 2011
The most terrifying weapon facing the U.S. may already be in our enemies' hands. Are you prepared for the ultimate disaster? In Part I of his three-part series, author Leo Wrobel explains how an electromagnetic pulse can damage the world as we know it today.
Four Rules for Surviving an Amazon EC2 Outage
Jun 2, 2011
The recent outage of one of Amazon’s availability zones has some technologists claiming the cloud isn’t product ready. The reality is that it isn’t a problem with the cloud—it’s a problem with the architecture of the sites hosted on the cloud. Michael T. Fisher and Martin L. Abbott, co-authors of Scalability Rules: 50 Principles for Scaling Web Sites, cover four simple rules that, if followed, will help your site maintain high availability no matter where it is hosted.
The Japan Quake: Could It Happen Here, and Is Your Organization Prepared?
May 24, 2011
The recent events in Japan have transformed idle thoughts of earthquakes and tsunamis into real-life manifestations of our worst nightmares. If you had strong information of when a disaster would strike, you could make many critical decisions, such as where to locate a home or business or whether escape or evacuation plans are needed. While an insurance company scrutinizes actuarial tables before underwriting a policy, noted author and technical futurist Leo Wrobel explains how these same kinds of tools are available to the contingency planner if one knows where to look.
Resuming Business Operations After a Virus Infection
May 2, 2011
Even when following cybersecurity best practices, your business very likely will become infected by malware at some point. During the recovery process, someone will have to decide when it's safe to get systems back online. Ajay Gupta, a coauthor of Hack I.T.: Security Through Penetration Testing, describes the issues and steps involved in putting your business back into production after a virus infection.
The Road to Effective Capacity Management
Mar 31, 2011
Capacity management is incredibly helpful in reducing IT costs, but has proven difficult for many organizations to implement. Larry Klosterboer, author of ITIL Capacity Management, shows you how to break this complex discipline into simple, manageable steps that will quickly have you on the road to effectively managing your capacity.
Achieving Nomadicity: Accessing the Internet Anytime, Anywhere
Mar 11, 2011
This chapter explains the key concepts that make it possible for users and devices to gain access to IP networks and IP-based applications that are offered by others than their own operator.
Getting Started in Microsoft Project 2010 After the Business Initiative Is Approved
Mar 11, 2011
This chapter shows you how to plan for a successful project by setting the direction, sharing the vision, and establishing the rules of the project.
ITIL Capacity Management: Define and Manage Capacity Plans
Mar 3, 2011
This chapter goes beyond the ITIL documentation to describe a working formula for capacity plans. It suggests that you create more customized plans for those areas that really need detailed plans and keep them current through a repeatable process. You will learn the details of what goes into a capacity plan and how and when to create your plans.
Deploying iPhones and iPads on Your Network
Jan 19, 2011
Eric Geier shows how to give Apple iOS devices access to an 802.1X-protected Wi-Fi network, Microsoft Exchange services, VPN access, and more.
Selling Your Business Resumption Plan to the “Top Dogs:” It’s Not as Tough as You Think, Part 2
Nov 8, 2010
If you are a mid-level manager trying to “sell” your disaster recovery plan in the corner executive office, you know it’s tough to make that pitch. In Part 2 of his three-part series, Leo Wrobel shows you how to brief your executives, schedule presentations, and devise workaround plans and procedures, and much more.
Selling Your Business Resumption Plan to the “Top Dogs:” It’s Not as Tough as You Think, Part 1
Nov 3, 2010
If you are a mid-level manager trying to “sell” your disaster recovery plan in the corner executive office, you know it’s tough to make that pitch. Leo Wrobel shows you how to lay out the project, get to your ultimate goal quickly (commitment, funding, hiring or whatever), and devise a presentation that will make your boss an “offer he can’t refuse.”
The Imperative for a New Approach to Information Architecture
Aug 26, 2010
Michael Schroeck, a coauthor of The Art of Enterprise Information Architecture: A Systems-Based Approach for Unlocking Business Insight, explains why managing information effectively is crucial to business survival and success today. He presents the context for developing an 'Information Agenda' as the basis for turning your organization into an information-enabled enterprise.
Lean Integration for Health Care: Healthy Data for the Future
Aug 10, 2010
John G. Schmidt, coauthor of Lean Integration: An Integration Factory Approach to Business Agility, believes that health care in the U.S. will inevitably slide into adopting lean principles. But why should we wait for this desirable state? He explains the current issues that make lean crucial and the obstacles that we need to overcome in getting lean.
The Art of Enterprise Information Architecture: Best Practices and Tips to Derive Business Insight
Aug 4, 2010
Eberhard Hechler, a coauthor of The Art of Enterprise Information Architecture: A Systems-Based Approach for Unlocking Business Insight, provides a guided tour of the book.

< Prev Page 1 2 3 4 5 Next >