- Ten New Features for Report Users in IBM Cognos 10 Report Studio
- Dec 5, 2011
- Instead of just focusing on the major features of IBM Cognos 10 Report Studio, Roger Johnson, coauthor of IBM Cognos 10 Report Studio: Practical Examples, looks at some lesser-known tools and object properties to further enhance your Report Studio projects.
|
- System Center Opalis Integration Server 6.3 Unleashed: Architectural Design
- Oct 25, 2011
- This chapter expands on the basic OIS architecture and explains how the components interact with one another during policy execution. It also discusses the major deployment models and identifies where each model would be most beneficial. In addition to architecture, this chapter reviews how the various security models affect an OIS deployment.
|
- Service Intelligence: Improving Your Bottom Line with the Power of IT Service Management
- Aug 31, 2011
- In this chapter, Sharon Taylor looks at the basic ingredients of services and service practices. She also covers the basics of ITSM terminology to help shape your understanding of dialogue you need to have with IT Service Providers (ITSPs) to ensure service assets are exploited to the benefit of the business bottom line.
|
- The Scariest (Disaster) Book I Have Ever Read, Part III
- Aug 17, 2011
- The most terrifying weapon facing the U.S. may already be in our enemies hands. Are you prepared for the ultimate disaster? In Part III of his three-part series, author Leo Wrobel explains exactly which systems would be affected by an electromagnetic pulse, how they would be affected, and to what degree.
|
- MOF, ITIL, and Service Manager
- Aug 16, 2011
- This chapter discusses the service management processes specified in the Microsoft Operations Framework (MOF) and Information Technology Information Library (ITIL) supported by System Center Service Manager, including Incident, Problem, Change, and Configuration Management.
|
- The Scariest (Disaster) Book I Have Ever Read, Part II
- Aug 10, 2011
- The most terrifying weapon facing the U.S. may already be in our enemies hands. Are you prepared for the ultimate disaster? In Part II of his three-part series, author Leo Wrobel explains how you can best prepare yourself for an electromagnetic pulse.
|
- The Scariest (Disaster) Book I Have Ever Read, Part I
- Aug 4, 2011
- The most terrifying weapon facing the U.S. may already be in our enemies' hands. Are you prepared for the ultimate disaster? In Part I of his three-part series, author Leo Wrobel explains how an electromagnetic pulse can damage the world as we know it today.
|
- Four Rules for Surviving an Amazon EC2 Outage
- Jun 2, 2011
- The recent outage of one of Amazon’s availability zones has some technologists claiming the cloud isn’t product ready. The reality is that it isn’t a problem with the cloud—it’s a problem with the architecture of the sites hosted on the cloud. Michael T. Fisher and Martin L. Abbott, co-authors of Scalability Rules: 50 Principles for Scaling Web Sites, cover four simple rules that, if followed, will help your site maintain high availability no matter where it is hosted.
|
- The Japan Quake: Could It Happen Here, and Is Your Organization Prepared?
- May 24, 2011
- The recent events in Japan have transformed idle thoughts of earthquakes and tsunamis into real-life manifestations of our worst nightmares. If you had strong information of when a disaster would strike, you could make many critical decisions, such as where to locate a home or business or whether escape or evacuation plans are needed. While an insurance company scrutinizes actuarial tables before underwriting a policy, noted author and technical futurist Leo Wrobel explains how these same kinds of tools are available to the contingency planner if one knows where to look.
|
- Resuming Business Operations After a Virus Infection
- May 2, 2011
- Even when following cybersecurity best practices, your business very likely will become infected by malware at some point. During the recovery process, someone will have to decide when it's safe to get systems back online. Ajay Gupta, a coauthor of Hack I.T.: Security Through Penetration Testing, describes the issues and steps involved in putting your business back into production after a virus infection.
|
- The Road to Effective Capacity Management
- Mar 31, 2011
- Capacity management is incredibly helpful in reducing IT costs, but has proven difficult for many organizations to implement. Larry Klosterboer, author of ITIL Capacity Management, shows you how to break this complex discipline into simple, manageable steps that will quickly have you on the road to effectively managing your capacity.
|
- Achieving Nomadicity: Accessing the Internet Anytime, Anywhere
- Mar 11, 2011
- This chapter explains the key concepts that make it possible for users and devices to gain access to IP networks and IP-based applications that are offered by others than their own operator.
|
- Getting Started in Microsoft Project 2010 After the Business Initiative Is Approved
- Mar 11, 2011
- This chapter shows you how to plan for a successful project by setting the direction, sharing the vision, and establishing the rules of the project.
|
- ITIL Capacity Management: Define and Manage Capacity Plans
- Mar 3, 2011
- This chapter goes beyond the ITIL documentation to describe a working formula for capacity plans. It suggests that you create more customized plans for those areas that really need detailed plans and keep them current through a repeatable process. You will learn the details of what goes into a capacity plan and how and when to create your plans.
|
- Deploying iPhones and iPads on Your Network
- Jan 19, 2011
- Eric Geier shows how to give Apple iOS devices access to an 802.1X-protected Wi-Fi network, Microsoft Exchange services, VPN access, and more.
|
- Selling Your Business Resumption Plan to the “Top Dogs:” It’s Not as Tough as You Think, Part 2
- Nov 8, 2010
- If you are a mid-level manager trying to “sell” your disaster recovery plan in the corner executive office, you know it’s tough to make that pitch. In Part 2 of his three-part series, Leo Wrobel shows you how to brief your executives, schedule presentations, and devise workaround plans and procedures, and much more.
|
- Selling Your Business Resumption Plan to the “Top Dogs:” It’s Not as Tough as You Think, Part 1
- Nov 3, 2010
- If you are a mid-level manager trying to “sell” your disaster recovery plan in the corner executive office, you know it’s tough to make that pitch. Leo Wrobel shows you how to lay out the project, get to your ultimate goal quickly (commitment, funding, hiring or whatever), and devise a presentation that will make your boss an “offer he can’t refuse.”
|
- The Imperative for a New Approach to Information Architecture
- Aug 26, 2010
- Michael Schroeck, a coauthor of The Art of Enterprise Information Architecture: A Systems-Based Approach for Unlocking Business Insight, explains why managing information effectively is crucial to business survival and success today. He presents the context for developing an 'Information Agenda' as the basis for turning your organization into an information-enabled enterprise.
|
- Lean Integration for Health Care: Healthy Data for the Future
- Aug 10, 2010
- John G. Schmidt, coauthor of Lean Integration: An Integration Factory Approach to Business Agility, believes that health care in the U.S. will inevitably slide into adopting lean principles. But why should we wait for this desirable state? He explains the current issues that make lean crucial and the obstacles that we need to overcome in getting lean.
|
- The Art of Enterprise Information Architecture: Best Practices and Tips to Derive Business Insight
- Aug 4, 2010
- Eberhard Hechler, a coauthor of The Art of Enterprise Information Architecture: A Systems-Based Approach for Unlocking Business Insight, provides a guided tour of the book.
|