Home > Articles > Information Technology
Information Technology
921 Items
Sort by Date | Title
- Setting Up Web Filtering for a Network Using OpenDNS (Part 1)
- Dec 12, 2008
- Eric Geier helps you configure your router and the OpenDNS service so you’ll experience a safer, faster, smarter, and more reliable Internet.
|
- Managing Computer Room Disasters with “First Alert” Procedures and “4Ci”
- Dec 1, 2008
- Every organization needs a disaster plan that includes designated instructions for a first responder and the emergency team that gets the first phone call.
|
- Using Telecommunications Collocation Providers for Disaster Recovery Support
- Nov 18, 2008
- Here are the advantages of using collocation services to get a disaster-struck facility back up and running.
|
- Absolute Beginner’s Guide to Project Management: Controlling a Project
- Oct 22, 2008
- Here are the "need to know" fundamentals of project control that will greatly reduce your learning curve and accelerate your effectiveness as a project manager.
|
- Policy Definition and Usage Scenarios for Self-Managing Systems
- Oct 15, 2008
- Learn how policy-based management can be used to reduce the cost of IT administration.
|
- What is the National Incident Management System (NIMS), Part 2
- Oct 3, 2008
- Leo A. Wrobel and Sharon M. Wrobel conclude this series by examining the National Incident Management System (NIMS) standards for communication and the various types of commands within the Incident Command System (ICS).
|
- What is the National Incident Management System (NIMS)?
- Sep 26, 2008
- Learn how NIMS helps communities handle emergency and disaster situations.
|
- Are You Ready for Computing in the Cloud?
- Sep 3, 2008
- Michael Miller examines the pros and cons of cloud computing and analyzes what types of users benefit most from what cloud computing offers.
|
- Improving Application Development with Digital Libraries
- Aug 19, 2008
- This whitepaper shows how on-demand access to trusted information is used to overcome costly delays in the application development process.
|
- Minimizing Technology Project Delays with Digital Libraries
- Aug 19, 2008
- This whitepaper shows how on-demand access to trusted technoloy information ensures timely IT project success.
|
- The Project Manager’s Personal Bridge to Agility
- Aug 4, 2008
- Moving to Agile project management is scary. Stacia Broderick eases the transition.
|
- Planning for and Supporting the iPhone in Business Environments
- Jul 31, 2008
- The iPhone poses challenges for IT professionals. Here's how to deal with them.
|
- Executing SOA: A Methodology for Service Modeling and Design
- Jul 17, 2008
- This chapter provides a detailed overview of a service-oriented design methodology and covers the SOA reference architecture.
|
- Eating the IT Elephant: Abstraction Works Only in a Perfect World
- Jul 16, 2008
- This chapter examines the necessary technical context, requirements, and characteristics of the Elephant Eater.
|
- Getting Your Disaster Recovery Plan Funded - with an Awesome Business Impact Analysis, Part 3
- Jul 11, 2008
- Relocating your business? Here's helpful information on planning for disaster recovery.
|
- Implementing ITIL Configuration Management: Determining Scope, Span, and Granularity
- Jul 8, 2008
- This chapter explores the topic of the Configuration Management Database in depth.
|
- SharePoint Governance: Considerations for a Successful Deployment
- Jun 30, 2008
- Effective governance helps ensure the overall long-term success of your SharePoint environment.
|
- Overcoming Transport and Link Capacity Limitations Through WAN Optimization
- Jun 19, 2008
- This chapter examines how WAN optimization capabilities overcome performance barriers created by WAN conditions.
|
- Getting Your Disaster Recovery Plan Funded - with an Awesome Business Impact Analysis, Part 2
- Jun 16, 2008
- Get the right numbers to impress management with the need for disaster recovery planning.
|
- Structuring and Modularizing the Network with Cisco Enterprise Architecture
- Jun 12, 2008
- This chapter introduces a modular hierarchical approach to network design, the Cisco Enterprise Architecture.
|