Home > Articles > Information Technology

Information Technology

RSS Feed Subscribe to this topic  RSS details

921 Items

Sort by Date | Title

Setting Up Web Filtering for a Network Using OpenDNS (Part 1)
By Eric Geier
Dec 12, 2008
Eric Geier helps you configure your router and the OpenDNS service so you’ll experience a safer, faster, smarter, and more reliable Internet.
Managing Computer Room Disasters with “First Alert” Procedures and “4Ci”
By Leo Wrobel, Sharon Wrobel
Dec 1, 2008
Every organization needs a disaster plan that includes designated instructions for a first responder and the emergency team that gets the first phone call.
Using Telecommunications Collocation Providers for Disaster Recovery Support
By Leo Wrobel, Sharon Wrobel
Nov 18, 2008
Here are the advantages of using collocation services to get a disaster-struck facility back up and running.
Absolute Beginner’s Guide to Project Management: Controlling a Project
By Greg Horine
Oct 22, 2008
Here are the "need to know" fundamentals of project control that will greatly reduce your learning curve and accelerate your effectiveness as a project manager.
Policy Definition and Usage Scenarios for Self-Managing Systems
By Dakshi Agrawal, Seraphin Calo, Kang-won Lee, Jorge Lobo, Dinesh Verma
Oct 15, 2008
Learn how policy-based management can be used to reduce the cost of IT administration.
What is the National Incident Management System (NIMS), Part 2
By Leo Wrobel, Sharon Wrobel
Oct 3, 2008
Leo A. Wrobel and Sharon M. Wrobel conclude this series by examining the National Incident Management System (NIMS) standards for communication and the various types of commands within the Incident Command System (ICS).
What is the National Incident Management System (NIMS)?
By Leo Wrobel, Sharon Wrobel
Sep 26, 2008
Learn how NIMS helps communities handle emergency and disaster situations.
Are You Ready for Computing in the Cloud?
By Michael Miller
Sep 3, 2008
Michael Miller examines the pros and cons of cloud computing and analyzes what types of users benefit most from what cloud computing offers.
Improving Application Development with Digital Libraries
By Safari Books Online
Aug 19, 2008
This whitepaper shows how on-demand access to trusted information is used to overcome costly delays in the application development process.
Minimizing Technology Project Delays with Digital Libraries
By Safari Books Online
Aug 19, 2008
This whitepaper shows how on-demand access to trusted technoloy information ensures timely IT project success.
The Project Manager’s Personal Bridge to Agility
By Stacia Broderick
Aug 4, 2008
Moving to Agile project management is scary. Stacia Broderick eases the transition.
Planning for and Supporting the iPhone in Business Environments
By Ryan Faas
Jul 31, 2008
The iPhone poses challenges for IT professionals. Here's how to deal with them.
Executing SOA: A Methodology for Service Modeling and Design
By Norbert Bieberstein, Keith Jones, Robert G. Laird, Tilak Mitra
Jul 17, 2008
This chapter provides a detailed overview of a service-oriented design methodology and covers the SOA reference architecture.
Eating the IT Elephant: Abstraction Works Only in a Perfect World
By Richard Hopkins, Kevin Jenkins
Jul 16, 2008
This chapter examines the necessary technical context, requirements, and characteristics of the Elephant Eater.
Getting Your Disaster Recovery Plan Funded - with an Awesome Business Impact Analysis, Part 3
By Leo Wrobel, Sharon Wrobel
Jul 11, 2008
Relocating your business? Here's helpful information on planning for disaster recovery.
Implementing ITIL Configuration Management: Determining Scope, Span, and Granularity
By Larry Klosterboer
Jul 8, 2008
This chapter explores the topic of the Configuration Management Database in depth.
SharePoint Governance: Considerations for a Successful Deployment
By Scott Jamison
Jun 30, 2008
Effective governance helps ensure the overall long-term success of your SharePoint environment.
Overcoming Transport and Link Capacity Limitations Through WAN Optimization
By Joel Christner, Ted Grevers
Jun 19, 2008
This chapter examines how WAN optimization capabilities overcome performance barriers created by WAN conditions.
Getting Your Disaster Recovery Plan Funded - with an Awesome Business Impact Analysis, Part 2
By Leo Wrobel, Sharon Wrobel
Jun 16, 2008
Get the right numbers to impress management with the need for disaster recovery planning.
Structuring and Modularizing the Network with Cisco Enterprise Architecture
By Diane Teare
Jun 12, 2008
This chapter introduces a modular hierarchical approach to network design, the Cisco Enterprise Architecture.

<< < Prev Page 3 4 5 6 7 Next >