Home > Articles > Information Technology

Information Technology

921 Items

Sort by Date | Title

An Initial Look at ITIL Version 3 – Part One
Sep 28, 2007
Does ITIL version 3 live up to its highly touted prerelease billing?
An Initial Look at ITIL Version 3 – Part Three
Oct 12, 2007
Rich Schiesser looks at the "Service Operation" and "Continual Service Improvement" books.
An Initial Look at ITIL Version 3 – Part Two
Oct 5, 2007
Rich Schiesser examines the changes in the de facto standard for infrastructure best practices.
An Introduction to Catastrophe Disentanglement for Software Projects
May 4, 2006
Just as the smart thing to do when a ball of twine seems hopelessly entangled is to stop whatever we are doing with it (otherwise, the tangle gets worse), so it is with a disastrous project; the longer we keep at it, the worse it gets. At some point, we need to halt all activity and reassess what we are doing. This chapter introduces you to the concept of catastrophe disentanglement.
An Introduction to DITA
Oct 27, 2006
Writing, compiling, and maintaining documentation is a necessary evil. While moving to DITA might not improve the quality of your documentation, it can streamline the process of creating and managing those documents. Scott Nesbitt explains how.
An Introduction to Snort: A Lightweight Intrusion Detection System
Jun 15, 2001
In this first of a two-part series of articles on Snort, Joseph Dries introduces you to this Intrusion Detection System and tells you the advantages of deploying it.
An Overview of Netsourcing
Jun 21, 2002
Netsourcing is the practice of renting access to centrally managed business applications — everything from credit card validation to human resources. Learn the 11 key benefits of netsourcing, as well as types of netsourcing suppliers and business applications available today.
An Overview of the syslog Protocol
Dec 1, 2005
This chapter presents an overview of the syslog protocol and shows you how to deploy an end-to-end syslog system. You'll learn about the syslog architecture as well as the issues in deploying syslog servers in Linux and Windows OSs with a focus on their relevance in a Cisco environment.
Analyzing, Configuring, and Monitoring Windows NT 4.0 Security
Apr 5, 2002
A wide variety of advanced topics from MCSE Exam 70-244 are covered in this article. The concept that binds them all together is that of security.
Apache: Starting, Stopping, and Restarting
Mar 29, 2002
Apache provides a variety of ways to start, stop, and restart your server. Learn here how to automate these processes, and ensure that your server is always running when it needs to be.
Application Interface-Oriented B2B Application Integration
Nov 13, 2000
In this article, EAI expert David S. Linthicum examines application interface-oriented B2B application integration.
Applying the International Function Point Users Group Counting Rules: Frequently Asked Questions (FAQs)
Nov 20, 2001
This article attempts to address some of the common misunderstandings about applying the International Function Point Users Group counting rules. As long-term users, we often forget how much effort, study, learning, discussion, and analysis it took us ...
Applying the Principles of Network Design
Feb 1, 2002
To illustrate three basics of highly scalable networks, this Cisco Press sample chapter "reforms" a network that is experiencing stability problems to make it stable and scalable.
Approaches to Content Management
Sep 28, 2001
Managing web assets is easy if you follow one of the four approaches in this article by Russell Nakano. Whether your web site is small or large, you’ll find a suitable approach here.
Approaching E-business Integration
Nov 13, 2000
Although it's difficult to pigeonhole the e-business approaches that middleware vendors are taking, it is possible to create some general categories. EAI expert David S. Linthicum deconstructs the types of available integration methods.
Architecture-Centric Software Project Management: An Introduction
Feb 15, 2002
This chapter from Architecture-Centric Software Project Management gives an overview of all the main activities that a project manager practicing an architecture-centric approach will be involved in.
Are Private-Sector Organizations Responsible for Failing to Plan for Natural Disasters? (Part 1 of 3)
Mar 16, 2009
If you're the company's disaster-recovery planner, and you're caught unprepared for a natural disaster, are you at fault?
Are Private-Sector Organizations Responsible for Failing to Plan for Natural Disasters? (Part 2 of 3)
Mar 23, 2009
Contingency planners must adopt those new technologies - or be held responsible for failure to do so. How do these issues affect your role in emergency planning for your organization?
Are Private-Sector Organizations Responsible for Failing to Plan for Natural Disasters? (Part 3 of 3)
Mar 31, 2009
Leo A. Wrobel and Sharon M. Wrobel conclude this series with a discussion of an alarming fact (disasters are on the rise) and what might be an even more alarming conclusion for disaster recovery planners (yep, you're responsible).
Are Strategies Real Things?
May 12, 2005
This chapter, actually a collection of essays on Strategy, introduces the idea of advanced strategy, and questions whether strategies are necessary, real, and functional in general.

<< < Prev Page 1 2 3 4 5 Next >