Quantcast
Channel: InformIT :: Articles > Information Technology
Browsing all 62 articles
Browse latest View live

Article :: Selling Your Business Resumption Plan to the “Top Dogs:” It’s Not...

If you are a mid-level manager trying to “sell” your disaster recovery plan in the corner executive office, you know it’s tough to make that pitch. Leo Wrobel shows you how to lay out the project, get...

View Article


Article :: Selling Your Business Resumption Plan to the “Top Dogs:” It’s Not...

If you are a mid-level manager trying to “sell” your disaster recovery plan in the corner executive office, you know it’s tough to make that pitch. In Part 2 of his three-part series, Leo Wrobel shows...

View Article


Article :: Deploying iPhones and iPads on Your Network

Eric Geier shows how to give Apple iOS devices access to an 802.1X-protected Wi-Fi network, Microsoft Exchange services, VPN access, and more.

View Article

Article :: ITIL Capacity Management: Define and Manage Capacity Plans

This chapter goes beyond the ITIL documentation to describe a working formula for capacity plans. It suggests that you create more customized plans for those areas that really need detailed plans and...

View Article

Article :: Getting Started in Microsoft Project 2010 After the Business...

This chapter shows you how to plan for a successful project by setting the direction, sharing the vision, and establishing the rules of the project.

View Article


Article :: Achieving Nomadicity: Accessing the Internet Anytime, Anywhere

This chapter explains the key concepts that make it possible for users and devices to gain access to IP networks and IP-based applications that are offered by others than their own operator.

View Article

Article :: The Road to Effective Capacity Management

Capacity management is incredibly helpful in reducing IT costs, but has proven difficult for many organizations to implement. Larry Klosterboer, author of ITIL Capacity Management, shows you how to...

View Article

Article :: Resuming Business Operations After a Virus Infection

Even when following cybersecurity best practices, your business very likely will become infected by malware at some point. During the recovery process, someone will have to decide when it's safe to get...

View Article


Article :: The Japan Quake: Could It Happen Here, and Is Your Organization...

The recent events in Japan have transformed idle thoughts of earthquakes and tsunamis into real-life manifestations of our worst nightmares. If you had strong information of when a disaster would...

View Article


Article :: Four Rules for Surviving an Amazon EC2 Outage

The recent outage of one of Amazon’s availability zones has some technologists claiming the cloud isn’t product ready. The reality is that it isn’t a problem with the cloud—it’s a problem with the...

View Article

Article :: The Scariest (Disaster) Book I Have Ever Read, Part I

The most terrifying weapon facing the U.S. may already be in our enemies' hands. Are you prepared for the ultimate disaster? In Part I of his three-part series, author Leo Wrobel explains how an...

View Article

Article :: The Scariest (Disaster) Book I Have Ever Read, Part II

The most terrifying weapon facing the U.S. may already be in our enemies hands. Are you prepared for the ultimate disaster? In Part II of his three-part series, author Leo Wrobel explains how you can...

View Article

Article :: MOF, ITIL, and Service Manager

This chapter discusses the service management processes specified in the Microsoft Operations Framework (MOF) and Information Technology Information Library (ITIL) supported by System Center Service...

View Article


Article :: The Scariest (Disaster) Book I Have Ever Read, Part III

The most terrifying weapon facing the U.S. may already be in our enemies hands. Are you prepared for the ultimate disaster? In Part III of his three-part series, author Leo Wrobel explains exactly...

View Article

Article :: Service Intelligence: Improving Your Bottom Line with the Power of...

In this chapter, Sharon Taylor looks at the basic ingredients of services and service practices. She also covers the basics of ITSM terminology to help shape your understanding of dialogue you need to...

View Article


Article :: System Center Opalis Integration Server 6.3 Unleashed:...

This chapter expands on the basic OIS architecture and explains how the components interact with one another during policy execution. It also discusses the major deployment models and identifies where...

View Article

Article :: Ten New Features for Report Users in IBM Cognos 10 Report Studio

Instead of just focusing on the major features of IBM Cognos 10 Report Studio, Roger Johnson, coauthor of IBM Cognos 10 Report Studio: Practical Examples, looks at some lesser-known tools and object...

View Article


Article :: IBM Information Management System: From Apollo to Enterprise

This chapter highlights some of the history of IMS and describes how IMS fits into contemporary IT multitiered enterprise architectures.

View Article

Article :: Data Center Architecture and Technologies in the Cloud

This chapter provides an overview of the architectural principles and infrastructure designs needed to support a new generation of real-time-managed IT service use cases in the data center.

View Article

Article :: The Art of the Data Center: Bahnhof - Stockholm, Sweden

Doug Alger takes a fascinating look at one of the most amazing data centers in the world in this chapter from his book The Art of the Data Center.

View Article
Browsing all 62 articles
Browse latest View live