Domain

IT Operations Knowledge – Page 56

Incident Response Program

This presentation discusses the imperatives for and the framework and process needed to setup an incident response program.

Creating an Effective Disaster Recovery Strategy

This whitepaper examines the business value of operational continuity – including the increasing regulatory expectations – and exposes common technical and business flaws in disaster recovery strategies.

Pricing and Positioning Cloud Computing Services

This paper helps position cloud computing services in a solution stack and price them for profitability. Written for vendors it can assist clients understand cloud computing service pricing.

Realizing the Cloud Computing Vision

This paper discusses a roadmap to realize your cloud computing vision through a disciplined business case and enabling enterprise architecture.

Cloud Security Vision

This presentation discusses the evolution of cloud computing, resulting security challenges and a new vision and architecture to ensure datacenter and cloud security.

Economics of the Cloud

This analysis provides a deep dive into the economic and strategic benefits of cloud computing, offering valuable insights for businesses considering cloud adoption.

Developing an Enterprise Cloud Computing Strategy

This whitepaper discusses Intel's cloud computing strategy that believes in adopting the cloud form the inside out. Authored by Intel's employees engaged in implementing the cloud internally it details the opportunistic strategy taking advantage of Saas and gaining experience with IaaA as they prepare for what they characterize a major transition.

Cloud Computing Strategy Architecture and Solutions

This paper provides a high level overview of cloud computing, outlines its benefits, discusses challenges in its implementation, suggests steps to help in its adoption, and, finally, reviews key frameworks and datacenter technologies developed by Cisco.

ITIL Security Management

This presentation discusses security management within the context of ITIL. The author’s basic premise is the ITIL is not used to implement security but its processes may lead to enhanced security controlled processes.<br />

CIO Portal