Domain

IT Operations Knowledge Archive – Page 58

Application Selection Strategy

This presentation discusses a framework for application selection for ERP, SCM and CRM. It introduces the concept of business discontinuities and how to bridge/leverage them with technology solutions.

Hacking 101

This presentation describes the key vulnerabilities in web applications and discusses how to protect against the next attack.

Best Practices for Acquiring IT as a Service

This paper brings together the collective inputs of industry experts to highlight unique contracting requirements related to cloud computing contracts that can help effectively and safely procure cloud services. <br /><br />Although this paper has been written for the federal government, its content is universally application.

IAM Strategies in Healthcare IT

Identity Management in Health Information Technology

This analysis dives into the complexities of Identity and Access Management (IAM) in Health IT, highlighting the impact of fragmented identity practices on data privacy, security, and operational efficiency. It provides strategic solutions for CIOs, including leveraging frameworks like CMS Medicaid IT Architecture (MITA) and collaborating across federal and state levels. By adopting standards-based IAM systems, healthcare organizations can enhance interoperability, reduce costs, and ensure compliance with evolving regulations. Use this comprehensive guide to transform your healthcare identity management approach and secure your data ecosystem.

Rethinking the Cloud

Or thinking about it for the very first time! This presentation makes a case for cloud computing.

Cloud Migration Strategies

This presentation discusses the results of a CIO Survey with a focus on the five strategies to migrate applications to the cloud – Rehost, Refactor, Revise, Rebuild or Replace.

A Practical Guide to Virtualization

This whitepaper discusses the drivers compelling organizations to pursue virtualization as a solution, describes the benefits of virtualization, and demonstrates network virtualization in action.

Virtualization Challenges

This whitepaper discusses the things to consider before taking the plunge into virtualization – because "Collapsing multiple physical devices into software affects the<br /> people and processes supporting the data center. Therefore, enterprises should thoroughly evaluate how business processes, administrative rights, capacity planning, performance monitoring tools and security strategies will need to change."

Virtualization 2.0

This whitepaper makes the case for manageability as a cornerstone of Virtualization. The authors contend that Virtualization 1.0 – that is how the story started! – was about maximizing functionality of shared infrastructure. Virtualization 2.0 is about performance i.e. squeezing the last drop out of virtual infrastructure so the focus should be on monitoring and management solutions.

CIO Portal