Domain

IT Operations Knowledge – Page 60

Cloud Computing as a Model For Pricing Information Technology

The authors argue that the rise of cloud computing will "ultimately serve to transform – in a big way – the information technology industry, as the shift from procuring IT “stuff” to buying IT services will be transformational across the landscape."

Vision Hype and Reality of Cloud Computing

This presentation discusses cloud computing and related paradigms – definition and history of cloud computing, trends in cloud computing, benefits and challenges of cloud computing, cloud computing architecture, and the evolution of cloud computing to its "future state"

Audit Like a Hacker

This presentation guides you through a security audit from a different perspective – that of a hacker who focuses on "value" among other things.

Creating a Culture of Security

This presentation discusses the impact of human behavior on security, how human involvement can increase the effectiveness of security solutions and how a culture of security can benefit an organization.

Strategic Cloud Computing

A year ago, cloud was squarely in the IT domain; now, it’s making its way to the boardroom. This article explains why the real story is less about technology and more about business strategy.

Cloud Computing Strategy

This presentation defines cloud computing, discusses implementation considerations and migration strategy.

Server Virtualization Maturity Study

The study tries to better understand the impact of production server virtualization on IT service management procedures and controls/datacenter operating practices. 

When Disaster Planning Fails

This article takes the example of Northrop Grumman’s experience due to hurricane Katrina – when its disaster planning failed and cost the company $1B – to discuss creating disaster recovery plans, assessing preparedness, and recovering after a disaster if the plan fails!

Improving Information Security Compliance

This paper presents a process-oriented approach to manage organizational change needed to improve information security compliance. The approach uses Business Aligned Information Security  anagement (BAISeM) and principles that have been derived from standards like ITIL, CObIT and ISO 27001. In order to illustrate the approach, the context of IT service continuity is selected as an example.

CIO Portal