Domain

IT Operations Knowledge Archive – Page 61

When Disaster Planning Fails

This article takes the example of Northrop Grumman’s experience due to hurricane Katrina – when its disaster planning failed and cost the company $1B – to discuss creating disaster recovery plans, assessing preparedness, and recovering after a disaster if the plan fails!

Improving Information Security Compliance

This paper presents a process-oriented approach to manage organizational change needed to improve information security compliance. The approach uses Business Aligned Information Security  anagement (BAISeM) and principles that have been derived from standards like ITIL, CObIT and ISO 27001. In order to illustrate the approach, the context of IT service continuity is selected as an example.

Cloud Computing and Service Oriented Infrastructure

<div>What is the impact of service oriented infrastructure (SOI) on cloud computing? This presentation discusses the evolution of IT infrastructure and connects SOI with cloud computing in a service oriented enterprise (SOE).</div>

<div>&nbsp;</div>

Framework for Cloud Buyers

This presentation presents a value based framework to facilitate with the decision to migrate to cloud computing.

European CIO Cloud Survey

This report is based on a survey of 500 CIOs, in a cross-section of organizations across Europe, to explore current attitudes and adoption levels of cloud computing.

Cloud Computing in Higher Education

This paper provides an in-depth overview of cloud computing – what is cloud computing? What Is Different About &ldquo;the Cloud&rdquo;? Why Is Cloud Computing Important? Adoption of Cloud Computing in Higher Education&hellip;What Is the Right Aggregation Point for Services? The difference between Public Clouds and Private Clouds…

Has Cloud Computing Matured?

This survey of 573 C-level executives, business unit leaders and IT decision-makers in 18 countries seeks to understand how technology, particularly cloud computing, is being used in the enterprise.

Top Action Steps for Information Security Managers

"This publication is designed for Certified Information Security Managers (CISMs), Chief Information Security Officers (CISOs) and information security managers to use as action steps in addressing the questions posed by the 2001 ITGI publication Information Security Governance: Guidance for Boards of Directors and Executive Management. "

CIO Portal