All Research

Equipment Use Policy

The equipment use policy has been designed to inform employees/end users of best practices and policies to protect company-owned equipment and sensitive data stored on...

Information Architect

The Information Architect (IA) guides projects on their overall high level solution approach, engages with the architecture team, and chairs the formal architecture...

DRP Test Schedule Worksheet

Disaster Recovery (DR) testing is an essential component of any comprehensive DR plan as testing is what ensures that the plan is appropriate, accurate, and contains no...

salesforce.com Buyer's Advice

Info-Tech's buyer's advice will help you optimize spending on salesforce.com and avoid buyer's remorse.

Negotiate Favorable Telecom and Mobility Contracts

Avoid contract pitfalls and get a fair price on your telecom and mobility contracts.

Address the Risks Posed by Legacy Applications

As an Applications Development & Maintenance leader, you must address the key challenges facing the role. The effective management of legacy applications is one of those...

ISO 27001:2013 Annex A Self-Check List

Use this check list to assess your CMM level based on ISO 27001:2013.

Requirements Gathering Process Flow Diagram Template

This template will assist organizations in mapping their requirements gathering process. It comes prepopulated with a standard requirements gathering process, but can...

Building a Better E-mail Acceptable Use Policy

Avoid lawsuits, penalties, and misunderstandings by clearly defining acceptable use of e-mail for both employees and the enterprise. Define retention periods, set privacy...

How to Write an SOP

Standard Operating Procedures (SOPs) are integral to effectively managing IT processes. There are different approaches to recording SOPs. Consider the type and complexity...
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us