The equipment use policy has been designed to inform employees/end users of best practices and policies to protect company-owned equipment and sensitive data stored on...
|
|
The Information Architect (IA) guides projects on their overall high level solution approach, engages with the architecture team, and chairs the formal architecture...
|
|
Disaster Recovery (DR) testing is an essential component of any comprehensive DR plan as testing is what ensures that the plan is appropriate, accurate, and contains no...
|
|
Info-Tech's buyer's advice will help you optimize spending on salesforce.com and avoid buyer's remorse.
|
|
Avoid contract pitfalls and get a fair price on your telecom and mobility contracts.
|
|
As an Applications Development & Maintenance leader, you must address the key challenges facing the role. The effective management of legacy applications is one of those...
|
|
Use this check list to assess your CMM level based on ISO 27001:2013.
|
|
This template will assist organizations in mapping their requirements gathering process. It comes prepopulated with a standard requirements gathering process, but can...
|
|
Avoid lawsuits, penalties, and misunderstandings by clearly defining acceptable use of e-mail for both employees and the enterprise. Define retention periods, set privacy...
|
|
Standard Operating Procedures (SOPs) are integral to effectively managing IT processes. There are different approaches to recording SOPs. Consider the type and complexity...
|
|