Taxonomy Quality Assurance Policy

The taxonomy quality assurance policy has been established in order to preserve the accuracy of categorized folders, files, and directory structures available on network...

Removable Media Acceptable Use Policy

The removable media acceptable use policy defines the standards, procedures, and restrictions for end users who have legitimate business requirements to connect portable...

Server Configuration Policy

The server configuration policy establishes the standards, procedures, and restrictions for new servers being installed within the company.

Change Control – Freezes & Risk Evaluation Policy

The purpose of this policy is to ensure that IT staff recognize that changes to computer systems tend to destabilize those systems.

Stakeholder Power Map Template

Identify and prioritize the stakeholders that are important to your IT strategy development effort.

What the Dell EMC Acquisition Really Means

What does the massive acquisition of EMC by Dell mean for the IT infrastructure market? In short, not much.

IT Integration Roadmap Tool

Use the IT Integration Roadmap Tool to track key elements during the M&A discovery, integration planning, and execution phases.

Converged Wired and Wireless LAN Market Consolidation

As organizations look to network vendors to deliver converged wired and wireless LAN solutions, the vendors offering those solutions are engaged in a flurry of business...

IT Due Diligence Report

This tool helps the CIO and IT due diligence team with tracking and documenting ongoing information discoveries throughout the due diligence phase of an M&A transaction.

Lenovo, Superfish, MITM attacks, and SSL Interception: the Bigger Picture

Lenovo’s strategy to pre-install the Superfish application on some consumer devices was fundamentally irresponsible and a squander of customers’ trust.
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us