Tuesday, 31 January 2017
EC-Council Certification Guide: Overview And Career Paths
from Tom's IT Pro
via CERTIVIEW
How to Build Composite DSC Resources
from Tom's IT Pro
via CERTIVIEW
Monday, 30 January 2017
Best System Administrator Certifications For 2017
from Tom's IT Pro
via CERTIVIEW
Best Cloud Backup for Business 2017
from Tom's IT Pro
via CERTIVIEW
How to Stop Windows 10 from Rebooting After Updates
from Tom's IT Pro
via CERTIVIEW
The Best Digital Asset Management Software for 2017
from Tom's IT Pro
via CERTIVIEW
Friday, 27 January 2017
Confessions of an IT Pro: Work Became School
from Tom's IT Pro
via CERTIVIEW
Thursday, 26 January 2017
Data Privacy Day: Why to Care and What to Do
On January 27, 2014, when the United States Congress adopted S. Res. 337, a nonbinding resolution expressing support for the designation of a “National Data Privacy Day” to be observed on January 28, there wasn’t a lot of time to get the word out, even though the event had been around awhile.
But that’s the date on which I first became aware of Data Privacy Day, and in the years since the bill’s passage, I’ve been a champion of personal data privacy as well as data privacy at work.
The choice of January 28 was no fluke. On that date in 1981, the Council of Europe held the Convention for the Protection of Individuals with Regard to Automatic Processing of Personal Data. Luckily, they shortened the name a bit for the event and signed Convention 108, the first legally binding international treaty dealing with privacy and data protection.
Data Privacy Day began in the U.S. and Canada on January 2008 as an extension of the Data Protection Day celebration in Europe. The international event promotes awareness of privacy and data protection best practices. Recognized in the U.S., Canada and 27 European countries, Data Privacy Day’s educational initiative is to focus on raising awareness among users and businesses of the importance of protecting the privacy of their data online. This has become even more important as social networking has increased in popularity over the years as have security breaches.
Data Privacy Day’s goal is to educate and empower businesses, consumers and families with the knowledge and best practices to better protect themselves from hackers, viruses and malware that can put their information as risk. Data Privacy Day brings together not only technology folks but also government officials, educators, those involved with nonprofits and leaders across industry sectors.
So what can you do about data privacy? If the security of your data and privacy matters to you, Data Privacy Day is a great time to start actively protecting your info. Target, Sony and Yahoo all learned the hard way. It’s in the best interest of every business to practice good data stewardship or they’ll be the next lead story on CNN or the next big headline in The New York Times. Whether it’s your bank, doctor, pharmacy or even workplace, encourage them to protect your data sufficiently. Don’t ever assume your data is protected. Be your own data privacy advocate.
The National Cyber Security Alliance coordinates the promotion of Data Privacy Day activities. Here are some of the things they encourage us to do to promote Data Privacy Day:
- Socialize it. To protect your personal data, you don’t have to be afraid of social media. Tweet privacy tips. Post messages on your Facebook and LinkedIn accounts. You can use the official Data Privacy Day hashtag #PrivacyAware and follow @DataPrivacyDay to stay up to date on all of the latest Data Privacy Day tips to share with your connections and followers.
- Make it official. You can suggest your organization show its support of Data Privacy Day by becoming an official Data Privacy Day Champion. Last year, more than 450 organizations enrolled as Data Privacy Day Champions. It’s quick and easy to sign up.
- Make it personal. Data privacy starts at home, so make sure your loved ones know the risks to their personal information, especially children and teenagers who may be more likely to overshare on social media channels. Secure your information if you have a shared accounts on your PC, tablets or smart TVs that are connected to multimedia outlets like Netflix, Hulu, Amazon Prime and iTunes.
Related Courses
Cybersecurity Foundations
Legal Issues in Information Security
Certified Information Privacy Professional US Private-Sector (CIPP/US) Prep Course
from
CERTIVIEW
Microsoft Outlines Training and Certification for Big Data
from Tom's IT Pro
via CERTIVIEW
How to Save File Permissions for Transfer
from Tom's IT Pro
via CERTIVIEW
Wednesday, 25 January 2017
HP Recalls 101,000 Laptop Batteries
from Tom's IT Pro
via CERTIVIEW
Microsoft's Intune for Education Makes Admin Job Easier
from Tom's IT Pro
via CERTIVIEW
Glassdoor Announces Best Jobs for 2017 Include Tech
from Tom's IT Pro
via CERTIVIEW
Tuesday, 24 January 2017
Amazon's Alexa May be the Next Essential Business Tool
from Tom's IT Pro
via CERTIVIEW
Google's New Chromebooks Add Functionality for Schools
from Tom's IT Pro
via CERTIVIEW
Apple Tops RescueCom's Computer Reliability Report
from Tom's IT Pro
via CERTIVIEW
ISACA Certification Guide: Overview And Career Paths
from Tom's IT Pro
via CERTIVIEW
A Guide to Web Hosting Options
from Tom's IT Pro
via CERTIVIEW
Monday, 23 January 2017
Google Chrome OS for Work: What You Need to Know
from Tom's IT Pro
via CERTIVIEW
What Businesses Need to Know About Virtual Reality
from Tom's IT Pro
via CERTIVIEW
Getting Started with Ansible on Windows
from Tom's IT Pro
via CERTIVIEW
Sunday, 22 January 2017
Why TOGAF is the Framework to Unite IT and the Business
Business transformation is driving a change in the relationship between IT and the business. Internal and external forces are requiring organizations to be more responsive to customer needs and achieve operational and technological efficiencies. IT professionals traditionally only had to focus on the technology architecture. Now, the overall enterprise architecture must be considered in order to eliminate barriers between technology capabilities and business strategy.
What is TOGAF®?
The Open Group’s Architecture Framework, TOGAF, is a globally recognized standard for developing enterprise architecture. The comprehensive framework includes techniques and a set of supporting tools to provide organizations with the capability to ensure all architectural components are aligned to the strategic direction of the business.
The Benefits of TOGAF
- Ensure that everyone speaks the same language.
- Avoid lock-in to proprietary solutions by standardizing on open methods for enterprise architecture.
- Save time and money, and utilize resources more effectively.
- Achieve demonstrable return on investment (ROI).
TOGAF Summary
The TOGAF framework can best be illustrated by the following five layers, as defined by The Open Group:
- Architecture Principles, Vision and Requirements: This layer describes the initial phase of an architecture development cycle. It includes information about defining the scope, identifying the stakeholders, creating the architecture vision, and obtaining approvals.
- Business Architecture: Describes the development of a business architecture to support an agreed architecture vision.
- Information Systems Architecture: This layer describes the development of information systems architectures for an architecture project including the development of data and application architectures.
- Technology Architecture: This layer describes the development of the technology architecture for an architecture project.
- Architecture Realization: This layer is the realization of the architectural components that are necessary for driving business value.
Traditionally, IT professionals have been focused on just the Technology Architecture layer, as well as specific technologies and technology solutions. Limiting the focus to a single layer is equivalent to working in a silo—making it nearly impossible to achieve a holistic view of the business. Attention needs to be devoted to all layers to ensure proper alignment with business principles, vision, requirements and architecture.
Organizations increasingly require IT professionals to gain a more thorough understanding of the business to ensure that technology solutions adequately support business requirements, vision and strategy. Incorporating TOGAF methods facilitates an understanding of the business and achieves IT results that help drive business value.
For a more detailed look at how organizations can ensure technology is aligned with business strategies, see my white paper, The Power of Linking Business Analysis and TOGAF® to Achieve IT Results.
Related Courses
TOGAF 9.1 Level 1 and 2
from
CERTIVIEW
Friday, 20 January 2017
Microsoft Giving Away Windows 10 Upgrades to CSP Subscribers
from Tom's IT Pro
via CERTIVIEW
13 Best IT Training and Certification Resources 2017
from Tom's IT Pro
via CERTIVIEW
Cisco Learning Revamps Data Center Certifications and Adds Training
from Tom's IT Pro
via CERTIVIEW
Thursday, 19 January 2017
Apple Certification Guide: Overview And Career Paths
from Tom's IT Pro
via CERTIVIEW
Data Privacy Day a Perfect Time to Improve Security Policies
from Tom's IT Pro
via CERTIVIEW
Wednesday, 18 January 2017
Report: IT Security Demands Outpace Available Talent
from Tom's IT Pro
via CERTIVIEW
Best All-in-One Business Printers
from Tom's IT Pro
via CERTIVIEW
Xerox WorkCentre 6027 Laser Printer Review
from Tom's IT Pro
via CERTIVIEW
HP LaserJet Pro MFP M130fw Printer Review
from Tom's IT Pro
via CERTIVIEW
HP OfficeJet Pro 8720 All-in-One Printer Review
from Tom's IT Pro
via CERTIVIEW
Epson WorkForce Pro WF-5690 InkJet Printer with PCL/Adobe PS Review
from Tom's IT Pro
via CERTIVIEW
Brother MFC-J5830DW Business Smart Plus Color InkJet All-in-One Printer Review
from Tom's IT Pro
via CERTIVIEW
Tuesday, 17 January 2017
Microsoft: Windows 7 Can't Keep Your Business Secure
from Tom's IT Pro
via CERTIVIEW
PMI Certification Guide: Overview And Career Paths
from Tom's IT Pro
via CERTIVIEW
Best and Worst Hacking in Movies
from Tom's IT Pro
via CERTIVIEW
Monday, 16 January 2017
3 Essentials to Avoid IT Project Failure
Projects are often complex, made up of a large number of moving pieces and bring numerous challenges to those involved. The reality is projects don’t always go the way we want them to. We often find ourselves being asked to do more with less and at a faster pace than we’re comfortable with. On occasion, we are successful in our efforts despite these restrictions.
Many key factors contribute to project success, but three of the fundamentals stand out—stakeholder identification and analysis, effective communication, and identifying project requirements, managing stakeholder expectations and scope of work.
Stakeholders
Stakeholders may affect or be affected by the project—through a project decision, activity or outcome—or they may simply perceive themselves to be affected. The impact or perceived impact can be either positive or negative in nature.
Most projects have a large number of stakeholders. Identifying all stakeholders increases the chance of project success. You must secure and document relevant information about their interests, interdependencies, influences, potential involvement, and probable impact on the project definition, execution and final results. After obtaining this information, classify the stakeholders according to their characteristics. This will make it easier to develop a strategy to manage each stakeholder. An increased focus on key relationships is critical to project success.
Communication
How do you manage expectations? Through communication. It’s vitally important that there is a well-defined communication plan tailored to fit the project and stakeholders.
One component of critical thinking is to learn by questioning. The Project Management Institute (PMI®) indicates that 90 percent of a project manager’s job is communication, however, it is not limited to just talking. Proper communication involves listening, reading reports, generating reports, filtering information from one group to another, etc. To do this effectively, you need a well-defined communication management plan. The creation of any plan like this can be broken down into six questions that need to be asked continually: Who, What, When, Where, How and Why?
For example:
- Who needs to be communicated to?
- What needs to be communicated?
- When does that need to take place?
- Where does it need to happen?
- How is it going to happen?
- Why does it need to happen?
Project Requirements, Stakeholder Expectations and Scope of Work
Before beginning your project, make sure you have clarified all goals, objectives and requirements. Obtaining clarity on what is required and ultimately gaining buy-in from the major stakeholders are crucial. These requirements, along with related goals, objectives and deliverables, become the scope of work that must be completed and will be refined over the life of your project. But if you do not start with a solid understanding of what you’re trying to achieve, you might as well not begin at all.
It will be difficult, if not impossible, to achieve success from a stakeholders’ point of view if there is a lack of clarity concerning their project perception and expectations. This is why stakeholders must be identified and their expectations analyzed as early in the project lifecycle as possible.
Keeping the three key steps—identification and analysis of project stakeholders, the creation and use of an effective communication plan, and proper identification of project requirements, stakeholder expectations and accurate decomposition of the scope of work—at the forefront during project planning and execution greatly enhances the ability to achieve success.
For a deeper dive into how to guarantee project achievement, view my white paper, Three Steps to Ensure the Success of Your IT Projects.
Related Courses
IT Project Management
Project Management Fundamentals
Project Management, Leadership, and Communication
Requirements Development, Documentation and Management
from
CERTIVIEW
Panasonic Rugged Tablets Ready for the Jobsite
from Tom's IT Pro
via CERTIVIEW
Friday, 13 January 2017
8 Best Microsoft Office 365 Productivity Add-Ons
from Tom's IT Pro
via CERTIVIEW
How to Integrate Ansible and DSC
from Tom's IT Pro
via CERTIVIEW
Report Outlines Best and Worst Cities for STEM Jobs in 2017
from Tom's IT Pro
via CERTIVIEW
Thursday, 12 January 2017
Most Anticipated Laptops for Business 2017
from Tom's IT Pro
via CERTIVIEW
Getting Started with Windows Containers
from Tom's IT Pro
via CERTIVIEW
Wednesday, 11 January 2017
Apple, Google Greening the IT Sector
from Tom's IT Pro
via CERTIVIEW
Best App Maker Software for Business 2017
from Tom's IT Pro
via CERTIVIEW
How to Best Lead a Multigenerational IT Team
from Tom's IT Pro
via CERTIVIEW
Tuesday, 10 January 2017
Want a Strong ITIL Strategy? Start with the Right People
Many ITIL® training alums may wonder, “Now that I’ve learned these best practices, how do I actually implement them in my workplace?”
An effective ITIL strategy is the product of a concerted focus on people, process and technology, as well as an ongoing, cost effective and valuable IT service management (ITSM) practice.
While processes and technology play key roles in ITSM, the role of people resources and capabilities cannot be understated. When entering an organization, people start out as a resource (raw material). Training and skills development help your people mature into capable teams that have the ability to carry out your ITIL initiative, execute your processes and deliver value to customers and users. Without an ongoing training program, your ITIL initiative is at risk.
Poorly trained managers and staff:
- Lack the understanding and motivation to drive the ITIL initiative forward, which puts the success of IT Service Management at risk.
- Lack the skills and knowledge to implement the processes and build functional teams.
With a concerted training program and a training plan for each role, your team will become a unified powerhouse that will propel your ITSM initiative to long-term success. Service and process owners will carry out their roles effectively, ensuring that quality robust services are defined while supporting processes guarantee a quality delivery. Practitioners—the individuals and teams carrying out the various steps of your processes—will have the skills and understanding to execute the processes consistently and efficiently, delivering high availability and performance of your services.
Your staff may have completed the first step—ITIL Foundation training—but that only establishes ITIL groundwork. You still need the skilled people capabilities to truly be successful with your ITIL initiative. In order to equip people assets, your staff’s foundational knowledge must be enhanced with ITIL Intermediate training.
For more tips on how to implement ITIL’s best practices into your organization, see the white paper, You’ve Completed ITIL® Foundation: Now How to Implement It.
Related Training
ITIL Foundation
ITIL Intermediate courses
from
CERTIVIEW
How To Become A Mobile App Developer
from Tom's IT Pro
via CERTIVIEW
How to Become a Mobile App Developer
from Tom's IT Pro
via CERTIVIEW