IT Manager's Handbook: Getting Your New Job Done (78 page)

Read IT Manager's Handbook: Getting Your New Job Done Online

Authors: Bill Holtsnider,Brian D. Jaffe

Tags: #Business & Economics, #Information Management, #Computers, #Information Technology, #Enterprise Applications, #General, #Databases, #Networking

BOOK: IT Manager's Handbook: Getting Your New Job Done
5.41Mb size Format: txt, pdf, ePub
types,
148–149
CMMI,
See
Capability Maturity Model Integration (CMMI)
CNE,
See
Certified Novell Engineer (CNE)
COBIT,
See
Control Objectives for Information and Related Technology (COBIT)
Code name, project management techniques,
127
Collaboration
connectivity tool issues,
298–299
employee performance reviews,
46
management style,
4
Command and Control management style,
4
Commitment, candidate selection,
95
Committee of Sponsoring Organizations (COSO),
226
Communication plan
disaster recovery,
253–254
mobile user support,
275
Communication skills, employee performance reviews,
45
Communication with team
Agile meetings,
34
focused employees,
32–34
goal achievement,
32–33
goals and objectives,
32
listening to employees,
33
meeting frequency,
33–34
project meetings,
34
staff questions,
33
Company objectives, project management,
107
Company-owned equipment, BYO policies,
288–289
Company values, team management,
34–35
Company-wide layoffs, alternatives,
57
b
Complaint desk,
See
Help Desk
Compliance,
See also
Policies
Basel II,
229–230
disaster recovery and business continuity,
243
Dodd–Frank Act,
233
electronic discovery,
242
employee performance reviews,
46
Gramm–Leach–Bliley Act,
231–232
information and records retention,
242
Massachusetts Data Protection Law,
230–231
non-compliance victims,
227
Office of Foreign Assets Control,
233
outsourcing,
244
overview,
226–227
personally identifiable information,
226–227
PIPEDA,
233
policies and procedures,
243
Privacy and Electronic Communications Directive (European Union),
234
rules,
227–234
Sarbanes–Oxley,
227–228
US securities,
232
working with auditors,
242–243
Compliance benefits
control mechanisms,
237
documentation,
237
employee education,
237–238
evidence maintenance,
238
overview,
237–238
Compliance processes
CMMI,
240
control mechanisms,
236
COSO,
226
employee education,
236
evidence maintenance,
236
ISO 9000,
240–241
IT governance,
238–239
IT Infrastructure Library,
240
methodologies and frameworks,
238–239
overview,
234–236
policy documentation,
235
Six Sigma,
241–242
Concurrent User Licensing,
146
Conference calling services, as proactive solution,
268
Conference calls, project meetings,
129
Conference room reservations
intranet uses,
294–295
as proactive solution,
269
Confidentiality, Integrity, Availability (CIA) model,
208
Connectivity
basic considerations,
287
benefits and challenges,
290–291
,
290
t
benefits of Web,
293–294
BYO policies,
288–289
effects on IT Manager,
298–302
e-mail checking frequency,
302
b
empowered users,
292–293
focus
vs.
distraction,
301–302
goals,
301
handheld hardware,
297–298
handling new technologies,
287–288
intranet uses,
294–295
mobile device OSes/apps/hardware,
296–297
mobile device uses,
295–296
,
297–298
new technologies,
289–290
real-world applications,
293–298
social media uses,
295–296
tool implementation,
299–301
tool use considerations,
298–299
tool use guidelines,
300–301
tool use opportunities,
301
wisdom of crowds,
293
Constraints, project management,
109–110
Consultants
cost considerations,
114
vs.
full-time employees,
70–74
project planning,
113
pros and cons,
72
t
Consumerization of IT
BYO policies,
273
handling,
272
overview,
271–273
security issues,
273
support depth and breadth,
273
support issues,
272–273
Continuity, Four C’s of Hiring,
70
Contracts
vs.
position descriptions,
75
review with vendors,
175–176
Control mechanisms
compliance benefits,
237
identification,
236
Control Objectives for Information and Related Technology (COBIT),
239
Convenience,
vs.
security
vs.
privacy,
207
Conversation topics, one-on-one meetings,
16
Coordination with others, employee performance reviews,
46
Corporate Governance Code (Germany),
228
Corporate Law Economic Reform Program Act (2004),
See
CLERP-9 (Australia)
Corporate scandals,
227
COSO,
See
Committee of Sponsoring Organizations (COSO)
Cost considerations,
See also
Budgeting issues
Capital expenditure
Money
Operating expense
consumerization of IT,
273
disaster recovery facilities,
255
employee training,
39
,
42
ERP implementation,
158
Four C’s of Hiring,
69
full-time
vs.
consultants,
71
information sharing with users,
267
off-track projects,
125–126
OSS,
142
project funding,
130–131
,
132
project management,
109
project meetings,
129
recruiters,
82
tough economic times,
179–180
vendor evaluation matrix,
177–178
Courtesy interview,
68
CR,
See
Change Request (CR)
craigslist.org,
77
Crisis communication services, DR communication plan,
254
Critical path, project progress tracking,
118–119
Crowdcast.com, as connectedness technology,
289
Crowdsourcing
basic concept,
293
as connectedness technology,
289
connectivity tool issues,
298–299
CSO,
See
Chief Security Officer (CSO)
CSSLP,
See
Certified Secure Software Lifecycle Professional (CSSLP)
Customer needs
customer as user,
264
and employee training,
41
IT strategy development,
12
OS selection,
139
Customer service, benefits of Web,
294

D

Database Management System (DBMS),
135
Databases
DR data replication,
256
ERP,
157
first 100 days,
23
Data loss, DR scope,
252
Data protection, cloud computing,
151
Data Protection Directive (European Union),
234
Data recovery, cloud computing,
151
Data redundancy, cloud computing,
151
Data replication, disaster recovery plan,
256
Data retention, cloud computing,
151
Data storage
cloud computing,
151
disk/tape encryption,
222
off-site,
256

Other books

The Yellow Rose by Gilbert Morris
Glimmer by Vivi Anna
Ravenwood by Lowell, Nathan
The Way to Rainy Mountain by N. Scott Momaday
City of Glory by Beverly Swerling
Olivia's Guardian by St. Andrews,Rose
03_The Unexpected Gift by Irene Hannon