IT Manager's Handbook: Getting Your New Job Done (79 page)

Read IT Manager's Handbook: Getting Your New Job Done Online

Authors: Bill Holtsnider,Brian D. Jaffe

Tags: #Business & Economics, #Information Management, #Computers, #Information Technology, #Enterprise Applications, #General, #Databases, #Networking

BOOK: IT Manager's Handbook: Getting Your New Job Done
3.18Mb size Format: txt, pdf, ePub
technical environment,
192
DB2 (IBM), DBMS,
135
DBMS,
See
Database Management System (DBMS)
Decision-making techniques
project management,
122–123
types,
122–123
Deloitte,
158
Demilitarized zone (DMZ),
190
Department objectives, project management,
107
Department of Defense (DoD),
215
De-perimeterization techniques,
215
Deployment, software management,
142–143
Depreciation
budget items,
163
company policies,
168
DES encryption standard,
222
Desktop devices
consumerization of IT,
272
software management,
144
Desktop management, Help Desk,
280
Development plan, performance reviews,
52–53
Development tools, software types,
136
Dice.com,
77
Digital certificates,
222
Direct funding sources, project stakeholders,
109
Directory entries, directory structure,
156
Directory Services,
156–157
Disaster Recovery (DR)
ACT model,
259–260
backup tapes,
256
basic considerations,
247
BCP,
260–261
communication plan,
253–254
and compliance,
243
data replication,
256
definition,
260
documentation,
254
facilities considerations,
255–256
good planning benefits,
261
hardware availability,
257
incident response,
260–261
IT facilities,
254–256
off-site data storage,
256
plan creation,
253–260
plan review/update,
258
post-disaster issues,
259
real estate,
254–256
regional/catastrophic disasters,
259
scope determination
application assessment,
250–252
,
251
f
,
252
f
basic considerations,
248–252
data value,
252
key questions,
248–249
RPO,
249
,
249
f
RTO,
249
,
249
f
testing,
258
Disciplinary problems, employee performance,
54–57
Disk Cloning, software management,
143
Disk image, software management,
143
Distraction issues, connectivity,
301–302
Distributions,
142
Distros,
142
DMADV,
241
DMAIC,
241
DMZ,
See
Demilitarized Zone (DMZ)
Documentation
compliance benefits,
237
compliance policies,
235
disaster recovery plan,
254
first 100 days,
23
infrastructure,
189–190
,
195–196
server environment,
192
trouble tickets as,
278
DoD,
See
Department of Defense (DoD)
Dodd–Frank Act,
233
“Downtime,” connectivity issues,
290
t
DR,
See
Disaster Recovery (DR)
DreamWorks Animation,
107

E

eBay,
225
Education
candidate selection,
95–97
compliance process,
236
direct value to job,
96
e-mail usage,
153
hidden benefits,
237–238
indirect value to job,
96
job requirement flexibility,
93
position description,
76
user training,
271
Electronic discovery,
242
E-mail
appropriate use,
155
archiving,
155
checking frequency,
302
b
electronic discovery,
242
encryption,
222
enterprise applications,
136
,
152–153
harassment,
154
junk mail,
153–154
management,
153–155
mobile user support,
274
self-service Help Desk,
277
size limits and retention,
154–155
threat types,
225
usage statistics,
153
user education,
153
viruses,
154
Employee agreements, training costs,
42
Employee burnout
avoiding/monitoring,
36–37
employee burnout,
36
team management,
36
Employee discounts, intranet uses,
294–295
Employee focus
Agile Meetings,
34
goal achievement,
32–33
goals and objectives,
32
listening to staff,
33
meeting frequency,
33–34
priorities,
32
project meetings,
34
staff input,
33
team communication,
32–34
team management,
32–38
Employee performance,
See also
Performance reviews
disciplinary problems,
54–57
evaluation areas,
44–47
layoff alternatives,
57
b
layoffs,
55–57
overview,
43–57
project management,
133
salary review,
53–54
terminations,
54–57
Employee resources, project planning,
113–114
Employee training
basic considerations,
39–43
certification,
41
compliance process,
236
cost,
39
departures after,
41–42
hidden benefits,
237–238
identifying employees,
40–41
maximizing value,
42–43
morale,
40
needs,
39–40
nontechnical training,
42
scheduling demands,
40
security impact,
214
Empowered users, connectivity issues,
292–293
Emulators, OS,
139
Encouragement, connectivity tool issues,
298–299
Encryption, security defenses,
222
End User Licence Agreement (EULA) [Microsoft],
144
b
End-user upgrades, as proactive solution,
269
Enron,
226
Enterprise applications
connectivity tool implementation,
300
directory services,
156–157
e-mail,
152–153
overview,
152–157
scalability issues,
178
as software type,
136
unified messaging,
155–156
Enterprise Resource Planning (ERP)
as capital expense,
167
client/server software,
136
cost management,
180
disadvantages,
159
enterprise applications,
136
implementation costs,
158
implementation decisions,
158–159
implementation issues,
157–158
implementation requirements,
158
overview,
157–159
project management,
104
TCO,
142
value,
157
Ernst & Young,
158
ERP,
See
Enterprise Resource Planning (ERP)
Escalating calls, Help Desk procedures,
276–277
Ethics
employee performance reviews,
46
outsourcing,
244
EULA,
See
End User Licence Agreement (EULA) [Microsoft]
European Union
Data Protection Directive,
234
Privacy and Electronic Communications Directive,
234
Evaluation matrix (vendors)
functionality,
177

Other books

Standing By: A Knight's Tale #2 by Burgoa, Claudia Y.
River in the Sea by Tina Boscha
Beneath the Forsaken City by C. E. Laureano
Tamara's Future by Cyna Kade
Targets of Deception by Jeffrey Stephens
B00BPJL400 EBOK by Anderson, Taylor
Finding Rebecca by Silver, Jessica