IT Manager's Handbook: Getting Your New Job Done (80 page)

Read IT Manager's Handbook: Getting Your New Job Done Online

Authors: Bill Holtsnider,Brian D. Jaffe

Tags: #Business & Economics, #Information Management, #Computers, #Information Technology, #Enterprise Applications, #General, #Databases, #Networking

BOOK: IT Manager's Handbook: Getting Your New Job Done
10.81Mb size Format: txt, pdf, ePub
interoperability,
179
performance,
178
price,
177–178
product market position,
179
required training,
178
scalability,
178
services,
178
support and service,
179
typical components,
177–179
viability,
178
Evidence maintenance
compliance process,
236
hidden benefits,
238
Exchange (Microsoft)
client/server software,
136
cloud computing,
148–149
ExecuNet.com,
77
Expense item
company policies,
168
gray areas,
168
Experienced workers
job requirement flexibility,
93
vs.
“newbies,”,
61
t
position description,
76
similar experience of candidates,
92–93
Experimentation, connectivity tool issues,
298–299
External employees, project planning,
113–114
External hires,
vs.
internal,
68–70
External referrals, as hiring starting point,
68
External use software licenses,
146

F

Facebook,
44
,
290
,
290
t
,
296
,
299
,
302
Face-to-face project meetings,
129
Facilities
disaster recovery,
248
,
254–256
user identification,
264
Fair and Accurate Credit Transactions Act (FACTA),
231
Fair Credit Reporting Act (FCRA),
231
FASB,
See
Financial Accounting Standards Board (FASB)
Federal Deposit Insurance Corporation,
229
Federal Reserve System,
229
Federated identity,
220
Feedback
IT service,
268
leadership during tough economy,
181
FileMaker Pro, DBMS,
135
Finance Department
budget approval,
165
BYO policies,
273
capital
vs.
operating expenses,
115
,
167
company money policies,
168
consultant pros and cons,
72
t
consumerization of IT,
271
,
272
disaster recovery committee,
249
employee education,
238
full-time
vs.
consultants,
70
internal resources costs,
115
intranet software downloads,
143
IT manager duties,
1
,
6
outsourcing,
186
“people to know,”,
24
policies and procedures,
243
stakeholder identification,
108
user identification,
264
vendor management,
176
Financial Accounting Standards Board (FASB),
169
Financial Instruments and Exchange Law (Japan),
228
Financial Privacy Rule, GLB,
231
Financial scandals,
226
,
237–238
Financial Security Law of France,
228
Firewall,
220
First-day issues
new job basics,
14
war stories,
19
b
First 100 days
advertising personal offerings
asking questions,
22
basic considerations,
21–22
perspective,
21–22
preliminary research,
21
budgeting,
26
developing relationships,
24
HR issues,
25–26
initial decisions,
26–27
introductory meetings,
24–25
organization dynamics,
20–21
project inventory,
22–23
status quo evaluation,
23
Fiscal year, budgeting process,
161
Fixed asset, expense gray areas,
168
Flexibility
consumerization of IT,
272
employee performance review,
45
job requirements,
93–94
unified messaging,
156
user relationships,
270
“Flying Pig” award,
127
b
Focus issues
connectivity,
301–302
management
vs.
leadership,
13
Follow-up, information collection,
268
Four C’s of Hiring,
69
b
Four directions of management, characteristics,
7–8
,
8
f
Free software, GNU definition,
144
b
Friendster,
290
Full-time employees
vs.
consultants,
70–74
project planning,
113
pros and cons,
73
t
resistance by companies,
74
b
Funding, project management
budget source,
131
cost estimation,
130–131
cost justification,
132
overview,
130–132
total cost,
131
Funding sources, project stakeholders,
109
Fusion (Oracle), enterprise applications,
136

G

Gadgets, as connectedness technology,
289
Gantt Chart
example,
119
f
progress tracking,
117
project milestones,
119
project progress tracking,
118
Gates, Bill,
35
,
95
Generational issues
basic considerations,
57–62
cross-generation management,
58–62
differences,
58
t
,
60
t
experienced
vs.
“newbie” workers,
61
t
multigenerational workforce advantages,
59–62
Generation X,
58
t
,
60
t
Generation Y (“Millenials”)
generation differences,
58
t
,
60
t
trends,
59
user security training,
213
Geo-location technology,
290
t
Giuliani, Rudy,
259
Glass–Steagall Act,
232
GLB,
See
Gramm–Leach–Bliley (GLB) Act
Global Crossing,
226
,
227
GNU free software,
144
b
Google Apps,
148
Google Docs,
148
Google Sites,
149
Google Talk,
91
GoToMeeting (Citrix),
180
,
290
t
Governance
compliance processes,
238–239
COSO,
239
Government agencies, project stakeholders,
109
Gramm, Phil,
231
Gramm–Leach–Bliley (GLB) Act,
231–232
Green indicators, project progress tracking,
121
Grid computing,
149
Grove, Andy,
4

H

Hackers
black hats, white hats,
208
,
211–212
security assessment,
211
SSO,
219–220
Handheld devices
end-user upgrades,
269
hardware,
297–298
support issues,
272–273
Hands-off approach, dealing with mergers,
28
Harassment, e-mail management,
154
Hard costs, project funding,
130
Hard sciences-related degree, candidate selection,
97
Hardware
budget items,
162
disaster recovery plan
basic considerations,
257
environment duplication,
257
environment size,
257
home equipment,
257
flexible approach to,
270
handheld devices,
297–298
job requirement flexibility,
94
mobile devices and connectivity,
296–297

Other books

Razor's Edge by Nikki Tate
The Sirens Sang of Murder by Sarah Caudwell
Kathryn Smith by In The Night
To Love a Wilde by Kimberly Kaye Terry
Lost Woods by Rachel Carson
In FED We Trust by David Wessel