IT Manager's Handbook: Getting Your New Job Done (84 page)

Read IT Manager's Handbook: Getting Your New Job Done Online

Authors: Bill Holtsnider,Brian D. Jaffe

Tags: #Business & Economics, #Information Management, #Computers, #Information Technology, #Enterprise Applications, #General, #Databases, #Networking

BOOK: IT Manager's Handbook: Getting Your New Job Done
4.63Mb size Format: txt, pdf, ePub
OLTP,
See
Online Transaction Processing (OLTP)
On-demand computing,
149
One-on-one meetings
conversation topics,
16
new job basics,
15–16
Online Analytical Processing (OLAP),
135
Online meeting services, project meetings,
130
Online Transaction Processing (OLTP),
135
OOP,
See
Object-Oriented Programming (OOP)
OpenID,
219
OpenOffice, productivity tools,
136
Open Source Software (OSS)
cost issues,
142
definition,
141
Linux,
138
overview,
141–142
productivity tools,
136
pros and cons,
141
t
“Operate in the cloud,”,
See
Cloud computing
Operating expense
vs.
capital expense,
115
,
167–168
company policies,
168
gray areas,
168
vendor evaluation matrix,
177–178
Operating lease,
169
Operating systems
applications in environment,
138–139
customer needs,
139
emulators,
139
IT issues,
201
Linux,
138
Mac OS X,
137
mobile devices,
296–297
mobile user support,
274
multiple OS environment,
139–140
overview,
137–140
selection,
138–139
as software type,
136
Unix variants,
138
VDI,
140
VMs,
139
VM uses,
140
Windows,
137
Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE),
211
Operations tasks, cloud computing,
151
Oracle
cloud computing,
148
DBMS,
135
enterprise applications,
136
ERP,
157
Oracle Financials, software types,
136
Orange Book
(DoD),
215
Organizational impact, cloud computing,
151
Organization unit, directory structure,
156
OSS,
See
Open Source Software (OSS)
“Out of scope,” project objectives,
107
Outside services, budget items,
163
Outsourcing
agreement evaluation,
184–186
basic considerations,
182–187
compliance,
244
definitions,
182
t
determing factors,
184–187
functions,
184
hiring justification,
68
overview,
182–183
political considerations,
186
pros and cons,
183
t
Overhead, budget items,
163
Overqualified candidates,
85–86
Oxley, Michael G.,
227

P

PaaS,
See
Platform as a Service (PaaS)
Page, Larry,
95
,
209
Page hijacker,
224
Passwords
authentication methods,
220
backup tapes,
256
BYO policies,
289
challenge–response authentication,
219
compliance,
243
consumerization of IT,
273
directory services,
156
disaster recovery,
258
Help Desk activities,
276–277
,
281
identity management,
220
malware,
224
mobile devices,
298
NAC,
222
phishing,
225
risk mitigation,
212
secure users,
213
security incident response,
223
security
vs.
privacy
vs.
convenience,
207
security technologies,
217–218
self-service help,
277
SLAs,
283
special privilege IDs,
218
SSO,
219
two-factor authentication,
219
user training,
213
Patriot Act,
232
Pattern files updates,
222
PayPal,
225
Payroll Department
cloud computing,
148–149
disaster recovery,
261
security authorization levels,
218–219
Payroll information, intranet uses,
294–295
PC Anywhere,
279–280
PD,
See
Position Description (PD)
PDCA,
See
Plan, Do, Check, Act (PDCA)
Performance measurement, IT governance,
239
Performance reviews
360 reviews,
51
,
51
t
accountability,
46
basic considerations,
43–44
communication skills,
45
compliance,
46
conduction discussion,
52
creative problem solving,
45
employee flexibility,
45
ethics,
46
evaluation statements,
47–48
,
48
t
example,
50
b
guidelines,
48–49
innovation,
45
job requirements,
45
learning new skills,
46–47
metrics,
47–48
negative reviews,
49–50
objectiveness,
48
plan/goals development,
52–53
“plays well with others,”,
46
privacy issues,
52
quality of work,
44
recording details,
48–49
self-reviews,
50
short-/long-term project management,
47
team players,
47
timely performance,
46
tone,
52
Perks, project management techniques,
127
Per seat licensing,
146
Per server licensing,
146
Personal contacts, job postings,
78
Personal Information Protection and Electronic Documents Act (PIPEDA),
233
Personality tests,
90
b
Personally identifiable information (PII),
226–227
,
230
,
232
Personally-owned equipment, BYO policies,
288–289
Personnel, budget items,
162
PERT charts,
See
Program Evaluation and Review Technique (PERT) charts
PGP,
See
Pretty Good Privacy (PGP)
Phased integration, dealing with mergers,
28
PHI,
See
Protected Health Information (PHI)
Phishing,
153–154
,
208
,
225–226
Phone tree, DR communication plan,
254
Physical access, activity tracking,
216
Physical plant items
budget process,
163
as capital expense,
167
PII,
See
Personally identifiable information (PII)
PIPEDA,
See
Personal Information Protection and Electronic Documents Act (PIPEDA)
PKI,
See
Public Key Infrastructure (PKI)
Plan, Do, Check, Act (PDCA),
241
Platform as a Service (PaaS),
149
,
151
PlayStation Network,
225
“Plays well with others,” performance reviews,
46
Plurk.com, as connectedness technology,
289
PMBOK,
See
Project Management Book of Knowledge (PMBOK)
PMI,
See
Project Management Institute (PMI)
PMO,
See
Project Management Office (PMO)
PMP,
See
Project Management Professional (PMP)
Podcasting,
289
,
290
Policies,
See also
Bring Your Own (BYO) Policy
Compliance
Procedures
compliance,
243
consumerization support issues,
272
e-mail usage,
153
,
154

Other books

Matilda's Freedom by Tea Cooper
A Touch of Betrayal by Catherine Palmer
Chemical [se]X by Anthology
The Colonel's Man by Mina Carter, J. William Mitchell
Out of Reach by Missy Johnson
Friday Night in Beast House by Richard Laymon
Magic Hands by Jennifer Laurens