1. Subscribe to asterisk-announce

    Posted on in voice

    Asterisk logoIf your PBX is Asterisk based, you need to subscribe to the asterisk-announce mailing list. This is where Asterisk developers post information regarding new releases and security updates for all versions of Asterisk. If you were on this mailing list, you would know that two recent security alerts (see below …

  2. Intellectual Property

    Posted on in Information Systems

    Intellectual property is the "ownership of ideas and control over the tangible or virtual representation of those ideas" (FOLDOC, 1997). Many companies have developed intellectual property as part of their normal business operations. This includes manufacturing processes, specialized business operations, and customized software. Intellectual property can be divided into four …

  3. New Technologies: Issues and Challenges

    Posted on in Information Systems

    Implementing a new technology is a complicated task. Beyond the technical implementation details, there is a myriad of organizational issues and challenges that must be addressed. Four areas of primary concern including selection of the new technology, implementing it, the human resources implications, and ongoing maintenance. Information systems managers must …

  4. Getting Started in E-Commerce

    Posted on in Information Systems

    When building an e-commerce presence for an existing bricks and mortar retail business, two issues come to mind as needing immediate attention. The first issue isn't related to the technology of the website, but instead focuses on how the company is run. A typical company makes decisions using the strategic …

  5. IT in Corporate Strategy

    Posted on in IT Management

    The trend today is for increased information technology management in corporate strategies. This is a sign of the importance companies now place on the role of information technology in corporate success. Originally, information technology was seen as a way to save money. At first information technology was used to improve …

  6. Strategic Planning

    Posted on in IT Management

    Strategic planning is a subset of the strategic management process. Strategic management is a four-phase process. These phases are situation analysis, strategy formulation, strategy implementation, and strategy evaluation. The process is cyclical, and once the evaluation phase is complete, it is time to reanalyze the situation. Strategic planning specifically relates …

  7. Planning

    Posted on in IT Management

    Short-term planning is any planning whose horizon is within the next two years. Planning within this category is tactical or operational in nature. It is focused on responding to the immediate needs of the organization long-term, strategic planning. Common tasks that fall within this category include project management, budgets, and …

  8. Building Security Awareness

    Posted on in Information Systems

    Company X has decided to implement a new security plan. This plan includes changes to the information systems architecture and will impact the day-to-day work activities of many employees. Additionally, many operational procedures will be changed to reflect a more defensive security stance. It is not uncommon for organizations undergoing …

  9. The Benefits of Contingency Planning

    Posted on in Information Systems

    Organizations use contingency planning to ensure the quickest return of information services in the event of a service disruption. A service disruption can be any event that affects the continuity of information services and may range from a human orchestrated denial of service attack to a major earthquake. From a …

  10. Routers and Switches

    Posted on in Networking

    Although routers and switches are often located near each other in a network environment, the two devices offer very different functionality. Routers are network devices that send data packets to distinct network segments. A router examines incoming packets and makes routing decisions based on the destination address in the packet …

  11. Lotus Domino 6.5 - Start Agent Manager

    Posted on in System Administration

    Lotus Notes Logo You stopped Agent Manager on your Lotus Domino 6.5 server when you meant to tell it to restart? I've done that. If you don't know how to start it up again, finding that information can be pretty frustrating. Not to mention potentially embarrassing.

    To get the Agent Manager running …

  12. Security Breakdowns

    Posted on in Information Systems

    Even a network maintained by the most diligent security professionals will occasionally suffer from a security breakdown. A security breakdown is an incident that results in the opportunity for an information system to be compromised. The breakdown does not have to result in an actual compromise; the opportunity for compromise …

  13. BIP / BTOP Application Mapping Data Was Available

    Posted on in Information Systems

    American Recovery and Reinvestment Act (ARRA) LogoAlthough it is no longer working at the time of this writing, the Rural Utilities Service (RUS) had made a searchable database of applicant project proposals for the Broadband Initiatives Program (BIP) and the Broadband Technology Opportunities Program (BTOP) available on the USDA site. Unlike the database that is currently …

Slaptijack's Koding Kraken