background preloader

10 principles of effective information management

Written by James Robertson, published November 1st, 2005 Categorised under: articles, information management Improving information management practices is a key focus for many organisations, across both the public and private sectors. This is being driven by a range of factors, including a need to improve the efficiency of business processes, the demands of compliance regulations and the desire to deliver new services. In many cases, ‘information management’ has meant deploying new technology solutions, such as content or document management systems, data warehousing or portal applications. These projects have a poor track record of success, and most organisations are still struggling to deliver an integrated information management environment. Effective information management is not easy. This article draws together a number of ‘critical success factors’ for information management projects. From the outset, it must be emphasised that this is not an article about technology. Ten principles Related:  ITIL and Infosec Best Practices

What is proof of concept (POC)? - Definition from Proof of concept (POC) is documented evidence that a potential product or service can be successful. By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA. You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy. Developing a proof of concept can help a product owner to identify potential technical and logistical issues that might interfere with success. A proof of concept plan should address how the proposed product or service will support business goals. In some corporate cultures, proof of concept may be referred to as proof of principle.

4 Keys To A Data Security Strategy Organizations must prepare for the inevitable security breach and focus on protecting sensitive corporate data. Here are some ideas to build on. If you’re an IT pro, protecting your company’s security may have recently become part of your job description. This probably didn’t come as a surprise -- more than 40% of companies suffered a breach last year, according to the Ponemon Institute. Maintaining a secure environment is no longer a question of locking down the perimeter or eliminating the chance of an attack. While you need to continue to focus on keeping out the bad guys, organizations need to acknowledge the reality that it’s not always possible and develop a plan B when the fail-safe fails. 1. At the highest level, companies are finally starting to get away from the head-in-the-sand approach to data security. 2. Many IT departments admit they don’t know what they don’t know when it comes to their data. Human error is going to happen, and breaches will continue to be prevalent. 3.

Device Drivers and Deployment Overview Updated: May 6, 2014 Applies To: Windows 8, Windows 8.1, Windows Server 2008 R2, Windows Server 2012, Windows Server 2012 R2 You can add device drivers to a Windows image before, during, or after you deploy the image. When planning how to add drivers to your Windows deployment, it's important to understand how driver folders are added to the image, how driver ranking affects deployment, and the digital signature requirements for drivers. In this topic: You can add device drivers to a Windows image: For more information, see Understanding Servicing Strategies. Offline servicing occurs when you modify a Windows image entirely offline without booting the operating system. When you add a driver to an offline image, it's either staged or reflected in the image: Boot-critical drivers are reflected. You can use DISM commands to add or remove drivers on a mounted or applied Windows or Windows Preinstallation Environment (Windows PE) image. Using PnPUtil to add or remove PnP drivers. See Also

WDK and WinDbg downloads - Windows Hardware Dev Center Get the WDK and other kits and tools for Windows 10 Get the latest kits and tools for Windows 10 hardware development, including Visual Studio Community 2015 and Windows Driver Kit (WDK) 10. This release of Visual Studio includes the Visual Studio Tools for Windows 10 and the Windows SDK for Windows 10. Visual Studio 2013 Start by downloading Visual Studio 2013. Driver samples Code samples are valuable guides whether you're writing your first driver or updating an older one. WDK 8.1 Update (for Windows 8.1, 8, and 7 drivers) Download the Windows Driver Kit (WDK) 8.1 Update, which has tools to build, test, debug, and deploy drivers for Windows 8.1 Update, Windows 8.1, Windows 8, and Windows 7. Important: Before installing WDK 8.1 Update, you need to install Visual Studio 2013. We provide Windows Driver Kit (WDK) 8 to give you time to migrate to WDK 8.1 Update and Visual Studio 2013. WDK 7.1.0 (for Windows XP drivers) Developing a driver for Windows XP or Windows Server 2003?

syswow64 blog: Windows 7 Offline files will not go Online when connected to network Issue Several laptop users move between networks, domain, home, etc and when they attempt to access DFS shares explorer status is working offline. The issue only resolves it self after a reboot. Connecting directly to the share works and i am able to ping network resources. This behavior occurs for VPN users as well. Possible Causes "slow-link mode". On client computers running Windows 7 or Windows Server 2008 R2, a shared folder automatically transitions to the slow-link mode if the round-trip latency of the network is greater than 80 milliseconds, or as configured by the "Configure slow-link mode" policy. If you do not configure the "Configure slow-link mode" policy setting, computers running Windows Vista or Windows Server 2008 will not transition a shared folder to the slow-link mode. *Configure slow-link mode *Configure slow-link speed Option 2 Configure Forced silent auto reconnection 1. 2. 3. 4. 5. 6. Also, see the "Non-default server disconnect actions" setting.

Windows Performance - Hardware Compat, Device, Driver | TechNet Find resources and tools to help you install and manage devices, troubleshoot hardware compatibility issues, and monitor and improve performance in your Windows client environment. Springboard Series Spotlight Consumerization of IT: Frequently Asked QuestionsGet answers to common questions about the growing consumerization trend and get recommendations on how to approach the management of user-selected devices, applications, and services within your desktop environment. Watch Demonstrations and Tutorials View more demonstrations and tutorials > Troubleshoot an Issue Not an IT professional?

Group Policy for Beginners If you are an IT pro who has never used Group Policy to control computer configurations, this white paper is for you. Group Policy is the essential way that most organizations enforce settings on their computers. It is flexible enough for even the most complex scenarios; however, the essential features are easy to use in simple scenarios, which are more common. This white paper is an introduction to Group Policy. For a downloadable version of this document, see Group Policy for Beginners in the Microsoft Download Center. Group Policy is simply the easiest way to reach out and configure computer and user settings on networks based on Active Directory Domain Services (AD DS). The requirements for using Group Policy and following the instructions that this white paper provides are straightforward: The network must be based on AD DS (that is, at least one server must have the AD DS role installed). Windows 7 enforces the policy settings that you define by using Group Policy. Figure 1.

10 Habits IT Administrators Should Avoid Most experienced system administrators have inherited an IT infrastructure at least once and have been unsatisfied with the work of a predecessor. The complete revision of the entire infrastructure is a painful and costly process, but may be inevitable to reclaim control, minimize the risk of system downtime, check and update internal workflows or even get rid of processes that might increase the risks of security violations. Even experienced professionals can fall into bad habits that affect performance and put the IT infrastructure at risk. So, it’s important to acknowledge these bad habits to avoid them. Failing to keep and review documentation. This is a classic bad habit because no one enjoys documenting. Sticking to old defence methods. There’s no solution to guarantee protection against a sophisticated targeted attack but your current security strategy should reflect your needs and capabilities. Forgetting to document changes. Doing everything manually. Failing to make backups.