IT Governance, Risk, and Compliance:

February, 2011

1

February 25, 2011  5:47 PM

Managing the Growth and Impact of Virtual Machines and Memory – Part V

Robert Davis Robert Davis Profile: Robert Davis

Derived from virtual memory concepts, virtual machines are a distinct IT configuration class. Under the virtual machine class, a ‘system virtual machine’ represents one physical unit subdivided so each of...

February 22, 2011  11:34 PM

Managing the Growth and Impact of Virtual Machines and Memory – Part IV

Robert Davis Robert Davis Profile: Robert Davis

Demand paging is a technique wherein computer memory is divided into fixed-length blocks. These fixed-length blocks, commonly referred to as pages, can be effectively exchanged or


February 18, 2011  9:11 PM

Managing the Growth and Impact of Virtual Machines and Memory – Part III

Robert Davis Robert Davis Profile: Robert Davis

Virtual memory is typically implemented based on at least one of two principle techniques: demand segmentation and demand paging. Demand segmentation is a technique in which...


February 15, 2011  10:06 PM

Managing the Growth and Impact of Virtual Machines and Memory – Part II

Robert Davis Robert Davis Profile: Robert Davis

IT virtualization services are derived from the application of virtual memory deployment conventions. In layperson terms, virtual memory exists when the operating system separates end-user logical addressable space from physical...


February 12, 2011  12:46 AM

Managing the Growth and Impact of Virtual Machines and Memory – Part I

Robert Davis Robert Davis Profile: Robert Davis

IT virtualization represents the creation of a seemly boundless version of an IT resource to the end-user. Historically, once a suitable means of multiprogramming was discovered for processing datum, efforts to expand...


February 8, 2011  9:21 PM

Governing IT: Setting Control Objectives – Part VIII

Robert Davis Robert Davis Profile: Robert Davis

IT goals election as well as information systems design, implementation, and maintenance are bound by IT objectives. Performing an IT maturity assessment can assist in determining where improvements are most needed. Subsequently, IT control objectives selection conveys what is considered...


February 4, 2011  11:07 PM

Governing IT: Setting Control Objectives – Part VII

Robert Davis Robert Davis Profile: Robert Davis

“An [entity's] Management Information System...


February 1, 2011  9:04 PM

Governing IT: Setting Control Objectives – Part VI

Robert Davis Robert Davis Profile: Robert Davis

Reflective of ensuring effective IT control objectives, undertaking IT risk management provides the framework that enables future activity to take place in a consistent and controlled manner. ...


1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: