IT Governance, Risk, and Compliance:

CPU

1

September 22, 2012  12:07 AM

A Few Fundamentals of Networking Electronically Encoded Data – Part IV



Posted by: Robert Davis
Central Processing Unit, Configuration Management, CPU, ICT, Information Communication Technology, IT Architecture, IT Configuration, Multiplexor, Risk Management, Service Delivery, Token, Transport Mode, Tunnel Mode, Virtual Private Network

In TDM (typically utilized for digital signals) a device is given a specific time slot during which it can utilize a particular channel. In contrast, with FDM (typically utilized for analog signals) the channel is subdivided into sub-channels, each with a different frequency width that is assigned...

September 20, 2012  1:09 AM

A Few Fundamentals of Networking Electronically Encoded Data – Part III



Posted by: Robert Davis
Central Processing Unit, Configuration Management, CPU, ICT, Information Communication Technology, IT Architecture, IT Configuration, Multiplexor, Risk Management, Service Delivery, Token, Transport Mode, Tunnel Mode, Virtual Private Network

Packet assembly and disassembly between telecommunication links Input or output (I/O) channels are paths along which datum are transmitted to and from primary storage. These communication channels also handle the transfer of datum to and from I/O devices. As a result, this...


August 22, 2012  12:49 AM

IT Hardware Validity Checks – Part IV



Posted by: Robert Davis
Configuration Management, Control Methods, Control Processes, Control Techniques, CPU, Digital Storage Devices, EDI, Electronic Commerce, Electronic Data Interchange, Feedback Control, Firmware, Hardware Controls, Information Communication Technology, Information Security, Infrastructure, Integrity, IT Architecture, IT Configuration, IT Infrastructure, IT Security, Media Errors, Risk Management

Some IT configurations are capable of assigning whole sections of memory for prescribed operations, programs, and/or data. These assigned sections of memory can be protected by a hardware address validity check. This type of control is also known as


August 17, 2012  11:59 PM

IT Hardware Validity Checks – Part III



Posted by: Robert Davis
Configuration Management, Control Methods, Control Processes, Control Techniques, CPU, Digital Storage Devices, EDI, Electronic Commerce, Electronic Data Interchange, Feedback Control, Firmware, Hardware Controls, Information Communication Technology, Information Security, Infrastructure, Integrity, IT Architecture, IT Configuration, IT Infrastructure, IT Security, Media Errors, Risk Management

Validity checking of datum passed to peripheral devices A data validity check compares characters or fields that are written or read with a set of all valid characters or fields. It is particularly useful technique with peripheral devices such as printers. For example, a...


October 5, 2009  7:45 PM

Hardware Protection… Dust, Temperature, and Humidity – Oh My! – Part V



Posted by: Robert Davis
Air Flow, Availability, Boards, Cards, Care, Central Processing Unit, CPU, Delivery, Due Diligence, Humidity, Install-and-Forget, Media Errors, Monitoring, Plug-and-Play, Safeguarding, Temperature

Decreasing computer hardware replacement cost has not eliminated the need for adequate environmental protection. To avoid humidity corruption, information security managers should verify humidity and temperature levels are maintained within the...


October 1, 2009  11:22 PM

Hardware Protection… Dust, Temperature, and Humidity – Oh My! – Part IV



Posted by: Robert Davis
Air Flow, Availability, Boards, Cards, Care, Central Processing Unit, CPU, Delivery, Due Diligence, Humidity, Install-and-Forget, Media Errors, Monitoring, Plug-and-Play, Safeguarding, Temperature

IT can, and does, operate within a wide humidity range. Seasonal humidity changes are usually easier to control than hourly fluctuations. Under either circumstance, normally the primary environmental concern is preventing conditions that permit humidity alterations where condensation is the...


September 28, 2009  6:11 PM

Hardware Protection… Dust, Temperature, and Humidity – Oh My! – Part III



Posted by: Robert Davis
Air Flow, Availability, Boards, Cards, Care, Central Processing Unit, CPU, Delivery, Due Diligence, Humidity, Install-and-Forget, Media Errors, Monitoring, Plug-and-Play, Safeguarding, Temperature

When the relative humidity is high, water particulates are formed corresponding to the heat index. High humidity can warp hardware configuration cards. In addition, without adequate insulation, any conditions that cause...


September 24, 2009  7:03 PM

Hardware Protection… Dust, Temperature, and Humidity – Oh My! – Part II



Posted by: Robert Davis
Air Flow, Availability, Boards, Care, Central Processing Unit, CPU, Delivery, Due Diligence, Humidity, Install-and-Forget, Media Errors, Monitoring, Plug-and-Play, Safeguarding, Temperature

Climatically, strategizing optimum environmental conditions for information assets is a managerial safeguarding responsibility....


1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: