IT Governance, Risk, and Compliance:

Information Technology Service Management


November 17, 2012  1:58 AM

A Few Fundamental Features of IPv6 Internetworking – Part VI



Posted by: Robert Davis
Authentication, Availability Management, Cloud Computing, Configuration Management, Encapsulating Security Payload, ICT, Information and Communication Technology, Information Technology Service Management, Infrastructure Management, Internet Protocol Security, IPSec, IT Hardware, IT Security, Multiprocessing, Public Key Infrastructure, Service Delivery, Transport Mode, Tunnel Mode

Why understanding IPv6 is important to end-users Currently, the dominant internetworking protocol is Internet Protocol version 4 (IPv4). Yet, each IPv4 address is limited to a thirty-two bit field length, which corresponds...

November 15, 2012  2:54 AM

A Few Fundamental Features of IPv6 Internetworking – Part V



Posted by: Robert Davis
Authentication, Availability Management, Cloud Computing, Configuration Management, Encapsulating Security Payload, ICT, Information and Communication Technology, Information Technology Service Management, Infrastructure Management, Internet Protocol Security, IPSec, IT Hardware, IT Security, Multiprocessing, Public Key Infrastructure, Service Delivery, Transport Mode, Tunnel Mode

Bookmark and Share     0 Comments     RSS Feed     Email a friend


November 10, 2012  2:40 AM

A Few Fundamental Features of IPv6 Internetworking – Part IV



Posted by: Robert Davis
Authentication, Availability Management, Cloud Computing, Configuration Management, Encapsulating Security Payload, ICT, Information and Communication Technology, Information Technology Service Management, Infrastructure Management, Internet Protocol Security, IPSec, IT Hardware, IT Security, Multiprocessing, Service Delivery

Upon arrival at the destination, the original internetworking message is reassembled in the correct order, based on the imprinted packet sequence number. Thus a virtual connection is established with the end-station through a

Bookmark and Share     0 Comments     RSS Feed     Email a friend


November 8, 2012  1:20 AM

A Few Fundamental Features of IPv6 Internetworking – Part III



Posted by: Robert Davis
Authentication, Availability Management, Cloud Computing, Configuration Management, Encapsulating Security Payload, ICT, Information and Communication Technology, Information Technology Service Management, Infrastructure Management, Internet, Internet Governance, Internet Protocol Security, IPSec, IT Hardware, IT Security, Multiprocessing, Service Delivery

Bookmark and Share     0 Comments     RSS Feed     Email a friend


November 2, 2012  11:13 PM

A Few Fundamental Features of IPv6 Internetworking – Part II



Posted by: Robert Davis
Authentication, Availability Management, Cloud Computing, Configuration Management, Encapsulating Security Payload, ICT, Information and Communication Technology, Information Technology Service Management, Infrastructure Management, Internet, Internet Governance, Internet Protocol Security, IPSec, IT Hardware, IT Security, Multiprocessing, Service Delivery

Packet-switched networking model As presented in the article A Few Fundamentals of Networking Electronically Encoded Data, data must be organized for transmission. Thus, the creation of usable telecommunication packets requires appending a unique header to the message destined...


November 1, 2012  3:28 AM

A Few Fundamental Features of IPv6 Internetworking – Part I



Posted by: Robert Davis
Authentication, Availability Management, Cloud Computing, Configuration, Encapsulating Security Payload, ICT, Information and Communication Technology, Information Technology Service Management, Infrastructure Management, Internet, Internet Governance, Internet Protocol Security, IPSec, IT Architecture, IT Hardware, IT Security, Multiprocessing, Service Delivery

The Internet is a worldwide system of computer networks in which users at any one computer can, if they have permission, get information from any other connected computer. Internet protocols are a support structure for...


July 26, 2011  8:04 PM

Business Continuity and IT Availability – Part VIII



Posted by: Robert Davis
Backup, BCM, BCP, Business Continuity, Crisis Management, Disaster Recovery, DRP, Information Security Governance, Information Security Service Management, Information Technology Service Management, ISG, ISSM, ITSM, Service Delivery, Service Disruption, Threat Management

Directly, an entity’s DRP has a significant affect on the viability of IT and information security governance programs. Indirectly, IT and information security governance programs may impact stakeholder assessed entity value. Regardless of organizational formation -- corporation, partnership,...


July 22, 2011  5:35 PM

Business Continuity and IT Availability – Part VII



Posted by: Robert Davis
Backup, BCM, BCP, Business Continuity, Crisis Management, Disaster Recovery, DRP, Information Security Governance, Information Security Service Management, Information Technology Service Management, ISG, ISSM, ITSM, Service Delivery, Service Disruption, Threat Management

Through establishment and deployment of an emergency management program, top-level personnel can send a clear message to everyone in the entity that business continuity and disaster recovery control...


July 19, 2011  8:04 PM

Business Continuity and IT Availability – Part VI



Posted by: Robert Davis
Backup, BCM, BCP, Business Continuity, Crisis Management, Disaster Recovery, DRP, Information Security Governance, Information Security Service Management, Information Technology Service Management, ISG, ISSM, ITSM, Service Delivery, Service Disruption, Threat Management

Considering the interconnectivity of national economies through computer networks, entities are more vulnerable than ever to the possibility of technical difficulties disrupting business at any point in the communication chain. From flood or fire to computer-virus or denial-of-service, disasters...


July 15, 2011  2:44 AM

Business Continuity and IT Availability – Part V



Posted by: Robert Davis
Backup, BCM, BCP, Business Continuity, Crisis Management, Disaster Recovery, DRP, Information Security Governance, Information Security Service Management, Information Technology Service Management, ISG, ISSM, ITSM, Service Delivery, Service Disruption, Threat Management

Managerial concerns normally include: excessive business costs, forgone business opportunities, and potential revenue losses. When a business interruption occurs, restored information assets may affect operational effectiveness and efficiency. ...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: