IT Governance, Risk, and Compliance:

IT Configuration


September 22, 2012  12:07 AM

A Few Fundamentals of Networking Electronically Encoded Data – Part IV



Posted by: Robert Davis
Central Processing Unit, Configuration Management, CPU, ICT, Information Communication Technology, IT Architecture, IT Configuration, Multiplexor, Risk Management, Service Delivery, Token, Transport Mode, Tunnel Mode, Virtual Private Network

In TDM (typically utilized for digital signals) a device is given a specific time slot during which it can utilize a particular channel. In contrast, with FDM (typically utilized for analog signals) the channel is subdivided into sub-channels, each with a different frequency width that is assigned...

September 20, 2012  1:09 AM

A Few Fundamentals of Networking Electronically Encoded Data – Part III



Posted by: Robert Davis
Central Processing Unit, Configuration Management, CPU, ICT, Information Communication Technology, IT Architecture, IT Configuration, Multiplexor, Risk Management, Service Delivery, Token, Transport Mode, Tunnel Mode, Virtual Private Network

Packet assembly and disassembly between telecommunication links Input or output (I/O) channels are paths along which datum are transmitted to and from primary storage. These communication channels also handle the transfer of datum to and from I/O devices. As a result, this...


September 15, 2012  12:24 AM

A Few Fundamentals of Networking Electronically Encoded Data – Part II



Posted by: Robert Davis
Configuration Management, ICT, Information Communication Technology, IT Architecture, IT Configuration, IT Infrastructure, IT Service Delivery, Multiplexor, Risk Management, Service Delivery, Token, Transport Mode, Tunnel Mode, Virtual Private Network

All of the computers and other hardware connected to a particular network must follow the same rules or operations commonly called protocols. Operational rules are typically divided up into layers so a programmer or network administrator need only be concerned with the layer with which the...


September 13, 2012  12:42 AM

A Few Fundamentals of Networking Electronically Encoded Data – Part I



Posted by: Robert Davis
ICT, Information Communication Technology, IT Architecture, IT Configuration, IT Infrastructure, IT Service Delivery, Multiplexor, Risk Management, Service Delivery, Token, Tunnel Mode, Virtual Private Network

Any distributed IT infrastructure requires a complex set of communication functions for proper operation. Many of these functions, such as reliability mechanisms, are common across IT architectures. Thus, the communication task is generally viewed as consisting of a modular architecture, in which...


September 8, 2012  12:14 AM

Data Communications Risk in Distributed Computing – Part V



Posted by: Robert Davis
Capacity Management, Configuration Management, Distributed Platforms, Information Communication Technology, Infrastructure, Infrastructure Management, IT Architecture, IT Configuration, IT Infrastructure, IT Security, IT Support, Management Information Systems, Message Integrity, Risk Management, Service Delivery and Support

Reducing data communication error risk for teleprocessing systems Teleprocessing is the handling of data through a communications channel, such as...


September 5, 2012  7:56 PM

Data Communications Risk in Distributed Computing – Part IV



Posted by: Robert Davis
Capacity Management, Configuration Management, Distributed Platforms, Information Communication Technology, Infrastructure, Infrastructure Management, IT Architecture, IT Configuration, IT Infrastructure, IT Support, Management Information Systems, Message Integrity, Risk Management, Service Delivery and Support

Signal fading is a decline in transmission strength. Fading can occur when a signal is transmitted by microwaves. Under certain conditions, the signal picked up by the receiving unit can be quite weak. A weak signal is more susceptible to transmission noise and error. Signal...


August 31, 2012  11:31 PM

Data Communications Risk in Distributed Computing – Part III



Posted by: Robert Davis
Capacity Management, Configuration Management, Distributed Platforms, Information Communication Technology, Infrastructure, Infrastructure Management, IT Architecture, IT Configuration, IT Infrastructure, IT Support, Management Information Systems, Message Integrity, Risk Management, Service Delivery and Support

The electrical signal may be changed by mechanical component failure of the communications network, or by a problem related to the characteristics of data communications. Of these two error sources, the characteristics of data communications are by far more important. Root causes of most...


August 29, 2012  2:00 PM

Data Communications Risk in Distributed Computing – Part II



Posted by: Robert Davis
Capacity Management, Configuration Management, Distributed Platforms, Information Communication Technology, Infrastructure, Infrastructure Management, IT Architecture, IT Configuration, IT Infrastructure, IT Support, Management Information Systems, Message Integrity, Risk Management, Service Delivery and Support

A common type of data communications risk According to Christopher E. Strangio, the distance over which data moves within IT can vary from a few thousandths of an inch, as is the case within a single integrated circuit (IC) chip, to several feet along the main circuit board’s...


August 25, 2012  12:09 AM

Data Communications Risk in Distributed Computing – Part I



Posted by: Robert Davis
Capacity Management, Configuration Management, Distributed Platforms, Information Communication Technology, Infrastructure, Infrastructure Management, IT Architecture, IT Configuration, IT Infrastructure, IT Support, Management Information Systems, Message Integrity, Risk Management, Service Delivery and Support

As the distance between the message source and designated destination increases, accurate transmission becomes increasingly more risky. Data communication systems are designed with transmission speed and capacity to meet the timeliness and volume needs of defined users. Nonetheless, data...


August 22, 2012  12:49 AM

IT Hardware Validity Checks – Part IV



Posted by: Robert Davis
Configuration Management, Control Methods, Control Processes, Control Techniques, CPU, Digital Storage Devices, EDI, Electronic Commerce, Electronic Data Interchange, Feedback Control, Firmware, Hardware Controls, Information Communication Technology, Information Security, Infrastructure, Integrity, IT Architecture, IT Configuration, IT Infrastructure, IT Security, Media Errors, Risk Management

Some IT configurations are capable of assigning whole sections of memory for prescribed operations, programs, and/or data. These assigned sections of memory can be protected by a hardware address validity check. This type of control is also known as


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: