IT Governance, Risk, and Compliance:

IT Configuration


July 10, 2012  11:51 PM

IT Hardware Redundancy Checks Using Parity Bits – Part I



Posted by: Robert Davis
Configuration Management, Hardware Controls, Information Communication Technology, Information Security, Infrastructure Management, Integrity, Internet, IT Configuration, IT Hardware, IT Security, Risk Management

When properly deployed, parity bits can be utilized to detect communication errors between IT hardware items and enable corrective measures. Specifically, redundancy checks are a method of inspecting for errors in IT processing. The application of

July 6, 2012  10:32 PM

IT Equipment Functionality and Integrity Checks – Part V



Posted by: Robert Davis
Configuration Management, Digital Storage Devices, Hardware Controls, Information Communication Technology, Information Security, Infrastructure Management, IT Configuration, IT Hardware, Risk Management

Automatic retry is employed in data communications by retransmission of erroneous messages. Retransmission is utilized in conjunction with an error-detection technology and can involve the retransmission of a character, word, record, or set of records. Verifying the adequacy of equipment...


July 4, 2012  1:01 AM

IT Equipment Functionality and Integrity Checks – Part IV



Posted by: Robert Davis
Configuration Management, Digital Storage Devices, Hardware Controls, Information Communication Technology, Information Security, Infrastructure Management, IT Configuration, IT Hardware, Risk Management

Automatic retry is also utilized with magnetic tape. Imperfections on the surface of the magnetic tape that interfere with reading or writing can be dislodged by back-spacing the tape and trying again. Whereas, disc drives utilize automatic retry to facilitate successful read/write operations....


June 29, 2012  8:34 PM

IT Equipment Functionality and Integrity Checks – Part III



Posted by: Robert Davis
Configuration Management, Digital Storage Devices, Hardware Controls, Information Communication Technology, Information Security, Infrastructure Management, IT Configuration, IT Hardware, Risk Management

Correspondingly, the CPU can monitor printer operations to ensure correct print synchronization. This entails the CPU checking print timing to ensure that the image is created when the print device is in the right position. Lastly, data communication facilities may have cybernetic line and...


March 8, 2011  8:41 PM

Managing the Growth and Impact of Virtual Machines and Memory – Part VIII



Posted by: Robert Davis
Availability, Demand Paging, Demand Segmentation, Hypervisor, IT Configuration, IT Service Delivery, Multiprocessing, Multiprogramming, Operating System, OS, Virtual Machine, Virtual Machine Monitor, Virtual Memory, VM, VMM

Given the proliferation of available hardware and software products that enable capitalizing on benefits associated with IT virtualization, when IT employees fail to perform effective configuration management; potential threats to the IT architecture are significantly increased. Besides managing...


March 4, 2011  6:42 PM

Managing the Growth and Impact of Virtual Machines and Memory – Part VII



Posted by: Robert Davis
Availability, Demand Paging, Demand Segmentation, Hypervisor, IT Configuration, IT Service Delivery, Multiprocessing, Multiprogramming, Operating System, OS, Virtual Machine, Virtual Machine Monitor, Virtual Memory, VM, VMM

As with any IT architecture item, to address the entity’s processing needs, virtual machines require execution of effective configuration management....


March 1, 2011  4:21 PM

Managing the Growth and Impact of Virtual Machines and Memory – Part VI



Posted by: Robert Davis
Availability, Demand Paging, Demand Segmentation, Hypervisor, IT Configuration, IT Service Delivery, Multiprocessing, Multiprogramming, Operating System, OS, Virtual Machine, Virtual Machine Monitor, Virtual Memory, VM, VMM

Though a process virtual machine can be considered an application-orientated system virtual machine; process virtual machine uniqueness resides in the provisioning of “a platform-independent programming environment...


February 25, 2011  5:47 PM

Managing the Growth and Impact of Virtual Machines and Memory – Part V



Posted by: Robert Davis
Availability, Demand Paging, Demand Segmentation, Hypervisor, IT Configuration, IT Service Delivery, Multiprocessing, Multiprogramming, Operating System, OS, Virtual Machine, Virtual Machine Monitor, Virtual Memory, VM, VMM

Derived from virtual memory concepts, virtual machines are a distinct IT configuration class. Under the virtual machine class, a ‘system virtual machine’ represents one physical unit subdivided so each of...


February 22, 2011  11:34 PM

Managing the Growth and Impact of Virtual Machines and Memory – Part IV



Posted by: Robert Davis
Availability, Demand Paging, Demand Segmentation, IT Configuration, IT Service Delivery, Multiprogramming, Operating System, OS, Virtual Memory, VM

Demand paging is a technique wherein computer memory is divided into fixed-length blocks. These fixed-length blocks, commonly referred to as pages, can be effectively exchanged or


February 18, 2011  9:11 PM

Managing the Growth and Impact of Virtual Machines and Memory – Part III



Posted by: Robert Davis
Availability, Demand Segmentation, IT Configuration, IT Service Delivery, Multiprogramming, Operating System, OS, Virtual Memory, VM

Virtual memory is typically implemented based on at least one of two principle techniques: demand segmentation and demand paging. Demand segmentation is a technique in which...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: