• Cloud computing threats in healthcare

    What are the cloud computing threats in the healthcare industry?

    Abdullah915 pointsBadges:
  • About acceptable use policy

    What is the reference of an acceptable use policy?

    Leahmae5 pointsBadges:
  • Outsourcing details on chip companies

    Where can I get the details about R&D spend, outsource spending, etc by Intel and other chip companies?

    Ravindrakulk5 pointsBadges:
  • Software Quality Assurance Test by IKM

    Does anybody have sample questions from the Software Quality Assurance test by International Knowledge Management?

    Arunkumarprakash5 pointsBadges:
  • Platform for Web services

    Hi community, I need to deploy a cloud service that will deliver web services to small and medium sized enterprises in my country. These web services will have e-commerce capabilities and will provide SMEs with web presence, e-commerce abilities and online advertising/marketing. I don't know what...

    badeola5 pointsBadges:
  • Draft SLA regarding question

    Hi there, I'm a student and I have task to do like write the draft SLA for support for teaching technology of a university and have some sections to do. I don't know where to start. What should I do?

    vasimmeman5 pointsBadges:
  • Obtain certification for a healthcare based call center

    I am looking to obtain certification for a healthcare based call center. I've reviewed the proposal of COPC and SQS en 1583 but have yet to come to a conclusion. Does anyone have any prior experience with call center certifications or suggestions?

    KRiley15 pointsBadges:
  • Small network patching for SMBs

    I am looking for a Patching tool for small home based, and small business based networks with no servers. I used Retina, BigFix, SCCM and others in my last job, but I am doing some consulting for a small startup, and need a small scale solution. Would be optimal if I could access remotely, so as to...

    SgtGus135 pointsBadges:
  • CIO Leadership

    Seeking Renaissance CIO article by Jim Spitze and Judith Lee. Also the article summarizing it by Linda Tucci January 2013/discussion

    HenryN15 pointsBadges:
  • Accept Security Policy at Domain Login

    We need to set up a message for users to accept when logging in their domain account. I know an Interactive login can be defined on win2003 to display title and text. We need to display the message once for users to accept and login and it is logged that the user accepted the policy and if they...

    Maryam82100 pointsBadges:
  • Experience of negotiating SLAs

    Does anyone have relevant experience of comparing / negotiating SLAs between the major cloud providers like BT, Interoute etc. Have you written an RFP and learned some hard lessons?

    DonKing10 pointsBadges:
  • Companies adopting ITIL

    Hello, I am currently doing a dissertation on ITSM and ITIL and I was wondering if you would know where I can find genuine stats on how many companies have adopted ITIL?

    sfish135 pointsBadges:
  • AS/400 MAPICS

    For MAPICS sitting on an AS/400 box, is access fully restricted at the AS/400 level or can it be fine tuned at the application level as well?

    pbishop356315 pointsBadges:
  • Where should I pursue my IT career?

    I have a bachelors degree in accounting. I am currently working as a IT Healthcare consultant. I'm certified in Epic Resolute Hospital Billing. I would like to transition back into the accounting field, but somehow utilize my IT skills as well. I'm not sure which area of accounting to pursue where...

    frang404525 pointsBadges:
  • Balance between the cost of information systems and their necessity for organizational survival

    How can a balance be struck between the cost of information systems and their necessity for organizational survival?

    Jackie25 pointsBadges:
  • Recommended approach to telephony

    When you have a split model of calls in house and call with an outsourcer, what would be the recommended approach to the telephony. Would the best be to have the outsource agents log into your switch or send the calls from your switch to theirs? Is there a preferred model and if so why?

    julyahill5 pointsBadges:
  • What are the emerging trends in information technology?

    What are some of the emerging trends in information technology this year?

    msgwright5 pointsBadges:
  • Nonfunctional requirements only at the system level?

    In one of his posts on this website, Mr. Goldsmith says the following about nonfunctional requirements: "Most nonfunctional requirements are real business requirements that exist within the business situation and must be met by any product, system or software". In this sense, isn't it wrong to say...

    FrankKorsperts5 pointsBadges:
  • How to get a CISSP certification

    How do I get CISSP foundation level certification and how best I can prepare for this exam. Appreciate your help. Regards, Nagesh

    nageswar25 pointsBadges:
  • Trends for 2015 – IT Enterprise System Management?

    What are the trends for 2015 and the coming years regarding IT Enterprise System Management (Event Monitoring)?

    robdegraaf10 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.

Following