Article Library

From February 2010, Tom will be submitting longer articles and reports for publication at Ezine Articles.  A condensed version of each article will still be posted on this blog, but you will find an index of published articles on this page, with a short synopsis and a link for each.

Identity and Access Management

From Account Management to User Provisioning to Identity Management

An examination of the history of user provisioning systems, from the launch of RACF in response to the GUIDE requirements for Security and Data Management in 1974, through to the current spate of consolidation amongst the vendors.

Business Continuity

Business Continuity Planning – Assessing the Risks of Unexpected Key Staff Absence

Every business is dependent upon a number of key staff. These staff make a vital contribution to the business, through their unique skills, knowledge or relationships. Recent events, ranging from the predicted Swine Flu pandemic to the closure of Northern European airspace after the Icelandic volcanic eruption, have highlighted the possibility that those key staff might suddenly become unavailable, or at least unable to get to their normal place of work. This article highlights a range of technology-based solutions that, if deployed before an incident can mitigate the disruption to the business.

Business Continuity Planning – How Technology Helps You Cope With Unexpected Key Staff Absence

Every business is dependent upon a number of key staff. These staff make a vital contribution to the business, through their unique skills, knowledge or relationships. Recent events, ranging from the preedicted Swine Flu pandemic to the closure of Northern European airspace after the Icelandic volcanic eruption, have highlighted the possibility that those key staff might suddenly become unavailable, or at least unable to get to their normal place of work. This article highlights a range of technology-based solutions that, if deployed before an incident can mitigate the disruption to the business.

Cyber Security

There are no articles published yet on this topic.  Please check back regularly or click here to subscribe using RSS.

Risk and Governance in IAM Programmes

Managing Risk and Governance in Large Scale IT Infrastructure Programmes

Current trading conditions dictate that every effort must made to deliver programmes and projects on time and under budget. It is important that much effort is invested up front to get things right first time round. This article proposes four simple guiding principles, which distinguish the delivery of a successful enterprise project from one that needs eventual rescue.

Reblog this post [with Zemanta]

1 Comment »

RSS feed for comments on this post. TrackBack URI

  1. […] Article Library […]


Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

Create a free website or blog at WordPress.com.
Entries and comments feeds.

%d bloggers like this: