IT Manager's Handbook: Getting Your New Job Done (82 page)

Read IT Manager's Handbook: Getting Your New Job Done Online

Authors: Bill Holtsnider,Brian D. Jaffe

Tags: #Business & Economics, #Information Management, #Computers, #Information Technology, #Enterprise Applications, #General, #Databases, #Networking

BOOK: IT Manager's Handbook: Getting Your New Job Done
8.39Mb size Format: txt, pdf, ePub
International Organization for Standards,
240–241
Internet
application assessment,
251
candidate interviews,
91–92
capital expenditures,
167–168
chargebacks,
164
cloud computing,
148–149
connection as capital expense,
167–168
disaster recovery,
248
,
253
firewalls,
220
handheld hardware,
297
IDS/IPS,
220–221
IT acceptance,
301
job searching,
84
LAN,
192
f
phishing,
225
project management tools,
118
recruiter business model,
81
reference checks,
98
remote interviews,
91–92
security and compliance,
205
SLAs,
284
two-factor authentication,
219
VoIP,
See
Voice over IP (VOIP)
WAN,
190
,
191
f
Internet Service Provider (ISP),
113–114
,
163
Interoperability,
177
,
179
Interviews
candidate selection,
84
guidelines,
86
multiple interviewers,
88–89
non-technical questions,
87–88
off-limits questions,
88
question preparation,
87–88
remote,
91–92
technical,
89–93
Intranet
as proactive solution,
269
user-downloadable software,
143
uses,
294–295
Introductory meetings, first 100 days,
24–25
Intrusion Detection System (IDS),
220–221
Intrusion Prevention System (IPS),
220–221
Invoicing, cloud computing,
151
iOS,
137
,
138
,
296
iPad,
137
iPhone,
10
,
137
,
271
,
272
IPS,
See
Intrusion Prevention System (IPS)
ISO 9000,
240
ISO 17799,
223
ISO 270001,
223
ISP,
See
Internet Service Provider (ISP)
IT Department basics
Application Development,
9
BYO policies,
273
central role,
12
CEO role,
9
b
consumerization of IT,
271–273
goals,
10
merger issues,
27–28
team members,
11
Technical Operations,
9
view of users,
264
IT facilities, disaster recovery,
254–256
IT Governance Institute,
239
IT Infrastructure Library (ITIL),
240
IT Manager role
basic issues,
1
connectivity issues,
298–302
first 100 days,
20–27
IT Department merger issues,
27–28
IT Department strategic value,
8–10
job benefits,
2
job drawbacks,
2–3
job pros/cons,
5
leadership
vs.
management,
13
,
13
t
management basics,
3–8
manager’s value,
10
new job basics,
14–20
responsibilities,
2–3
IT standards
flexibility,
270
technology products,
201
IT strategy development
basic considerations,
10–12
customer needs,
12
IT Department’s central role,
12
team members,
11
technology value,
11–12
iWork, productivity tools,
136

J

JBoss (Red Hat), enterprise applications,
136
Job criteria, candidate selection,
93–94
Job Description (JD),
See
Position Description (PD)
Job fairs, PD advertising,
79
Job postings,
294–295
,
See also
Advertising options, PD
Job requirements, performance reviews,
45
Jobs, Steve,
35
,
95
,
287
Jobster.com,
77
Jokes, e-mail management,
153–154
Junk mail, management,
153–154

K

Katzenberg, Jeffrey,
107
Key loggers,
224
Keys, security defenses,
222
Kick-off meeting
goals,
116–117
with non-IT departments,
133
project launch,
116–117
Kluster.com,
289
,
298–299
Knowledge base, Help Desk,
279
KOffice, productivity tools,
136

L

L262/2005 (Italy),
228
Labor cost management,
180
LAN,
See
Local Area Network (LAN)
LANDesk,
143
,
280
Language skills
outsourcing agreements,
185
performance reviews,
52
web-based interviews,
92
Laptop devices, consumerization of IT,
272
Lawson, ERP,
157
Layoffs
alternatives,
57
b
employee performance,
55–57
Leach, Jim,
231
Leadership
behind-schedule projects,
125
connectivity tool issues,
298–299
vs.
management,
13
t
tough economic times,
181
Lease
vs.
buy decision
basic considerations,
168–170
operating
vs.
capital lease,
169
person deciding,
170
pros and cons,
169
,
169
t
Legacy applications, VM uses,
140
Legal Department
budget approval,
166
BYO policies,
273
connectivity technologies,
298
consultants
vs.
employees,
71
control mechanisms,
237
disaster recovery,
248
,
250
disciplinary problems,
54
,
55
electronic discovery,
242
e-mail archiving,
155
e-mail harassment,
154
evidence maintenance,
238
full-time
vs.
consultants,
70–71
information/records retention,
242
interview questions,
88
IT manager duties,
2
negative reviews,
50
ongoing security maintenance,
221
outsourcing,
186
“people to know,”,
24
policies and procedures,
243
policy documentation,
235
security incident response,
223
software licensing,
145
,
147
stakeholder identification,
109
teleworkers,
38
user identification,
264
vendor contracts,
176
Legitimate purpose principle, Data Protection Directive,
234
Letterman, Rob,
107
Liability issues
BYO policies,
273
cloud computing,
151
managing during tough times,
68
vendor contracts,
175
Licensing,
See
Software licensing
Live Messenger,
91
LinkedIn,
302
Linux,
136
,
138
Listening, team management,
33
Live Meeting,
180
Local Area Network (LAN)
carrier connections,
191–192
example schematic,
192
f
securing users,
213
technical environment,
191
Locking down, desktop,
143
,
144

Other books

Time's Long Ruin by Stephen Orr
Harmony by Mynx, Sienna
Attempting Elizabeth by Grey, Jessica
The Beneath by S. C. Ransom
Fated by Indra Vaughn
Nip 'N' Tuck by Kathy Lette
Joyce's War by Joyce Ffoulkes Parry
Insurgent by Veronica Roth