3.10+IT+systems+in+organizations

=** STRAND 3: IT systems > IT systems in organizations **= //[]// ||
 * [[image:itsystems.jpg align="center"]] || media type="youtube" key="pQHX-SjgQvQ" height="377" width="504" ||
 * [|http://www.thecommunicationsgroup.com/itsystems.asp#diag_itsystems] || **Humour: Medieval Help Desk with English subtitles**

'Only the Best' Links
It also explains the benefits of implementing computer networks in the workplace. || Strand 1: Security, Policies, Standards and protocols  Strand 2: Business and employment  Strand 3: Hardware, Software, Networks, Internet, Personal and public communications, Introduction to project management  HL Extension: IT systems in organizations ||  Strand 3: Hardware, Software, Networks, Internet, Personal and public communications, Introduction to project management  HL Extension: IT systems in organizations ||  Strand 3: Hardware, Software, Networks, Internet, Introduction to project management  HL Extension: IT systems in organizations || Workplace Privacy and Employee Monitoring fact sheet: - Telephone Monitoring - Computer Monitoring - Electronic Mail and Voice Mail - Video Monitoring - Workplace Privacy Protection || Strand 1: Security, Policies, Standards and protocols  Strand 3: Hardware, Software, Networks, Internet  HL Extension: IT systems in organizations ||  HL Extension: IT systems in organizations ||  HL Extension: IT systems in organizations ||  Strand 3: Hardware, Software, Networks, Introduction to project management ||
 * **Link** || **Description** || **Links to Other Strands** ||
 * How to set up your small business computer network || A brief guide that explains step by step how to setup a small business network.
 * How to Set Up Your Business Network to Connect From Home || A detailed explanation about how VPN can be setup to allow access to work files from home. || <span style="font-family: Calibri,sans-serif; font-size: 15px; line-height: 17px;">Strand 1: Security, Policies, Standards and protocols
 * 10 tips to secure your small business network || Clear and detailed step by step guide to secure networks in organizations using SSID, encryption, firewalls, DMZs, etc. || <span style="font-family: Calibri,sans-serif; font-size: 15px; line-height: 17px;">Strand 1: Security, Policies, Standards and protocols
 * Workplace Privacy and Employee Monitoring || The Workplace Privacy Clearinghouse:
 * Workplace policies and procedures || Guidelines for developing and introducing workplace policies set by the New South Wales Department of Commerce. || <span style="font-family: Calibri,sans-serif; font-size: 15px; line-height: 17px;">Strand 1: Security, Policies, Standards and protocols
 * <span style="font-family: Calibri,sans-serif; font-size: 15px; line-height: 17px;">Computer Use Policy Form of the National Energy Research Scientific Computing Center || All NERSC employees and computer users must sign this form before they can use computer resources. Investigators are responsible for implementing these policies to ensure that users fulfill their responsibilities. || <span style="font-family: Calibri,sans-serif; font-size: 15px; line-height: 17px;">Strand 1: Security, Policies, Standards and protocols
 * System Development Life Cycle (SDLC) || [[image:SDLC-DOJ.gif width="399" height="250" caption="http://www.justice.gov/jmd/irm/lifecycle/ch1.htm#para1.2"]] || <span style="font-family: Calibri,sans-serif; font-size: 15px; line-height: 17px;">Strand 1: Reliability and integrity, Security

**'Only the Best' Videos and Podcasts**

 * [|Computer and Information Systems Manager Job Description]

What does a computer and information systems manager do? || media type="youtube" key="A9qBcdoEx00?list=PL06C6A6C589A1B734" width="483" height="274" || Video used for internal training at Cisco. Excellent to understand why organizations need to benefit from SANs to consolidated, manage and protect data to make it easily accessible. || media type="youtube" key="C5yBLUe7BVE" height="385" width="480" || A detailed explanation of how the use of SANs developed and became essential to networks. || media type="youtube" key="J88X_M6s0l4" height="385" width="480" || This video explains how Server Virtualization in organizations can reduce the cost and pressures put on IT administration in the enterprise. || media type="youtube" key="MnNX13yBzAU" height="385" width="480" || With Web 2.0 and applications are being dealt with as web services. Many organizations have started a trend of moving their applications to online application servers to be available on demand as explained in this video. || media type="youtube" key="XdBd14rjcs0" height="385" width="480" || This video discusses computer security and explains some of the measures that individuals and companies can take to keep their data and computers safe. It is produced and presented by Christopher Barnatt, author of ExplainingComputers.com, and Associate Professor of Computing and Organizations in Nottingham University Business School. || <span style="font-family: Arial,Helvetica,sans-serif;">media type="youtube" key="Wc1dOw4j3J8" height="385" width="480" || A presentation covering how IT can go green and how it is currently affecting the environment. Every organization needs to find ways to reduce its carbon footprint. Server virtualization, cloud computing,<span style="border-collapse: separate; color: #222222; font-family: 'Helvetica Neue',Helvetica,Arial,sans-serif; font-size: 12px; line-height: 18px;">Software as a Server (SaaS), utility computing, and other strategies are explained. || media type="custom" key="6496093" || A video comparing the two approaches: Agile development and Waterfall. The video can be combined with using the Agile Introduction for Dummies which also compares the two. || media type="youtube" key="gDDO3ob-4ZY" height="390" width="480" ||
 * =<span style="background-color: transparent; border-collapse: separate; border-width: 0px; font-size: 13px; font-weight: normal; line-height: 19px; margin: 0px; outline-width: 0px; padding: 0px;">[|Cisco - Storage Networking Training Video] =
 * Storage Area Networks (SANs) 101
 * What is Virtualization?
 * Cloud Computing Plain and Simple
 * Explaining Computer Security
 * Green Computing
 * [|Agile vs. Waterfall: A Tale of Two Teams]

Latest Online Resources

media type="custom" key="5919331"

//Page Manager: Mahmud Shihab//