IT Productivity Center News and Information

Metrics, Productivity, Salary Survey, Job Descriptions, Business Continuity, ITSM, SOA, White Papers, Compliance, SOX, and HIPAA

The IT Productivity Center feed is an XML news feed that you can subscribe to and re-publish on your web site or blog. The only requirement that you need to meet is that the feed is included with no modifications and that the links within the feed are retained as is.

If you wish to subscribe to this news feed the options that you have are:

  • IT Productivity Center News

  • Balance between Privacy, cybersecurity, and compliance is not there yet

    How many enterprises are compliant with all mandated security and privacy requirements

    Compliance Management may conflict with PrivacyThere is a misconception that privacy and security are in conflict with each other, and that’s not true. Privacy purists often think that cybersecurity tools track a lot of personal data and invade privacy.

    There now is an evolution of the privacy community, driven by significant data breaches. Lots of Personally Identifiable Information (PII) has made its way into the Dark Web, thanks to some of the huge data breaches of the past few years, so much so that the price of Social Security numbers has dropped considerably. Unless organizations are required to implement security, the fight to protect privacy won’t be won. That’s been a shift over the last five or so years. When that happens, there will be a much better relationship between the privacy community and the security industry, and this will spill over into rules and regulations.

    Thre should be a set of federal mandates that are designed to level the privacy playing field when it comes to consent but at the same time obligating organizations of all sizes to take privacy seriously.

    GDPR is a good start because it provides a good roadmap on how to think from a privacy point of view.

    Order Industry Standard Compliance Kit

    - Balance between Privacy, cybersecurity, and compliance is not there yet

    Top 10 Technologies 2019

    Top 10 Technology Trends 2019 and Beyond according to Janco

    Janco has identified 10 technologies with the potential to make the greatest impact on business operations, customer interactions, and can create business opportunities. Staffing will be the constraining factor.

    They are:

    1. 5G Wireless
    2. 3D Printing
    3. IoT
    4. AI
    5. VR
    6. Drone based applications
    7. Biometrics
    8. Blockchain
    9. Quantum Computing

    Infrastructure StrategyOrder IT Infrastructure KitDownload Selected Pages


    - Top 10 Technologies 2019

    New Productivity Tool - IT Governance Infrastructure, Strategy, and Charter Template

    IT Governance key to productivity

    Governance key to productivityWith the explosion of technology into every facet of the day-to-day business environment there is a need to define an effective infrastructure to support operating environment; have a strategy for the deployment and technology; and clearly define responsibilities and accountabilities for the use and application of technology.

    Janco has created a framework which is easily applied and cover everything from day-to-day IT activities to change control and version management. In addition, you have the option to purchase this offering with 24 months of update service.

    Order IT Infrastructure Architecture Download Selected Pages

    - New Productivity Tool - IT Governance Infrastructure, Strategy, and Charter Template

    Companies now depeding on selected cloud providers

    How to Guide for Cloud Processing and Outsourcing provides everything that is needed to select a vendor, enter into an agreement, and manage the relationship

    Cloud Processing on the riseMany businesses are doing more in the cloud these days. It has some good and bad points, like being locked into various vendors has they have done in the past. It is important for business leaders to actually learn rather than just keep moving on to the new thing.

    Order Cloud Outsourcing TemplateDownload Selected Pages


    - Companies now depeding on selected cloud providers

    IoT Security

    IoT - IT Infrastructure Policies and Procedures

    What security issues associated with IoT security – devices, network, and back-end. All of them are potential targets, and they all require attention, according to Forrester principal analyst Merritt Maxim. Right now, devices are getting the bulk of the attention – the huge number of different manufacturers, some of whom haven’t worked very hard to make their products secure, makes device-level IoT security problematic.

    IoT Security

    Order IT Infrastructure PoliciesDownload Selected Pages

    - IoT Security