Quick Test 1 Would you use the type FLOAT to represent a product unit price? What is the difference between NEWID and NEWSEQUENTIALID? Which function returns the current date and time value as a DATETIME2 type? When concatenating character strings, what is the difference between the plus (+) operator and the CONCAT function? Quick Test Answer … Continue reading →
Efficient Management of IT is important to me. I have often heard and read about "IT having their own agenda" yes IT is not the car you have just purchased but it is the oil and without that oil your car will quickly seize up.
I have worked as an IT manager and as an IT consultant.and understand the attractions and benefits of outsourcing, but if you felt that your IT department had their own agenda while they were part of your company, as an outsource department they no longer have no further interest in your company than to tie you up in contractual red tape and encourage you to purchase items that were not in the contract. The problem is that IT is not really a product you can buy off the shelf as much as senior management would like, this is because no business operates the same way. Each department operates with their bespoke processes and for IT to work effectively they need to understand how they work otherwise the machinery of the organisation comes to a sudden hault.
Outsourcing can open up a business to standardise practices and wealth of highly skilled individuals, but like with Prince2 you may need to tailor your expectations.
Why not contact me and see what I can do for you?
Management support is a major requirement for anything that has such far-reaching ramifications as business continuity planning. Disaster recovery, continuity development, and planning work best in a top-down approach, not a bottom-up approach. This means that management, not the staff, should be driving the project so it is critical that management understands what the real threats are to the organisation, … Continue reading →
Below is an example of a risk checklist displaying in-house list of risks that were identified or occurred during previous organisational activities. Checklists should not be viewed as an exhaustive list of risks as they will not capture the specific circumstances of the activity being examined. Therefore, at the end of the risk identification exercise it is suggested to think … Continue reading →
Most CIs (Configuration Item) are designed to communicate certain information about themselves in one of two ways: A device is interrogated by a management tool, which collects certain targeted data. This is often referred to as polling. The CI generates a notification when certain conditions are met. The ability to produce these notifications has to be designed and built into the CI, for example a … Continue reading →
Having worked with Drupal 7 and WordPress I have now moved on to Modx Revolution. The reason for this is quite simple I currently have a music website www.johnrlhunter.co.uk which is currently a bespoke PHP website which I cannot translate to either Drupal or WordPress. So I have been hunting around for a framework that has a greater flexibility. There … Continue reading →
Purpose Summarises all the quality checks that are planned/have taken place and provides information for the End Stage Reports and End Project Report as well as the Lessons Learned Report Acts as a pointer to the quality check documentation for a product Acts as a summary of the number and type of quality checks held Contains a unique reference for each quality check planned … Continue reading →
copyright © 2012 Website designed and developed by www.designed-solutions.co.uk