CIO Productivity

CIO - Productivity Kit


Sarbanes-Oxley Compliant

IT and Internet Job Descriptions 
Disaster Recovery Template 
IT Service Management Template
Sensitive Information Policy - Salary Survey - Security Template 

Order Now SAVE $850 to $1,140 Download CIO Productivity Kit Sample

 

 

The CIO productivity kit Standard edition contains

  • Over 230 job descriptions in word format
  • IT Salary Survey for US and Canada (by city)
  • Disaster Recovery Template which is Sarbanes Oxley compliant
  • Security Template which is Sarbanes Oxley compliant
  • IT Service Management Template (Change Management, Help Desk, and Service Requests)
  • Sensitive Information Policy (Protect  Credit Card Card and Personal Information)

The CIO productivity kit Metric edition contains

  • Everything in the standard edition
  • Metrics for Internet and IT (metric kit)
  • Service Level Policy Agreement Policy Template (metric kit)

 

Order Now SAVE $850 to $1,140 Download CIO Productivity Kit Sample

 

 


Disaster Plan

Disaster Recovery

Order Disaster Recovery Plan Template Download Selected Pages

Template (DRP) 

The Disaster Recovery Plan template (DRP) can be used for any enterprise.   DRP Template is sent to you via e-mail in WORD and/or PDF format. Included is a Business Impact Questionnaire as well as a full Job Description for theDisaster Recovery Manager





Security ManualSecurity Manual 

Order Security Manual Template Download Table of Contents

The plan is 178 pages and includes everything needed to customize the Internet and Information Technology Security Manual to fit your specific requirement.  The electronic document includes proven written text and examples for your security plan.

 


Job descriptions

Internet and  IT Job Descriptions     

The Internet and IT Position Descriptions are in Word for Windows format.  Includes positions from CIO and CTO to Wireless and Metrics Managers. All of the positions in the book have been created to reflect the technology world of today.

Order IT Job Descriptions  Download TOC Sample Job Descriptions



Metrics for the Internet & IT 

Metrics IT Service ManagementThe Metrics for the Internet and Information Technology HandiGuide® is over 324 pages, defines 540 objective metrics, and contains 83 metric reports that show over 240 objective metrics.

 

Order KPI Metrics Template Download KPI Metrics Sample



Sevice Level Agreement MetricsOrder Service Level Agreement MetricsService Level Agreement Policy Template


The Service Level Agreement Policy Template is a nine page policy for a single application,  It defines specific SLAs and metrics that are both internally and externally focused. The sample contain over 70 possible metrics presented graphically in PDF format.


IT  Salary Survey

IT Salary SurveyThe Janco Associates, Inc. survey draws on data collected throughout the year by extensive internet-based and completed survey forms sent to businesses throughout the United States and Canada.  Our database contains over 85,000 data points.

Order IT Salary Survey Download IT Salary Survey Summary


  

CIO - CTO - CSO News


Change Control and Version Control focus of ITSM Template

Janco has just released version 4.0 of its IT Service Management - Service Oriented Architecture Template.  The focus of the current version is in change control and version control within the system development life cycle of IT systems. - ITSM Template


National ID - Security Nightmare Could be a Reality

Two U.S. senators met with President Obama on Thursday to push for a national ID card with biometric information such as a fingerprint, hand scan, or iris scan that all employers would be required to verify.

In an opinion article published in Friday's edition of the Washington Post, Schumer (D-N.Y.) and Graham (R-S.C.) say the new identification cards will "ensure that illegal workers cannot get jobs" and "dramatically decrease illegal immigration."

This push for a national ID is part of what the senators say is a necessary overhaul of immigration law, including additional border security, more temporary workers, and a form of amnesty for illegal immigrants already in the United States. It comes just two days before a rally in Washington, D.C. sponsored by groups including the AFL-CIO, Farmworker Justice, and the National Council of La Raza that also calls for amnesty.

Linking national ID cards to immigration reform is a popular idea in Washington political circles. After all, if every U.S. citizen has a biometric-equipped cards, the thinking goes, it's easy to order employers not to give a job to someone without one.

But concerns about privacy, security, and federalism have torpedoed each one of these proposals so far. A similar national ID plan--which also required that employers do verifications--sunk President Bush's broader proposal for immigration reform in 2007. A proposal three years earlier by Rep. David Drier (R-Calif.) to create federal ID cards with Americans' photograph, Social Security number, and an "encrypted electronic strip" with additional information was even less successful.

Then there was the controversial Real ID Act, which tried unsuccessfully to compel states to standardize their drivers' licenses. But a libertarian grassroots revolt, including an anti-Real ID vote a few weeks ago in the Utah legislature, has halted Homeland Security's plans. (Rep. Ron Paul, the former Republican presidential candidate, argued it would do little to curb legal immigration.)

Under the Schumer-Graham proposal, extracting biometric information from hundreds of millions of Americans is no trivial task. It could mean extraordinary lines at regional Social Security offices--and an inconvenience for Americans switching jobs who haven't had their retina or DNA scanned in and stored on the ID card.

"We would require all U.S. citizens and legal immigrants who want jobs to obtain a high-tech, fraud-proof Social Security card," the senators' opinion article says. "Each card's unique biometric identifier would be stored only on the card; no government database would house everyone's information. The cards would not contain any private information, medical information or tracking devices."

- more info


Securtiy basics

As the complexity of the threats increases, so do the security measures required to protect networks. Review the basics of security in order to safely deploy and manage networks today, including firewalls, network topology, and secure protocols, and network security best practices. - more info


Disaster Recovery and Business Contunity Back-up Requirements Defined by Janco

Disaster Recovery and Business Continuity require data consistency with the synchronous replication of data over long-distances and / or journal replication to protect against local and wide-area disasters. This technology provides other benefits, including:

Maintaining more efficient data currency. Using synchronous replication over a short distance in a campus or metropolitan area cluster provides the highest level of data currency without undue impact to application performance.

Permitting swift recovery. A campus/metropolitan cluster implementation allows for fast automated failovers after a local area disaster with minimal to no transaction loss.

Permitting recovery even when a disaster exceeds traditional regional boundaries. A wide-area disaster could disable both data centers 1 and 2, but with some manual interaction, operations can be shifted to data center 3 and continue after the disaster.

Shifting to staffing outside the disaster area. A wide-area disaster also affects people located within the disaster area, both professionally and personally. By moving operations out of the region to a remotely located recovery data center, operational responsibilities shift to people not directly affected by the disaster.

Janco has defined a Template with a Backup and Backup Retention policy that is a complete policy which can be implemented immediately. 

The document is provided in both Word 2003 and WORD .docx format and is easily modified.  This policy is included in the Disaster Recovery / Business Continuity Template.

Below is a table from the policy.

Type of Data

Minimal Backup Policy

Backup Retention Policy

System software

Latest Version plus patches
 At Least Weekly

Annual (verified) Backup
Monthly Generations
Weekly Generations

Application software

Latest Version plus patches
At Least Weekly

Annual (verified) Backup
Monthly Generations
Weekly Generations

System data

Daily

Annual (verified) Backup
Monthly Generations
Weekly Generations
Daily Generations

Application Data

Daily with real time transaction files

Annual (verified) Backup
Monthly Generations
Weekly Generations
Daily Generations

Software licenses, encryption keys, & Protocol Data

Weekly

Annual (verified) Backup
Monthly Generations
Weekly Generations

Read On... Order DRP BCP Template Download Sample DRP BCP


Sensitive Information Policy Template released by Janco

The Sensitive Information Policy Template (Version 2.4) has just been released by Janco. This policy applies to the entire enterprise, its vendors, its suppliers (including outsourcers), co-location providers, and facilities regardless of the methods used to store and retrieve sensitive information (e.g. online processing, outsourced to a third party, Internet, Intranet or swipe terminals). 

New with this version are updates that specifically define the mandates of most recent federal (Gramm-Leach-Bliley) and state (Massachusetts and California).

Order Sensitive Information Policy Download Sample Sensitive Information Policy


Which skills are in high demand and low demand

IT salaries are determined by the skills that are required.  Janco has determined the following are the skills in high demand and low demand.

Skills with a high demand

  • Project Management - especially large projects with short time frame for delivery
  • Security -  focus on mandated compliance issues
  • Network Administration - wireless and cloud administration
  • Virtualization (Cloud) - new applications and management of the IT infrastructure
  • Business and Operational Analysis - focus on business change
  • Productivity Improvement Analysis - metrics and operational analysis
  • Web 2 - interactive applications that add value
  • Database Management - applications that leverage enterprise assets
  • System Administration - Windows and UNIX management
  • Desktop Support - standardization and change management

Skills with a declining demand

  • COBOL
  • HTML
  • System Network Architecture - SNA
  • Siebel
  • Rapid Application Development - RAD
  • ColdFusion
  • Wireless Application Protocol - WAP
  • Visual J++
  • Novell NetWare
  • Asynchronous Transfer Mode - ATM

Order IT Job Descriptions  Download TOC Sample Job Descriptions


IBM outsourcing cost 2,000 US jobs

After shrinking its U.S. workforce by as many as 10,000 employees last year, IBM may be on its way to cutting another 2,000 workers.

As of last October, IBM employed 105,000 workers in the U.S., compared to 115,000 in 2008. In 2007, IBM had 121,000 U.S. employees. It employs about 400,000 globally.

IBM isn't commenting on its latest round of cuts and information about it comes from the Alliance union which gathers its data directly from IBM employees.

"IBM is clearly offshoring things where they can," said one IBM employee who received his notice and spoke on the condition of anonymity because he didn't want to jeopardize his severance. A 10-year veteran and UNIX administrator, this employee said his customer support team once had 15 U.S.-based workers. That staff was reduced over time to just three workers in the U.S., with other members of the customer support team now in Brazil, Argentina and India.

The employee said he was not given a good reason for his layoff. "Higher ups made a decision that a certain percentage had to be cut - it was not performance-based at all," he said. Although the employee said he's uncertain about the job market, "my sense is that it is not horrendous but I'll have to assume that I'll have to take a cut in pay."

Order IT Salary Survey Download IT Salary Survey Summary


Practical Guide for IT Outsourcing Released by Janco

Practical Guide for IT Outsourcing Released - Version 3.0 of the Practical Guide for IT Outsourcing has just been released. It includes a sample Outsourcing contract, Service Level Agreement with metrics, Risk Assessment - Business and IT Impact Questionnaire, and much more.

The guide is delivered electronically and is available in MS - Word and industry standard PDF.

Order Outsouricng HandiGuide Download Outsourcing HandiGuide Table of Contents


CIOs are looking for more cost savings

The recession is impacting how IT is performing. Budgets for many IT organizations has been frozen for about two years, and CIO have been on this efficiency kick for about the same amount of time. IT organizations have virtualized, consolidated data centers, have cut hiring and outsourced.  There is no low-hanging fruit left.

Service level agreements are set however costs need to be reduced.

The only areas where cost savings can be made are in hardware and software maintenance.

Order KPI Metrics Template Download KPI Metrics Sample


CIO must protect critical data

CIOs need to focus on at least four areas in order to protect critical data:

  • Implement a  Business Continuity and Disaster Recovery Plan. This is the traditional solution for mitigating exposure to information loss. However it has grown more complicated as 24/7, global economy, and open source have become standard business mantras. Of paramount importance is overcoming the hurdles associated with backup window requirements, application performance, reliability and consistency, and recovery time.
  • Streamline IT Infrastructure and Increase Productivity. As staff and resources become overburdened, companies are refocusing on infrastructure management. Easing critical pressure points is often the catalyst to surviving a difficult fiscal climate.
  • Manage Storage and Server Costs  Closely. Controlling cost of operations has become a top priority for many organizations. With data growing at exponential rates, these costs can easily mushroom.
  • Support IT Infrastructure Consolidation. Today's data protection architecture seems to be intrinsically broken - as characterized by slow backups, complex recoveries, compromised application performance, and difficult resource administration. IT infrastructure consolidation including server virtualization magnifies the problems and elevates the rearchitecture of storage and data protection as a priority. Finding high performing, easy-to-use, scalable data protection remains a key imperative. Further, system migration of production servers and critical applications to a virtual environment are likely to be costly and painful unless an easy and minimum-impact solution to migration is built into the rearchitecture.

Order Disaster Recovery Plan Template Download Selected Pages