Free E-Book Offer: Introducing Windows Server 2012

Free E-Book Offer: Introducing Windows Server 2012

For IT professionals looking for an early, high-level view of Windows Server 2012, there’s no better resource than the Microsoft Press e-book. Based on the beta release, this guide introduces its new features and capabilities, with scenario-based insights demonstrating how the platform can meet the needs of your business.


Get your books online at minmial cost!!!

Books Online…

Model-Based Software Testing and Analysis with C# (Cambridge University Press, 2007, English)
Nature’s Clocks: How Scientists Measure the Age of Almost Everything (University of California Press, 2008, English)
Nuclear Weapons: A Very Short Introduction (Oxford University Press, 2008, English)
MySQL (4th Edition) (Developer’s Library) (Addison Wesley, 2008, English)
The Nine Numbers of the Cosmos (Oxford University Press, 1999, English)
Complete Maya Programming: An Extensive Guide to MEL and C++ API (Morgan Kaufmann, 2003, English)
OpenSUSE 11.0 and SUSE Linux Enterprise Server Bible (John Wiley & Sons, 2008, English)
Mobius and his Band: Mathematics and Astronomy in Nineteenth-Century Germany (Oxford University Press, 1993, English)
Oracle PL/SQL by Example (4th Edition) (Prentice Hall, 2008, English)
Oscillators Simplified, With Sixty One Projects (TAB Books, 1987, English)
The Martians of Science: Five Physicists Who Changed the Twentieth Century (Oxford University Press, 2006, English)
Cosmology (Oxford University Press, 2008, English)
Introduction to Precise Numerical Methods, Second Edition (Academic Press, 2007, English)
The Light Fantastic: A Modern Introduction to Classical and Quantum Optics (Oxford University Press, 2008, English)
Partial Differential Equations in Fluid Dynamics (Cambridge University Press, 2008, English)
Ubuntu Kung Fu: Tips, Tricks, Hints, and Hacks (Pragmatic Bookshelf, 2008, English)

MSDN – Dr Dobb’s October Issues…

MSDN Magazines &  Dr. Dobb’s Magazine’s October issues are out.
Click on magazines……
Register Now for more of these enlightening stories, news articles, columns, and lots more on these two internationally acclaimed magazines.

PDF CHM help files

Introduction to MATLAB and Simulink, Third Edition with CD-ROM(covers v.7.5) (Engineering) (Infinity Science Press, 2007, English)

Mastering Financial Mathematics in Microsoft Excel: A Practical Guide for Business Calculations (Market Editions) (Trans-Atlantic Publications, 2005, English)

Platform Interference in Wireless Systems: Models, Measurement, and Mitigation (Newnes, 2008, English)

Programming 32-bit Microcontrollers in C: Exploring the PIC32 (Embedded Technology) (Newnes, 2008, English)

Microsoft SQL Server 2008 A BEGINNER’S GUIDE 4/E (McGraw-Hill, 2008, English)

Handbook of Usability Testing: Howto Plan, Design, and Conduct Effective Tests (John Wiley & Sons, 2008, English)

Windows XP Media Center Edition 2004 PC for Dummies (For Dummies, 2003, English)

A Simple Guide to Windows XP (Simple Guides) (Prentice Hall, 2002, English)

Visual Thinking: for Design (Morgan Kaufmann Series in Interactive Technologies) (Morgan Kaufmann, 2008, English)

The Art of Sound Reproduction (Focal Press, 1998, English)

Online Books

Computational Intelligence in Bioinformatics (Studies in Computational Intelligence) (Springer, 1970, English)

Information and Communications Security: 9th International Conference, ICICS 2007, Zhengzhou, China (Springer, 2008, English)

Rightshore!: Successfully Industrialize SAP® Projects Offshore (Springer, 2008, English)

PHP Web 2.0 Mashup Projects (Packt Publishing, 2007, English)

Digital Logic Design, Fourth Edition (Newnes, 2002, English)

Patterns in Network Architecture: A Return to Fundamentals (Prentice Hall, 2008, English)

How to Cheat at Configuring VmWare ESX Server (Syngress Publishing, 2007, English)

Open Source Fuzzing Tools (Syngress Publishing, 2007, English)

Professional Plone Development (Packt Publishing, 2007, English)

Risk management key to outsourcing

Changes in operating models and dispersed global footprints of corporations has brought with it risks, which need to be managed effectively.

IT and ITeS outsourcing has gained great momentum globally over the last few years, unlocking value for corporations and shareholders. This has brought about considerable change in operating models as different functions of the same supply chain are now being performed in geographically dispersed environments.

This is a paradigm shift and is still in evolution. Businesses are continuously trying to adapt to this change. Such changes in operating models and dispersed global footprints of corporations has brought with it risks, which need to be managed effectively. These risks have multiple dimensions that include political, economic, geographical, legal, social, technological and operating model risks.

A few indicative risks are: (i)business continuity management (BCM) risks. This includes existence of single point of failure (SPOF) arising out of concentration of operations at one location; lack of adequate fault tolerance/ redundancy in IT infrastructure etc;

(ii) information security/data privacy related risks. This includes risk of data theft, exploitation of IT security vulnerabilities, social engineering attacks, etc;

(iii) process related risks. This includes inadequate segregation of duties, inappropriate management oversight

A robust risk management model is therefore a critical business fundamental and increasingly a differentiator particularly for outsourced operations. Risk management can be done by adopting quantitative/qualitative methods and there are many ways in which it can be approached.

It is very important that such initiatives be driven by qualified professionals who have the knowledge to understand various threats, vulnerabilities, controls and residual risks. Factors such as financial impact, operational impact, legal impact, reputation impact, health and safety etc need to be considered before arriving at risk ratings.

Risks, once identified, need to be carefully analysed by leadership in order to understand the various options for a cost-benefit analysis. This stage is crucial in arriving at a sound risk treatment plan in line with the risk appetite of the organisation. There are various risk treatment options that can be considered in order to address risks.

? risk mitigation (implementation of additional controls to bring down the residual risk);

? risk acceptance (management agrees to accept this risk);

? risk elimination (eg, changing the way in which a particular process is being performed to eliminate/ circumvent the source of risk;

? risk transfer (eg, outsourcing a part of significantly risky process to a provider which specialises in that process or by other appropriate means).

Once a robust risk management model has been established and is functional, it leads to subsequent programs to address the risks exposures across the cross section of the organisation. Some of the programs include: Sarbanes Oxley Act (SOX) compliance; information security management; business continuity management and disaster recovery program; operational risk management program; fraud risk reduction program;

Let’s consider some specific examples. A large global organisation with multi-geography presence can bank on multi site, multi network strategy to deliver 24X7 business continuity solutions. This approach, best summarised as ‘don’t keep all your eggs in one basket gives better redundancy. This approach may impact cost and that will be dependent on the geographies selected for delivery.

"Fortune favours the prepared" ? a rigorous testing schedule of the business continuity plans provides additional comfort to management and customers as well.

Data privacy programs must reflect the privacy posture of the organisations. The privacy framework needs to focus on choice of data use, data access and data integrity, security, onward transfer, security and enforcement/oversight. Given the typical information life cycle through the organisation, the privacy framework needs to include measures to protect personal information and map them with the privacy policies. For instance, while collecting information directly from customers, the organisation should: provide notice of how the information is to be used and choice to the customers on providing the information; store personal information in accordance with the IT Security policy and standards; ensure data integrity; Ensure that the information is used only for the intended purposes; ensure that the information is not transferred or shared with 3rd parties without consent.

Implement an oversight program addressing customer enquiries, complaints, and a system of audits are in place to ensure that personal information is handled and managed appropriately.

Going forward, risk management programs are getting linked to the competitive advantage of the organisations. In the outsourcing world, a robust risk management model not only alleviates management concerns but also pleases the buy-side decision makers.

%d bloggers like this: