INFORMA�N� MANAGEMENT

Monitoring aktu�ln�ch informac� a webov�ch zdroj� t�kaj�c�ch se "Informa�n�ho Managementu". Weblog je sou��st� informa�n�ho port�lu AKA-MONITOR, www.akamonitor.cz, spravovan�ho doc. A. Katolick�m. Str�nka obsahuje vlastn� texty a zejm�na stru�n� komentovan� odkazy na pozoruhodn� �esk� a anglick� zdroje v literatu�e, v �asopisech a na webu. Vyu�ijte mo�nosti nastaven� RSS �te�ky k automatick�mu sledov�n� aktualizace obsahu weblogu. DOPL�KOV� ZDROJ POZNATK� PRO STUDENTY V�MIE v Praze

Moje fotka
Jm�no: Arnost Katolicky
M�sto: Plzeň, Czech Republic

Internetov� publicista provozuj�c� AKA-MONITOR www.akamonitor.cz, soudn� znalec KS Plze�, docent na Z�U v Plzni a na V�MIE v Praze.

29.9.09

DATA PROFILING - recenze v�ukov�ho on-line kurzu

DATA PROFILING se st�v� postupn� ned�lnou sou��st� formuj�c� se modern� 
v�dn� discipliny: DATA QUALITY MANAGEMENT. 
Kr�tkou slideshow v�novanou kurzu spole�nosti "eLerningCurve" najdete 
na adrese: http://www.akamonitor.cz/slideshow/arkady/
Podrobnou recenzi - textovou ��st - najdete 
na adrese: http://www.akamonitor.cz/arkady.htm

itSMF launches new program to professionalize ITSM

The program, Professional Recognition for IT Service Management (priSM) will enable members to apply for recognition of their ITSM knowledge, skills and abilities.
http://www.itsmfusion.com/press.aspx?id=1924
 

24.9.09

BIZ 3/09

Z�kladn� a aktu�ln� trendy v oblasti CRM
CRM a bezpe�nost - propojen� n�doby
Virtu�ln� t�m: veden� lid� na d�lku
Google ( st�le ) podporuje YouTube
P�ehledov� tabulka podnikov�ch IS CRM na �esk�m trhu
(Bonus aka) Pro� firmy nenaslouchaj� sv�m z�kazn�k�m
www.akamonitor.cz/plneverze.htm
 

ebizQ - Advancing System Design & Data Management Through Process Modeling

Pozoruhodn� �l�nek najdete na adrese:
http://www.ebizq.net/topics/bpm/features/11725.html?page=3&pp=1  

ITSystems 9/09

Trendy v ERP
V�b�r IS pro podporu obchodn�ch a logistick�ch proces�
Virtualizace ve sv�t� desktop�
Warehouse management
P��nosy a rizika ��zen�ch bezpe�nostn�ch slu�eb

(Bonus aka) ERP jako slu�ba pro men�� a st�edn� podniky
www.akamonitor.cz/plneverze.htm
 

E-Business Forum 2009



E-Business Forum 2009

6.10.2009 9:00
M�sto    Andel�s hotel
Adresa Stroupe�nick�ho 21, Praha 5
E-Business Forum 2009 je konferenc� o elektronick�m obchodu (nejen) v �esk� republice.
Po�adatel�:
Asociace pro elektronickou komerci (APEK) spole�n� s TUESDAY Business Network.
Konference je ur�ena:
internetov�m obchodn�k�m, dodavatel�m slu�eb pro obchody, manager�m internetov�ch spole�nost�, marketingov�m specialist�m, pr�vn�k�m, konzultant�m a dal��m.
C�le konference:
- ��astn�k�m poskytnout p�ehled o stavu elektronick�ho obchodu v roce 2009
- co se d�je nov�ho, co ovlivn� elektronick� obchod v nejbli���ch m�s�c�ch
- p�edstavit �e�en� pr�vn�ch pobl�m� elektronick�ch obchod�
- umo�nit nav�z�n� nov�ch kontakt� a potkat zn�m�
- sd�let zku�enosti

V�ce se dozv�te na adrese: http://www.akamonitor.cz/ebussforum-09.htm

23.9.09

Konference IT Governance 2009 "Inovace podnik�n�"


VI. ro�n�k znalostn� zam��en�ch konferenc� ISACA nazvan�ch �IT Governance� byl ozna�en podtitulkem �inovace podnik�n�.D�vod: "Perspektivn� digit�ln� technologie maj� inova�n� n�boj, p�in�ej� odli�n� mo�nosti, nov� n�pady a strategick� inova�n� my�lenky sm�rem k hlavn� podnikatelsk� �innosti organizac�."( Cit�t z pozv�nky na konferenci ).
V�e pot�ebn� ( program, p�edn�ej�c�, m�sto kon�n� a ubytov�n�, p�ihl�ka ) se dozv�te na adrese:
http://www.isaca.cz/cs/konference-it-governance-2009

Zam��en� konference na inovace podtrhuje jej� za�azen� do programu Evropsk�ho roku 2009 �Creativity and Innovation".
---
IT Governance Conference - �Business Innovation�
The purpose of the IT Governance Conference with the subhead �Business Innovation� is to promote an important role of ICT in business innovation and creativity. ISACA Czech Republic. The sixth annual IT Governance Conference entitled �Business Innovation� is intended for a variety of professional IT-related positions (IS auditor, consultant, educator, IS security professional, regulator, chief information officer and internal auditor). The conference is organized by ISACA (Information Systems Audit and Control Association) near Brno in October 2009. The IT Governance conference is where new ideas, creativity, innovation capacity and practical application converge.

22.9.09

OGC Best Management Practice-White Papers

Domovsk� str�nka port�lu "Best Management Preactice":
http://www.best-management-practice.com/Knowledge-Centre/White-Papers

21.9.09

Je�t� jeden odkaz na prvn� dojmy z MS Office Web Applications

First Look: Microsoft's Office Web Applications
The early test version shows promise, but still has a long way to go
Daniel Robinson
V3.co.uk, 18 Sep 2009
�l�nek uzav�r� slovy:
"Overall, there is not a great deal that you can actually accomplish with the preview release of Office Web Applications, and it remains to be seen whether users will prefer Microsoft's web-based apps or Google's.
The application that most users will be interested in – Word – cannot really be tested at this point in time, and it seems we will have to wait for the public beta to see how well this stands up against the full client version of Word."
 

Dlouho o�ek�van� verze MS Office v podob� webov� aplikace

Tech Preview of the Microsoft Office Web Applications
Dlouho o�ek�van� verze MS Office v podob� webov� aplikace
se dostala k ruk�m pozvyn�ch vybran�ch tester�.
Jedn�m z tester� je i Dan Holme, kter� opublikoval sv�
prvn� zku�enosti na port�lu "Office and SharePoint.com".

Cituj� �vod a jeden hodnot�c�ch odstavc� �l�nku:
"Last week, Microsoft announced the Tech Preview of the Microsoft Office Web
Applications. These long-awaited web applications are "lite" versions of Microsoft Word,
Excel, PowerPoint, and OneNote. The technical preview is for an invitation-only audience
and its functionality is limited, so I'd like to focus on some of what you can expect
over the coming months as the products enter broader beta and are officially released. I
also want to share an invitation to join me, live online, this week! "
 
"I can tell you that my experience with OWA has been impressive. Microsoft is making a
very wise move to enable consumer, small business, and enterprise use of web
applications in a way that leverages the existing knowledge and experience of the user
base. That alone will significantly reduce barriers to entry. Consumers will be able to
access OWA through Windows Live, and OWA will be made available as part of Microsoft
Online. Beyond that, let me just say that we've not yet heard the full story, as
evidenced by the “Sneak Peek” sessions at the SharePoint Conference . There's more to
tell in about four weeks!"
Pln� zn�n� �l�nku si p�e�tete na adrese:
http://www.officesharepointpro.com/Articles/tabid/149/nodeid/1989/Web-Apps-and-Webinars.
aspx

http://www.google.com/profiles/akamonitor
ISSN 1804-042X doc. A. Katolick�
 

10 must-have steps for an effective SMB information security program

V�tah z �l�nku:
The National Institute of Standards and Technology (NIST), a nonregulatory federal agency in the U.S. Department of Commerce, is putting final touches on a guide designed to help small businesses and organizations implement the fundamentals of an effective information security program. The NIST standards should also prove useful for the remote offices of larger companies, where IT staffs are often small or nonexistent and it's important that employees bear more responsibility for information security.
Kissel's 10 "absolutely necessary" steps to an effective information security program (consult the pamphlet for how-to's):
- Protect information, systems and networks from damage by viruses, spyware and other malicious code.
- Provide security for your Internet connection.
- Install and activate software firewalls on all your business systems.
- Patch your operating systems and applications.
- Make backup copies of important business data/information.
- Control physical access to your computers and network components.
- Secure your wireless access point and networks.
- Train your employees in basic security principles.
- Require an individual user account for each employee on business computers and - business applications.
- Limit employee access to data and information, and limit authority to install software.
And here are the 10 security trouble spots where computer users are highly recommended to use caution:
- Opening email attachments from unknown senders and responding to emails asking for sensitive information.
- Clicking on Web links in emails and instant messages.
- Clicking OK on pop-up windows and other hacker tricks.
- Doing online business and banking.
- Skipping criminal background checks on prospective employees.
- Web surfing.
- Downloading software.
- Not getting expert help when you need it. The Better Business Bureau, Chamber of Commerce, Small Business Development Centers can point you to service providers.
- Disposing of old computers and media
- Protecting against social engineering
 
AKA MONITOR - ISSN 1804-042X - seznam monitorovan�ch �asopis�:
ComputerWorld, CIO Business World, Security World, ITSystems,
�sp�ch, PIXEL,ComputerDesign, itCAD, Jak na po��ta�, Po��ta�
pro ka�d�ho,Extra PC, Nejlep�� Rady PC, Connect!, Computer,
Mobility,BIZ, THINK!(IBM), Sv�t pozn�n�, DIGIfoto, FOTOlife,
��etnictv�,SAT & DVB-T mag.,Extra Hardware, www.akamonitor.cz/5xnej.htm
---------------------------------------------------------------
 

Evaluating Cloud Services: Five Tips

1. Differentiate between enabling and delivering cloud services.
2. Vendors should demonstrate latent capacity.
3. Ask to see a commercial client base.
4. Evaluate partnership ecosystems - and pay attention to Microsoft.
5. Don't believe that cloud services are a "magic bullet."
http://www.cio.com/article/print/502114
 
AKA MONITOR - ISSN 1804-042X - seznam monitorovan�ch �asopis�:
ComputerWorld, CIO Business World, Security World, ITSystems,
�sp�ch, PIXEL,ComputerDesign, itCAD, Jak na po��ta�, Po��ta�
pro ka�d�ho,Extra PC, Nejlep�� Rady PC, Connect!, Computer,
Mobility,BIZ, THINK!(IBM), Sv�t pozn�n�, DIGIfoto, FOTOlife,
��etnictv�,SAT & DVB-T mag.,Extra Hardware, www.akamonitor.cz/5xnej.htm
---------------------------------------------------------------
 

19.9.09

Technology Forum - A Virtual Tradeshow - Informace - Katolick�


Technology Forum - A Virtual Tradeshow
Pozv�nka:
System z Software Technology Forum - A Virtual Tradeshow

Broadcast Date: September 23, 2009 at 11 a.m. Eastern Daylight Time Tradeshow Starts (10:30 a.m. EDT - registration, visit the Exhibit Hall and Resource Center)

The global market, with its quick shifts in direction, is forcing businesses to lean on IT to deliver results faster, more efficiently and with less cost. Every facet of IT is impacted, and every professional who works in IT feels the pressure as application after application is deployed into the dynamic enterprise.
Keep up on the latest technology -- from hardware to software to the tools that maximize their value -- when you join us on Sept. 23, 2009 for our System z Software Technology Forum being delivered to you as a virtual tradeshow. Attending a tradeshow from your desktop gives you many benefits, in addition to saving travel time. Chat with technical experts, learn about new product enhancements and tools that can help you stay on top of the demands of your job, and gather materials you can study and reference later.
Don't miss our keynote speaker! Ray Jones, Vice President, Worldwide System z Software Sales, IBM Software Group, will give an update on System z software and how it can help your enterprise.

Virtual doors open at 10:30 a.m. EDT on Sept. 23, 2009, and will remain open through the duration of the virtual tradeshow.
Program virtu�ln� konference najdete na T�TO adrese.

http://www.google.com/profiles/akamonitor
ISSN 1804-042X doc. A. Katolick�




AKA MONITOR - ISSN 1804-042X - seznam monitorovan�ch �asopis�:
ComputerWorld, CIO Business World, Security World, ITSystems,
�sp�ch, PIXEL,ComputerDesign, itCAD, Jak na po��ta�, Po��ta�
pro ka�d�ho,Extra PC, Nejlep�� Rady PC, Connect!, Computer,
Mobility,BIZ, THINK!(IBM), Sv�t pozn�n�, DIGIfoto, FOTOlife,
��etnictv�,SAT & DVB-T mag.,Extra Hardware, www.akamonitor.cz/5xnej.htm
---------------------------------------------------------------



16.9.09

Building Project Management Skills through Training and Coaching

Once the methodology has been selected, the PMO has to work to get the organization to adopt the common processes. Two of the primary ways this is done are through training and coaching services.

�ce se dozv�te na adrese: www.tenstep.cz resp. www.tenstep.com
http://www.google.com/profiles/akamonitor
ISSN 1804-042X doc. A. Katolick�

 

ITIL - OGC Mandate for Change

Project requirements for an update to the ITIL® core publications
© The Stationery Office 2009 - September 2009
Background to the project
2 Reasons for change
2.1 Change Control Log
2.2 Advice from the Change Advisory Board
2.3 Feedback from the training community
3 OGC requirements
4 Aims of the project
5 Scope for the next edition
5.1 In scope
5.2 Out of scope
6 Quality criteria
7 Quality method
8 Ensuring consistency between editions
V�ce najdete na adrese:
---------------------------------------------------------------
AKA MONITOR - ISSN 1804-042X - seznam monitorovn�ch �asopis�:
ComputerWorld, CIO Business World, Security World, ITSystems,
�sp�ch, PIXEL,ComputerDesign, itCAD, Jak na po��ta�, Po��ta�
pro ka�d�ho,Extra PC, Nejlep�� Rady PC, Connect!, Computer,
Mobility,BIZ, THINK!(IBM), Sv�t pozn�n�, DIGIfoto, FOTOlife,
��etnictv�,SAT & DVB-T mag. www.akamonitor.cz/5xnej.htm
---------------------------------------------------------------
 

15.9.09

Web Application Security Consortium

The Web Application Security Consortium (WASC) is 501c3 non
profit made up of an international group of experts, industry
practitioners, and organizational representatives who produce
open source and widely agreed upon best-practice security
standards for the World Wide Web.
As an active community, WASC facilitates the exchange of ideas
and organizes several industry projects. WASC consistently
releases technical information, contributed articles, security
guidelines, and other useful documentation. Businesses,
educational institutions, governments, application developers,
security professionals, and software vendors all over the world
utilize our materials to assist with the challenges presented
by web application security.
Vice na adrese:

Nov� odbotrn� weblog AKA MONITORu

Na d�le uveden� adrese byl vystaven nov� odborn� weblog v�novan� 
aktu�ln�mu t�matu - bezpe�nosti webov�ch aplikac�:
http://www.akamonitor.cz/WAS.htm
-------------
AKA MONITOR - ISSN 1804-042X - seznam monitorovn�ch �asopis�:
ComputerWorld, CIO Business World, Security World, ITSystems,
�sp�ch, PIXEL,ComputerDesign, itCAD, Jak na po��ta�, Po��ta�
pro ka�d�ho,Extra PC, Nejlep�� Rady PC, Connect!, Computer,
Mobility,BIZ, THINK!(IBM), Sv�t pozn�n�, DIGIfoto, FOTOlife,
��etnictv�,SAT & DVB-T mag. www.akamonitor.cz/5xnej.htm
---------------------------------------------------------------
 

Bezpe�nost webov�ch aplikac� - WAS - An Executive's Guide to Web Application Security - Informace - A. Katolick�

Dobr� den p��tel�!
Ned�vno jsem v�s informoval o AVG Identity Protection - sw p�edstavuj�c� jednu z variant nejpokro�ilej��ho syst�mu pro vyhled�v�n� malwaru prost�ednictv�m detekov�n� nestandardn�ho chov�n� proces�, kter� je v sou�asn� dob� na trhu. Tato technologie nen� zalo�ena na definic�ch, n�br� se zam��uje na monitorov�n� chov�n�. Identity Protection sleduje v�ce ne� 285 r�zn�ch chov�n� a tak� v�echny b��c� procesy (a� u� jsou skryt� �i nikoli). Takto se sna�� zjistit, zda v syst�mu u�ivatele tajn� nedoch�z� k n�jak� �kodliv� �innosti. Technologie Identity Protection dok�� naj�t a zne�kodni v�razn� v�ce malwaru ne� konkurence a p�edev��m je�t� l�pe a spolehliv�ji ochr�nit v� po��ta�.

Dnesw jsem na�el na webu stru�n�  v�cn� v�klad ur�en� pro IT management.
N�zev �l�nku:
"
Managing A Growing Threat: An Executive’s Guide to Web Application Security"
Pojedn�v� o bezpe�nosti webov�ch apl�iukac�.
Abstrakt:
"Companies have relied on perimeter defenses to keep their networks and data secure. Unfortunately, network firewalls and network vulnerability scanners can’t defend against application-level attacks. Since so many Web sites contain vulnerabilities, hackers can leverage a relatively simple exploit to gain access to a wealth of sensitive information, such as credit card data, social security numbers and health records. It’s more important than ever to examine your Web application security, assess your vulnerability and take action to protect your business."
Na 8-mi str�nk�ch souboru PDF sde do�tete v�ce:
http://www.csoonline.com/documents/whitepapers/managingagrowingthreat.pdf
A. Katolick�
--------------------
AKA MONITOR - ISSN 1804-042X - seznam monitorovn�ch �asopis�:
ComputerWorld, CIO Business World, Security World, ITSystems,
�sp�ch, PIXEL,ComputerDesign, itCAD, Jak na po��ta�, Po��ta�
pro ka�d�ho,Extra PC, Nejlep�� Rady PC, Connect!, Computer,
Mobility,BIZ, THINK!(IBM), Sv�t pozn�n�, DIGIfoto, FOTOlife,
��etnictv�,SAT & DVB-T mag. www.akamonitor.cz/5xnej.htm
---------------------------------------------------------------
 

14.9.09

Storage for today and tomorrow - Informace - Katolick�

S rostouc�m po�tem dat, s rostouc�mi n�roky na jejich dostupnost
a s nutnost� zajistit jejich bezpe�n� ulo�en�, roste v�znam pam�t�
pro ukl�d�n� a z�lohov�n� dat.
��zen� t�to oblasti se stalo ned�lnou sou��st� informa�n�ho managementu.
Informovanost o n�roc�ch a cest�ch zaji�t�n� kvality v t�to oblasti nutn�
zaj�m� ka�d�ho u�ivatele. Proto pova�uji za vhodn�, z�skat v t�to oblasti
nezbytn� p�ehled.
Na d�le uveden� adrese jsem pro v�s vystavil 23-ti str�nov� p�ehled,
publikovan� na webu pod n�zvem "Pam�ti dne�ka a z�t�ka".
Zde je abstrakt prezentace:
"No matter what way you look at it, the volume of data needing storage
in the enterprise data center is skyrocketing. Research firm IDC tracks
the storage growth at 60% annually – a hard figure to cope with for even
the savviest of storage administrators. Smart storage starts with an
understanding of an enterprise’s needs matched to the right technologies
for meeting those demands. But that’s easier said than done, given
changing enterprise data types, regulatory provisions surrounding data
storage and the rise of storage options. In these articles, InfoWorld and
its sister publications CIO, Computerworld and Network World explore
the latest storage challenges and the technologies for addressing them.
Adresa prezentace je:
http://www.akamonitor.cz/articles/storage-ebook.pdf.
---------------------------------------------------------------------------------
AKA MONITOR - ISSN 1804-042X - seznam monitorovn�ch �asopis�:
ComputerWorld, CIO Business World, Security World, ITSystems,
�sp�ch, PIXEL,ComputerDesign, itCAD, Jak na po��ta�, Po��ta� pro
ka�d�ho,Extra PC, Nejlep�� Rady PC, Connect!, Computer, Mobility,
BIZ, THINK!(IBM), Sv�t pozn�n�, DIGIfoto, FOTOlife, ��etnictv�,
SAT & DVB-T mag.
www.akamonitor.cz/5xnej.htm
---------------------------------------------------------------------------------

10.9.09

Seznam monitorovan�ch �asopis� na port�lu AKA MONITOR - z��� 2009

AKA MONITOR - ISSN 1804-042X - seznam monitorovn�ch �asopis�:
ComputerWorld, CIO Business World, Security World, ITSystems,
�sp�ch, PIXEL,ComputerDesign, itCAD, Jak na po��ta�,
Po��ta� pro ka�d�ho,Extra PC, Nejlep�� Rady PC, Connect!,
Computer, Mobility,BIZ, THINK!(IBM), Sv�t pozn�n�, DIGIfoto, FOTOlife,
��etnictv�, SAT & DVB-T mag.
www.akamonitor.cz/5xnej.htm

 

8.9.09

�sp�ch - produktivita a inovace 3/2009

www.e-api.cz
�t�hl� v�roba v r�zn�ch pr�myslov�ch odv�tv�ch
Zaveden� metody 5S v T�ineck�ch �elez�rn�ch, a.s.
�t�hl� v�roba - konkuren�n� v�hoda v dob� recese
V�roba hra�ek LEGO - skute�n�, dlouhodob� projekt
World Class Manufacturing v Plze�sk�m prazdroji
(Bonus aka) Material Flow Cost Accounting
http://www.google.com/profiles/akamonitor
ISSN 1804-042X doc. A. Katolick�