Categories
Uncategorized

AEA Purchasing Awards Martin Yarborough and Associates the contract for providing vulnerability scanning for Iowa K-12 school districts for 2022-23

After a lengthy and complete bid process, AEA purchasing has selected Martin Yarborough and Associates of Fort Worth Texas the coveted state contract for 2022-23. The purpose of the RFP was to establish a contract that allows any AEA Purchasing member to have access to information technology control evaluations and security assessments by a qualified […]

Categories
Uncategorized

Martin’s Top 10 Videoconferencing List

I am a huge fan of David Letterman. I used to end my day watching and laughing to the various skits on his show. Sorry he is not on anymore. He was and is a class-act. One of my favorite skits was his weekly Top 10 lists. So I was thinking, with all of the […]

Categories
Uncategorized

My Perfect Videoconferences

Those of you who know me are aware that I am a HUGE fan of videoconferencing. Even back in the Dell days, the videoconference was my primary method of communicating with my coworkers as well as my customers. As a private consultant, 90% of my business is conducted via videoconferencing. It’s important when embarking upon […]

Categories
Uncategorized

IT Governance – Key IT Governance Frameworks – ITIL (9 of 16)

The IT Infrastructure Library (ITIL) originated in the public sector of Great Britain in the 1980s as a framework of standards for IT services. ITIL continues to be widely adopted across the world by organizations of all sizes and industries. Recent Forrester research has estimated that ITIL adoption among billion-dollar companies will increase to 40% […]

Categories
Uncategorized

IT Governance – Key IT Governance Frameworks – COBIT(10 of 16)

Another framework widely accepted is the Control Objectives for IT known as CoBIT. CoBIT is another approach to standardize good information technology security and control practices. This is done by providing tools to assess and measure the performance of 34 different IT processes within an organization. The IT Governance Institute is responsible for CoBIT. ITIL […]

Categories
Uncategorized

IT Governance – Continuous Management of IT Resources (6 of 16)

I The dynamic nature of today’s educational environment combined with the rapid pace of technological change means that IT management must be dynamic and flexible to changes in the marketplace. So IT managers need to be dynamically managing all IT resources, including staffing, systems, outsourcing, services, education and others. Included within this component is sustaining […]

Categories
Uncategorized

IT Governance – Monitoring Results and IT Effectiveness (7 of 16)

Once the previous four components have been implemented, organizations must ensure that IT is continuing to add value to the operation. That value can only be proven if performance metrics can be established, monitored and tracked. Through the establishment of Key Performance Indicators (KPIs), schools or universities can gauge relative success of given IT projects […]

Categories
Uncategorized

IT Governance – Key IT Governance Frameworks (8 of 16)

ITIL COBIT ISO The Big Three To assist a school or university and deploying IT governance procedures and policies, several standard frameworks have been created over the past 30 years. All of the frameworks are situational, good and have their place within an organization. However it has been the experience of this author that there […]

Categories
Uncategorized

IT Governance-Management of IT Risk (4 of 16)

So you’ve become a CIO, you’ve worked at creating policies, processes and strategy and you just became the “golden boy” in the eyes of the Board of Directors; so what’s next. Simply this, you now must learn to manage risk of the policies, processes and strategy. Technology risks can range from security related issues such […]

Categories
Uncategorized

IT Governance – Creation of Policies, Processes and Strategy (3 of 16)

This is the third installment of the IT Governance posts. In implementing an IT governance model, the creation of policies, processes and strategy is generally the first toolsets implemented. In its most basic form, this concept covers areas such as information security policies, defining acceptable employee usage of applications and systems and establishing appropriate process […]