Best IT Blog

Sample Word – Ebola Corporate Pandemic Virus Emergency Response Plan

Posted in Compliances (1300),Policies - Standards (600),Security (1500) by Guest on the September 30th, 2014

Well if your corporation did not have a plan before they sure need one now.

Ebola Corporate Pandemic Virus Emergency Response Plan


Comments Off on Sample Word – Ebola Corporate Pandemic Virus Emergency Response Plan

Sample Visio – HIPAA – Understanding Clinical Workers considerations

Posted in Compliances (1300),Visio Samples - Stencils (457) by Guest on the September 26th, 2014
Comments Off on Sample Visio – HIPAA – Understanding Clinical Workers considerations

Sample Word – Applications Life Cycle Management Questionnaire

Posted in Compliances (1300),Policies - Standards (600),Web Services (250) by Guest on the September 25th, 2014
Comments Off on Sample Word – Applications Life Cycle Management Questionnaire

Assuring Business Availability

Posted in Compliances (1300),Data Center - SOC - NOC by Guest on the September 20th, 2014
  • Manage
  • Thresholds
  • Events
  • Configuration


  • Monitor
  • Databases
  • Backup
  • File Systems
  • Files
  • Logical Volumes
  • Physical Disks
  • Interconnects


  • Automation
  • Notification
  • Escalation
  • Correlation


  • I/O
  • Capacity use
  • Application service


  • Forecast, Model, Simulate


  • Increases control of enterprise environment
  • This means more availability for your infrastructure, ie more customer and end-user satisfaction, ie not lost business due to poor performance
  • Saves time in identifying the cause of complex problems : for example, if a network is down because of a device failure is easy. However, trying to understand why performance is poor is much more difficult. Especially if we try to corelate users, applications, systems and network information together.
  • Helps eliminate IT slowdowns, maximizing service performance and availability minimizes slowdown thus increasing the end-user and customer satisfaction
  • Allows efficient capacity planning of network resources


Comments Off on Assuring Business Availability

Visio Sample – Active Directory IO Steps

Posted in O S (375),Visio Samples - Stencils (457) by Guest on the September 18th, 2014
Comments Off on Visio Sample – Active Directory IO Steps

Our Cisco Switching Notes

Posted in Networking (340),Security (1500) by Guest on the September 12th, 2014
  • Switching is ASIC (hardware) –based, as opposed to bridges (software).
    • Otherwise, a switch is like a bridge with many more ports.
  • A L3 “intelligent” switch is faster than a router and can sort by L3 addresses.
  • Switches perform address learning by reading frames’ source addresses.
  • They make forward-or-filter decisions whereby broadcasts (all 1s), multicasts (host address = all 1s), and frames for unknown destinations go out all ports.
  • This breaks up collision domains by sending only needed frames out each port.
  • BUT it does not break up broadcast domains because broadcasts go out all ports.
  • Switches practice loop avoidance to stop broadcast storms, duplicate frames, and confusion in their filter tables caused by multiple paths.
  • The key method for loop avoidance is Spanning Tree Protocol (STP) using Bridge Protocol Data Unit (BPDU) multicasts exchanged every 2 seconds.
  • STP (IEEE 802.1d) is a messy protocol that causes lots of delays and recalculates the entire tree every time the network configuration changes.
  • STP elects a root bridge based on its 8-Byte bridge ID (derived from its device priority and its MAC ID).  Priorities are compared (32,768 is the default) and the lowest value wins.  If tied, the lowest MAC address wins.
  • Root bridge decides ports settings on remaining devices:  open (designated) or blocked (non-designated).  Lowest cost ports leading back to the root bridge are called “root ports” and become the path for communications with the root.
  • Designated ports are chosen by lowest cost path, using links’ accumulated BWs.
  • When network topology changes, all data stops for 50 seconds (“convergence time”) while STP re-configures all ports.  Port transitions go as follows:
    • Blocking
    • Listening (exchanging BPDUs and checking for loops) – “forwarding delay”
    • Learning all MAC addresses – a period also called a “forwarding delay”
    • Forwarding 

Three Frame Handling Modes

  • Cut-through:  fastest possible; only destination header is checked (1st 13 Bytes)
  • Fragment Free:  (default mode for Catalyst 1900 switches) reads 1st 64B checking for collision damage before forwarding
  • Store-and-forward:  entire frame checked; rejected if too short (<64B) or long (>1518B) or if it has a CRC failure; method with greatest “latency” (delay).


Comments Off on Our Cisco Switching Notes

Sample – Application Business Case

Posted in Application (380),Web Services (250) by Guest on the September 7th, 2014

The Enterprise Java Team’s has created a standard development Application Monitoring Standard. 

This project’s goal was to create a document outlining this standard and to look for any gaps in the currently available Application Monitoring Frameworks that need to be filled. 

This charter is to outline those gaps and the solutions to fill them. There are two types of gaps to be filled.  

  • Technology gaps that limit the use of the Monitoring Frameworks.  These would be filled by updating the High Availability Code itself
  • Missing Business Functionality gaps.  These would be filled by both updating the High Availability code and/or creating new application(s)

Business Problem(s)

It has been determined from members of the Enterprise Java Team that some missing capabilities exists in the currently existing High Availability Monitoring Frameworks.  

The High Availability Monitoring Frameworks is written code that has the following capabilities: 

  • A test harness that allows for testing standard infrastructure and application availability and to create application specific tests where the standard tests aren’t sufficient
  • A High Availability Test Harness that uses the same test suite as above but adds capabilities for notifications of problems, Logging of tests, and xml output for tool parsing 
  • A Threaded Monitor to run these tests in a development environment
  • Processes and Procedures to implement these tools

The above applications and processes need to be updated to fill the technology gaps. 

An additional application needs to be designed and created to generate reports out of the system including availability metrics to fill the Missing Business Functionality Gap. 

Business Opportunity

  • To fully enable the High Availability Monitoring Framework to support the availability of our Critical Applications
  • To fully enable the standards created by the Enterprise Java Team
  • To give the business community an application to show metrics on the tests run


To fill in the gaps that has been determined by the Development Team. 

  • Measurable Success Criteria (SLA / OLA’s)
  • A charter with detailed information on staffing, costs, and timelines necessary to complete the business requirements


High Level Functional Requirements

  • Source Code Management Technology (test tools)
  • The framework must be able to be configured separately for each application using the framework without the framework itself having to be kept in a separate branch for each application, or in multiple places in the source code repository

Multiple Instances Technology

  • The framework must be able to be configured to work where the application is deployed to two different servers, and the framework can be configured once, and still be able to:
    • Run tests against that particular application instance
    • Send notifications to support which reference the correct web server and JVM for looking at the logs

In Application Memory Technology

The framework must provide a facility for application writers to test facets of the application that reside completely within the memory space of the application. 

Reporting (SLA’s / OLA’s)

The framework must be able to provide a report of test execution results over time.  One of these reports must be a report of recent outages, which is simple and easy for a business owner to understand.  Included in this report should be availability metric.

  • Non-Functional Requirements
  • Document all High Level Functional Requirements
  • Major Project Activities
  • Interview Development Team members and possibly Business Partners to determine detailed implementation of the above High Level requirements
  • Gather requirements for the metrics application and application updates
  • Determine effort and staffing required to complete these requirements
  • Create a charter outlining these requirements, staffing, costs, etc

Items Out of Scope

  • Anything not in sections above


  • A comprehensive Application Charter

Assumptions and Dependencies

  • Availability of resources
  • Risks and Obstacles
  • Non-availability of resources


Comments Off on Sample – Application Business Case


Posted in Compliances (1300) by Guest on the September 4th, 2014

Use reference model as a baseline for system requirements definition and organizational structuring

Provides a framework to divide functional responsibilities across the companies business processes (both automated and manual) in a consistent manner

Baseline of common terminology and training

The reference model is comprised of management layers with each layer representing a portion of the functional architecture of the telecommunications Operations System (OS).

Comments Off on Architecture