Our documents are based on successfully executed projects which save you time and money.
Img (719) 315-0404
business , projects

Why do Software Development Projects fail?

February 23, 2010

For the same reason any other project fails wrong requirements, wrong expectations, wrong outcome. No time to re-use and learn from lessons learned. Worse case scenarios is your project plan just not detailed enough. Below is an example of failed project attempt. Sample software development project Initiation phase Project...

Img
business , security

How to Develop a Network Security Policy

February 23, 2010

An Overview of Internetworking Site Security Introduction This document is for business executives, and others, who want to know more about Internet and internetworking security, and what measures you can take to protect your site. Presented is a high-level overview of the issues, realities, and technologies available to protect...

Img
business

Disaster Recovery Planning Checklist

February 22, 2010

1. Does your firm have the ability to recreate and service the product throughout its life cycle? a. If so, during a disaster would is the cycle to do this? b. Is the cycle short enough to not risk the potential market share loss? c. If not, how long is the cycle,...

Img
business , compliances , security

Checklist for Disaster Recovery

February 22, 2010

When reviewing disaster recovery plans, the first step is to determine the financial impact of data downtime. How long can your business remain afloat without your critical data? This information will affect your decisions concerning the sophistication and capabilities of your disaster recovery solution. Governmental regulations should also be...

Img
o-s

Disk Write Methods

February 22, 2010

  Writing method Write / Read Passes Description Ref: Overwriting with Zero data. 1 Write each byte to 0x00.   Overwriting with Random data. 1 Write each byte to random data or pseudo-random data.   U.S. Government DoD 5220.22-M 4 Pass 1, Random data; Pass 2, Bit-wise complement of...

Img
business , compliances , data-center-soc-noc , security

Sample Disaster Recovery Test Plan (Structure)

February 22, 2010

1.      Test Planning a.       Objectives b.      Test Procedures c.       Test Plan Review d.      Assumption Validation   2.      Test Scope a.       Orientation b.      Table Top c.       Functional d.      Full Scope   3.      Test  Coordinator and Team   4.      Result Analysis a.       Objectives Completed b.      Validity and accuracy of test data...

Img
compliances , networking , security

DoS

February 22, 2010

Aurthor unknown Whether launched by high school novices or savvy cyber-terrorists, Denial-of-Service (DoS) attacks have become a threat to network reliability. These attacks often result in considerable loss of time and money since they consume scarce and expensive resources: network bandwidth, memory and disk space, CPU time, access to...

Img
business , compliances , data-center-soc-noc

SOW Checklist Overview

February 21, 2010

Summary Requirements Scope Of Work In Scope Out Of Scope Term Assumptions, Risks And Constraints Assumptions Risks Constraints Deliverables And Acceptance Criteria Project Approach, Methods, And Tools Approach Methods Tools Facilities Office Locations Delivery Center Locations Environments Conversion Testing Project Management Project Plan      Work Descriptions      Schedule Team...

Img
business , compliances , security

Outsourcing

February 21, 2010

The most effective outsourcing model occurs when you develop a strong partnership with your supplier, hold regular high-level strategic reviews, and implement a process for continual improvement that is underpinned by both performance and client satisfaction measures. Maintaining quality, transparency, confidentiality and anonymity is paramount for a successful outsourcing...

Img
compliances , itil , security

ISO 17999, 2700x and COBIT shorthand

February 19, 2010

The 27000 standard contains 11 security control clauses collectively containing a total of 39 main security categories and one introductory clause introducing risk assessment and treatment. 1. Security Policy (1); 2. Organizing Information Security (2); 3. Asset Management (2); 4. Human Resources Security (3); 5. Physical and Environmental Security (2); 6. Communications and Operations...

Img
compliances , itil , security

ISO-17799 Overview

February 19, 2010

Complementary standards and guidelines where inspired by ISO17799, design to or supports the implementation of ISO17799: AS/NSZ-4360:2004, Risk Management Guidelines HB-231:2004, Information Security Risk Management Guidelines ISO-19011:1996, Guidelines for Management System Auditing PAS56:2003, Guide to Business Continuity Management ISO/TR-18044:2004, Information Security Incident Management ISO-GMITS:1996/2001 (Guidelines for the Management of...

Img
information-rights-management , security

The New E-Discovery Rules

February 18, 2010

Take the Lead in Ensuring Compliance New rules for electronic discovery adopted as part of the Federal Rules of Civil Procedure (FRCP) went into effect December 1, 2006. The purpose of these rules is to streamline e-discovery requests. In an attempt to minimize the number of motions to compel...

Img
compliances , data-center-soc-noc , information-rights-management

Data and Storage Considerations

February 18, 2010

Data Storage – Contents Storage Issues Magnetic Disks File Systems Remote File Access NFS, CIFS, DAFS Disk organizations JBOD, SBOD RAID Storage Virtualization Scatter/Gather Comparing the various RAID levels RAID Performance RAID Implementation Architectural options for storage virtualization Storage Architectures: DAS, SAN, NAS and iSCSI Integration of Fibre Channel...

Img
o-s , virtual-vmware , visio-stencils

VMWare Examples and Visio Stencils

February 14, 2010

Free Sample Document download VMWARE Stencils: Virtual Template 1.vss VMWare_Templates.vsd Virtual Temples.zip AV_Connectors_1.02_drawing.vsd AV_connectors_ver1.01.vss AV_connectors_ver1.02.vss AV_connectors_ver1.02_Visio2002.vss AV.ZIP ActvDir.vsd BFlowcht.vsd BldgPlan.vsd Block Diagram.vsd BNetwork.vsd Brainstm.vsd Calendar.vsd Conference Room.vsd Database.vsd DNetwork.vsd EEctrl.vsd FluidPwr.vsd Meeting Room.vsd mind-map.vsd OrgChart.vsd ProcEng.vsd Project Server Setup Flowchart.vsd Rack.vsd Timeline.vsd UML.vsd Workflow Example.vsd SampleVisio1.zip SampleVisio2.zip SampleVisio3.zip Bunch...

Img
virtual-vmware , visio-stencils

Desktop Virtualization – Alternative Desktop Functional Comparisons vs Tradition PC

February 14, 2010

   Function Traditional PC SMC Thin Client Server Virtualization Video/Audio performance same as traditional PC Yes Yes No No Peripherals compatibility with traditional PC Yes Yes No No Personal settings same as traditional PC Yes Yes No No Printer Compatibility and speed same as traditional PC Yes Yes No...

Img
information-rights-management , security

IRM-Enabled SharePoint Documents in Groove Workspace

February 13, 2010

  Windows Server 2008 has Rights Management Services (RMS, which is a server add-on feature) as an installable role and seamlessly integrated into the OS. Further Information Rights Management (IRM, which is the client ability to comply with what is set to be enforced by RMS) can be enabled in SharePoint...

Img
information-rights-management , sharepoint

AvePoint DocAve

February 8, 2010

AvePoint DocAve 4.5 DocAve is the only truly integrated, easy-to-use, enterprise software that offers a complete set of SharePoint Platform protection and management tools. The award winning gDocAve software platform addresses the need for fast, flexible, and real-time backup, disaster recovery, and administration solutions for MOSS. DocAve Compliance Archiver...

Img
security

Computer Forensics

February 7, 2010

Great links www.purdue.edu/securepurdue/docs/ComputerForensics.ppt

Img
o-s , virtual-vmware

Alternative Desktop ROI Comparison

February 6, 2010

Environmental factors increasing pressure for new solutions Audit/Control requirements such as Sarbanes Oxley, etc. New legislation; i.e., eDiscovery Desire for ‘Green’ solutions Security and Identity theft grow Disasters Technology Improvements bringing forth new solutions today Server blades & virtualization (VMWare: ESX, GSX, VDI) Software virtualization (MS Softricity, Altiris SVS,...

Img
compliances , security

Things in common with Risk Assessments

February 5, 2010

Vulnerability assessment has many things in common with risk assessment. Assessments are typically performed according to the following steps: · Cataloging assets and capabilities (resources) in a system · Assigning quantifiable value and importance to the resources · Identifying the vulnerabilities or potential threats to each resource · Mitigating or eliminating the...

Img
security

DDOS Attacks – Attack Tools

February 3, 2010

Denial of Service Attacks Denial of service (DoS) attacks involve flooding a system or network with more data than it can handle, so the system crashes or network bandwidth is so clogged that legitimate communications cannot occur. Distributed DoS (DDoS) attacks are more sophisticated. In such an attack, the...

Img