Our documents are based on successfully executed projects which save you time and money.
Img (719) 315-0404
o-s

Windows 2000 Internet Information Server

December 25, 2010

IIS Components File transfer Protocol (FTP) Server World Wide Web (WWW) Server Simple Mail Transfer Protocol (SMTP) Service Network News Transport Protocol (NNTP) Service FrontPage 2000 Server Extensions Internet Services Manager (HTML) Internet Information Services Snap-in Visual InterDev RAd Remote Deployment Support Indexing Service Certificate Services Windows 2000 Professional...

Img
application

System and Application Unit Testing

December 20, 2010

Testing must be an on-going activity throughout all phases of a project and should be an integral component of quality assurance efforts. A complete testing strategy cannot be developed until after vendor selection, so this section contains suggestions for possible activities that could be included in a testing strategy,...

Img
compliances

Sample Change Management Perspective

December 20, 2010

Any project with the scope of an IT implementation will introduce change into an organization, and you need to use this opportunity to review existing processes, and adopt best practices where they provide benefit and can be implemented with reasonable effort. These kinds of changes can impact both individuals...

Img
projects

A Good Project Starting Point Considerations

December 19, 2010

Clearly define project deliverables Carefully contemplate the objectives of each deliverable Define what constitutes successful completion of the deliverable Provide an estimate of effort and / or duration needed to complete the deliverable Prepare appropriate documentation needed to complete the deliverable Communicate and / or implement any associated processes...

Img
visio-stencils

Sample Visio – Unix Privileges: Sudo – Bigadmin

December 18, 2010

Free Sample Visio Document download Visio – Unix Privileges: Sudo – Bigadmin https://www.bestitdocuments.com/Samples

Img
business

Sample Remedy / Heat Incident Tracking ID

December 17, 2010

  Remedy / Heat Tracking ID: Date / Time:  Item # Support Need Owner Notes / Description Status 1         2         3         4         5         6         7...

Img
business

Autocad 2010 Print to Adobe

December 16, 2010

Excellent PDF download Sample:  Autocad 2010 Print to Adobe https://www.bestitdocuments.com/Samples

Img
business , itil

ITIL – Change and Patch Management

December 15, 2010

A set of processes executed within the organization’s IT organization designed to manage the enhancements, updates, incremental fixes and patches to production systems, which include: · Infrastructure changes (routers, firewalls, proxies, cabling, etc) · System upgrades (servers, operating systems, , applications, databases) · Application code revisions (development and testing)...

Img
application

SDLC – Application System Definition Model

December 14, 2010

Audience: Application & System Services Communication & Collaboration Service: Database Administration Desktop Computer Services Disaster Recovery & Business Continuity Services Facilities A formal model of a complete system All information pertinent to deployment and operations Machine-readable, capturing intent of developers and administrators System topology Developer constraints IT policy Installation...

Img
application

Testing Approach and Strategy

December 13, 2010

Testing Approach and strategy helps you prepare the list of testing requirements and the testing strategy for supporting the new corporate procurement and application module. Included are descriptions of the target audience, delivery method, and objectives. In addition, the testing approach and strategy identify: The high level objectives and...

Img
application

Sample SDLC Development Project Deliverables

December 12, 2010

Deliverables and Combined Processes Discovery Project Roadmap Planning Customer & Stakeholder requirements prioritization & signoff Internal Services Catalog Project Risks Identified UI Models List of Alternative Solutions Selection of Best Solutions for further research Hardware Solutions Demos Financial Approval Potential Solutions Modeled in Test Lab  Initial Security Requirements Definition...

Img
compliances

Questions for: Configuration Management and change control

December 12, 2010

Does the configuration management plan address identification, status accounting and audit? Does the configuration management plan address the configuration of all system and configuration items? Is the configuration management integrated into the structure of an organization? Is there version control of all configuration items? Is configuration management and version...

Img
business

Evolve to support

December 11, 2010

The protection of privacy is one of the most important issues surrounding the Internet today. Today, priority must be placed on protection of new applications, current system infrastructure and data integrity in addition to the implementation of privacy practices. New reports on unauthorized access, interruption of service, privacy invasion...

Img
application

Basic Oracle Hardening

December 11, 2010

Disable install and demo accounts: Disallow default user/password PUBLIC has execute System privilege PUBLIC has execute Object privilege PUBLIC has execute UTL_FILE privilege PUBLIC has execute UTL_SMTP privilege PUBLIC has execute UTL_HTTP privilege PUBLIC has execute UTL_TCP privilege PUBLIC has execute DBMS_RANDOM Password complexity Restrict number of failed login...

Img
application

Datacenter – Application Lifecycle Considerations

December 10, 2010

Service Monitoring • Availability• Logging• Auditing• Performance Metrics• Debugging & Tracing• Synthetic Transactions Exception Management • Error Trapping• Root Cause Analysis• Notification Services Version Management • Data Contracts• Message & Operation Contracts• Endpoints (Addresses)• Policies• Internal Dependencies• Claims• Service Retirement• Dependency Analysis Service Delivery • Methodology• Standardized Service Delivery...

Img
sample-it-spreadsheets

Sample Excel – DC Build Checklist

December 9, 2010

Free Excel document download Sample DC Build Checklist www.bestitdocuments.com

Img
o-s , sample-it-spreadsheets

Sample Excel – Secure Red Hat Enterprise Linux 5 – NSA guideline

December 9, 2010

Free Excel document download Red Hat Enterprise Linux 5 https://www.bestitdocuments.com/Samples

Img
visio-stencils

Visio Sample – Direct Access File System (DAFS)

December 8, 2010

Free Visio Sample Direct Access File System Document download Sample – Visio DAFs Client Server drawing. https://www.bestitdocuments.com/Samples

Img
application , web-services

Apache Webserver Diagnostics

December 7, 2010

Couple Options / utilities can help with debugging transient problems: o Curl o Dtrace Check the error_log when Apache misbehaves $ kill -SIGSEGV `pgrep httpd | tail -1` $ tail -100 error_log Curl · Versatile command line utility that can be used to debug web-based problems · Curl contains several advanced...

Img
o-s

Sample Excel – Secure Red Hat Enterprise Linux 5 – NSA guideline

December 7, 2010

Free Excel document download Red Hat Enterprise Linux 5 https://www.bestitdocuments.com/Samples

Img
projects

Internet Service Provider (ISP) Communication / Constraints

December 7, 2010

    ISP Communication / Constraints           Gov’t Owned: Legal Other Area Remote Location Ctry Code ISP GateWay Allow Encryption Allow Satellite Mobile Data Svc Dial-up Mobil Phone E.Africa Ethiopia ET       S N N Y E.Africa Kenya KE        ...

Img
security

Sample Word – VPN Configuration Documents

December 6, 2010

Free Word document download Sample VPN Configuration Worksheet.doc https://www.bestitdocuments.com/Samples

Img
business

Why did we start this blog?

December 6, 2010

Because in our years of IT experience we found that consulting companies think they have all the answers. The truth is they don’t even know all of the questions for most organizations to start and complete projects successfully.   At a time when useful content is disappearing off the internet we...

Img
projects

Generic Enterprise Workflow Requirements – Matrix

December 6, 2010

  Integrate with single sign-on solution roles as currently used   Generic  Enterprise Workflow Requirements – Matrix Description Employee review Online Availability Recruiting Workflow Core       Manage and support various Event types       Create, Update or Delete a token X   X Status Changes X...

Img
information-rights-management

Sample Data Rights Management Matrix

December 6, 2010

A Sample protection matrix specifies the operations that are allowable on objects by a process executing in a domain Description Sharepoint access File-share1 File-share2 Database Access File1 Acccess (RW) File1 Acccess (RW) File1 Acccess (RW) File1 Acccess (RO) Printer1 Plotter2 Domain name              ...

Img
projects

ISP Communication / Constraints

December 5, 2010

    ISP Communication / Constraints           Gov’t Owned: Legal Other Area Remote Location Ctry Code ISP GateWay Allow Encryption Allow Satellite Mobile Data Svc Dial-up Mobil Phone E.Africa Ethiopia ET       S N N Y E.Africa Kenya KE        ...

Img
compliances , policies , sample-it-spreadsheets

Sample Excel – Comparison Between Old and Revised ISO 17799 Standards

December 4, 2010

Free – Excel document download An Excellent comparison excel matrix. www.bestitdocuments.com

Img
business

What is an IT Service Request Catalog?

December 3, 2010

The IT Service Request Catalog is a web portal that contains information about all corporate IT Services. It offers many improvements over the current methods that corporate employees once used to request, assign, and fulfill IT service requests. The IT Service Request Catalog provides: · Central repository to document...

Img
security

Sample Support System Security Plan

December 1, 2010

Sample Support System Security Plan System Identification · General Information · System Name / Title · Unique Identifier & Name Given to the System. Responsible Organization · List organization responsible for the application o Name: o Title: o Address: o Phone: o E-mail: Information Contact(s) · Name of person(s) knowledgeable about, or the owner of, the system. More than...

Img