Our documents are based on successfully executed projects which save you time and money.
email

Exchange Disaster Recovery Plan/Restoration of Individual Mailboxes

March 4, 2010

In the event that the Exchange Server (5.5 / 2000) might fail, the following is a proposed solution for restoring the database files while minimizing system downtime. This process can also be used in case there is a need to restore the contents of an individual’s mailbox. I have...

Img
email

Sample – simple Steps to Exchange 55 – 2k in the same domain

March 4, 2010

These steps worked for this project. Not all projects details can be generalized this way. Always research your environment and rationalize you solutions based on your facts and requirements. 1. On the target domain controller cleanup and any existing DNS records for the target domain. 2. Backup the DC...

Img
networking , security

Switching Analysis Check Considerations

March 4, 2010

1. Scale-able Speeds 2. Bandwidth & Connection Management 3. Congestion Control & Switch Capacity 4. Industry standards 5. Internetworking 6. Fault Tolerance 7. Modularity 8. Common Manageability § Common Console § Common Alerting o Trap implementation across all products o Importing new MIBs § Your customers § Other vendors o Start Sniffer Trace File Capture o Quarantine (AV from enterprise) 9.   Common Reporting 10. Common...

Img
o-s

Legacy – PC Various Hardware speeds

March 4, 2010

  Service Value Units ECP/EPP PC to PC Connection (Parallel Port) 2 Mbps ATA Hard Drive PIO Mode 0 3.33 Mbps ATA Hard Drive PIO Mode 1 5.22 Mbps Asymmetric Digital Subscriber Line (ADSL) Downstream 6 Mbps ATA Hard Drive PIO Mode 2 8.33 Mbps ATA Hard Drive PIO...

Img
data-center-soc-noc , networking

Network Connection Speeds detailed.

March 4, 2010

   Carrier Technology Speed Physical Medium Notes Dial-up AccessPlain Old Telephone System (POTS) 2400 bps to 56 Kbps Twisted Pair On demand access. Switched 56 Requires modem and POTS line. Slow and varies with line quality. Switched 56 2400 bps to 56 Kbps   Requires modem and POTS line....

Img
networking

Voice Encryption Overview

March 3, 2010

Built from three components Speech Compression – Encryption – Modem – Hardware Based . DSP with GSM or CELP Speech compression . DSP modem Software-based . GSM or CELP in software . External modem or TCP/IP network connection Mostly built from off-the-shelf-part (GSM DSP, modem, DSP, software building blocks)...

Img
information-rights-management

What is Single Sign-On

March 2, 2010

With Single Sign-On a user needs only one user ID and password this eliminates the security headaches and vulnerabilities associated with multiple IDs / passwords. This solution simplifies and frees security administrators from the mundane task of assigning passwords, enabling them to perform much more important tasks that directly...

Img
information-rights-management , security

IAM Useful Glossary

March 2, 2010

Access Control An access control limits the use of a resource. Only those people, programs or devices that are specifically permitted to use the resource will have access. In addition, an access control will usually limit use to specific types of access; someone can read a file but not...

Img
information-rights-management , security

Sample SSO Deployment

March 2, 2010

Process / Functional Requirements Functionality: Users should login only once to their PC.  Then be able to access all applications without logging in again. If integration of Single Sign On solution is not possible with NT domain/AD, users should be able to log into one application and be automatically...

Img
information-rights-management , security , visio-stencils

Sample Visio – IAM Deployment Process

March 2, 2010

The first step in implementing an identity management solution is identifying business objectives, policies and strategies both current and future.  next, a complete evaluation of the identity repositories, current identity management implementations (i.e., synchronizing messaging and desktop Ids), political boundaries and current vendor capital investments and loyalty.  This is...

Img
application , projects

Use Case to Relational Mapping Sample

March 2, 2010

  The following table describes shortly the single relations between the information entities (it’s worth to note that in principle each relationship is a many-to-many relationship): Source Destination Relationship Description Features Vision & Scope Rational A feature is traced back to a goal stated in Vision & Scope, i.e....

Img
security

Knowledge Management Key Points

March 2, 2010

Regulators have updated Contingency Planning guidance since 9-11.  Financial institutions should ensure that Disaster Recovery and contingency include any new requirements. Financial institutions should compare federal and state regulatory requirements to ensure more stringent requirements are adequately addressed. Review existing plans to ensure natural area, building complex and terrorist...

Img
business , networking

Computer Lab Design Considerations

March 1, 2010

IT is often asked for advice by departments planning a computing facility. This document outlines the considerations that should be made when planning such a facility. If you need additional information, or want details on the implementation of a specific IT computing facility, please send e-mail to IT team....

Img
projects

Project Definitions

March 1, 2010

Objectives: To examine specific processes and procedures used by the Systems group and / or other operations groups.  Measurements and evaluations of these designated processes will be used to determine items that could be revised or upgraded to increase efficiencies or enhance operational support systems. Scope: Processes from the...

Img
business , networking

Sample PC and LAN Support Services Agreement

February 28, 2010

This is just a tempalte, always seek proper legal advise when doing consulting. Consultant: Client: Contract Date: PC and Lan Support Services Agreement (the “Agreement”), made as of this xxx day of Month, 2009 (the “Effective Date”) between client (“Client”), and xxxxxxxx, (“Consultant”).   (Client and Consultant are hereinafter collectively...

Img
business , compliances , networking , security

Personal Computer / LAN Security Guidelines

February 28, 2010

Incorporate the following tips into your daily routine to ensure that any pc or LAN you use is secure · Lock your pc with a power on password · Lock your pc with a keyboard password when away from your desk · Back up your work regularly · Store and lock diskettes...

Img
o-s

Computer Replacement Considerations

February 28, 2010

Options 1. Reseller / distributor agreement—subscribers afforded vendor commitment of best effort” to expedite sale of hardware if it is available at time of disaster 2. Pre-arranged rental agreement—subscribers assured that hardware will be readi­ly available for expedited shipment and can be used/rented for the recovery period 3. Dedicated storage /...

Img
business , compliances

Creating Customer Service

February 28, 2010

Everyone seems to agree customer service is critical but few practice what they preach.  The industry needs more than fancy rhetoric and catchy slogans to keep customers happy. What are needed is adequate service staffing, training, and supervision to make sure every effort is made to keep your customer’s...

Img
networking

How fast is a Cable Modem

February 28, 2010

There is no single answer to that one, depends who you ask… You connect your computer (Mac or PC) to the CABLE / DSL modem via your standard 10Base-T Ethernet connection. So, how fast does it really go? Well, I’ve seen it go over 650Kbytes / sec. Web pages...

Img
o-s

Keeping Operating Systems and Applications up to date

February 28, 2010

Develop and maintain a list of sources of information about security problems and software updates for your system and application software. The most common sources of current information include Web sites of vendors and computer- and network-security organizations. Lists and Web sites appear, disappear, and change frequently. You need...

Img
o-s , sample-it-spreadsheets

PC Preventive Maintenance Suggestions

February 28, 2010

Here’s a checklist of 27 things you can do to keep your users happy and online. 1) E-mail your computer users. Let your clients know in advance what will be happening on the preventive maintenance visit. Users get attached to their systems, and seeing something change can be upsetting to...

Img
projects , sample-it-spreadsheets

Project Management Methodology Summary

February 28, 2010

The “Program Office” is a project management methodology that provides a process for managing projects. As organizations continues to grow, so does the need for new projects that will provide new and exciting services to the end –user. The Project Management Methodology will assist project team leads and team...

Img
business , compliances , o-s

System Configuration Guidelines and Considerations

February 28, 2010

Hardware Inventory Complete evaluation of all existing hardware o   Configuration o   Date purchased o   Depreciated value o   Replacement cost o   Appropriateness of work Report by hardware item o   Present Cost o   Life expectancy o   New cost o   Depreciated value o   Repair costs o   Planned replacement date Software inventory o  ...

Img
compliances , security

What is a DoS Attack

February 28, 2010

A specific directed attempt by individuals to cripple or deny access to technology resources. Most Dos attacks are directed to Internet online services. Techniques: Resource Exhaustion Attacks Flood the victim (server) with packets Bandwidth Consumption Attacks Overload packet processing capacity Saturate network bandwidth Result of the attack Network starvation...

Img
compliances , security

Anatomy of a hack

February 28, 2010

1. Acquire target 2. Footprint the system 3. Gain entry to system 4. Escalate privileges 5. Exploit system resources 6. Leave backdoor for later 7. Clean up, get out, cover tracks Risk management · It’s not a matter of if a computer security breach will happen, it’s a matter of when, and how prepared will you...

Img
email

Isn’t Traditional Anti-Virus Protection Enough

February 28, 2010

If your desktops and file servers are protected with quality anti-virus software, why bother applying an additional tier of protection at your Notes or Exchange servers, and at your Internet SMTP mail server? Isn’t traditional anti-virus protection enough? In the vast majority of cases, the answer to this question...

Img
application , security , web-services

Useful SQL Commands

February 28, 2010

SQL Commands Begin Statements that make up the block. Built In functions Most SQL data functions are supported within PL/SQL blocks. Code storage Blocks may be stored within an Oracle database as procedures, functions, packages (a group of blocks) and triggers. Composite Datatypes Records allow groups of fields to...

Img
application , security , web-services

SQL Design Considerations

February 28, 2010

In order to assist us in designing your database, please have your applications and dba review and answer the following questions. SQL: • Has SQL been explained/optimized? • Have ‘bind variables’ been used? ie select * from my.table where name = :b1; Bind variables are not actually substituted until...

Img
business , o-s

Planning a Backup Strategy

February 28, 2010

Planning a Backup Strategy You should have a solid backup plan in place before any application is ever moved from a development/test environment into a production environment. In addition, just as you would never put an untested application into production, you should never go into production without testing your...

Img
application , security , web-services

SQL Security Overview

February 28, 2010

SQL, maintains it own internal security umbrella including password encryption, password aging, minimum length restrictions on passwords and user account management resources. Integrated security relies on trusted connections, which are only available with both named pipes protocol and MS new RPC based multi-protocol net library. Because SQL Server supports...

Img
o-s , policies , security

Hotel Room Security

February 28, 2010

Security in your own hotel room should be a top priority, whether you are traveling for business or pleasure. In an attempt to make your valuables more secure, many hotels are tightening security by installing small safes in every room and issuing coded insert cards instead of numbered keys...

Img