Network Administration on Linux / UNIX

TCP/IP Networking origin: ARPANET by the United States Defense Advanced Research Projects Agency (DARPA), 1969 TCP/IP protocol suite ARP, IP, ICMP, UDP, TCP SLIP and PPP Socket Library Networking Hardware Configuration hardware: Ethernet, serial line (RS-232), point-to-point, parallel port device drivers: Ethernet: 3Com, Novell, WD/SMC, HP, D-Link, DEC, … SLIP: dial in: /dev/ttyS0, /dev/ttyS1, …… Continue reading Network Administration on Linux / UNIX

Linux / UNIX Basics

Login: login: <user account> password: <user password> Logout: logout exit Ctrl-D File Systems: pwd: print current working directory ls [-l] [-a]: List the contents of current directory File attributes: drwxr-xr-x  2 root  root  1024 Jun 4 17:01 bin/ d: [-dlsbc] -> [file,directory,link,special,block,char] permission modes: user (owner)        read group        … Continue reading Linux / UNIX Basics

Cross Industry Document Retention

Banking – FDIC/OCC Brokerage – SEC Rule 17a3 and 17a4 Telecom – Title 47, Part 42 Pharmaceutical – FDA Title 21, Part 11 Healthcare – HIPAA Defense – DOD 5015.2 Standard All publicly held – Sarbanes Oxley Act There is a renewed focus of these retention requirements have documented retention requirements for electronic records including… Continue reading Cross Industry Document Retention

Windows Service Checks

User mode services: Service name :Browser Display Name :Computer Browser Binary Path :E:WINNTSystem32services.exe Service is running in the security context of LocalSystem The Computer Browser contains a denial of service attack where many spoofed entries can be added. There are many occasions when the browse list is requested from the maintainer or backup browser eg.… Continue reading Windows Service Checks

What is the ITIL IT Service Request Catalog

The IT Service Request Catalog is usually a web portal inside your organization that contains information about your organization IT Services. It optimizes IT services and improvements over the current methods that your organization used to request, assign, and fulfill IT service requests. The IT Service Request Catalog provides: · Central repository to document IT… Continue reading What is the ITIL IT Service Request Catalog

Active Directory Structure

To understand Active Directory, the reader should have some knowledge of object oriented concepts. It should be helpful to read the Object Guide on this site. Features: · Network resources are easy to find. · Uses group policies for easier administration · Scalability · Flexibility with the ability to add new classes, attributes, and objects.… Continue reading Active Directory Structure

Sample – Credit Union IT Systems Compliance and Legal Issues

1.0 Overview This policy defines the basic elements required for the <Company Name> Information Systems Compliance and Legal Issues Monitoring. 2.0 Purpose To evaluate whether management practices relative to IT have been designed to properly address regulatory compliance and other legal issues. 3.0 Scope The scope of this policy includes all personnel, including external vendors,… Continue reading Sample – Credit Union IT Systems Compliance and Legal Issues

Active Directory Sites

A site is a grouping of machines based on a subnet of TCP/IP addresses. An administrator determines what a site is. Sites may contain multiple subnets. There can be several domains in a site. Active Directory replication to various sites is performed using Active Directory Sites and Services. (Make section explaining how to use this).… Continue reading Active Directory Sites

Sample System Administration Guide

What should be in your System Administrator’s Guide that will help you deploy, support, and maintain applications in your organization. It will also help you create a schedule of maintenance tasks to ensure that systems, servers, databases, and printers, are proactively monitored, audited and secured by your System Administrators. You can use this System Administration… Continue reading Sample System Administration Guide

Sample Corporate Compliance Agreement

Agreement to Comply With Information Security Policies A signed paper copy of this form must be submitted with all requests for 1) Authorization of a new user-ID, 2) Authorization of a change in privileges associated with an existing user-ID, or 3) Periodic reauthorization of an existing user-ID.  Modifications to the terms and conditions of this agreement will… Continue reading Sample Corporate Compliance Agreement

Active Directory Object Naming

Active Directory Naming is based on Lightweight Directory Application Protocol (LDAP) (RFC 1777) and Domain Name System (DNS). Distinguished Name A Distinguished Name (DN) is used to uniquely name an Active Directory Object. All objects can be referenced using a Distinguished Name. A DN has three components:    DC – Domain Component    O –… Continue reading Active Directory Object Naming

Why Backups alone are not enough

Poor policy management No Standards or procedures No indexing or search capabilities Poor segmentation Data is “consolidated” on media haphazardly according to source time and place rather than according to policy Data sharing the same media cannot be truly expired Retrieval requests will bring back unrelated data Unworkable as everything we need archives for… Legal… Continue reading Why Backups alone are not enough

Sample – TGIS – Scope of Work

System Planning, Design and Implementation Route Design Analysis and Seasonal Field Activity Support Software Development GIS System Automation Hardcopy and Digital Product Development Data Quality Assurance and Reporting Documentation and Standards Requirements gathering continues (will continue throughout the project) Engineering data (mostly in-house) Route design and seasonal field activity processes Oracle and GIS development environments… Continue reading Sample – TGIS – Scope of Work

Sample Visio – What is a File System?

The software used to organize and manage the data stored on disk drives. In addition to storing the data contained in files, a file system also stores and manages important information about the files and about the file system itself. Modern File Systems UFS:  The archetypal Unix file system still widely available from Unix vendors… Continue reading Sample Visio – What is a File System?

Caring for Archives

Physical maintenance of the records All metal paper clips, rusting staples, and rubber bands should be removed. Documents should be in containers that prevent dust from entering Large items should be stored flat. The ideal storage area for records: Amenable to consistent environmental control (temperature and humidity) No water pipes running nearby Little or no… Continue reading Caring for Archives

The Loss of Corporate Knowledge

The challenges are related to people and strategy: Attracting & Retaining Talented People                                                      9% Identifying the Right Team/Leader for Knowledge                              15% Defining Standard Processes for Knowledge Work                                 24% Setting the Appropriate Scope for Knowledge Initiatives                 24% Mapping the Organizations Existing Knowledge                                     28% Justifying the Use of Scarce Resource for Knowledge… Continue reading The Loss of Corporate Knowledge

Management and Support Planning

Planning Fundamentals Understand: “To perceive and comprehend the nature and significance of” Communicate: “The exchange of thoughts” Involve: “To contain or include” Document: Take notes, write everything down Technical Architecture Establish a Technical Architecture and use it!!! TA is the hardware, operating system, applications software, transmission medium, and methodology for an information platform. Standards Based… Continue reading Management and Support Planning

Common Sense Identify Theft

Identify Theft With very little information, the criminal can financially drain bank accounts and charge an enormous amount of debt. Identity theft is a growing problem in the United States today. Identity theft occurs when an unauthorized person uses another individual’s personal data and assumes that person’s identity in making financial transactions. In order to… Continue reading Common Sense Identify Theft

TGIS – Sample Engineering Design / Development Considerations

Route Design and Seasonal Field Activity Cycles Route Design & Analysis – Happens continuously, but there are critical points where data and map products are required in a timely manner to support the following activities. Thaw Settlement Calculations Frost Heave Calculations Pipeline Design Criteria Stress Analysis for Frost Heave Stress Analysis for Thaw Settlement Thermal-Hydraulic… Continue reading TGIS – Sample Engineering Design / Development Considerations

News Flash – We would like your technical input

Please help us improve the content of this Website and this blog. Please submit your IT Technology documents for consideration to our site, your assistance is greatly appreciated. We are all about fostering a Community of Interest (COIs) Working together for: Deliverables Develop (and harmonize) reusable data exchange components Training and Technical Assistance Leverage (Internal… Continue reading News Flash – We would like your technical input

Business Continuation Project Considerations

Top 8 Things to Communicate Proactively ID and leverage existing information upfront Have a clear definition of scope and deliverables Team structure should include functional representation Equalize the workload between your project content experts Gather feedback along the way to make sure you’re meeting milestones Establish top down support and participation Build in project review… Continue reading Business Continuation Project Considerations

eGIS Technical Needs

High speed access into Data Center (Large Spatial Data Loads) Administrative privileges over eGIS database schema’s Security Requirements for  tGIS (external to Collaboration site) Database user  privilege and security requirements Requirements for eGIS data in other systems Data Change Management  process and procedures https://www.bestitdocuments.com/Samples

What is Strategic Outsourcing?

Strategic Outsourcing is the utilization of world class skills, technology and resources to consult, develop, and deploy business processes and IT solutions under a multiyear contractual relationship. Strategic Outsourcing thereby affords customers: Increased competitive advantage in their industry Improved cost-to-benefit value relationship in their business Focus on core competencies Reasons to Outsource Improved speed-to-market Relationship/partner… Continue reading What is Strategic Outsourcing?