Our documents are based on successfully executed projects which save you time and money.
o-s

Windows 2008 Security Guide

October 3, 2010

Windows 2008 Security Guide Windows Server 2008 Security Guide https://www.bestitdocuments.com/Samples

Tags: , , Img
business , sample-it-spreadsheets

Sample Excel – Vendor Technology Organizations and Service Descriptions

September 20, 2010

Free Excel document download Vendor Technology Organizations and Service Descriptions.xls https://www.bestitdocuments.com/Samples

Tags: , , Img
o-s

HP System Insight Port Usage

September 12, 2010

HP System Insight Port Usage

Tags: , Img
o-s

Network Administration on Linux / UNIX

September 1, 2010

TCP/IP Networking origin: ARPANET by the United States Defense Advanced Research Projects Agency (DARPA), 1969 TCP/IP protocol suite ARP, IP, ICMP, UDP, TCP SLIP and PPP Socket Library Networking Hardware Configuration hardware: Ethernet, serial line (RS-232), point-to-point, parallel port device drivers: Ethernet: 3Com, Novell, WD/SMC, HP, D-Link, DEC, …...

Tags: , Img
o-s

Linux / UNIX Basics

August 27, 2010

Login: login: <user account> password: <user password> Logout: logout exit Ctrl-D File Systems: pwd: print current working directory ls [-l] [-a]: List the contents of current directory File attributes: drwxr-xr-x  2 root  root  1024 Jun 4 17:01 bin/ d: [-dlsbc] -> [file,directory,link,special,block,char] permission modes: user (owner)       ...

Tags: , Img
email , sample-it-spreadsheets

PowerPoint – Blackberry Enterprise Server

August 25, 2010

Blackberry Enterprise Server Training. BlackBerry_Enterprise Server.ppt https://www.bestitdocuments.com/Samples

Tags: , Img
o-s

Excellent windows Tweaks and Internal Information

August 20, 2010

Great site for Tweaking Windows and understanding some of the internals. http://www.blackviper.com/

Tags: , , Img
compliances

Cross Industry Document Retention

August 15, 2010

Banking – FDIC/OCC Brokerage – SEC Rule 17a3 and 17a4 Telecom – Title 47, Part 42 Pharmaceutical – FDA Title 21, Part 11 Healthcare – HIPAA Defense – DOD 5015.2 Standard All publicly held – Sarbanes Oxley Act There is a renewed focus of these retention requirements have documented...

Tags: , Img
o-s

Windows Service Checks

August 14, 2010

User mode services: Service name :Browser Display Name :Computer Browser Binary Path :E:WINNTSystem32services.exe Service is running in the security context of LocalSystem The Computer Browser contains a denial of service attack where many spoofed entries can be added. There are many occasions when the browse list is requested from...

Tags: , Img
business , itil

What is the ITIL IT Service Request Catalog

August 13, 2010

The IT Service Request Catalog is usually a web portal inside your organization that contains information about your organization IT Services. It optimizes IT services and improvements over the current methods that your organization used to request, assign, and fulfill IT service requests. The IT Service Request Catalog provides:...

Tags: , Img
o-s

Active Directory Structure

August 7, 2010

To understand Active Directory, the reader should have some knowledge of object oriented concepts. It should be helpful to read the Object Guide on this site. Features: · Network resources are easy to find. · Uses group policies for easier administration · Scalability · Flexibility with the ability to...

Tags: , , Img
business

Sample – Credit Union IT Systems Compliance and Legal Issues

July 15, 2010

1.0 Overview This policy defines the basic elements required for the <Company Name> Information Systems Compliance and Legal Issues Monitoring. 2.0 Purpose To evaluate whether management practices relative to IT have been designed to properly address regulatory compliance and other legal issues. 3.0 Scope The scope of this policy...

Tags: , , Img
o-s

Active Directory Sites

July 12, 2010

A site is a grouping of machines based on a subnet of TCP/IP addresses. An administrator determines what a site is. Sites may contain multiple subnets. There can be several domains in a site. Active Directory replication to various sites is performed using Active Directory Sites and Services. (Make...

Tags: , Img
o-s

Sample System Administration Guide

July 11, 2010

What should be in your System Administrator’s Guide that will help you deploy, support, and maintain applications in your organization. It will also help you create a schedule of maintenance tasks to ensure that systems, servers, databases, and printers, are proactively monitored, audited and secured by your System Administrators....

Tags: , Img
business

Sample Corporate Compliance Agreement

July 5, 2010

Agreement to Comply With Information Security Policies A signed paper copy of this form must be submitted with all requests for 1) Authorization of a new user-ID, 2) Authorization of a change in privileges associated with an existing user-ID, or 3) Periodic reauthorization of an existing user-ID.  Modifications to the terms...

Tags: , , Img
o-s

Active Directory Object Naming

July 3, 2010

Active Directory Naming is based on Lightweight Directory Application Protocol (LDAP) (RFC 1777) and Domain Name System (DNS). Distinguished Name A Distinguished Name (DN) is used to uniquely name an Active Directory Object. All objects can be referenced using a Distinguished Name. A DN has three components:    DC...

Tags: , Img
o-s

Why Backups alone are not enough

June 3, 2010

Poor policy management No Standards or procedures No indexing or search capabilities Poor segmentation Data is “consolidated” on media haphazardly according to source time and place rather than according to policy Data sharing the same media cannot be truly expired Retrieval requests will bring back unrelated data Unworkable as...

Tags: , , Img
projects

Powerpoints – Project Training Slides

June 2, 2010

Project Training PowerPoints Project_Training.zip https://www.bestitdocuments.com/Samples

Tags: , Img
business

Sample – TGIS – Scope of Work

June 2, 2010

System Planning, Design and Implementation Route Design Analysis and Seasonal Field Activity Support Software Development GIS System Automation Hardcopy and Digital Product Development Data Quality Assurance and Reporting Documentation and Standards Requirements gathering continues (will continue throughout the project) Engineering data (mostly in-house) Route design and seasonal field activity...

Tags: , Img
o-s , visio-stencils

Sample Visio – What is a File System?

June 1, 2010

The software used to organize and manage the data stored on disk drives. In addition to storing the data contained in files, a file system also stores and manages important information about the files and about the file system itself. Modern File Systems UFS:  The archetypal Unix file system...

Tags: , Img
compliances

Caring for Archives

May 31, 2010

Physical maintenance of the records All metal paper clips, rusting staples, and rubber bands should be removed. Documents should be in containers that prevent dust from entering Large items should be stored flat. The ideal storage area for records: Amenable to consistent environmental control (temperature and humidity) No water...

Tags: , , Img
business , security

The Loss of Corporate Knowledge

May 31, 2010

The challenges are related to people and strategy: Attracting & Retaining Talented People                                                      9% Identifying the Right Team/Leader for Knowledge                              15% Defining Standard Processes for Knowledge Work                                 24% Setting the Appropriate Scope for Knowledge Initiatives                 24% Mapping the Organizations Existing Knowledge                                     28% Justifying the...

Tags: , , Img
data-center-soc-noc

Management and Support Planning

May 30, 2010

Planning Fundamentals Understand: “To perceive and comprehend the nature and significance of” Communicate: “The exchange of thoughts” Involve: “To contain or include” Document: Take notes, write everything down Technical Architecture Establish a Technical Architecture and use it!!! TA is the hardware, operating system, applications software, transmission medium, and methodology...

Tags: , , Img
compliances

Common Sense Identify Theft

May 30, 2010

Identify Theft With very little information, the criminal can financially drain bank accounts and charge an enormous amount of debt. Identity theft is a growing problem in the United States today. Identity theft occurs when an unauthorized person uses another individual’s personal data and assumes that person’s identity in...

Tags: , , Img
business

TGIS – Sample Engineering Design / Development Considerations

May 30, 2010

Route Design and Seasonal Field Activity Cycles Route Design & Analysis – Happens continuously, but there are critical points where data and map products are required in a timely manner to support the following activities. Thaw Settlement Calculations Frost Heave Calculations Pipeline Design Criteria Stress Analysis for Frost Heave...

Tags: , , , Img
business

News Flash – We would like your technical input

May 27, 2010

Please help us improve the content of this Website and this blog. Please submit your IT Technology documents for consideration to our site, your assistance is greatly appreciated. We are all about fostering a Community of Interest (COIs) Working together for: Deliverables Develop (and harmonize) reusable data exchange components...

Tags: , , Img
business , data-center-soc-noc

Business Continuation Project Considerations

May 27, 2010

Top 8 Things to Communicate Proactively ID and leverage existing information upfront Have a clear definition of scope and deliverables Team structure should include functional representation Equalize the workload between your project content experts Gather feedback along the way to make sure you’re meeting milestones Establish top down support...

Tags: , , , Img
business

What is a process implementation ?

May 26, 2010

Very simple: Where are you now? Where do we want to be? How do we get there? https://www.bestitdocuments.com/Samples

Tags: , , , Img
application

eGIS Technical Needs

May 25, 2010

High speed access into Data Center (Large Spatial Data Loads) Administrative privileges over eGIS database schema’s Security Requirements for  tGIS (external to Collaboration site) Database user  privilege and security requirements Requirements for eGIS data in other systems Data Change Management  process and procedures https://www.bestitdocuments.com/Samples

Tags: , , , Img
business

What is Strategic Outsourcing?

May 24, 2010

Strategic Outsourcing is the utilization of world class skills, technology and resources to consult, develop, and deploy business processes and IT solutions under a multiyear contractual relationship. Strategic Outsourcing thereby affords customers: Increased competitive advantage in their industry Improved cost-to-benefit value relationship in their business Focus on core competencies...

Tags: , , Img
business

What is a Typical RFP?

May 24, 2010

Very detailed, well-constructed document Something that affects all business units Often Involves eCommerce, cross-media production and lots more Typically requires a detailed vendor response, including an on-site presentation and evaluation Home

Tags: , , Img