Goal Setting Info

Healthy organizations have goals at all levels. Both organizations and individuals need to manage their affairs against goals Explicit Measurable Obtainable Hard, specific goals, if accepted by the individual, will lead to increased team performance. Teams Teams outperform individuals acting alone or in larger organizational groupings, especially when performance requires multiple skills, judgments and experiences.… Continue reading Goal Setting Info

Challenges of IT Infrastructure

The development of the internet has been seen as the most significant advance in IT for many years. In essence, what it does is to allow any computer with a communication channel to offer its contents to anyone else and to get material back from any other connected computer in return. This has come about… Continue reading Challenges of IT Infrastructure

Business goals for the future

Corporate America needs to develop a clear understanding of what it will take to become profitable and build on or Extend market share. Developing tactical strategies to attain these goals should be based on short-term and strategic long-term goals.   Reduce and Control Operating Costs The single most important tactical reason for outsourcing is to reduce… Continue reading Business goals for the future

Bull or Bear in IT

                 Bull Market                                  Bear Market Big spending wins eyeballs. Smart spending wins customers. Customer acquisition is a priority. Smart spending wins customers. Company merge to look big. Customer retention is a priority. We’ll be the next Yahoo. Companies merge order to survive. Free offers lure new customers. We’re not the next Yahoo. It’s an ad sellers… Continue reading Bull or Bear in IT

Legal Compliance and E-Discovery

Aurthor unknown. Always verify your research. Targeted audience: (Attorneys and legal practitioners) New rules for electronic discovery adopted as part of the Federal Rules of Civil Procedure (FRCP) went into effect December 1, 2006. The purpose of these rules is to streamline e-discovery requests. In an attempt to minimize the number of motions to compel… Continue reading Legal Compliance and E-Discovery

Technology Sustainment

In sustainment, the system is in use and evolves through periodic and event-driven maintenance and upgrades. For software-intensive systems, Sustainment presents critical challenges to maintaining the security posture. Maintenance in the operational environment is essential to provide for system restoral in the case of failure and for rapid resolution of Business objectives-impacting deficiencies. In the… Continue reading Technology Sustainment

Protocol Overviews

A number of different protocols exist that each satisfies the key characteristics of a VPN. The most commonly recognized protocols are: SOCKS SSL · SSL (Secure Sockets Layer), working only with TCP/IP protocols is the primary protocol for secure connections to web servers, requiring a valid site certificate issued from an authorized certificate authority. · SSL… Continue reading Protocol Overviews

Sample Access & Authentication Scope

A high-level outline was developed with input from the each discipline.  The outline centers on the ability to identify data classifications and the assignment of access controls. The documents that will be generated are: 1.  Summary document in outline form 2.  Authentication and Access Control Strategy 3.  Network Access Strategy  Action Items 1.      A 2.     … Continue reading Sample Access & Authentication Scope

Sample Consulting Insurance Requirements

Always seek proper legal advise for your organization. These pages provide an explanation and example of corporate’s minimum insurance requirements. During the term of an agreement and without cost to corporate, suppliers are required to maintain and ensure that their subcontractors maintain the following insurance coverage with reputable insurance companies satisfactory to Corporate. Primary Commercial… Continue reading Sample Consulting Insurance Requirements

Sample Course Development Guidelines

Considerations for each class: · Create agenda – sessions and approximate timings · Create detailed course outline · Consider prerequisite reading and assignments that would help folks prepare for the class · Identify any prerequisite hardware,& software (including downloads) · Plan course exercises and activities · Plan testing strategy · Course logistics Track Strategy courses (1/2 day web cast course · Class… Continue reading Sample Course Development Guidelines

Healthcare Industry Segmentation

Healthcare Payers National Health Insurance Plans Federal Government (CMS – Medicare) State Government (DHHS – Medicaid) Healthcare Providers Hospitals Long-Term Care Facilities Physician Medical Practices Specialty Care Providers (Outpatient, Oncology, etc) Affiliated Organizations Clearinghouses, Third Party Administrators, etc. Key Business Drivers The revenue source of a hospital is driven by patient flow Physician referral is… Continue reading Healthcare Industry Segmentation

Which User Files on your Windows 200x Workstation Should Be Backed Up?

Introduction: All PC users are provided with a hard drive in order to store their local data. To assure that important information is not lost in the event disk drive disaster, each person must establish a strategy to back up their own data. “Back up” is the process used to duplicate files on an alternate… Continue reading Which User Files on your Windows 200x Workstation Should Be Backed Up?

Startup Apps and Windows 2000-based Services

Excellent reference – Searchable, comprehensive list of the programs you may find that run when you switch on your PC: http://www.pacs-portal.co.uk/startup_content.php#THE_PROGRAMS – Full-list ZIP Windows 2000 startup services   Service Full Name Default Alerter  Alerter  Automatic  AppMgmt  Application Management  Manual  ClipSrv  ClipBook  Manual  EventSystem  COM+ Event System  Manual  Browser  Computer Browser  Automatic  DHCP  DHCP Client … Continue reading Startup Apps and Windows 2000-based Services

Sample End-to-End Performance Goals

End-To-End Performance                 Performance Goals System and Application Windows SAP GUI  End-to-end Performance ([Client] will consider these as goals and monitor the actual results): Macintosh JAVA GUI 90% of identified representative transactions complete:   <  3 seconds Windows HTML GUI 90% of identified representative transactions complete:   <  6 seconds  

Assets

An asset is anything that has some value to an organization. Asset Identification • It is necessary to determine the assets that need protection, their value, and level of protection required • Two Types: » Tangible » Intangible Tangible Assets • Tangible assets are physical • Examples: » Personnel » Offices, workspaces, warehouses, etc. » Inventory, stores, supplies, etc. » Servers and workstations » Network… Continue reading Assets

Help Desk System Assessment

Overall Objective [Vendor] Consultant will conduct a working session with all relevant personnel to review Customers goals and processes as they relate to their current Help Desk installation in order to provide specific system and process recommendations. [Vendor] Consultant will spend one day at client site and a second day completing assessment report. Typical Client… Continue reading Help Desk System Assessment

How to Stop and Restart the Ace Service on the RSA Service

Analysis:             On the RSA Server do:                         ps – ef | greg ace  (lower-case)  – check to see if the ace process is running if not su –             su – ace   “provide password” To start from scratch (note the order):         /var/ace/prog/aceserver stop        1st (stops the ACE Server)         /var/ace/prog/sdconnect stop       2nd (stops… Continue reading How to Stop and Restart the Ace Service on the RSA Service

Sample Help Desk Consolidation Project

The help desk consolidation project will start with an assessment of the existing Help Desk structure, and include the collection of the current staffing model, organization chart, the flow and management of incidents and reporting, review of the tiered support model, review of the volume and types of incidents, review of the amount of time… Continue reading Sample Help Desk Consolidation Project

Master Project Plan Check List

Project Code Project/Application Name Project Acronym Project Coordinator QCC Date Received Date Completed Document Section Description First Review Second Review Third Review Mandatory Checks Does the cover page identify the Application with its Name and Project Code? Have the appropriate Authorities approved this deliverable (via signature or appropriate email approval)? Is the Revision History current?… Continue reading Master Project Plan Check List

Keep project team meetings on task

How many times has this happened to you? You attend a meeting where members of a project team have enthusiastically volunteered to complete a variety of assignments. Then, a week later at a follow-up meeting, very few team members completed their assignments while others could not even remember the task they were assigned to complete. … Continue reading Keep project team meetings on task

Regulation Impact by IT Technology Domains

Sarbanes Oxley Act HIPAA Gramm-Leach-Bliley Act SEC 17a-4 and NASD and NASD Financial compliance, business process measurement applications X Enterprise resource planning X Business intelligence and data warehousing X Content/document  management and search X X X X Data/application integration X Business process automation X X Records management and email archiving X X Storage, software, and… Continue reading Regulation Impact by IT Technology Domains

Sample Visio – MIL-STD-100 and DOD-STD-1000

Free Visio Document download MIL-STD100_Sample.vsd The MIL-STD-100 and DOD-STD-1000 standards suck, they are vague and generally interpretive and un-atainable. Below are some recommendations for at least good guidelines. Items necessary for good network documentation Identification of servers, workstations, printers, routers, switches, etc. IP addresses NetBIOS/Host names MAC addresses Description of each device on the network,… Continue reading Sample Visio – MIL-STD-100 and DOD-STD-1000

Sample MIL-STD-100 Objectives

The primary objective of the Standard Operating Environment was to develop the platform baseline for the Network Management Systems for Corporate campuses (Corporate NSM).   This standard methodology would then be applied to all campuses in the implementation of the Enterprise Network Management Platform. · Detail the NSM solution including hardware architecture, software architecture and Operating… Continue reading Sample MIL-STD-100 Objectives

Software Security and SDLC Considerations

Technical security architecture Application security architecture Application security architecture document Architecture control board Data model Data security architecture document Data security architecture Platform security architecture Platform security architecture document Enterprise architecture governance Security in the system development lifecycle Security requirements of information systems Security requirements analysis and specification Define information system security requirements Information system… Continue reading Software Security and SDLC Considerations

Information system Catalog service management Considerations

Configuration and asset management Release Management Development Integration  Service Desk / Help Desk    Capacity management Create and maintain a capacity plan Operational procedures and responsibilities Documented operating procedures Change control procedures Technical review of applications after operating system changes Restrictions on changes to software packages Change management Information security aspects of problem management Change… Continue reading Information system Catalog service management Considerations

Autocad 2006/7 File Path Settings

Suggested Autocad Settings for reliable and optimal performance. Support File Search Path C:Document and SettingsAdministratorapplication DataAutodeskAutodesk Land Desktop 2006/7R16.2enusupport C:Program FilesAutodesk Land Desktop 2006/7support C:Program FilesAutodesk Land Desktop 2006/7fonts C:Program FilesAutodesk Land Desktop 2006/7help C:Program FilesAutodesk Land Desktop 2006/7express C:Program FilesAutodesk Land Desktop 2006/7supportcolor C:Program FilesAutodesk Land Desktop 2006/7land C:Document and SettingsAdministratorLocal SettingsApplication DataAutodeskAutodesk Land… Continue reading Autocad 2006/7 File Path Settings

Identifying Identity Management Needs

Author unknown  Is your network a collection of different systems and applications? Are there multiple directories and data systems? Are there users and other data objects stored in multiple places? How is the environment managed? How are new accounts created for users each time a new application is added? Does a single change event cause… Continue reading Identifying Identity Management Needs

Solaris Role-Based Access Controls

UNIX administrators have wanted more fine-grained access control to administrative features almost since the first administrator accidentally destroyed his first system. As of Solaris 8, Sun has delivered a solution to that problem. But is the solution for you? The Current State The UNIX concept of a “superuser” who could do all is a good… Continue reading Solaris Role-Based Access Controls

Manually Configuring Privileges

The manual process for provisioning poses a huge challenge for today’s businesses. Believe it or not, most companies still use manual processes to provision access rights to users. Step 1  First, when an employee is hired, a new user profile is created and stored in an HR database. Step 2 A request for access is… Continue reading Manually Configuring Privileges

Suggested Exchange pre-requisites

  Exchange 2000 Pre-requisites Server OS Domain Version Domain mode Runs NT4 All Versions All Modes NO W2k NT4   NO W2k3 NT4   NO W2k W2k All Modes YES W2k W2k3 All Modes YES W2k3 All Versions All Modes NO Exchange 2k3 runs well in Windows 2000 Server OS Domain Version Domain mode Runs… Continue reading Suggested Exchange pre-requisites

Sample Server Configurations

Sample Server Configurations Server Type Reference Description Lab Implementation 1 Dual P3, with 2Gb of RAM, 2 18GB disks for OS 4 NIC ports, 1 Remote Mgmt Port HP DL360G2 (2 – PIII 1.266Ghz) with NC3134 dual port card, 2 10KRPM 18GB drives, iLO Mgmt Port 2 Dual P4, with 2Gb of RAM, 2 18GB… Continue reading Sample Server Configurations