What is the role of learning in the businuess value chain?

How will learning demonstrate its value to the business for productivity, transformation, innovation processes at individual, team and organizational levels? How to measure business impact when we capture implicit information and convert/transmit it to the right people, right time, to become explicit knowledge? How can learning and knowledge management have a role in the ‘center… Continue reading What is the role of learning in the businuess value chain?

Lots of Bits and Bytes

When you start talking about lots of bytes, you get into prefixes like kilo, mega and giga, as in kilobyte, megabyte and gigabyte (also shortened to K, M and G, as in Kbytes, Mbytes and Gbytes or KB, MB and GB). The following table shows the multipliers: Name Abbr. Size Kilo K 2^10 = 1,024… Continue reading Lots of Bits and Bytes

Quick Reference – Cisco IOS access-list numbering conventions

1 99 IP standard access lists 100 199 IP extended access lists 200 299 Protocol type-code access lists (used in bridging filters) 300 399 DECnet standard access lists 400 499 XNS standard access lists 500 599 XNS extended access lists 600 699 AppleTalk cable range access lists 700 799 MAC address access lists (used in… Continue reading Quick Reference – Cisco IOS access-list numbering conventions

Sample – Grouped Application Monitoring Products

Sample grouped Application Monitoring products Application Monitoring EcoScope EcoTools Interval Pro HP Openview – VPIS HP OVO SiteScope Tivoli Application Performance Monitor (TAPM) Mercury Topaz SAP solution Manager Sysformance – Internet Monitoring tool TopX NewTest IPLABEL Tivoli Service Level Advisor (TSLA) www.bestitdocuments.com

Sample – Application Security Assurance Review

Goals Provide application assurance that the solution or changes to the solution will be adequately safeguarded and will not present a security threat to the IT or business environments. All built-in application, infrastructure, and information controls related to the confidentiality, integrity, availability of IT assets and services have been verified to work correctly by application… Continue reading Sample – Application Security Assurance Review

Sample – PKI Project Requirements

Conditions / capabilities that must be met for the customer to find the product/service acceptable. Migration of existing Certificates for Corp-Signature from the Corporate 2013 CA to the new Corporate 2013 Root CA Migration of existing Certificates for Server SSL from the Corporate 2013 CA to the new Corporate 2013 Root CA Migration of existing… Continue reading Sample – PKI Project Requirements

What are the basics of an Long Term IT Strategic Plan

Objectives: Build an understanding of Business processes Business Applications Systems & Software Application / data flows Policies and Procedures Build Domain Oriented Software Development Environment Minimal outcomes: Created a master list of Network, Systems, Applications / and database systems Mapping of applications to business processes Align sub teams within the core team to business process… Continue reading What are the basics of an Long Term IT Strategic Plan

Required Areas for Encryption Deployment and Approved Encryption Technologies

Category / Description Technology Type Encryption Data In Transit Web traffic across public and internal networks HTTPS / SSL SSL v3128 bit or better Remote access to the corporate network IPSEC VPN or SSL VPN(use of unencrypted PC anywhere, GoToMyPC and similar services are prohibited) 128  bit TDES or better Wireless networks WPA2(Use of WEP… Continue reading Required Areas for Encryption Deployment and Approved Encryption Technologies

Sample – PKI Analysis Project Overview

Objective Provide information and analysis to enable a selection of a Public Key Infrastructure (PKI) strategy and begin implementation of a PKI Specific Results Analysis of alternative PKI approaches Strategic advantages and disadvantages Industry best practices Analysis of specific vendor PKI offerings Strategic advantages and disadvantages Support of specific features of interest Deliverables PKI Requirements… Continue reading Sample – PKI Analysis Project Overview

Sample – Corporate End User OS System Minimal Security Requirements

Malware Protection Systems connected to all corporate networks or storing confidential data will be protected from malware in accordance with the IT Malware and End Point Protection standard. File Integrity Management Systems connected to the corporate network and /or storing confidential data will be protected for file or data integrity in accordance with the IT… Continue reading Sample – Corporate End User OS System Minimal Security Requirements

Sample – Security Architecture Mobile Operating System Considerations

Security Architecture Mobile (smartphone, tablets, etc…) Operating System considerations. Issues: Current standard is not enforceable and are way outdated. No standardized device standards No Mobile Device Management software No Deployment Methodology Not Standardized Processes or procedures No formal technical or security controls in place No device management process Unknown number of personal devices connecting to the… Continue reading Sample – Security Architecture Mobile Operating System Considerations

Sample – Corporate Minimal Wireless Security Requirements

By default, all wireless network segments are prohibited from connecting to the corporate production network, unless authorized by the employee’s first line manager and the Director IT Security Services The Security Service Manager must be informed when wireless segments are connected to the corporate network. The Security Service Manager must approve any deviations from the… Continue reading Sample – Corporate Minimal Wireless Security Requirements

Sample Managed Project Services – Client On-Boarding Process

Program Management office (PMO) The PMO is set up in the early stages and includes “Managed Service Provider” Engagement Manager, “Managed Service Provider” Delivery Manager and Client Program Manager. PMO will provide the umbrella leadership for the entire transition process and during execution. It will have executive sponsorship from “Managed Service Provider” and Corporate and will… Continue reading Sample Managed Project Services – Client On-Boarding Process