Sample Project Communications Plan Template

It’s rare that an IT project is completed successfully (on time and within budget) without good communications among all the stakeholders.  That’s why it’s so important to make sure your project team develops a communication plan so that lack of communication does not derail your goals. Use this project communications planning template to identify the… Continue reading Sample Project Communications Plan Template

Sample HPUX – AIX Backup- Recovery of User Files on Network Servers

Purpose To outline the use of network servers for storage, backup and recovery of user files. Scope Discussion: Employees who have Windows NT accounts also have a file storage folder allocated for their account on a network server.  This storage area is usually referred to as the user’s “U: drive”; and, when the user successfully… Continue reading Sample HPUX – AIX Backup- Recovery of User Files on Network Servers

Project Group Objective

To be pro-active with our processes to accommodate changing business environments. To maintain and update procedures that support test planning, execution, and reporting efforts involving our various product lines. PI Meeting Structure: Meetings are three fold:   Present new PI taskings   PI team presentations, recommendations, discussion, buy-in   Review PI team schedules PI Meeting… Continue reading Project Group Objective

Sample Project Scope Change Request

If you or your project team is dealing with project scope creep, use this project scope change request form to gain some control.  Simply ask your clients to fill out this form when requesting a change to the scope of the project. The form asks them to define the proposed change and allows them to… Continue reading Sample Project Scope Change Request

Best Practices for Virus Protection

First and Foremost, Define your Security Policy Virus Protection has to be part of your security policy because viruses are security threats. What factors should you consider when designing security appropriate to your operation? 1. The number and density of personal computers If your company has many PCs or if there is a high ratio… Continue reading Best Practices for Virus Protection

HIPPA – Virus Prevention Plan

Purpose Computer anti-virus protection has the purpose of ensuring system integrity and substantially reducing the risk of data loss and business disruption in the event of a virus attack on Health Care Providers computer systems. It is the goal of the Health Care Providers that all viruses are detected and contained at the perimeter of… Continue reading HIPPA – Virus Prevention Plan

IT Manageability Life Cycle

Provision Discover and configure compute, storage and network elements to the operational state Monitor Discover, monitor, and alerting of  the ongoing state, health and performance of services Control Regular and preventative maintenance and service optimizations Fault Preventing, predicting and recovering operational state from faults Upgrade Change management, version control, & system staging End of Life… Continue reading IT Manageability Life Cycle

IT Architecture Driver Pieces

Strategic Direction Technology Standards Data Current Architecture Business Drivers Design Drivers Architectural Segments Exec Support Administrative IT Operations Business Architecture Data Architecture Applications Architecture Technology Architecture Asset Management Transitional Processes Target Architecture Strategic Direction www.bestitdocuments.com

Big Bytes

When you start talking about lots of bytes, you get into prefixes like kilo, mega and giga, as in kilobyte, megabyte and gigabyte (also shortened to K, M and G, as in Kbytes, Mbytes and Gbytes or KB, MB and GB). The following table shows the multipliers: Name Abbr. Size Kilo K                        2^10 = 1,024… Continue reading Big Bytes

Sample VLAN Project Charter

  Sample VLAN Project Charter Implement a Virtual Local Area Network Solution Project Overview Business Case Background and Rationale for the project As outlined by the gap analysis our internal auditors, our internal network has numerous security weaknesses. In short, once our local area network (LAN) has been accessed, any person with the proper knowledge… Continue reading Sample VLAN Project Charter

Sample Cisco Options Matrix

  Networking Devices Description Type Comments Firewall (Internal) Embedded into internal switch   Load Balancer (Internal) Cisco CSS 11500 With SSL Termination/Fiber GigE Load Balancer (Perimeter) Cisco CSS 11500 With SSL Termination/Fiber GigE Router (Border) Cisco 7600 Router Fiber GigE Interface Switch (BOso) Cisco 2900   Switch (Internal) Cisco Catalyst 6513   Switch (Perimeter) Cisco Catalyst… Continue reading Sample Cisco Options Matrix

Sample – Nokia IPSO Alert Table

NICAlert-Nokia IPSO (4.2) Conn Table Full: Host.Unix: Field Results View Name Nokia IPSO Conn Table Full Date / Time NIC Domain NIC Site / Location Event Category System.Errors Current Severity Low (1/5) Peak Severity Low (1/5) Peak Time Trend No Change (0.00%) Count 0 Device Name Device IP Device Class Host.Unix Device Type Source IP… Continue reading Sample – Nokia IPSO Alert Table