Our documents are based on successfully executed projects which save you time and money.
projects

Sample Project Communications Plan Template

May 10, 2010

It’s rare that an IT project is completed successfully (on time and within budget) without good communications among all the stakeholders.  That’s why it’s so important to make sure your project team develops a communication plan so that lack of communication does not derail your goals. Use this project...

Tags: , , , Img
o-s

Sample HPUX – AIX Backup- Recovery of User Files on Network Servers

May 10, 2010

Purpose To outline the use of network servers for storage, backup and recovery of user files. Scope Discussion: Employees who have Windows NT accounts also have a file storage folder allocated for their account on a network server.  This storage area is usually referred to as the user’s “U:...

Tags: , , , Img
projects

Project Group Objective

May 9, 2010

To be pro-active with our processes to accommodate changing business environments. To maintain and update procedures that support test planning, execution, and reporting efforts involving our various product lines. PI Meeting Structure: Meetings are three fold:   Present new PI taskings   PI team presentations, recommendations, discussion, buy-in  ...

Tags: , , Img
projects

Sample Project Scope Change Request

May 9, 2010

If you or your project team is dealing with project scope creep, use this project scope change request form to gain some control.  Simply ask your clients to fill out this form when requesting a change to the scope of the project. The form asks them to define the...

Tags: , , Img
compliances

Best Practices for Virus Protection

May 8, 2010

First and Foremost, Define your Security Policy Virus Protection has to be part of your security policy because viruses are security threats. What factors should you consider when designing security appropriate to your operation? 1. The number and density of personal computers If your company has many PCs or...

Tags: , , , Img
compliances , policies , sample-it-spreadsheets

HIPPA – Virus Prevention Plan

May 8, 2010

Purpose Computer anti-virus protection has the purpose of ensuring system integrity and substantially reducing the risk of data loss and business disruption in the event of a virus attack on Health Care Providers computer systems. It is the goal of the Health Care Providers that all viruses are detected...

Tags: , , , Img
compliances

PCI Validation Details

May 8, 2010

https://www.bestitdocuments.com/Samples

Tags: , , Img
business

IT Manageability Life Cycle

May 7, 2010

Provision Discover and configure compute, storage and network elements to the operational state Monitor Discover, monitor, and alerting of  the ongoing state, health and performance of services Control Regular and preventative maintenance and service optimizations Fault Preventing, predicting and recovering operational state from faults Upgrade Change management, version control,...

Tags: , , , Img
projects

Project Manager in a nut-shell

May 7, 2010

    Rene Magritte, Clairvoyance, 1936

Tags: , , , Img
business

IT Architecture Driver Pieces

May 5, 2010

Strategic Direction Technology Standards Data Current Architecture Business Drivers Design Drivers Architectural Segments Exec Support Administrative IT Operations Business Architecture Data Architecture Applications Architecture Technology Architecture Asset Management Transitional Processes Target Architecture Strategic Direction www.bestitdocuments.com

Tags: , , Img
o-s

Big Bytes

May 5, 2010

When you start talking about lots of bytes, you get into prefixes like kilo, mega and giga, as in kilobyte, megabyte and gigabyte (also shortened to K, M and G, as in Kbytes, Mbytes and Gbytes or KB, MB and GB). The following table shows the multipliers: Name Abbr....

Tags: , , Img
networking , security

VLAN Security Test

March 11, 2010

Intrusion Detection FAQ: Are there Vulnerabilites in VLAN Implementations? VLAN Security Test Report http://www.sans.org/security-resources/idfaq/vlan.php  

Tags: , , Img
networking , security

Sample VLAN Project Charter

March 11, 2010

  Sample VLAN Project Charter Implement a Virtual Local Area Network Solution Project Overview Business Case Background and Rationale for the project As outlined by the gap analysis our internal auditors, our internal network has numerous security weaknesses. In short, once our local area network (LAN) has been accessed,...

Tags: , , , Img
security , virtual-vmware

Citrix Security Checklist

March 9, 2010

· Does a unique account group for Citrix users exist? · Are default user accounts disabled on the server? · Does the server have the latest security patches installed? · Is the Administrator account name default? · Are one-time-passwords used?

Tags: Img
business , networking , security

Sample Cisco Options Matrix

February 25, 2010

  Networking Devices Description Type Comments Firewall (Internal) Embedded into internal switch   Load Balancer (Internal) Cisco CSS 11500 With SSL Termination/Fiber GigE Load Balancer (Perimeter) Cisco CSS 11500 With SSL Termination/Fiber GigE Router (Border) Cisco 7600 Router Fiber GigE Interface Switch (BOso) Cisco 2900   Switch (Internal) Cisco Catalyst...

Tags: , , , Img
data-center-soc-noc , networking

Sample – Nokia IPSO Alert Table

March 27, 2008

NICAlert-Nokia IPSO (4.2) Conn Table Full: Host.Unix: Field Results View Name Nokia IPSO Conn Table Full Date / Time NIC Domain NIC Site / Location Event Category System.Errors Current Severity Low (1/5) Peak Severity Low (1/5) Peak Time Trend No Change (0.00%) Count 0 Device Name Device IP Device...

Tags: , , Img
compliances , security

Database Mirroring Best Practices

November 2, 2007

Free document download (Raid overview) Database Mirroring Best Practices

Tags: , , Img