Registry Key Quick Reference

Hkey_Classes_Root              This key displays information about OLE and associated mappings to support drag-and-drop operations. Hkey_Current_User            This points to a branch of Hkey_Users for the currently logged on user. Hkey_Local_Machine          This contains computer specific information including installed hardware and software. This is the one I tend to spend the most time in. Hkey_Users                           This contains information… Continue reading Registry Key Quick Reference

Windows Registry Key Quick Reference

Hkey_Classes_Root This key displays information about OLE and associated mappings to support drag-and-drop operations. Hkey_Current_User This points to a branch of Hkey_Users for the currently logged on user. Hkey_Local_Machine This contains computer specific information including installed hardware and software. This is the one I tend to spend the most time in. Hkey_Users This contains information… Continue reading Windows Registry Key Quick Reference

Personnel Security Suggestions

Organizations should develop, document, and implement policies and procedures for the selection, orientation, and supervision of employees and contractors who have access to IT resources. The objective is to ensure that a high level of integrity and satisfactory staff conduct is achieved and maintained, and to promote an awareness of security matters. The following are… Continue reading Personnel Security Suggestions

Business Risk Impact

Risk is based on a systematic examination of assets, threats, and vulnerabilities that provides the foundation for the development of an appropriate IT Security Program.  Adequate risk analysis is the key to determining the level of protection required for all computing assets such as networks, applications, systems, facilities and other enterprise assets.  A risk analysis… Continue reading Business Risk Impact

Best Practices – Servers (Windows, Unix, AIX, etc…)

Physical Security Secure location or Server room. Server room locked. Server room with adequate, conditioned power. Server room with air conditioning. Server room with adequate ventilation. Services Unused default services removed. Known OS vulnerabilities are current and protected. Current patches and upgrades loaded and tested. Audit logs enabled. Access Privileges Only privileges necessary to the… Continue reading Best Practices – Servers (Windows, Unix, AIX, etc…)

List of Applicable Policies, Laws, and Standards

The law, regulations, polices, and guidelines that affect the system include: U.S. Congress – Public Law (PL) and United States Code (U.S.C) PL 107-347 Section III, Federal Information Security Management Act (FISMA) of 2002, 2002 PL 107-305, Cyber Security Research and Development Act of 2002 PL 96-456, Classified Information Procedures Act of 1980 5 U.S.C.… Continue reading List of Applicable Policies, Laws, and Standards

Desktop Virtualization XP, Vista, Windows PC Alternatives

There are many choices these day’s for your desktop solitions below a matrix that gives you more to consider especially related to virtualization.  Free Virtualization document download.  Desktop Virtualization Function Traditional PC SMC Thin Client Server Virtualization Video/Audio performance same as traditional PC  Yes Yes No No Peripherals compatibility with traditional PC  Yes Yes No… Continue reading Desktop Virtualization XP, Vista, Windows PC Alternatives

Windows 2000 Internet Information Server

IIS Components File transfer Protocol (FTP) Server World Wide Web (WWW) Server Simple Mail Transfer Protocol (SMTP) Service Network News Transport Protocol (NNTP) Service FrontPage 2000 Server Extensions Internet Services Manager (HTML) Internet Information Services Snap-in Visual InterDev RAd Remote Deployment Support Indexing Service Certificate Services Windows 2000 Professional can only support 10 network connections… Continue reading Windows 2000 Internet Information Server

IBM Guardium Appliance Port Usage

IBM Guardium Appliance port usage Database Server to Collector Appliance: Port Protocol Description 16016 TCP Linux/UNIX only, both directions, STAP (the probe installed on the database servers) registration, heartbeat, & data 16018 TCP Encrypted:Linux/UNIX only, both directions, STAP registration, heartbeat, & data 8075 UDP Windows only, both directions, STAP heartbeat 9500 TCP Windows only, DB… Continue reading IBM Guardium Appliance Port Usage

Suggested Security Architecture Overview

The security architecture is the layout and design of hardware employed to protect private networks. Best practices dictate that the architecture of a private network linked to the internet be divided by four distinct barriers: front – end firewall, proxy server, web server and back-end-firewall. These barriers are ordered from outside internet access through each… Continue reading Suggested Security Architecture Overview

Active Directory Structure

To understand Active Directory, the reader should have some knowledge of object oriented concepts. It should be helpful to read the Object Guide on this site. Features: · Network resources are easy to find. · Uses group policies for easier administration · Scalability · Flexibility with the ability to add new classes, attributes, and objects.… Continue reading Active Directory Structure

Why Backups alone are not enough

Poor policy management No Standards or procedures No indexing or search capabilities Poor segmentation Data is “consolidated” on media haphazardly according to source time and place rather than according to policy Data sharing the same media cannot be truly expired Retrieval requests will bring back unrelated data Unworkable as everything we need archives for… Legal… Continue reading Why Backups alone are not enough

Caring for Archives

Physical maintenance of the records All metal paper clips, rusting staples, and rubber bands should be removed. Documents should be in containers that prevent dust from entering Large items should be stored flat. The ideal storage area for records: Amenable to consistent environmental control (temperature and humidity) No water pipes running nearby Little or no… Continue reading Caring for Archives

The Loss of Corporate Knowledge

The challenges are related to people and strategy: Attracting & Retaining Talented People                                                      9% Identifying the Right Team/Leader for Knowledge                              15% Defining Standard Processes for Knowledge Work                                 24% Setting the Appropriate Scope for Knowledge Initiatives                 24% Mapping the Organizations Existing Knowledge                                     28% Justifying the Use of Scarce Resource for Knowledge… Continue reading The Loss of Corporate Knowledge

Management and Support Planning

Planning Fundamentals Understand: “To perceive and comprehend the nature and significance of” Communicate: “The exchange of thoughts” Involve: “To contain or include” Document: Take notes, write everything down Technical Architecture Establish a Technical Architecture and use it!!! TA is the hardware, operating system, applications software, transmission medium, and methodology for an information platform. Standards Based… Continue reading Management and Support Planning

TGIS – Sample Engineering Design / Development Considerations

Route Design and Seasonal Field Activity Cycles Route Design & Analysis – Happens continuously, but there are critical points where data and map products are required in a timely manner to support the following activities. Thaw Settlement Calculations Frost Heave Calculations Pipeline Design Criteria Stress Analysis for Frost Heave Stress Analysis for Thaw Settlement Thermal-Hydraulic… Continue reading TGIS – Sample Engineering Design / Development Considerations

News Flash – We would like your technical input

Please help us improve the content of this Website and this blog. Please submit your IT Technology documents for consideration to our site, your assistance is greatly appreciated. We are all about fostering a Community of Interest (COIs) Working together for: Deliverables Develop (and harmonize) reusable data exchange components Training and Technical Assistance Leverage (Internal… Continue reading News Flash – We would like your technical input

Business Continuation Project Considerations

Top 8 Things to Communicate Proactively ID and leverage existing information upfront Have a clear definition of scope and deliverables Team structure should include functional representation Equalize the workload between your project content experts Gather feedback along the way to make sure you’re meeting milestones Establish top down support and participation Build in project review… Continue reading Business Continuation Project Considerations

eGIS Technical Needs

High speed access into Data Center (Large Spatial Data Loads) Administrative privileges over eGIS database schema’s Security Requirements for  tGIS (external to Collaboration site) Database user  privilege and security requirements Requirements for eGIS data in other systems Data Change Management  process and procedures https://www.bestitdocuments.com/Samples

It’s about Business !

Business  – > Information – > Technology We realize your current businesses have huge existing investments in IT These investments: Fill different needs, Are implemented on different platforms, and Are of different vintages No one in their right mind believes these huge investments will be discarded! Businesses are evolving to be IT centric More and… Continue reading It’s about Business !

Channel Sales – Items to Consider

Territory   vs   Major Account Manager,  vs  Channel Manager, vs  Global Accounts Manager             Forecast:                Quota’s   (top 10/20 deals) Commit, Top prospects, Most likely,  (what moved)                         Revenue  (where can is there low hanging fruit)                                        Sell to and through             Lead Generation, Call Activity,             Professional association,                                     Tradeshow,                                                             Internet resources Buyer:             Economic,… Continue reading Channel Sales – Items to Consider

Competency

To perform the job successfully, an individual should demonstrate the following competencies: Customer Service – Responds promptly to customer needs; Responds to requests for service and assistance; Meets commitments. Oral Communication – Speaks clearly and persuasively in positive or negative situations. Written Communication – Writes clearly and informatively. Change Management – Develops workable implementation plans;… Continue reading Competency

Integration Test Team Roles and Responsibilities

The Integration Test Team consists of the IT Integration Test Lead, a System Integration Test Lead or Integration Test Point of Contact (POC) for each system participating in the integration test, and a Project Management point of contact. The roles and responsibilities for the test team members to facilitate the completion of Integration Test activities… Continue reading Integration Test Team Roles and Responsibilities

Sample Project Communications Plan Template

It’s rare that an IT project is completed successfully (on time and within budget) without good communications among all the stakeholders.  That’s why it’s so important to make sure your project team develops a communication plan so that lack of communication does not derail your goals. Use this project communications planning template to identify the… Continue reading Sample Project Communications Plan Template