Some Storage Considerations

    DAS  NAS  SAN  iSCSI Type of connection • SCSI • FC-AL • …. • Fast Ethernet • Fibre Channel • Fibre Channel • Internet Remote connection • Typically no • Yes • Possible • Yes Type of I/O • Block  • File  • Block  • Block Performance • High  • Limited by the… Continue reading Some Storage Considerations

Identity Management Solution Components

Different administration tools and operative components which support the identity management were developed completely independent to each other. Therefore the originated systems offer a high functional overlapping. You are not able to arrange them to a complete identity management infrastructure without any troubles. The most important solution components for identity management are: · Directory services… Continue reading Identity Management Solution Components

Leaders create companies based on these fundamentals

  Decentralization: Unless there’s a compelling market-oriented reason for a decision to be made at the top, it’s delegated to the lowest level where the best information resides.    Marketing Mechanisms: The market is the most efficient process for allocating resources. Therefore, central planning and powerful budget offices are shunned in favor of market like… Continue reading Leaders create companies based on these fundamentals

Constructive Conflict Management

Include all: 1.  Develop supportive environment 2.  Agree on goal/agenda/time limits 3.  Approach conflict as a mutual problem 4.  Acknowledge and reach understanding of the other ideas 5.  State your ideas after the other person has stated ideas 6.  Think of options 7.  Reach agreement    Conflict Resolution Options: 1.  Reverse roles and discuss topics… Continue reading Constructive Conflict Management

Ingredients for Productive Team Meetings

There are simple steps which can increase the productivity level of team meetings. Check off the appropriate items as you prepare for your next meeting. During team formation 1. Ensure that all members have a joint understanding ___ Make sure each person understands the mission ___ Define the problem ___ Set expectations ___ Allocate resources… Continue reading Ingredients for Productive Team Meetings

Goal Setting Info

Healthy organizations have goals at all levels. Both organizations and individuals need to manage their affairs against goals Explicit Measurable Obtainable Hard, specific goals, if accepted by the individual, will lead to increased team performance. Teams Teams outperform individuals acting alone or in larger organizational groupings, especially when performance requires multiple skills, judgments and experiences.… Continue reading Goal Setting Info

Challenges of IT Infrastructure

The development of the internet has been seen as the most significant advance in IT for many years. In essence, what it does is to allow any computer with a communication channel to offer its contents to anyone else and to get material back from any other connected computer in return. This has come about… Continue reading Challenges of IT Infrastructure

Business goals for the future

Corporate America needs to develop a clear understanding of what it will take to become profitable and build on or Extend market share. Developing tactical strategies to attain these goals should be based on short-term and strategic long-term goals.   Reduce and Control Operating Costs The single most important tactical reason for outsourcing is to reduce… Continue reading Business goals for the future

Bull or Bear in IT

                 Bull Market                                  Bear Market Big spending wins eyeballs. Smart spending wins customers. Customer acquisition is a priority. Smart spending wins customers. Company merge to look big. Customer retention is a priority. We’ll be the next Yahoo. Companies merge order to survive. Free offers lure new customers. We’re not the next Yahoo. It’s an ad sellers… Continue reading Bull or Bear in IT

Technology Sustainment

In sustainment, the system is in use and evolves through periodic and event-driven maintenance and upgrades. For software-intensive systems, Sustainment presents critical challenges to maintaining the security posture. Maintenance in the operational environment is essential to provide for system restoral in the case of failure and for rapid resolution of Business objectives-impacting deficiencies. In the… Continue reading Technology Sustainment

Sample Access & Authentication Scope

A high-level outline was developed with input from the each discipline.  The outline centers on the ability to identify data classifications and the assignment of access controls. The documents that will be generated are: 1.  Summary document in outline form 2.  Authentication and Access Control Strategy 3.  Network Access Strategy  Action Items 1.      A 2.     … Continue reading Sample Access & Authentication Scope

Sample Consulting Insurance Requirements

Always seek proper legal advise for your organization. These pages provide an explanation and example of corporate’s minimum insurance requirements. During the term of an agreement and without cost to corporate, suppliers are required to maintain and ensure that their subcontractors maintain the following insurance coverage with reputable insurance companies satisfactory to Corporate. Primary Commercial… Continue reading Sample Consulting Insurance Requirements

Sample Course Development Guidelines

Considerations for each class: · Create agenda – sessions and approximate timings · Create detailed course outline · Consider prerequisite reading and assignments that would help folks prepare for the class · Identify any prerequisite hardware,& software (including downloads) · Plan course exercises and activities · Plan testing strategy · Course logistics Track Strategy courses (1/2 day web cast course · Class… Continue reading Sample Course Development Guidelines

Healthcare Industry Segmentation

Healthcare Payers National Health Insurance Plans Federal Government (CMS – Medicare) State Government (DHHS – Medicaid) Healthcare Providers Hospitals Long-Term Care Facilities Physician Medical Practices Specialty Care Providers (Outpatient, Oncology, etc) Affiliated Organizations Clearinghouses, Third Party Administrators, etc. Key Business Drivers The revenue source of a hospital is driven by patient flow Physician referral is… Continue reading Healthcare Industry Segmentation

Which User Files on your Windows 200x Workstation Should Be Backed Up?

Introduction: All PC users are provided with a hard drive in order to store their local data. To assure that important information is not lost in the event disk drive disaster, each person must establish a strategy to back up their own data. “Back up” is the process used to duplicate files on an alternate… Continue reading Which User Files on your Windows 200x Workstation Should Be Backed Up?

Startup Apps and Windows 2000-based Services

Excellent reference – Searchable, comprehensive list of the programs you may find that run when you switch on your PC: http://www.pacs-portal.co.uk/startup_content.php#THE_PROGRAMS – Full-list ZIP Windows 2000 startup services   Service Full Name Default Alerter  Alerter  Automatic  AppMgmt  Application Management  Manual  ClipSrv  ClipBook  Manual  EventSystem  COM+ Event System  Manual  Browser  Computer Browser  Automatic  DHCP  DHCP Client … Continue reading Startup Apps and Windows 2000-based Services

Sample End-to-End Performance Goals

End-To-End Performance                 Performance Goals System and Application Windows SAP GUI  End-to-end Performance ([Client] will consider these as goals and monitor the actual results): Macintosh JAVA GUI 90% of identified representative transactions complete:   <  3 seconds Windows HTML GUI 90% of identified representative transactions complete:   <  6 seconds  

Assets

An asset is anything that has some value to an organization. Asset Identification • It is necessary to determine the assets that need protection, their value, and level of protection required • Two Types: » Tangible » Intangible Tangible Assets • Tangible assets are physical • Examples: » Personnel » Offices, workspaces, warehouses, etc. » Inventory, stores, supplies, etc. » Servers and workstations » Network… Continue reading Assets

Help Desk System Assessment

Overall Objective [Vendor] Consultant will conduct a working session with all relevant personnel to review Customers goals and processes as they relate to their current Help Desk installation in order to provide specific system and process recommendations. [Vendor] Consultant will spend one day at client site and a second day completing assessment report. Typical Client… Continue reading Help Desk System Assessment

How to Stop and Restart the Ace Service on the RSA Service

Analysis:             On the RSA Server do:                         ps – ef | greg ace  (lower-case)  – check to see if the ace process is running if not su –             su – ace   “provide password” To start from scratch (note the order):         /var/ace/prog/aceserver stop        1st (stops the ACE Server)         /var/ace/prog/sdconnect stop       2nd (stops… Continue reading How to Stop and Restart the Ace Service on the RSA Service

Sample Help Desk Consolidation Project

The help desk consolidation project will start with an assessment of the existing Help Desk structure, and include the collection of the current staffing model, organization chart, the flow and management of incidents and reporting, review of the tiered support model, review of the volume and types of incidents, review of the amount of time… Continue reading Sample Help Desk Consolidation Project

Master Project Plan Check List

Project Code Project/Application Name Project Acronym Project Coordinator QCC Date Received Date Completed Document Section Description First Review Second Review Third Review Mandatory Checks Does the cover page identify the Application with its Name and Project Code? Have the appropriate Authorities approved this deliverable (via signature or appropriate email approval)? Is the Revision History current?… Continue reading Master Project Plan Check List

Keep project team meetings on task

How many times has this happened to you? You attend a meeting where members of a project team have enthusiastically volunteered to complete a variety of assignments. Then, a week later at a follow-up meeting, very few team members completed their assignments while others could not even remember the task they were assigned to complete. … Continue reading Keep project team meetings on task

Regulation Impact by IT Technology Domains

Sarbanes Oxley Act HIPAA Gramm-Leach-Bliley Act SEC 17a-4 and NASD and NASD Financial compliance, business process measurement applications X Enterprise resource planning X Business intelligence and data warehousing X Content/document  management and search X X X X Data/application integration X Business process automation X X Records management and email archiving X X Storage, software, and… Continue reading Regulation Impact by IT Technology Domains

Sample Visio – MIL-STD-100 and DOD-STD-1000

Free Visio Document download MIL-STD100_Sample.vsd The MIL-STD-100 and DOD-STD-1000 standards suck, they are vague and generally interpretive and un-atainable. Below are some recommendations for at least good guidelines. Items necessary for good network documentation Identification of servers, workstations, printers, routers, switches, etc. IP addresses NetBIOS/Host names MAC addresses Description of each device on the network,… Continue reading Sample Visio – MIL-STD-100 and DOD-STD-1000

Software Security and SDLC Considerations

Technical security architecture Application security architecture Application security architecture document Architecture control board Data model Data security architecture document Data security architecture Platform security architecture Platform security architecture document Enterprise architecture governance Security in the system development lifecycle Security requirements of information systems Security requirements analysis and specification Define information system security requirements Information system… Continue reading Software Security and SDLC Considerations

Information system Catalog service management Considerations

Configuration and asset management Release Management Development Integration  Service Desk / Help Desk    Capacity management Create and maintain a capacity plan Operational procedures and responsibilities Documented operating procedures Change control procedures Technical review of applications after operating system changes Restrictions on changes to software packages Change management Information security aspects of problem management Change… Continue reading Information system Catalog service management Considerations

Autocad 2006/7 File Path Settings

Suggested Autocad Settings for reliable and optimal performance. Support File Search Path C:Document and SettingsAdministratorapplication DataAutodeskAutodesk Land Desktop 2006/7R16.2enusupport C:Program FilesAutodesk Land Desktop 2006/7support C:Program FilesAutodesk Land Desktop 2006/7fonts C:Program FilesAutodesk Land Desktop 2006/7help C:Program FilesAutodesk Land Desktop 2006/7express C:Program FilesAutodesk Land Desktop 2006/7supportcolor C:Program FilesAutodesk Land Desktop 2006/7land C:Document and SettingsAdministratorLocal SettingsApplication DataAutodeskAutodesk Land… Continue reading Autocad 2006/7 File Path Settings

Identifying Identity Management Needs

Author unknown  Is your network a collection of different systems and applications? Are there multiple directories and data systems? Are there users and other data objects stored in multiple places? How is the environment managed? How are new accounts created for users each time a new application is added? Does a single change event cause… Continue reading Identifying Identity Management Needs

Solaris Role-Based Access Controls

UNIX administrators have wanted more fine-grained access control to administrative features almost since the first administrator accidentally destroyed his first system. As of Solaris 8, Sun has delivered a solution to that problem. But is the solution for you? The Current State The UNIX concept of a “superuser” who could do all is a good… Continue reading Solaris Role-Based Access Controls

Manually Configuring Privileges

The manual process for provisioning poses a huge challenge for today’s businesses. Believe it or not, most companies still use manual processes to provision access rights to users. Step 1  First, when an employee is hired, a new user profile is created and stored in an HR database. Step 2 A request for access is… Continue reading Manually Configuring Privileges