Objectives - Experience - Training

Size: px
Start display at page:

Download "Objectives - Experience - Training"

Transcription

1 Objectives - Experience - Training Objectives Computer operations manager Professional Sellbytel Communication Group Lyon experience System Engineer. Hewlett-Packard Unix Support Consulting Studing Deployment Bull Services & Solutions Lyon Administration System Engineer AEG - Expectra - STERIA Project management. CTI Rhone Alpes Auvergne - CNAM EDF - SIRA (DIIP). Sectoral. Deployment, Integration, Engineering, Projects. Industrial. Communications Training AEX Technology Lyon Support Senior Consultant Sun Microsystems Paris. Hardware Logistics ST Microelectronics Crolles Hardware. Systems Management. Sun. Users Support. HP. IBM. Unisys Dugelay Informatique Lyon. SGI Technical Director. Commercial Management Operating Systems. CAD-CAM, Software package. CPS, EDX, RPS,. Unix System V. BSD IGC Cartel Villeurbanne. Sco-Unix, Irix Projects Lider & Technical Director. AIX, Solaris, UX, Linux. Business & Industrial data processing. Data acq., Industrial Processes, Communications Servers & Services. Specific, Software package. DNS, NIS, NFS, Sendmail,. Webmin, Proxy,. HTTP, FTP, SMTP, POP, Logic Lyon. FireWall,... Analyst & Projects Lider. Software development Languages. Specific: Industry, Management,.... ASS., EDL, PL1. Software package: Management, Accounts, Pay. RPG, Cobol,. C, C++, 4GL,. SQL, Prolyac Bron Computer & Data-processing Manager DBMS. Study, analyze and realization of applications. Informix. Acquisition controls and data processing. Oracle,.... Real-time data control, dispatching and management... Training. DESS - Data processing. EUIT Electronics Personal Renseigements Spanish Nationality - Residing in France (ECC) Married (2 childrens) Bi-language: French-Spanish, Technical English Page 1 sur 7

2 Companies - Functions - Projects Sellbytel Communication Group Lyon System Engineer 2006 currently Hewlett-Packard Unix Support Engineer for Hewlett Packard call center High, midrange and entry servers RISC and IA64 HP-UX Superdome & RISC Series ALNKDR rp24xx to rp 7400 Practice bch, and gsp bmc Systems of feedback: ems, isee Bays disk JBODs, VA and EVA Libraries and backup tape DAT, DLT, LTO Libraries and backup optical archiving SAN-Clusters Calls qualification into international environment. Analysis with the customers symptoms, logs, and results manipulated. Recommendation of the intervention type in terms of action, time and skill. Componets recommendation Establishment of the GED qualification for the hardware qualification team. Census and organization of technical documentation. Building the process of qualification Platforms: HP UX Addeco System Engineer Bull Services & Solutions Lyon CTI Rhone Alpes Auvergne CNAM Computer center. Integration, deployment, support Platforms: Tools: Sun, IBM, Bull Solaris, AIX $Universe, Networker, CFT AEG Télécom Senior Consultant Consulting Lyon Business & Industrial data processing Consulting missions and systems integration on the customers sites through the EEC. Engineering and projects. Integration et deployment Sun, IBM, Unisys, HP, SGI, Intel Solaris, AIX, Unix, SCO Unix, Linux VxVM, VxFS, Webmin, Vnc, VmWare, Samba Page 2 sur 7

3 Expectra-STERIA System Engineer SSII Lyon EDF SIRA (Lyon) - DIIP Department. Deployment, integration, engineering, projects Consulting missions, study, project management and integration of systems through the ONI (National Operator Engineering) on the sites of thermoelectric and nuclear engineering of EDF industry in France : Ciden (Centre d Ingénierie, déconstruction et Environnement) Cih (Centre d'ingénierie Hydraulique) Cipn (Centre Ingénierie du Parc Nucléaire en exploitation ) Cnepe (Centre National d Equipement de Prod. d Electricité) Cnet (Centre National d'équipement thermique) Septen (Service Etudes et Projets Thermiques et Nucléaire) Sqr (Service Qualité des Réalisations) Sun Microsystems, IBM, SGI Solaris 2.5.1, 2.6, (32 Bits), Solaris 7 et 8 (64 Bits), AIX, IRIX SDS, Vmware, Samba AEG Télécom Senior Consultant Consulting Lyon Consulting missions and systems integration on the customers sites through the EEC : France, Spain, Portugal.... Design of LAN and/or WAN networks.. Network analyze and drafting of documentation.. Project management, planning and installation.. Internet and Intranet.. Equipment and investments management.. Strategic long-term planning IT.. Audits of systems. Sun Microsystems, IBM Solaris 2.5.1, 2.6, (32 Bits), Solaris 7 et 8 (64 Bits), AIX VxVM, VxFS, AEX Technology Senior Consultant & System Engineer SSII Lyon Sun Microsystems (Paris) ST Microelectronics (Crolles). Hardware Logistics. Systems Management. Users Support Departments. R &D DAIS, Front to Back, Unicad Training Cente FireWalls : Check Point FW1, VPN, Provider Hardware and operating system installation, configuration and deployment of : Workstations. WorkStations Ultra10. WorkGroup Servers Ultra60 et Ultra80 Computer room:. WorkGroup Servers E220 et E420. Enterprise Servers E450, E3500, E4500, E10K Sun Microsystems Solaris 2.5.1, 2.6, (32 Bits), Solaris 7 et 8 (64 Bits) DBMS : Oracle 7 et 8 VxVM, VxFS Page 3 sur 7

4 Dugelay Info Technical Director SSII Lyon CAD-CAM and Commercial Management To that and study of the hardware and software in place on the various customers sites in order to stabilize the applications and to improve the operation and the performances DBMS : Languages : INTEL SCO Unix Informix Vnc, PcAnywhere 4GL, SQL, C,... IGC - CARTEL Projects Lider & Technical Director SSII Villeurbanne Business & Industrial data processing Data acq., Industrial Processes, Communications. Communications:Networks, Telecommunications. Scientist and Industrial: Soldier, Defense, Automatisms, Robotics, CAD & CAM.. Sectoral: Bank, BTP, Distribution, Transport, Mechanics, Production, Chemistry... Establishments : Belgium, France, Spain, Portugal Sites : Seprosy - BSN, Black & Decker, Alsthom, Rhône-Poulenc, Bauer France, TEA, SE Telecomunicaciones, Syscom Belgium, CSP Telecomunicaçoes, Bigard, Gallet (Feralco), Chantiers Modernes, Thomson CSF... Draft studies of the system in collaboration with all the concerned parts giving place to the development of the schedules of conditions relating to the study phases, systems analyses and organics describing primarily:. The spots nature and their sequence. Drawings of screens allowing the data entries and interrogations. Outputs and technical descriptions Evaluation of work for valorization taking account of:. Schedule of conditions. Systems analyses and organic. Writing of the programs. Procedures of exploitation. Installation of the system, OS, applicatif, tools.... Training and maintenance and technical aid The study as well as the realization split in homogeneous stages allowing of to control the progress of the work, each one of these stages are held according to following phases':. Confirmation or modification of the components of the schedule of conditions. Analyze organic and programming. Tests on test decks provided or generate. Possible modifications after tests. Study and realization of the procedures. Training with the exploitation of the system installed. Real starting and reception of the project. Maintenance and technical aid To that and study of the hardware and software in place on the various customers sites in order to stabilize the applications and to improve the operation and performances Unisys, IBM 6150, IBM RS6000 Unix V.2 et V.4, AIX v2.2 et v4.3 DBMS : DB2, ORACLE Languages : COBOL, 4GL, SQL, C, C++ Page 4 sur 7

5 LOGIC Analyst & Projects Lider SSII Lyon Business & Industrial data processing. Communications Networks, Telecommunications. Industrial Automatisms, Robotics, CAD, CAM.. Sectoral : Insurance, Banks, BTP, Commerce, Transport, Real-estate, Health, Establishments : France, Belgium Sites: Syscom, Europe Assistance, MasterCard, Cedicam, Fujicolor, TTTelex, Sigefa, Janin, CTD, HCl Lyon, Cornillon, Ordineco, Gilca, Texunion, Regie Cretin, Sagita, Hygeco... Control of the projects of data acquisition and processing in real time for :. Distributed processing, Industrial automation, Communications Directed towards the personalized development of systems of data processing Including : Study, realization, training, assistance, maintenance. Specific Industry, Management, Communications.... Software package management, Accounts department, Pay IBM Serie 1 Sperry Univac, Unisys CPS, EDX, RPS, Unix V.2 et V.4 DBMS : IAM, PICK, ORACLE Languages : ASS, EDL, RPS, PL1, COBOL, SQL, C, Prolyac Computer Operations Manager Bron Management & Industrial Data processing. Sectoral: Real estate Establishments. France Sites. Prolyac, Servimo, Lyonaise of Hygiene Study, analyze and realization of applications of acquisition controls and data processing allowing the assumption of responsibility and the system control of the requests for control in real time to the teams charged to carry them out in multi-criteria function :. Geographical position of the vehicle. Equipment. Resources qualification. Workload... Follow-up of the requests for control according to the code state:. To make. In progress. On standby. Fnished. To invoice... Generation of the transactions for the interfaces:. Accounts department. Pay department. Non-member states... Interventions above being started automatically if the data are generated by the exchange of alarms connected to differing the customers sites. IBM Serie 1 EDX DBMS : IAM Languages : EDL (Temps réel) Page 5 sur 7

6 Field of Competences Communications: Networks, Telecommunications Scientist and industrialist: Soldier, Defense, Automatisms, Robotics, CAD, CAM Management: Commercial, Personal, Countable, Integrated Sectoral: Insurance, Banks, Collectivités, Commerce, BTP, Distribution, Hôtellerie, Immobilier, Presse, Santé, Tourisme, Transport, Automobile, Energie Platforms IBM : S/1, 38, 43xx, 30xx, RT6150, RS/6000 (160,...320), F40/F80, H50/H70, R50/S70, p5 (185,...595) Sperry-Unisys : BC7, S80, U5000, U6000, Sun : SSx, Ultra (1,...80), Enterprise (E220R,... E10K), SunFire (V210...E20K) HP : HP 9000 (rp3410,... rp7420,... Superdome) Structure. Design of the networks. Analyze and drafting of documentation.. Project management, planning and installation.. Transmissions.. Management d'équipements.. Strategic planning.. Management of the investments.. Audits of systems. Operating systems. CPS, EDX, RPS,. Unix System V. BSD. Sco-Unix. AIX, Irix, Solaris, UX. Linux SystemsAdministration : System V, BSD, SCO-Unix, Irix, AIX, Solaris, UX, Linux Language Korn-Shell: Concepts, Variables, Calculations, Codes return, Structures, Functions, Utilit. Bases: Connection Disconnection, Files and repertories, Rights, Interpreter of orders, Variables, Editor ` vi', Process, Utilities, Impression, X-Window, Tools CDE, Data, E/S, Structures, Lists, Research, Subroutines, Handling, Descriptors, Control, Access Personalization and administration CDE: Connections, Sessions, Windows, Dashboard, Manager of applications, Actions, Types of data. Installation and administration: Initialization, Subsystems, Tools, Terminals, Peripherals, Pagination, System files, Volumes, Safeguard and restoration of the system, Administration of the users, Updates, Patches, Subsystem d'impression. Advanced administration: Orders ODM, Small SMIT & ODM, Dumps, Logs, Volumes Logical, VxVM, VxFS, RAID. Page 6 sur 7

7 Systems Administration : (Continuation) Safety: Administration of the accounts, Identification and checking, Files of safety, Controls, To that, Menaces through the network, heterogeneous Environnement, Sécurité system, Fire-Wall. Structure and tools for investigation: Virtual memory, Process and threads, Filing systems, Communications inter process, Analyze (anomalies, events, blocks of control systems) Performances: Measuring instruments (sar, vmstat, filemon, symon...), Diagnostic, Factors of Performance (I/O, TCP/IP, NFS Memory/Sauvegarde: ADSM, To explore... High availability: HACMP Integration : Unix Windows NT Positioning Unix and NT: Concepts Network, Connections... Unix resources servers: Installation, Configuration shares resources: (disks, printers...) Graphic environment, Mail, Portability, Safety. Network Administration TCP/IP Parameter setting: Addressing Internet, Routing (IP, UDP, TCP), Interfaces (Socket, RPC, Applicatifs), Standards: (telnet, ftp, smtp, X-Windows, DNS, BOOTP, DHCP, NFS, HTTP, NNTP) TCP/IP administration: Installation, Orders, Connections, Transfers, remote Executions, Configurations (SLIPWAY, PPP, RIP, DNS), Tools for analysis IP, Services Servers: HTTP, Ftp, Proxy, Impressions, NFS, NIS, DNS, Safety, Fire-Wall. X25: Adapters, Definitions (Addressing, Characteristic DTE/DCE), Adaptation to the network, Orders X25, Fonctions(xtalk, xroute, x25mon, PAD), TCP/IP under X25, Interfaces of programming. Database Oracle Informix Page 7 sur 7

ICANWK401A Install and manage a server

ICANWK401A Install and manage a server ICANWK401A Install and manage a server Release: 1 ICANWK401A Install and manage a server Modification History Release Release 1 Comments This Unit first released with ICA11 Information and Communications

More information

ICC MANAGED SERVICES can provide maintenance, support, supply and installation on:

ICC MANAGED SERVICES can provide maintenance, support, supply and installation on: www.icc4services.co.uk ICC MANAGED SERVICES offers comprehensive support across the full range of HP, IBM, Sun and Dell systems. We deliver onsite hardware maintenance with a range of service levels and

More information

Introduction to Computer Administration. System Administration

Introduction to Computer Administration. System Administration Introduction to Computer Administration System Administration System Administration System Administration Duties of System Administrator Types of Administrators/Users Operating Systems Supporting Administration

More information

Module 5 Introduction to Processes and Controls

Module 5 Introduction to Processes and Controls IT Terminology 1. General IT Environment The general IT environment is the umbrella over the following IT processes: 1. Operating Systems 2. Physical and Logical Security 3. Program Changes 4. System Development

More information

EMC Information Protection Software Compatibility Guide - Last Updated: June 30, 2008

EMC Information Protection Software Compatibility Guide - Last Updated: June 30, 2008 EMC Information Protection Software Compatibility Guide - Q208 Page 1 of 150 EMC Information Protection Software Compatibility Guide - Last Updated: June 30, 2008 WARNING: To get the latest version of

More information

Course Description and Outline. IT Essential II: Network Operating Systems V2.0

Course Description and Outline. IT Essential II: Network Operating Systems V2.0 Course Description and Outline IT Essential II: Network Operating Systems V2.0 Course Outline 1. Operating System Fundamentals 1.1 Operating System Basics 1.1.1 Overview of PC operating systems 1.1.2 PCs

More information

Getting Started in Red Hat Linux An Overview of Red Hat Linux p. 3 Introducing Red Hat Linux p. 4 What Is Linux? p. 5 Linux's Roots in UNIX p.

Getting Started in Red Hat Linux An Overview of Red Hat Linux p. 3 Introducing Red Hat Linux p. 4 What Is Linux? p. 5 Linux's Roots in UNIX p. Preface p. ix Getting Started in Red Hat Linux An Overview of Red Hat Linux p. 3 Introducing Red Hat Linux p. 4 What Is Linux? p. 5 Linux's Roots in UNIX p. 6 Common Linux Features p. 8 Primary Advantages

More information

Diploma in Computer Science

Diploma in Computer Science SPECIALIST PROFILE Personal Details Reference: Job Title: Nationality: IT Experience: Qualifications: Languages: CN5191 Senior Linux Engineer British 22 years RedHat Certified Engineer Diploma in Computer

More information

2. Highlights and Updates: ITSM for Databases

2. Highlights and Updates: ITSM for Databases IBM Tivoli Storage Manager Data Protection for Oracle Neil Rasmussen Software Development for Tivoli Data Protection Tivoli Software, IBM SWG rasmussn@us.ibm.com Agenda 1. Overview: Tivoli Storage Manager

More information

HP OpenView Storage Data Protector

HP OpenView Storage Data Protector For the streaming audio link, click the blue icon in the lower right corner HP OpenView Storage Data Protector 2005 Hewlett-Packard Development Company, L.P. The information contained herein is subject

More information

UN 4013 V - Virtual Tape Libraries solutions update...

UN 4013 V - Virtual Tape Libraries solutions update... UN 4013 V - Virtual Tape Libraries solutions update... - a Unisys storage partner Key issues when considering virtual tape Connectivity is my platform supported by whom? (for Unisys environments, MCP,

More information

Components of a Computing System. What is an Operating System? Resources. Abstract Resources. Goals of an OS. System Software

Components of a Computing System. What is an Operating System? Resources. Abstract Resources. Goals of an OS. System Software What is an Operating System? An operating system (OS) is a collection of software that acts as an intermediary between users and the computer hardware One can view an OS as a manager of system resources

More information

Best of Breed of an ITIL based IT Monitoring. The System Management strategy of NetEye

Best of Breed of an ITIL based IT Monitoring. The System Management strategy of NetEye Best of Breed of an ITIL based IT Monitoring The System Management strategy of NetEye by Georg Kostner 5/11/2012 1 IT Services and IT Service Management IT Services means provisioning of added value for

More information

What is included in the ATRC server support

What is included in the ATRC server support Linux Server Support Services What is included in the ATRC server support Installation Installation of any ATRC Supported distribution Compatibility with client hardware. Hardware Configuration Recommendations

More information

Training Program: Network Admin. Program Structure: Hardware and Appliances. Networking

Training Program: Network Admin. Program Structure: Hardware and Appliances. Networking Training Program: Network Admin Duration: 4 Months Field Work: 30 Days Program Fees: Rs. 44000/- Training Fees: Rs. 7500 /- Program Structure: Hardware and Appliances Introduction to Computers Types of

More information

elan Technology White Paper Why Linux?

elan Technology White Paper Why Linux? elan Technology White Paper Why Linux? Bow Networks Inc. Page 2 Introduction This white paper summarizes the reasons Linux was selected as the operating system for BOW Network s elan platform. Linux has

More information

Department of Technology Services UNIX SERVICE OFFERING

Department of Technology Services UNIX SERVICE OFFERING Department of Technology Services UNIX SERVICE OFFERING BACKGROUND The Department of Technology Services (DTS) operates dozens of UNIX-based systems to meet the business needs of its customers. The services

More information

ICANWK602A Plan, configure and test advanced server based security

ICANWK602A Plan, configure and test advanced server based security ICANWK602A Plan, configure and test advanced server based security Release: 1 ICANWK602A Plan, configure and test advanced server based security Modification History Release Release 1 Comments This Unit

More information

Mobile MOUSe SERVER ADMINISTRATOR ONLINE COURSE OUTLINE

Mobile MOUSe SERVER ADMINISTRATOR ONLINE COURSE OUTLINE Mobile MOUSe SERVER ADMINISTRATOR ONLINE COURSE OUTLINE COURSE TITLE SERVER ADMINISTRATOR COURSE DURATION 15 Hour(s) of Self-Paced Interactive Training COURSE OVERVIEW The Server Administrator designation

More information

Communication and connectivity the ideal solution for integrated system management and data integrity

Communication and connectivity the ideal solution for integrated system management and data integrity the ideal solution for integrated system management and data integrity The solution for Management solutions > Data centre > Emergency applications > Offices > Service industries > Industry > Telecommunications

More information

Availability and Integrated Management. Monitoring

Availability and Integrated Management. Monitoring Availability and Integrated Management This brochure has been created using Acrobat PDF format from Adobe Systems Incorporated. All Rights Reserved. Copyright 2011, Hitachi, Ltd. Availability and Integrated

More information

Specialized Programme on Internetworking Design and LAN WAN Administration

Specialized Programme on Internetworking Design and LAN WAN Administration Specialized Programme on Internetworking Design and LAN WAN Administration A. NAME OF INSTITUTE Centre For Development of Advanced Computing B. NAME/TITLE OF THE COURSE C. COURSE DATES WITH DURATION IN

More information

24x7 Scheduler Multi-platform Edition 5.2

24x7 Scheduler Multi-platform Edition 5.2 24x7 Scheduler Multi-platform Edition 5.2 Installing and Using 24x7 Web-Based Management Console with Apache Tomcat web server Copyright SoftTree Technologies, Inc. 2004-2014 All rights reserved Table

More information

Network Configuration Settings

Network Configuration Settings Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices

More information

Raptor Firewall Products

Raptor Firewall Products Axent Technologies, Ltd The Leader in Integrated Firewall and VPN Solutions Raptor Firewall Products Security Cannot Be Ignored >100M Users on WWW E Commerce Shift Billions Lost to Cyberthieves 150,000

More information

MCSA Security + Certification Program

MCSA Security + Certification Program MCSA Security + Certification Program 12 credit hours 270 hours to complete certifications Tuition: $4500 Information technology positions are high-demand occupations that support virtually all industries.

More information

Figure 41-1 IP Filter Rules

Figure 41-1 IP Filter Rules 41. Firewall / IP Filter This function allows user to enable the functionality of IP filter. Both inside and outside packets through router could be decided to allow or drop by supervisor. Figure 41-1

More information

Oregon Enterprise Technology Services Architecture Request for Proposals (RFP) Guidelines

Oregon Enterprise Technology Services Architecture Request for Proposals (RFP) Guidelines Oregon Enterprise Technology Services (ETS) Customer Requests ETS customers issuing RFPs to support application development initiatives often have hardware requirements. Standards and guidelines for equipment

More information

LAS VEGAS - CLARK COUNTY LIBRARY DISTRICT

LAS VEGAS - CLARK COUNTY LIBRARY DISTRICT DEFINITION SYSTEMS AND NETWORK SUPERVISOR (Range 128) Performs installation, monitoring, maintenance, operations, optimization, supervision and modification of network, minicomputer and microcomputer systems

More information

Integrated and reliable the heart of your iseries system. i5/os the next generation iseries operating system

Integrated and reliable the heart of your iseries system. i5/os the next generation iseries operating system Integrated and reliable the heart of your iseries system i5/os the next generation iseries operating system Highlights Enables the legendary levels of reliability and simplicity for which iseries systems

More information

Enforcive /Cross-Platform Audit

Enforcive /Cross-Platform Audit Enforcive /Cross-Platform Audit Enterprise-Wide Log Manager and Database Activity Monitor Real-time Monitoring Alert Center Before & After Change Image Custom Reports Enforcive's Cross-Platform Audit (CPA)

More information

REDCENTRIC MANAGED BACKUP SERVICE SERVICE DEFINITION

REDCENTRIC MANAGED BACKUP SERVICE SERVICE DEFINITION REDCENTRIC MANAGED BACKUP SERVICE SERVICE DEFINITION SD003 V2.3 Issue Date 02 July 2014 1) SERVICE OVERVIEW The Managed Backup Service (MBS) is a streamlined alternative to traditional backup and restore

More information

SAN TECHNICAL - DETAILS/ SPECIFICATIONS

SAN TECHNICAL - DETAILS/ SPECIFICATIONS SAN TECHNICAL - DETAILS/ SPECIFICATIONS Technical Details / Specifications for 25 -TB Usable capacity SAN Solution Item 1) SAN STORAGE HARDWARE : One No. S.N. Features Description Technical Compliance

More information

Price List. Phone Number (919)728-0386 E-mail Address rjdohnert@pc-opensystems.com Mailing Address PO Box 698 Franklinton NC 27525

Price List. Phone Number (919)728-0386 E-mail Address rjdohnert@pc-opensystems.com Mailing Address PO Box 698 Franklinton NC 27525 Price List Published By Roberto J. Dohnert, Sept 15, 2012 Rev (01) Oct 17, 2012 Rev(02) May 21, 2013 This is a current list and pricing strategy for PC/OpenSystems LLC consulting division. These prices

More information

UK IT SECURITY EVALUATION AND CERTIFICATION SCHEME

UK IT SECURITY EVALUATION AND CERTIFICATION SCHEME UK IT SECURITY EVALUATION AND CERTIFICATION SCHEME 122-B CERTIFICATION REPORT No. P149 CHECK POINT VPN-1/FIREWALL-1 Issue 1.0 January 2001 Crown Copyright 2001 Reproduction is authorised provided the report

More information

Detailed Revision History: Advanced Internet System Management (v5.07)

Detailed Revision History: Advanced Internet System Management (v5.07) Detailed Revision History 1 Detailed Revision History: Advanced Internet System Management (v5.07) This detailed revision history document identifies the differences in Advanced Internet System Management

More information

Migrate AS 400 Applications to Windows, UNIX or Linux

Migrate AS 400 Applications to Windows, UNIX or Linux Migrate AS 400 Applications to Windows, UNIX or Linux INFINITE Corporation White Paper prepared for Infinite Product Group date January 2012 Abstract: This paper is a discussion of how to create platform

More information

secure Agent Secure Enterprise Solutions

secure Agent Secure Enterprise Solutions secure Agent Secure Enterprise Solutions SecureAgent Software The Secure Data Solution U.S. Patent 7,293,179; European Patent 1669872; and Others Pending Midrange Systems SecureAgent Software 2448 E 81

More information

Track 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE

Track 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE Anne Arundel Community College Tracks Anne Arundel Community College s computer technologies courses have been organized into 10 suggested tracks. The tracks are arranged to ensure that students have the

More information

Chapter 3 Startup and Shutdown This chapter discusses how to startup and shutdown ETERNUSmgr.

Chapter 3 Startup and Shutdown This chapter discusses how to startup and shutdown ETERNUSmgr. Preface This guide discusses procedures and safeguards relating to the use of ETERNUSmgr to configure ETERNUS DX400 series, ETERNUS DX8000 series, ETERNUS2000, ETERNUS4000, ETERNUS8000, ETERNUS3000, ETERNUS6000,

More information

IBM Tivoli Monitoring for Databases

IBM Tivoli Monitoring for Databases Enhance the availability and performance of database servers IBM Tivoli Monitoring for Databases Highlights Integrated, intelligent database monitoring for your on demand business Preconfiguration of metric

More information

VPNSCAN: Extending the Audit and Compliance Perimeter. Rob VandenBrink rvandenbrink@metafore.ca

VPNSCAN: Extending the Audit and Compliance Perimeter. Rob VandenBrink rvandenbrink@metafore.ca VPNSCAN: Extending the Audit and Compliance Perimeter Rob VandenBrink rvandenbrink@metafore.ca Business Issue Most clients have a remote access or other governing policy that has one or more common restrictions

More information

A candidate following a programme of learning leading to this unit will be able to:

A candidate following a programme of learning leading to this unit will be able to: Unit 24: Linux+ Learning Outcomes A candidate following a programme of learning leading to this unit will be able to: Demonstrate knowledge of planning the implementation Show knowledge of how to install

More information

Archive Data Retention & Compliance. Solutions Integrated Storage Appliances. Management Optimized Storage & Migration

Archive Data Retention & Compliance. Solutions Integrated Storage Appliances. Management Optimized Storage & Migration Solutions Integrated Storage Appliances Management Optimized Storage & Migration Archive Data Retention & Compliance Services Global Installation & Support SECURING THE FUTURE OF YOUR DATA w w w.q sta

More information

IT Business Management System Requirements Guide

IT Business Management System Requirements Guide IT Business Management System Requirements Guide IT Business Management 8.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

Alliance AES Encryption for IBM i Solution Brief

Alliance AES Encryption for IBM i Solution Brief Encryption & Tokenization Alliance AES Encryption for IBM i Solution Brief A Complete AES Encryption Solution Alliance AES Encryption for IBM i provides AES encryption for sensitive data everywhere it

More information

Preface Part I. Introduction 1. The Philosophy of Backup Champagne Backup on a Beer Budget Why Should I Read This Book? Why Back Up?

Preface Part I. Introduction 1. The Philosophy of Backup Champagne Backup on a Beer Budget Why Should I Read This Book? Why Back Up? Preface Part I. Introduction 1. The Philosophy of Backup Champagne Backup on a Beer Budget Why Should I Read This Book? Why Back Up? Wax On, Wax Off: Finding a Balance 2. Backing It All Up Don't Skip This

More information

Exhibit B5b South Dakota. Vendor Questions COTS Software Set

Exhibit B5b South Dakota. Vendor Questions COTS Software Set Appendix C Vendor Questions Anything t Applicable should be marked NA. Vendor Questions COTS Software Set Infrastructure 1. Typically the State of South Dakota prefers to host all systems. In the event

More information

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details Sub: Supply, Installation, setup and testing of Tenable Network Security Nessus vulnerability scanner professional version 6 or latest for scanning the LAN, VLAN, VPN and IPs with 3 years License/Subscription

More information

Total Protection for Enterprise-Advanced

Total Protection for Enterprise-Advanced System Requirements Total Protection for Enterprise-Advanced One integrated solution, one console, proven comprehensive protection McAfee Alert Manager 4.7.1 Free disk space 1.5 MB (complete installation)

More information

Exam : IBM 000-851. : Iseries Linux Soluton Sales v5r3

Exam : IBM 000-851. : Iseries Linux Soluton Sales v5r3 Exam : IBM 000-851 Title : Iseries Linux Soluton Sales v5r3 Version : R6.1 Prepking - King of Computer Certification Important Information, Please Read Carefully Other Prepking products A) Offline Testing

More information

SECURITY SUMMIT 06/06/2013 Roma STORAGE FORENSICS. Litiano Piccin (NCDA-NCIE/SAN) litiano@studiopiccin.it

SECURITY SUMMIT 06/06/2013 Roma STORAGE FORENSICS. Litiano Piccin (NCDA-NCIE/SAN) litiano@studiopiccin.it SECURITY SUMMIT 06/06/2013 Roma STORAGE FORENSICS Litiano Piccin (NCDA-NCIE/SAN) litiano@studiopiccin.it 1. Introduction: SAN vs NAS. 2. SAN. 3. NAS. 4. SNAPSHOT. 5. Data Acquisition. INTRODUCTION STORAGE:

More information

DEPLOYMENT GUIDE. Websense Enterprise Websense Web Security Suite TM. v6.3.1

DEPLOYMENT GUIDE. Websense Enterprise Websense Web Security Suite TM. v6.3.1 DEPLOYMENT GUIDE Websense Enterprise Websense Web Security Suite TM v6.3.1 1996 2009, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA Published June 13, 2007 Printed

More information

Roles for Servers in the SCW Database

Roles for Servers in the SCW Database Roles for Servers in the SCW Database Application BizTalk 2004 Business Activity BizTalk 2004 Messaging and Orchestration ASP.NET session state BizTalk 2004 EDI Integration BizTalk 2004 Rules Engine Audit

More information

syslog-ng Store Box PRODUCT DESCRIPTION Copyright 2000-2009 BalaBit IT Security All rights reserved. www.balabit.com

syslog-ng Store Box PRODUCT DESCRIPTION Copyright 2000-2009 BalaBit IT Security All rights reserved. www.balabit.com syslog-ng Store Box PRODUCT DESCRIPTION Copyright 2000-2009 BalaBit IT Security All rights reserved. www.balabit.com Introduction Log messages contain information about the events happening on the hosts.

More information

The syslog-ng Store Box 3 LTS

The syslog-ng Store Box 3 LTS The syslog-ng Store Box 3 LTS PRODUCT DESCRIPTION Copyright 2000-2012 BalaBit IT Security All rights reserved. www.balabit.com Introduction The syslog-ng Store Box (SSB) is a high-reliability and high-performance

More information

Hardware Update and Best Practices for EMR/CPS

Hardware Update and Best Practices for EMR/CPS GE Healthcare Hardware Update and Best Practices for EMR/CPS CHUG, Spring 2010 Brian Mitchell General Manager of Technology Sales David Pease Technology Solutions Specialist 1 / Discussion Topics Best

More information

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding This chapter describes the configuration for the SSL VPN Tunnel Client and for Port Forwarding. When a remote user accesses the SSL VPN

More information

Chapter 8 How to Configure TCP/IP Printing for Unix

Chapter 8 How to Configure TCP/IP Printing for Unix Chapter 8 How to Configure TCP/IP Printing for Unix Brother print servers are supplied with the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite. Since virtually all UNIX host computers

More information

HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD 21015 Course Outline CIS 110 - INTRODUCTION TO UNIX

HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD 21015 Course Outline CIS 110 - INTRODUCTION TO UNIX HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD 21015 Course Outline CIS 110 - INTRODUCTION TO UNIX Course Description: This is an introductory course designed for users of UNIX. It is taught

More information

SMB a protocol example

SMB a protocol example SMB a protocol example of which one implementation is SaMBa David Morgan SMB Server Message Block an application layer protocol implements file ( resource ) sharing built in to Windows 1 SMB historical

More information

Veritas NetBackup 6.0 Server Now from Symantec

Veritas NetBackup 6.0 Server Now from Symantec Veritas NetBackup 6.0 Server Now from Symantec Innovative data protection As the recognized leader for enterprise-class backup and recovery, Veritas NetBackup Server software is designed to help provide

More information

Pre-Installation Notes & Checklist for LISTSERV Maestro

Pre-Installation Notes & Checklist for LISTSERV Maestro Pre-Installation Notes & Checklist for LISTSERV Maestro Page 1 Intended Audience and Background: This document is intended for prospective customers, existing customers, and staff of L-Soft. This document

More information

QTP Computing Laboratory Strategy

QTP Computing Laboratory Strategy Introduction QTP Computing Laboratory Strategy Erik Deumens Quantum Theory Project 12 September 2001 From the beginning of its computer operations (1980-1982) QTP has worked from a strategy and an architecture

More information

NetCrunch 6. AdRem. Network Monitoring Server. Document. Monitor. Manage

NetCrunch 6. AdRem. Network Monitoring Server. Document. Monitor. Manage AdRem NetCrunch 6 Network Monitoring Server With NetCrunch, you always know exactly what is happening with your critical applications, servers, and devices. Document Explore physical and logical network

More information

THE INFORMATION TECHNOLOGY INFRASTRUCTURE IN WIPO

THE INFORMATION TECHNOLOGY INFRASTRUCTURE IN WIPO THE INFORMATION TECHNOLOGY INFRASTRUCTURE IN WIPO Yves Le Borgne 24/06/98 The IT infrastructure in WIPO Table of Contents IT infrastructure strategies IT challenges in 1998 The IT Department activities

More information

Service Level Agreement (SLA) Arcplace Backup Enterprise Service

Service Level Agreement (SLA) Arcplace Backup Enterprise Service (SLA) Arcplace Backup Enterprise Service 1. Introduction This Service Level Agreement ( SLA ) forms an integral part of the Agreement between Arcplace and Customer. This SLA describes the Backup Enterprise

More information

IBM Tivoli Storage FlashCopy Manager

IBM Tivoli Storage FlashCopy Manager IBM Storage FlashCopy Manager Online, near-instant snapshot backup and restore of critical business applications Highlights Perform near-instant application-aware snapshot backup and restore, with minimal

More information

Windows Storage Server 2008

Windows Storage Server 2008 Windows Storage Server 2008 Architecture and Deployment White Paper Version 1.0 Published: May 2010 Copyright 2010 Microsoft Corporation. All rights reserved. Complying with the applicable copyright laws

More information

SapphireIMS Business Service Monitoring Feature Specification

SapphireIMS Business Service Monitoring Feature Specification SapphireIMS Business Service Monitoring Feature Specification All rights reserved. COPYRIGHT NOTICE AND DISCLAIMER No parts of this document may be reproduced in any form without the express written permission

More information

Data Replication User s Manual (Installation and Operation Guide for Windows)

Data Replication User s Manual (Installation and Operation Guide for Windows) NEC Storage Manager Data Replication User s Manual (Installation and Operation Guide for Windows) IS016-5E NEC Corporation 2001-2004 No part of the contents of this book may be reproduced or transmitted

More information

SequeLink Server for ODBC Socket

SequeLink Server for ODBC Socket P RODUCT O VERVIEW Server for ODBC Socket Overview DataDirect is highly scalable, server-based middleware that gives you a complete platform for data connectivity. Common Servers offer the performance

More information

BIT Course Description

BIT Course Description BIT Course Description Introduction to Operating Systems BTEC 101 This course follows a systematic approach to operating systems explaining why they are needed and what they do. Topics include the basic

More information

Best Practices: Implementing Large Scale Collections with F- Response

Best Practices: Implementing Large Scale Collections with F- Response Best Practices: Implementing Large Scale Collections with F- Response Note: This guide assumes you have familiarity with F-Response Enterprise or Consultant Edition. For more information, please reference

More information

Symantec NetBackup Getting Started Guide. Release 7.1

Symantec NetBackup Getting Started Guide. Release 7.1 Symantec NetBackup Getting Started Guide Release 7.1 21159722 Contents NetBackup Getting Started Guide... 5 About NetBackup... 5 How a NetBackup system works... 6 How to make a NetBackup system work for

More information

vrealize Business System Requirements Guide

vrealize Business System Requirements Guide vrealize Business System Requirements Guide vrealize Business Advanced and Enterprise 8.2.1 This document supports the version of each product listed and supports all subsequent versions until the document

More information

IBM WebSphere Business Integration for HIPAA

IBM WebSphere Business Integration for HIPAA Prepare your business for the future as you prepare for HIPAA IBM WebSphere Business Integration for HIPAA Helps ensure your business is ready to meet the HIPAA mandates Allows private and highly secure

More information

Ahsay Replication Server v5.5. Administrator s Guide. Ahsay TM Online Backup - Development Department

Ahsay Replication Server v5.5. Administrator s Guide. Ahsay TM Online Backup - Development Department Ahsay Replication Server v5.5 Administrator s Guide Ahsay TM Online Backup - Development Department October 9, 2009 Copyright Notice Ahsay Systems Corporation Limited 2008. All rights reserved. Author:

More information

Security in a DISA Architecture Systems Management in a DISA Architecture DISA Testing and Evaluation DISA: Small Business to Enterprise Summary

Security in a DISA Architecture Systems Management in a DISA Architecture DISA Testing and Evaluation DISA: Small Business to Enterprise Summary Internet Application Trends The Need for High Availability and Scalability DISA Architecture Overview Load Balancing Layer Application Services Layer Data Resources Layer Security in a DISA Architecture

More information

Strategies for Bare Machine Recovery

Strategies for Bare Machine Recovery Strategies for Bare Machine Recovery Protecting Your Mission-Critical Servers Differing BMR Strategies System reinstallation Full system reinstallation using installation CDs (Windows and ITSM client)

More information

Monitoring Without Agents

Monitoring Without Agents LONGITUDE 2.0 AND SITESCOPE 8.0 Monitoring Without Agents by Barry Nance, Network Testing Labs Keeping a really close eye on your servers and applications just got infinitely easier with Heroix Longitude

More information

NETWORK SYSTEMS ENGINEER II

NETWORK SYSTEMS ENGINEER II NETWORK SYSTEMS ENGINEER II DEFINITION Under direction, provides technical support for the County s infrastructure of Local Area Networks (LANs), Wide Area Network (WAN) and other related data network

More information

IBM Tivoli Monitoring

IBM Tivoli Monitoring Monitor and manage critical resources and metrics across disparate platforms from a single console IBM Tivoli Monitoring Highlights Help improve uptime and shorten Help optimize IT service delivery by

More information

Implementing Managed Services in the Data Center and Cloud Space

Implementing Managed Services in the Data Center and Cloud Space Implementing Managed Services in the Data Center and Cloud Space 1 Managed Hosting Offerings 2 Managed Network Services Diverse 10Gbps backbone between data centers meshed with Windstream s nationwide

More information

Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10

Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10 Table Of Contents - - WINDOWS SERVER 2003 MAINTAINING AND MANAGING ENVIRONMENT...1 WINDOWS SERVER 2003 IMPLEMENTING, MANAGING & MAINTAINING...6 WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS

More information

Veritas NetBackup 6.0 Database and Application Protection

Veritas NetBackup 6.0 Database and Application Protection Veritas NetBackup 6.0 Database and Application Protection Innovative data protection When it comes to database and application recovery, Symantec has a clear goal in mind simplify the complexity of database

More information

Information Technology Services

Information Technology Services Information Technology Services The purpose of an Information Technology Standard is to specify requirements for compliance with Old Dominion University Information Technology policies, other University

More information

HP Business Availability Center

HP Business Availability Center HP Business Availability Center for the Windows and Solaris operating systems Software Version: 8.02 HP SiteScope Deployment Guide Document Release Date: June 2009 Software Release Date: June 2009 Legal

More information

Exploiting the Web with Tivoli Storage Manager

Exploiting the Web with Tivoli Storage Manager Exploiting the Web with Tivoli Storage Manager Oxford University ADSM Symposium 29th Sept. - 1st Oct. 1999 Roland Leins, IBM ITSO Center - San Jose leins@us.ibm.com Agenda The Web Client Concept Tivoli

More information

Additional Offeror Qualifications: Not applicable.

Additional Offeror Qualifications: Not applicable. Category 1: IBM Host Systems Support Services shall include configuration design, installation, maintenance, modification, monitoring and/or evaluation of operating systems and secondary support software

More information

The syslog-ng Store Box 3 F2

The syslog-ng Store Box 3 F2 The syslog-ng Store Box 3 F2 PRODUCT DESCRIPTION Copyright 2000-2014 BalaBit IT Security All rights reserved. www.balabit.com Introduction The syslog-ng Store Box (SSB) is a high-reliability and high-performance

More information

Virtual Private Servers

Virtual Private Servers Virtual Private Servers Application Form Guide Internode Pty Ltd ACN: 052 008 581 150 Grenfell St Adelaide SA 5000 PH: (08) 8228 2999 FAX: (08) 8235 6999 www.internode.on.net Internode VPS Application

More information

Linux Server Support by Applied Technology Research Center. Proxy Server Configuration

Linux Server Support by Applied Technology Research Center. Proxy Server Configuration Linux Server Support by Applied Technology Research Center Proxy Server Configuration We configure squid for your LAN. Including transparent for HTTP and proxy for HTTPS. We also provide basic training

More information

GF Financial Markets I.T. Architecture Role

GF Financial Markets I.T. Architecture Role GF Financial Markets ( GFFM ) is a London-based wholly owned subsidiary of GF Securities, one of China s largest security houses. GFFM is FCA regulated and a Ring Dealing member of the London Metal Exchange.

More information

Technical Operations Enterprise Lab for a Large Storage Management Client

Technical Operations Enterprise Lab for a Large Storage Management Client Technical Operations Enterprise Lab for a Large Storage Management Client Background Xoriant s client is a large global storage management company with development centers, laboratories and sales offices

More information

SENTINEL MANAGEMENT & MONITORING

SENTINEL MANAGEMENT & MONITORING MANAGEMENT & MONITORING Network Monitoring Server Monitoring Database Monitoring Application Monitoring End User Response Time Monitoring Virtualisation Monitoring VOIP Monitoring SLA Monitoring Knowing

More information

Linux as a High Availability Platform for Oracle RAC A GRT White Paper

Linux as a High Availability Platform for Oracle RAC A GRT White Paper by Andrey Kvasyuk, Senior Consultant July 7, 2005 Introduction For years, the IT community has debated the merits of operating systems such as UNIX, Linux and Windows with religious fervor. However, for

More information

Imaging and Document Management Solutions from Edge Systems, L.L.C.

Imaging and Document Management Solutions from Edge Systems, L.L.C. White Paper Imaging and Document Management Solutions from Edge Systems, L.L.C. Edge Systems, L.L.C. 1805 High Point Dr. Suite 103 Naperville, IL 60563-9359 (630) 810-9669 (630) 810-9228 FAX www.edge.com

More information