ICT in former National University of Rwanda; the journey. Mazimpaka Olivier
|
|
- Ronald Hines
- 8 years ago
- Views:
Transcription
1 ICT in former National University of Rwanda; the journey Mazimpaka Olivier
2 Briefly about.. Historical background, ICT services in the Former National University of Rwanda.(now part of the UR) The ICT life in campus and, The use of ICT in Education, the challenges, the lessons learnt so far and the Suggested way forward.
3 The National University of Rwanda (NUR) is Rwanda s state university, founded in November 3rd, 1963 as an institution of higher learning, with a mission to provide higher education, conduct research, and offer services to the community. The oldest and the largest University in the country. Located in the Southern Province, 150 km south of the capital city of Kigali. It was the only publicly funded university until the 1990 s. Closed during the 1994 genocide and reopened in March Able to fully recover from the 1994 war and genocide and confront new challenges such as increased access and ICT development.
4 The journey
5 Services eresources (ezproxy) [koffi.nur.ac.rw] ebooks [ebooks.nur.ac.rw] elearning [elearn.nur.ac.rw] Ticketing System [otrs.nur.ac.rw] [helpdesk.nur.ac.rw] Password Management [webldap.nur.ac.rw] MIT Open Coursware [ocw.nur.ac.rw] Intranet Portal [intranet.nur.ac.rw] Timetable Service (Celtcat) Repository (Dspace) [repository.nur.ac.rw] Document Flow [cuteflow.nur.ac.rw] FAQ [faq.nur.ac.rw] cuteflow.nur.ac.rw Project Management [project.nur.ac.rw] Conference System [ NUR Internal System [mail.nur.ac.rw] Dropbox System [dropbox.nur.ac.rw] Mailman for Group [lists.nur.ac.rw] Library Thin Client and other two Labs in the campus are opened for 24 Hrs 5
6 Services Increased Communication Infrastructure Internal System No Proper hardware & backup capacity No well trained technicians Google Apps High Internet bandwidth Usage Acquired 35 Long-range Wavion / Alvarion Access points. Internal System (HORDE) Proper Server with Redundancy Backups (Tape) & Network Storage Trained Technicians Improved bandwidth Usage Improved internal communication Use Google Apps for Backup 6
7 Network is secured from Virus and worms Purchased Kaspersky Antivirus for 10,000 users with 2 years renewable license Complaints regarding data loss due to virus is reduced less than 2 % from 80% from the users (Staff & Researchers) All the Lab & staff computers are installed with internet access (though not enough computers and rooms) Web Services have been secured by moving most of the HTTP services to HTTPS NAGIOS Network Monitoring Tool CACTI Bandwidth Management Tool LDAP Single Source of Database NSDB Network Management (Utilizing 50% of its functions)
8 Bandwidth in Mbps Improved Internet Connectivity (From 2 to 57 Mbps) Down Up 0,76 0, and currently to 83mbps
9 Student Satisfaction Students Satisfaction on Wireless Services Ok 50% Poor 7% Other 12% Good 30% Very Good 8% Very Poor 5% Source: Memoir (BIT-2011) Evaluation of ICT Services offered to the NUR Community by ICT Center Student Perception on Wireless Usage 9
10 Challenges Despite the above undisputed comparative advantages, the NUR has however to overcome challenges : The curricula are still too fragmented and subject-oriented, and the teaching is still too teacher centered with little room for student self-directed learning The infrastructure is overstretched by the increased number of students and equipment does not match research needs. Though ICT penetration has reached an acceptable level, access to computers, internet connectivity, and usage of ICT in education and research have not yet reached a satisfactory level. No staff retention mechanism: ICT Center staff Turn over : From 46 in 2012 to 25 in 2014.and most of times with new recruitments
11 Percentage of Visits Visits to Electronic NUR 100% 90% 80% 70% 60% 50% 40% 30% 20% 10% 0% ebooks ejournals elearn NUR Mail System NUR Website OCW Password Managemen t 2011* 972 2,137 20,689 21, ,486 32,788 7,761 18, , ,505 89,312 2,498 19, , ,648 14, Services SRS * 11
12 Thinking about One University To interconnect all Colleges we need: A team...(in progress) Policies and implementation strategy Demystifying the ICT A University backbone Local Network on each Exchange point Data center Disaster Recovery data center Technical Staff development Staff retention mechanism Etc... 12
13
Procedure Title: TennDent HIPAA Security Awareness and Training
Procedure Title: TennDent HIPAA Security Awareness and Training Number: TD-QMP-P-7011 Subject: Security Awareness and Training Primary Department: TennDent Effective Date of Procedure: 9/23/2011 Secondary
More informationDATA CENTER SERVICE CATALOG
DATA CENTER SERVICE CATALOG KING SAUD UNIVERSITY DEANSHIP OF ETRANSACTIONS & COMMUNICATION VERSION 1.1 INTERNAL USE ONLY PREPARED BY REVIEWED BY APPROVED BY NAFEZ ALBESHEETI DR.MISHARI ALMISHARI DR.MISHARI
More informationCloud Computing And Post Primary Education. Seamus Ryan Education Officer Co. Meath VEC
Cloud Computing And Post Primary Education Seamus Ryan Education Officer Co. Meath VEC Cloud Services What is Cloud Computing Any ICT service that is available to you from outside your own location via
More informationName: Position held: Company Name: Is your organisation ISO27001 accredited:
Third Party Information Security Questionnaire This questionnaire is to be completed by the system administrator and by the third party hosting company if a separate company is used. Name: Position held:
More informationBernards Township Technology Update 2011-12. Brian Heineman, Supervisor of Science and Technology James Rollo, Technology Manager
Bernards Township Technology Update 2011-12 Brian Heineman, Supervisor of Science and Technology James Rollo, Technology Manager Goal 1: Maintenance of educational technology tools will be sufficient so
More informationUNIVERSITY DATA CENTRE
UNIVERSITY DATA CENTRE Establishment of BSAU Data Centre Rapid expansion of the institute and exponential growth in the application of information technology in teaching learning process Enormous need
More informationCENG Information Technology Services University of North Texas
CENG Information Technology Services University of North Texas for the Information Technology Services as applied To the University of North Texas College of Engineering 1.0 Agreement 1.1 Purpose CENGITS
More informationINFORMATION TECHNOLOGY SERVICES TECHNICAL SERVICES June 2012
INFORMATION TECHNOLOGY SERVICES TECHNICAL SERVICES June 2012 Program Description Network Services is a service unit in Information Technology Services responsible for designing, acquiring, deploying, operating,
More informationICT MANAGER ROLE DESCRIPTION
Classification: Education Support Officer Level 5 Hours: 8.30am 4.30pm Term of appointment: Ongoing, commencing Term 1, 2015 OVERVIEW OF COLLEGE Catholic Regional College North Keilor was founded in 1982
More informationTECHNICAL SECURITY AND DATA BACKUP POLICY
TECHNICAL SECURITY AND DATA BACKUP POLICY PURPOSE Effective technical security depends not only on technical measures, but also on appropriate policies and procedures and on good user education and training.
More informationMary Immaculate. ICT Services. ICT Helpdesk. User Guide
Mary Immaculate ICT Services ICT Helpdesk User Guide Table of Contents 1. Introduction 3 2. How To Log A Call With The ICT Helpdesk 3 2.1 Email 3 2.2 Phone 3 2.3 Voicemail 3 2.4 Web Self Service Option
More informationEntrust IdentityGuard Comprehensive
Entrust IdentityGuard Comprehensive Entrust IdentityGuard Comprehensive is a five-day, hands-on overview of Entrust Course participants will gain experience planning, installing and configuring Entrust
More informationThe primary goals of the technology plan are to support the goals of the district strategic plan:
STOUGHTON PUBLIC SCHOOLS TECHNOLOGY PLAN 2012-2015 I. MISSION The mission of Stoughton Public School's Technology Program is to provide technology systems and support that meet the needs of students, teachers,
More informationUpdating Your Skills from Microsoft Exchange Server 2003 or Exchange Server 2007 to Exchange Server 2010 SP1
Course 10165A: Updating Your Skills from Microsoft Exchange Server 2003 or Exchange Server 2007 to Exchange Server 2010 SP1 OVERVIEW About this Course There are two main reasons for the course. Firstly,
More informationAnnual Report 2009-2010
Part 1 Section A Unit Information Unit: Computing Services Annual Report 2009-2010 Mission Statement: Computing Services provides leadership and instills confidence through exceptional technology and assistance
More informationNon Academic Assessment Workspace
Non Academic Assessment Workspace Created on: 06/10/2015 04:28:00 PM EDT Last Modified: 07/01/2015 12:37:39 PM EDT Table of Contents General Information Standing Requirements Mission Statement Operational
More informationNEVADA SYSTEM OF HIGHER EDUCATION SYSTEM COMPUTING SERVICES SERVICES CATALOG NOVEMBER 2012
NEVADA SYSTEM OF HIGHER EDUCATION SYSTEM COMPUTING SERVICES SERVICES CATALOG NOVEMBER 2012 1 Foreword The Nevada System of Higher Education (NSHE) comprises eight institutions, including universities,
More information21 Questions you should ask your IT service provider Before hiring them to support your network
21 Questions you should ask your IT service provider Before hiring them to support your network Customer Service: Q1: Do they answer their phones live or do you always have to leave a voice mail and wait
More informationPlease tell us what other information resources you would like to see included in the egranary
190 egranary Digital Library Evaluation Administrative Survey Open Question Responses Please tell us what other information resources you would like to see included in the egranary More information on
More informationAVLOR SERVER CLOUD RECOVERY
AVLOR SERVER CLOUD RECOVERY WHITE PAPER 1 Table of Contents Abstract... 2 1. Introduction... 3 2. Server Cloud Recovery... 3 3. Amazon AWS Cloud... 4 a. What it is... 4 b. Why Use AWS?... 5 4. Difficulties
More informationIT Assessment Report. Prepared by: Date: BRI Works www.bri.works 321 East Main Street, Suite 200 Charlottesville VA 22902 434.951.
IT Assessment Report Prepared by: Date: BRI Works www.bri.works 321 East Main Street, Suite 200 Charlottesville VA 22902 434.951.7979 Table of Contents Executive Summary 3 IT Summary 3 Assessment Goal
More informationInformation Technology Services August 19, 2015 - Fall 2015
Information Technology Services August 19, 2015 - Fall 2015 IT Services Cover All of the University and Community 2 Internally Connected University & Community Teaching & Learning Research Support R&D
More informationTk20 Backup Procedure
Tk20 Backup Procedure 1 TK20 BACKUP PROCEDURE OVERVIEW 3 FEATURES AND ADVANTAGES: 3 TK20 BACKUP PROCEDURE 4 DAILY BACKUP CREATION 4 TRANSFER OF BACKUPS 5 AUDITING PROCESS 5 BACKUP REPOSITORY 5 WRITE TO
More informationCSIR-NISCAIR is disseminating scientific information and delivering various
6 IT Facilities & Programmes CSIR-NISCAIR is disseminating scientific information and delivering various services through the use of modern IT infrastructure, which has also helped the Institute to take
More information2008 Small Business Technology Trends Survey: A Peer Perspective on IT in Small Business
Enabling Small Business Success 2008 Small Business Technology Trends Survey: A Peer Perspective on IT in Small Business 2008 All Covered Inc. www.allcovered.com Contents EXECUTIVE SUMMARY... 3 RECOMMENDATIONS...
More informationManaged Security Services SLA Document. Response and Resolution Times
Managed Security Services SLA Document Appendix A Response and Resolution Times The following table shows the targets of response and resolution times for each priority level: Trouble Priority Response
More informationBackups and Cloud Storage
Backups and Cloud Storage Front Range PC Users Group November 1, 2011 Definitions 1 A search using Google with the search criteria: online backup returned >192 million results A search using Google with
More informationMaking the leap to the cloud: IS my data private and secure?
Making the leap to the cloud: IS my data private and secure? tax & accounting MAKING THE LEAP TO THE CLOUD: IS MY DATA PRIVATE AND SECURE? Cloud computing: What s in it for me? The more you know about
More informationKENET NETWORK INFRASTUCTURE. KENNEDY ASEDA kaseda@kenet.or.ke
KENET NETWORK INFRASTUCTURE KENNEDY ASEDA kaseda@kenet.or.ke Country of marathon winners? 2 Google Confidential and Proprietary Contents Network Infrastructure Network Operations Achievements & Challenges
More informationOffice of the Chief Information Officer 2014 STUDENT HANDBOOK 2014 15
Office of the Chief Information Officer 2014 STUDENT HANDBOOK 2014 15 7. Feedback & Suggestions To help us excel in our service provision, you are welcome to send us your comments or suggestions through
More informationDeveloping a Comprehensive Disaster-Recovery Plan. Prepared for CENIC by USC Information Technology Services March 2010
Developing a Comprehensive Disaster-Recovery Plan Prepared for CENIC by USC Information Technology Services March 2010 1 Why Business Continuity and Disaster Recovery? We want to provide continuous service
More information2015 USER GROUP CONFERENCE
2015 USER GROUP CONFERENCE The Cloud This session will touch anything and everything cloud based that is important to districts today. We will compare and contrast Google Apps and Office 365, Cloud storage
More informationCourse Outline: Course 10165: Updating Your Skills from Microsoft Exchange Server 2003 or Exchange
Course Outline: Course 10165: Updating Your Skills from Microsoft Exchange Server 2003 or Exchange Server 2007 to Exchange Server 2010 Learning Method: Instructor-led Classroom Learning Duration: 5.00
More informationUW Oshkosh IT Plan Submission January, 2014
UW Oshkosh IT Plan Submission January, 2014 Information Technology & University Strategic Objectives 1. How the plan was developed. The University s administrative team drafted seven Key Operational Plans.
More informationRole Purpose: Position Context. Responsibilities Duties
Mount St. Joseph Girls College Systems Administrator / Service Desk Level 1 and 2 Position Description Role Purpose: The Systems Administrator / Service Desk position is responsible for the day to day
More information1.0 Hardware Requirements:
01 - ServiceDesk Plus - Best Practices We appreciate you choosing ServiceDesk Plus for your organization to deliver world-class IT services. Before installing the product, take a few minutes to go through
More informationPolicy Document. Communications and Operation Management Policy
Policy Document Communications and Operation Management Policy [23/08/2011] Page 1 of 11 Document Control Organisation Redditch Borough Council Title Communications and Operation Management Policy Author
More informationT141 Computer Systems Technician MTCU Code 50505 Program Learning Outcomes
T141 Computer Systems Technician MTCU Code 50505 Program Learning Outcomes Synopsis of the Vocational Learning Outcomes * The graduate has reliably demonstrated the ability to 1. analyze and resolve information
More informationDelphi+ System Requirements
Delphi+ System Requirements Revision 1.1 Newmarket International, Inc. October 24, 2013 Delphi+ System Requirements Users Up to 15 Up to 25 Up to 50 Up to 90 Up to 200 Over 200 Minimum 2008 Server Hardware
More informationComplete Managed Services. Proposal for managed services for the City of Tontitown
Complete Managed Services Proposal for managed services for the City of Tontitown Complete Managed Services Components Windows Server 2008, Windows Server 2012 1. Proactive Maintenance of Server(s) Proactive
More informationLaney Information Technology Services
Laney Information Technology Services Mission Statement The mission of the Laney Information Technology Services (LITS) is to provide a scalable technological infrastructure, and provide innovation in
More informationSECURE AUTOMATED RELIABLE
SECURE AUTOMATED RELIABLE ONLINE BACKUP SOLUTION FOR YOUR BUSINESS LIFELINE DATA Secure - Data is encrypted using AES 256 bit before transmission. - Connection with DataBank servers is encrypted using
More informationComputer System Information Century School District 2007-08 Daniel E. Cook
Computer System Information Century School District 2007-08 Daniel E. Cook Account Log On There are various ways to log on to the school s server. Each one has a unique reason. Teacher Log On Teacher Log
More information15 Oct 2014. Technology Strategies for Small Business
15 Oct 2014 Technology Strategies for Small Business Chris Coleman Area9 Director Technology 30+ years working in IT 15+ years in 2 of my own small businesses Area9 7 years old with ~50 staff Professional
More informationCourse Description. Course Outline. Duration: 5 days Course Price: $2,975. Software Assurance Eligible. About this Course
10165 - Updating Your Skills from Microsoft Exchange Server 2003 or Exchange Server 2007 to Exchange Server 2010 SP1 Duration: 5 days Course Price: $2,975 Software Assurance Eligible Course Description
More informationThe Cloud Case Study - Student Software Development
Learner Focused Applications in the Cloud Case Study Colleges and Projects Barnsley College Blackburn College Grimsby Institute Leeds City College North East Worcestershire College Oxford and Cherwell
More information6. FINDINGS AND SUGGESTIONS
6. FINDINGS AND SUGGESTIONS 6.1 Introduction: The advancements in ICT and their proper utilization by research and academic librarians are not only strengthening the capabilities of libraries but also
More informationSupplier Security Assessment Questionnaire
HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.
More informationBacking up your Data. October 2014 Gus Falkenberg/Kris Schwartz
Backing up your Data October 2014 Gus Falkenberg/Kris Schwartz Welcome We will be covering Backup vs. Sharing Backup Sharing Files Questions Backup vs. Sharing Different Goals Backups Disaster Recovery
More informationTable of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems... 3. Improve Processes...
Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems... 3 Improve Processes... 3 Innovation... 4 IT Planning & Alignment
More informationUNT Institutional Effectiveness Database
Plan NON-ACADEMIC ASSESSMENT PLAN Department: Computing and Information Technology Center Period: FY2004 Status: Plan Completed and Approved Mission The mission of the UNT Computing and Information Technology
More informationOsterman Research Executive Summary
Osterman Research Executive Summary Much of what is transmitted through an email system or an instant messaging (IM) system constitutes a record, or a document that must be kept for a minimum period of
More informationDelphi 2015 SP1-AP1 System Requirements
Delphi 2015 SP1-AP1 System Requirements Revision 1.2 Newmarket International Inc. July 24,2015 newmarketinc.com Copyright 2015 Newmarket International, Inc., an Amadeus company. All rights reserved. This
More information3. A damage assessment will be conducted by the IT Director, and if applicable vendor/consult, and reported back to Management.
3. A damage assessment will be conducted by the IT Director, and if applicable vendor/consult, and reported back to Management. 4. Individuals required to assist in recovery of these services will be identified.
More informationInteract Intranet Version 7. Technical Requirements. August 2014. 2014 Interact
Interact Intranet Version 7 Technical Requirements August 2014 2014 Interact Definitions... 3 Licenses... 3 On-Premise... 3 Cloud... 3 Pulic Cloud... 3 Private Cloud... 3 Perpetual... 3 Self-Hosted...
More informationKey Enablers for the Cloud Service Broker: Identity, Privacy, and Security
Key Enablers for the Cloud Service Broker: Identity, Privacy, and Security OMG Telecom Cloud Workshop Dec 6, 2010 David F. Chen Lead Principal-Technical Architect Ecosystem & Innovation, AT&T, Inc. Footer
More informationMarval Software Limited. G Cloud iii Framework Service Definition
1 Marval Software Limited G Cloud iii Framework Service Definition Page 1 of 9 2 Contents An overview of the Marval Service Management (MSM) Software Solution... 3 Information assurance Impact Level (IL)
More informationEmergency Preparedness
Emergency Preparedness Creating a Disaster Recovery Plan for your Drupal Site Keri Poeppe Gorton Studios/NodeSquirrel.com Twin Cities Drupal Camp 2014 Hello! Keri Poeppe Product Manager, NodeSquirrel Content
More informationNorth Florida Community College
North Florida Community College Technology Plan Table of Contents Executive Summary... 3 Technology Vision... 5 Annual Initiatives... 6 2010 Data Center Expansions... 6 The Next 3 Years... 6 Technology
More informationVermont College of Fine Arts Information Technology Disaster Recovery Plan for Fiscal Year 2012
Vermont College of Fine Arts Information Technology Disaster Recovery Plan for Fiscal Year 2012 Introduction: Vermont College of Fine Arts (VCFA) is a national center for education in the arts, fostering
More informationTSM Backup Service. Standard Service Level Agreement
TSM Backup Service Standard Service Level Agreement University Of Michigan Information Technology and Services 7/1/2008 1.0 Overview Service Level Agreements (SLAs) are between Information Technology and
More informationFreedom... a true Cloud Based solution for education!
Freedom... a true Cloud Based solution for education! CONTENTS What is Freedom? Focus on Learning Keeping it Simple Freedom Elements Freedom Access Freedom Services 05 07 09 11 13 15 Freedom... a Cloud
More informationLaw College Computer and Technology Information
Law College Computer and Technology Information Account Creation All law students, faculty and staff must have a University of Toledo authentication domain (UTAD) computer account. This account will allow
More informationResNet Guide. Information & Learning Services. Here to support your study and research
ResNet Guide Information & Learning Services Here to support your study and research ResNet Quick Start Guide In order to get you on-line and enjoying the service as quickly and as painlessly as possible,
More informationSimon School IT FAQ Guide
Simon School IT FAQ Guide 1 What Are The Suggested Specs My Computer Should Have? The Simon School Information Technology Department can make the following suggestions: Windows XP Operating System 1) CPU
More informationIT Customer Satisfaction Survey Outcome
IT Customer Satisfaction Survey Outcome Version 20141229 Yousif Asfour Chief Information Officer Dec 29, 2014 American University of Beirut Methodology Announced by email to AUB Campus and AUB MC members
More informationUniversity Computing Services Florida State University Data Storage and Server Hosting Options
University Computing Services Florida State University Data Storage and Server Hosting Options The Office of Technology Integration (OTI), through its University Computing Services (UCS) division, extends
More informationFond du Lac Tribal and Community College Information Technology. 2013 2015 Technology Master Plan
Fond du Lac Tribal and Community College Information Technology 2013 2015 Technology Master Plan The Mission of Information Technology at Fond du Lac Tribal and Community College: We provide technological
More informationIs Cloud Backup good insurance for your brokerage?
Is Cloud Backup good insurance for your brokerage? Don Purchase is the Business Development Manager at Stage2- Data; Canada s Premiere Cloud Solutions Provider. Stage2Data is the Affinity Partner of the
More informationTable of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems...
Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems...3 Improve Processes...4 Innovation...4 IT Planning & Alignment
More informationUse of The Information Services Electronic Journals Service Code of Practice
Use of The Information Services Electronic Journals Service Code of Practice Introduction This code of practice is intended to support the Information Security Policy of the University and should be read
More informationEstrella Mountain Community College Information Technology Plan
DRAFT Estrella Mountain Community College Information Technology Plan January 2002 DRAFT Information Technology Plan Summary At Estrella Mountain technology serves as the vehicle through which information
More informationBACKUP AND RECOVERY PLAN MS SQL SERVER
BUREAU OF INFORMATION & TELECOMMUNICATIONS BACKUP AND RECOVERY PLAN MS SQL SERVER Page 1 of 5 Revisions & Addendums Log: Instructions: Changes and Addendum can be sent to: James R. Douglas, Technical Analyst
More informationAL RAFEE ENTERPRISES Solutions & Expertise.
AL RAFEE ENTERPRISES Solutions & Expertise. Virtualization Al Rafee has strategically made substantial investment in building up a large end to end portfolio of Virtualization across the entire IT infrastructure
More informationTexas Transportation Institute Information Resources Strategic Plan 2012 2016
Texas Transportation Institute Information Resources Strategic Plan 2012 2016 June 2012 Information Resources Strategic Plan 2012 2016 Texas Transportation Institute The Texas A&M University System The
More informationRole and Mandate of Computing and Communications (C&C) Memorial University
Role and Mandate of Computing and Communications (C&C) Memorial University Mission: Our goal is to promote quality and excellence in the delivery of information services to the university community. We
More informationChapter 14! Enterprise Computing!
Chapter 14 Enterprise Computing Enterprise computing involves the use of computers in networks, such as LANs and WANs, or a series of interconnected networks that encompass a variety of different operating
More informationExposing the Cloud: It It s More than a Buzzword Tim Connors, Director, AT&T AT&T
Exposing the Cloud: It s More than a Buzzword Tim Connors, Director, AT&T Exposing the Cloud: It s More than a Buzzword Discussion Agenda Cloud Storage Target Uses When is it right? When is it wrong? Specific
More informationHow To Recover From A Disaster
BELA-BELA LOCAL MUNICIPALITY Chris Hani Drive, Bela- Bela, Limpopo. Private Bag x 1609 BELA-BELA 0480 Tel: 014 736 8000 Fax: 014 736 3288 Website: www.belabela.gov.za OFFICE OF THE MUNICIPAL MANAGER Information
More informationInformation Technology Solutions. Managed IT Services
Managed IT Services System downtime, viruses, spyware, lost productivity; if these problems are impacting your business, it is time to make technology work for you. At ITS, we understand the importance
More informationCore Data Service 2015 IT Domain Definition Change Overview
Core Data Service 2015 IT Domain Definition Change Overview Administration and Management of IT Administration of central IT organization CIO or CTO position Institutional IT planning Financial planning
More informationEAST AYRSHIRE COUNCIL CABINET. 16 th June 2010. 2010 / 11 to 2012 / 13 INFORMATION TECHNOLOGY SERVICES CAPITAL EXPENDITURE PROGRAMME
EAST AYRSHIRE COUNCIL CABINET 16 th June 2010 2010 / 11 to 2012 / 13 INFORMATION TECHNOLOGY SERVICES CAPITAL EXPENDITURE PROGRAMME Report by Executive Director of Finance & Corporate Support 1. PURPOSE
More informationrisk of failure of or access to system applications. Backup software used for backup management is Bakbone Netvault : Backup.
CENTRALIZED BACKUP INTRODUCTION ICT Data Center houses a total number of servers and providing ICT services to UniMAP. The use of ICT is a major and important method in supporting the daily operations
More informationSwansea University. ICT Infrastructure Strategic Plan: 2015 2017
Swansea University ICT Infrastructure Strategic Plan: 2015 2017 Context ICT is essential for the University to achieve its ambitious expansion plans and to operate on a day today basis. IT underpins our
More informationUniversity of Kent Information Services Information Technology Security Policy
University of Kent Information Services Information Technology Security Policy IS/07-08/104 (A) 1. General The University IT Security Policy (the Policy) shall be approved by the Information Systems Committee
More informationInformation Technology
Program Review - 2014-2015 Department Purpose Describe the purpose of the Discipline/Program/Service. IT department plans, designs, implements, and coordinates a variety of information technologies to
More informationMUNCIE PUBLIC LIBRARY
Technology supports the mission of the Library to Provide accessible and innovative services in response to community needs Technology Plan 2013/14-2015/16 MUNCIE PUBLIC LIBRARY While helping to accomplish
More informationImplementing Security Education at a Small Community College
PRACTICAL SECURITY Implementing Security Education at a Small Community College Corrinne Sande Whatcom Community College Abstract: Key words: This paper discusses modifying an existing two-year degree
More informationDICTS Network Management Unit. Presenter: David Gaamuwa & Steven Tusubira DICTS, MUK
DICTS Network Management Unit Presenter: David Gaamuwa & Steven Tusubira DICTS, MUK DICTS NETWORK MANAGEMENT UNIT 15/04/2013 1 Networks Team Beatrice Dhaala David Gaamuwa Florence Kivunike Moses Kibirango
More informationBUILT FOR YOU. Contents. Cloudmore Exchange
BUILT FOR YOU Introduction is designed so it is as cost effective as possible for you to configure, provision and manage to a specification to suit your organisation. With a proven history of delivering
More informationAddendum Project RED: Global Toolkit for Education Transformation Checklist
For quick reference, here are checklists for each key implementation factor: leadership, curriculum and assessment, research and evaluation, professional learning, information communications technology,
More informationBusiness Continuity Plans- Technology. Preparation Instructions. Inventory and Assessment. System Backup Procedures
Business Continuity Plans- Technology Preparation Instructions Lutheran Community Services Northwest has operational offices in almost 30 separate locations throughout the states of Washington, Oregon,
More informationCLOUD SERVICE SCHEDULE Newcastle
CLOUD SERVICE SCHEDULE Newcastle 1 DEFINITIONS Defined terms in the Standard Terms and Conditions have the same meaning in this Service Schedule unless expressed to the contrary. In this Service Schedule,
More informationAdobe Digital Publishing Security FAQ
Adobe Digital Publishing Suite Security FAQ Adobe Digital Publishing Security FAQ Table of contents DPS Security Overview Network Service Topology Folio ProducerService Network Diagram Fulfillment Server
More informationAcquisition and Deployment of Technology in Academic Library Environment : Experience in Thailand
Acquisition and Deployment of Technology in Academic Library Environment : Experience in Thailand Sujin Butdisuwan Faculty of Informatics Division of Library and Information Sciences Mahasarakham University,
More informationPROTECTION AND SYSTEM MAINTENANCE COMPUTER AND COMUNICATION SYSTEM OF EXECUTIVE COUNCIL OF AUTONOMOUS PROVINCE OF VOJVODINA.
PROTECTION AND SYSTEM MAINTENANCE COMPUTER AND COMUNICATION SYSTEM OF EXECUTIVE COUNCIL OF AUTONOMOUS PROVINCE OF VOJVODINA Milan Paroški 1, Nenad Petrović, Rade Ćirić 2 1 Provincial Authorities Administrative
More informationDisaster Recovery Solution Achieved by EXPRESSCLUSTER
Disaster Recovery Solution Achieved by EXPRESSCLUSTER http://www.nec.com/expresscluster/ NEC Corporation System Software Division December, 2012 Contents 1. Clustering system and disaster recovery 2. Disaster
More informationICT, INTERNET AND EMAIL GOOD PRACTICE POLICY
Mossbourne Community Academy ICT, INTERNET AND EMAIL GOOD PRACTICE POLICY This policy document sets out the school's aims, principles and strategies for the cross curricular delivery and use of Information
More informationShared Machine Room / Service Opportunities. Bruce Campbell November, 2011
Shared Machine Room / Service Opportunities Bruce Campbell November, 2011 Overview / Motivation Efficiencies Disaster Recovery First a bit about servers/storage/backups/redundancy Example: Non redundant
More information