Technology Services Strategic Plan Status ITAC February 2011

Size: px
Start display at page:

Download "Technology Services Strategic Plan Status ITAC February 2011"

Transcription

1 Technology Services Strategic Plan Status ITAC February 2011 T S ECHNOLOGY ERVICES Washoe County

2 Agenda I. Results of 1 st Half FY 10/11 Planning Infrastructure Efficiency Employees Security II. Preview of FY 11/12 Core Efficiencies Service Delivery Infrastructure Sustainability Targeted Innovation

3 I. Our Current Fiscal Year Strategic Focus Areas Planning Infrastructure Efficiency Employees Security

4 Planning Planning - resulting in an understood balance between maintenance and new work and in consistently delivered technology achievements.

5 Planning End of 1 st Half FY 2010/11 Completed: Strategic Plan Update FY 2010/11 Performance Measures Revamp RCF Program Rollout E911 Strategic Plan Almost Done: TS Planning Process Technology Architecture Plan Updated Security Policy (moved) In Process: Disaster Recovery Plan

6 Infrastructure Infrastructure - resulting in technology that is there and working when needed.

7 Infrastructure End of 1 st Half FY 2010/11 Completed: 800 MHz Rebanding Elections Existing Telephone Infrastructure Upgrades Many Router, Switch and UPS Upgrades Almost Done: GIS Orthophoto Flights In Process: E911 Next Generation Voice over Internet Protocol (VoIP) IP Based Interoperability w/ State of Nevada Network, Server and Backup Sustainability PC, Office and O/S Plan and First PC Rollout Newly Important: Paging

8 Efficiency Efficiency resulting in process and/or technology improvements that enable the County to work more efficiently.

9 Efficiency End of 1 st Half FY 2010/11 Completed: CRM Pilot (Request Tracker Open Source - External) Request Tracker Internal for Helpdesk Agenda.net Proof of Concept* Almost Done: Accounts Payable SAP Imaging In Process: Court Case Management Assessor s CRM Rollout Public Safety Data Sharing Agenda.net* Records Process Re-engineering* koha (Library)* * New since last strategic plan update

10 Employees Employees resulting in continued delivery of essential technology support with fewer resources.

11 Employees 2 nd Half FY 2010/11 Completed: Technology Training Work Team / Upkeep of Core Technology Training Offering Almost Done: Development Methodology Update In Process: Helpdesk and Field Technician Re-engineering Networking Knowledge Transfer Stalled Technology Training Revamp and Certification Program Water Technology Staff Integration

12 Security & Internal Controls Security resulting in core County and technology functions working well and not being interrupted by internal control weaknesses or security threats / attacks.

13 Security & Internal Controls End of 1 st Half FY 2010/11 Completed: Social Media Policy Proxy Pilot McAfee Licensing Almost Done: Encryption Internet Monitoring In Process: Proxy Rollout VPN Update* McAfee New Mobile Tools Updated Security Policy ipad and Similar Device Policy & Standards* PCI * New since last strategic plan update

14 II. Preview of FY 11/12 Strategic Focus Areas Core Efficiencies Service Delivery Infrastructure Sustainability Targeted Innovation

15 TS Budget as a % of All County Expenses From FY 06/07 thru FY 11/12 T ECHNOLOGY S ERVICES Washoe County TS Budget as a % of All County Expenses 5.0% 4.5% 4.0% 3.5% 3.0% 2.5% 2.0% 1.5% 1.0% 0.5% 0.0% Gartner Baseline = 4%* TS to All County Comparisons Gartner Baseline = $7,403* $8, $7, $6, $5, $4, $3, $2, $1, TS Spend per County Employee (All) 06/07 07/08 08/09 09/10 10/11 Estimate TS as % of All County Expenses Fiscal Year 11/12 Projected TS Spend per County Employee * Gartner Baselines are f or 2010, State & Local Government Averages

16 Core Efficiencies Deliver technology enabled efficiencies prioritized according to the County s core services.

17 Service Delivery Reset and realign the delivery of focused technology services.

18 Infrastructure Sustainability Ensure the on-going operation of our technology infrastructure process, people, systems and equipment.

19 Targeted Innovation Selectively explore and optimize newer methods and technologies.

INFORMATION TECHNOLOGY ENGINEER V

INFORMATION TECHNOLOGY ENGINEER V 1464 INFORMATION TECHNOLOGY ENGINEER V NATURE AND VARIETY OF WORK This is senior level lead administrative, professional and technical engineering work creating, implementing, and maintaining the County

More information

STRATEGIC IT ACCOUNTABILITY BOARD AGENDA Wednesday, December 19, 2012 2:00 3:00 p.m. STARK LIBRARY

STRATEGIC IT ACCOUNTABILITY BOARD AGENDA Wednesday, December 19, 2012 2:00 3:00 p.m. STARK LIBRARY STRATEGIC IT ACCOUNTABILITY BOARD AGENDA Wednesday, December 19, 2012 2:00 3:00 p.m. STARK LIBRARY I. IT Strategic Priorities & ITS Capital Budget (FY 12 13) Update & Approval II. Voice over IP Deployment

More information

Security & Reliability in VoIP Solution

Security & Reliability in VoIP Solution Security & Reliability in VoIP Solution July 19 th, 2006 Ram Ayyakad [email protected] About My background Founder, Ranch Networks 20 years experience in the telecom industry Part of of architecture

More information

IP Telephony Management

IP Telephony Management IP Telephony Management How Cisco IT Manages Global IP Telephony A Cisco on Cisco Case Study: Inside Cisco IT 1 Overview Challenge Design, implement, and maintain a highly available, reliable, and resilient

More information

VoIP Survivor s s Guide

VoIP Survivor s s Guide VoIP Survivor s s Guide Can you really save $, improve operations, AND achieve greater security and availability? Presented by Peggy Gritt, Founder and CEO of the VoIP A non-biased organization for the

More information

FUNCTIONAL AREA 12. Network Administration (NET)

FUNCTIONAL AREA 12. Network Administration (NET) FUNCTIONAL AREA 12 Network Administration (NET) Incumbents in this functional area address interoperability issues related to hardware, software, and connectivity of communications such as cable, fiber

More information

Network Support. Technical Certificate. Program Outcomes: FOUNDATION COURSES. 1 of 7

Network Support. Technical Certificate. Program Outcomes: FOUNDATION COURSES. 1 of 7 1 of 7 Network Support This technical certificate program prepares the student for employment as PC Technician; Computer Support Specialist, and Network Support Technician systems and computer network

More information

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1 Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3

More information

Information Services and Technology FY 2014-16 Performance Plan

Information Services and Technology FY 2014-16 Performance Plan Contents I. Mission Statement... 1 II. Department Overview... 1 III. Program Description and Responsibilities... 2... 2 ATOM... 2 Systems and Applications... 2 Justice... 3 Land Systems... 3 Support Services...

More information

Solving the Desktop Dilemma

Solving the Desktop Dilemma Solving the Desktop Dilemma Enterprise Desktop Solutions Raymond Sleiman DL Groupe GMG [email protected] Mobile :079 200 81 03 Agenda What is VMware View 3 What s new with VMware View 3 Architecture RTO

More information

Infoblox vnios Software for CISCO AXP

Infoblox vnios Software for CISCO AXP Summary Infoblox vnios for Cisco consolidates core network services such as DNS, DHCP and IPAM and others onto the Cisco Integrated Services Router (ISR) running the Application Extension Platform (AXP)

More information

Annual Report 2009-2010

Annual Report 2009-2010 Part 1 Section A Unit Information Unit: Computing Services Annual Report 2009-2010 Mission Statement: Computing Services provides leadership and instills confidence through exceptional technology and assistance

More information

Software-as-a-Service (SaaS) Solutions from CA Technologies Frequently asked questions

Software-as-a-Service (SaaS) Solutions from CA Technologies Frequently asked questions FAQ Edition / April 30, 2014 Software-as-a-Service (SaaS) Solutions from CA Technologies Frequently asked questions FAQ Edition April 2014 Informational Guidelines Table of Contents EXECUTIVE SUMMARY...

More information

Avoid Network Readiness Risks with The Phybridge UniPhyer

Avoid Network Readiness Risks with The Phybridge UniPhyer Avoid Network Readiness Risks with The Phybridge UniPhyer Save over 50% of the cost and 80% in deployment time Receive 100% of the features and functionality of a converged network NO COMPROMISES Allocate

More information

NOS for Network Support (903)

NOS for Network Support (903) NOS for Network Support (903) November 2014 V1.1 NOS Reference ESKITP903301 ESKITP903401 ESKITP903501 ESKITP903601 NOS Title Assist with Installation, Implementation and Handover of Network Infrastructure

More information

VPN vs Port Forwarding

VPN vs Port Forwarding VPN vs Port Forwarding VPN vs Port Forwarding: Which Method is best for delivering Remote Access to home or Small Office Networks Martin Boulter, Luxul Customer Services Manager Installers of home and

More information

Ten Steps to a Successful Business Phone System Implementation. By Clare Kaufman

Ten Steps to a Successful Business Phone System Implementation. By Clare Kaufman Ten Steps to a Successful Business Phone System Implementation By Clare Kaufman Contents Introduction...2 Planning a Business Phone Solution...2 1. Define business requirement...3. 2. Line Up Technical

More information

Web Drive Limited TERMS AND CONDITIONS FOR THE SUPPLY OF SERVER HOSTING

Web Drive Limited TERMS AND CONDITIONS FOR THE SUPPLY OF SERVER HOSTING Web Drive Limited TERMS AND CONDITIONS FOR THE SUPPLY OF SERVER HOSTING Application of Terms Agreement to these terms requires agreement to Web Drive s Standard Terms & Conditions located online at the

More information

Draft ITU-T Recommendation X.805 (Formerly X.css), Security architecture for systems providing end-to-end communications

Draft ITU-T Recommendation X.805 (Formerly X.css), Security architecture for systems providing end-to-end communications Draft ITU-T Recommendation X.805 (Formerly X.css), architecture for systems providing end-to-end communications Summary This Recommendation defines the general security-related architectural elements that

More information

Introduction to Cyber Security / Information Security

Introduction to Cyber Security / Information Security Introduction to Cyber Security / Information Security Syllabus for Introduction to Cyber Security / Information Security program * for students of University of Pune is given below. The program will be

More information

DNS Architecture Case Study: Resiliency and Disaster Recovery

DNS Architecture Case Study: Resiliency and Disaster Recovery DNS Architecture Case Study: Resiliency and Disaster Recovery Cricket Liu VP, Architecture Infoblox Company Background Large U.S.-based company, Company Co. (company.com) Three categories of sites Headquarters

More information

Best Practices for VoIP in the Contact Center Part 1: Planning a Successful Transition BY LORI BOCKLUND AND BRIAN HINTON

Best Practices for VoIP in the Contact Center Part 1: Planning a Successful Transition BY LORI BOCKLUND AND BRIAN HINTON MAY 2008 Best Practices for VoIP in the Contact Center Part 1: Planning a Successful Transition BY LORI BOCKLUND AND BRIAN HINTON Voice over Internet Protocol (VoIP) has reached a new level of maturity

More information

Information Technology

Information Technology Information Technology Information Technology Director Administrative Accounting Technician Network Technology Manager Process and Performance Manager Senior Manager of Systems and Programming Network

More information

Information Technology

Information Technology Information Technology Citizens Board of Commissioners Administrator /Controller Deputy Administrator IT Director Web Administration Network Administratio Imaging Coordinator GIS Coordinator Database Administrator

More information

Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems...

Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems... Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems...3 Improve Processes...4 Innovation...4 IT Planning & Alignment

More information

Recommended IP Telephony Architecture

Recommended IP Telephony Architecture Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 [email protected] This Page Intentionally Left Blank ii Warnings

More information

IT Networking and Security

IT Networking and Security elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software www.medallionlearning.com Fundamentals of Computer

More information

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

Industrial Security for Process Automation

Industrial Security for Process Automation Industrial Security for Process Automation SPACe 2012 Siemens Process Automation Conference Why is Industrial Security so important? Industrial security is all about protecting automation systems and critical

More information

state of south dakota Bureau of Information & Telecommunications Provide a Reliable, Secure & Modern Infrastructure services well-designed innovative

state of south dakota Bureau of Information & Telecommunications Provide a Reliable, Secure & Modern Infrastructure services well-designed innovative Strategic Plan 2015-2017 state of south dakota Bureau of Information & Telecommunications 1GOAL ONE: Provide a Reliable, Secure & Modern Infrastructure services security technology assets well-designed

More information

INFORMATION TECHNOLOGY

INFORMATION TECHNOLOGY MISSION STATEMENT The Information Technology department provides technology, telecommunications and information systems leadership and strategic planning while ensuring efficient, cost effective implementation

More information

City of Coral Gables

City of Coral Gables City of Coral Gables Information Technology Department IT TECHNICAL SUPPORT DIVISION Infrastructure Upgrade Plan Systems, Applications, Network, and Telecommunications Infrastructure OVERVIEW Last revision:

More information

Company overview CUBE52. +44 (0) 118 328 2205 www.cube52.com [email protected] CLOUD SERVICES

Company overview CUBE52. +44 (0) 118 328 2205 www.cube52.com sales@cube52.com CLOUD SERVICES Company overview +44 (0) 118 328 2205 www.cube52.com [email protected] CUBE52 CLOUD SERVICES Modern hosting & cloud services to support your business At Cube52, our modern hosting and cloud services are

More information

How To Assess The State Of Hawaii'S Enterprise Architecture

How To Assess The State Of Hawaii'S Enterprise Architecture BUSINESS AND IT/IRM TRANSFORMATION PLAN ENTERPRISE ARCHITECTURE Table of Contents 1 TABLE OF CONTENTS EXECUTIVE SUMMARY...13 1.0 INTRODUCTION...17 1.1 Purpose...17 1.2 Scope...17 1.3 Document Overview...17

More information

STATE OF NEW JERSEY IT CIRCULAR

STATE OF NEW JERSEY IT CIRCULAR NJ Office of Information Technology P.O. Box 212 www.nj.gov/it/ps/ Chris Christie, Governor 300 River View E. Steven Emanuel, Chief Information Officer Trenton, NJ 08625-0212 STATE OF NEW JERSEY IT CIRCULAR

More information

Information Technology Department Programs and Services

Information Technology Department Programs and Services Brevard County Citizens Board of County Commissioners County Management Information Technology Department Programs and Services Information Systems Administration Telecommunications Software Development

More information

Chris Boykin VP of Professional Services

Chris Boykin VP of Professional Services 5/30/12 Chris Boykin VP of Professional Services Future Com! 20 years! Trusted Advisors! Best of brand partners! Brand name customers! 1000 s of solutions delivered!! 1 5/30/12 insight to the future, bringing

More information

IP Telephony Basics. Part of The Technology Overview Series for Small and Medium Businesses

IP Telephony Basics. Part of The Technology Overview Series for Small and Medium Businesses IP Telephony Basics Part of The Technology Overview Series for Small and Medium Businesses What is IP Telephony? IP Telephony uses the Internet Protocol (IP) to transmit voice or FAX traffic over a public

More information

AL RAFEE ENTERPRISES Solutions & Expertise.

AL RAFEE ENTERPRISES Solutions & Expertise. AL RAFEE ENTERPRISES Solutions & Expertise. Virtualization Al Rafee has strategically made substantial investment in building up a large end to end portfolio of Virtualization across the entire IT infrastructure

More information

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams

More information

MSP Service Matrix. Servers

MSP Service Matrix. Servers Servers MSP Service Matrix Microsoft Windows O/S Patching - Patches automatically updated on a regular basis to the customer's servers and desktops. MS Baseline Analyzer and MS WSUS Server used Server

More information

TABLE OF CONTENTS NETWORK SECURITY 2...1

TABLE OF CONTENTS NETWORK SECURITY 2...1 Network Security 2 This document is the exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors

More information

Based on the VoIP Example 1(Basic Configuration and Registration), we will introduce how to dial the VoIP call through an encrypted VPN tunnel.

Based on the VoIP Example 1(Basic Configuration and Registration), we will introduce how to dial the VoIP call through an encrypted VPN tunnel. 30. VoIP Example 3 (VoIP over VPN) Based on the VoIP Example 1(Basic Configuration and Registration), we will introduce how to dial the VoIP call through an encrypted VPN tunnel. In this example 3300V

More information

Table of Contents. Introduction. Audience. At Course Completion

Table of Contents. Introduction. Audience. At Course Completion Table of Contents Introduction Audience At Course Completion Prerequisites Microsoft Certified Professional Exams Student Materials Course Outline Introduction This three-day instructor-led course provides

More information

Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems... 3. Improve Processes...

Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems... 3. Improve Processes... Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems... 3 Improve Processes... 3 Innovation... 4 IT Planning & Alignment

More information

Multi-layered Security Solutions for VoIP Protection

Multi-layered Security Solutions for VoIP Protection Multi-layered Security Solutions for VoIP Protection Copyright 2005 internet Security Systems, Inc. All rights reserved worldwide Multi-layered Security Solutions for VoIP Protection An ISS Whitepaper

More information

CISCO IOS NETWORK SECURITY (IINS)

CISCO IOS NETWORK SECURITY (IINS) CISCO IOS NETWORK SECURITY (IINS) SEVENMENTOR TRAINING PVT.LTD [Type text] Exam Description The 640-553 Implementing Cisco IOS Network Security (IINS) exam is associated with the CCNA Security certification.

More information

SECURE MOBILE APP DEVELOPMENT: DIFFERENCES FROM TRADITIONAL APPROACH

SECURE MOBILE APP DEVELOPMENT: DIFFERENCES FROM TRADITIONAL APPROACH SECURE MOBILE APP DEVELOPMENT: DIFFERENCES FROM TRADITIONAL APPROACH Suhas Desai Aujas Information Risk Services Session ID: MBS-T02 Session Classification: Intermediate Agenda Trends in Mobile Technology

More information

How to Build a Comprehensive Roadmap and Strategy for Mobility. Winni Hesel Partner Enowa Consulting

How to Build a Comprehensive Roadmap and Strategy for Mobility. Winni Hesel Partner Enowa Consulting How to Build a Comprehensive Roadmap and Strategy for Mobility Winni Hesel Partner Enowa Consulting Quick Reminders 1) If you have trouble hearing us by phone, be sure to use your personal audio PIN, which

More information

VoIP Resilience and Security Jim Credland

VoIP Resilience and Security Jim Credland VoIP Resilience and Security Jim Credland About THUS plc Provider and user of VoIP and Soft Switch technologies Developing Enterprise Security Standards NISCC VoIP Working Group Security Considerations

More information

EaseUS Todo Backup PXE Server

EaseUS Todo Backup PXE Server EaseUS Todo Backup PXE Server ----New added in EaseUS Todo Backup 4.6 EaseUS Todo Backup 4.6 adds PXE Server in Todo Backup Server, Todo Backup Advanced Server and Todo Backup Technician. EaseUS Todo Backup

More information

University of Pittsburgh Security Assessment Questionnaire (v1.5)

University of Pittsburgh Security Assessment Questionnaire (v1.5) Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.5) Directions and Instructions for completing this assessment The answers provided

More information

custom hosting for how you do business

custom hosting for how you do business custom hosting for how you do business 24775 League Island Boulevard Philadelphia PA 19112 gibraltarit.com 866.410.4427 Gibraltar s replicated cloud architecture and PCI/HIPAA compliant data centers provide

More information

NETWORK AND SECURITY MANAGER

NETWORK AND SECURITY MANAGER DATASHEET NETWORK AND SECURITY MANAGER Product Overview Juniper Networks Network and Security Manager (NSM) is a unified device management solution for Juniper s network infrastructure of routing, switching

More information

Timeline for MPLS Deployment

Timeline for MPLS Deployment Timeline for MPLS Deployment What to Expect for Design, Implementation, and Support of SMB Customer MPLS Network Services Get Started Now: 877.611.6342 to learn more. www.megapath.com What to Expect for

More information

Troubleshooting and Maintaining Cisco IP Networks Volume 1

Troubleshooting and Maintaining Cisco IP Networks Volume 1 Troubleshooting and Maintaining Cisco IP Networks Volume 1 Course Introduction Learner Skills and Knowledge Course Goal and E Learning Goal and Course Flow Additional Cisco Glossary of Terms Your Training

More information

NOMINATION FORM. Category for judging: 5 - Digital Government: Government to Government (G to G)

NOMINATION FORM. Category for judging: 5 - Digital Government: Government to Government (G to G) NOMINATION FORM Title of Nomination: Project/System Manager: Job Title: Agency: Enterprise Technology Service Desk Elizabeth Dignan Program Manager State Technology Office Department: Address: 4030 Esplanade

More information

Advantages and Benefits of Running PDI/Enterprise on an Acumera Managed Network

Advantages and Benefits of Running PDI/Enterprise on an Acumera Managed Network Advantages and Benefits of Running PDI/Enterprise on an Acumera Managed Network Overview This white paper, based on a technology interview with PDI, presents some of the key technical and operation advantages

More information

U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL

U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT: U.S. Election Assistance Commission Compliance with the Requirements of the Federal Information Security Management Act Fiscal

More information

November 2013. Defining the Value of MPLS VPNs

November 2013. Defining the Value of MPLS VPNs November 2013 S P E C I A L R E P O R T Defining the Value of MPLS VPNs Table of Contents Introduction... 3 What Are VPNs?... 4 What Are MPLS VPNs?... 5 What Are the Benefits of MPLS VPNs?... 8 How Do

More information

המרכז ללימודי חוץ המכללה האקדמית ספיר. ד.נ חוף אשקלון 79165 טל'- 08-6801535 פקס- 08-6801543 בשיתוף עם מכללת הנגב ע"ש ספיר

המרכז ללימודי חוץ המכללה האקדמית ספיר. ד.נ חוף אשקלון 79165 טל'- 08-6801535 פקס- 08-6801543 בשיתוף עם מכללת הנגב עש ספיר מודולות הלימוד של מייקרוסופט הקורס מחולק ל 4 מודולות כמפורט:.1Configuring Microsoft Windows Vista Client 70-620 Installing and upgrading Windows Vista Identify hardware requirements. Perform a clean installation.

More information

NETWORK ADMINISTRATOR

NETWORK ADMINISTRATOR JOB DESCRIPTION Title: NETWORK ADMINISTRATOR Department: Information Systems Class Code: 1821 FLSA Status: Exempt Effective Date: February 13, 1997 (Rev. 07/2012) Grade Number: 26 GENERAL PURPOSE Under

More information

PREPARED FOR ABC CORPORATION

PREPARED FOR ABC CORPORATION NETWORK DESIGN PROPOSAL PREPARED FOR ABC CORPORATION Prepared by Crystal Technologies PROPRIETARY AND CO NF IDE NTIAL Network Design Proposal PREPARED FOR ABC CORPORATION INC. ARTICLE I. OVERVIEW/HISTORY

More information

Information Technology 2016-2021 Strategic Plan

Information Technology 2016-2021 Strategic Plan Information Technology 2016-2021 Strategic Plan Draft Table of Contents Table of Contents... 3 Introduction... 4 Mission of IT... 4 Primary Service Delivery Objectives... 4 Availability of Systems...

More information

Integrating a Hitachi IP5000 Wireless IP Phone

Integrating a Hitachi IP5000 Wireless IP Phone November, 2007 Avaya Quick Edition Integrating a Hitachi IP5000 Wireless IP Phone This application note explains how to configure the Hitachi IP5000 wireless IP telephone to connect with Avaya Quick Edition

More information

Annual Disaster Recovery Test Report and Gap Analysis for 2011

Annual Disaster Recovery Test Report and Gap Analysis for 2011 Page 1 Annual Disaster Recovery Test Report and Gap Analysis for 2011 Prepared by the 2011 Disaster Recovery Test Team 6/8/2011 Prepared Date Contents Annual Disaster Recovery Test Report and Gap Analysis

More information

A POLYCOM WHITEPAPER Polycom. Recommended Best Security Practices for Unified Communications

A POLYCOM WHITEPAPER Polycom. Recommended Best Security Practices for Unified Communications Polycom Recommended Best Security Practices for Unified Communications March 2012 Unified Communications (UC) can be viewed as another set of data and protocols utilizing IP networks. From a security perspective,

More information

EXIN Cloud Computing Foundation

EXIN Cloud Computing Foundation Sample Questions EXIN Cloud Computing Foundation Edition April 2013 Copyright 2013 EXIN All rights reserved. No part of this publication may be published, reproduced, copied or stored in a data processing

More information

Securing Digital Processes

Securing Digital Processes Securing Digital Processes Carsten Rudolph Carsten Rudolph and Nicolai Kuntze Fraunhofer-Institut for Secure Information Technology Rheinstrasse 75, 64295 Darmstadt, Germany E-Mail: [email protected]

More information

Advanced Higher Computing. Computer Networks. Homework Sheets

Advanced Higher Computing. Computer Networks. Homework Sheets Advanced Higher Computing Computer Networks Homework Sheets Topic : Network Protocols and Standards. Name the organisation responsible for setting international standards and explain why network standards

More information

Integrated Technology Plan (FY10 FY12)

Integrated Technology Plan (FY10 FY12) (FY10 FY12) Anne Arundel Community College embraces and promotes a seamless integration of appropriate technologies in support of the learning community within the framework of the college s mission and

More information

Network and Security. Product Description. Product Overview. Architecture and Key Components DATASHEET

Network and Security. Product Description. Product Overview. Architecture and Key Components DATASHEET DATASHEET Network and Security Manager Product Overview Network and Security Manager provides unparalleled capability for device and security policy configuration, comprehensive monitoring, reporting tools,

More information