Technology Services Strategic Plan Status ITAC February 2011
|
|
|
- Stuart Boyd
- 10 years ago
- Views:
Transcription
1 Technology Services Strategic Plan Status ITAC February 2011 T S ECHNOLOGY ERVICES Washoe County
2 Agenda I. Results of 1 st Half FY 10/11 Planning Infrastructure Efficiency Employees Security II. Preview of FY 11/12 Core Efficiencies Service Delivery Infrastructure Sustainability Targeted Innovation
3 I. Our Current Fiscal Year Strategic Focus Areas Planning Infrastructure Efficiency Employees Security
4 Planning Planning - resulting in an understood balance between maintenance and new work and in consistently delivered technology achievements.
5 Planning End of 1 st Half FY 2010/11 Completed: Strategic Plan Update FY 2010/11 Performance Measures Revamp RCF Program Rollout E911 Strategic Plan Almost Done: TS Planning Process Technology Architecture Plan Updated Security Policy (moved) In Process: Disaster Recovery Plan
6 Infrastructure Infrastructure - resulting in technology that is there and working when needed.
7 Infrastructure End of 1 st Half FY 2010/11 Completed: 800 MHz Rebanding Elections Existing Telephone Infrastructure Upgrades Many Router, Switch and UPS Upgrades Almost Done: GIS Orthophoto Flights In Process: E911 Next Generation Voice over Internet Protocol (VoIP) IP Based Interoperability w/ State of Nevada Network, Server and Backup Sustainability PC, Office and O/S Plan and First PC Rollout Newly Important: Paging
8 Efficiency Efficiency resulting in process and/or technology improvements that enable the County to work more efficiently.
9 Efficiency End of 1 st Half FY 2010/11 Completed: CRM Pilot (Request Tracker Open Source - External) Request Tracker Internal for Helpdesk Agenda.net Proof of Concept* Almost Done: Accounts Payable SAP Imaging In Process: Court Case Management Assessor s CRM Rollout Public Safety Data Sharing Agenda.net* Records Process Re-engineering* koha (Library)* * New since last strategic plan update
10 Employees Employees resulting in continued delivery of essential technology support with fewer resources.
11 Employees 2 nd Half FY 2010/11 Completed: Technology Training Work Team / Upkeep of Core Technology Training Offering Almost Done: Development Methodology Update In Process: Helpdesk and Field Technician Re-engineering Networking Knowledge Transfer Stalled Technology Training Revamp and Certification Program Water Technology Staff Integration
12 Security & Internal Controls Security resulting in core County and technology functions working well and not being interrupted by internal control weaknesses or security threats / attacks.
13 Security & Internal Controls End of 1 st Half FY 2010/11 Completed: Social Media Policy Proxy Pilot McAfee Licensing Almost Done: Encryption Internet Monitoring In Process: Proxy Rollout VPN Update* McAfee New Mobile Tools Updated Security Policy ipad and Similar Device Policy & Standards* PCI * New since last strategic plan update
14 II. Preview of FY 11/12 Strategic Focus Areas Core Efficiencies Service Delivery Infrastructure Sustainability Targeted Innovation
15 TS Budget as a % of All County Expenses From FY 06/07 thru FY 11/12 T ECHNOLOGY S ERVICES Washoe County TS Budget as a % of All County Expenses 5.0% 4.5% 4.0% 3.5% 3.0% 2.5% 2.0% 1.5% 1.0% 0.5% 0.0% Gartner Baseline = 4%* TS to All County Comparisons Gartner Baseline = $7,403* $8, $7, $6, $5, $4, $3, $2, $1, TS Spend per County Employee (All) 06/07 07/08 08/09 09/10 10/11 Estimate TS as % of All County Expenses Fiscal Year 11/12 Projected TS Spend per County Employee * Gartner Baselines are f or 2010, State & Local Government Averages
16 Core Efficiencies Deliver technology enabled efficiencies prioritized according to the County s core services.
17 Service Delivery Reset and realign the delivery of focused technology services.
18 Infrastructure Sustainability Ensure the on-going operation of our technology infrastructure process, people, systems and equipment.
19 Targeted Innovation Selectively explore and optimize newer methods and technologies.
INFORMATION TECHNOLOGY ENGINEER V
1464 INFORMATION TECHNOLOGY ENGINEER V NATURE AND VARIETY OF WORK This is senior level lead administrative, professional and technical engineering work creating, implementing, and maintaining the County
STRATEGIC IT ACCOUNTABILITY BOARD AGENDA Wednesday, December 19, 2012 2:00 3:00 p.m. STARK LIBRARY
STRATEGIC IT ACCOUNTABILITY BOARD AGENDA Wednesday, December 19, 2012 2:00 3:00 p.m. STARK LIBRARY I. IT Strategic Priorities & ITS Capital Budget (FY 12 13) Update & Approval II. Voice over IP Deployment
Security & Reliability in VoIP Solution
Security & Reliability in VoIP Solution July 19 th, 2006 Ram Ayyakad [email protected] About My background Founder, Ranch Networks 20 years experience in the telecom industry Part of of architecture
IP Telephony Management
IP Telephony Management How Cisco IT Manages Global IP Telephony A Cisco on Cisco Case Study: Inside Cisco IT 1 Overview Challenge Design, implement, and maintain a highly available, reliable, and resilient
VoIP Survivor s s Guide
VoIP Survivor s s Guide Can you really save $, improve operations, AND achieve greater security and availability? Presented by Peggy Gritt, Founder and CEO of the VoIP A non-biased organization for the
FUNCTIONAL AREA 12. Network Administration (NET)
FUNCTIONAL AREA 12 Network Administration (NET) Incumbents in this functional area address interoperability issues related to hardware, software, and connectivity of communications such as cable, fiber
Network Support. Technical Certificate. Program Outcomes: FOUNDATION COURSES. 1 of 7
1 of 7 Network Support This technical certificate program prepares the student for employment as PC Technician; Computer Support Specialist, and Network Support Technician systems and computer network
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3
Information Services and Technology FY 2014-16 Performance Plan
Contents I. Mission Statement... 1 II. Department Overview... 1 III. Program Description and Responsibilities... 2... 2 ATOM... 2 Systems and Applications... 2 Justice... 3 Land Systems... 3 Support Services...
Solving the Desktop Dilemma
Solving the Desktop Dilemma Enterprise Desktop Solutions Raymond Sleiman DL Groupe GMG [email protected] Mobile :079 200 81 03 Agenda What is VMware View 3 What s new with VMware View 3 Architecture RTO
Infoblox vnios Software for CISCO AXP
Summary Infoblox vnios for Cisco consolidates core network services such as DNS, DHCP and IPAM and others onto the Cisco Integrated Services Router (ISR) running the Application Extension Platform (AXP)
Annual Report 2009-2010
Part 1 Section A Unit Information Unit: Computing Services Annual Report 2009-2010 Mission Statement: Computing Services provides leadership and instills confidence through exceptional technology and assistance
Software-as-a-Service (SaaS) Solutions from CA Technologies Frequently asked questions
FAQ Edition / April 30, 2014 Software-as-a-Service (SaaS) Solutions from CA Technologies Frequently asked questions FAQ Edition April 2014 Informational Guidelines Table of Contents EXECUTIVE SUMMARY...
Avoid Network Readiness Risks with The Phybridge UniPhyer
Avoid Network Readiness Risks with The Phybridge UniPhyer Save over 50% of the cost and 80% in deployment time Receive 100% of the features and functionality of a converged network NO COMPROMISES Allocate
NOS for Network Support (903)
NOS for Network Support (903) November 2014 V1.1 NOS Reference ESKITP903301 ESKITP903401 ESKITP903501 ESKITP903601 NOS Title Assist with Installation, Implementation and Handover of Network Infrastructure
VPN vs Port Forwarding
VPN vs Port Forwarding VPN vs Port Forwarding: Which Method is best for delivering Remote Access to home or Small Office Networks Martin Boulter, Luxul Customer Services Manager Installers of home and
Ten Steps to a Successful Business Phone System Implementation. By Clare Kaufman
Ten Steps to a Successful Business Phone System Implementation By Clare Kaufman Contents Introduction...2 Planning a Business Phone Solution...2 1. Define business requirement...3. 2. Line Up Technical
Web Drive Limited TERMS AND CONDITIONS FOR THE SUPPLY OF SERVER HOSTING
Web Drive Limited TERMS AND CONDITIONS FOR THE SUPPLY OF SERVER HOSTING Application of Terms Agreement to these terms requires agreement to Web Drive s Standard Terms & Conditions located online at the
Draft ITU-T Recommendation X.805 (Formerly X.css), Security architecture for systems providing end-to-end communications
Draft ITU-T Recommendation X.805 (Formerly X.css), architecture for systems providing end-to-end communications Summary This Recommendation defines the general security-related architectural elements that
Introduction to Cyber Security / Information Security
Introduction to Cyber Security / Information Security Syllabus for Introduction to Cyber Security / Information Security program * for students of University of Pune is given below. The program will be
DNS Architecture Case Study: Resiliency and Disaster Recovery
DNS Architecture Case Study: Resiliency and Disaster Recovery Cricket Liu VP, Architecture Infoblox Company Background Large U.S.-based company, Company Co. (company.com) Three categories of sites Headquarters
Best Practices for VoIP in the Contact Center Part 1: Planning a Successful Transition BY LORI BOCKLUND AND BRIAN HINTON
MAY 2008 Best Practices for VoIP in the Contact Center Part 1: Planning a Successful Transition BY LORI BOCKLUND AND BRIAN HINTON Voice over Internet Protocol (VoIP) has reached a new level of maturity
Information Technology
Information Technology Information Technology Director Administrative Accounting Technician Network Technology Manager Process and Performance Manager Senior Manager of Systems and Programming Network
Information Technology
Information Technology Citizens Board of Commissioners Administrator /Controller Deputy Administrator IT Director Web Administration Network Administratio Imaging Coordinator GIS Coordinator Database Administrator
Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems...
Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems...3 Improve Processes...4 Innovation...4 IT Planning & Alignment
Recommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 [email protected] This Page Intentionally Left Blank ii Warnings
IT Networking and Security
elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software www.medallionlearning.com Fundamentals of Computer
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
Industrial Security for Process Automation
Industrial Security for Process Automation SPACe 2012 Siemens Process Automation Conference Why is Industrial Security so important? Industrial security is all about protecting automation systems and critical
state of south dakota Bureau of Information & Telecommunications Provide a Reliable, Secure & Modern Infrastructure services well-designed innovative
Strategic Plan 2015-2017 state of south dakota Bureau of Information & Telecommunications 1GOAL ONE: Provide a Reliable, Secure & Modern Infrastructure services security technology assets well-designed
INFORMATION TECHNOLOGY
MISSION STATEMENT The Information Technology department provides technology, telecommunications and information systems leadership and strategic planning while ensuring efficient, cost effective implementation
City of Coral Gables
City of Coral Gables Information Technology Department IT TECHNICAL SUPPORT DIVISION Infrastructure Upgrade Plan Systems, Applications, Network, and Telecommunications Infrastructure OVERVIEW Last revision:
Company overview CUBE52. +44 (0) 118 328 2205 www.cube52.com [email protected] CLOUD SERVICES
Company overview +44 (0) 118 328 2205 www.cube52.com [email protected] CUBE52 CLOUD SERVICES Modern hosting & cloud services to support your business At Cube52, our modern hosting and cloud services are
How To Assess The State Of Hawaii'S Enterprise Architecture
BUSINESS AND IT/IRM TRANSFORMATION PLAN ENTERPRISE ARCHITECTURE Table of Contents 1 TABLE OF CONTENTS EXECUTIVE SUMMARY...13 1.0 INTRODUCTION...17 1.1 Purpose...17 1.2 Scope...17 1.3 Document Overview...17
STATE OF NEW JERSEY IT CIRCULAR
NJ Office of Information Technology P.O. Box 212 www.nj.gov/it/ps/ Chris Christie, Governor 300 River View E. Steven Emanuel, Chief Information Officer Trenton, NJ 08625-0212 STATE OF NEW JERSEY IT CIRCULAR
Information Technology Department Programs and Services
Brevard County Citizens Board of County Commissioners County Management Information Technology Department Programs and Services Information Systems Administration Telecommunications Software Development
Chris Boykin VP of Professional Services
5/30/12 Chris Boykin VP of Professional Services Future Com! 20 years! Trusted Advisors! Best of brand partners! Brand name customers! 1000 s of solutions delivered!! 1 5/30/12 insight to the future, bringing
IP Telephony Basics. Part of The Technology Overview Series for Small and Medium Businesses
IP Telephony Basics Part of The Technology Overview Series for Small and Medium Businesses What is IP Telephony? IP Telephony uses the Internet Protocol (IP) to transmit voice or FAX traffic over a public
AL RAFEE ENTERPRISES Solutions & Expertise.
AL RAFEE ENTERPRISES Solutions & Expertise. Virtualization Al Rafee has strategically made substantial investment in building up a large end to end portfolio of Virtualization across the entire IT infrastructure
FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.
1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams
MSP Service Matrix. Servers
Servers MSP Service Matrix Microsoft Windows O/S Patching - Patches automatically updated on a regular basis to the customer's servers and desktops. MS Baseline Analyzer and MS WSUS Server used Server
TABLE OF CONTENTS NETWORK SECURITY 2...1
Network Security 2 This document is the exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors
Based on the VoIP Example 1(Basic Configuration and Registration), we will introduce how to dial the VoIP call through an encrypted VPN tunnel.
30. VoIP Example 3 (VoIP over VPN) Based on the VoIP Example 1(Basic Configuration and Registration), we will introduce how to dial the VoIP call through an encrypted VPN tunnel. In this example 3300V
Table of Contents. Introduction. Audience. At Course Completion
Table of Contents Introduction Audience At Course Completion Prerequisites Microsoft Certified Professional Exams Student Materials Course Outline Introduction This three-day instructor-led course provides
Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems... 3. Improve Processes...
Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems... 3 Improve Processes... 3 Innovation... 4 IT Planning & Alignment
Multi-layered Security Solutions for VoIP Protection
Multi-layered Security Solutions for VoIP Protection Copyright 2005 internet Security Systems, Inc. All rights reserved worldwide Multi-layered Security Solutions for VoIP Protection An ISS Whitepaper
CISCO IOS NETWORK SECURITY (IINS)
CISCO IOS NETWORK SECURITY (IINS) SEVENMENTOR TRAINING PVT.LTD [Type text] Exam Description The 640-553 Implementing Cisco IOS Network Security (IINS) exam is associated with the CCNA Security certification.
SECURE MOBILE APP DEVELOPMENT: DIFFERENCES FROM TRADITIONAL APPROACH
SECURE MOBILE APP DEVELOPMENT: DIFFERENCES FROM TRADITIONAL APPROACH Suhas Desai Aujas Information Risk Services Session ID: MBS-T02 Session Classification: Intermediate Agenda Trends in Mobile Technology
How to Build a Comprehensive Roadmap and Strategy for Mobility. Winni Hesel Partner Enowa Consulting
How to Build a Comprehensive Roadmap and Strategy for Mobility Winni Hesel Partner Enowa Consulting Quick Reminders 1) If you have trouble hearing us by phone, be sure to use your personal audio PIN, which
VoIP Resilience and Security Jim Credland
VoIP Resilience and Security Jim Credland About THUS plc Provider and user of VoIP and Soft Switch technologies Developing Enterprise Security Standards NISCC VoIP Working Group Security Considerations
EaseUS Todo Backup PXE Server
EaseUS Todo Backup PXE Server ----New added in EaseUS Todo Backup 4.6 EaseUS Todo Backup 4.6 adds PXE Server in Todo Backup Server, Todo Backup Advanced Server and Todo Backup Technician. EaseUS Todo Backup
University of Pittsburgh Security Assessment Questionnaire (v1.5)
Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.5) Directions and Instructions for completing this assessment The answers provided
custom hosting for how you do business
custom hosting for how you do business 24775 League Island Boulevard Philadelphia PA 19112 gibraltarit.com 866.410.4427 Gibraltar s replicated cloud architecture and PCI/HIPAA compliant data centers provide
NETWORK AND SECURITY MANAGER
DATASHEET NETWORK AND SECURITY MANAGER Product Overview Juniper Networks Network and Security Manager (NSM) is a unified device management solution for Juniper s network infrastructure of routing, switching
Timeline for MPLS Deployment
Timeline for MPLS Deployment What to Expect for Design, Implementation, and Support of SMB Customer MPLS Network Services Get Started Now: 877.611.6342 to learn more. www.megapath.com What to Expect for
Troubleshooting and Maintaining Cisco IP Networks Volume 1
Troubleshooting and Maintaining Cisco IP Networks Volume 1 Course Introduction Learner Skills and Knowledge Course Goal and E Learning Goal and Course Flow Additional Cisco Glossary of Terms Your Training
NOMINATION FORM. Category for judging: 5 - Digital Government: Government to Government (G to G)
NOMINATION FORM Title of Nomination: Project/System Manager: Job Title: Agency: Enterprise Technology Service Desk Elizabeth Dignan Program Manager State Technology Office Department: Address: 4030 Esplanade
Advantages and Benefits of Running PDI/Enterprise on an Acumera Managed Network
Advantages and Benefits of Running PDI/Enterprise on an Acumera Managed Network Overview This white paper, based on a technology interview with PDI, presents some of the key technical and operation advantages
U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL
U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT: U.S. Election Assistance Commission Compliance with the Requirements of the Federal Information Security Management Act Fiscal
November 2013. Defining the Value of MPLS VPNs
November 2013 S P E C I A L R E P O R T Defining the Value of MPLS VPNs Table of Contents Introduction... 3 What Are VPNs?... 4 What Are MPLS VPNs?... 5 What Are the Benefits of MPLS VPNs?... 8 How Do
המרכז ללימודי חוץ המכללה האקדמית ספיר. ד.נ חוף אשקלון 79165 טל'- 08-6801535 פקס- 08-6801543 בשיתוף עם מכללת הנגב ע"ש ספיר
מודולות הלימוד של מייקרוסופט הקורס מחולק ל 4 מודולות כמפורט:.1Configuring Microsoft Windows Vista Client 70-620 Installing and upgrading Windows Vista Identify hardware requirements. Perform a clean installation.
NETWORK ADMINISTRATOR
JOB DESCRIPTION Title: NETWORK ADMINISTRATOR Department: Information Systems Class Code: 1821 FLSA Status: Exempt Effective Date: February 13, 1997 (Rev. 07/2012) Grade Number: 26 GENERAL PURPOSE Under
PREPARED FOR ABC CORPORATION
NETWORK DESIGN PROPOSAL PREPARED FOR ABC CORPORATION Prepared by Crystal Technologies PROPRIETARY AND CO NF IDE NTIAL Network Design Proposal PREPARED FOR ABC CORPORATION INC. ARTICLE I. OVERVIEW/HISTORY
Information Technology 2016-2021 Strategic Plan
Information Technology 2016-2021 Strategic Plan Draft Table of Contents Table of Contents... 3 Introduction... 4 Mission of IT... 4 Primary Service Delivery Objectives... 4 Availability of Systems...
Integrating a Hitachi IP5000 Wireless IP Phone
November, 2007 Avaya Quick Edition Integrating a Hitachi IP5000 Wireless IP Phone This application note explains how to configure the Hitachi IP5000 wireless IP telephone to connect with Avaya Quick Edition
Annual Disaster Recovery Test Report and Gap Analysis for 2011
Page 1 Annual Disaster Recovery Test Report and Gap Analysis for 2011 Prepared by the 2011 Disaster Recovery Test Team 6/8/2011 Prepared Date Contents Annual Disaster Recovery Test Report and Gap Analysis
A POLYCOM WHITEPAPER Polycom. Recommended Best Security Practices for Unified Communications
Polycom Recommended Best Security Practices for Unified Communications March 2012 Unified Communications (UC) can be viewed as another set of data and protocols utilizing IP networks. From a security perspective,
EXIN Cloud Computing Foundation
Sample Questions EXIN Cloud Computing Foundation Edition April 2013 Copyright 2013 EXIN All rights reserved. No part of this publication may be published, reproduced, copied or stored in a data processing
Securing Digital Processes
Securing Digital Processes Carsten Rudolph Carsten Rudolph and Nicolai Kuntze Fraunhofer-Institut for Secure Information Technology Rheinstrasse 75, 64295 Darmstadt, Germany E-Mail: [email protected]
Advanced Higher Computing. Computer Networks. Homework Sheets
Advanced Higher Computing Computer Networks Homework Sheets Topic : Network Protocols and Standards. Name the organisation responsible for setting international standards and explain why network standards
Integrated Technology Plan (FY10 FY12)
(FY10 FY12) Anne Arundel Community College embraces and promotes a seamless integration of appropriate technologies in support of the learning community within the framework of the college s mission and
Network and Security. Product Description. Product Overview. Architecture and Key Components DATASHEET
DATASHEET Network and Security Manager Product Overview Network and Security Manager provides unparalleled capability for device and security policy configuration, comprehensive monitoring, reporting tools,
