Mission Possible: The Future of IT Support

Size: px
Start display at page:

Download "Mission Possible: The Future of IT Support"

Transcription

1 Mission Possible: The Future of IT Support Mission Impossible Paramount Pictures, Cruise/Wagner Produc(ons (2011). Used under Fair Use. Bob Marla) Informa(on Systems Opera(ons Manager - Washington State Patrol James Stanger, PhD Senior Director, Products - CompTIA 23 October, 2014

2 A Li)le Housekeeping ü Contact informa(on will be provided at the end of the webinar. ü ü ü ü ü You are muted by default, please ask all ques(ons in the Q&A sec(on. This webinar is being recorded. Webinar presenta(on slides and recording link will be available tomorrow. Please complete brief survey at the comple(on of the webinar. (1) CEU credit towards A+ ce renewal: A0er the webinar, CompTIA will verified a?endees a paracipaaon confirmaaon along with instrucaons on how to add the credit to your ceraficaaon account. THE JETSONS and All Related Characters Hanna- Barbera and Warner Bros. Entertainment Inc. Used under Fair #MissionPossible #TheFutureofIT #CompTIAcer:fied

3 Agenda A hands- on look into the support needs for a complex series of networks Bob s world What you need to learn in order to support systems ü Technologies ü Tools ü Techniques The future of IT support 3

4 Mission Possible: Your Host James Stanger Senior Director, Products Responsible for determining CompTIA s product roadmap Authority in: open source security web technologies blogging I m also an educator

5 Mission Possible: Our Guest Bob Marla) Informa(on Systems Opera(ons Manager for the Washington State Patrol Former CIO Management consultant to various states over the past 15 years Project manager InformaNon systems strategic and tacncal planning Systems migranon specialist Independent quality assurance consultant OperaNons manager

6 CompTIA is The voice of the world s informanon technology (IT) industry. Non- profit: IT Trade Associa(on advancing the global interests of IT professionals and IT channel organiza(ons Philanthropy: Crea(ng IT Futures Advocacy: TechAmerica Provide industry leading creden(als and cer(fica(on: Shameless plug visit cernficanon.comptia.org check out a free trial of CertMaster!

7 CompTIA CerNficaNons a quick overview Certs in red ANSI/ISO cer:fied/us Government 8570 CompTIA Best Prac(ces Cer(fica(on IT Fundamentals CyberSecure CompTIA Professional Cer(fica(on A+ CDIA+ Cloud+ CTT+ Linux+ Mobility+ Network+ Project+ Security+ Server+ Storage+ CompTIA Mastery Cer(fica(on CompTIA Advanced Security PracNNoner (CASP) CompTIA Specialty Cer(fica(on Cloud Essen(als Mobile App Security+

8 A skills- based look at the CompTIA roadmap Job role We cernfy essennal skills for the ennre IT department / ecosystem Help Desk / IT Support Technician / Field Technician Opera(ng system support Network technician IT / cloud architect Systems analyst / mobility engineer Mobile app developer Security engineer / IA technician Any employee Project manager Cer:fica:on This photo is for placement A+ only Server+, Linux+ Network+ Cloud Essen(als, Cloud+ Mobility+ Mobile App Security+ Security+, CASP CyberSecure (Forthcoming) Project+ 8

9 What you can learn from Bob How to keep pace with high- stakes, high- availability environments ü You re going to learn about the real- world types of skills that Bob needs to run a complex environment, both now, and 5 years from now. ü How to ensure system upnme ü How to share vital informanon in real- Nme ü Tips, tricks and traps for suppornng evolving IT systems, including what is coming next...

10 a look inside bob s world 10

11 NaNonal Criminal JusNce Network NaNonal Crime InformaNon Center (NCIC) Interstate IdenNficaNon Index (III) NaNonal Sex Offender Registry (NSOR) FBI NLETS All US States & Territories Correc(ons DMV Courts Municipal County State Federal Law Enforcement Message Switch WA Crime Informa(on Center WA Criminal History INTERPOL Canadian

12 Crime InformaNon Center: First Social Network State and NaNonal Crime InformaNon Centers OrganizaAons other than Facebook and Google have been collecang and storing informaaon for a long Ame... HOT FILES Wanted Persons Missing Persons Uniden(fied Persons Supervised Persons Protec(on Orders Iden(ty Thek Securi(es File Stolen Vehicles & Plates Repossessed Vehicles Impounded Vehicles License Plate File Sex Offender Registra(on Gun File Vehicle Parts File Boat File Ar(cle File Person of Interest DOL Drivers Check DOC Offender File DOL Mug Shots Immigra(on Violator RAP Sheets Gang Affilia(on Add, Modify, Clear, Delete Query Computer Aided Dispatch Law Enforcement Records Incident, Case InformaAon Law Enforcement Opera(ons

13 Each of the systems in these circles represents separate technical support needs.

14 ACCESS TransacNon Volumes September 2014 Row Labels Corrections DMV Parks (Boats) WACIC Regional Systems FBI III NCIC QRY NCIC Updates NCIC Updates Crim History NLETS WSP Client (local) DMV Photo Grand Total Input Message 64,710 2,640,779 2,204 3,994,675 3,291, ,108 1,921,204 60,116 20, , ,548 Output Message 64,830 2,652,458 2,206 2,662,924 11,015, ,763 1,919,840 59,889 96, , ,830 8,069 13,459,083 20,469,554 Grand Total 129,540 5,293,237 4,410 6,657,599 14,306, ,871 3,841, , ,016 1,877,910 1,159,378 8,069 33,928,637

15

16 Who supports all of these systems?

17 Support Context CUSTOMERS 25,493 Terminals 600+ Agencies 123 Regional Systems 11,018 MDT Devices 1,686 Wireless Devices Phone Business applicanons Vendor Applica(on Support WSP 24 X 7 Help Desk WSP Infrastructure Support Servers Storage (MicrosoR) Work Orders 3 WSP ACCESS Systems Administrators WSP Network Support Rou(ng VPN 24 X 7 Support Configura(on Rou(ng Troubleshoo(ng Inquiry Connec(ons Journal Searches Defects Change Management

18 OperaNonal Issues Let s talk about the issues you face, and the skills Bob needs from his co- workers to handle these issues... Applica(on Management Customer Management Changing configura(on Regional Message compliance Mission Cri(cal 24 x 7 Opera(ons Technology Changes Communica(ons Customers Vendors Technical workers Configura(on Management Change management One change affects mul(ple systems Journal Searches & Public Disclosure Requests

19 EssenNal Support Skills Bob s workers need: Database, including SQLs RouNng The ability to understand how different systems work together Server and storage Records analysis Packet captures (Wireshark) TCP handshake Protocol analysis Networking, including protocol analysis and rounng

20 To the nines Let s talk about the various levels of nines Availability % DownNme per annum DownNme per month DownNme per week 99.9 % 8.76 hours 43.8 minutes 10.1 minutes 99.99% minutes 4.32 minutes 1.01 minutes % five nines 5.26 minutes 25.9 seconds 6.05 seconds The more 9s involved, the more the cost! Equipment Support individuals Services (e.g., bandwidth, telcos)

21 keys to connnued success in IT support

22 What types of skills does Bob value? Ability to see the business ramificanons of a technology decision Sol skills Work and play well with people Clients (officers, tech support) Vendors and service providers Wri(ng skills Project management Ability to coordinate Bob s basketball metaphor You need: Point guards Centers Forwards

23 Some quesnons What is the value of cer(fica(on to you? You are a Microsok Windows and Cisco shop, right? What is the value of vendor- neutral cer(fica(on to you? What technical support skills do you value the most? What are some of the skills that help you the most, day to day? How did you develop your skills? Reading? Classroom training? On the job training?

24 Some war stories... Java migranon From one version to another Crea(ng a plan Considera(ons What other systems are affected? How much down(me is necessary? When systems go down Firewall and VPN issue Who gets the call? How do you determine the final responsibility? System slowdowns Cruise ships and other spikes How do you scale systems?

25 Future ideas for the data owned by the State of Washington... Big data possibilines Average of 34 million records monthly That s about 408 million records a year Up to 1 trillion records over the past years What are the data mining and analy(cs possibili(es? Predic(ve analy(cs How do you organize that data?

26 Bob s take on some trends we ve seen

27 The first trend... Help Desk / Tech support Challenges in Mobility Mobility skill level of general staff Making systems accessible securely Determining cost/roi of mobile solu(ons Op(mizing business applica(ons Users not familiar with company policy 40% 39% 35% 35% 35% Current skills PC Desk phone New skills Smartphone Tablet Mul(plaworm Mobility skill level of IT staff 34%

28 What trends do you see in server administranon? What are some of the essenaal skills in the future? Current skills Server OS Virtualiza(on Troubleshoo(ng Hardware Sokware

29 Network administranon Ability to place comms and data on IP network 25% 32% High comms priority Advanced tech usage Current skills QoS VLAN 10% 10% New skills WiFi SDN IT Firms Telecom Firms

30 Security Effect of security skills gaps Unaware of exposure Unaware of new security trends Maintaining compliance Costs of training 36% 38% 41% 41% Current skills Firewall VPN Encryp(on Newer skills Data Loss Preven(on Iden(ty Access Management Risk Management

31 Database knowledge Degree of data skills gaps Significant/ Don t know Moderate 50% 9% 41% Appropriate Level of skill Current skills Extract, Transform Load (ETL) SQL New skills NoSQL Distributed Storage

32 What about Web development? Mobile App Developer Job Trends Current skills HTML/CSS/Java Desktop browser design New skills ios/android HTML5 App Design

33 some conclusions and quesnons

34 So, some conclusions about the future of tech support... Business knowledge is essennal Service level agreements How to read and understand a contract Proac(ve thinking Delega(on You will need to know mulnple architectures, tools, and techniques Networking protocols Security

35 More conclusions and quesnons... What kind of cloud knowledge will workers need? And, of course, what about mobility? Data at rest Data in transit We ve gone way beyond break fix, haven t we? What operanng systems Windows Linux Other, such as Omnixx Enterprise? Customized apps and applicanons (OS, mobile, Web, etc.)

36 Summary Today, we talked about: A hands- on look into the support needs for a complex series of networks Bob s world What you need to learn in order to support systems - Technologies - Tools - Techniques The future of IT support 36

37 QUESTIONS? James Stanger Skype: stangernet Bob Marla) To learn more about our next Webinars, please go to the following URL: Thank you! 37

James Stanger, PhD Senior Director, Products - CompTIA 18 November, 2015

James Stanger, PhD Senior Director, Products - CompTIA 18 November, 2015 Damien Manuel Chief Information Security Officer (CISO), Blue Coat Systems - ANZ James Stanger, PhD Senior Director, Products - CompTIA 18 November, 2015 A Little Housekeeping Contact information will

More information

The Internet of Things (IoT) and The IT Pro: What You Need to Future-Proof Your Career

The Internet of Things (IoT) and The IT Pro: What You Need to Future-Proof Your Career The Internet of Things (IoT) and The IT Pro: What You Need to Future-Proof Your Career Robin O'Neill Senior Director, WDLABS at Western Digital James Stanger, PhD Senior Director, Products - CompTIA 29

More information

Offensive & Defensive & Forensic Techniques for Determining Web User Iden<ty

Offensive & Defensive & Forensic Techniques for Determining Web User Iden<ty Offensive & Defensive & Forensic Techniques for Determining Web User Iden

More information

An Integrated Approach to Manage IT Network Traffic - An Overview Click to edit Master /tle style

An Integrated Approach to Manage IT Network Traffic - An Overview Click to edit Master /tle style An Integrated Approach to Manage IT Network Traffic - An Overview Click to edit Master /tle style Agenda A quick look at ManageEngine Tradi/onal Traffic Analysis Techniques & Tools Changing face of Network

More information

LAW ENFORCEMENT INFORMATION NETWORK INFORMATION MANUAL

LAW ENFORCEMENT INFORMATION NETWORK INFORMATION MANUAL LAW ENFORCEMENT INFORMATION NETWORK INFORMATION MANUAL The Michigan Law Enforcement Information Network (LEIN) is a statewide computerized information system established in 1967 as a service to Michigan

More information

Washington State Patrol ACCESS Section

Washington State Patrol ACCESS Section Washington State Patrol ACCESS Section ACCESS Overview Business Section Section Manager 3 Auditors 2 Trainers 1 ISO 1 Office Manager Tier 1 Support First line technical support Tier 2 WAJIS Manager 3 ACCESS

More information

This presenta,on covers the essen,al informa,on about IT services and facili,es which all new students will need to get started.

This presenta,on covers the essen,al informa,on about IT services and facili,es which all new students will need to get started. This presenta,on covers the essen,al informa,on about IT services and facili,es which all new students will need to get started. 1 Most of the informa,on is covered in more depth on the Informa,on Services

More information

How To Protect Virtualized Data From Security Threats

How To Protect Virtualized Data From Security Threats S24 Virtualiza.on Security from the Auditor Perspec.ve Rob Clyde, CEO, Adap.ve Compu.ng; former CTO, Symantec David Lu, Senior Product Manager, Trend Micro Hemma Prafullchandra, CTO/SVP Products, HyTrust

More information

Musings on OpenFlow and SDN. David Meyer Cisco Systems OpenFlow Symposium

Musings on OpenFlow and SDN. David Meyer Cisco Systems OpenFlow Symposium Musings on OpenFlow and SDN David Meyer Cisco Systems OpenFlow Symposium Agenda Problem Space A Few Use Cases Reflec5ons on the Promise of OF/SDN A Few Challenges and Open Ques5ons Problem Space Network

More information

Case Study. The SACM Journey at the Ontario Government

Case Study. The SACM Journey at the Ontario Government Case Study The SACM Journey at the Ontario Government Agenda Today s Objec=ves The Need for SACM Our SACM Journey Scope and Governance Process Ac=vi=es Key Process Roles Training and Measurement Lessons

More information

Mobile Applica,on and BYOD (Bring Your Own Device) Security Implica,ons to Your Business. Dmitry Dessiatnikov

Mobile Applica,on and BYOD (Bring Your Own Device) Security Implica,ons to Your Business. Dmitry Dessiatnikov Mobile Applica,on and BYOD (Bring Your Own Device) Security Implica,ons to Your Business Dmitry Dessiatnikov DISCLAIMER All informa,on in this presenta,on is provided for informa,on purposes only and in

More information

Phone Systems Buyer s Guide

Phone Systems Buyer s Guide Phone Systems Buyer s Guide Contents How Cri(cal is Communica(on to Your Business? 3 Fundamental Issues 4 Phone Systems Basic Features 6 Features for Users with Advanced Needs 10 Key Ques(ons for All Buyers

More information

How to profit from the growing shortage of IT professionals jobs

How to profit from the growing shortage of IT professionals jobs How to profit from the growing shortage of IT professionals jobs It s no secret that IT is one of the fastest growing fields in the U.S. What s less well known is that there are so many career opportunities

More information

An Econocom Group company. Your partner in the transi4on towards Mobile IT

An Econocom Group company. Your partner in the transi4on towards Mobile IT An Econocom Group company Your partner in the transi4on towards Mobile IT A few key figures 40 000 mobile terminals integrated annually 200 M of telecom expenses managed 50 000 mobility support 4ckets

More information

VoIP Security How to prevent eavesdropping on VoIP conversa8ons. Dmitry Dessiatnikov

VoIP Security How to prevent eavesdropping on VoIP conversa8ons. Dmitry Dessiatnikov VoIP Security How to prevent eavesdropping on VoIP conversa8ons Dmitry Dessiatnikov DISCLAIMER All informa8on in this presenta8on is provided for informa8on purposes only and in no event shall Security

More information

Brandman University. School of CCNA

Brandman University. School of CCNA Information Technology Certifications CCNA The Cisco CCNA Training Package (ICND: Parts 1 and 2) includes expert instructor-led training modules with customized presentations, practice exam simulators

More information

Splunk for Networking and SDN

Splunk for Networking and SDN Copyright 2013 Splunk Inc. Splunk for Networking and SDN Stela Udovicic Senior Product Marke?ng Manager, Splunk #splunkconf Legal No?ces During the course of this presenta?on, we may make forward- looking

More information

Email/Endpoint Security and More Rondi Jamison

Email/Endpoint Security and More Rondi Jamison Email/Endpoint Security and More Rondi Jamison Sr. Marke)ng Manager - Enterprise Security Strategy Agenda 1 Why Symantec? 2 Partnership 3 APS2 Packages 4 What s next Copyright 2014 Symantec Corpora)on

More information

Wireless Networks: Network Protocols/Mobile IP

Wireless Networks: Network Protocols/Mobile IP Wireless Networks: Network Protocols/Mobile IP Mo$va$on Data transfer Encapsula$on Security IPv6 Problems DHCP Adapted from J. Schiller, Mobile Communications 1 Mo$va$on for Mobile IP Rou$ng based on IP

More information

Kaseya Fundamentals Workshop DAY THREE. Developed by Kaseya University. Powered by IT Scholars

Kaseya Fundamentals Workshop DAY THREE. Developed by Kaseya University. Powered by IT Scholars Kaseya Fundamentals Workshop DAY THREE Developed by Kaseya University Powered by IT Scholars Kaseya Version 6.5 Last updated March, 2014 Day Two Overview Day Two Lab Review Patch Management Configura;on

More information

Privileged Administra0on Best Prac0ces :: September 1, 2015

Privileged Administra0on Best Prac0ces :: September 1, 2015 Privileged Administra0on Best Prac0ces :: September 1, 2015 Discussion Contents Privileged Access and Administra1on Best Prac1ces 1) Overview of Capabili0es Defini0on of Need 2) Preparing your PxM Program

More information

Network Security. Computer Security & Forensics. Security in Compu5ng, Chapter 7. l Network Defences. l Firewalls. l Demilitarised Zones

Network Security. Computer Security & Forensics. Security in Compu5ng, Chapter 7. l Network Defences. l Firewalls. l Demilitarised Zones Network Security Security in Compu5ng, Chapter 7 Topics l Network AAacks l Reconnaissance l AAacks l Spoofing l Web Site Vulnerabili5es l Denial of Service l Network Defences l Firewalls l Demilitarised

More information

Stream Deployments in the Real World: Enhance Opera?onal Intelligence Across Applica?on Delivery, IT Ops, Security, and More

Stream Deployments in the Real World: Enhance Opera?onal Intelligence Across Applica?on Delivery, IT Ops, Security, and More Copyright 2015 Splunk Inc. Stream Deployments in the Real World: Enhance Opera?onal Intelligence Across Applica?on Delivery, IT Ops, Security, and More Stela Udovicic Sr. Product Marke?ng Manager Clayton

More information

NETWORK DEVICE SECURITY AUDITING

NETWORK DEVICE SECURITY AUDITING E-SPIN PROFESSIONAL BOOK VULNERABILITY MANAGEMENT NETWORK DEVICE SECURITY AUDITING ALL THE PRACTICAL KNOW HOW AND HOW TO RELATED TO THE SUBJECT MATTERS. NETWORK DEVICE SECURITY, CONFIGURATION AUDITING,

More information

The Seven Habits of State-of-the-Art Mobile App Security

The Seven Habits of State-of-the-Art Mobile App Security #mstrworld The Seven Habits of State-of-the-Art Mobile App Security Mobile Security 8 July 2014 Anand Dwivedi, Product Manager, MicroStrategy strworld Agenda - Seven Habits of State of the Art Mobile App

More information

2015-16 ITS Strategic Plan Enabling an Unbounded University

2015-16 ITS Strategic Plan Enabling an Unbounded University 2015-16 ITS Strategic Plan Enabling an Unbounded University Update: July 31, 2015 IniAaAve: Agility Through Technology Vision Mission Enable Unbounded Learning Support student success through the innovaave

More information

Information Technology Career Field Pathways and Course Structure

Information Technology Career Field Pathways and Course Structure Information Technology Career Field Pathways and Course Structure Courses in Information Support and Services (N0) Computer Hardware 2 145025 Computer Software 145030 Networking 2 145035 Network Operating

More information

Connecting PTE to Careers in Idaho

Connecting PTE to Careers in Idaho 1 Connecting PTE to Careers in Idaho Wendi Secrist Director, Business Outreach July 21, 2015 www.pte.idaho.gov 2 School Portals NextSteps Career Information Where do I start? SkillStack lmi.idaho.gov College/University

More information

State of IT Skills Gap

State of IT Skills Gap State of IT Skills Gap 2014 Summary Copyright (c) 2014 CompTIA Properties, LLC. All Rights Reserved. CompTIA.org IT Industry Overview Copyright (c) 2014 CompTIA Properties, LLC. All Rights Reserved. CompTIA.org

More information

Everything You Need to Know about Cloud BI. Freek Kamst

Everything You Need to Know about Cloud BI. Freek Kamst Everything You Need to Know about Cloud BI Freek Kamst Business Analy2cs Insight, Bussum June 10th, 2014 What s it all about? Has anything changed in the world of BI? Is Cloud Compu2ng a Hype or here to

More information

Big Data. The Big Picture. Our flexible and efficient Big Data solu9ons open the door to new opportuni9es and new business areas

Big Data. The Big Picture. Our flexible and efficient Big Data solu9ons open the door to new opportuni9es and new business areas Big Data The Big Picture Our flexible and efficient Big Data solu9ons open the door to new opportuni9es and new business areas What is Big Data? Big Data gets its name because that s what it is data that

More information

For MINNESOTA January 2009

For MINNESOTA January 2009 For MINNESOTA January 2009 January 2009 Management Advisory Committee for Community Supervision and Services (MACCSS) Technology Subcommittee Introduction... i Quick Reference - Criminal Justice Information

More information

PALO ALTO SAFE APPLICATION ENABLEMENT

PALO ALTO SAFE APPLICATION ENABLEMENT PALO ALTO SAFE APPLICATION ENABLEMENT 1 Palo Alto Networks Product Overview James Sherlow SE Manager WEUR & Africa [email protected] @jsherlow Palo Alto Networks at a Glance Corporate Highlights

More information

VIA CONNECT PRO Deployment Guide

VIA CONNECT PRO Deployment Guide VIA CONNECT PRO Deployment Guide www.true-collaboration.com Infinite Ways to Collaborate CONTENTS Introduction... 3 User Experience... 3 Pre-Deployment Planning... 3 Connectivity... 3 Network Addressing...

More information

Wireless Statistics Recommendations

Wireless Statistics Recommendations Wireless Statistics Recommendations presented by The Library Network Wednesday, May 21 2014 Merit Conference Eagle Crest Conference Center 1275 S Huron Street Ypsilanti, Michigan Your presenters today

More information

Mobile Device Management in the Systems Management Ecosystem. Katie Wiederholt, Dell Software

Mobile Device Management in the Systems Management Ecosystem. Katie Wiederholt, Dell Software Mobile Device Management in the Systems Management Ecosystem Katie Wiederholt, The forces driving change in mobility Agenda The journey to MDM Where do we want to be and mobile security technologies 2

More information

Help Framework. Ticket Management Ticket Resolu/on Communica/ons. Ticket Assignment Follow up Customer - communica/on System updates Delay management

Help Framework. Ticket Management Ticket Resolu/on Communica/ons. Ticket Assignment Follow up Customer - communica/on System updates Delay management Help for JD Edwards Our Help Framework Ticket qualifica/on Ticket crea/on Ticket Rou/ng Closures L1 issues Resolu/on KG SOPs Co- ordinate Ticket Assignment Follow up Customer - communica/on System updates

More information

Database Communica/on in Visual Studio/C# using Web Services. Hans- Pe=er Halvorsen, M.Sc.

Database Communica/on in Visual Studio/C# using Web Services. Hans- Pe=er Halvorsen, M.Sc. Database Communica/on in Visual Studio/C# using Web Services Hans- Pe=er Halvorsen, M.Sc. Background We will use Web Services because we assume that the the App should be used on Internet outside the Firewall).

More information

Migrating to Hosted Telephony. Your ultimate guide to migrating from on premise to hosted telephony. www.ucandc.com

Migrating to Hosted Telephony. Your ultimate guide to migrating from on premise to hosted telephony. www.ucandc.com Migrating to Hosted Telephony Your ultimate guide to migrating from on premise to hosted telephony Intro What is covered in this guide? A professional and reliable business telephone system is a central

More information

Achieving Customer Intelligence with Splunk Enterprise

Achieving Customer Intelligence with Splunk Enterprise Copyright 2013 Splunk Inc. #splunkconf Achieving Customer Intelligence with Splunk Enterprise Leon Li IT Director, Far EasTone Telco Taiwan About Far EasTone! Among leading Taiwan telecom operators! Founded

More information

Securing and Monitoring BYOD Networks using NetFlow

Securing and Monitoring BYOD Networks using NetFlow Securing and Monitoring BYOD Networks using NetFlow How NetFlow can help with Security Analysis, Application Detection and Traffic Monitoring Don Thomas Jacob Technical Marketing Engineer ManageEngine

More information

Magnet Voice Windows PC Softphone Installation

Magnet Voice Windows PC Softphone Installation Magnet Voice Windows PC Softphone Installation Contents 1. Introduction 3 2. Installation 3 Step 1: Install the Software on your PC 4 Step 2: Input your registration details 4 3. Connected State 6 6. Port

More information

South Carolina Law Enforcement Division Criminal Justice Information System (CJIS)

South Carolina Law Enforcement Division Criminal Justice Information System (CJIS) South Carolina Law Enforcement Division Criminal Justice Information System (CJIS) USER AGREEMENT AND SYSTEM RESPONSIBILITIES Introduction The South Carolina Criminal Justice Infonnation and Communications

More information

Welcome to the Tampa Bay Hi-Tech Training Online Overview

Welcome to the Tampa Bay Hi-Tech Training Online Overview Welcome to the Tampa Bay Hi-Tech Training Online Overview HITT Orientation Overview and Online Application This Orientation covers the following: What is the HITT program through CareerSource Tampa Bay?

More information

What is Field Service?

What is Field Service? What is Field Service? Oracle Field Service Cloud Outbound Product Management Team Copyright 2014 Oracle and/or its affiliates. All rights reserved. What is field service? Field service is delivering installing

More information

Data Center Evolu.on and the Cloud. Paul A. Strassmann George Mason University November 5, 2008, 7:20 to 10:00 PM

Data Center Evolu.on and the Cloud. Paul A. Strassmann George Mason University November 5, 2008, 7:20 to 10:00 PM Data Center Evolu.on and the Cloud Paul A. Strassmann George Mason University November 5, 2008, 7:20 to 10:00 PM 1 Hardware Evolu.on 2 Where is hardware going? x86 con(nues to move upstream Massive compute

More information

White Paper. Star2Star Blended Architecture What Makes it Different? What Makes it Better? OVERVIEW

White Paper. Star2Star Blended Architecture What Makes it Different? What Makes it Better? OVERVIEW STAR2STAR COMMUNICATIONS WHITE PAPER SERIES White Paper OVERVIEW In this paper, we discuss: What s wrong with the existing telephone network? Three ways to switch to VoIP What s Different about Star2Star?

More information

Technology Department Infrastructure & Support

Technology Department Infrastructure & Support Technology Department Infrastructure & Support The Technology Department Team Executive Director of Technology Technology Coordinator Network Engineer Application Administrator Application Specialist Infrastructure

More information

Enterprise QoS. Tim Chung Google Corporate Netops Architecture Nanog 49 June 15th, 2010

Enterprise QoS. Tim Chung Google Corporate Netops Architecture Nanog 49 June 15th, 2010 Enterprise QoS Tim Chung Google Corporate Netops Architecture Nanog 49 June 15th, 2010 Agenda Challenges Solu5ons Opera5ons Best Prac5ces Note: This talk pertains to Google enterprise network only, not

More information

Financial Fraud Threats & Preven3on. Mark Frank EVP, Senior Opera3ons Officer Colorado Business Bank

Financial Fraud Threats & Preven3on. Mark Frank EVP, Senior Opera3ons Officer Colorado Business Bank Financial Fraud Threats & Preven3on Mark Frank EVP, Senior Opera3ons Officer Colorado Business Bank Why Pay ACen3on to Fraud Risks? Fraud occurs everywhere, and NO organiza3on is immune Changing business

More information

VIA COLLAGE Deployment Guide

VIA COLLAGE Deployment Guide VIA COLLAGE Deployment Guide www.true-collaboration.com Infinite Ways to Collaborate CONTENTS Introduction... 3 User Experience... 3 Pre-Deployment Planning... 3 Connectivity... 3 Network Addressing...

More information

An introduction to disaster recovery. And how DrAAS from I.R.I.S. Ondit can help!

An introduction to disaster recovery. And how DrAAS from I.R.I.S. Ondit can help! An introduction to disaster recovery And how DrAAS from I.R.I.S. Ondit can help! Events That Impact Information Availability Events that require a data center move: Fewer than 1% of occurrences Natural

More information

Diploma in Information Technology Network Integration Specialist COURSE INFO PACK

Diploma in Information Technology Network Integration Specialist COURSE INFO PACK Registered as a Private Higher Education Institution with the Department of Higher Education and Training in South Africa under the Higher Education Act 1997 Registration Nr. 2001/HE07/005 Diploma in Network

More information

LMS. OSI Layers and the Learning Management System. Over view

LMS. OSI Layers and the Learning Management System. Over view Over view A Learning is an applica7on located on a local network or the Internet, developed for the employment of electronic educa7onal technology by students across distances from a building with mul7ple

More information

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user

More information

Building your cloud porbolio APS Connect

Building your cloud porbolio APS Connect Building your cloud porbolio APS Connect 5 th November 2014 Duncan Robinson, Parallels Business Consul3ng Introduc/on to BCS Who are we? Created 3 years ago in response to partner demand Define the strategy

More information

Connec(ng to the NC Educa(on Cloud

Connec(ng to the NC Educa(on Cloud NC Educa)on Cloud Connec(ng to the NC Educa(on Cloud May 2012 Update! http://cloud.fi.ncsu.edu! Dave Furiness, MCNC! Phil Emer, Friday Institute! 1 First Things First Year one was about planning we are

More information

Pu?ng B2B Research to the Legal Test

Pu?ng B2B Research to the Legal Test With the global leader in sampling and data services Pu?ng B2B Research to the Legal Test Ashlin Quirk, SSI General Counsel 2014 Survey Sampling Interna6onal 1 2014 Survey Sampling Interna6onal Se?ng the

More information

Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems...

Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems... Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems...3 Improve Processes...4 Innovation...4 IT Planning & Alignment

More information

Take Your Rocket U2 Apps Mobile with Rocket LegaSuite. Greg Mummah, Product Manager Rocket Software

Take Your Rocket U2 Apps Mobile with Rocket LegaSuite. Greg Mummah, Product Manager Rocket Software Take Your Rocket U2 Apps Mobile with Rocket LegaSuite Greg Mummah, Product Manager Rocket Software Greg Mummah Product Manager Managed application modernization team at municipal government software vendor

More information

Communica)on and sensor network technologies for smart ci)es

Communica)on and sensor network technologies for smart ci)es Communica)on and sensor network technologies for smart ci)es Leandros Tassiulas CERTH / NITLab University of Thessaly/ Department of Computer and Communica@on Engineering University of Thessaly (UTH) and

More information