Mission Possible: The Future of IT Support
|
|
|
- Christal Weaver
- 10 years ago
- Views:
Transcription
1 Mission Possible: The Future of IT Support Mission Impossible Paramount Pictures, Cruise/Wagner Produc(ons (2011). Used under Fair Use. Bob Marla) Informa(on Systems Opera(ons Manager - Washington State Patrol James Stanger, PhD Senior Director, Products - CompTIA 23 October, 2014
2 A Li)le Housekeeping ü Contact informa(on will be provided at the end of the webinar. ü ü ü ü ü You are muted by default, please ask all ques(ons in the Q&A sec(on. This webinar is being recorded. Webinar presenta(on slides and recording link will be available tomorrow. Please complete brief survey at the comple(on of the webinar. (1) CEU credit towards A+ ce renewal: A0er the webinar, CompTIA will verified a?endees a paracipaaon confirmaaon along with instrucaons on how to add the credit to your ceraficaaon account. THE JETSONS and All Related Characters Hanna- Barbera and Warner Bros. Entertainment Inc. Used under Fair #MissionPossible #TheFutureofIT #CompTIAcer:fied
3 Agenda A hands- on look into the support needs for a complex series of networks Bob s world What you need to learn in order to support systems ü Technologies ü Tools ü Techniques The future of IT support 3
4 Mission Possible: Your Host James Stanger Senior Director, Products Responsible for determining CompTIA s product roadmap Authority in: open source security web technologies blogging I m also an educator
5 Mission Possible: Our Guest Bob Marla) Informa(on Systems Opera(ons Manager for the Washington State Patrol Former CIO Management consultant to various states over the past 15 years Project manager InformaNon systems strategic and tacncal planning Systems migranon specialist Independent quality assurance consultant OperaNons manager
6 CompTIA is The voice of the world s informanon technology (IT) industry. Non- profit: IT Trade Associa(on advancing the global interests of IT professionals and IT channel organiza(ons Philanthropy: Crea(ng IT Futures Advocacy: TechAmerica Provide industry leading creden(als and cer(fica(on: Shameless plug visit cernficanon.comptia.org check out a free trial of CertMaster!
7 CompTIA CerNficaNons a quick overview Certs in red ANSI/ISO cer:fied/us Government 8570 CompTIA Best Prac(ces Cer(fica(on IT Fundamentals CyberSecure CompTIA Professional Cer(fica(on A+ CDIA+ Cloud+ CTT+ Linux+ Mobility+ Network+ Project+ Security+ Server+ Storage+ CompTIA Mastery Cer(fica(on CompTIA Advanced Security PracNNoner (CASP) CompTIA Specialty Cer(fica(on Cloud Essen(als Mobile App Security+
8 A skills- based look at the CompTIA roadmap Job role We cernfy essennal skills for the ennre IT department / ecosystem Help Desk / IT Support Technician / Field Technician Opera(ng system support Network technician IT / cloud architect Systems analyst / mobility engineer Mobile app developer Security engineer / IA technician Any employee Project manager Cer:fica:on This photo is for placement A+ only Server+, Linux+ Network+ Cloud Essen(als, Cloud+ Mobility+ Mobile App Security+ Security+, CASP CyberSecure (Forthcoming) Project+ 8
9 What you can learn from Bob How to keep pace with high- stakes, high- availability environments ü You re going to learn about the real- world types of skills that Bob needs to run a complex environment, both now, and 5 years from now. ü How to ensure system upnme ü How to share vital informanon in real- Nme ü Tips, tricks and traps for suppornng evolving IT systems, including what is coming next...
10 a look inside bob s world 10
11 NaNonal Criminal JusNce Network NaNonal Crime InformaNon Center (NCIC) Interstate IdenNficaNon Index (III) NaNonal Sex Offender Registry (NSOR) FBI NLETS All US States & Territories Correc(ons DMV Courts Municipal County State Federal Law Enforcement Message Switch WA Crime Informa(on Center WA Criminal History INTERPOL Canadian
12 Crime InformaNon Center: First Social Network State and NaNonal Crime InformaNon Centers OrganizaAons other than Facebook and Google have been collecang and storing informaaon for a long Ame... HOT FILES Wanted Persons Missing Persons Uniden(fied Persons Supervised Persons Protec(on Orders Iden(ty Thek Securi(es File Stolen Vehicles & Plates Repossessed Vehicles Impounded Vehicles License Plate File Sex Offender Registra(on Gun File Vehicle Parts File Boat File Ar(cle File Person of Interest DOL Drivers Check DOC Offender File DOL Mug Shots Immigra(on Violator RAP Sheets Gang Affilia(on Add, Modify, Clear, Delete Query Computer Aided Dispatch Law Enforcement Records Incident, Case InformaAon Law Enforcement Opera(ons
13 Each of the systems in these circles represents separate technical support needs.
14 ACCESS TransacNon Volumes September 2014 Row Labels Corrections DMV Parks (Boats) WACIC Regional Systems FBI III NCIC QRY NCIC Updates NCIC Updates Crim History NLETS WSP Client (local) DMV Photo Grand Total Input Message 64,710 2,640,779 2,204 3,994,675 3,291, ,108 1,921,204 60,116 20, , ,548 Output Message 64,830 2,652,458 2,206 2,662,924 11,015, ,763 1,919,840 59,889 96, , ,830 8,069 13,459,083 20,469,554 Grand Total 129,540 5,293,237 4,410 6,657,599 14,306, ,871 3,841, , ,016 1,877,910 1,159,378 8,069 33,928,637
15
16 Who supports all of these systems?
17 Support Context CUSTOMERS 25,493 Terminals 600+ Agencies 123 Regional Systems 11,018 MDT Devices 1,686 Wireless Devices Phone Business applicanons Vendor Applica(on Support WSP 24 X 7 Help Desk WSP Infrastructure Support Servers Storage (MicrosoR) Work Orders 3 WSP ACCESS Systems Administrators WSP Network Support Rou(ng VPN 24 X 7 Support Configura(on Rou(ng Troubleshoo(ng Inquiry Connec(ons Journal Searches Defects Change Management
18 OperaNonal Issues Let s talk about the issues you face, and the skills Bob needs from his co- workers to handle these issues... Applica(on Management Customer Management Changing configura(on Regional Message compliance Mission Cri(cal 24 x 7 Opera(ons Technology Changes Communica(ons Customers Vendors Technical workers Configura(on Management Change management One change affects mul(ple systems Journal Searches & Public Disclosure Requests
19 EssenNal Support Skills Bob s workers need: Database, including SQLs RouNng The ability to understand how different systems work together Server and storage Records analysis Packet captures (Wireshark) TCP handshake Protocol analysis Networking, including protocol analysis and rounng
20 To the nines Let s talk about the various levels of nines Availability % DownNme per annum DownNme per month DownNme per week 99.9 % 8.76 hours 43.8 minutes 10.1 minutes 99.99% minutes 4.32 minutes 1.01 minutes % five nines 5.26 minutes 25.9 seconds 6.05 seconds The more 9s involved, the more the cost! Equipment Support individuals Services (e.g., bandwidth, telcos)
21 keys to connnued success in IT support
22 What types of skills does Bob value? Ability to see the business ramificanons of a technology decision Sol skills Work and play well with people Clients (officers, tech support) Vendors and service providers Wri(ng skills Project management Ability to coordinate Bob s basketball metaphor You need: Point guards Centers Forwards
23 Some quesnons What is the value of cer(fica(on to you? You are a Microsok Windows and Cisco shop, right? What is the value of vendor- neutral cer(fica(on to you? What technical support skills do you value the most? What are some of the skills that help you the most, day to day? How did you develop your skills? Reading? Classroom training? On the job training?
24 Some war stories... Java migranon From one version to another Crea(ng a plan Considera(ons What other systems are affected? How much down(me is necessary? When systems go down Firewall and VPN issue Who gets the call? How do you determine the final responsibility? System slowdowns Cruise ships and other spikes How do you scale systems?
25 Future ideas for the data owned by the State of Washington... Big data possibilines Average of 34 million records monthly That s about 408 million records a year Up to 1 trillion records over the past years What are the data mining and analy(cs possibili(es? Predic(ve analy(cs How do you organize that data?
26 Bob s take on some trends we ve seen
27 The first trend... Help Desk / Tech support Challenges in Mobility Mobility skill level of general staff Making systems accessible securely Determining cost/roi of mobile solu(ons Op(mizing business applica(ons Users not familiar with company policy 40% 39% 35% 35% 35% Current skills PC Desk phone New skills Smartphone Tablet Mul(plaworm Mobility skill level of IT staff 34%
28 What trends do you see in server administranon? What are some of the essenaal skills in the future? Current skills Server OS Virtualiza(on Troubleshoo(ng Hardware Sokware
29 Network administranon Ability to place comms and data on IP network 25% 32% High comms priority Advanced tech usage Current skills QoS VLAN 10% 10% New skills WiFi SDN IT Firms Telecom Firms
30 Security Effect of security skills gaps Unaware of exposure Unaware of new security trends Maintaining compliance Costs of training 36% 38% 41% 41% Current skills Firewall VPN Encryp(on Newer skills Data Loss Preven(on Iden(ty Access Management Risk Management
31 Database knowledge Degree of data skills gaps Significant/ Don t know Moderate 50% 9% 41% Appropriate Level of skill Current skills Extract, Transform Load (ETL) SQL New skills NoSQL Distributed Storage
32 What about Web development? Mobile App Developer Job Trends Current skills HTML/CSS/Java Desktop browser design New skills ios/android HTML5 App Design
33 some conclusions and quesnons
34 So, some conclusions about the future of tech support... Business knowledge is essennal Service level agreements How to read and understand a contract Proac(ve thinking Delega(on You will need to know mulnple architectures, tools, and techniques Networking protocols Security
35 More conclusions and quesnons... What kind of cloud knowledge will workers need? And, of course, what about mobility? Data at rest Data in transit We ve gone way beyond break fix, haven t we? What operanng systems Windows Linux Other, such as Omnixx Enterprise? Customized apps and applicanons (OS, mobile, Web, etc.)
36 Summary Today, we talked about: A hands- on look into the support needs for a complex series of networks Bob s world What you need to learn in order to support systems - Technologies - Tools - Techniques The future of IT support 36
37 QUESTIONS? James Stanger Skype: stangernet Bob Marla) To learn more about our next Webinars, please go to the following URL: Thank you! 37
James Stanger, PhD Senior Director, Products - CompTIA 18 November, 2015
Damien Manuel Chief Information Security Officer (CISO), Blue Coat Systems - ANZ James Stanger, PhD Senior Director, Products - CompTIA 18 November, 2015 A Little Housekeeping Contact information will
The Internet of Things (IoT) and The IT Pro: What You Need to Future-Proof Your Career
The Internet of Things (IoT) and The IT Pro: What You Need to Future-Proof Your Career Robin O'Neill Senior Director, WDLABS at Western Digital James Stanger, PhD Senior Director, Products - CompTIA 29
Offensive & Defensive & Forensic Techniques for Determining Web User Iden<ty
Offensive & Defensive & Forensic Techniques for Determining Web User Iden
An Integrated Approach to Manage IT Network Traffic - An Overview Click to edit Master /tle style
An Integrated Approach to Manage IT Network Traffic - An Overview Click to edit Master /tle style Agenda A quick look at ManageEngine Tradi/onal Traffic Analysis Techniques & Tools Changing face of Network
LAW ENFORCEMENT INFORMATION NETWORK INFORMATION MANUAL
LAW ENFORCEMENT INFORMATION NETWORK INFORMATION MANUAL The Michigan Law Enforcement Information Network (LEIN) is a statewide computerized information system established in 1967 as a service to Michigan
Washington State Patrol ACCESS Section
Washington State Patrol ACCESS Section ACCESS Overview Business Section Section Manager 3 Auditors 2 Trainers 1 ISO 1 Office Manager Tier 1 Support First line technical support Tier 2 WAJIS Manager 3 ACCESS
This presenta,on covers the essen,al informa,on about IT services and facili,es which all new students will need to get started.
This presenta,on covers the essen,al informa,on about IT services and facili,es which all new students will need to get started. 1 Most of the informa,on is covered in more depth on the Informa,on Services
How To Protect Virtualized Data From Security Threats
S24 Virtualiza.on Security from the Auditor Perspec.ve Rob Clyde, CEO, Adap.ve Compu.ng; former CTO, Symantec David Lu, Senior Product Manager, Trend Micro Hemma Prafullchandra, CTO/SVP Products, HyTrust
Musings on OpenFlow and SDN. David Meyer Cisco Systems OpenFlow Symposium
Musings on OpenFlow and SDN David Meyer Cisco Systems OpenFlow Symposium Agenda Problem Space A Few Use Cases Reflec5ons on the Promise of OF/SDN A Few Challenges and Open Ques5ons Problem Space Network
Case Study. The SACM Journey at the Ontario Government
Case Study The SACM Journey at the Ontario Government Agenda Today s Objec=ves The Need for SACM Our SACM Journey Scope and Governance Process Ac=vi=es Key Process Roles Training and Measurement Lessons
Mobile Applica,on and BYOD (Bring Your Own Device) Security Implica,ons to Your Business. Dmitry Dessiatnikov
Mobile Applica,on and BYOD (Bring Your Own Device) Security Implica,ons to Your Business Dmitry Dessiatnikov DISCLAIMER All informa,on in this presenta,on is provided for informa,on purposes only and in
Phone Systems Buyer s Guide
Phone Systems Buyer s Guide Contents How Cri(cal is Communica(on to Your Business? 3 Fundamental Issues 4 Phone Systems Basic Features 6 Features for Users with Advanced Needs 10 Key Ques(ons for All Buyers
How to profit from the growing shortage of IT professionals jobs
How to profit from the growing shortage of IT professionals jobs It s no secret that IT is one of the fastest growing fields in the U.S. What s less well known is that there are so many career opportunities
An Econocom Group company. Your partner in the transi4on towards Mobile IT
An Econocom Group company Your partner in the transi4on towards Mobile IT A few key figures 40 000 mobile terminals integrated annually 200 M of telecom expenses managed 50 000 mobility support 4ckets
VoIP Security How to prevent eavesdropping on VoIP conversa8ons. Dmitry Dessiatnikov
VoIP Security How to prevent eavesdropping on VoIP conversa8ons Dmitry Dessiatnikov DISCLAIMER All informa8on in this presenta8on is provided for informa8on purposes only and in no event shall Security
Brandman University. School of CCNA
Information Technology Certifications CCNA The Cisco CCNA Training Package (ICND: Parts 1 and 2) includes expert instructor-led training modules with customized presentations, practice exam simulators
Splunk for Networking and SDN
Copyright 2013 Splunk Inc. Splunk for Networking and SDN Stela Udovicic Senior Product Marke?ng Manager, Splunk #splunkconf Legal No?ces During the course of this presenta?on, we may make forward- looking
Email/Endpoint Security and More Rondi Jamison
Email/Endpoint Security and More Rondi Jamison Sr. Marke)ng Manager - Enterprise Security Strategy Agenda 1 Why Symantec? 2 Partnership 3 APS2 Packages 4 What s next Copyright 2014 Symantec Corpora)on
Wireless Networks: Network Protocols/Mobile IP
Wireless Networks: Network Protocols/Mobile IP Mo$va$on Data transfer Encapsula$on Security IPv6 Problems DHCP Adapted from J. Schiller, Mobile Communications 1 Mo$va$on for Mobile IP Rou$ng based on IP
Kaseya Fundamentals Workshop DAY THREE. Developed by Kaseya University. Powered by IT Scholars
Kaseya Fundamentals Workshop DAY THREE Developed by Kaseya University Powered by IT Scholars Kaseya Version 6.5 Last updated March, 2014 Day Two Overview Day Two Lab Review Patch Management Configura;on
Privileged Administra0on Best Prac0ces :: September 1, 2015
Privileged Administra0on Best Prac0ces :: September 1, 2015 Discussion Contents Privileged Access and Administra1on Best Prac1ces 1) Overview of Capabili0es Defini0on of Need 2) Preparing your PxM Program
Network Security. Computer Security & Forensics. Security in Compu5ng, Chapter 7. l Network Defences. l Firewalls. l Demilitarised Zones
Network Security Security in Compu5ng, Chapter 7 Topics l Network AAacks l Reconnaissance l AAacks l Spoofing l Web Site Vulnerabili5es l Denial of Service l Network Defences l Firewalls l Demilitarised
Stream Deployments in the Real World: Enhance Opera?onal Intelligence Across Applica?on Delivery, IT Ops, Security, and More
Copyright 2015 Splunk Inc. Stream Deployments in the Real World: Enhance Opera?onal Intelligence Across Applica?on Delivery, IT Ops, Security, and More Stela Udovicic Sr. Product Marke?ng Manager Clayton
NETWORK DEVICE SECURITY AUDITING
E-SPIN PROFESSIONAL BOOK VULNERABILITY MANAGEMENT NETWORK DEVICE SECURITY AUDITING ALL THE PRACTICAL KNOW HOW AND HOW TO RELATED TO THE SUBJECT MATTERS. NETWORK DEVICE SECURITY, CONFIGURATION AUDITING,
The Seven Habits of State-of-the-Art Mobile App Security
#mstrworld The Seven Habits of State-of-the-Art Mobile App Security Mobile Security 8 July 2014 Anand Dwivedi, Product Manager, MicroStrategy strworld Agenda - Seven Habits of State of the Art Mobile App
2015-16 ITS Strategic Plan Enabling an Unbounded University
2015-16 ITS Strategic Plan Enabling an Unbounded University Update: July 31, 2015 IniAaAve: Agility Through Technology Vision Mission Enable Unbounded Learning Support student success through the innovaave
Information Technology Career Field Pathways and Course Structure
Information Technology Career Field Pathways and Course Structure Courses in Information Support and Services (N0) Computer Hardware 2 145025 Computer Software 145030 Networking 2 145035 Network Operating
Connecting PTE to Careers in Idaho
1 Connecting PTE to Careers in Idaho Wendi Secrist Director, Business Outreach July 21, 2015 www.pte.idaho.gov 2 School Portals NextSteps Career Information Where do I start? SkillStack lmi.idaho.gov College/University
State of IT Skills Gap
State of IT Skills Gap 2014 Summary Copyright (c) 2014 CompTIA Properties, LLC. All Rights Reserved. CompTIA.org IT Industry Overview Copyright (c) 2014 CompTIA Properties, LLC. All Rights Reserved. CompTIA.org
Everything You Need to Know about Cloud BI. Freek Kamst
Everything You Need to Know about Cloud BI Freek Kamst Business Analy2cs Insight, Bussum June 10th, 2014 What s it all about? Has anything changed in the world of BI? Is Cloud Compu2ng a Hype or here to
Big Data. The Big Picture. Our flexible and efficient Big Data solu9ons open the door to new opportuni9es and new business areas
Big Data The Big Picture Our flexible and efficient Big Data solu9ons open the door to new opportuni9es and new business areas What is Big Data? Big Data gets its name because that s what it is data that
For MINNESOTA January 2009
For MINNESOTA January 2009 January 2009 Management Advisory Committee for Community Supervision and Services (MACCSS) Technology Subcommittee Introduction... i Quick Reference - Criminal Justice Information
PALO ALTO SAFE APPLICATION ENABLEMENT
PALO ALTO SAFE APPLICATION ENABLEMENT 1 Palo Alto Networks Product Overview James Sherlow SE Manager WEUR & Africa [email protected] @jsherlow Palo Alto Networks at a Glance Corporate Highlights
VIA CONNECT PRO Deployment Guide
VIA CONNECT PRO Deployment Guide www.true-collaboration.com Infinite Ways to Collaborate CONTENTS Introduction... 3 User Experience... 3 Pre-Deployment Planning... 3 Connectivity... 3 Network Addressing...
Wireless Statistics Recommendations
Wireless Statistics Recommendations presented by The Library Network Wednesday, May 21 2014 Merit Conference Eagle Crest Conference Center 1275 S Huron Street Ypsilanti, Michigan Your presenters today
Mobile Device Management in the Systems Management Ecosystem. Katie Wiederholt, Dell Software
Mobile Device Management in the Systems Management Ecosystem Katie Wiederholt, The forces driving change in mobility Agenda The journey to MDM Where do we want to be and mobile security technologies 2
Help Framework. Ticket Management Ticket Resolu/on Communica/ons. Ticket Assignment Follow up Customer - communica/on System updates Delay management
Help for JD Edwards Our Help Framework Ticket qualifica/on Ticket crea/on Ticket Rou/ng Closures L1 issues Resolu/on KG SOPs Co- ordinate Ticket Assignment Follow up Customer - communica/on System updates
Database Communica/on in Visual Studio/C# using Web Services. Hans- Pe=er Halvorsen, M.Sc.
Database Communica/on in Visual Studio/C# using Web Services Hans- Pe=er Halvorsen, M.Sc. Background We will use Web Services because we assume that the the App should be used on Internet outside the Firewall).
Migrating to Hosted Telephony. Your ultimate guide to migrating from on premise to hosted telephony. www.ucandc.com
Migrating to Hosted Telephony Your ultimate guide to migrating from on premise to hosted telephony Intro What is covered in this guide? A professional and reliable business telephone system is a central
Achieving Customer Intelligence with Splunk Enterprise
Copyright 2013 Splunk Inc. #splunkconf Achieving Customer Intelligence with Splunk Enterprise Leon Li IT Director, Far EasTone Telco Taiwan About Far EasTone! Among leading Taiwan telecom operators! Founded
Securing and Monitoring BYOD Networks using NetFlow
Securing and Monitoring BYOD Networks using NetFlow How NetFlow can help with Security Analysis, Application Detection and Traffic Monitoring Don Thomas Jacob Technical Marketing Engineer ManageEngine
Magnet Voice Windows PC Softphone Installation
Magnet Voice Windows PC Softphone Installation Contents 1. Introduction 3 2. Installation 3 Step 1: Install the Software on your PC 4 Step 2: Input your registration details 4 3. Connected State 6 6. Port
South Carolina Law Enforcement Division Criminal Justice Information System (CJIS)
South Carolina Law Enforcement Division Criminal Justice Information System (CJIS) USER AGREEMENT AND SYSTEM RESPONSIBILITIES Introduction The South Carolina Criminal Justice Infonnation and Communications
Welcome to the Tampa Bay Hi-Tech Training Online Overview
Welcome to the Tampa Bay Hi-Tech Training Online Overview HITT Orientation Overview and Online Application This Orientation covers the following: What is the HITT program through CareerSource Tampa Bay?
What is Field Service?
What is Field Service? Oracle Field Service Cloud Outbound Product Management Team Copyright 2014 Oracle and/or its affiliates. All rights reserved. What is field service? Field service is delivering installing
Data Center Evolu.on and the Cloud. Paul A. Strassmann George Mason University November 5, 2008, 7:20 to 10:00 PM
Data Center Evolu.on and the Cloud Paul A. Strassmann George Mason University November 5, 2008, 7:20 to 10:00 PM 1 Hardware Evolu.on 2 Where is hardware going? x86 con(nues to move upstream Massive compute
White Paper. Star2Star Blended Architecture What Makes it Different? What Makes it Better? OVERVIEW
STAR2STAR COMMUNICATIONS WHITE PAPER SERIES White Paper OVERVIEW In this paper, we discuss: What s wrong with the existing telephone network? Three ways to switch to VoIP What s Different about Star2Star?
Technology Department Infrastructure & Support
Technology Department Infrastructure & Support The Technology Department Team Executive Director of Technology Technology Coordinator Network Engineer Application Administrator Application Specialist Infrastructure
Enterprise QoS. Tim Chung Google Corporate Netops Architecture Nanog 49 June 15th, 2010
Enterprise QoS Tim Chung Google Corporate Netops Architecture Nanog 49 June 15th, 2010 Agenda Challenges Solu5ons Opera5ons Best Prac5ces Note: This talk pertains to Google enterprise network only, not
Financial Fraud Threats & Preven3on. Mark Frank EVP, Senior Opera3ons Officer Colorado Business Bank
Financial Fraud Threats & Preven3on Mark Frank EVP, Senior Opera3ons Officer Colorado Business Bank Why Pay ACen3on to Fraud Risks? Fraud occurs everywhere, and NO organiza3on is immune Changing business
VIA COLLAGE Deployment Guide
VIA COLLAGE Deployment Guide www.true-collaboration.com Infinite Ways to Collaborate CONTENTS Introduction... 3 User Experience... 3 Pre-Deployment Planning... 3 Connectivity... 3 Network Addressing...
An introduction to disaster recovery. And how DrAAS from I.R.I.S. Ondit can help!
An introduction to disaster recovery And how DrAAS from I.R.I.S. Ondit can help! Events That Impact Information Availability Events that require a data center move: Fewer than 1% of occurrences Natural
Diploma in Information Technology Network Integration Specialist COURSE INFO PACK
Registered as a Private Higher Education Institution with the Department of Higher Education and Training in South Africa under the Higher Education Act 1997 Registration Nr. 2001/HE07/005 Diploma in Network
LMS. OSI Layers and the Learning Management System. Over view
Over view A Learning is an applica7on located on a local network or the Internet, developed for the employment of electronic educa7onal technology by students across distances from a building with mul7ple
WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS
WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user
Building your cloud porbolio APS Connect
Building your cloud porbolio APS Connect 5 th November 2014 Duncan Robinson, Parallels Business Consul3ng Introduc/on to BCS Who are we? Created 3 years ago in response to partner demand Define the strategy
Connec(ng to the NC Educa(on Cloud
NC Educa)on Cloud Connec(ng to the NC Educa(on Cloud May 2012 Update! http://cloud.fi.ncsu.edu! Dave Furiness, MCNC! Phil Emer, Friday Institute! 1 First Things First Year one was about planning we are
Pu?ng B2B Research to the Legal Test
With the global leader in sampling and data services Pu?ng B2B Research to the Legal Test Ashlin Quirk, SSI General Counsel 2014 Survey Sampling Interna6onal 1 2014 Survey Sampling Interna6onal Se?ng the
Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems...
Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems...3 Improve Processes...4 Innovation...4 IT Planning & Alignment
Take Your Rocket U2 Apps Mobile with Rocket LegaSuite. Greg Mummah, Product Manager Rocket Software
Take Your Rocket U2 Apps Mobile with Rocket LegaSuite Greg Mummah, Product Manager Rocket Software Greg Mummah Product Manager Managed application modernization team at municipal government software vendor
Communica)on and sensor network technologies for smart ci)es
Communica)on and sensor network technologies for smart ci)es Leandros Tassiulas CERTH / NITLab University of Thessaly/ Department of Computer and Communica@on Engineering University of Thessaly (UTH) and
