SlideShare a Scribd company logo
1 of 19
Download to read offline
Information
Technology
Charlie Stevenson
IT Manager
I.T. DEPARTMENT
What’s the IT department at IMS do? Who does it serve? Who helps out?
Responsibilities
• Technical Support
• Reliability
• Projects
• Budget
• Policies
• Procedures
• Compliance
• Strategic planning
• Sound
• Phones
• Data storage
• Imaging
• Network
• Security
• Internet
• Office automation
People I Serve
• Board of directors
• Founders
• Guests
• Staff
• Teachers
• Volunteers
• Customers (aka Yogis )
Outside Help & Services
Eric Woudenberg – Dharma Seed
Geof Karlson – Yogi Enhanced System (YES)
Mark Pirani – Electrician
•Expert Laser Services (copiers)
•Charter Business (voice & Internet)
•Rapid7 (Nexpose)
•Gravity Switch (website)
•Prevco Audio (sound systems)
•CCB Nonprofits (software)
•Citrix (XenServer)
•Orange Oil (air conditioners)
•Dell (servers)
•Provantage (equipment)
Over 60 vendor/service
providers including:
WHAT YOU SEE
The visible and tangible aspects of IMS IT
What you see: stuff
• Laptop & desktop computers, iPads, etc
• Copiers, fax machines, scanners, printers, labelers
• Credit card readers
• Hearing devices, microphones, amplifiers, recording
equipment
• Cameras, televisions, CD/DVD players, projectors
• Conference phones, desktop phones, cell phones,
helpdesk “red” phones, etc
What you see: website
WHAT YOU DON’T SEE
The invisible and/or intangible aspects of IMS IT
What You Don’t See
• Astounding layers of complexity
• Vast array of hardware, software and technical standards
& protocols to study and master
• Anticipating obsolescence/adoption of new technologies
– rate of technological innovation leading to dramatically short
lifespan of assets and investments in hardware, software, web
presence, data formats, storage resources, etc
What you don’t see: website
TIP OF THE ICEBERG
How much are we talking about here?
• 15 wireless access points
• 2 VPN firewall routers
• 2 network mp3 recorders
• 4 fiber media converters
• 2 air conditioners
• 9 microphones, 3 amplifiers, 3
equalizers, 2 FM assisted
listening, UHF dual wireless mics
• 2 phone and voicemail systems
• 2 photo copiers
• Fax machines, digital cameras,
video recorder, etc..
• 23 telephone lines
• 2 locked fireproof storage boxes
• Phones: 6 cell, 2 conference, 7
emergency, 40 system, 2
helpdesk “red” phones
• 1 SmartTV
By the numbers
By the numbers
• 6 external drives, 2 network attached storage
(NAS), 2 storage area networks (SAN)
• 37 desktop and laptop computers
• 20 servers
• 48 displays
• 25 network switches
• 26 print devices
• 39 battery backups
• ~11 different operating systems
• ~15 programming languages
• ~100 username and passwords for internal
systems, vendor websites, etc
• Central anti-virus & software management for
all servers and computers
• ~26,500 lines of code for online registration
and donation etc
• ~300,000 lines of code under the hood in
YES
• Death by acronym:
– DNS, DHCP, LDAP/AD, DFS, HTTPS,
MySQL, MS SQL, Subversion, SSH,
SAMBA, iSCSI, VLAN, NTP, GPO, MSI,
VNC, WSUS, ODBC, IIS, SMTP, POP3,
IMAP, ARP, WPA2
• Myriad cyber threat vectors monitored with
Nexpose etc
PICTURE IT
My eyes just glazed over can you show me a picture?
Physical Inventory
*Entireinventorynotdepictedduetospaceconstraints
Can you help me visualize IMS IT from another angle?
VISUALIZE IT
Questions?

More Related Content

Similar to Under the hood of a modern buddhist retreat center v2.0

Information Technology at IMS
Information Technology at IMSInformation Technology at IMS
Information Technology at IMSCharles Stevenson
 
Guy Jaszewski - In Depth Background Info
Guy Jaszewski - In Depth Background InfoGuy Jaszewski - In Depth Background Info
Guy Jaszewski - In Depth Background InfoGuy Jaszewski
 
3_Types of Computers and Data Representation.pptx
3_Types of Computers and Data Representation.pptx3_Types of Computers and Data Representation.pptx
3_Types of Computers and Data Representation.pptxhafizsaifullah5
 
Profile quick-2
Profile quick-2Profile quick-2
Profile quick-2Edge Ict
 
FM & Bluetooth & WIFI, Oh My!
FM & Bluetooth & WIFI, Oh My!FM & Bluetooth & WIFI, Oh My!
FM & Bluetooth & WIFI, Oh My!Aaron Lafferty
 
RIT Services J.Higham
RIT Services J.HighamRIT Services J.Higham
RIT Services J.HighamJulie Higham
 
Advantech Design & Manufacturing Services for Medical Devices
Advantech Design & Manufacturing Services for Medical DevicesAdvantech Design & Manufacturing Services for Medical Devices
Advantech Design & Manufacturing Services for Medical DevicesMariette Dusseldorp Advantech
 
Cyber Security Overview for Small Businesses
Cyber Security Overview for Small BusinessesCyber Security Overview for Small Businesses
Cyber Security Overview for Small BusinessesCharles Cline
 
RMS Tech Solutions - Digital Profile
RMS Tech Solutions - Digital ProfileRMS Tech Solutions - Digital Profile
RMS Tech Solutions - Digital ProfileRMSTechSolutions
 
Information Technology at IMS
Information Technology at IMSInformation Technology at IMS
Information Technology at IMSCharles Stevenson
 
CenturyDX-IT-Company
CenturyDX-IT-CompanyCenturyDX-IT-Company
CenturyDX-IT-CompanyMustafa Kuğu
 
POSTECH 1 Business V2.0 UR final.ppt
POSTECH 1 Business V2.0 UR final.pptPOSTECH 1 Business V2.0 UR final.ppt
POSTECH 1 Business V2.0 UR final.pptDwiPratiwi50
 

Similar to Under the hood of a modern buddhist retreat center v2.0 (20)

Information Technology at IMS
Information Technology at IMSInformation Technology at IMS
Information Technology at IMS
 
Guy Jaszewski - In Depth Background Info
Guy Jaszewski - In Depth Background InfoGuy Jaszewski - In Depth Background Info
Guy Jaszewski - In Depth Background Info
 
3_Types of Computers and Data Representation.pptx
3_Types of Computers and Data Representation.pptx3_Types of Computers and Data Representation.pptx
3_Types of Computers and Data Representation.pptx
 
Maior Technical Profile
Maior Technical ProfileMaior Technical Profile
Maior Technical Profile
 
Profile quick-2
Profile quick-2Profile quick-2
Profile quick-2
 
Building a Hacker Resistant Network
Building a Hacker Resistant Network Building a Hacker Resistant Network
Building a Hacker Resistant Network
 
It2 شرحa
It2 شرحaIt2 شرحa
It2 شرحa
 
FM & Bluetooth & WIFI, Oh My!
FM & Bluetooth & WIFI, Oh My!FM & Bluetooth & WIFI, Oh My!
FM & Bluetooth & WIFI, Oh My!
 
RIT Services J.Higham
RIT Services J.HighamRIT Services J.Higham
RIT Services J.Higham
 
Computer Application
Computer ApplicationComputer Application
Computer Application
 
Advantech Design & Manufacturing Services for Medical Devices
Advantech Design & Manufacturing Services for Medical DevicesAdvantech Design & Manufacturing Services for Medical Devices
Advantech Design & Manufacturing Services for Medical Devices
 
Cyber Security Overview for Small Businesses
Cyber Security Overview for Small BusinessesCyber Security Overview for Small Businesses
Cyber Security Overview for Small Businesses
 
Chap003
Chap003Chap003
Chap003
 
Infonet solutions
Infonet solutionsInfonet solutions
Infonet solutions
 
RMS Tech Solutions - Digital Profile
RMS Tech Solutions - Digital ProfileRMS Tech Solutions - Digital Profile
RMS Tech Solutions - Digital Profile
 
4.03 it careers 2
4.03 it careers 24.03 it careers 2
4.03 it careers 2
 
Intro to computer.pdf
Intro to computer.pdfIntro to computer.pdf
Intro to computer.pdf
 
Information Technology at IMS
Information Technology at IMSInformation Technology at IMS
Information Technology at IMS
 
CenturyDX-IT-Company
CenturyDX-IT-CompanyCenturyDX-IT-Company
CenturyDX-IT-Company
 
POSTECH 1 Business V2.0 UR final.ppt
POSTECH 1 Business V2.0 UR final.pptPOSTECH 1 Business V2.0 UR final.ppt
POSTECH 1 Business V2.0 UR final.ppt
 

Recently uploaded

FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Recently uploaded (20)

The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

Under the hood of a modern buddhist retreat center v2.0

  • 2. I.T. DEPARTMENT What’s the IT department at IMS do? Who does it serve? Who helps out?
  • 3. Responsibilities • Technical Support • Reliability • Projects • Budget • Policies • Procedures • Compliance • Strategic planning • Sound • Phones • Data storage • Imaging • Network • Security • Internet • Office automation
  • 4. People I Serve • Board of directors • Founders • Guests • Staff • Teachers • Volunteers • Customers (aka Yogis )
  • 5. Outside Help & Services Eric Woudenberg – Dharma Seed Geof Karlson – Yogi Enhanced System (YES) Mark Pirani – Electrician •Expert Laser Services (copiers) •Charter Business (voice & Internet) •Rapid7 (Nexpose) •Gravity Switch (website) •Prevco Audio (sound systems) •CCB Nonprofits (software) •Citrix (XenServer) •Orange Oil (air conditioners) •Dell (servers) •Provantage (equipment) Over 60 vendor/service providers including:
  • 6. WHAT YOU SEE The visible and tangible aspects of IMS IT
  • 7. What you see: stuff • Laptop & desktop computers, iPads, etc • Copiers, fax machines, scanners, printers, labelers • Credit card readers • Hearing devices, microphones, amplifiers, recording equipment • Cameras, televisions, CD/DVD players, projectors • Conference phones, desktop phones, cell phones, helpdesk “red” phones, etc
  • 8. What you see: website
  • 9. WHAT YOU DON’T SEE The invisible and/or intangible aspects of IMS IT
  • 10. What You Don’t See • Astounding layers of complexity • Vast array of hardware, software and technical standards & protocols to study and master • Anticipating obsolescence/adoption of new technologies – rate of technological innovation leading to dramatically short lifespan of assets and investments in hardware, software, web presence, data formats, storage resources, etc
  • 11. What you don’t see: website
  • 12. TIP OF THE ICEBERG How much are we talking about here?
  • 13. • 15 wireless access points • 2 VPN firewall routers • 2 network mp3 recorders • 4 fiber media converters • 2 air conditioners • 9 microphones, 3 amplifiers, 3 equalizers, 2 FM assisted listening, UHF dual wireless mics • 2 phone and voicemail systems • 2 photo copiers • Fax machines, digital cameras, video recorder, etc.. • 23 telephone lines • 2 locked fireproof storage boxes • Phones: 6 cell, 2 conference, 7 emergency, 40 system, 2 helpdesk “red” phones • 1 SmartTV By the numbers
  • 14. By the numbers • 6 external drives, 2 network attached storage (NAS), 2 storage area networks (SAN) • 37 desktop and laptop computers • 20 servers • 48 displays • 25 network switches • 26 print devices • 39 battery backups • ~11 different operating systems • ~15 programming languages • ~100 username and passwords for internal systems, vendor websites, etc • Central anti-virus & software management for all servers and computers • ~26,500 lines of code for online registration and donation etc • ~300,000 lines of code under the hood in YES • Death by acronym: – DNS, DHCP, LDAP/AD, DFS, HTTPS, MySQL, MS SQL, Subversion, SSH, SAMBA, iSCSI, VLAN, NTP, GPO, MSI, VNC, WSUS, ODBC, IIS, SMTP, POP3, IMAP, ARP, WPA2 • Myriad cyber threat vectors monitored with Nexpose etc
  • 15. PICTURE IT My eyes just glazed over can you show me a picture?
  • 17. Can you help me visualize IMS IT from another angle? VISUALIZE IT
  • 18.