The document summarizes LU ITS' response to identified risks and concerns from a TSUS IT auditor. LU ITS acknowledges risks involving data center constraints and outlines steps taken to address them, such as moving some systems to offsite hosting. The response also provides clarification on delays in areas like retiring legacy systems, reducing operating environments, and establishing security policies and programs. It indicates that work is ongoing to comply with standards and remediate issues.
Timothy White is a senior IT leader with experience managing complex IT projects and infrastructure. He has experience with server architecture, virtualization, database management, and implementing best practices. Some of his achievements include managing a data center migration, implementing virtualization to reduce server footprint, and establishing partnerships to provide technology solutions.
The California Department of Corrections and Rehabilitation (CDCR) manages a large IT environment supporting over 200,000 inmates and staff across numerous facilities. To meet growing demands, CDCR implemented VMware virtualization, consolidating over 800 servers onto fewer physical servers. This reduced costs, improved disaster recovery, and allowed the agency to avoid $250,000 for one project by reducing required servers from 37 to 5. Virtualization also improved flexibility, reduced patch deployment time by two-thirds, and helped CDCR meet state energy reduction mandates by decreasing its data center from 70 racks to 3 racks.
November 2014 Webinar - Disaster Recovery Worthy of a Zombie ApocalypseRapidScale
80% of companies that do not recover from a data loss within one month are likely to go out of business in the immediate future (Bernstein Crisis Management). With Disaster Recovery and Business Continuity, a business is able to survive and thrive after a disaster has struck.
This document discusses lessons learned from disaster planning for a digital archive at the Inter-University Consortium for Political and Social Research (ICPSR). It outlines ICPSR's disaster planning process, which was formalized in 2007 and gained urgency after a 2008 power outage. The core functions approach helped identify access to collections and preservation of digital assets as vital functions. This led to developing a web server backup in the cloud to facilitate continued access. The document also discusses components of a disaster planning suite and how plans were developed to protect and recover digital assets, including an IT contingency plan and disaster recovery plan.
IRJET-Comparative Analysis of Disaster Recovery Solutions in Cloud ComputingIRJET Journal
This document compares different disaster recovery solutions in cloud computing, including local backup, geographical redundancy and backup, inter-private cloud storage, and resource management. It analyzes the advantages of each solution, such as security, speed, and control for local backup, and security and control for geographical redundancy. The document also discusses challenges with resource management in cloud computing and distinguishes between cloud storage and cloud computing.
Why Replication is Not Enough to Keep Your Business Running Axcient
While you may be familiar with multiple replication products and vendors, don’t confuse the technology of data or server replication with Disaster Recovery.
Replication is not a disaster recovery solution nor does it provide business continuity. So what exactly is replication? According to TechTarget, replication is the process of copying data from one location to another over a SAN, LAN or local WAN. This provides you with multiple up-to-date copies of your data. Look at replication as an aspect of DR/BC. Although it is a key technology in order to implement a complete DR/BC plan, it needs to be combined with data deduplication, virtual servers or even the cloud. But let’s take a step back to really understand business continuity.
This document provides guidance on establishing a systematic process for handling records in a bespoke marine service contract. It recommends developing bespoke systems to accommodate new methodologies and data, while following general principles like securely backing up and identifying all raw and processed data. An example project involving remote seabed drilling, coring, and sampling at depths up to 2500m is described to illustrate implementing file naming conventions and storage hierarchies to efficiently organize large amounts of technical and contractual data from multiple sources over the project duration.
The Five Myths of Cloud-Based Disaster Recovery Axcient
A recent study by the Disaster Recovery Preparedness Council highlighted a disturbing fact: three out of four companies worldwide are failing in terms of disaster readiness. The impact IT interruptions have range from thousands of dollars to millions of dollars.
No wonder the “cloud” is having such an attraction and why businesses are rethinking their recovery strategies. However, what is preventing companies from fully adopting cloud solutions for disaster recovery? We believe that there are five myths surrounding cloud-based recovery services that have to be dispelled.
Timothy White is a senior IT leader with experience managing complex IT projects and infrastructure. He has experience with server architecture, virtualization, database management, and implementing best practices. Some of his achievements include managing a data center migration, implementing virtualization to reduce server footprint, and establishing partnerships to provide technology solutions.
The California Department of Corrections and Rehabilitation (CDCR) manages a large IT environment supporting over 200,000 inmates and staff across numerous facilities. To meet growing demands, CDCR implemented VMware virtualization, consolidating over 800 servers onto fewer physical servers. This reduced costs, improved disaster recovery, and allowed the agency to avoid $250,000 for one project by reducing required servers from 37 to 5. Virtualization also improved flexibility, reduced patch deployment time by two-thirds, and helped CDCR meet state energy reduction mandates by decreasing its data center from 70 racks to 3 racks.
November 2014 Webinar - Disaster Recovery Worthy of a Zombie ApocalypseRapidScale
80% of companies that do not recover from a data loss within one month are likely to go out of business in the immediate future (Bernstein Crisis Management). With Disaster Recovery and Business Continuity, a business is able to survive and thrive after a disaster has struck.
This document discusses lessons learned from disaster planning for a digital archive at the Inter-University Consortium for Political and Social Research (ICPSR). It outlines ICPSR's disaster planning process, which was formalized in 2007 and gained urgency after a 2008 power outage. The core functions approach helped identify access to collections and preservation of digital assets as vital functions. This led to developing a web server backup in the cloud to facilitate continued access. The document also discusses components of a disaster planning suite and how plans were developed to protect and recover digital assets, including an IT contingency plan and disaster recovery plan.
IRJET-Comparative Analysis of Disaster Recovery Solutions in Cloud ComputingIRJET Journal
This document compares different disaster recovery solutions in cloud computing, including local backup, geographical redundancy and backup, inter-private cloud storage, and resource management. It analyzes the advantages of each solution, such as security, speed, and control for local backup, and security and control for geographical redundancy. The document also discusses challenges with resource management in cloud computing and distinguishes between cloud storage and cloud computing.
Why Replication is Not Enough to Keep Your Business Running Axcient
While you may be familiar with multiple replication products and vendors, don’t confuse the technology of data or server replication with Disaster Recovery.
Replication is not a disaster recovery solution nor does it provide business continuity. So what exactly is replication? According to TechTarget, replication is the process of copying data from one location to another over a SAN, LAN or local WAN. This provides you with multiple up-to-date copies of your data. Look at replication as an aspect of DR/BC. Although it is a key technology in order to implement a complete DR/BC plan, it needs to be combined with data deduplication, virtual servers or even the cloud. But let’s take a step back to really understand business continuity.
This document provides guidance on establishing a systematic process for handling records in a bespoke marine service contract. It recommends developing bespoke systems to accommodate new methodologies and data, while following general principles like securely backing up and identifying all raw and processed data. An example project involving remote seabed drilling, coring, and sampling at depths up to 2500m is described to illustrate implementing file naming conventions and storage hierarchies to efficiently organize large amounts of technical and contractual data from multiple sources over the project duration.
The Five Myths of Cloud-Based Disaster Recovery Axcient
A recent study by the Disaster Recovery Preparedness Council highlighted a disturbing fact: three out of four companies worldwide are failing in terms of disaster readiness. The impact IT interruptions have range from thousands of dollars to millions of dollars.
No wonder the “cloud” is having such an attraction and why businesses are rethinking their recovery strategies. However, what is preventing companies from fully adopting cloud solutions for disaster recovery? We believe that there are five myths surrounding cloud-based recovery services that have to be dispelled.
Christopher King is an award-winning systems architect and storage engineer with over 9 years of experience integrating business needs with cost-effective technology solutions. He has extensive expertise in data growth and protection, disaster recovery design, and virtualization. King has a proven track record of managing large-scale projects and IT budgets up to $1 million. His experience includes roles at Yahoo!, Georgetown University, American Chemical Society, and The George Washington University.
This document provides the program for an Architecture-Driven Modernization workshop taking place from March 22-24, 2004 in Chicago, IL. The workshop includes tutorials, presentations, panels and demonstrations on the topics of application modernization, leveraging existing software assets, recovering architecture models from legacy code, and transitioning to model-driven approaches. It features speakers from organizations like IBM, Klocwork, THALES and others discussing their experiences with architecture-driven modernization projects.
1) The 1992 failure of the London Ambulance Service's computer aided dispatch system was caused by a combination of factors including flaws in the software, an unreasonable project timeline imposed by LAS management, and the inexperience of the vendor selected to develop the system.
2) Key issues included reusing outdated hardware, selecting an inexperienced vendor based primarily on cost, failing to involve key stakeholders in requirements gathering, and not following proper software development processes.
3) While software errors directly caused the failure, both LAS management and the developing vendor share responsibility - LAS for unreasonable constraints and vendor selection, and the vendor for taking on a project beyond its capabilities.
The document provides an overview of disaster recovery best practices and examples. It discusses defining recovery objectives, building replication strategies based on those objectives, and maintaining disaster recovery plans through regular testing. Several customer examples are also provided that implemented disaster recovery solutions using a combination of on-premise infrastructure, colocation, and cloud services.
Disaster Recovery Planning: Best Practices, Templates, and ToolsZetta Inc
The document discusses best practices for building an effective disaster recovery (DR) plan. It recommends conducting a business impact analysis to identify critical applications and recovery objectives. A risk assessment should identify infrastructure dependencies and single points of failure to manage risks. DR plans must be tested to ensure they can meet recovery time and point objectives. The presentation then describes how the Zetta cloud backup and DR solution helps customers limit exposure to outages through geographic replication, high availability configurations, and browser-based recovery capabilities.
The document discusses several key steps organizations should take before migrating files to an enterprise content management system (ECM) to ensure a successful implementation. These include conducting a thorough business and systems analysis, preparing stakeholders, analyzing business processes, assessing recordkeeping requirements, preparing for document and email migrations, and building a sustainable security management framework. Taking the necessary time for these activities prior to any file migration is essential for minimizing risks and ensuring adoption of the new ECM system.
Kesha Orr is an IT professional with over 20 years of experience in technical support roles. She has worked for various companies including Home Depot, NTT Data Corporation, KIPP Austin Public Schools, HomeAway, BedandBreakfast.com, and Mental Health Network. Her experience includes desktop support, systems administration, network support, and help desk roles. She is proficient in Windows, networking, virtualization, backup software, and various other technologies. Kesha holds a Bachelor's degree from Texas Tech University and has taken Microsoft certification courses.
This document provides an overview of disaster recovery best practices for data centers as discussed in a VMware guide. It begins with an introduction explaining the importance of disaster recovery planning. It then discusses how virtualization simplifies disaster recovery implementation. The next sections cover how VMware Site Recovery Manager allows for automated, reliable disaster recovery and examples of organizations using it successfully. Common myths about disaster recovery are debunked. The document concludes with the top 10 disaster recovery best practices as shared by VMware customers, including virtualizing, automating plans, regular testing, and being proactive.
Panduit provides physical infrastructure management solutions to address challenges from increasing technology advancements and system interdependencies. Their Physical Infrastructure Manager (PIM) software and PanView iQ hardware together provide real-time monitoring of network connectivity and automation of network tasks to improve reliability, security, and efficiency while reducing costs. Panduit takes a holistic approach to physical infrastructure management through convergence of communication, computing, control, power and security systems.
This file contains the slide presentation from the 2008 Network World IT Roadmap Keynote Address. It contains the concepts and events surrounding the successful disaster recovery of Lagasse IT functions following Hurricane Katrina\'s landfall in 2005.
Vinay Reddy is a senior technology executive seeking a new role. He has over 16 years of experience in system architecture, consulting, networking management, and virtualization. Currently he is Vice President of Technology at Goldman Sachs, where he leads an enterprise system management team and works on monitoring, deployment, and orchestration applications. Previously he held roles at Microsoft India and other companies. He has expertise in areas like Active Directory, networking, System Center, and virtualization.
Business Continuity for Mission Critical ApplicationsDataCore Software
Unplanned interruption events, a.k.a. “disasters,” hit virtually all data centers at one time or another. While the preponderance of annual downtime results from interruptions that have a limited or localized scope of impact, IT planners must also prepare for the possibility of a catastrophic event with a broader geographical footprint.
Such disasters cannot be circumvented simply by using high availability configurations in servers or storage. What is needed, especially for mission-critical applications and databases, are strategies that can help organizations prevail in the wake of “big footprint” disasters, but that can also be implemented in a more limited way in response to interruption events with a more limited impact profile.
DataCore Software’s storage platform provides several capabilities for data protection and disaster recovery that are well-suited to today’s most mission-critical databases and applications.
This document provides a summary of best practices and architecture for California State University data centers. It was created by a task force to identify effective practices based on their collective experience. The document establishes principles for standards-based, cost-effective solutions that ensure reliability, security, performance and environmental sustainability. It describes components of the data center framework including hardware platforms, server virtualization, storage area networks, software and management disciplines.
UAE University selected and deployed an ERP system called Integrated Business Information System (IBIS) while transforming its IT services culture and building an enterprise infrastructure. Key steps included creating a customer support center, selecting SunGard suite for ERP modules, and building a 'unified digital architecture' with segregated environments. The deployment involved addressing legacy systems issues and improving processes, security, and high availability of the new infrastructure.
Hybrid Cloud Orchestration: How SuperChoice Does ItRightScale
This document discusses SuperChoice's hybrid cloud orchestration approach. It summarizes:
- SuperChoice migrated over 200 applications to hybrid clouds using a Cloud Management Platform for orchestration.
- They took a "fix by rebuild" approach to automate deploying entire environments from source scripts.
- Significant challenges included addressing technical debt, cultural change for staff, and ensuring portability across clouds.
- Lessons learned were that automation is critical, people issues are the biggest barrier, and a methodical approach worked best for the transition.
From Nemertes Research: Data center architects need to consider designs that limit complexity and reduce the
possibility of chaotic behavior. Learn more at http://www.juniper.net/us/en/dm/datacenter/
An architacture for modular datacenterJunaid Kabir
This document proposes a new architecture for modular data centers using standard shipping containers. It argues that fully populating shipping containers with thousands of commodity servers and delivering them as ready-to-run modules could significantly reduce data center costs through lower acquisition, deployment, and management costs compared to individual servers. This approach aims to address challenges from the rapid growth of internet services relying on large numbers of inexpensive, commodity servers in data centers.
VMware streamlined its architecture approval process using Troux to close the gap between IT and business. Troux helped operationalize tribal knowledge, improve business understanding of changes, and show how IT aligns with business capabilities. It reduced impact analysis time from 3 weeks to 1.5 weeks. Troux also helped improve governance, reduce risk and non-compliance, and increase mobile access to applications. The initial data collection into Troux required more time than planned to ensure accuracy.
Opportunities and Challenges for Running Scientific Workflows on the Cloud lyingcom
This document discusses opportunities and challenges for running scientific workflows on cloud computing platforms. It begins by introducing cloud computing and scientific workflows. It then describes three main opportunities: 1) increased scale to address larger problems, 2) on-demand resource allocation for improved efficiency, and 3) more flexibility to optimize performance and cost. Several challenges are also outlined, including architectural integration issues, data management difficulties, and the need for cloud-compatible workflow languages and services. The document concludes by proposing research directions to address these challenges and better support scientific workflows in cloud environments.
Self-tuning data centers aim to minimize human intervention through machine learning techniques. Current challenges include meeting service level agreements for performance and uptime while maximizing efficiency of resources and minimizing costs. A self-tuning architecture uses monitoring data to detect issues and make recommendations for scaling, migration, or tuning of resources without human input. This approach aims to optimize data centers so they can scale efficiently to support growing workloads and applications.
This presentation was developed for the 2011 AFCOM Data Center World conference as a case study. It outlines the the decision by one college to not build a new data center and instead develop a strategy to leverage off premise solutions including the Cloud.
Christopher King is an award-winning systems architect and storage engineer with over 9 years of experience integrating business needs with cost-effective technology solutions. He has extensive expertise in data growth and protection, disaster recovery design, and virtualization. King has a proven track record of managing large-scale projects and IT budgets up to $1 million. His experience includes roles at Yahoo!, Georgetown University, American Chemical Society, and The George Washington University.
This document provides the program for an Architecture-Driven Modernization workshop taking place from March 22-24, 2004 in Chicago, IL. The workshop includes tutorials, presentations, panels and demonstrations on the topics of application modernization, leveraging existing software assets, recovering architecture models from legacy code, and transitioning to model-driven approaches. It features speakers from organizations like IBM, Klocwork, THALES and others discussing their experiences with architecture-driven modernization projects.
1) The 1992 failure of the London Ambulance Service's computer aided dispatch system was caused by a combination of factors including flaws in the software, an unreasonable project timeline imposed by LAS management, and the inexperience of the vendor selected to develop the system.
2) Key issues included reusing outdated hardware, selecting an inexperienced vendor based primarily on cost, failing to involve key stakeholders in requirements gathering, and not following proper software development processes.
3) While software errors directly caused the failure, both LAS management and the developing vendor share responsibility - LAS for unreasonable constraints and vendor selection, and the vendor for taking on a project beyond its capabilities.
The document provides an overview of disaster recovery best practices and examples. It discusses defining recovery objectives, building replication strategies based on those objectives, and maintaining disaster recovery plans through regular testing. Several customer examples are also provided that implemented disaster recovery solutions using a combination of on-premise infrastructure, colocation, and cloud services.
Disaster Recovery Planning: Best Practices, Templates, and ToolsZetta Inc
The document discusses best practices for building an effective disaster recovery (DR) plan. It recommends conducting a business impact analysis to identify critical applications and recovery objectives. A risk assessment should identify infrastructure dependencies and single points of failure to manage risks. DR plans must be tested to ensure they can meet recovery time and point objectives. The presentation then describes how the Zetta cloud backup and DR solution helps customers limit exposure to outages through geographic replication, high availability configurations, and browser-based recovery capabilities.
The document discusses several key steps organizations should take before migrating files to an enterprise content management system (ECM) to ensure a successful implementation. These include conducting a thorough business and systems analysis, preparing stakeholders, analyzing business processes, assessing recordkeeping requirements, preparing for document and email migrations, and building a sustainable security management framework. Taking the necessary time for these activities prior to any file migration is essential for minimizing risks and ensuring adoption of the new ECM system.
Kesha Orr is an IT professional with over 20 years of experience in technical support roles. She has worked for various companies including Home Depot, NTT Data Corporation, KIPP Austin Public Schools, HomeAway, BedandBreakfast.com, and Mental Health Network. Her experience includes desktop support, systems administration, network support, and help desk roles. She is proficient in Windows, networking, virtualization, backup software, and various other technologies. Kesha holds a Bachelor's degree from Texas Tech University and has taken Microsoft certification courses.
This document provides an overview of disaster recovery best practices for data centers as discussed in a VMware guide. It begins with an introduction explaining the importance of disaster recovery planning. It then discusses how virtualization simplifies disaster recovery implementation. The next sections cover how VMware Site Recovery Manager allows for automated, reliable disaster recovery and examples of organizations using it successfully. Common myths about disaster recovery are debunked. The document concludes with the top 10 disaster recovery best practices as shared by VMware customers, including virtualizing, automating plans, regular testing, and being proactive.
Panduit provides physical infrastructure management solutions to address challenges from increasing technology advancements and system interdependencies. Their Physical Infrastructure Manager (PIM) software and PanView iQ hardware together provide real-time monitoring of network connectivity and automation of network tasks to improve reliability, security, and efficiency while reducing costs. Panduit takes a holistic approach to physical infrastructure management through convergence of communication, computing, control, power and security systems.
This file contains the slide presentation from the 2008 Network World IT Roadmap Keynote Address. It contains the concepts and events surrounding the successful disaster recovery of Lagasse IT functions following Hurricane Katrina\'s landfall in 2005.
Vinay Reddy is a senior technology executive seeking a new role. He has over 16 years of experience in system architecture, consulting, networking management, and virtualization. Currently he is Vice President of Technology at Goldman Sachs, where he leads an enterprise system management team and works on monitoring, deployment, and orchestration applications. Previously he held roles at Microsoft India and other companies. He has expertise in areas like Active Directory, networking, System Center, and virtualization.
Business Continuity for Mission Critical ApplicationsDataCore Software
Unplanned interruption events, a.k.a. “disasters,” hit virtually all data centers at one time or another. While the preponderance of annual downtime results from interruptions that have a limited or localized scope of impact, IT planners must also prepare for the possibility of a catastrophic event with a broader geographical footprint.
Such disasters cannot be circumvented simply by using high availability configurations in servers or storage. What is needed, especially for mission-critical applications and databases, are strategies that can help organizations prevail in the wake of “big footprint” disasters, but that can also be implemented in a more limited way in response to interruption events with a more limited impact profile.
DataCore Software’s storage platform provides several capabilities for data protection and disaster recovery that are well-suited to today’s most mission-critical databases and applications.
This document provides a summary of best practices and architecture for California State University data centers. It was created by a task force to identify effective practices based on their collective experience. The document establishes principles for standards-based, cost-effective solutions that ensure reliability, security, performance and environmental sustainability. It describes components of the data center framework including hardware platforms, server virtualization, storage area networks, software and management disciplines.
UAE University selected and deployed an ERP system called Integrated Business Information System (IBIS) while transforming its IT services culture and building an enterprise infrastructure. Key steps included creating a customer support center, selecting SunGard suite for ERP modules, and building a 'unified digital architecture' with segregated environments. The deployment involved addressing legacy systems issues and improving processes, security, and high availability of the new infrastructure.
Hybrid Cloud Orchestration: How SuperChoice Does ItRightScale
This document discusses SuperChoice's hybrid cloud orchestration approach. It summarizes:
- SuperChoice migrated over 200 applications to hybrid clouds using a Cloud Management Platform for orchestration.
- They took a "fix by rebuild" approach to automate deploying entire environments from source scripts.
- Significant challenges included addressing technical debt, cultural change for staff, and ensuring portability across clouds.
- Lessons learned were that automation is critical, people issues are the biggest barrier, and a methodical approach worked best for the transition.
From Nemertes Research: Data center architects need to consider designs that limit complexity and reduce the
possibility of chaotic behavior. Learn more at http://www.juniper.net/us/en/dm/datacenter/
An architacture for modular datacenterJunaid Kabir
This document proposes a new architecture for modular data centers using standard shipping containers. It argues that fully populating shipping containers with thousands of commodity servers and delivering them as ready-to-run modules could significantly reduce data center costs through lower acquisition, deployment, and management costs compared to individual servers. This approach aims to address challenges from the rapid growth of internet services relying on large numbers of inexpensive, commodity servers in data centers.
VMware streamlined its architecture approval process using Troux to close the gap between IT and business. Troux helped operationalize tribal knowledge, improve business understanding of changes, and show how IT aligns with business capabilities. It reduced impact analysis time from 3 weeks to 1.5 weeks. Troux also helped improve governance, reduce risk and non-compliance, and increase mobile access to applications. The initial data collection into Troux required more time than planned to ensure accuracy.
Opportunities and Challenges for Running Scientific Workflows on the Cloud lyingcom
This document discusses opportunities and challenges for running scientific workflows on cloud computing platforms. It begins by introducing cloud computing and scientific workflows. It then describes three main opportunities: 1) increased scale to address larger problems, 2) on-demand resource allocation for improved efficiency, and 3) more flexibility to optimize performance and cost. Several challenges are also outlined, including architectural integration issues, data management difficulties, and the need for cloud-compatible workflow languages and services. The document concludes by proposing research directions to address these challenges and better support scientific workflows in cloud environments.
Self-tuning data centers aim to minimize human intervention through machine learning techniques. Current challenges include meeting service level agreements for performance and uptime while maximizing efficiency of resources and minimizing costs. A self-tuning architecture uses monitoring data to detect issues and make recommendations for scaling, migration, or tuning of resources without human input. This approach aims to optimize data centers so they can scale efficiently to support growing workloads and applications.
This presentation was developed for the 2011 AFCOM Data Center World conference as a case study. It outlines the the decision by one college to not build a new data center and instead develop a strategy to leverage off premise solutions including the Cloud.
This resume summarizes the career of Antoinette (Toni) McTygue, who has over 30 years of experience in enterprise technology solutions architecture and leadership. Some key points:
- She currently works as a Solutions Architect/Director and has held portfolio ownership and leadership roles at companies such as Tech Mahindra and AT&T.
- Her specialties include leadership, remote service management, data center facility configuration, and IT process design.
- Notable achievements include cost savings through contract renegotiation and process improvements, implementing backup power solutions to reduce downtime, and streamlining work request processes.
- She has experience managing teams, projects, and accounts in roles such as Portfolio
Why Your Digital Transformation Strategy Demands Middleware ModernizationVMware Tanzu
Your current middleware platform is costing you more than you think. It wasn't designed to support high-velocity software releases and frequent iteration of applications—prerequisites for success in today’s world. A new, modern approach to middleware is needed that enables both developer productivity and operational efficiency.
Join Pivotal’s Rohit Kelapure and Perficient’s Joel Thimsen as they discuss:
- The limitations of traditional middleware
- The benefits of middleware modernization
- Your options for modernization, including a cloud-native platform
- Tips for overcoming some common challenges
Presenters: Rohit Kelapure, Pivotal, Joel Thimsen, Perficient & Jeff Kelly, Pivotal (Host)
This document is a curriculum vitae for James Barlow Jackson that summarizes his 25 years of IT experience including roles in IT operations management, programme/project management, and programming, analysis and support. It lists his address, contact information, education history, and provides a high-level overview of his experience delivering large-scale IT projects for various public sector and private companies. Recent roles included project management positions at Walgreen Boots Alliance, Wilkinson Hardware Stores, and Nationwide Building Society.
Horizon Data Center Solutions provides secure, stable and scalable IT infrastructure as a service (IaaS) provider. It operates three tier III data centers with redundant power and networking. Horizon was the first IaaS provider to receive Authority to Operate from the US government, demonstrating its data security and compliance with standards like SAS 70 and NIST 800-53. It offers infrastructure as a service, including compute, storage and networking resources that are customized and can scale easily for customer needs.
The document discusses consolidating messaging and groupware platforms to reduce costs and complexity. It recommends consolidating platforms onto IBM Lotus Domino, which is scalable and flexible. It provides a 5-step process for consolidation: 1) define desired services, 2) requirements and standards, 3) infrastructure architecture, 4) build new environment, 5) transition to new environment. Experience architects and a solid project plan are important for a successful consolidation.
VMworld 2013: Exploring Technology Trends within Financial Services VMworld
VMworld 2013
Scott Key, VMware
Brian Martinez, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
David Pate is an experienced IT support professional with over 20 years of experience supporting multi-platform production environments across UNIX, Linux, mainframe and Windows. He has extensive experience administering enterprise applications and ensuring software availability, integrity and security. Pate is proficient in customer service and effective communication to understand user needs and translate them into application functionality. He currently works as a Tier 1 support associate for FleetCor Technologies monitoring systems and coordinating resources to restore stability.
Neha Bhatia is a System Administrator with over 3 years of experience in IT. She has a B.Tech in Information Technology from Kurukshetra University. She is seeking a position that allows her to build an innovative career using her skills and talents.
She has experience working as a System Administrator at IBM India, Tata Consultancy Services, and currently at Ericsson Global India Services Ltd. Her technical skills include Windows Server, Active Directory, DHCP, DNS, Citrix, and SCCM. She also has experience troubleshooting server and network performance issues.
Neha has ITIL and MCP certifications. She is proficient in English and has strong communication and relationship building skills.
Facts, Trends and Cloud Solutions, Realities and Infrastructure. A high-level view to the Cloud and its advantages for customer s and companies. Trends and Market
Similar to Addressing IT Services at Lamar University (20)
This document outlines 3 mini-lectures for an educational leadership program's week 5 web services course: Mini-Lecture 1 discusses site launch, Mini-Lecture 2 covers post launch site development, and Mini-Lecture 3 provides a conclusion to the week's topics on web services.
This document outlines 3 mini-lectures on web services for an M.Ed. program week 4 course: the first lecture discusses creating interactivity, the second focuses on social networking, and the third covers data gathering.
This document outlines 4 mini-lectures on web services for an M.Ed. program's week 3 on topics including assessing web site content in the first lecture, producing content in the second, search engine optimization in the third, and content management in the fourth.
This document outlines mini-lectures for an M.Ed program's web services course, including project management, project planning and scoping, information architecture, and site design principles, with each topic covered in its own mini-lecture.
This document provides an overview of 4 mini-lectures on web services and 21st century learning for an M.Ed. program. The mini-lectures cover an introduction to web services, 21st century learning, shaping 21st century learning, and using Web 2.0 tools.
BCC Webmaster Certification Program Syllabus (Spring 1999)Michael Dobe, Ph.D.
This document outlines the syllabus for a 90-hour Webmaster certification course offered by Brookdale Community College in Spring 1999. The course covers topics such as HTML, web design, web server installation and management using Windows and Linux, client-side and server-side web programming, web databases, security, and performance tuning. Students will complete a class project building a website for the Jersey Coast Chapter of the American Red Cross. The course consists of 30 three-hour sessions on Thursday and Saturday evenings from February to May.
The document discusses an organization's journey to implement an e-learning management system (eLMS) to improve student learning outcomes. It began with a Google Drive document repository that was populated with course files over three semesters. It also provided Blackboard course shells. A decision point was reached where a more scalable, cost-effective solution was needed. A collaborative process to define needs and strategic goals for a phase two eLMS was outlined. The goal was to select a system that measures student performance and enables proactive faculty intervention.
This document is about a gala dinner celebrating educators hosted by International Horizons College on October 26, 2013. The dinner welcome was given by Dr. Michael E. Dobe, Sr., the president of International Horizons College. The main themes of the event were educating to end poverty and promoting International Horizons College.
The document outlines International Horizons College's 2+2 transfer program which allows students to complete an associate's degree and then transfer to complete their bachelor's degree at an elite US university. It introduces the college's president, discusses the liberal arts pathway model and individual academic plans, and highlights the benefits of ongoing counseling to help students prepare for transfer. It also introduces the college's partner institution in California for the transfer portion of the program.
The document discusses an event called GITEX 2013 which featured a teaching of American history using a global classroom technology. The global classroom allowed for lecture capture and streaming of presentations on topics like cotton gins, armories, and automobiles in Dubai. Students could discuss topics on Facebook and view complete slide presentations on SkyDrive. The event demonstrated technology like Polycom Eagle Eye Director and encouraged those curious to learn more about the IHC global classroom.
International Horizons College Dubai is hosting its 1st annual charity Gala Dinner on October 26, 2013 to support Dubai Cares. The gala dinner program includes welcome addresses by Dr. Michael Dobe, President of IHC Dubai and Ziad Azaam, CEO of Taaleem and Founding Partner of IHC Dubai. There will also be a speech by Ali Al Saloom of Ask-ali.com followed by dinner. The event is part of IHC's Education Summit 2013 and will take place at International Horizons College Dubai located on the 42nd floor of the U Bora Tower in Business Bay, Dubai.
International Horizons College Dubai is hosting the IHC Education Summit 2013 on October 26-27 at their campus. The summit will feature workshops led by speakers from prestigious US universities such as UC Berkeley and Rutgers University, as well as experienced academics and education professionals. The workshops will cover innovations and best practices in education and be aimed at high school counselors from the Middle East, North Africa, and South Asia region. Attendees will have opportunities to learn from leaders in the education field and network with their peers.
RealPresence video conferencing software is now available for Mac computers, addressing past limitations. While RealPresence faces some restrictions for cellular video calls without a VPN, alternative services like Blue Jeans offer robust iOS support but lack an Android client. CloudAXIS video conferencing integrated with Google Apps allows connections to services like Skype and Google+ without additional usernames and passwords when using the Polycom bridge hosted by FVC.
International Horizons College (IHC) is a new American honors college located in Dubai that provides students an American education through innovative use of technology. IHC uses cloud computing and managed services extensively to enable a "campus in the sky" where students can access materials from anywhere. Key initiatives include the Global Classroom, which connects students in Dubai and California through high-definition videoconferencing. IHC partners with du Telecom to provide reliable infrastructure and managed services like videoconferencing and caching, allowing the college to operate without on-site servers and scale easily as it grows.
This document outlines a faculty development plan for collaborative learning at IHC for the 2013/14 academic year. It discusses establishing a baseline for best teaching practices using active learning strategies and ongoing instructor evaluations. Resources for faculty development include an online workbook, technology support, and training in instructional design. Faculty are expected to submit professional development plans outlining their courses, teaching methods, use of technology, and goals for the year.
The document outlines an instructional technology support model for a university. It describes standardized technologies including managed cloud services through Google Apps and Du Network, and Apple MacBooks for students, faculty, and staff. Support includes a full-time technology support person, education sessions, and an online service desk. Key resources are a Media:Scape collaboration suite, science lab equipment, a global classroom for videoconferencing and recording lectures, and a media production room. The goal is to provide high-touch support both in and outside the classroom to promote academic uses of technology.
Academic Course Files at IHC are moving towards digital documentation for accreditation. First steps include converting MS Word documents to Google format and creating templates for course outlines and syllabi in Google Docs. Instructors will create syllabi from templates and share PDF versions with students via Google Drive. The goal is a comprehensive Google Drive repository containing course files like outlines, syllabi, and instructor reviews for continuous improvement.
The document outlines International Horizons College's TV program plan for the 2013-14 academic year. The plan includes three tracks: one-on-one interviews with business and government leaders in a studio format; a monthly Wednesday Leadership Series featuring speakers streamed live globally; and presentations in the meeting hall by external parties. The objectives are to actively involve students in learning, utilize faculty expertise, strengthen the business concentration, and create content to promote the school.
The document lists the first 5 job postings on ItsAcademic.ca, including positions for Biology, Math, Counselling/Psychology, and English college professors as well as the Director of Marketing for a newly founded college. It also mentions sharing the postings on ItsAcademic.ca's Twitter feed and in LinkedIn news feeds and archives.
International Horizons College selected an all-SaaS cloud-based IT infrastructure with no servers to create a cost-effective and agile learning environment. This included networking, hardware, and education applications provided as managed services by du. The cloud-based model with Google Apps, video conferencing, and a mobile-first approach allows for powerful collaboration between students and faculty both on-campus and remotely. Choosing SaaS avoided the high costs and complexity of maintaining physical infrastructure, while still providing state-of-the-art learning technology.
The simplified electron and muon model, Oscillating Spacetime: The Foundation...RitikBhardwaj56
Discover the Simplified Electron and Muon Model: A New Wave-Based Approach to Understanding Particles delves into a groundbreaking theory that presents electrons and muons as rotating soliton waves within oscillating spacetime. Geared towards students, researchers, and science buffs, this book breaks down complex ideas into simple explanations. It covers topics such as electron waves, temporal dynamics, and the implications of this model on particle physics. With clear illustrations and easy-to-follow explanations, readers will gain a new outlook on the universe's fundamental nature.
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...PECB
Denis is a dynamic and results-driven Chief Information Officer (CIO) with a distinguished career spanning information systems analysis and technical project management. With a proven track record of spearheading the design and delivery of cutting-edge Information Management solutions, he has consistently elevated business operations, streamlined reporting functions, and maximized process efficiency.
Certified as an ISO/IEC 27001: Information Security Management Systems (ISMS) Lead Implementer, Data Protection Officer, and Cyber Risks Analyst, Denis brings a heightened focus on data security, privacy, and cyber resilience to every endeavor.
His expertise extends across a diverse spectrum of reporting, database, and web development applications, underpinned by an exceptional grasp of data storage and virtualization technologies. His proficiency in application testing, database administration, and data cleansing ensures seamless execution of complex projects.
What sets Denis apart is his comprehensive understanding of Business and Systems Analysis technologies, honed through involvement in all phases of the Software Development Lifecycle (SDLC). From meticulous requirements gathering to precise analysis, innovative design, rigorous development, thorough testing, and successful implementation, he has consistently delivered exceptional results.
Throughout his career, he has taken on multifaceted roles, from leading technical project management teams to owning solutions that drive operational excellence. His conscientious and proactive approach is unwavering, whether he is working independently or collaboratively within a team. His ability to connect with colleagues on a personal level underscores his commitment to fostering a harmonious and productive workplace environment.
Date: May 29, 2024
Tags: Information Security, ISO/IEC 27001, ISO/IEC 42001, Artificial Intelligence, GDPR
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
General Data Protection Regulation (GDPR) - Training Courses - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
Executive Directors Chat Leveraging AI for Diversity, Equity, and InclusionTechSoup
Let’s explore the intersection of technology and equity in the final session of our DEI series. Discover how AI tools, like ChatGPT, can be used to support and enhance your nonprofit's DEI initiatives. Participants will gain insights into practical AI applications and get tips for leveraging technology to advance their DEI goals.
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
বাংলাদেশের অর্থনৈতিক সমীক্ষা ২০২৪ [Bangladesh Economic Review 2024 Bangla.pdf] কম্পিউটার , ট্যাব ও স্মার্ট ফোন ভার্সন সহ সম্পূর্ণ বাংলা ই-বুক বা pdf বই " সুচিপত্র ...বুকমার্ক মেনু 🔖 ও হাইপার লিংক মেনু 📝👆 যুক্ত ..
আমাদের সবার জন্য খুব খুব গুরুত্বপূর্ণ একটি বই ..বিসিএস, ব্যাংক, ইউনিভার্সিটি ভর্তি ও যে কোন প্রতিযোগিতা মূলক পরীক্ষার জন্য এর খুব ইম্পরট্যান্ট একটি বিষয় ...তাছাড়া বাংলাদেশের সাম্প্রতিক যে কোন ডাটা বা তথ্য এই বইতে পাবেন ...
তাই একজন নাগরিক হিসাবে এই তথ্য গুলো আপনার জানা প্রয়োজন ...।
বিসিএস ও ব্যাংক এর লিখিত পরীক্ষা ...+এছাড়া মাধ্যমিক ও উচ্চমাধ্যমিকের স্টুডেন্টদের জন্য অনেক কাজে আসবে ...
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
2. LU ITS Response to TSUS IT Auditor
¨ IDENTIFIED RISKS AND RISK SYMPTOMS
¨ Risk Symptoms Raising Security Concerns
¨ Risk to University Reputation
3. IDENTIFIED RISKS AND RISK SYMPTOMS
“Data Center resource constraints and critical path
requirements prevent effective management of internal
IT operations and risk management of other defined
University priorities and initiatives (such as the Banner
implementation, online curriculum, and fund-raising
efforts)* as evidenced by the following risk symptoms”
- TSUS Office of Audits and Analysis
(Required Communication with Lamar University)
*Emphasis Added
4. ITS Clarifications on Data Center
Constraints and Online Curriculum
¨ Data Center Constraints at LU are have not been a
constraint for Online Curriculum for an entire
academic year.
¤ Blackboard has been hosted offsite by Blackboard
since Summer ‘08.
¤ GoCourse is hosted in Dallas by HEH and has always
been.
5. ITS Clarifications on Data Center
Constraints and Advancement
¨ Data Center Constraints at LU will soon no longer
be a constraint for University Advancement.
¤ LU has signed a contract to host both Millennium and
MIP Accounting offsite with the software maker Sage
Software.
6.
7.
8. ITS Clarifications on Data Center
Constraints and Banner
¨ To Ensure Banner Success, Data Center
Consolidation and Operating Environment
Standardization Must Continue …
9.
10. Delays In: Retiring legacy systems?
ITS Response:
¨ IBM Systems Deprecated (3 Racks of Hardware)
¨ Legacy Cisco Firewalls Deprecated and Replaced with State-of the-Art Fortinet Firewalls
¨ End-of-Life Hardware Removed and Systems Virtualized (MSS Help Desk and Three Legacy
Evisions MAPS Servers)
¨ All Remaining Legacy Systems are Slated for Virutalization With Deprecation to Follow
¨ Virtual Readiness Assessment (VRA) in Process to Identify Other Systems for Virtualization
¨ Luminis Portal, Recruitment Plus, Millienium, MIP Accounting All Moving to Off Site Hosting
(Provided by Software Manufacturers)
¨ Plus System Deprecation Scheduled EoY 2009 (Currently a Production System for Student
Records)
¨ Director, EAI Has Mapped All Application Relationships and Systems Dependencies to Reduce
Risk Related to Plus-Banner Migration
12. Delays In: Engineering/reducing the
number of operating environments?
ITS Response:
¨ 2 Standard Operating Environments Selected: Red Hat Enterprise Linux
(RHEL) and MS Windows
¨ Deprecated
¤ AIX (Legacy Banner Plaform)
¤ SUSE Linux (DNS)
¨ By EoY 2009
¤ Will Deprecate VMS (Plus System)
¤ Will Virtualize Sun Systems for SACS
¤ Migrate File Services from Single Mac Server
¨ CONTINUED RISK: Number of Systems Not Managed By ITS
¤ Distance Education
¤ Library
¤ Departmental Servers
13. Delays In: Engineering a multi-tiered
Enterprise IT architecture?
ITS Response:
¨ Banner ERP: Oracle Database Clustering RAC has
been successfully implemented, along with
redundant load balancers (F5) for the application
tier
¨ New Firewalls are Redundant (Active-Active)
¨ Virtualization Accomplished via High Availability
Architecture
¨ All New Initiatives Following Zachman Architectural
Framework (Staff Training Included)
17. Delays In: Engineering an IT Security architecture accommodating
the re- engineered architecture mentioned above (Firewalls, DMZ,
DNS, DHCP, Active Directory, WSUS, etc.)?
ITS Response:
¨ New Firewalls (Active-Active) Established Allowing Full Network
Segmentation (DMZ + LAN Segmentation)
¨ DNS Migrated From Single Point of Failure on Non-Standard IBM
SuSE Linux to Fully Redundant Standard RHEL Servers
¨ DHCP Consolidation Underway
¨ New Active Directory Established Following MS Best Practices
(College of Business Migration to New Domain Architecture
Underway)
¨ WSUS Server Established.
¨ Microsoft Premier Support Contract Established.
19. Delays In: Establishing a security policy and
functioning security program?
ITS Response:
¨ ITS Participation in Bi-Weekly President’s Security
Meeting to Brief Campus Leadership on Current Security
Issues
¨ Organizing IT Security Analysts into Best Practices-Driven
Security Operations Center (SOC)
¨ Staff currently updating security policy based on SANS
Institute Guidelines and verifying compliance with TAC 202
¨ End User Licensing Agreement for Wireless Networking
¨ Revised AUP under development
20. Delays In: Updating system documentation
including policy/procedure
ITS Response:
¨ Need Further Clarification, As Systems
Documentation Exists on ITS Departmental Fileshares
¨ Numerous Procedures Exist for Various IT Processes.
Need Further Clarification as to Deficiencies.
22. Delays In: Re-designing comprehensive
Disaster Recovery IT procedures
ITS Response:
¨ Disaster Recovery Plans are Interative in Nature, Requiring Constant
Refining as They are Exercised
¨ Disaster Recovery Plan Coordinator Appointed (John Genuardi)
¨ DRP Coordinator Currently Documenting Procedures in Anticipation
of Next Hurricane Season
¨ Duplicate of Critical Systems (Servers, Networking and Firewalls) in
Place in San Marcos Data Center to Support ERP and Reporting
Environment
¨ ITS to Present Proposal for Automation of Systems Replication in
Early April 2009 (Significant Cost Item: Approximately $500,000)
23. Delays In: Designing comprehensive
Business Continuity (non-IT) procedures
ITS Response:
¨ Beyond Scope of ITS
24. Delays In: TAC 202 compliance
ITS Response:
¨ Need Further Clarification. TAC 202 is Large.
25. Delays In: Resolving staffing concerns
and competencies
ITS Response:
¨ ITS is Realigning Resources to Address Staff
Competency Issues, Though Additional Clarity on
Auditor’s Concerns Could Be Helpful
¨ Additional Resources From SGHE Retained to
Augment Critical Areas With Major Deficiencies,
Espcially in Banner Area
26. Next Steps in Enterprise Applications
(Organizational Changes)
27. Power consumption not being monitored to assist in
critical mass bottleneck decision-making processes
ITS Response:
¨ In the Process of Collecting Bids for Complete Data
Center Re-Engineering Project (Significant Expenditure
Anticipated: $500,000)
¨ End-to-End Power Generation and Provision System
Tested on a Quarterly Basis
¨ Fail-Over Simulation During Winter Break: Yielded
Confirmation of Successful Outcome
¨ Substantial Decrease in Load on Data Center Power As
a Result of Current Deprecation, Virtualization, and Off
Site Hosting Efforts
28. Self-identified (QAT) and reported concerns that:
Network bandwidth may not be sufficient to support
Banner resource requirements
ITS Response:
¨ LEARN Connectivity Project (Network, Firewalls and
Packet Shapers) Addresses Connectivity Issues
29. Self-identified (QAT) and reported concerns that: Data
base capacity may not be sufficient for student
conversion
ITS Response:
¨ Student Conversion Underway With No Data Base
Capacity Issues
¨ Additional Capacity to Be Added to SAN to
Address Future Growth – to Include HEH Programs
and Centralized Enterprise-wide Scanning via
Banner XTender (Moderate Cost Item: $200,000)
30. Self-identified (QAT) and reported concerns that: Engineered
reporting infrastructure does not meet LU’s needs
ITS Response:
¨ SGHE working with LU to Implement Operational
Data Store (ODS) in 2009.
31. Necessity to allow and rely on non-centralized
custodianship and administration of distributed satellite
data centers and servers across campus
ITS Response:
¨ Three racks have been removed and a fourth is in the process
of removal.
¨ Further consolidation of data centers is now subject to political
and not a physical constraints.
¨ Progress to date includes work with College of Business in
which critical systems have been relocated to the Data Center
(only systems remaining in CoB are there for performance
reasons – need for physical proximity)
32. Unsecured satellite network closet
doubling as general storage room
ITS Response:
¨ Need further clarification as to location of this
network closet
¨ Continued Risk: Some Data Closets are outside
the control of ITS, and administered by various
Information Technology Specialists (unclear as to
the scope of their functions)
33. Risk Symptoms Raising Security Concerns
“Current operational transition activities and lack of
unified approach will continue to prevent Lamar
University from addressing long-standing and immediate
security concerns as evidenced by the following risk
symptoms”
34. Disrupted, dismantled, or otherwise inadequate internal
control framework (which must be addressed before
any outsourcing strategy can be successful)
ITS Response:
¨ Initial Change Management Procedures in Place for the First
Time in IT Services
¨ Estabished Regular Maintenance Window
¨ Established Enterprise Maintenance Calendar, Coordinated
With Academic and Administrative Calendars
¨ Established Enterprise Service Desk
¨ Beginning to Adopt ITIL Model
¨ Security Staff Has Been Introduced to COBIT
¨ ITS to Recommend New Service Desk Software ($35K)
35. Unreliability and instability of “My.Lamar” portal, in addition to
significant modifications (known and unknown) regarding
security and access authentication processes
ITS Response:
¨ Moving to Hosted Solution for Portal
¨ LDAP Implementation in 2009 to Address
Authentication
36. No standardized change control
process or methodology
ITS Response:
¨ Initial Change Management Procedures in Place for the
First Time in IT Services
¨ Estabished Regular Maintenance Window
¨ Established Enterprise Maintenance Calendar,
Coordinated With Academic and Administrative
Calendars
¨ Established Enterprise Service Desk
¨ Beginning to Adopt ITIL Model
¨ ITS to Recommend New Service Desk Software
37. No security policy or established
security program
ITS Response:
¨ Inaccurate, as there is a fledgling IT security
program anchored in the President’s Bi-Weekly
Security Meeting
38. No security awareness training for
campus constituents
ITS Response:
¨ Further Clarification Needed
39. Lack of standardized computer “image” and
specifications for desktop/server purchases and
deployments
ITS Response:
¨ Currently Being Address Through Vendor Premier
Desktop Program
¨ Computer Lifecycle to Be Determined by Executive
Leadership
¨ Exploring “Thin Client” Technology (Citrix?)
40. ITS Believes TSUS IT Auditor’s Calls for the
Following Violate Academic Freedom
¨ “Approved Software” Policy
¨ “Audit” of software residing on users’ computers
¨ “Audit” of administrative privileges on users’
computers
¨ “File-Sharing” Software Policy
41. Lack of “approved software” policy
ITS Response:
¨ Considerations of Academic Freedom Prohibit This
42. Inability to “audit” software residing
on users’ computers
ITS Response:
¨ Considerations of Academic Freedom Prohibit This
43. Inability to “audit” administrative
privileges on users’ computers
ITS Response:
¨ Considerations of Academic Freedom Prohibit This
44. Lack of “file-sharing” software policy
ITS Response:
¨ Considerations of Academic Freedom Prohibit This
45. Recent EDI server compromise during
Admissions implementation
ITS Response:
¨ IT Services for this functional area have been moved
to a secure hosted solution
¨ Existing staff member transitioning to role more
appropriate to IT skill level
46. The lack of itemized detailed costs related to the Banner implementation
Excerpt from QAT report submitted to state as of August 31, 2008
Project Item Report to Date
Initial $4,105,900.00
Estimated Project Cost
Last Reported $4,105,900.00
Estimated Project Cost
Current $4,805,900.00
Estimated Project Cost Notes: Includes all funding sources
Includes optional consulting fees to be used as needed
Explanation of Variance • Contract for additional SunGard resources: Student Lead and remote
between Last Reported and programming support
Current Project Cost
• Creation of Business Analyst Positions
Cost Expenditures to Date $1,394,186.00
(Fiscal Year) (Project-To-Date: $2,840,361.00)
Description of Expenditures will be posted to the SunGard Banner Finance system used by Lamar
Cost Tracking Mechanism University. These expenditures will be extracted and monitored using MS Excel.
Expenditures will be verified against vendor invoices and project estimates.
47. Expenditures, Encumbrances, and Budget
Adjustments (Since August 2008)
¨ Expenditures Sept1, 2008 – Mar 17, 2009: $1,277,578.30
¨ Outstanding Encumbrances: $ 374,797.04
¨ Budget Adjustments after September 1, 2008:
¤ BossCars Software $ 92,074.00
(included in ots enc)
¤ Oracle License True-Up (increase in headcount) $ 188,551.00
(included in expend.)
48. Incomplete or inadequate Disaster Recovery (IT) and
Business Continuity (non-IT) documentation and processes
during/after the transition period
ITS Response:
¨ Staff members responsible for this item no longer
work for University
¨ New staff member has this as Priority Issue
¨ ITS addressing disaster recovery for computing
services within context of university business
continuity planning
49. Risk to University Reputation
“In the event of another security breach or incident, the
risk of public criticism and potential liability for Lamar
University will significantly increase because there is a
4-year public record of identified, documented, and
unresolved consultant and audit findings to date:”
50. IT Response: Bottom Line Up Front
18 Months of Consistent Progress
Bottom Line: We Are Implementing Best Practices for
Infrastructure and Security. These Practices Include, But Are
Not Limited to:
¨ Standardized, Redundant and High Availibilty Systems
¨ Multi-Tiered Security Architecture
¨ New Firewalls – Dorms, Datacenter, Perimeter (Allowing Network
Segmentation and Demilitarized Zone)
¨ Antivirus – Clients and Servers (Identifying Unprotected Systems)
¨ Data Center Improvements Within Fiscal Limitations
¨ Integrated End-To-End Power System Fail-Over Testing
¨ Virtualizing Operating Environments
¨ Adoption of Software as a Service (SaaS) Model Where
Appropriate To Improve Service and Reduce Risk
51. Audit Documents Referenced
(Welcoming a New CIO: July 2005 – September 2007)
¨ Information Technology Consultant’s Report (July
2005)
¨ Report to Management on Review of Information
Technology – Lamar University (August 2007)
¨ Network Security Controlled Penetration Test Report
(August 2007)
¨ Internal Correspondence: Office of the Director of
Network Services and IT Strategic Planning; subject:
Findings from DIR Penetration Test (September
2007)
52. Audit Documents Referenced
(ITS Transformations: April – November 2008)
¨ TSUS Management Advisory Letter dated April 14,
2008
¨ TSUS Management Advisory Letter dated July 18,
2008
¨ The July 2008 letter to Lamar State College-Port Arthur
outlining a breach of Lamar University’s system
¨ Report to Management on Audit of Research Time and
Effort Reporting – Lamar University (August 2008)
¨ Texas Project Delivery Framework Monitoring Report
[LEAP System Upgrade for ERP] (November 17, 2008)
53. Audit Documents Referenced
(Today’s Challenge: Banner Student Jeopardy 2009)
¨ Email dated January 12, 2009 citing the failure to
process Fall 2009 admissions applications in Banner
and 10 MONTH DELAY in implementation
¨ SunGard Higher Education Draft Executive
Summary: Lamar University – Programming Team
and Banner Technical Support Assessment (January
21, 2009)