SlideShare a Scribd company logo
Information Technology
Charlie Stevenson
IT DEPARTMENT
What’s the IT department at IMS do? Who does it serve? Who helps out?
My Role
Responsible for planning, implementation,
security, and management of multiple
information and communications systems and
projects, including voice, data, imaging, Internet,
and office automation. Develop annual
departmental budgets and corporate IT policies
and procedures. Provide technical support and
training at all levels of the organization.
People I Serve
• Board of Directors
• Founders
• Guests
• Staff
• Teachers
• Volunteers
• Customers (aka Yogis )
Outside Help & Services
Eric Woudenberg – Dharma Seed
Geof Karlson – Yogi Enhanced System (YES)
Mark Pirani – Electrician
•Expert Laser Services (copiers)
•Charter Business (voice & Internet)
•Rapid7 (Nexpose)
•Gravity Switch (website)
•Prevco Audio (sound systems)
•CCB Nonprofits (software)
•Citrix (XenServer)
•Orange Oil (air conditioners)
•Dell (servers)
•Provantage (equipment)
Over 60 vendor/service providers including:
WHAT YOU SEE
The visible and tangible aspects of IMS IT
What you see: stuff
• Laptop & desktop computers, iPads, etc
• Copiers, fax machines, scanners, printers, labelers
• Credit card readers
• Hearing devices, microphones, amplifiers,
recording equipment
• Cameras, televisions, CD/DVD players, projectors
• Conference phones, desktop phones, cell phones,
helpdesk “red” phones, etc
What you see: website
WHAT YOU DON’T SEE
The invisible and/or intangible aspects of IMS IT
What You Don’t See
• Astounding layers of complexity
• Vast array of hardware, software and technical
standards & protocols to study and master
• Anticipating obsolescence/adoption of new
technologies
– rate of technological innovation leading to
dramatically short lifespan of assets and
investments in hardware, software, web presence,
data formats, storage resources, etc
TIP OF THE ICEBERG
How much are we talking about here?
By the numbers
• 15 wireless access points
• 2 VPN firewall routers
• 2 dharma talk recorders
• 4 fiber media converters
• 2 air conditioners
• 6 microphones, 2
amplifiers, 2 equalizers, 2
FM transmitters for dharma
hall wireless headsets
• 2 phone and voicemail
systems
• 2 photo copiers
• Fax machines, digital
cameras, video recorder,
etc..
• 23 telephone lines
• 2 locked fireproof storage
boxes
• Phones: 6 cell, 2
conference, 7 emergency,
40 system, 2 helpdesk “red”
phones
By the numbers
• 6 external drives, 2 network
attached storage (NAS), 2
storage area networks (SAN)
• 37 desktop and laptop
computers
• 20 servers
• 48 displays
• 25 network switches
• 26 print devices
• 39 battery backups
• ~11 different operating systems
• ~15 programming languages
• ~100 username and passwords
for internal systems, vendor
websites, etc
• Central anti-virus & software
management for all servers and
computers
• ~26,500 lines of code for online
registration and donation etc
• ~300,000 lines of code under
the hood in YES
• Death by acronym:
– DNS, DHCP, LDAP/AD, DFS,
HTTPS, MySQL, MS SQL,
Subversion, SSH, SAMBA, iSCSI,
VLAN, NTP, GPO, MSI, VNC,
WSUS, ODBC, IIS, SMTP, POP3,
IMAP, ARP, WPA2
• Myriad cyber threat vectors
monitored with Nexpose etc
PICTURE IT
My eyes just glazed over can you show me a picture?
Physical Inventory
* Entire inventory not depicted due to space constraints
Can you help me visualize IMS IT from another angle?
VISUALIZE IT
GLIMPSING COMPLEXITY
How do technologies intersect creating challenges for IMS IT?
Case study: Retreat Support
What’s needed?
A system that provides on-call help for yogis
after normal operating hours
• Needs to be easy to use
• Needs to be reliable
• Needs to be flexible—given time-off schedule
for respondents (aka retreat support fellows)
Case study: Retreat Support
• Red desk telephone
• No buttons
• Dials immediately when receiver lifted
• Calls Google Voice number
• Google Voice rings one or both
cell phones
Case study: Retreat Support
• Rugged cellphone + GPS
• Operates in all
conditions
• Clear audio
• 6 hours of talk time
• Rings when red phone
received lifted
• Receives notifications
for missed calls
Case study: Retreat Support
Case study: Retreat Support
Case study: Retreat Support
LOOKING AHEAD
Roadmap (Future Planning and
Investment)
• Yogi Enhanced System (YES)
– succession plan for ongoing enhancements and
maintenance of our mission critical database
application as Geof Karlson moves towards
retirement
– forward migration planning
• Upgrading obsolete wiring at Retreat Center
Questions?

More Related Content

What's hot

Mca Erg Oct 09
Mca Erg Oct 09Mca Erg Oct 09
Mca Erg Oct 09
Donald Tabone
 
DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NO...
DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NO...DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NO...
DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NO...
Andris Soroka
 
Selling to The IT Department
Selling to The IT DepartmentSelling to The IT Department
Selling to The IT Department
3VR Inc.
 
Hem infotech company profile
Hem infotech  company profileHem infotech  company profile
Hem infotech company profile
Hem Infotech
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
kimsflair
 
Wilmer CV
Wilmer CVWilmer CV
Wilmer CV
lance lloren
 
SanerNow Endpoint Management
SanerNow Endpoint ManagementSanerNow Endpoint Management
SanerNow Endpoint Management
SecPod Technologies
 
It4 Coursework Help
It4 Coursework HelpIt4 Coursework Help
It4 Coursework Help
JTHSICT
 
STEVEN BROWN (1)
STEVEN BROWN (1)STEVEN BROWN (1)
STEVEN BROWN (1)
Steven Brown
 
Desktop Support Specialist
Desktop Support SpecialistDesktop Support Specialist
Desktop Support Specialist
Sandy Klein
 
The ways in which ict is used
The ways in which ict is usedThe ways in which ict is used
The ways in which ict is used
gracepm28
 
BYOD and your favourite ITSM solution
BYOD and your favourite ITSM solutionBYOD and your favourite ITSM solution
BYOD and your favourite ITSM solution
Marko Ruusinen
 
Voxeo Summit Day 1 - Communications-enabled Business Processes (CEBP)
Voxeo Summit Day 1 - Communications-enabled Business Processes (CEBP)Voxeo Summit Day 1 - Communications-enabled Business Processes (CEBP)
Voxeo Summit Day 1 - Communications-enabled Business Processes (CEBP)
Voxeo Corp
 
Sandeep saini
Sandeep sainiSandeep saini
Sandeep saini
Sandeep Saini
 
William Schnatz Resume I
William Schnatz Resume IWilliam Schnatz Resume I
William Schnatz Resume I
William Schnatz
 
Coffee on Kaseya: Indianapolis-Area IT Systems Management Session
Coffee on Kaseya: Indianapolis-Area IT Systems Management SessionCoffee on Kaseya: Indianapolis-Area IT Systems Management Session
Coffee on Kaseya: Indianapolis-Area IT Systems Management Session
Kaseya
 
ppt
pptppt
Network technologies ict gr10 pp
Network technologies ict gr10 ppNetwork technologies ict gr10 pp
Network technologies ict gr10 pp
Junique Wepener
 
Computer_Specialsit_2016
Computer_Specialsit_2016Computer_Specialsit_2016
Computer_Specialsit_2016
Sandy Klein
 
Howard Plotnicov Resume_2016
Howard Plotnicov Resume_2016 Howard Plotnicov Resume_2016
Howard Plotnicov Resume_2016
Howard Plotnicov
 

What's hot (20)

Mca Erg Oct 09
Mca Erg Oct 09Mca Erg Oct 09
Mca Erg Oct 09
 
DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NO...
DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NO...DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NO...
DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NO...
 
Selling to The IT Department
Selling to The IT DepartmentSelling to The IT Department
Selling to The IT Department
 
Hem infotech company profile
Hem infotech  company profileHem infotech  company profile
Hem infotech company profile
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Wilmer CV
Wilmer CVWilmer CV
Wilmer CV
 
SanerNow Endpoint Management
SanerNow Endpoint ManagementSanerNow Endpoint Management
SanerNow Endpoint Management
 
It4 Coursework Help
It4 Coursework HelpIt4 Coursework Help
It4 Coursework Help
 
STEVEN BROWN (1)
STEVEN BROWN (1)STEVEN BROWN (1)
STEVEN BROWN (1)
 
Desktop Support Specialist
Desktop Support SpecialistDesktop Support Specialist
Desktop Support Specialist
 
The ways in which ict is used
The ways in which ict is usedThe ways in which ict is used
The ways in which ict is used
 
BYOD and your favourite ITSM solution
BYOD and your favourite ITSM solutionBYOD and your favourite ITSM solution
BYOD and your favourite ITSM solution
 
Voxeo Summit Day 1 - Communications-enabled Business Processes (CEBP)
Voxeo Summit Day 1 - Communications-enabled Business Processes (CEBP)Voxeo Summit Day 1 - Communications-enabled Business Processes (CEBP)
Voxeo Summit Day 1 - Communications-enabled Business Processes (CEBP)
 
Sandeep saini
Sandeep sainiSandeep saini
Sandeep saini
 
William Schnatz Resume I
William Schnatz Resume IWilliam Schnatz Resume I
William Schnatz Resume I
 
Coffee on Kaseya: Indianapolis-Area IT Systems Management Session
Coffee on Kaseya: Indianapolis-Area IT Systems Management SessionCoffee on Kaseya: Indianapolis-Area IT Systems Management Session
Coffee on Kaseya: Indianapolis-Area IT Systems Management Session
 
ppt
pptppt
ppt
 
Network technologies ict gr10 pp
Network technologies ict gr10 ppNetwork technologies ict gr10 pp
Network technologies ict gr10 pp
 
Computer_Specialsit_2016
Computer_Specialsit_2016Computer_Specialsit_2016
Computer_Specialsit_2016
 
Howard Plotnicov Resume_2016
Howard Plotnicov Resume_2016 Howard Plotnicov Resume_2016
Howard Plotnicov Resume_2016
 

Viewers also liked

Ericsson
EricssonEricsson
Ericsson
Shumail Tariq
 
Ims architecture white_paper
Ims architecture white_paperIms architecture white_paper
Ims architecture white_paper
Prashant Sengar
 
8 the path to voice over lte - vo lte
8 the path to voice over lte - vo lte8 the path to voice over lte - vo lte
8 the path to voice over lte - vo lte
CPqD
 
4G Technology
4G Technology4G Technology
4G Technology
Ritu Bafna
 
IMS IP multimedia subsystem presentation
IMS IP multimedia subsystem presentationIMS IP multimedia subsystem presentation
IMS IP multimedia subsystem presentation
Waldir R. Pires Jr
 
Generation of mobile communication systems
Generation of mobile communication systemsGeneration of mobile communication systems
Generation of mobile communication systems
jincy-a
 
Presentation on 1G/2G/3G/4G/5G/Cellular & Wireless Technologies
Presentation on 1G/2G/3G/4G/5G/Cellular & Wireless TechnologiesPresentation on 1G/2G/3G/4G/5G/Cellular & Wireless Technologies
Presentation on 1G/2G/3G/4G/5G/Cellular & Wireless Technologies
Kaushal Kaith
 

Viewers also liked (7)

Ericsson
EricssonEricsson
Ericsson
 
Ims architecture white_paper
Ims architecture white_paperIms architecture white_paper
Ims architecture white_paper
 
8 the path to voice over lte - vo lte
8 the path to voice over lte - vo lte8 the path to voice over lte - vo lte
8 the path to voice over lte - vo lte
 
4G Technology
4G Technology4G Technology
4G Technology
 
IMS IP multimedia subsystem presentation
IMS IP multimedia subsystem presentationIMS IP multimedia subsystem presentation
IMS IP multimedia subsystem presentation
 
Generation of mobile communication systems
Generation of mobile communication systemsGeneration of mobile communication systems
Generation of mobile communication systems
 
Presentation on 1G/2G/3G/4G/5G/Cellular & Wireless Technologies
Presentation on 1G/2G/3G/4G/5G/Cellular & Wireless TechnologiesPresentation on 1G/2G/3G/4G/5G/Cellular & Wireless Technologies
Presentation on 1G/2G/3G/4G/5G/Cellular & Wireless Technologies
 

Similar to Information Technology at IMS

Under the hood of a modern buddhist retreat center v2.0
Under the hood of a modern buddhist retreat center v2.0Under the hood of a modern buddhist retreat center v2.0
Under the hood of a modern buddhist retreat center v2.0
Charles Stevenson
 
Cyber Security Overview for Small Businesses
Cyber Security Overview for Small BusinessesCyber Security Overview for Small Businesses
Cyber Security Overview for Small Businesses
Charles Cline
 
Building a Hacker Resistant Network
Building a Hacker Resistant Network Building a Hacker Resistant Network
Building a Hacker Resistant Network
Sentry Global Technologies, LLC
 
Community IT Webinar Series - Supporting Remote Workers
Community IT Webinar Series - Supporting Remote WorkersCommunity IT Webinar Series - Supporting Remote Workers
Community IT Webinar Series - Supporting Remote Workers
Community IT Innovators
 
Guy Jaszewski - In Depth Background Info
Guy Jaszewski - In Depth Background InfoGuy Jaszewski - In Depth Background Info
Guy Jaszewski - In Depth Background Info
Guy Jaszewski
 
Proactive Approach to OT incident response - HOUSECCON 2023
Proactive Approach to OT incident response - HOUSECCON 2023Proactive Approach to OT incident response - HOUSECCON 2023
Proactive Approach to OT incident response - HOUSECCON 2023
Chris Sistrunk
 
1 - Introduction.ppt
1 - Introduction.ppt1 - Introduction.ppt
1 - Introduction.ppt
MuhammadFarhan571648
 
3_Types of Computers and Data Representation.pptx
3_Types of Computers and Data Representation.pptx3_Types of Computers and Data Representation.pptx
3_Types of Computers and Data Representation.pptx
hafizsaifullah5
 
Robert paulin resume -2015c
Robert paulin resume -2015cRobert paulin resume -2015c
Robert paulin resume -2015c
Bob Paulin
 
MMPL corporate overview mail
MMPL corporate overview mailMMPL corporate overview mail
MMPL corporate overview mail
Medley India Infosolution Pvt Ltd
 
ATC Delta Dinner - SOB 2022
ATC Delta Dinner - SOB 2022ATC Delta Dinner - SOB 2022
ATC Delta Dinner - SOB 2022
Advanced Technology Consulting (ATC)
 
Competitive cyber security
Competitive cyber securityCompetitive cyber security
Competitive cyber security
William Mathews
 
Zinia managed services brochure
Zinia managed services brochureZinia managed services brochure
Zinia managed services brochure
David Pereira
 
Network Forensics- Social Media Forensics
Network Forensics- Social Media ForensicsNetwork Forensics- Social Media Forensics
Network Forensics- Social Media Forensics
Don Caeiro
 
Information Technology Department.pptx
Information Technology Department.pptxInformation Technology Department.pptx
Information Technology Department.pptx
AQEELAHMAD938119
 
SFScon19 - Francesco La Spina -7 Steps to Industry 40
SFScon19 - Francesco La Spina -7 Steps to Industry 40SFScon19 - Francesco La Spina -7 Steps to Industry 40
SFScon19 - Francesco La Spina -7 Steps to Industry 40
South Tyrol Free Software Conference
 
Netop remote control 12.5 Brochure
Netop remote control 12.5 BrochureNetop remote control 12.5 Brochure
Netop remote control 12.5 Brochure
Nanna Wang
 
Competitive Cyber Security
Competitive Cyber SecurityCompetitive Cyber Security
Competitive Cyber Security
Coastal Pet Products, Inc.
 
Maior Technical Profile
Maior Technical ProfileMaior Technical Profile
Maior Technical Profile
maior_technology
 
Enterprise IT Security| CIO Innovation and Leadership
Enterprise IT Security| CIO Innovation and LeadershipEnterprise IT Security| CIO Innovation and Leadership
Enterprise IT Security| CIO Innovation and Leadership
RedZone Technologies
 

Similar to Information Technology at IMS (20)

Under the hood of a modern buddhist retreat center v2.0
Under the hood of a modern buddhist retreat center v2.0Under the hood of a modern buddhist retreat center v2.0
Under the hood of a modern buddhist retreat center v2.0
 
Cyber Security Overview for Small Businesses
Cyber Security Overview for Small BusinessesCyber Security Overview for Small Businesses
Cyber Security Overview for Small Businesses
 
Building a Hacker Resistant Network
Building a Hacker Resistant Network Building a Hacker Resistant Network
Building a Hacker Resistant Network
 
Community IT Webinar Series - Supporting Remote Workers
Community IT Webinar Series - Supporting Remote WorkersCommunity IT Webinar Series - Supporting Remote Workers
Community IT Webinar Series - Supporting Remote Workers
 
Guy Jaszewski - In Depth Background Info
Guy Jaszewski - In Depth Background InfoGuy Jaszewski - In Depth Background Info
Guy Jaszewski - In Depth Background Info
 
Proactive Approach to OT incident response - HOUSECCON 2023
Proactive Approach to OT incident response - HOUSECCON 2023Proactive Approach to OT incident response - HOUSECCON 2023
Proactive Approach to OT incident response - HOUSECCON 2023
 
1 - Introduction.ppt
1 - Introduction.ppt1 - Introduction.ppt
1 - Introduction.ppt
 
3_Types of Computers and Data Representation.pptx
3_Types of Computers and Data Representation.pptx3_Types of Computers and Data Representation.pptx
3_Types of Computers and Data Representation.pptx
 
Robert paulin resume -2015c
Robert paulin resume -2015cRobert paulin resume -2015c
Robert paulin resume -2015c
 
MMPL corporate overview mail
MMPL corporate overview mailMMPL corporate overview mail
MMPL corporate overview mail
 
ATC Delta Dinner - SOB 2022
ATC Delta Dinner - SOB 2022ATC Delta Dinner - SOB 2022
ATC Delta Dinner - SOB 2022
 
Competitive cyber security
Competitive cyber securityCompetitive cyber security
Competitive cyber security
 
Zinia managed services brochure
Zinia managed services brochureZinia managed services brochure
Zinia managed services brochure
 
Network Forensics- Social Media Forensics
Network Forensics- Social Media ForensicsNetwork Forensics- Social Media Forensics
Network Forensics- Social Media Forensics
 
Information Technology Department.pptx
Information Technology Department.pptxInformation Technology Department.pptx
Information Technology Department.pptx
 
SFScon19 - Francesco La Spina -7 Steps to Industry 40
SFScon19 - Francesco La Spina -7 Steps to Industry 40SFScon19 - Francesco La Spina -7 Steps to Industry 40
SFScon19 - Francesco La Spina -7 Steps to Industry 40
 
Netop remote control 12.5 Brochure
Netop remote control 12.5 BrochureNetop remote control 12.5 Brochure
Netop remote control 12.5 Brochure
 
Competitive Cyber Security
Competitive Cyber SecurityCompetitive Cyber Security
Competitive Cyber Security
 
Maior Technical Profile
Maior Technical ProfileMaior Technical Profile
Maior Technical Profile
 
Enterprise IT Security| CIO Innovation and Leadership
Enterprise IT Security| CIO Innovation and LeadershipEnterprise IT Security| CIO Innovation and Leadership
Enterprise IT Security| CIO Innovation and Leadership
 

Recently uploaded

Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 

Recently uploaded (20)

Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 

Information Technology at IMS

  • 2. IT DEPARTMENT What’s the IT department at IMS do? Who does it serve? Who helps out?
  • 3. My Role Responsible for planning, implementation, security, and management of multiple information and communications systems and projects, including voice, data, imaging, Internet, and office automation. Develop annual departmental budgets and corporate IT policies and procedures. Provide technical support and training at all levels of the organization.
  • 4. People I Serve • Board of Directors • Founders • Guests • Staff • Teachers • Volunteers • Customers (aka Yogis )
  • 5. Outside Help & Services Eric Woudenberg – Dharma Seed Geof Karlson – Yogi Enhanced System (YES) Mark Pirani – Electrician •Expert Laser Services (copiers) •Charter Business (voice & Internet) •Rapid7 (Nexpose) •Gravity Switch (website) •Prevco Audio (sound systems) •CCB Nonprofits (software) •Citrix (XenServer) •Orange Oil (air conditioners) •Dell (servers) •Provantage (equipment) Over 60 vendor/service providers including:
  • 6. WHAT YOU SEE The visible and tangible aspects of IMS IT
  • 7. What you see: stuff • Laptop & desktop computers, iPads, etc • Copiers, fax machines, scanners, printers, labelers • Credit card readers • Hearing devices, microphones, amplifiers, recording equipment • Cameras, televisions, CD/DVD players, projectors • Conference phones, desktop phones, cell phones, helpdesk “red” phones, etc
  • 8. What you see: website
  • 9. WHAT YOU DON’T SEE The invisible and/or intangible aspects of IMS IT
  • 10. What You Don’t See • Astounding layers of complexity • Vast array of hardware, software and technical standards & protocols to study and master • Anticipating obsolescence/adoption of new technologies – rate of technological innovation leading to dramatically short lifespan of assets and investments in hardware, software, web presence, data formats, storage resources, etc
  • 11. TIP OF THE ICEBERG How much are we talking about here?
  • 12. By the numbers • 15 wireless access points • 2 VPN firewall routers • 2 dharma talk recorders • 4 fiber media converters • 2 air conditioners • 6 microphones, 2 amplifiers, 2 equalizers, 2 FM transmitters for dharma hall wireless headsets • 2 phone and voicemail systems • 2 photo copiers • Fax machines, digital cameras, video recorder, etc.. • 23 telephone lines • 2 locked fireproof storage boxes • Phones: 6 cell, 2 conference, 7 emergency, 40 system, 2 helpdesk “red” phones
  • 13. By the numbers • 6 external drives, 2 network attached storage (NAS), 2 storage area networks (SAN) • 37 desktop and laptop computers • 20 servers • 48 displays • 25 network switches • 26 print devices • 39 battery backups • ~11 different operating systems • ~15 programming languages • ~100 username and passwords for internal systems, vendor websites, etc • Central anti-virus & software management for all servers and computers • ~26,500 lines of code for online registration and donation etc • ~300,000 lines of code under the hood in YES • Death by acronym: – DNS, DHCP, LDAP/AD, DFS, HTTPS, MySQL, MS SQL, Subversion, SSH, SAMBA, iSCSI, VLAN, NTP, GPO, MSI, VNC, WSUS, ODBC, IIS, SMTP, POP3, IMAP, ARP, WPA2 • Myriad cyber threat vectors monitored with Nexpose etc
  • 14. PICTURE IT My eyes just glazed over can you show me a picture?
  • 15. Physical Inventory * Entire inventory not depicted due to space constraints
  • 16. Can you help me visualize IMS IT from another angle? VISUALIZE IT
  • 17.
  • 18. GLIMPSING COMPLEXITY How do technologies intersect creating challenges for IMS IT?
  • 19. Case study: Retreat Support What’s needed? A system that provides on-call help for yogis after normal operating hours • Needs to be easy to use • Needs to be reliable • Needs to be flexible—given time-off schedule for respondents (aka retreat support fellows)
  • 20. Case study: Retreat Support • Red desk telephone • No buttons • Dials immediately when receiver lifted • Calls Google Voice number • Google Voice rings one or both cell phones
  • 21. Case study: Retreat Support • Rugged cellphone + GPS • Operates in all conditions • Clear audio • 6 hours of talk time • Rings when red phone received lifted • Receives notifications for missed calls
  • 26. Roadmap (Future Planning and Investment) • Yogi Enhanced System (YES) – succession plan for ongoing enhancements and maintenance of our mission critical database application as Geof Karlson moves towards retirement – forward migration planning • Upgrading obsolete wiring at Retreat Center

Editor's Notes

  1. Start with what they see (computers, phones, etc)
  2. We have over 60 vendor/service providers
  3. Determining entry threshold when new technology is superior…
  4. Virtual machines within yellow circle. SANs not depicted. UPSes etc etcetc not depicted
  5. Vast array of enterprise technology products and services in use at our small non-profit meditation center