SlideShare a Scribd company logo
Information
Technology
Charlie Stevenson
IT Manager
I.T. DEPARTMENT
What’s the IT department at IMS do? Who does it serve? Who helps out?
Responsibilities
• Technical Support
• Reliability
• Projects
• Budget
• Policies
• Procedures
• Compliance
• Strategic planning
• Sound
• Phones
• Data storage
• Imaging
• Network
• Security
• Internet
• Office automation
People I Serve
• Board of directors
• Founders
• Guests
• Staff
• Teachers
• Volunteers
• Customers (aka Yogis )
Outside Help & Services
Eric Woudenberg – Dharma Seed
Geof Karlson – Yogi Enhanced System (YES)
Mark Pirani – Electrician
•Expert Laser Services (copiers)
•Charter Business (voice & Internet)
•Rapid7 (Nexpose)
•Gravity Switch (website)
•Prevco Audio (sound systems)
•CCB Nonprofits (software)
•Citrix (XenServer)
•Orange Oil (air conditioners)
•Dell (servers)
•Provantage (equipment)
Over 60 vendor/service
providers including:
WHAT YOU SEE
The visible and tangible aspects of IMS IT
What you see: stuff
• Laptop & desktop computers, iPads, etc
• Copiers, fax machines, scanners, printers, labelers
• Credit card readers
• Hearing devices, microphones, amplifiers, recording
equipment
• Cameras, televisions, CD/DVD players, projectors
• Conference phones, desktop phones, cell phones,
helpdesk “red” phones, etc
What you see: website
WHAT YOU DON’T SEE
The invisible and/or intangible aspects of IMS IT
What You Don’t See
• Astounding layers of complexity
• Vast array of hardware, software and technical standards
& protocols to study and master
• Anticipating obsolescence/adoption of new technologies
– rate of technological innovation leading to dramatically short
lifespan of assets and investments in hardware, software, web
presence, data formats, storage resources, etc
What you don’t see: website
TIP OF THE ICEBERG
How much are we talking about here?
• 15 wireless access points
• 2 VPN firewall routers
• 2 network mp3 recorders
• 4 fiber media converters
• 2 air conditioners
• 9 microphones, 3 amplifiers, 3
equalizers, 2 FM assisted
listening, UHF dual wireless mics
• 2 phone and voicemail systems
• 2 photo copiers
• Fax machines, digital cameras,
video recorder, etc..
• 23 telephone lines
• 2 locked fireproof storage boxes
• Phones: 6 cell, 2 conference, 7
emergency, 40 system, 2
helpdesk “red” phones
• 1 SmartTV
By the numbers
By the numbers
• 6 external drives, 2 network attached storage
(NAS), 2 storage area networks (SAN)
• 37 desktop and laptop computers
• 20 servers
• 48 displays
• 25 network switches
• 26 print devices
• 39 battery backups
• ~11 different operating systems
• ~15 programming languages
• ~100 username and passwords for internal
systems, vendor websites, etc
• Central anti-virus & software management for
all servers and computers
• ~26,500 lines of code for online registration
and donation etc
• ~300,000 lines of code under the hood in
YES
• Death by acronym:
– DNS, DHCP, LDAP/AD, DFS, HTTPS,
MySQL, MS SQL, Subversion, SSH,
SAMBA, iSCSI, VLAN, NTP, GPO, MSI,
VNC, WSUS, ODBC, IIS, SMTP, POP3,
IMAP, ARP, WPA2
• Myriad cyber threat vectors monitored with
Nexpose etc
PICTURE IT
My eyes just glazed over can you show me a picture?
Physical Inventory
*Entireinventorynotdepictedduetospaceconstraints
Can you help me visualize IMS IT from another angle?
VISUALIZE IT
Questions?

More Related Content

Similar to Under the hood of a modern buddhist retreat center v2.0

Information Technology at IMS
Information Technology at IMSInformation Technology at IMS
Information Technology at IMS
Charles Stevenson
 
Guy Jaszewski - In Depth Background Info
Guy Jaszewski - In Depth Background InfoGuy Jaszewski - In Depth Background Info
Guy Jaszewski - In Depth Background Info
Guy Jaszewski
 
3_Types of Computers and Data Representation.pptx
3_Types of Computers and Data Representation.pptx3_Types of Computers and Data Representation.pptx
3_Types of Computers and Data Representation.pptx
hafizsaifullah5
 
Maior Technical Profile
Maior Technical ProfileMaior Technical Profile
Maior Technical Profile
maior_technology
 
Profile quick-2
Profile quick-2Profile quick-2
Profile quick-2
Edge Ict
 
Building a Hacker Resistant Network
Building a Hacker Resistant Network Building a Hacker Resistant Network
Building a Hacker Resistant Network
Sentry Global Technologies, LLC
 
It2 شرحa
It2 شرحaIt2 شرحa
It2 شرحa
Mohammed Attia
 
FM & Bluetooth & WIFI, Oh My!
FM & Bluetooth & WIFI, Oh My!FM & Bluetooth & WIFI, Oh My!
FM & Bluetooth & WIFI, Oh My!
Aaron Lafferty
 
RIT Services J.Higham
RIT Services J.HighamRIT Services J.Higham
RIT Services J.Higham
Julie Higham
 
Computer Application
Computer ApplicationComputer Application
Computer Application
Zahirrudin Idris
 
Advantech Design & Manufacturing Services for Medical Devices
Advantech Design & Manufacturing Services for Medical DevicesAdvantech Design & Manufacturing Services for Medical Devices
Advantech Design & Manufacturing Services for Medical Devices
Mariette Dusseldorp Advantech
 
Cyber Security Overview for Small Businesses
Cyber Security Overview for Small BusinessesCyber Security Overview for Small Businesses
Cyber Security Overview for Small Businesses
Charles Cline
 
Chap003
Chap003Chap003
Infonet solutions
Infonet solutionsInfonet solutions
Infonet solutions
Infonet Solutions
 
RMS Tech Solutions - Digital Profile
RMS Tech Solutions - Digital ProfileRMS Tech Solutions - Digital Profile
RMS Tech Solutions - Digital Profile
RMSTechSolutions
 
4.03 it careers 2
4.03 it careers 24.03 it careers 2
4.03 it careers 2
Tammy Carter
 
Network Forensics- Social Media Forensics
Network Forensics- Social Media ForensicsNetwork Forensics- Social Media Forensics
Network Forensics- Social Media Forensics
Don Caeiro
 
Intro to computer.pdf
Intro to computer.pdfIntro to computer.pdf
Intro to computer.pdf
MuazzamaAbdulMajeed
 
Information Technology at IMS
Information Technology at IMSInformation Technology at IMS
Information Technology at IMS
Charles Stevenson
 
CenturyDX-IT-Company
CenturyDX-IT-CompanyCenturyDX-IT-Company
CenturyDX-IT-Company
Mustafa Kuğu
 

Similar to Under the hood of a modern buddhist retreat center v2.0 (20)

Information Technology at IMS
Information Technology at IMSInformation Technology at IMS
Information Technology at IMS
 
Guy Jaszewski - In Depth Background Info
Guy Jaszewski - In Depth Background InfoGuy Jaszewski - In Depth Background Info
Guy Jaszewski - In Depth Background Info
 
3_Types of Computers and Data Representation.pptx
3_Types of Computers and Data Representation.pptx3_Types of Computers and Data Representation.pptx
3_Types of Computers and Data Representation.pptx
 
Maior Technical Profile
Maior Technical ProfileMaior Technical Profile
Maior Technical Profile
 
Profile quick-2
Profile quick-2Profile quick-2
Profile quick-2
 
Building a Hacker Resistant Network
Building a Hacker Resistant Network Building a Hacker Resistant Network
Building a Hacker Resistant Network
 
It2 شرحa
It2 شرحaIt2 شرحa
It2 شرحa
 
FM & Bluetooth & WIFI, Oh My!
FM & Bluetooth & WIFI, Oh My!FM & Bluetooth & WIFI, Oh My!
FM & Bluetooth & WIFI, Oh My!
 
RIT Services J.Higham
RIT Services J.HighamRIT Services J.Higham
RIT Services J.Higham
 
Computer Application
Computer ApplicationComputer Application
Computer Application
 
Advantech Design & Manufacturing Services for Medical Devices
Advantech Design & Manufacturing Services for Medical DevicesAdvantech Design & Manufacturing Services for Medical Devices
Advantech Design & Manufacturing Services for Medical Devices
 
Cyber Security Overview for Small Businesses
Cyber Security Overview for Small BusinessesCyber Security Overview for Small Businesses
Cyber Security Overview for Small Businesses
 
Chap003
Chap003Chap003
Chap003
 
Infonet solutions
Infonet solutionsInfonet solutions
Infonet solutions
 
RMS Tech Solutions - Digital Profile
RMS Tech Solutions - Digital ProfileRMS Tech Solutions - Digital Profile
RMS Tech Solutions - Digital Profile
 
4.03 it careers 2
4.03 it careers 24.03 it careers 2
4.03 it careers 2
 
Network Forensics- Social Media Forensics
Network Forensics- Social Media ForensicsNetwork Forensics- Social Media Forensics
Network Forensics- Social Media Forensics
 
Intro to computer.pdf
Intro to computer.pdfIntro to computer.pdf
Intro to computer.pdf
 
Information Technology at IMS
Information Technology at IMSInformation Technology at IMS
Information Technology at IMS
 
CenturyDX-IT-Company
CenturyDX-IT-CompanyCenturyDX-IT-Company
CenturyDX-IT-Company
 

Recently uploaded

Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 

Recently uploaded (20)

Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 

Under the hood of a modern buddhist retreat center v2.0

  • 2. I.T. DEPARTMENT What’s the IT department at IMS do? Who does it serve? Who helps out?
  • 3. Responsibilities • Technical Support • Reliability • Projects • Budget • Policies • Procedures • Compliance • Strategic planning • Sound • Phones • Data storage • Imaging • Network • Security • Internet • Office automation
  • 4. People I Serve • Board of directors • Founders • Guests • Staff • Teachers • Volunteers • Customers (aka Yogis )
  • 5. Outside Help & Services Eric Woudenberg – Dharma Seed Geof Karlson – Yogi Enhanced System (YES) Mark Pirani – Electrician •Expert Laser Services (copiers) •Charter Business (voice & Internet) •Rapid7 (Nexpose) •Gravity Switch (website) •Prevco Audio (sound systems) •CCB Nonprofits (software) •Citrix (XenServer) •Orange Oil (air conditioners) •Dell (servers) •Provantage (equipment) Over 60 vendor/service providers including:
  • 6. WHAT YOU SEE The visible and tangible aspects of IMS IT
  • 7. What you see: stuff • Laptop & desktop computers, iPads, etc • Copiers, fax machines, scanners, printers, labelers • Credit card readers • Hearing devices, microphones, amplifiers, recording equipment • Cameras, televisions, CD/DVD players, projectors • Conference phones, desktop phones, cell phones, helpdesk “red” phones, etc
  • 8. What you see: website
  • 9. WHAT YOU DON’T SEE The invisible and/or intangible aspects of IMS IT
  • 10. What You Don’t See • Astounding layers of complexity • Vast array of hardware, software and technical standards & protocols to study and master • Anticipating obsolescence/adoption of new technologies – rate of technological innovation leading to dramatically short lifespan of assets and investments in hardware, software, web presence, data formats, storage resources, etc
  • 11. What you don’t see: website
  • 12. TIP OF THE ICEBERG How much are we talking about here?
  • 13. • 15 wireless access points • 2 VPN firewall routers • 2 network mp3 recorders • 4 fiber media converters • 2 air conditioners • 9 microphones, 3 amplifiers, 3 equalizers, 2 FM assisted listening, UHF dual wireless mics • 2 phone and voicemail systems • 2 photo copiers • Fax machines, digital cameras, video recorder, etc.. • 23 telephone lines • 2 locked fireproof storage boxes • Phones: 6 cell, 2 conference, 7 emergency, 40 system, 2 helpdesk “red” phones • 1 SmartTV By the numbers
  • 14. By the numbers • 6 external drives, 2 network attached storage (NAS), 2 storage area networks (SAN) • 37 desktop and laptop computers • 20 servers • 48 displays • 25 network switches • 26 print devices • 39 battery backups • ~11 different operating systems • ~15 programming languages • ~100 username and passwords for internal systems, vendor websites, etc • Central anti-virus & software management for all servers and computers • ~26,500 lines of code for online registration and donation etc • ~300,000 lines of code under the hood in YES • Death by acronym: – DNS, DHCP, LDAP/AD, DFS, HTTPS, MySQL, MS SQL, Subversion, SSH, SAMBA, iSCSI, VLAN, NTP, GPO, MSI, VNC, WSUS, ODBC, IIS, SMTP, POP3, IMAP, ARP, WPA2 • Myriad cyber threat vectors monitored with Nexpose etc
  • 15. PICTURE IT My eyes just glazed over can you show me a picture?
  • 17. Can you help me visualize IMS IT from another angle? VISUALIZE IT
  • 18.