This is a mock proposal for Cerner Healthcare that would save at least $36,400/year by implementing an asset management system to integrate/replace disparate information systems. Our team included a member of Cerner’s Managed Services Department, and worked with a Cerner Project Manager to elicit requirements and estimate loss due to inefficiency.
This document provides a summary of the Aruba Instant 6.4.0.2-4.1 User Guide, including:
- An overview of Aruba Instant and supported devices.
- Details on new features in version 6.4.0.2-4.1 such as wireless network profiles and captive portal configurations.
- Instructions for initial configuration tasks like modifying the IAP name and location details.
- Sections on monitoring the network, configuring wireless and wired profiles, and authentication methods.
The user guide contains information to help users set up, configure, and manage an Instant network and IAP devices.
Key loggers are programs or hardware devices that record every keystroke on a computer. They can be used legitimately to monitor employee productivity but are also used illegally to steal sensitive information like passwords, usernames, credit card numbers, and personal details. Key loggers come in both hardware and software forms. Hardware key loggers are small devices that physically attach to keyboards while software key loggers can be installed remotely or hidden in viruses and malware. Common prevention methods include using up-to-date antivirus software, firewalls, automatic form fillers, alternative keyboard layouts, and on-screen keyboards. It is important to be aware of what is installed on your computer and keep security software updated.
Software Requirement Specification For Smart Internet CafeHari
The document is a software requirements specification for a Smart Internet Cafe (SIC) system. It outlines requirements across many sections - introduction and document conventions, overall descriptions of the system and its users/environment, external interface requirements including the user interface, system features like authentication and monitoring, and non-functional requirements such as performance, security, and special user needs. The SIC will provide secure internet access and account/usage monitoring for clients of internet cafes and college computer labs.
The document provides an overview of the Open Web Application Security Project (OWASP). It discusses what OWASP is, the free resources it provides like publications, tools, and local chapters. It outlines some of OWASP's major publications like the OWASP Top 10 and Testing Guide. It also demonstrates the WebScarab and WebGoat tools. Finally, it describes the goals and offerings of the OWASP Cincinnati local chapter.
This document provides instructions for setting up a Palo Alto Networks firewall using CloudStack. It describes adding the Palo Alto firewall as a service provider in CloudStack, creating a network service offering, and configuring the firewall with public and private interfaces, zones, virtual routers, and default routing. Firewall and NAT rules will be automatically configured by CloudStack. Additional options like threat profiles and log forwarding can also be applied.
This document summarizes an Aruba Networks presentation on configuring access management with ClearPass. It outlines the agenda which includes reviewing an existing customer deployment, customer challenges and solutions, and a live configuration, authentication, and troubleshooting walkthrough. It then discusses the customer's existing 802.1X deployment and their new initiatives involving mobile device management, a Palo Alto firewall, and a visitor network with ClearPass guest. It explores how ClearPass can help integrate these solutions and limit access to only enrolled devices while applying granular policies. The presentation then demonstrates these concepts in a lab environment.
This guide covers the deployment of Aruba remote access points (RAP) in fixed telecommuter and micro branch office sites, and it is considered part of the base designs guides within the VRD core technologies series. This guide covers the design recommendations for remote network deployment and it explains the various configurations needed to implement a secure, high-performance virtual branch office (VBN) solution with Aruba RAPs.
This guide covers the deployment of Aruba remote access points (RAP) in fixed telecommuter and micro branch office sites, and it is considered part of the base designs guides within the VRD core technologies series. This guide covers the design recommendations for remote network deployment and it explains the various configurations needed to implement a secure, high-performance virtual branch office (VBN) solution with Aruba RAPs.
This document provides a summary of the Aruba Instant 6.4.0.2-4.1 User Guide, including:
- An overview of Aruba Instant and supported devices.
- Details on new features in version 6.4.0.2-4.1 such as wireless network profiles and captive portal configurations.
- Instructions for initial configuration tasks like modifying the IAP name and location details.
- Sections on monitoring the network, configuring wireless and wired profiles, and authentication methods.
The user guide contains information to help users set up, configure, and manage an Instant network and IAP devices.
Key loggers are programs or hardware devices that record every keystroke on a computer. They can be used legitimately to monitor employee productivity but are also used illegally to steal sensitive information like passwords, usernames, credit card numbers, and personal details. Key loggers come in both hardware and software forms. Hardware key loggers are small devices that physically attach to keyboards while software key loggers can be installed remotely or hidden in viruses and malware. Common prevention methods include using up-to-date antivirus software, firewalls, automatic form fillers, alternative keyboard layouts, and on-screen keyboards. It is important to be aware of what is installed on your computer and keep security software updated.
Software Requirement Specification For Smart Internet CafeHari
The document is a software requirements specification for a Smart Internet Cafe (SIC) system. It outlines requirements across many sections - introduction and document conventions, overall descriptions of the system and its users/environment, external interface requirements including the user interface, system features like authentication and monitoring, and non-functional requirements such as performance, security, and special user needs. The SIC will provide secure internet access and account/usage monitoring for clients of internet cafes and college computer labs.
The document provides an overview of the Open Web Application Security Project (OWASP). It discusses what OWASP is, the free resources it provides like publications, tools, and local chapters. It outlines some of OWASP's major publications like the OWASP Top 10 and Testing Guide. It also demonstrates the WebScarab and WebGoat tools. Finally, it describes the goals and offerings of the OWASP Cincinnati local chapter.
This document provides instructions for setting up a Palo Alto Networks firewall using CloudStack. It describes adding the Palo Alto firewall as a service provider in CloudStack, creating a network service offering, and configuring the firewall with public and private interfaces, zones, virtual routers, and default routing. Firewall and NAT rules will be automatically configured by CloudStack. Additional options like threat profiles and log forwarding can also be applied.
This document summarizes an Aruba Networks presentation on configuring access management with ClearPass. It outlines the agenda which includes reviewing an existing customer deployment, customer challenges and solutions, and a live configuration, authentication, and troubleshooting walkthrough. It then discusses the customer's existing 802.1X deployment and their new initiatives involving mobile device management, a Palo Alto firewall, and a visitor network with ClearPass guest. It explores how ClearPass can help integrate these solutions and limit access to only enrolled devices while applying granular policies. The presentation then demonstrates these concepts in a lab environment.
This guide covers the deployment of Aruba remote access points (RAP) in fixed telecommuter and micro branch office sites, and it is considered part of the base designs guides within the VRD core technologies series. This guide covers the design recommendations for remote network deployment and it explains the various configurations needed to implement a secure, high-performance virtual branch office (VBN) solution with Aruba RAPs.
This guide covers the deployment of Aruba remote access points (RAP) in fixed telecommuter and micro branch office sites, and it is considered part of the base designs guides within the VRD core technologies series. This guide covers the design recommendations for remote network deployment and it explains the various configurations needed to implement a secure, high-performance virtual branch office (VBN) solution with Aruba RAPs.
This document provides a software requirements specification for a Library Management System being developed at the University of Education, Township Campus. It includes sections that describe the purpose and scope of the system, user requirements, system features, and technical specifications. The key functions of the system are to manage the checking in and out of books, track book loans, and generate reports. It is intended for use by both librarians and students to automate and improve library management and services.
Enabling multimedia services on wireless networks is a great idea nowadays, especially given the user demand. But it takes more access points to install, proactive planning for application level performance requirements and multimedia aware RF management functions. Join us to learn about multimedia application behavior and how you can get your wireless network ready.
To learn more, visit us at http://www.arubanetworks.com/wlan. Join the discussion at https://community.arubanetworks.com
After an overview presentation, we will demonstrate live how HPE's multi-vendor Intelligent Management Center (IMC) software can be used to manage day to day operations for the datacenter. Introduction to HPE IMC focused on management for data center switching. Topics include REST API, virtualization integration and data center fabric management.
Kong, Keyrock, Keycloak, i4Trust - Options to Secure FIWARE in ProductionFIWARE
This training camp teaches you how FIWARE technologies and iSHARE, brought together under the umbrella of the i4Trust initiative, can be combined to provide the means for creation of data spaces in which multiple organizations can exchange digital twin data in a trusted and efficient manner, collaborating in the development of innovative services based on data sharing and creating value out of the data they share. SMEs and Digital Innovation Hubs (DIHs) will be equipped with the necessary know-how to use the i4Trust framework for creating data spaces!
The document discusses network security and related concepts. It defines network security as protecting computer systems and networks from unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction. It identifies key security goals of confidentiality, integrity and availability. Various security attacks like passive attacks that obtain information and active attacks that modify data are described. The document also outlines security services, mechanisms and basic cryptography terminology to provide network security.
Moving towards a new Wi-Fi technology does not have to be too much of an undertaking. Of course, that's assuming great deal of planning and attention to detail in terms of defining the clear steps on how to get there. In this session we will discuss 802.11ac placement, Wi-Fi coverage and capacity planning for 802.11ac devices and how to take advantage of 802.11ac transmit beamforming.
This Solution Guide describes best practices for implementing an Aruba 802.11 wireless network that supports thousands of highly mobile devices (HMDs) such as Wi-Fi phones, handheld scanning terminals, voice badges, and computers mounted to vehicles. It describes the design principles particular to keeping devices that are in constant motion connected to the network as well as best practices for configuring Aruba Networks controllers and the mobile devices. The comprehensive guide addresses six areas of network planning to ensure a high quality of service for roaming data and voice sessions: device configuration, airtime optimization, roaming optimization, IP mobility configuration, IP multicast configuration, and interference resistance. A detailed troubleshooting section covers common issues that arise with these types of WLANs.
To learn more, visit us at http://www.arubanetworks.com/wlan. Join the discussion at https://community.arubanetworks.com
The Palo Alto NGFW uses single-pass software and single-pass parallel processing (SP3) to efficiently classify and inspect network traffic. SP3 separates the control plane, used for management, from the data plane which includes signature matching, security, and network processors to identify threats, enforce policies, and forward traffic with features like decryption and routing in a single pass.
This document discusses the top 6 use cases for cloud access security broker (CASB) technology: 1) Prevent data loss with data loss prevention policies; 2) Control access from unmanaged devices; 3) Stop cloud malware and ransomware; 4) Limit risky external sharing; 5) Securely authenticate users; and 6) Control unsanctioned app usage. It provides examples of how CASBs can address these use cases for two organizations - a large university and a non-profit healthcare organization - by distinguishing managed and unmanaged devices, limiting access to protected health information from risky devices, and regularly scanning cloud apps for malware.
This document provides an overview of Microsoft Azure security features, including:
- Shared responsibility model where Microsoft secures the platform and customers secure their data and applications
- Identity and access management, encryption of data at rest and in transit, network security controls, and logging/monitoring capabilities
- Security Center provides visibility into threats and advanced analytics to detect attacks
- Operations Management Suite allows collecting logs from Azure, on-premises, and other clouds to analyze security events
- Microsoft works with partners to provide additional virtual network appliances and security solutions to customers
iTOP is an open source IT operations portal designed with ITIL best practices in mind. It allows users to document IT infrastructure, manage incidents, changes, and services. The presentation highlights iTOP's modules for configuration management, incident management, change management, and service management. Specifically, it describes how iTOP can be used to manage contacts, locations, infrastructure like servers and applications, and track the lifecycles of incidents, changes, and services.
The document discusses web authentication and authorization. It introduces various authentication threats and technologies like usernames/passwords, one-time passwords, and Kerberos. It also discusses authentication attacks like brute force attacks and weak password recovery validation. The document then covers authentication techniques and infrastructures such as pluggable authentication modules and secure sockets layer. Finally, it discusses web authentication standards including single sign-on, OAuth, and OpenID.
This webinar will cover how to bring up Aruba Mobility Master, Managed Device & Access Point and also go through some basic troubleshooting commands.Check out the webinar recording where this presentation was used: http://community.arubanetworks.com/t5/Wireless-Access/Technical-Webinar-Recording-Slides-Bringing-up-Aruba-Mobility/td-p/307599
Register for the upcoming webinars: https://community.arubanetworks.com/t5/Training-Certification-Career/EMEA-Airheads-Webinars-Jul-Dec-2017/td-p/271908
This document summarizes wireless network security and mobile device security. It discusses wireless network threats such as identity theft, man-in-the-middle attacks, and denial of service attacks. It also discusses IEEE 802.11 wireless LAN security standards including WEP, WPA, and RSN. Mobile device security threats include lack of physical security controls, use of untrusted networks and applications. The document outlines security strategies for wireless transmissions, access points, and networks. It also describes the phases of IEEE 802.11i including discovery, authentication, key management, and protected data transfer.
The document describes an employee management system developed for GEA Process Engineering (India) Private Limited. It includes sections on the existing system, requirements for a new system, hardware and software needs, project management, system users, analysis, design, implementation, testing, screenshots and future enhancements. The system allows administrators to add, edit and verify employee information, line managers to access reports on their department employees, and employees to access their own details. It aims to reduce workload and improve information management over the previous system.
This guide covers indoor 802.11n WLANs and is considered part of the foundation guides within the VRD core technologies series. This guide describes 802.11n, differences in 802.11n vs. 802.11a/b/g functionality, and Aruba-specific technologies and access points (APs) that make 802.11n-based WLANs a viable replacement for wired Ethernet in the majority of deployments.
To learn more, visit us at http://www.arubanetworks.com/wlan. Join the discussion at https://community.arubanetworks.com
SSL is an acronym for Secure Sockets Layer. It is a protocol used for authenticating and encrypting web traffic. For web traffic to be authenticated means that your browser is able to verify the identity of the remote server.
This guide covers the deployment of Aruba WLAN in a typical campus network, and it is considered part of the base designs guides within the VRD core technologies series. This guide covers the design recommendations for a campus deployment and it explains the various configurations needed to implement the Aruba secure, high-performance, multimedia grade WLAN solution in large campuses.
This document provides instructions for configuring single sign-on (SSO) through Okta for logging into an application. It involves creating a SAML 2.0 application in Okta, configuring settings like the recipient URL and attribute statements, downloading the identity provider metadata, and assigning users to the application.
1) The Special Broadcasting Service (SBS) is an Australian public broadcaster that provides multilingual and multicultural media services. To enhance employee learning, SBS implemented a learning management system and lynda.com subscription.
2) SBS chose lynda.com to provide a wide range of on-demand technology and business skills courses to support its diverse workforce. Lynda.com integrated with SBS's learning management system and provided reporting on course usage.
3) SBS plans to offer lynda.com access to all employees and use lynda.com courses to expand its leadership development program. Tracking lynda.com usage will help SBS identify learning gaps to address.
This document provides a software requirements specification for a Library Management System being developed at the University of Education, Township Campus. It includes sections that describe the purpose and scope of the system, user requirements, system features, and technical specifications. The key functions of the system are to manage the checking in and out of books, track book loans, and generate reports. It is intended for use by both librarians and students to automate and improve library management and services.
Enabling multimedia services on wireless networks is a great idea nowadays, especially given the user demand. But it takes more access points to install, proactive planning for application level performance requirements and multimedia aware RF management functions. Join us to learn about multimedia application behavior and how you can get your wireless network ready.
To learn more, visit us at http://www.arubanetworks.com/wlan. Join the discussion at https://community.arubanetworks.com
After an overview presentation, we will demonstrate live how HPE's multi-vendor Intelligent Management Center (IMC) software can be used to manage day to day operations for the datacenter. Introduction to HPE IMC focused on management for data center switching. Topics include REST API, virtualization integration and data center fabric management.
Kong, Keyrock, Keycloak, i4Trust - Options to Secure FIWARE in ProductionFIWARE
This training camp teaches you how FIWARE technologies and iSHARE, brought together under the umbrella of the i4Trust initiative, can be combined to provide the means for creation of data spaces in which multiple organizations can exchange digital twin data in a trusted and efficient manner, collaborating in the development of innovative services based on data sharing and creating value out of the data they share. SMEs and Digital Innovation Hubs (DIHs) will be equipped with the necessary know-how to use the i4Trust framework for creating data spaces!
The document discusses network security and related concepts. It defines network security as protecting computer systems and networks from unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction. It identifies key security goals of confidentiality, integrity and availability. Various security attacks like passive attacks that obtain information and active attacks that modify data are described. The document also outlines security services, mechanisms and basic cryptography terminology to provide network security.
Moving towards a new Wi-Fi technology does not have to be too much of an undertaking. Of course, that's assuming great deal of planning and attention to detail in terms of defining the clear steps on how to get there. In this session we will discuss 802.11ac placement, Wi-Fi coverage and capacity planning for 802.11ac devices and how to take advantage of 802.11ac transmit beamforming.
This Solution Guide describes best practices for implementing an Aruba 802.11 wireless network that supports thousands of highly mobile devices (HMDs) such as Wi-Fi phones, handheld scanning terminals, voice badges, and computers mounted to vehicles. It describes the design principles particular to keeping devices that are in constant motion connected to the network as well as best practices for configuring Aruba Networks controllers and the mobile devices. The comprehensive guide addresses six areas of network planning to ensure a high quality of service for roaming data and voice sessions: device configuration, airtime optimization, roaming optimization, IP mobility configuration, IP multicast configuration, and interference resistance. A detailed troubleshooting section covers common issues that arise with these types of WLANs.
To learn more, visit us at http://www.arubanetworks.com/wlan. Join the discussion at https://community.arubanetworks.com
The Palo Alto NGFW uses single-pass software and single-pass parallel processing (SP3) to efficiently classify and inspect network traffic. SP3 separates the control plane, used for management, from the data plane which includes signature matching, security, and network processors to identify threats, enforce policies, and forward traffic with features like decryption and routing in a single pass.
This document discusses the top 6 use cases for cloud access security broker (CASB) technology: 1) Prevent data loss with data loss prevention policies; 2) Control access from unmanaged devices; 3) Stop cloud malware and ransomware; 4) Limit risky external sharing; 5) Securely authenticate users; and 6) Control unsanctioned app usage. It provides examples of how CASBs can address these use cases for two organizations - a large university and a non-profit healthcare organization - by distinguishing managed and unmanaged devices, limiting access to protected health information from risky devices, and regularly scanning cloud apps for malware.
This document provides an overview of Microsoft Azure security features, including:
- Shared responsibility model where Microsoft secures the platform and customers secure their data and applications
- Identity and access management, encryption of data at rest and in transit, network security controls, and logging/monitoring capabilities
- Security Center provides visibility into threats and advanced analytics to detect attacks
- Operations Management Suite allows collecting logs from Azure, on-premises, and other clouds to analyze security events
- Microsoft works with partners to provide additional virtual network appliances and security solutions to customers
iTOP is an open source IT operations portal designed with ITIL best practices in mind. It allows users to document IT infrastructure, manage incidents, changes, and services. The presentation highlights iTOP's modules for configuration management, incident management, change management, and service management. Specifically, it describes how iTOP can be used to manage contacts, locations, infrastructure like servers and applications, and track the lifecycles of incidents, changes, and services.
The document discusses web authentication and authorization. It introduces various authentication threats and technologies like usernames/passwords, one-time passwords, and Kerberos. It also discusses authentication attacks like brute force attacks and weak password recovery validation. The document then covers authentication techniques and infrastructures such as pluggable authentication modules and secure sockets layer. Finally, it discusses web authentication standards including single sign-on, OAuth, and OpenID.
This webinar will cover how to bring up Aruba Mobility Master, Managed Device & Access Point and also go through some basic troubleshooting commands.Check out the webinar recording where this presentation was used: http://community.arubanetworks.com/t5/Wireless-Access/Technical-Webinar-Recording-Slides-Bringing-up-Aruba-Mobility/td-p/307599
Register for the upcoming webinars: https://community.arubanetworks.com/t5/Training-Certification-Career/EMEA-Airheads-Webinars-Jul-Dec-2017/td-p/271908
This document summarizes wireless network security and mobile device security. It discusses wireless network threats such as identity theft, man-in-the-middle attacks, and denial of service attacks. It also discusses IEEE 802.11 wireless LAN security standards including WEP, WPA, and RSN. Mobile device security threats include lack of physical security controls, use of untrusted networks and applications. The document outlines security strategies for wireless transmissions, access points, and networks. It also describes the phases of IEEE 802.11i including discovery, authentication, key management, and protected data transfer.
The document describes an employee management system developed for GEA Process Engineering (India) Private Limited. It includes sections on the existing system, requirements for a new system, hardware and software needs, project management, system users, analysis, design, implementation, testing, screenshots and future enhancements. The system allows administrators to add, edit and verify employee information, line managers to access reports on their department employees, and employees to access their own details. It aims to reduce workload and improve information management over the previous system.
This guide covers indoor 802.11n WLANs and is considered part of the foundation guides within the VRD core technologies series. This guide describes 802.11n, differences in 802.11n vs. 802.11a/b/g functionality, and Aruba-specific technologies and access points (APs) that make 802.11n-based WLANs a viable replacement for wired Ethernet in the majority of deployments.
To learn more, visit us at http://www.arubanetworks.com/wlan. Join the discussion at https://community.arubanetworks.com
SSL is an acronym for Secure Sockets Layer. It is a protocol used for authenticating and encrypting web traffic. For web traffic to be authenticated means that your browser is able to verify the identity of the remote server.
This guide covers the deployment of Aruba WLAN in a typical campus network, and it is considered part of the base designs guides within the VRD core technologies series. This guide covers the design recommendations for a campus deployment and it explains the various configurations needed to implement the Aruba secure, high-performance, multimedia grade WLAN solution in large campuses.
This document provides instructions for configuring single sign-on (SSO) through Okta for logging into an application. It involves creating a SAML 2.0 application in Okta, configuring settings like the recipient URL and attribute statements, downloading the identity provider metadata, and assigning users to the application.
1) The Special Broadcasting Service (SBS) is an Australian public broadcaster that provides multilingual and multicultural media services. To enhance employee learning, SBS implemented a learning management system and lynda.com subscription.
2) SBS chose lynda.com to provide a wide range of on-demand technology and business skills courses to support its diverse workforce. Lynda.com integrated with SBS's learning management system and provided reporting on course usage.
3) SBS plans to offer lynda.com access to all employees and use lynda.com courses to expand its leadership development program. Tracking lynda.com usage will help SBS identify learning gaps to address.
LinkedIn is a business-oriented social networking site mainly used for professional networking with over 65 million registered users worldwide. It allows users to connect with colleagues and professionals, find potential business partners and clients, and learn about companies. LinkedIn can help users expand their professional network, get discovered by recruiters, promote their business, and stay updated with industry news and connections.
Hyperic HQ for Cloud Infrastructure MonitoringSumit Arora
Hyperic is application monitoring and performance management for virtual, physical, and cloud infrastructures. Auto-discover resources of 75+ technologies, including vSphere, and collect availability, performance, utilization, and throughput metrics.
Features
Automatically discovers, monitors, and manages software and network resources
Monitors apps on any platform, including Unix, Linux, Windows, Solaris, AIX, HPUX, VMware, and Amazon Web Services
Built-in support for 75 common components—including databases, application servers, middleware, web servers, network devices and more
Optimized for virtual environments with integration with vCenter and vSphere
A sample system_design_costestimation_of_webstack_at_awsSumit Arora
The objective of this presentation to explain a sample AWS cloud infrastructure system design of travel web application and estimate approximate cost for the deployment in that cloud.
Most people want to know:
WHY should I use LinkedIn?
Someone invited me to LinkedIn. I made a profile, have a few connections and now I wonder WHY am I on this website?
How can I benefit from LinkedIn without spending too much time?
LinkedIn and Lynda.com: Connecting People Development, Engagement and Culture...LinkedIn Talent Solutions
Paul Morgan, Head of Learning and Development, Telefónica UK
Anna Brailsford, Commercial Director EMEA, Lynda.com
In this session, Lynda.com’s Commercial Director will introduce Lynda.com and LinkedIn as a complimentary force in enterprise wide talent development. She will be joined by the Head of Learning and Development at Telefónica UK and they will demonstrate how the partnership with Lynda.com has enabled a successful people agenda. Telefónica UK will discuss how investing in the whole person has facilitated a proactive culture of learning, consciously disrupting the line between personal and professional development.
This document provides an overview of Six Sigma at Ericsson. It discusses the history and concepts of Six Sigma, how it has been implemented organically at Ericsson since 1996, and its deployment structure which includes Champions, Black Belts, Green Belts, and other roles. Six Sigma is presented as a systematic and focused approach using statistical tools to fulfill business objectives by reducing variation and costs. The importance of change management is also emphasized for successful Six Sigma performance and deployment.
Explore design improvements intended to create a more effective learning experience and boost your user engagement on http://www.lynda.com
Join us for A New Year, New Look for Lynda.com, a webinar and virtual tour covering a wide range of helpful new features.
Based on the interviews, it seems that restaurants have problems with customer retention and marketing. People generally don't like random advertisements but may be open to targeted offers if they can control the content and frequency. A proposed solution is a flexible mobile app that allows restaurants to execute targeted marketing campaigns, and users to opt-in to receive customized offers. Key tests would evaluate whether such a tool can help restaurants increase sales and loyalty while providing a good user experience.
Planning, design and implementation of information systemsOnline
The document outlines the stages in the Systems Development Life Cycle (SDLC), including system investigation, analysis, design, implementation, maintenance and evaluation. It describes the key activities in each phase such as conducting feasibility studies, gathering functional requirements, designing the user interface and data structures, testing the system, and ongoing maintenance. Alternative approaches like prototyping are also covered, which allow for rapid development and user feedback early in the process.
The document discusses the development process of management information systems (MIS). It covers determining business and MIS goals and strategies, developing the MIS plan, handling uncertainties, and approaches to MIS development and implementation. The MIS plan should align with the business plan and support business decisions. It also discusses factors for MIS success, such as focusing on business objectives, and factors for failures, such as not meeting users' information needs.
Basics, Components, Design and Development of Web Application and Websites. Especially made for seminars and guest sessions for newbies in Web Development field.
STAENZ Academy
https://staenz.com/academy
This document contains a proposal for a web development project. It includes a short project description, list of requirements, risks, system architecture, technologies, documentation, quality control, communication plan, project timeline and budget, and payment terms. The project will be developed in 4 stages over 8 weeks and utilizes HTML5, ASP.NET, jQuery, and JavaScript. The total estimated cost is $6,110 to be paid in 3 installments.
This proposal of work contains details and samples of the user centric design process I follow. I have been trying to find a good graph that represents the process, but at the end I have decided to make my own! ;)
This document provides an overview of warehousing concepts including:
1) The need for warehouses to balance supply and demand and facilitate distribution.
2) Key considerations for warehouse setup such as site selection, management processes, and typical material flow.
3) The general workflow within warehouses including receipt of goods, putaway, storage, order picking, packing and dispatch.
4) Different types of material flows like "U flow" where receipt and dispatch are located at the same end to optimize dock resources.
OLED technology uses organic light emitting diodes to create brighter, thinner, and more flexible displays. An OLED is composed of thin films of organic molecules that emit light when electricity is applied. The first OLED was developed in 1987, and since then OLEDs have been used in various displays. OLEDs offer advantages over LCDs like higher contrast, better viewing angles, and less power consumption. Major applications of OLEDs include televisions, smartphones, and laptops.
Hive on spark is blazing fast or is it finalHortonworks
This presentation was given at the Strata + Hadoop World, 2015 in San Jose.
Apache Hive is the most popular and most widely used SQL solution for Hadoop. To keep pace with Hadoop’s increasingly vital role in the Enterprise, Hive has transformed from a batch-only, high-latency system into a modern SQL engine capable of both batch and interactive queries over large datasets. Hive’s momentum is accelerating: With Spark integration and a shift to in-memory processing on the horizon, Hive continues to expand the boundaries of Big Data.
In this talk the speakers examined Hive performance, past, present and future. In particular they looked at Hive’s origins as a petabyte scale SQL engine.
Through some numbers and graphs, they showed how Hive became 100x faster by moving beyond MapReduce, by vectorizing execution and by introducing a cost-based optimizer.
They detailed and discussed the challenges of scalable SQL on Hadoop.
The looked into Hive’s sub-second future, powered by LLAP and Hive on Spark.
And showed just how fast Hive on Spark really is.
This document provides 15 tips for better IT asset management using ServiceDesk Plus. It discusses how to classify assets, organize assets into groups, periodically import asset data, perform agent-based scans, automate workstation assignment, and manage software licenses, mobile devices, and contracts. The tips range from basic asset tracking and organization to more advanced techniques for software license optimization and mobile device management.
Field service application (FSA) refers to a cloud-based system that combines the robust web application and
dynamic mobile application to support field engineers. FSA most commonly caters to the customer who needs
service or repairs of equipment. This application is targeted at the Service industry, intended for the field
engineers. The various service industries register with this for cloud computing services for effective management
of services such as painting, plumbing, Electrician, carpenter etc. This system compliments the software services,
provided by the cloud, with a mobile-based client application, specially designing for the field engineers. This
solution shares a single workflow among the registered tenants thereby ensuring efficient sharing of infrastructure
and also ensuring the security and integrity tenant data.A Multi-tenant Application is an approach to share an
application instance among different customers to reduce overhead the most.
Configuration Monitoring Standard Content GuideProtect724
The document discusses the Configuration Monitoring content for ArcSight ESM 5.2. It includes instructions for installing the Configuration Monitoring package, configuring the content by modeling the network, categorizing assets, configuring active lists and filters, and enabling rules, notifications, reports and trends. The content helps identify, analyze and remediate undesired modifications to systems, devices and applications on the network.
The document discusses the Configuration Monitoring content for ArcSight ESM 5.2. It describes how to install the Configuration Monitoring package, configure various resources like asset categories and active lists, enable rules, configure notifications and reports. It also provides an overview of the Configuration Monitoring content which identifies, analyzes and remediates undesired modifications to systems, devices and applications on the network.
This document describes new features in SAP Data Services 4.2 Support Package 1. Key updates include installing Data Services on a separate Information platform services system for flexibility, additional REST web services, enhanced operational statistics collection, and a new tool for securely promoting Data Services objects between environments.
The document discusses several MCA projects including:
1) A medical information integration model using cloud computing to provide storage and computing capacity for medical data analysis.
2) A customer relationship and warehouse management system to optimize revenue and customer satisfaction.
3) An issue tracking, managing, monitoring and reporting system for an IT department.
The document discusses several MCA projects including:
1) A medical information integration model using cloud computing to provide storage and computing capacity for medical data analysis.
2) A customer relationship and warehouse management system to optimize revenue and customer satisfaction.
3) An issue tracking, managing, monitoring and reporting system for an IT department.
The document discusses several MCA projects including:
1) A medical information integration model using cloud computing to provide storage and computing capacity for medical data analysis.
2) A customer relationship and warehouse management system to optimize revenue and customer satisfaction.
3) An issue tracking, managing, monitoring and reporting system for an IT department.
The document discusses several MCA projects including:
1) A medical information integration model using cloud computing to provide storage and computing capacity for medical data analysis.
2) A customer relationship and warehouse management system to optimize revenue and customer satisfaction.
3) An issue tracking, managing, monitoring and reporting system for an IT department.
The document discusses several MCA projects including:
1) A medical information integration model using cloud computing to provide storage and computing capacity for medical data analysis.
2) A customer relationship and warehouse management system to optimize revenue and customer satisfaction.
3) An issue tracking, managing, monitoring and reporting system for an IT department.
The document discusses several MCA projects including:
1. A medical information integration model using cloud computing to provide data storage and analysis for medical departments and workers.
2. A customer relationship and warehouse management system to optimize revenue, customer satisfaction and understanding.
3. An issue tracking, managing, monitoring and reporting system for IT departments to access shared data and history.
The document discusses several MCA projects including:
1) A medical information integration model using cloud computing to provide storage and computing capacity for medical data analysis.
2) A customer relationship and warehouse management system to optimize revenue and customer satisfaction.
3) An issue tracking, managing, monitoring and reporting system for an IT department.
The document discusses several MCA projects including:
1) A medical information integration model using cloud computing to provide storage and computing capacity for medical data analysis.
2) A customer relationship and warehouse management system to optimize revenue and customer satisfaction.
3) An issue tracking, managing, monitoring and reporting system for an IT department.
The document discusses several MCA projects including:
1) A medical information integration model using cloud computing to provide storage and computing capacity for medical data analysis.
2) A customer relationship and warehouse management system to optimize revenue and customer satisfaction.
3) An issue tracking, managing, monitoring and reporting system for an IT department.
The document discusses several MCA projects including:
1. A medical information integration model using cloud computing to provide data storage and analysis for medical departments and workers.
2. A customer relationship and warehouse management system to optimize revenue, customer satisfaction and understanding.
3. An issue tracking, managing, monitoring and reporting system for IT departments to access shared data and history.
The document provides information about various Active Directory management solutions from ManageEngine ADSolutions. It summarizes the key Active Directory management products, including ADSolutions, ADManager Plus, ADSelfService Plus, ADAudit Plus, Exchange Reporter Plus. It highlights the benefits and features of each solution for managing Active Directory, automating tasks, reporting, compliance, self-service, and optimization of Exchange servers.
This document provides an overview of Qualys' Vulnerability Management, Detection and Response (VMDR) platform. It describes the various sensors, agents, and applications that can be used to discover assets, detect vulnerabilities, and deploy patches. These include scanner appliances, cloud agents, passive sensors, and connectors for cloud environments. It also explains how to configure agents, view vulnerabilities and the prioritization report, create patching jobs, and use dashboards and widgets to monitor assets and vulnerabilities. The goal is to help users gain visibility across their IT infrastructure and automate the remediation of critical vulnerabilities.
Nitin Kumar has over 4.5 years of experience as a Software Engineer. He is currently working at FCS Computer Systems Pte. Ltd. and is seeking new opportunities. He has extensive experience developing web applications using technologies like ASP.NET, C#, Angular, SQL Server, and more. His experience includes full stack development and managing projects from design to deployment. He is looking for a challenging role that allows him to continue growing his technical skills.
The document discusses SAP BASIS and security administration. It describes SAP security components including authorization concepts using user IDs, profiles, and authorizations. It outlines the process for security configuration in SAP, including user authentication, creating and assigning authorization profiles, auditing and monitoring, and administration and maintenance. The key aspects of security configuration are creating activity groups to generate authorization profiles, auditing user access and changes, and monitoring default profiles and users.
FieldPower is a field service management application that optimizes field service operations through work order management, scheduling, dispatch, technician management, reporting, and inventory management. It aims to assign the right technician with the right skills, equipment, and parts to jobs at the lowest cost. FieldPower is a web-based solution that can be hosted online or on-premise. It provides benefits like reduced costs, enhanced customer satisfaction and technician utilization through features like routing optimization, real-time communications and analytics.
Similar to Server and Asset Management System Project Proposal (20)
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
UiPath Test Automation using UiPath Test Suite series, part 6
Server and Asset Management System Project Proposal
1. Server and Asset Management
System Project Proposal
Drafted for
Cerner Healthcare –
Managed Systems
Department
51 Valley Stream Parkway
Malvern, PA
19355
Cappelletti, Michael
and Lewis, Ian
December 13, 2015
2. Cerner Healthcare’s managed services department currently uses a variety of
methods for storing information about their clients’ servers, including an SQL
database (CMDB), and various spreadsheets and documents. The Managed Services
team spends a collective 30 hours per week on locating, updating, and
disseminating information regarding client servers for updates, maintenance, and
repairs. At an average estimated pay of $35/hour, this equates to $1,050 per week,
or $54,600 lost per year.
To streamline this process, we propose implementing Asset Panda –
a web application that can be integrated with CMDB in order to provide an
accessible, centralized repository for server information. Asset Panda can be
accessed through a web browser or a mobile application, allowing Cerner
employees to view and update information both on premise (at Cerner), or on site,
after performing maintenance on a server. The application includes QR code and
barcode functionality, allowing Managed Services team members to quickly look up a
server on site without entering long-winded ID codes.
A standard edition of Asset Panda, with 1,500 assets (Managed Services’ servers),
costs $1,699 yearly. Using Asset Panda would reduce the amount of time spent (per
week per employee) on managing server information from about 1.5 hours to about
30 min, resulting in a total savings of $34,701 per year, as well as the practical
advantage of having one repository for server information, as opposed to many,
disparate sources and methods of management. This proposal details an
implementation plan, relevant changes that would be made to the server information
management process, estimated costs, and possible risks that would be involved in
implementing Asset Panda.
Executive Summary
2
3. Table of Contents
Table of Contents
Executive Summary..............................................................................2
Statement of Opportunity....................................................................4
Asset Panda for Cerner Healthcare...................................................5
Key Features.....................................................................................5
Structure...........................................................................................7
An Improved Management Process.................................................9
Risks and Mitigation..........................................................................12
Budget...............................................................................................13
Conclusions.....................................................................................14
3
Contact Information
Michael Cappelletti
mlc322@psu.edu
(610).636.2359
Ian Lewis
iil5029@psu.edu
(814).321.8540
4. Statement of Opportunity
Managed Services team members regularly have to identify and retrieve
information regarding current client servers, such as the server’s name, location,
configuration and hardware, performance issues, storage and memory capacity, and
whether or not it has been decommissioned, among other variables. Currently,
several methods exist to retrieve the requisite information for client server updates,
changes and maintenance – an irregularly updated database (referred to as CMDB),
individual reports on each server, and various cumbersome excel spreadsheets.
This problem stems mainly from two root causes:
(1) The recent acquisition of Siemens Healthcare by Cerner Healthcare – former
clients of Siemens Healthcare are now (as of February 2015) a subset of clients of
Cerner Healthcare, and the current Managed Services department is now
responsible for Seimens’s former clients and Cerner’s former clients before the
merger. Because of this acquisition, the Managed Services has also inherited
multiple methods of managing information about these clients’ servers.
(2) The speed at which business operates – Cerner is not short-staffed by any
means, but as a fast-paced business, opportunities to improve processes
sometimes fall by the wayside. The existence of redundant systems for updating
client information has been perpetuated because employees have not had time
to sit down and create a unified system, as they are focused on simply doing their
jobs.
It has been estimated that, collectively, employees waste 30 hours per week on
gathering current information regarding client servers from disparate sources. There
are at least 20 employees responsible for this task. At an average pay of $35/hour,
$1,050 per week (or $54,600 per year) is a rough estimate for how much money is
currently wasted on gathering this information.
The goal of this project is to implement an asset management
system that integrates these disparate sources of information
as automatically as possible using Asset Panda, in order to save
time and money for the Managed Services Department.
4
5. Asset Panda for Cerner Healthcare
Figure 1 – Hypothetical “Managed Servers” Page in Asset Panda
I – Key Features
Asset Panda has a straightforward user interface, accessible by logging into their
website. Asset Panda is designed as a general asset management system, which can
be customized to reflect the specific needs of an organization. There are several key
features provided by Asset Panda that we believe would streamline the server
information management process –
Usability: Asset Panda has an intuitive user interface that organizes asset entries
by groups, allows users to search for entries by any or all field(s), and is
completely customizable. Users can add or change the names and attributes of
groups and fields to best fit their needs. Asset Panda can be accessed from a
browser as a web application (http://www.assetpanda.com), or through an Android
or iOS mobile application. This would allow the Managed Services team to access
Asset Panda from the Cerner office and on site at client locations.
Actions: users can perform actions upon assets within Asset Panda, which can
have customized results. For example, the default “Repair” action in Asset Panda
prompts the user for the scheduled date, completion date, repair location, staff
member assigned to the repair, repair cost, and any miscellaneous notes. After the
action is performed, the results are logged in the object’s (asset’s) history. Users
can configure actions to have custom fields – for example, a “Repair Type” field
could be created with a drop-down menu, containing “Hardware,” “Software,” and
“Other” as options.
5
6. Asset Panda for Cerner Healthcare
I – Key Features (cont’d)
Calendar: the Managed Services team has reurring
obligations to service client servers. Asset Panda
contains a calendar function, that allows users to
schedule actions ahead of time. This feature can be
used to send notifications to users at set times
before upcoming scheduled actions – Managed
Systems team members would receive notifications
detailing which server needs maintenance, its
location, and what actions must be performed during maintenance.
Flexibility: Asset Panda is fully customizable. Users can create objects within the
system, assign them attributes, and add them to groups. Asset Panda’s group
function can be customized as well – objects (in our case, servers) can be grouped
according to some attribute, which could be helpful for sorting servers by location,
hardware type, software type, and client.
Integration Services: Asset Panda offers integration services, which could be used
to leverage the information already within CMDB (the existing Managed Systems
server information database). Existing servers, and their attributes, can be drawn
from CMDB to populate Asset Panda, then checked against other spreadsheets
and reports to ensure accuracy before use.
QR Code/Barcode Support: Asset Panda contains a QR code and barcode feature
that generates printable sheets of codes, allowing users to tag their physical
assets. Managed Services could potentially use this feature to tag each client’s
servers – then, when on-site, Managed Services team members can simply scan the
server’s tag on their mobile device to access the server’s information within Asset
Panda. This further streamlines the process, and reduces the possibility of human
error. This feature can be used when adding a new server to the system as well –
the user can simply scan the barcode or QR code into the “Server ID” field.
Figure 2 – Hypothetical “Server” Object in Asset Panda
Figure 2 is an example of what a
server might look like in Asset Panda.
Users can enter a Server ID, Name,
Client, Storage and Memory Capacity,
Location, OS, Software Configuration,
and miscellaneous notes for each server
(and indicate whether it is a physical or
virtual resource, and whether it’s been
decomissioned). Managed Services
team members can perform actions by
clicking an action button (e.g. “Repair”)
while on site with the client, eliminating
concerns of whether information is
up-to-date.
6
7. Asset Panda for Cerner Healthcare
7
II – Structure
Asset Panda’s default configuration contains three objects relevant to the Managed
Services Department: “Areas,” “Locations,” and “Assets.” Areas are groups of
Locations, and Locations are attributes of Assets (containing a name, address, and
other fields). These relationships are illustrated in Figure 3:
Area
Location
Location
Asset
Asset
Client
Location
Location
Server
Server
Figure 3 – Hierarchy of Default Objects in Asset Panda
(arrows flow from higher order objects to dependent objects)
Figure 4 – Hierarchy of Customized Objects in Asset Panda
This configuration can be easily edited to reflect the relationships between Clients,
Locations, and Servers. Cerner has many clients with multiple locations, and each
location may contain many servers. This relationship is illustrated below in Figure 4:
To configure Asset Panda as illustrated in Figure 4, the user must navigate to the
“Group Settings” page. By clicking on “Edit” for the groups “Area” and “Assets,”
the user can change the name of the group to “Client” and “Servers,” and for
Servers, add and edit the various fields/variables that need to be managed (e.g.
“Hardware Specifications,” “Operating System,” etc.). The following page contains
screenshots of this process.
8. Asset Panda for Cerner Healthcare
8
Figure 5 – Location of
“Group Settings” Page
in Asset Panda
Figure 6 – Default Group Names in Asset Panda
Figure 7 – Updated Group Names in Asset Panda
II – Structure (cont’d)
The figures below contain hypothetical “Client” and “Location” objects in
Asset Panda. Refer to Figure 2 on page 6 for a hypothetical “Server” object.
Figure 8 – Hypothetical Client in Asset Panda
(comprised of two locations)
Figure 9 – Hypothetical Location in Asset Panda
9. Asset Panda for Cerner Healthcare
III – An Improved Management Process
The figures below contain activity diagrams, detailing how Managed Systems team
members might use Asset Panda to manage server information.
9
Figure 10 – Asset Panda Notifies a User of Routine Server Maintenance
10. Asset Panda for Cerner Healthcare
III – An Improved Management Process (cont’d)
10
Figure 11 – User Accesses Asset Panda through Cerner’s Network
11. Asset Panda for Cerner Healthcare
11
III – An Improved Management Process (cont’d)
Figure 12 – User Accesses Asset Panda through Secure VPN
12. Risks and Mitigation
12
We have identified three main risks for Cerner implementing Asset Panda as a
Server Information Management System – (1) security, (2) data migration/integration,
and (3) acceptance by Managed Systems team members. The probability and impact
of these risks is detailed in Figure 13. This is followed by a discussion of these risks,
and mitigation strategies.
Probability
Impact
User Acceptance
Data
Migration /
Integration
Security
Figure 13 – Probability and
Impact Chart of Project Risks
User Acceptance: this is a low-probability, high-impact risk. Though we do not
believe the Managed Systems team will reject Asset Panda due to its usability,
features, and flexibility, this project’s success hinges on its proper use in the client
server management process. We suggest conducting extensive user testing as a
mitigation strategy, in order to ensure that the team will use Asset Panda in practice.
Data Migration/Integration: this is a medium-probability, medium-impact risk.
Asset Panda’s website does not discuss how much they charge for integration or
data migration on their website, and it is not clear whether CMDB could be used to
host the back-end data. As a mitigation strategy, we recommend consulting a
representative of Asset Panda.
Security: this is a medium-probability, low-impact risk. Though users can access
Asset Panda remotely through the Citrix VPN Portal, it is not clear whether users of
the mobile application will be able to do so securely – depending on Cerner’s
security practices, it may or may not be feasible to use the QR code scanning
function (since it requires the use of a mobile device). Since this information is not
critical (i.e. a security breach would have very little impact for Cerner or its clients),
Asset Panda’s default security is not necessarily a major concern. As a mitigation
strategy, we suggest consulting a representative of Asset Panda, as well as other
organizations that have used their services to see if any have suffered security
breaches.
13. Budget
13
A standard edition of Asset Panda, with 1,500 assets (Managed Services’ servers),
costs $1,699 yearly. Using Asset Panda would reduce the amount of time spent (per
week per employee) on managing server information from about 1.5 hours to about
30 min, resulting in a total savings of $34,701 per year. This figure does not take
into account the costs of implementation. Below is a table of estimated expenses for
implementation and the first year of use.
Component Estimated Cost
Asset Panda Subscription
(1500 assets)
$1,699
Integration and/or
Data Migration
$200
Project Planning Labor
– one week, one full-time
employee
$1,400
Implementation Labor (i.e.
configuring Asset Panda)
– one week, one full-time
employee
$1,400
Total $4,699
Figure 14 – Estimated Implementation and First Year of Use Costs
This prelimenary budget assumes that one employee can spend one week
planning, and one week implementing Asset Panda. Taking into account
implementation costs, this project’s ROI during the first year will be about $31,701.
Each following year, Asset Panda will save Managed Systems $34,701, because of the
amount of time this system can save team members.
14. Conclusions
14
For the reasons discussed earlier – its features, usability, and capacity to streamline
the managed server information management process – we recommend
implementing Asset Panda within the Managed Systems Department. This would
cost approximately $4,699 during the first year, and would save approximately
$34, 701 yearly. Though risks present themselves in the areas of user acceptance,
data migration/integration, and security, we believe that the benefits of this project
outweigh these risks, especially if mitigated. The authors of this proposal can be
contacted at the e-mail addresses and phone numbers listed on page 3 for further
inquiry.