You are on page 1of 5

IT Implementation Plan As technology advances, hardware and operating systems become outdated and limited.

A system that is initially on the razors edge of new technology is sometimes obsolete within a few years. Many corporations and organizations find that the software and hardware used in their mainframe computing systems are unable to compete with modern network server systems. To maintain a competitive edge, it is sometimes necessary to migrate stored information, such as data and programs, to a newer system. I will first need to analyze the needs of the affected participants to determine migration schedules, training requirements, and operational cutover to the new system. Initiate the migration planning effort at the outset of the project before the development and implementation approach is set in concrete. Involve customers and users in the migration planning effort. I then will actively monitor and manage the migration. Implementing performance management takes time and effort. Strong performance management practices are critical to the success of almost any organization. When it is effective, performance management drives positive operational outcomes by encouraging the desired attitudes, behaviors and results in employees. I will start by identifying employee training and professional development needs, promoting accountability, and creating a framework for ongoing support and guidance. I am going to be using teamquest software to improve and maintain performance. The performance analysis tool helps monitor performance and alerting appropriate people or software when problems are detected. It will help correlate performance data to locate the IT component that is the root cause. The performance analysis tool will analyze trends to determine how best to ensure that service levels will be met in the future. Storage management is a process used to optimize the use of storage devices and to protect the integrity of data for any media on which it resides. There are a variety of

considerations that come into play when configuring infrastructure storage for optimal performance. From the Size and type of processor main memory to the Storage area networks are considered to optimize performance. Anvil's Storage Utilities is a powerful tool that was designed in order to provide you with a simple means of assessing the read and writer performance of your Solid State Drive or Hard Disk Drive. The benchmark tool helps you monitor and check the response time of your unit as well as view the system information collected using Windows Management Instrumentation (WMI).

Managing data does not have to be challenging; it just needs proper planning, measurement and a clear understanding of its business value. A data backup is the result of copying or archiving files and folders for the purpose of being able to restore them in case of data loss. Unplanned disruptions can severely impact your business and may result in several challenges, from revenue loss to erosion of customer trust. I will be using quantum to manage, backup, and recover data. If you need to provide fast, shared access to an ever-growing mountain of unstructured data, and ever-larger files, you are probably all too aware of the limitations of conventional approaches to storing, managing and protecting data. That is why Quantum takes a holistic, lifecycle approach to data management and data protection. StorNext allows users to rapidly share data across UNIX, Linux, Windows and Mac operating systems, whatever the underlying storage platforms may be. You have the assurance of flexibility and uninterrupted data access, even as you change and grow your existing server and storage environment. With StorNext data management software, you get high-speed content sharing combined with cost-effective data archiving. Quantum has unrivalled experience, technology, and an integrated solution set that has proven effective in managing some of the world's most

demanding Big Data environments. Quantum DXi disk-based backup with deduplication is ideal for fast backups and can reduce storage requirements by 90 percent or more. Deduplication helps lower costs with disk backup, and tape is ideal for storing data over long periods of time due to its automated management, scalability, and low power consumption. Networks are the primary means of inter-computer communications. Our network managers can design and employ a highly resilient end-to-end enterprise network using the Extreme Networks switching platform and the EAPS protocol. EAPS can be used in the network edge to provide link resiliency for Ethernet and IP services in a partial-meshed design. In the aggregation layer, EAPS interconnects multiple edge and core domains. When combined with VRRP and OSPF in the aggregation layer, EAPS provides the foundation for highly resilient IP routing by protecting against link and switch failures. The Distributed Benchmark System (DBS) is a performance benchmark tool for TCP/IP networks that attempts to expand on the capability of NetSpec. NetSpec is a tool that was designed to simplify the process of doing network testing, as opposed to doing point to point testing. NetSpec provides a fairly generic framework that allows a user to control multiple processes across multiple hosts from a central point of control. NetSpec consists of daemons that implement traffic sources/sinks and various passive measurement tools. DBS supports retransmission control and congestion avoidance performance evaluation across multiple dynamic connections. Security is needed so you can be confident you can transact properly without interruption, it also helps prove any compliance you have to adhere to and gives the capability to have a wider business audience, as well as providing evidence top any auditors which monitor your company. When your information is not adequately protected, it can be vulnerable to security threats, and may even possibly be compromised. Routinely cleaning up unnecessary or unsafe programs and

software, applying security patches, and performing routine scans to check for intrusions can help maintain security. Performing vulnerability and penetration testing on your security systems monthly or quarterly can catch kinks in the armor. The first step towards enhancing a company's security is the introduction of a precise yet enforceable security policy, informing staff on the various aspects of their responsibilities, general use of company resources and explaining how sensitive information must be handled. Risk Analysis and Risk Management play an essential role in the proper functionality of the process. Risk Analysis is the process of identifying the critical information assets of the company and their use and functionality, an important key process that needs to be taken very seriously. Password creation, passwords aging, minimum password length, characters to be included while choosing passwords, and password maintenance are a great start. The advantages of regular system scanning, as well as the potential problems of not scanning your systems need to highlighted as well; although they know that AV scanners will not detect new viruses, they will at least know that they can reduce the risk, and properly manage the danger. Scanning the systems using outdated signature files is another common problem that needs to be touched upon. Staff should update their AntiVirus/Anti-Trojan software at least once a week, and if the software allows centralized automatic updates, updates must be scheduled on a regular basis to ensure the software detects the latest viruses/trojans/worms. Basic firewall protection is critical for securing your PC. Simple firewalls (like the default Windows firewall) limit access to your system and personal information, and silently protect you from inbound threats. ZoneAlarm Free Firewall is an excellent inbound/outbound OS firewall solution suited for users of every level of experience. ZoneAlarm protects systems from intrusions as well as program access to the web. ZoneAlarm features an easy-to-understand user interface. Users can adjust security settings for their needs to

allow for file/printer sharing, public networks, and even turn off the firewall if ever needed. Simple controls in the form of visual slide bars make setting up this firewall a snap. ZoneAlarm offers to help users setup initial program access with a first-run scan of installed software and allows/denies accordingly.

You might also like