New roles in Technology Migration issues – Rule of PO 2.7(b)1.

Slides:



Advertisements
Similar presentations
© 2012 All rights reserved to Ceedo. Enhanced Mobility with Tighter Security.
Advertisements

Wireless Networking Thornbury U3A Computer Club Mike Farquhar 2010.
P3, M2,M3,M4.
Module 1: Installing Windows XP Professional
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter 14 Upgrading to Exchange Server 2003.
Operating System Customization
Concepts of Database Management Seventh Edition
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 8 Introduction to Printers in a Windows Server 2008 Network.
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
Managing a computerised PO Operating environment 1.
ILLiad Migration & Server Upgrade: From Your Library's' IT Point of View Juan Denzer Library System Specialist August 1, 2013.
11 MAINTAINING THE OPERATING SYSTEM Chapter 5. Chapter 5: MAINTAINING THE OPERATING SYSTEM2 CHAPTER OVERVIEW Understand the difference between service.
1 Computer Security: Protect your PC and Protect Yourself.
Welcome to Networking! 1. Connect your computer to the network with a cable 2. Copy the Networking folder from the flash drive to the computer or your.
Event Viewer Was of getting to event viewer Go to –Start –Control Panel, –Administrative Tools –Event Viewer Go to –Start.
11 MAINTAINING THE OPERATING SYSTEM Chapter 5. Chapter 5: MAINTAINING THE OPERATING SYSTEM2 CHAPTER OVERVIEW  Understand the difference between service.
Incident Response Updated 03/20/2015
Installing Windows Vista Lesson 2. Skills Matrix Technology SkillObjective DomainObjective # Performing a Clean Installation Set up Windows Vista as the.
DWR-113 FAQ’s 3G WiFi Router.
Chapter 7 Installing and Using Windows XP Professional.
Vendor management. What is vendor management? Everything that happens after the vendor starts delivering the equipments and other high value items purchased.
Chapter 2: Installing and Upgrading to Windows Server 2008 R2 BAI617.
P6 - CONFIGURE THE SOFTWARE. CONFIGURE SOFTWARE Most software can be configured to suit an individual user, for example by changing the appearance of.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
Fundamentals of Networking Discovery 1, Chapter 2 Operating Systems.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
INTRODUCTION TO OPERATING SYSTEMS. An operating system is a program that controls the overall activity of a computer. Like an orchestra conductor an operating.
XA R7.8 Upgrade Process and Technical Overview Ruth Anne Pharr Sr. IT Consultant, CISTECH Inc.
Term 2, 2011 Week 3. CONTENTS The physical design of a network Network diagrams People who develop and support networks Developing a network Supporting.
Managing Computerised Offices Operating environment
Alabama Supercomputer Authority A partnership of … and.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 15 Installing and Using Windows XP Professional.
Tutorial 11 Installing, Updating, and Configuring Software
Module 4: Add Client Computers and Devices to the Network.
Concepts of Database Management Sixth Edition
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
Hands-On Microsoft Windows Server 2003 Administration Chapter 2 Managing Windows Server 2003 Hardware and Software.
蓄勢待發迎WebSAMS Preparation Forum for WebSAMS Implementation Document 12
Chapter Fourteen Windows XP Professional Fault Tolerance.
Concepts of Database Management Eighth Edition
1 © 2004, Cisco Systems, Inc. All rights reserved. CISCO CONFIDENTIAL Using Internet Explorer 7.0 to Access Cisco Unity 5.0(1) Web Interfaces Unity 5.0(1)
W2K Server Installation It is very important that before you begin to install Windows 2000 Server, you must prepare for the installation by gathering specific.
The Handover Process P6.
C HAPTER 2 Introduction to Windows XP Professional.
5.1 © 2004 Pearson Education, Inc. Exam Designing a Microsoft ® Windows ® Server 2003 Active Directory and Network Infrastructure Lesson 5: Planning.
11 SUPPORTING APPLICATIONS IN WINDOWS XP PROFESSIONAL Chapter 9.
Module 1: Installing Microsoft Windows XP Professional.
Capital Budget System (CBS) Agency Training 1. Introductions… Name Name Agency Agency Capital Budget System Role Capital Budget System Role Goals for.
1 Week #10Business Continuity Backing Up Data Configuring Shadow Copies Providing Server and Service Availability.
11 INSTALLING AND MANAGING HARDWARE Chapter 6. Chapter 6: Installing and Managing Hardware2 INSTALLING AND MANAGING HARDWARE  Install hardware in a Microsoft.
Module 4 Planning for Group Policy. Module Overview Planning Group Policy Application Planning Group Policy Processing Planning the Management of Group.
Chapter 13: LAN Maintenance. Documentation Document your LAN so that you have a record of equipment location and configuration. Documentation should include.
1 COMPUTER LAB REGULATION
…the basics…. Wildland Fire Information and Technology Server Requirements ● Windows 7 Professional or Windows 2003/2008 Server ● Windows 8/10 (discussion)
John Samuels October, Why Now?  Vista Problems  New Features  >4GB Memory Support  Experience.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Proctor Caching Overview. 2 Proctor Caching Diagram.
Archiving and Document Transfer Utilities
Fix Microsoft Office Error Code Call
Call to Fix QuickBooks Error
Lesson #8 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 8 Configuring Applications and Internet Explorer.
Chapter 2 Objectives Identify Windows 7 Hardware Requirements.
Real Microsoft Exam Questions and Answers
QuickBooks accounting solution has emerged as a boon for small and medium businesses. This software has changed the way accounting and bookkeeping is.
Lesson #7 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 7 Configuring Devices and Updates.
IT Office hours – 1 Data Sharing 101
SBS 2008 – One year on David Overton
Presentation transcript:

New roles in Technology Migration issues – Rule of PO 2.7(b)1

Background Implementation of IT modernisation project brings in new technology This requires movement to a new network and accepting new applications which are more robust Offices migrating to new technology need to adopt to the changes 2.7(b).2

Network integration One of the contracts in the IT Modernisation project The contract is awarded to M/s Sify This involves networking all Post offices, Administrative offices, PAOs through a single wide area network The role of the network integrator is to provide devices for network connectivity and connect each PO to the central network The network service provider provides two networks – Main NSP1 from BSNL and secondary NSP2 from SIFY with half the bandwidth of main network and becomes operational when main network fails Vendor will maintain the equipments for a period of 5+2 years 2.7(b).3

Role of PO Ensure power supply with good earthing Power supply has to be through UPS LAN network should be ready upto the point identified for placing network equipments Secure network devices received till the arrival of SIFY representative for installation On successful installation, sign the user acceptance test report after verifying for the working of the network and all the existing applications 2.7(b).4

Role of PO cont’d Ensure that all the systems are configured for the new network with the assistance of identified system administrator Once systems are configured for new network, they should not be moved within the office or outside 2.7(b).5

Role of PO after commissioning Each office is given a code; This should be noted down and indicated in any correspondence with the service provider The router, switch and other equipments provided should be kept always on The system administrators have to disable all USB and CD drives in systems except the system identified for taking backups 2.7(b).6

Existing network configurations should not be modified If there are any network related problems, a ticket(complaint event) should be raised with SIFY help desk in the toll free number ( ) mentioning the office code 2.7(b).7

Operating system related issues If any offices are supplied with systems with Windows XP, issue to be taken up with DO for upgrading the operating system to Windows 7/8 as the support for the operating system is nearing to end 2.7(b).8

Requirements for CBS migration Office data should be kept clean and data profiler tool should be used to generate files and updated in CBS pre-monitoring site till migration On the date of migration ensure that migration is smooth and preserve a copy of the reports generated during migration and compare the same with the reports of balances generated in the office database (System administrator provides the office reports) Postmaster should sign off the migration only on successful comparison 2.7(b).9

Requirements for CBS migration The computers in the office are configured as required by Infosys for running Finacle Finacle requires internet explorer 8 with certain configuration settings; No attempt should be made to upgrade or downgrade the internet explorer version These settings should not be modified or attempts should not be made to restore default settings in the Internet explorer configurations User security and browser security should be strictly implemented Anti virus solution provided should be installed in all systems and no attempts should be made to turn off auto- updates and auto-scanning 2.7(b).10

Requirements for PLI migration PLI application (Mccamish) also requires Internet explorer 8 with certain additional configurations System administrator carries out these configuration changes; no attempt should be made to change these 2.7(b).11

Thank you 2.7(b)12