Presentation is loading. Please wait.

Presentation is loading. Please wait.

Presentation from IT/Systems Bibhas Kr Samanta. Presentation from IT CAMP-09 Outline Introduction to Interra IT infrastructure Working in networked environment.

Similar presentations


Presentation on theme: "Presentation from IT/Systems Bibhas Kr Samanta. Presentation from IT CAMP-09 Outline Introduction to Interra IT infrastructure Working in networked environment."— Presentation transcript:

1 Presentation from IT/Systems Bibhas Kr Samanta

2 Presentation from IT CAMP-09 Outline Introduction to Interra IT infrastructure Working in networked environment Revisiting unix commands Dos and DONTs

3 IT

4 Presentation from IT CAMP-09 What is IT/Systems ? – Owns all computing resources and provide IT services - Typical Supports Hardware/software/licenses procurement, installation, configuration and maintenance User support on related tasks Network configuration, tuning, maintenance Software development, maintenance and support Companys Internal developments, tools Owner of Companys Internal Servers (Webmail, Mail, DNS, Gnats etc) Develop and maintain Intranet server Ownership of Companys website –

5 Presentation from IT CAMP-09 IT – Organizational Structure IT – Organizational Structure

6 Network Setup

7 Presentation from IT CAMP-09 Basic Network Services Authentication – NIS File Sharing – NFS and automounter Mail – Unix/Sendmail and POP3 Webmail WWW Server : Unix/Apache Intranet Server : Windows/IIS

8 Presentation from IT CAMP-09 Bangalore setup Projects : Mostly TI Projects Setup - Dedicated 2mbps point to point setup between TI and Interra – Switches ( CISCO, DELL), Router (CISCO), Firewall (CISCO) – 512kbps (1:4) internet link and DSL link – Approx 60 desktops and laptops – Laserjet and deskjet printers, scanner

9 Presentation from IT CAMP-09

10 Noida setup Projects – EDA IP and services – DMG Product and Services Approx 100 machines – unix, windows,laptops etc Unix machines are connected in NIS environment Windows machines are in local authentication mode, antivirus installed in each machine Secured Wireless network present Switches ( CISCO, Nortel), Router (CISCO), Firewall (Sonicwall, Netscreen) Access control system and CCTV installed Links : 1mbps Leased line, 2mbps DSL LaserJet and DeskJet printers, scanner

11 Presentation from IT CAMP-09 Noida network

12 Presentation from IT CAMP-09 Kolkata setup Projects – EDA IP and Services – Software Technology Services – DMG Services Approx 120 machines – unix, windows,laptops Unix machines are connected in NIS environment Windows machines are in local authentication mode, antivirus installed Secured Wireless network present Links : 512kbps leased line, 2mbps & 8mbps DSL

13 Presentation from IT CAMP-09

14 US Setup US – T1 ( 1.54 Mbps) internet link – Switches ( Nortel), Routers (CISCO), Firewall (Sonicwall) – Few desktops and laptops – Server for – LaserJet and DeskJet printers, scanner

15 Presentation from IT CAMP-09 Company wide Servers Interras web server Intranet Jira License cutting software Mail and Webmail VPN Server

16 Presentation from IT CAMP-09 Platforms Hardware/Processor: OS – Linux X86 (IA 32 bit): RH 7.2, RH9, RHEL 3.0, RHEL 4.0 X86_64 (AMD, 64 bit): RHEL 3.0, RHEL 4.0, Fedora Core 3.0 Fedora Core 5.0 – Solaris SPARC (32bit) : Solaris 5.6, Solaris 7, Solaris 8 SPARC (64 bit): Solaris 7, Solaris 8, Solaris 9, Solaris 10 X86 (64bit) – Solaris 10 – HP PA RISC (32/64bit) : HP11.00 – Windows X86 (32 bit) : Windows 2000, XP X86 (64bit) : Windows XP - Mac OS X - X86 (32/64bit) - Leopard

17 Presentation from IT CAMP-09 Compilers … Compilers … Linux – GCC 2.96, 3.2.1, Solaris : – GCC , 3.2.1, 3.4.3,.. – CC 5.0, CC 5.3 Windows – Microsoft C Compiler (.Net 2003,.Net 2005 ) – Cygwin/Mingw GCC 3.4.3, – Intel C++ – Perl 5.6, 5.8 HP – aCC Mac OS – gcc

18 Development Tools

19 Presentation from IT CAMP-09 Development Tools Environment/Scripting – C-Shell and related tools – Microsoft.NET – Cygwin – Mingw – perl, TCL Licensing – Flexlm ( Macrovison) Installer – Install shield ( Macrovision) Memory Tools – Rational Purify – Insure++ – BoundsChecker – valgrind

20 Presentation from IT CAMP-09 Development Tools Code Coverage – PureCoverage – Insure++ – gcov Testing Tools – Mercury Qtest Pro Performance Cheking Tools – Intel Vtune – Quantify

21 Presentation from IT CAMP-09 Development Tools Build / Debug Tools – Make – GDB/DDD – Workshop Debugger – Microsoft IDE Version Control – CVS/RCS – SVN

22 Presentation from IT CAMP-09 Source code organization Source Organization – Source code is kept under CVS repository organized according to project/product – File Naming conventions and structures are defined by Object/Product Manager. – This is also guided by different Coding guidelines

23 Presentation from IT CAMP-09 Documentation and Bug Tracking Bug Tracking/HelpDesk – GNATS – RT Documentation – MS-Office – Open Office – Adobe acrobat reader, writer – Framemaker – Adobe Robohelp

24 Presentation from IT CAMP-09 Other Tools Web Development – Page design : Dreamweaver, MS-FrontPage – Database : MS-SQL, mysql – Language/technology : ASP, PHP, perl, CGI, JavaScript – Webserver : IIS, Apache Project Management Tools – MS-Project – MS-Office

25 Presentation from IT CAMP-09 Other Tools- EDA Synopsys – VCS, Design Compiler, HDL Compilers, HSPICE Cadence – Verilog -XL, NC-Simulators, Modeltech ( Mentor) – VCOM/VSIM Magma – Blast Fusion Texas Instruments – TI tools

26 Presentation from IT CAMP-09 IT Policies & Guidelines Acceptable Usage policy (AUP) – Computing resources General security guidelines

27 Presentation from IT CAMP-09 Why – Acceptable Usage Policy Acceptable Use Policy are not to impose restrictions that are contrary to Interras established culture of openness, trust and integrity. We are committed to protecting Interra and its employees, from illegal or damaging actions by individuals, either knowingly or unknowingly Inappropriate use exposes Interra to risks including virus attacks, compromise of network systems and services, and legal issues. Intranet-> Systems ->IT Policies -> Acceptable Use Policy for Computing Resources

28 Presentation from IT CAMP-09 Privileges and Responsibilities Maintain the Security and Confidentiality of your Account Respect for others property (including IP), licensing, and privacy rights Responsible Sharing of computing resources and network bandwidth Respect Local Laws Good management of data Protecting confidential data and information

29 Presentation from IT CAMP-09 Personal Use ? Some limited personal use of the IT and communications system by employees is allowed provided that it is not excessive, does not interfere with their normal work or the work of others, does not involve in Interras significant expense, does not expose Interra to legal action or risk bringing Interra into disrepute, and does not relate to running a private business. Connecting personally owned hardware, software, network devices without proper authorization is not permitted Exercise good judgment while using IT resources for personal use.

30 Presentation from IT CAMP-09 Any violation of the above mentioned policies Harassing or threatening use Compromising Security. – Unauthorized use or access or internal/external network – Attempts to defeat system security or normal functioning – Violation of customer of any other external IT policies Prohibited and inappropriate use

31 Presentation from IT CAMP-09 Prohibited and inappropriate use Disguised use Violation of customer or any other external IT policies Distributing computer hoaxes and viruses

32 Presentation from IT CAMP-09 Remember.. Remember that sending from your Interra account is similar to sending a letter on an Interras letterhead Remember that the various civil and criminal laws relating to written communication apply equally to messages, including the laws relating to defamation, copyright, obscenity, fraudulent misrepresentation, and wrongful discrimination.

33 Presentation from IT CAMP-09 MASS s !! Mails to alias are strongly discouraged and need proper discretion in use. Hence, the mailing right to alias is restricted at every center. If you do not have this right and need to broadcast some information, please request your Manager for consideration

34 Presentation from IT CAMP-09 Rights of Monitoring by Company Rights of Monitoring by Company Like any other IT resources, data, and any other form of information stored in Companys network are property of Interra. Company reserves the right of monitoring and viewing of any data, , messages stored in Companys network or resources.

35 Presentation from IT CAMP-09 Training Setup Two in each group to share a machine Individual ID Machines can be Windows/Linux/Solaris Mail access through Webmail Internet access - IE, Netscape, Firefox Documentation : Office, Open Office

36 Presentation from IT CAMP-09 Getting help from Systems/IT Report problem immediately Kolkata : Support IDs – Noida – – Bangalore – Kolkata

37 Questions ?

38 Thanks !!


Download ppt "Presentation from IT/Systems Bibhas Kr Samanta. Presentation from IT CAMP-09 Outline Introduction to Interra IT infrastructure Working in networked environment."

Similar presentations


Ads by Google