Presentation from IT/Systems

Slides:



Advertisements
Similar presentations
Hiltronics Computers Getting Your Website Up! Frank Hill President/CEO Hiltronics Computers.
Advertisements

Working in networked environment. Presentation from IT CAMP-09 Network Architecture.
© , Actuate Corporation Engineer Orientation IT Facility.
Northside I.S.D. Acceptable Use Policy
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Introduction to Computer Administration Introduction.
Computer networks Fundamentals of Information Technology Session 6.
What is an operating system? Is it software?
 Prof. Dr. M. H. Assal Introduction to Computer AS 26/10/2014.
Chapter 7 Operating Systems and Utility Programs.
Software programs that enable you to view world wide web documents. Internet Explorer and Firefox are examples. Browser.
Uintah School District Acceptable Use for Computer and Network Access.
Security+ Guide to Network Security Fundamentals
System and Network Security Practices COEN 351 E-Commerce Security.
Content  Overview of Computer Networks (Wireless and Wired)  IP Address, MAC Address and Workgroups  LAN Setup and Creating Workgroup  Concept on.
Homework 3.2 Clients Hub What’s wrong with this picture? Clients Using 100TX.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Web Server Administration
INTERNET DATABASE Chapter 9. u Basics of Internet, Web, HTTP, HTML, URLs. u Advantages and disadvantages of Web as a database platform. u Approaches for.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
ACCEPTABLE An acceptable use policy (AUP), also known as an acceptable usage policy or fair use policy, is a set of rules applied by the owner or manager.
INTERNET and CODE OF CONDUCT
I Information Systems Technology Ross Malaga 3 "Part I Understanding Information Systems Technology" Copyright © 2005 Prentice Hall, Inc. 3-1 SOFTWARE.
CHAPTER Introduction to LANs. MODULE Purpose and Use of a Network.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Web Programming Language Dr. Ken Cosh Week 1 (Introduction)
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
PCM2U Presentation by Paul A Cook IT SERVICES. PCM2U Our History  Our team has been providing complete development and networking solutions for over.
Introduction to Computer Administration System Administration
SEEM4570: XAMPP, Eclipse, Summary of Html Kangfei Zhao Room 711,ERB
Getting Connected to NGS while on the Road… Donna V. Shaw, NGS Convocation.
John Hartley Mark Bransby Utilizing Adobe's Publishing Solutions for Distributed Web Publishing.
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Baselines Chapter 14.
Guide to Operating System Security Chapter 9 Web, Remote Access, and VPN Security.
Web Server Configuration Alokes Chattopadhyay Computer & Informatics Centre IIT Kharagpur.
Web Servers Web server software is a product that works with the operating system The server computer can run more than one software product such as .
CPS Acceptable Use Policy Day 2 – Technology Session.
Section Seven: Information Systems Security Note: All classified markings contained within this presentation are for training purposes only.
COMP 6005 An Introduction To Computing Session Two: Computer Software Systems Software.
Introductionto Networking Basics By Avinash Kulkarni.
1 Web Server Administration Chapter 1 The Basics of Server and Web Server Administration.
IST 210 Web Application Security. IST 210 Introduction Security is a process of authenticating users and controlling what a user can see or do.
MIS3300_Team8 Service Aron Allen Angela Chong Cameron Sutherland Edment Thai Nakyung Kim.
Solutions for BDMHS  JF&C is a highly qualified company that performs a wide variety if technical services in the Chicago land area to business, government.
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
INTRODUCTION TO SERVERS & INSTALLATION OF WINDOWS SERVER 2008 R2 Network Administration and Maintenance.
Protecting Students on the School Computer Network Enfield High School.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
Chapter 2 Securing Network Server and User Workstations.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
WHAT IS E-COMMERCE? E-COMMERCE is a online service that helps the seller/buyer complete their transaction through a secure server. Throughout the past.
Introduction TO Network Administration
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Web Page Designing With Dreamweaver MX\Session 1\1 of 9 Session 1 Introduction to PHP Hypertext Preprocessor - PHP.
2.2 Interfacing Computers MR JOSEPH TAN CHOO KEE TUESDAY 1330 TO 1530
Marion County Public Schools Acceptable Use Guidelines for Network Access.
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
Introduction to System Administration. System Administration  System Administration  Duties of System Administrator  Types of Administrators/Users.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Getting Connected to NGS while on the Road…
Web Programming Language
3.1 Types of Servers.
Using Technology to Manage Information
RBS Remote Business Support System
Unit 27: Network Operating Systems
Getting Connected to NGS while on the Road…
Presentation transcript:

Presentation from IT/Systems Bibhas Kr Samanta

Presentation from IT CAMP-09 Outline Introduction to Interra IT infrastructure Working in networked environment Revisiting unix commands Dos and DON’Ts Presentation from IT CAMP-09

IT infrastructure @Interra

Presentation from IT CAMP-09 What is IT/Systems ? Owns all computing resources and provide IT services - Typical Supports Hardware/software/licenses procurement, installation, configuration and maintenance User support on related tasks Network configuration, tuning, maintenance Software development, maintenance and support Company’s Internal developments, tools Owner of Company’s Internal Servers (Webmail, Mail, DNS, Gnats etc) Develop and maintain Intranet server http:://Intranet Ownership of Company’s website – www.interrasystems.com Presentation from IT CAMP-09

IT – Organizational Structure Presentation from IT CAMP-09

Network Setup

Basic Network Services Authentication – NIS File Sharing – NFS and automounter Mail – Unix/Sendmail and POP3 Webmail WWW Server : Unix/Apache Intranet Server : Windows/IIS Presentation from IT CAMP-09

Presentation from IT CAMP-09 Bangalore setup Projects : Mostly TI Projects Setup - Dedicated 2mbps point to point setup between TI and Interra Switches ( CISCO, DELL), Router (CISCO), Firewall (CISCO) 512kbps (1:4) internet link and DSL link Approx 60 desktops and laptops Laserjet and deskjet printers, scanner Presentation from IT CAMP-09

Presentation from IT CAMP-09

Presentation from IT CAMP-09 Noida setup Projects EDA IP and services DMG Product and Services Approx 100 machines – unix, windows,laptops etc Unix machines are connected in NIS environment Windows machines are in local authentication mode, antivirus installed in each machine Secured Wireless network present Switches ( CISCO, Nortel), Router (CISCO), Firewall (Sonicwall, Netscreen) Access control system and CCTV installed Links : 1mbps Leased line, 2mbps DSL LaserJet and DeskJet printers, scanner Presentation from IT CAMP-09

Presentation from IT CAMP-09 Noida network Presentation from IT CAMP-09

Presentation from IT CAMP-09 Kolkata setup Projects EDA IP and Services Software Technology Services DMG Services Approx 120 machines – unix, windows,laptops Unix machines are connected in NIS environment Windows machines are in local authentication mode, antivirus installed Secured Wireless network present Links : 512kbps leased line, 2mbps & 8mbps DSL Presentation from IT CAMP-09

Presentation from IT CAMP-09

Presentation from IT CAMP-09 US Setup US T1 ( 1.54 Mbps) internet link Switches ( Nortel), Routers (CISCO), Firewall (Sonicwall) Few desktops and laptops Server for www.interrasystems.com LaserJet and DeskJet printers, scanner Presentation from IT CAMP-09

Presentation from IT CAMP-09 Company wide Servers Interra’s web server Intranet Jira License cutting software Mail and Webmail VPN Server Presentation from IT CAMP-09

Presentation from IT CAMP-09 Platforms Hardware/Processor: OS Linux X86 (IA 32 bit): RH 7.2, RH9, RHEL 3.0, RHEL 4.0 X86_64 (AMD, 64 bit): RHEL 3.0, RHEL 4.0, Fedora Core 3.0 Fedora Core 5.0 Solaris SPARC (32bit) : Solaris 5.6, Solaris 7, Solaris 8 SPARC (64 bit): Solaris 7, Solaris 8, Solaris 9, Solaris 10 X86 (64bit) – Solaris 10 HP PA RISC (32/64bit) : HP11.00 Windows X86 (32 bit) : Windows 2000, XP X86 (64bit) : Windows XP Mac OS X X86 (32/64bit) - Leopard Presentation from IT CAMP-09

Presentation from IT CAMP-09  Compilers … Linux GCC 2.96, 3.2.1, 3.4.3 .. Solaris : GCC 2.95.2, 3.2.1, 3.4.3, .. CC 5.0, CC 5.3   Windows Microsoft C Compiler (.Net 2003, .Net 2005 ) Cygwin/Mingw GCC 3.4.3, Intel C++  Perl 5.6, 5.8 HP aCC Mac OS gcc Presentation from IT CAMP-09

Development Tools

Presentation from IT CAMP-09 Development Tools Environment/Scripting C-Shell and related tools Microsoft .NET Cygwin Mingw perl, TCL Licensing Flexlm ( Macrovison) Installer Install shield ( Macrovision) Memory Tools Rational Purify Insure++ BoundsChecker valgrind Presentation from IT CAMP-09

Presentation from IT CAMP-09 Development Tools Code Coverage PureCoverage Insure++ gcov Testing Tools Mercury Qtest Pro Performance Cheking Tools Intel Vtune Quantify Presentation from IT CAMP-09

Presentation from IT CAMP-09 Development Tools Build / Debug Tools Make GDB/DDD Workshop Debugger Microsoft IDE  Version Control CVS/RCS SVN Presentation from IT CAMP-09

Source code organization Source Organization   Source code is kept under CVS repository organized according to project/product File Naming conventions and structures are defined by Object/Product Manager . This is also guided by different Coding guidelines Presentation from IT CAMP-09

Documentation and Bug Tracking Bug Tracking/HelpDesk GNATS RT Documentation MS-Office Open Office Adobe acrobat reader, writer Framemaker Adobe Robohelp Presentation from IT CAMP-09

Presentation from IT CAMP-09 Other Tools Web Development Page design : Dreamweaver, MS-FrontPage Database : MS-SQL, mysql Language/technology : ASP, PHP, perl, CGI, JavaScript Webserver : IIS, Apache Project Management Tools MS-Project MS-Office Presentation from IT CAMP-09

Presentation from IT CAMP-09 Other Tools - EDA Synopsys VCS, Design Compiler, HDL Compilers, HSPICE Cadence Verilog -XL, NC-Simulators, Modeltech ( Mentor) VCOM/VSIM Magma Blast Fusion Texas Instruments TI tools Presentation from IT CAMP-09

IT Policies & Guidelines Acceptable Usage policy (AUP) Computing resources General security guidelines Presentation from IT CAMP-09

Why – Acceptable Usage Policy Acceptable Use Policy are not to impose restrictions that are contrary to Interra’s established culture of openness, trust and integrity. We are committed to protecting Interra and it’s employees, from illegal or damaging actions by individuals, either knowingly or unknowingly Inappropriate use exposes Interra to risks including virus attacks, compromise of network systems and services, and legal issues. Intranet-> Systems ->IT Policies -> Acceptable Use Policy for Computing Resources Presentation from IT CAMP-09

Privileges and Responsibilities Maintain the Security and Confidentiality of your Account Respect for others property (including IP), licensing, and privacy rights Responsible Sharing of computing resources and network bandwidth Respect Local Laws Good management of data Protecting confidential data and information Presentation from IT CAMP-09

Presentation from IT CAMP-09 Personal Use ? Some limited personal use of the IT and communications system by employees is allowed provided that it is not excessive, does not interfere with their normal work or the work of others, does not involve in Interra’s significant expense, does not expose Interra to legal action or risk bringing Interra into disrepute, and does not relate to running a private business. Connecting personally owned hardware, software , network devices without proper authorization is not permitted Exercise good judgment while using IT resources for personal use. Presentation from IT CAMP-09

Prohibited and inappropriate use Any violation of the above mentioned policies Harassing or threatening use Compromising Security. Unauthorized use or access or internal/external network Attempts to defeat system security or normal functioning Violation of customer of any other external IT policies Presentation from IT CAMP-09

Prohibited and inappropriate use Disguised use Violation of customer or any other external IT policies Distributing computer hoaxes and viruses Presentation from IT CAMP-09

Presentation from IT CAMP-09 Remember .. Remember that sending email from your Interra account is similar to sending a letter on an Interra’s letterhead Remember that the various civil and criminal laws relating to written communication apply equally to email messages, including the laws relating to defamation, copyright, obscenity, fraudulent misrepresentation, and wrongful discrimination. Presentation from IT CAMP-09

Presentation from IT CAMP-09 MASS Emails !! Mails to all@ alias are strongly discouraged and need proper discretion in use. Hence, the mailing right to all@ alias is restricted at every center. If you do not have this right and need to broadcast some information, please request your Manager for consideration Presentation from IT CAMP-09

Rights of Monitoring by Company Like any other IT resources , data, Email and any other form of information stored in Company’s network are property of Interra. Company reserves the right of monitoring and viewing of any data, email, messages stored in Company’s network or resources. Presentation from IT CAMP-09

Presentation from IT CAMP-09 Training Setup Two in each group to share a machine Individual Email ID Machines can be Windows/Linux/Solaris Mail access through Webmail Internet access - IE, Netscape, Firefox Documentation : Office , Open Office Presentation from IT CAMP-09

Getting help from Systems/IT Report problem immediately Kolkata : ssk_issues@noida.interrasystems.com Support Email IDs Noida – systems@noida.interrasystems.com Bangalore systems@blr.interrasystems.com Kolkata systems@cal.interrasystems.com sos@cal.interrasystems.com Presentation from IT CAMP-09

Questions ?

Thanks !!