Presentation is loading. Please wait.

Presentation is loading. Please wait.

Presentation from IT/Systems

Similar presentations


Presentation on theme: "Presentation from IT/Systems"— Presentation transcript:

1 Presentation from IT/Systems
Bibhas Kr Samanta

2 Presentation from IT CAMP-09
Outline Introduction to Interra IT infrastructure Working in networked environment Revisiting unix commands Dos and DON’Ts Presentation from IT CAMP-09

3 IT infrastructure @Interra

4 Presentation from IT CAMP-09
What is IT/Systems ? Owns all computing resources and provide IT services - Typical Supports Hardware/software/licenses procurement, installation, configuration and maintenance User support on related tasks Network configuration, tuning, maintenance Software development, maintenance and support Company’s Internal developments, tools Owner of Company’s Internal Servers (Webmail, Mail, DNS, Gnats etc) Develop and maintain Intranet server Ownership of Company’s website – Presentation from IT CAMP-09

5 IT – Organizational Structure
Presentation from IT CAMP-09

6 Network Setup

7 Basic Network Services
Authentication – NIS File Sharing – NFS and automounter Mail – Unix/Sendmail and POP3 Webmail WWW Server : Unix/Apache Intranet Server : Windows/IIS Presentation from IT CAMP-09

8 Presentation from IT CAMP-09
Bangalore setup Projects : Mostly TI Projects Setup - Dedicated 2mbps point to point setup between TI and Interra Switches ( CISCO, DELL), Router (CISCO), Firewall (CISCO) 512kbps (1:4) internet link and DSL link Approx 60 desktops and laptops Laserjet and deskjet printers, scanner Presentation from IT CAMP-09

9 Presentation from IT CAMP-09

10 Presentation from IT CAMP-09
Noida setup Projects EDA IP and services DMG Product and Services Approx 100 machines – unix, windows,laptops etc Unix machines are connected in NIS environment Windows machines are in local authentication mode, antivirus installed in each machine Secured Wireless network present Switches ( CISCO, Nortel), Router (CISCO), Firewall (Sonicwall, Netscreen) Access control system and CCTV installed Links : 1mbps Leased line, 2mbps DSL LaserJet and DeskJet printers, scanner Presentation from IT CAMP-09

11 Presentation from IT CAMP-09
Noida network Presentation from IT CAMP-09

12 Presentation from IT CAMP-09
Kolkata setup Projects EDA IP and Services Software Technology Services DMG Services Approx 120 machines – unix, windows,laptops Unix machines are connected in NIS environment Windows machines are in local authentication mode, antivirus installed Secured Wireless network present Links : 512kbps leased line, 2mbps & 8mbps DSL Presentation from IT CAMP-09

13 Presentation from IT CAMP-09

14 Presentation from IT CAMP-09
US Setup US T1 ( 1.54 Mbps) internet link Switches ( Nortel), Routers (CISCO), Firewall (Sonicwall) Few desktops and laptops Server for LaserJet and DeskJet printers, scanner Presentation from IT CAMP-09

15 Presentation from IT CAMP-09
Company wide Servers Interra’s web server Intranet Jira License cutting software Mail and Webmail VPN Server Presentation from IT CAMP-09

16 Presentation from IT CAMP-09
Platforms Hardware/Processor: OS Linux X86 (IA 32 bit): RH 7.2, RH9, RHEL 3.0, RHEL 4.0 X86_64 (AMD, 64 bit): RHEL 3.0, RHEL 4.0, Fedora Core 3.0 Fedora Core 5.0 Solaris SPARC (32bit) : Solaris 5.6, Solaris 7, Solaris 8 SPARC (64 bit): Solaris 7, Solaris 8, Solaris 9, Solaris 10 X86 (64bit) – Solaris 10 HP PA RISC (32/64bit) : HP11.00 Windows X86 (32 bit) : Windows 2000, XP X86 (64bit) : Windows XP Mac OS X X86 (32/64bit) - Leopard Presentation from IT CAMP-09

17 Presentation from IT CAMP-09
 Compilers … Linux GCC 2.96, 3.2.1, Solaris : GCC , 3.2.1, 3.4.3, .. CC 5.0, CC 5.3   Windows Microsoft C Compiler (.Net 2003, .Net 2005 ) Cygwin/Mingw GCC 3.4.3, Intel C++  Perl 5.6, 5.8 HP aCC Mac OS gcc Presentation from IT CAMP-09

18 Development Tools

19 Presentation from IT CAMP-09
Development Tools Environment/Scripting C-Shell and related tools Microsoft .NET Cygwin Mingw perl, TCL Licensing Flexlm ( Macrovison) Installer Install shield ( Macrovision) Memory Tools Rational Purify Insure++ BoundsChecker valgrind Presentation from IT CAMP-09

20 Presentation from IT CAMP-09
Development Tools Code Coverage PureCoverage Insure++ gcov Testing Tools Mercury Qtest Pro Performance Cheking Tools Intel Vtune Quantify Presentation from IT CAMP-09

21 Presentation from IT CAMP-09
Development Tools Build / Debug Tools Make GDB/DDD Workshop Debugger Microsoft IDE  Version Control CVS/RCS SVN Presentation from IT CAMP-09

22 Source code organization
Source Organization   Source code is kept under CVS repository organized according to project/product File Naming conventions and structures are defined by Object/Product Manager . This is also guided by different Coding guidelines Presentation from IT CAMP-09

23 Documentation and Bug Tracking
Bug Tracking/HelpDesk GNATS RT Documentation MS-Office Open Office Adobe acrobat reader, writer Framemaker Adobe Robohelp Presentation from IT CAMP-09

24 Presentation from IT CAMP-09
Other Tools Web Development Page design : Dreamweaver, MS-FrontPage Database : MS-SQL, mysql Language/technology : ASP, PHP, perl, CGI, JavaScript Webserver : IIS, Apache Project Management Tools MS-Project MS-Office Presentation from IT CAMP-09

25 Presentation from IT CAMP-09
Other Tools - EDA Synopsys VCS, Design Compiler, HDL Compilers, HSPICE Cadence Verilog -XL, NC-Simulators, Modeltech ( Mentor) VCOM/VSIM Magma Blast Fusion Texas Instruments TI tools Presentation from IT CAMP-09

26 IT Policies & Guidelines
Acceptable Usage policy (AUP) Computing resources General security guidelines Presentation from IT CAMP-09

27 Why – Acceptable Usage Policy
Acceptable Use Policy are not to impose restrictions that are contrary to Interra’s established culture of openness, trust and integrity. We are committed to protecting Interra and it’s employees, from illegal or damaging actions by individuals, either knowingly or unknowingly Inappropriate use exposes Interra to risks including virus attacks, compromise of network systems and services, and legal issues. Intranet-> Systems ->IT Policies -> Acceptable Use Policy for Computing Resources Presentation from IT CAMP-09

28 Privileges and Responsibilities
Maintain the Security and Confidentiality of your Account Respect for others property (including IP), licensing, and privacy rights Responsible Sharing of computing resources and network bandwidth Respect Local Laws Good management of data Protecting confidential data and information Presentation from IT CAMP-09

29 Presentation from IT CAMP-09
Personal Use ? Some limited personal use of the IT and communications system by employees is allowed provided that it is not excessive, does not interfere with their normal work or the work of others, does not involve in Interra’s significant expense, does not expose Interra to legal action or risk bringing Interra into disrepute, and does not relate to running a private business. Connecting personally owned hardware, software , network devices without proper authorization is not permitted Exercise good judgment while using IT resources for personal use. Presentation from IT CAMP-09

30 Prohibited and inappropriate use
Any violation of the above mentioned policies Harassing or threatening use Compromising Security. Unauthorized use or access or internal/external network Attempts to defeat system security or normal functioning Violation of customer of any other external IT policies Presentation from IT CAMP-09

31 Prohibited and inappropriate use
Disguised use Violation of customer or any other external IT policies Distributing computer hoaxes and viruses Presentation from IT CAMP-09

32 Presentation from IT CAMP-09
Remember .. Remember that sending from your Interra account is similar to sending a letter on an Interra’s letterhead Remember that the various civil and criminal laws relating to written communication apply equally to messages, including the laws relating to defamation, copyright, obscenity, fraudulent misrepresentation, and wrongful discrimination. Presentation from IT CAMP-09

33 Presentation from IT CAMP-09
MASS s !! Mails to alias are strongly discouraged and need proper discretion in use. Hence, the mailing right to alias is restricted at every center. If you do not have this right and need to broadcast some information, please request your Manager for consideration Presentation from IT CAMP-09

34 Rights of Monitoring by Company
Like any other IT resources , data, and any other form of information stored in Company’s network are property of Interra. Company reserves the right of monitoring and viewing of any data, , messages stored in Company’s network or resources. Presentation from IT CAMP-09

35 Presentation from IT CAMP-09
Training Setup Two in each group to share a machine Individual ID Machines can be Windows/Linux/Solaris Mail access through Webmail Internet access - IE, Netscape, Firefox Documentation : Office , Open Office Presentation from IT CAMP-09

36 Getting help from Systems/IT
Report problem immediately Kolkata : Support IDs Noida – Bangalore Kolkata Presentation from IT CAMP-09

37 Questions ?

38 Thanks !!


Download ppt "Presentation from IT/Systems"

Similar presentations


Ads by Google