Friday 31 July 2020

OFFICETOOLS TEAMS WITH IVDESK

OfficeTools®, creator of the business driving practice the board programming WorkSpace™, is pleased to declare an official organization with IVDesk, an energizing new cloud administrations organization. OfficeTools® has put forth a deliberate attempt as of late to band together with industry-driving cloud suppliers, guaranteeing our customers in the assessment and bookkeeping industry approaches the best IT arrangements available, and IV Desk is no special case. With their accentuation on vertical arrangements, digital security, and boundless versatility, IVDesk is rapidly turning into a pioneer in cloud development support analyst

"Guaranteeing great correspondence and joint effort among programming and cloud organizations is the best way to furnish customers with the sort of experience and administration they've generally expected from a work area condition. With IVDesk's assistance, we're giving clients one more alternative in accomplishing the best cloud-based practice the board experienced accessible, and we're glad to work with them, presently and into what's to come." 

— MICHAEL GIARDINA, OFFICETOOLS® FOUNDER and CEO 

IVDesk is an "all applications and information conveyed" private cloud administration. IVDesk is exceptionally separated from other cloud-put together suppliers by their concentration with respect to SMB associations rather than big business measured associations and by the usability of their cloud-conveyed applications and information approach. 

OfficeTools® is the main supplier of training the board programming and instructive assets for firms in the expense readiness and bookkeeping calling. Its lead item, WorkSpace™, joins a set-up of center administration highlights into a coordinated arrangement that is worked from a solitary screen UI. OfficeTools® additionally has Accelerate Conferences and Summits and distributes the print and online magazine My Office Today, carrying assets from industry specialists to expense and bookkeeping experts across North America.

Thursday 30 July 2020

Cloud infrastructure security architect

Answering to the Director of IT Security Services, the Cloud Infrastructure Security Architect's strategic to create and coordinate the security engineering philosophy identified with business, consistence, hazard the board, and consistence with Cogeco's security the executives structure. He structures and actualizes the security engineering model for cloud administrations and foundation just as the guide. He gives orders and composes security principles, effectively adds to making sure about task expectations and goes about as a specialist in comprehending specialized difficulties. 

Among your fundamental commitments engineer profile. 

Characterize, structure and execute the act of security models for cloud administrations and foundations 

Set up engineering examples to make sure about cloud administrations and foundation 'by structure' 

Work intimately with security officials in auxiliaries and specialty units local area network administration

Add to making sure about the organization's business ventures in a dynamic and useful manner 

Recognize shortcomings, expected weaknesses and dangers in a joint effort with the Risk and Governance Department of CCSD (Corporate Cyber ​​Security Department) 

Secure cloud administrations and framework as indicated by the dangers distinguished and the security prerequisites referenced in the security archives 

Break down and assess demands for special cases to security prerequisites, propose alleviating measures whenever required 

Plan structures offering solid flexibility to mechanical dangers 

Guarantee that commitments are made as per Cogeco's security the board system, endorsed documentation principles and security norms (NIST CSF, NIST 800, CIS Benchmark, ITIL, FAIR) 

Configuration SMART security arrangements (Specific, Measurable, Achievable, Realistic, Temporarily characterized) 

Fit and normalize the security of cloud administrations and frameworks over all specialty units 

Distinguish and guide the cloud administrations and frameworks utilized by the frameworks and stay up with the latest after some time 

Work in close cooperation with area specialists and operational security groups 

Effectively add to the advancement of security strategies and guidelines 

Add to the Safety Roadmap 

Go about as a specialist in the goal and examination of security episodes including cloud administrations and foundation 

Oversee accelerations as per the issue goal process 

Guarantee consistence with arranging and the nature of engineering expectations 

Distinguish likely difficulties and propose arrangements cooperatively 

Work together with the Vice-President of Internal Audit all the time 

Work together in the structure and improvement of commitment forms 

Guarantee consumer loyalty for every commitment 

Guarantee steady cooperation with operational security groups and that of the CCSD 

Give movement giving an account of a week after week premise 

Bolster the executives choices and the key security plan 

Do you have these abilities? 

Involvement with design in Google CLoud Platform or Azur Cloud situations 

Involvement with I&O (virtualization) 

Involvement with the security of cloud administrations and frameworks (IAAS, PAAS, SAAS) 

Involvement with security design (systems, framework, get to, Information) 

Involvement with making sure about data streams (Collect, Ingest, Store, Process, Analyze, Visualize) 

Involvement with detachment and smaller scale division (physical and virtual) 

Involvement with Serverless Architecture 

Involvement with overseeing verification endorsements 

Involvement with frameworks and procedure computerization 

Involvement with making sure about information distribution centers 

Involvement with overseeing secure information on the way 

Involvement with structuring checking frameworks 

Solid information on the GCP Platform and Apps condition (Compute, Identity and Security, Networking, Big Data, Storage and Database, Machine Learning) 

Solid information on Identity and Access Management standards 

Information on the useful standards of Machine Learning (ML) and Artificial Intelligence (AI) 

Solid information on security norms (NIST CSF, NIST Series 800, FAIR, CIS Benchmark, ITIL) 

Information on material lawful and administrative situations (Protection of individual data, Regulation of recorded organizations (52-109), Protection of Telecoms foundations) 

Great relational abilities, correspondence and association 

Solid systematic and arranging limit 

Solid capacity to comprehend business needs and likely security and consistence issues 

Solid capacity to build up great working associations with others and work as a group. 

Capacity to practice judgment and circumspection with secret data 

Involvement with organizing numerous undertakings 

Involvement with delicate administration (RFI/RFP/RFQ) 

Astounding capacity to compose security activity records and procedures (FR/EN) 

Solid capacity to perform various tasks and productively in a quick and requesting condition 

Capacity to oversee complex specialized and/or relational issues 

Capacity to be imaginative in settling issues 

Great oral and composed relational abilities 

Bilingual French/English 

Does this profile resemble yours? We need you in our group! 

Perceived Bachelor, Diploma or Certificate in Computer Security 

CCSP, CISSP, TOGAF, ITIL confirmation is an or more 

10 years of IT experience remembering 5 years for IT security 

5 years of involvement with security design 

Cloud framework security experience (Azur or Google) an advantage 

5 years of involvement with the utilization and execution of at any rate 4 of the accompanying devices: SIEM, IDP/IPS, Windows, Unix, CISCO 

Why join Cogeco? 

Cogeco is a significant player in the broadcast communications market and offers the entirety of its representatives an invigorating, dynamic and various workplace dependent on regard and coordinated effort. We put stock in proceeding with training and furnish our representatives with proficient turn of events and interior development openings. 

At Cogeco, assorted variety is a fundamental advantage for our hierarchical exhibition. We are focused on giving equivalent chances to all people, paying little mind to social and individual contrasts. We do everything possible to make groups that mirror the differing profiles and sources of our customers since we solidly accept this adds to our mark of greatness.

Wednesday 29 July 2020

Computer help

Today it is impossible to imagine the activities of a company without the use of modern technical and informational means. The use of computer technology greatly facilitates many processes, at the same time, constant performance and reliability are very important for a computer. Otherwise, many of the work processes that affect the success of the company are jeopardized.

How is qualified assistance implemented?

Computer help can be implemented in several ways. In the first case, it can be one-time visits of a specialist to eliminate the problems that have arisen. Also, such works can be implemented remotely. To do this, we conclude an agreement with the customer so that he can contact the company's employees at any time and receive qualified assistance. Another option is a full package of services, which includes such work as replacement, configuration, installation of a computer, related equipment and peripherals. Also, our services may include training personnel to work with certain types of software and applications.

Computer help and computer repair, computer network administrators

These services are necessary for every company, regardless of its size, number of workstations and employees. With us, you can conclude a subscription service agreement, thanks to which many services from our company will always be available to you. This is setting up computer equipment and a network, creating a local network, replacing and repairing laptop or PC components. For some, this type of cooperation may seem too expensive, but it should be borne in mind that keeping an employee performing such work on the staff of an organization also costs a lot of money. It should be borne in mind that for each specialist you will have to pay taxes, provide a social package, pay for vacations, sick leaves, etc. In large companies, such employees are often employed in the main processes in the IT field.

And tasks like cleaning a laptop or installing certain software constantly distract them from their main tasks, reducing their efficiency. To avoid this, just contact us. We will provide you with any professional computer repair service. Also from us you can order such service operations as setting up and installing local networks, setting up wi-fi, modems 3g, 4g wimax. In addition, our specialists carry out work with data, installation of operating systems and software, technical support for users online or by phone.

Repair of computers and laptops, setting up, installing new programs and replacing (improving) antivirus protection - all this can be done by our specialists. There is an opportunity to use such a service as "ambulance" computer help. This does not mean that we will provide you with the minimum package of services. To implement the service, our specialists will use all the necessary resources, install professional software, clean computers from viruses and other garbage.

Computer help is a structured approach to tasks performed. We carry out complex diagnostics of malfunctions, direct repair of computers with replacement of boards, power supply units, video cards and other components. In addition, it is possible to replace a laptop or computer in the form of upgrading your computer park, selection of the optimal equipment that will fully meet the company's objectives. Also, our clients have access to software repair of computers, which may include cleaning the registry and completely reinstalling the operating system.

Service prices

Depending on which type of cooperation our clients choose, the cost of services may differ. It all depends on the degree of damage to computers, on the complexity of the breakdown, on the number of computer parks and the type of work that needs to be done. You can find out all the necessary information from our operators by calling the phone numbers indicated on the site. You can be sure that you will be provided with professional assistance, as we employ the best specialists in their field.

Tuesday 28 July 2020

Integration projects

We make projects based on: Who is a network administrator

Your business requirements;
Your business opportunities;
Wishes for your business.
Why are integration projects needed? They are needed if:
You want to get new opportunities for your business;
You do not have enough new programs and technologies to develop your business;
you need to eliminate bottlenecks that hinder the development of your business;
you just need to improve the current information system for better business performance.
What will you get?
New opportunities for your business;
Individual solution of tasks for your business;
Ease of understanding. We speak and build our relationship with the customer in the language of business.
How much is?
The cost of projects depends on the timing of the project and the business requirements for the IT project.

In any case, it will be the best choice on the market in terms of price / quality ratio.  

Typical projects
Safety
Communication and communications
Networks
Information Systems
Moving
Cash terminals
Quality assurance
We have many years of experience in managing and building information systems from the business side, our specialists have international certification (MCP, ITIL). All work is carried out according to technology, which guarantees that the work is carried out exactly on time with the required level of quality.

Friday 24 July 2020

Analysis of computer networks

A computer network contains several computers, united into one network on a territorial basis. They are located in the same room, in one or more adjacent buildings. Local networks are used to exchange information between participants and to simplify the use of shared resources - printers, modems, disk drives.

For the most part, these are local computer networks located in the same building, which are based on the client / server model. A connection includes two computers and a path between them. The client computer sends a request to the server for information or service. The server responds to the client's request.

In this case, the functionality of the client or server can be transferred from one computer to another. When creating a local computer network, you need to choose hardware and software.

Analysis of the existing network administrator certifications

A computer network at the present stage is included in every business structure. The enterprise computer network is one of its parts, the composition of which complements the overall architecture. Network architecture includes topology, access methods, standards. The topology is chosen in connection with the layout of the premises and the technical requirements of the customer. The most common and at the same time productive structure is the "star" topology, in which all computers, including the server, are connected to the central switch with a separate cable. This topology has its pros and cons:

On the one hand, localization of failures caused by a damaged network cable or technical problems on a particular computer is provided. That is, such failures only affect the local segments in which they are located.
On the other hand, the requirements for the central element (the network core) are increasing and this creates a single point of failure, the failure of which actually blocks the entire network.
Therefore, when creating a network, it is of great importance to correctly design all its nodes, taking into account the requirements for availability and fault tolerance.

Description of the computer network

An important characteristic of a network is the way a workstation accesses network resources and how computers exchange data.

The method by which all computers have equal access to the network is called CSMA / CD. Before the start of information transfer, the channel availability is determined at the workstation. After the transfer, the receipt is successful. In case of failure, a repeated transmission is carried out, if necessary several times, until the information reaches the addressee.

The enterprise computer network uses Ethernet, a network architecture developed by Xerox in the 1970s. Subsequently, the project was supported by Intel and DEC. In 1999, support for twisted pair transmission was introduced.

Thursday 23 July 2020

Computer settings

Setting up computers in Moscow: quickly and efficiently

In order for everything in your computer to work quickly, correctly and correctly, you must perform the correct computer settings. Often, the owner does not know how to properly configure the computer, while trying to independently restore the operation of the device, programs, and restore the hard drive. As a result, you can get more serious problems that negatively affect the performance of the computer as a whole. To avoid such troubles, you need to contact only trusted specialists who will provide a full range of services, which includes many activities. This can be tuning your computer for maximum performance, disabling unnecessary services, cleaning and defragmenting your hard drive, installing Windows 10, and many other services.

We provide a full range of services for setting up computers in Moscow. Our experts offer services such as setting up computers in your office or at home, preparing and setting up a computer in accordance with the requirements of the user, setting up AMD / NVIDIA video card drivers + updating drivers, working with BIOS, etc.

Everything related to setting up a computer, including downloading individual programs, installing special applications, we perform promptly, professionally and reliably.

Setting up a computer, how to set up a computer with examples

Naturally, each owner should know how the operating system works, what BIOS is, how to carry out the minimum computer settings on their own. Of course, it is better if a wizard conducts setting up computers in Moscow, but when there is no time or there is a desire to do this work on your own, you can try.

Proper computer setup begins with design and personalization. Not all Windows 7 operating systems have this button, only the Professional and Ultimate versions have it. After the personalize button is clicked, work such as customizing the Windows 7 theme can be done, then customizing the desktop background. You can also customize Windows 7 sounds, customize screen text sizes, customize Windows startup. All these operations are available to an ordinary user who has minimal knowledge of computer technology. For example, themes can be selected from those already contained in the operating system, or you can choose a suitable option on the Internet. The background image is set up in the same way, performance parameters are set, aero effects, the color of window borders is changed.

If you need to defragment your hard drive or carry out a neat and high-quality cleaning, then you need a computer setup specialist. Of course, you can customize your computer yourself, but important documents or programs that you need may be lost and deleted. Setting up a computer at home is actually not that expensive, but in this case, the user is sure that there will be no unpleasant consequences in the form of viruses, malware, erased files.

In fact, it is not always necessary to repair computers and laptops in Moscow. Each user should know a few simple, but mandatory rules that will avoid frequent repairs and calling the wizard. First of all, this is the power supply setting. You can't always turn off and turn on your computer. It's easier to put it into sleep or hibernation mode. In this way, you can save energy, because when turning on and off, computer devices consume much more electricity than during continuous operation. Also, sometimes a computer restart is required. It so happens that some programs and applications start to slow down, and this process loads the entire system. When you reboot, the RAM is cleared, and the failed programs are closed.

Another important point is all kinds of utilities that can speed up the speed of your computer, as well as its performance. If you doubt those utilities that your acquaintances or friends have advised you, then it is better to call a specialist who will install everything you need for high-quality and efficient work at the computer. Never forget that dust cleaning also plays a huge role. Dust can cause high temperatures in the processor as well as the hard drive. To prevent this from happening, regular cleaning is necessary network administrator job.

But companies that set up computers do not exist in order to come to customers, especially if you can call the wizard for free at any time. You can independently learn how to perform such simple actions, and you can call a specialist only if you are not confident in your abilities or you need really urgent repair of computers or urgent repair of laptops.

The wizard will not just enter the program menu and customize the appearance of the desktop, the style of icons, or carry out a banal dust cleaning. A professional will be able to recognize hidden errors and breakdowns, provide an effective solution to serious performance problems, install high-quality software that will protect your devices from malware and viruses.

Professional computer setup (Moscow) is setting up a computer from scratch, installing Windows 8, gaming computers (assembly) and much more. But at the same time, you need to contact a trusted service, where you will know for sure that they will help you and provide qualified assistance.

Our company offers all types of services related to setting up computers in Moscow. We will also be able to provide you with any services that may include urgent repair of computer equipment, we will conduct consultations, and provide professional recommendations for the further efficient operation of your computer.

How we are working?

If you understand that your computer needs help, you need to urgently call the service center. All contacts are presented on our website, so you can leave a request without any problems. Then the operator calls back, clarifies the details of the breakdown, the need to configure or assemble the device, after which the master goes to the home or office to the customer. We guarantee that the visit of a specialist will be a completely free service, already during the diagnostics process it will be possible to find out the problems that cause computer malfunctions and determine the cost of setting up or repairing equipment. Only after the computer or laptop will work normally, without errors and any problems, you pay for the work of a specialist.

IT infrastructure support

Benefits of a service approach

It is important to understand that the support of an IT infrastructure by a third-party organization has much more advantages than the same support on its own. Firstly, this is qualified service, since professionals are engaged in solving problems and preventive work. Secondly, the risks of downtime become minimal, because the contractor strictly follows the regulations, performing maintenance sequentially and in stages. Another important point is flexibility - the business does not stand idle due to the fact that it is necessary to complete a certain range of tasks. Providing a range of services, we certainly take into account the regulations of the organizations.

Thanks to our company, the creation and development of IT infrastructure will be ensured. We also provide services for setting up and maintaining computers (legal entity), our clients can provide support and support for the IT infrastructure of organizations.

Difference between network engineer and network administrator

IT infrastructure technical support is carried out in several ways. This is support for the stable operation of software products, hardware. In addition, this includes consulting, agreement on the terms of SLA, on the cost of contracts. Without fail, IT infrastructure support includes support, providing the company with all the necessary documentation for the work performed. This is the so-called standard service delivery scheme.

We also have an expanded service delivery scheme for organizations. First of all, such maintenance of IT infrastructure is individual. We carry out all the necessary work, so the customer does not need to think about whether a certain type of service is included in the service. Additionally, our employees manage risks, communications, rework the systems that are maintained, and provide performance improvements without incurring capital expenditures. We also conduct operational reporting so that we can make operational decisions when changing services.

IT maintenance and IT infrastructure support of organizations includes a wide variety of services. That is, it includes business processes related to the maintenance of the computer systems of organizations. The remote administration service is quite popular in this format. With the help of such services, remote administration is provided, while the operation of servers, a computer network, and all systems becomes as stable as possible. This type of service, including such work, is suitable for organizations that have their own servers or servers in data centers. Also suitable for organizations with a computer network with more than 10 workstations. Additionally, such a range of services can be used by companies where there are restrictions related to IT support. This type of service does not provide

Tuesday 21 July 2020

IT infrastructure management

IT Infrastructure Management (ITSM)

Today, saving on IT services is inappropriate. In most cases, the efficiency of the entire company depends on this area. When a company has an office in Moscow, it is necessary to maintain the efficiency of such an organization by all means. Otherwise, competition and better terms from the other company will leave no chance for your organization. IT service and IT infrastructure management is an activity that improves the quality of services provided. In addition, the return on investment associated with IT infrastructure is enhanced. Development and maintenance of IT systems will also take place, which is very important for a stable and developing organization.

Management of IT processes and enterprise infrastructure is a rather complex process that requires an integrated approach and responsibility, professionalism on the part of the contractor. IT infrastructure management has several main areas. This is management consulting, automation of enterprise processes, IT management functions, maintenance of the management system, including the implementation of solutions, their maintenance and a whole range of other services.

Monitoring and managing IT infrastructure is a modern approach to organizing an IT infrastructure management system. IT infrastructure management and its success largely depends on the experience of the internal structural unit or on the professionalism of the outsourcing company.

What do we offer? The infrastructure management system from our company is characterized by such actions as managing releases, configurations, changes, availability. Also, management of IT infrastructure allows you to ensure security, which is an important factor for protecting enterprise data. How we are working? The construction, implementation of the IT infrastructure management system is underway. This takes into account the peculiarities of using software solutions for monitoring and control, which can be completely different for each company. Also, the implementation of the data security system, backup is carried out, licenses are monitored for installed software products.


Definition network administrator

Modern problems of IT infrastructure management are most often associated with security. Therefore, it is very important to install Service Desk automation, ensure application protection, data protection, and establish end-to-end service management. In addition, the enterprise must be installed a number of solutions related to configuration management of programs, equipment, server asset management, and other important points that ensure the stable operation of mobile devices, workstations used in the service department.

We use IT infrastructure management tools from leading manufacturers. Those new to IT infrastructure management often fail to understand why you need IT infrastructure best practices. The point is that such practices represent the experience of the most successful companies and enterprises. Thanks to this, you can avoid a huge number of mistakes in the development and current activities of the company, and immediately follow an effective and stable path of development.

If we consider the requirements for IT infrastructure management tools, then in most cases they have similar components. First of all, this is automation for installing the OS, applications, and various updates. Secondly, the specialist provides automated processing of events and collection of statistical data. Third, IT infrastructure management systems allow you to manage performance and availability. That is, there is a configuration of computers, various network devices, their automation (turning on, turning off, increasing power), for example, in situations when the load on equipment and networks increases.

Monday 20 July 2020

Server Maintenance Regulations

Server Maintenance

Maintenance of servers and the entire equipment system in the organization is a very important point in the comprehensive support of the entire IT infrastructure in the company. Moreover, in the process of work, it is important to comply with the maintenance regulations for server hardware.

What do we offer?

First of all, it is the correct operation of servers and other equipment responsible for processing and storing data. We also control the traffic of the accounts of those users who are connected to the servers. In addition, we carry out work on the management, administration of working networks, ensure data security on servers, carry out preventive maintenance and software updates. We carry out equipment modernization, restore lost data. Our services include installation, server configuration, and updating the operating system.

How we are working?

First, the client leaves a request on the site or calls us on the specified numbers. Then the operator accepts the request for processing, after which the foremen go to the facility. There, the analysis of customer requirements is carried out, diagnostics of equipment, servers and the entire system is carried out, and the performance of its individual components is checked. In the process of such work as server maintenance, the regulations must be followed very clearly. This is the basis for quality, reliable and professional work.

Server administration: subscription service what do network administrators do

Today, many organizations prefer the more popular service, remote server administration, over standard maintenance. This makes it possible to save time on maintenance, and at the same time, customers receive full service support for the system and servers in particular. All work is carried out online from the office of the service company. Moreover, in this mode, you can solve almost any issue if at least one system administrator is working in the customer’s office.

Maintenance schedule

First of all, the regulations for servicing servers include the composition of technical maintenance and checking the operability of the hardware and software complex of the APCS. This is a technical document that defines how maintenance is performed. Such work is carried out between scheduled work in order to prevent frequent repairs. During such activities, it is possible to temporarily shut off the equipment in accordance with internal instructions.

So, the maintenance includes quarterly maintenance, six-month maintenance and annual maintenance. The server maintenance regulations provide for checking the environment of the hardware and software complex, checking the power supply of the equipment, checking the employees' compliance with the requirements of the management, drawing up and agreeing a work program, obtaining personnel permission for the upcoming work, as well as filing a dispatch request (if necessary) to turn off the equipment.

ACS TP journal

After all the work has been carried out, the employees of our company write in the APCS log information about the work carried out, about the state of all individual components, as well as the degree of their readiness for work.

Routine server maintenance

The server is the basis of the technical component of the IT infrastructure in each organization. How it works, file systems, e-mail, various services will depend on its proper operation. Our company offers services that allow you to plan, perform installation, repair, maintenance of servers.

Features of server maintenance

We can talk a lot about the organization of work with network and server infrastructure, but if insufficient attention is paid to this area, then soon all the technical means of the IT infrastructure in the organization may fail. Accordingly, before installing server hardware, it is necessary to analyze the requirements. It is also necessary to install the equipment, configure it, and then periodically carry out maintenance in order to identify problems in operation.

In addition, there is a certain procedure for reporting incidents, according to which all detected errors are recorded in a special journal and working documents, after which the information is transferred to the responsible person or department. The procedure for reporting major incidents involves the transfer of information not only to the relevant persons who are responsible for the operation of the servers, but also to the management of the organization.

Thursday 16 July 2020

What does a system administrator do?

This profession is a technical specialty, as it includes responsibilities such as installing software on users' personal computers, setting up various equipment, and upgrading the network. Also, the duties of the system administrator include monitoring employees, providing access for certain categories of users, providing access to the local network, and much more.

However, there are certain network administration problems. In his work, the system administrator may encounter tasks such as determining the reason for the failure or error, the quality distribution of resources, improving the efficiency of users, improving processes for making various decisions. It also happens that a specialist is faced with a situation where the user is not able to explain the problem. That is why the system administrator must have the appropriate qualifications.

A fairly important component is the characteristics of the system administrator. You need to understand that the system administrator, throughout his entire working life, is faced with many problems that need to be fixed and resolved clearly, professionally and efficiently. That is why the main personal characteristics include the ability to concentrate, the ability to perform several tasks at the same time, have leadership qualities, and be able to change the direction of the prepared plan radically in the process of work. Given all of the above, it is not surprising that the salary of the system administrator is quite high. Moreover, depending on the region, the level of salary differs slightly network administrator duty.

The main functions of network administration are a kind of management, but it concerns not people, but computers. And in order for the fulfillment of the tasks set to be carried out efficiently, software developers have come up with various utilities and programs that have special tools for performing the above functions.

It is important to understand who the network administrator is. A network administrator is a person who works in a company that has local area networks, as well as a computer park. Such a specialist should have higher education in the appropriate direction, as well as regularly take advanced training courses. Otherwise, even the most experienced specialist will not be able to solve the tasks that the new employer will set for him or will face technical difficulties in resolving certain issues. On the network you can find a sample resume of the system administrator, which is quite easy to fill out. But at the same time, it is necessary to remember that each person has individual qualities, knowledge and experience, therefore it is better to prepare well before interviewing for a new job and move away from standard resumes, Having clearly described your own advantages as a specialist. Each company may have its own requirements for a system administrator. Therefore, you must first negotiate with the employer a list of responsibilities and functions assigned to the specialist. Otherwise, the new employee will not cope with the tasks or will work too slowly.

Network administration is a work that in a sense is creative and versatile, but the technical side of the issue is the basis of network administration. Therefore, it is very important to understand how computer networks work. No matter what type of computer network they are, they have a number of specific components that remain unchanged. First of all, it is network equipment, communication tools, software, cable systems, network services, as well as various network protocols. Despite the fact that all devices have a very complex system, they closely interact with each other, so the system administrator must be able to understand each of them.

Wednesday 15 July 2020

Why is it worth becoming a network engineer / system administrator?

A network engineer or system administrator is a truly prestigious profession. First of all, their main responsibilities include supporting the IT infrastructure and various services associated with it. Depending on how large the companies are, a few days or even hours of downtime in this direction can cost millions of rubles. Accordingly, if you have all the necessary knowledge and skills, then you will be welcome in any company.

The second motivation factor can be called the fact that the salary in 2018 is not only in such a large city as Moscow, but also in many other cities, one of the highest. Naturally, the work experience that a network engineer or administrator has is very important. Also, do not forget that you will be presented with a huge selection of creative work. Every day you need to solve complex problems, create interesting projects. At the same time, such specialists work more often with standard tasks, but you can still solve them in your own way. It should be noted that the systems engineer, as well as the administrator, are constantly faced with new technologies, study new products to create various systems, and gain invaluable experience and knowledge. And all this happens in the process.

System Administrator Job Responsibilities IT network administrator

It is worth noting that employers have basic requirements for an employee. First of all, such a specialist installs and maintains computers, office equipment, and internal telephone exchanges. He also makes sure that the system software runs smoothly, monitors the performance and security of the network, as well as all systems of the company. The administrator performs such tasks as configuration, installation, updating of various software, applications, applications. If necessary, he is engaged in backup, data recovery, provides technical support, service assistance to users. In addition, the duties of such a specialist include compiling reports on the work done by him. If we talk about what are the rights of the system administrator, then he has the right to establish or change the rules for using the local network, to get acquainted with documents that determine the rights and obligations in accordance with the position held. He can also make suggestions for improving the work, require the management of certain technical conditions that are necessary for the performance of official duties. The system administrator always has opportunities for additional income, as he can apply his knowledge and skills in other areas. And if you have free time at work, you can safely combine two professions. Of course, the management of the company, as well as other employees, should not be aware of this. He can also make suggestions for improving the work, require the management of certain technical conditions that are necessary for the performance of official duties. The system administrator always has opportunities for additional income, since he can apply his knowledge and skills in other areas. And if you have free time at work, you can safely combine two professions. Of course, the management of the company, as well as other employees, should not be aware of this. He can also make suggestions for improving the work, require the management of certain technical conditions that are necessary for the performance of official duties. The system administrator always has opportunities for additional income, as he can apply his knowledge and skills in other areas. And if you have free time at work, you can safely combine two professions. Of course, the management of the company, as well as other employees, should not be aware of this. And if you have free time at work, you can safely combine two professions. Of course, the management of the company, as well as other employees, should not be aware of this. And if you have free time at work, you can safely combine two professions. Of course, the management of the company, as well as other employees, should not be aware of this.

It is important to understand that the responsibilities of the system administrator may include other responsibilities. This may be due to the specifics of the enterprise or production need. Many large and even medium-sized enterprises have entire departments that carry out all the work related to system administration. This is necessary because the park of computer equipment can be quite large, and local networks can have a huge length. Naturally, 1-2 specialists will not be able to service 50-100 computers, various office equipment and other equipment and systems on their own.

It is very important for a system administrator to have several basic personal qualities that will surely come in handy for him in his work. First of all, it is perseverance, responsibility, attentiveness and patience. In addition, you need to have stress resistance and logical thinking. Observation, initiative and the ability to identify a causal relationship will not hurt. If we talk about the technical point of view, then a person must have a technical education. It is advisable if the education of the future employee will be associated with information technology. Often, in small companies, self-taught people take this position, but for large enterprises this level of knowledge is insufficient.

Responsibilities of a network engineer

A network engineer knows how to configure various network equipment, detects and fixes network malfunctions, maintains documentation, consults users, participates in various projects aimed at upgrading network infrastructure, creates and implements various projects aimed at ensuring network security.

It is important to understand that the responsibilities of a system engineer include a fairly large amount of work. Therefore, you need to understand that personal qualities as a specialist and just a person should include: multitasking, accuracy and diligence, efficient execution of work, attentiveness, as well as fast and high learning.

Both the system administrator and the system engineer are specialists who can work in various companies regardless of their type of activity. These may be providers of services related to system integration, various IT departments in various areas of business, utilities, educational services, in the healthcare system, etc.

You need to understand that a systems engineer must be a leader from a technical point of view. This means that such a person organizes a team of specialists who work on the same system, that is, they move in the same direction, as a team. Such technical leaders are valuable employees who not only fulfill the task, but also create the technical solution itself, over which the whole team will continue to work, including architects, administrators and other specialists.

System engineer (Russia) - this position is often found in the list of vacancies. At the same time, salaries in various announcements can vary greatly. So, in some ads you can see an amount of 35 thousand rubles, and in another ad - 120 thousand rubles. The difference is that the systems engineer is the same specialist as the doctor. Accordingly, there can be many different industries in which an engineer works. On the one hand, it may be the space industry, on the other, architecture. Moreover, often each specialist is engaged in several areas at once, but they are similar to each other. Although there are cases when an engineer radically changes the scope of his activity, learning independently, gaining new experience, moving from one area to another.

Jobs and work: system administrator, engineer in Moscow more in demand than ever. Every day the number of offers only grows, while salary also increases, as unique solutions appear in the IT infrastructure for all business areas that seek to develop their activities through optimization and automation of their areas.

Tuesday 14 July 2020

Remote server maintenance

Today, most of the processes in the company’s work are carried out using computer equipment. This is the key to the effectiveness and reliability of a large enterprise or small office. Accordingly, for such work it is impossible to do without servers that provide centralized processing, data storage and other important processes.

It is important to understand that you get the highest level of reliability of the servers and all computer equipment in case there is a remote maintenance and administration of the servers. Previously, server maintenance took place directly on the company's premises. Now, departure and IT service on the client’s territory are not required, since by providing access to your equipment through a special program, you provide optimal conditions for solving any issue.

Remote IT service is a proactive problem solution that allows you to quickly configure equipment, install, configure software, create a backup database, install access tools and ensure security for each user of the company.

Remote Maintenance: Local area network administration

Most often, remote server maintenance is a service that is required by a company with a small amount of computer equipment, with or without a server. Also, remote IT services, remote server administration, and a remote administrator are required by the company's geographically remote departments. Sometimes such services are companies in a state of austerity.

Remote Maintenance Features

Remote administration, server maintenance is performed remotely, that is, the specialist does not go to the office to the customer. How exactly do we serve computers? Special means are used for remote access, as well as terminal access. No matter what the scale of your company, an IT audit is required. Information is collected on the number, location of computers, on the Internet access channels, on network equipment, and on access to the router. Thanks to the receipt of such information, it is more convenient and easier for you to work with us, because specialists will know everything about the situation in your company.

Advantages and disadvantages

The most important advantage, which has the service of computers and servers in Moscow, is efficiency. Collaboration concept: fast, efficient and friendly. And this means that by connecting to your computer, a specialist will be able to solve a huge number of problems and in some cases fix the equipment. If the task cannot be solved through remote maintenance, then the order of IT services is possible in the form of departure of masters to the object. A disadvantage can be called the fact that in difficult situations, the specialist visits the facility, while the hourly payment for the service occurs.

Who does the maintenance of your computers and servers? Remote maintenance of computers and servers is performed by a whole team of experts, consisting of IT professionals with vast experience in building and developing a network.

What is the purpose of servicing computers and servers? This is a stable operation of the system, a quick solution to problems, control of data backup, analysis of log data, changing passwords, managing a list of employees, etc.

Monday 13 July 2020

LAN monitoring and analysis

To maintain the performance of the local network, constant monitoring is required. This is an important stage of network management, which is often separated from the actual management and produced by autonomous means. Control consists of two parts - monitoring and analysis.

During monitoring, primary data is collected, which includes the number of frames and protocol packets, the status of switch ports, routers and hubs, etc. During the analysis, the collected information is comprehended, compared with previously obtained data, and assumptions are made about the reasons for the network to slow down or its failures.


What does a network administrator do ?

For monitoring, meters, hardware and software, network analyzers and testers, internal monitoring tools for communication devices, agents of control systems are used.

Analysis and monitoring tools have their own classification. With their help, an analysis is made of the functioning of the local computer network.

Management system agents that support the functionality of one of the standard MIBs (management database) use the SNMP or CMIP protocol to transmit information. Data from agents is collected in auto mode.

Installed systems for analysis and control include hardware and software modules of communication equipment and software modules of operating systems.

Protocol analyzers are used to monitor and analyze network traffic.

E kspertnye system designed for fault analysis and diagnosis of their causes. These can be simple context-sensitive systems or more complex intellectual knowledge bases.

Equipment for diagnostics and certification of cable systems includes network monitors for cable testing, cable scanners for copper cable systems, cable testers for breaks, certification devices for cable systems.

Protocol analyzers are computers with special network cards and software that comply with network technology. The analyzer is connected to the network as a workstation; it is distinguished by the reception of all data packets. The workstation receives packets addressed to it.

Network analyzers are used to measure the electrical characteristics of cable systems and cable certification. These are large appliances.

Cable scanners measure the electrical and mechanical parameters of cables - length, attenuation, impedance, wiring pairs of conductors, the level of electrical noise. They differ from network analyzers in a lower level of accuracy and portability.

Cable testers are used to diagnose cable breaks. They are simpler than cable scanners, but they detect the place of failure.

In addition, multifunctional portable devices with the functionality of cable scanners and protocol analyzers are used, which support some functions of control systems. The physical interface of these devices serves to identify problems and test cables at the physical level. A microprocessor with software performs the functions of a higher level.

The development of computer network technical maintenance regulations is carried out by specialists of the company's IT department or invited non-staff employees. The goals and objectives of the computer network maintenance system are to ensure the operability of the entire network and each of its elements, for which a condition is checked, detection and correction of possible malfunctions. Only a specialist with sufficient qualifications and the necessary level of professionalism can develop a system for maintaining a computer network.

The organization’s computer network is designed to implement the following production cycles: data storage in a centralized manner, document management, production of reports on completed work, accounting, work of other transaction systems, printing to a network printer, Internet access, organization of video and audio communication channels and much more.

Centralized network management software systems collect data on the status of communication equipment and network nodes, on its traffic, and also manage the network in automatic or semi-automatic mode. Management actions include changing settings, connecting and disconnecting ports, and more.

Programs for the network administrator, network utilities

To manage computer networks, special programs have been created that allow you to control all network devices from the administrator’s computer. Programs for system administrators such as VPN Client Manager, Winbox, Kerio VPN Client, TeamViewer, Radmin, RMS are intended for administration in the Windows environment .

Network modeling

Before creating a local network, it is necessary to simulate it, during which it is necessary to determine the optimal topology, select equipment, determine performance characteristics and protocols. On the model, you can test the effect of bursts of broadcast requests or test the collapse mode.

During the simulation, you can find out a lot of settings. Among them, peak throughput of network sections, response time of servers in different modes, the impact of installing new servers on the distribution of information flows, topology optimization for network bottlenecks, checking the operation of various network equipment, the maximum number of users, routing protocol, the impact of traffic on network operation .

Friday 10 July 2020

Security architecture

Prerequisites
Have followed or mastered the concepts of the Architecture of infrastructure 1 and Architecture of infrastructure 2 workshops.

Goals
At the end of the course, the participant will be able to propose and improve a corporate security architecture framework.

Educational approach
Lectures assisted by team scenarios

Certificate issued at the end of the course
A certificate of participation is given to people who have attended more than 80% of the training hours security jobs description.

Teaching materials
To come up.

Other features
In order to achieve a good level of mastery, the participant should complete the course with personal practice.

Course content
Introduction

Security architecture concepts
Reference frames
Assessment of the maturity of a security architecture and success criteria
Organization of a company's security structures: users, processes and technologies
2 Management of corporate information assets

Concepts, ecosystems, user behavior, categorization of information
Principles, procedures, norms, standards and governance
Risk Assessment
Associated technologies
3 Identity and access management

Concepts, ecosystems, user behavior
Principles, procedures, norms, standards and governance
Risk Assessment
Associated technologies
4 Communication and networking management

Concepts, ecosystems, user behavior
Principles, procedures, norms, standards and governance
Risk Assessment
Associated technologies
5 Management of information systems and software

Concepts, ecosystems, user behavior
Principles, procedures, norms, standards and governance
Risk Assessment
Associated technologies

6 Threat and security incident management

Concepts, ecosystems, user behavior
Principles, procedures, norms, standards and governance
Risk Assessment
Associated technologies
7 Business and technological continuity

Concepts, ecosystems, user behavior
Principles, procedures, norms, standards and governance
Risk Assessment
Associated technologies

Thursday 9 July 2020

Network and security system architect

The professional is responsible for guaranteeing permanent access to the IS with a constant quality of service.

He analyzes the needs.
He studies and recommends technical choices
He assures the technical and administrative responsibility of a project
He manages the servers of a company.
It secures the operation
It optimizes and ensures the evolution and sustainability of networks
It communicates in an international context
Goal
It is a very operational profile which requires many technical skills, an excellent knowledge of the different protocols and network hardware as well as infrastructure software (operating system, database, mail servers).

Professional certification attests to the skills acquired which allow: Technical architect job description

administer the system with the file tree and attributes
to execute the scripts
activate basic system commands
manage users and rights
conduct audit actions to verify the adequacy of the solution adopted
to make employees aware of the best practices for securing a server.
He masters IT security tools, as well as current legislation and standards.

The skills assessed are instrumental, systemic and interpersonal skills.

On the other hand, this function requires listening skills essential to understand user expectations, but also a certain force of persuasion. He is able to supervise service providers from time to time and interact with users. His sense of popularization allows him to effectively advise the IT manager of the company. It also involves rigor, method and good adaptability. Thanks to his organizational capacity and his reactivity, he is able to optimize a busy and difficult to predict schedule. He has skills in team management through know-how in terms of organization, leadership and development.

Opportunities
The system architect can be employed in companies of all sizes: the activity requires travel, both inside and outside the company and therefore causes irregular hours. He works in a consulting firm or in IT engineering service companies (ssii) the activity is sometimes carried out within the framework of secondments to other companies (provision).

Technical or managerial activities are carried out alone or within a team for which the role of project manager takes on its full significance.

Targeted trades:

Network and security systems administrator
Database administrator
System engineer, support engineer
System expert
Systems and networks project manager
Network and security architect
Director of the information systems

Wednesday 8 July 2020

Cybersecurity Architect Galileo

WHAT WE CAN ACHIEVE TOGETHER:
You join a cybersecurity team already in place (shared between Gennevilliers, the GSA site in Prague and the ESA site in the Netherlands), in an international environment. Upon arrival, you will undergo cybersecurity and space oriented training. This position is based in the NETHERLANDS, on the premises of the European Space Agency. You will be required to define and specify security architectures in the space sector, on the GALILEO project.

Your main missions: Information security architect

Participate in the definition of the security solution for the Galileo system.

Be part of the definition of the future SOC Galileo

Study the existing and propose evolutions to improve the security of the System and associated services on the basis of new operational concepts.

Define and specify the technical and functional security architecture

Accompany ESA and GSA in technical discussions with the various stakeholders on the Galileo system (ESA, GSA, European Commission, Industry) to validate the technical feasibility.

The prospect of joining an innovative Group motivates you? So join us by applying for this offer.

Tuesday 7 July 2020

Invest in omnichannel to get through the crisis smoothly

At the same time, the seizure of hotlines and the increase in waiting times during the health crisis have prompted customers to turn massively to new, more conversational channels. “ Since the end of February, requests for assistance via WhatsApp have increased by more than 100%. Chat and text messages also recorded significant increases (34 and 30% respectively). For large companies in particular, WhatsApp has become very popular: requests on this single channel increased by 166% in early May. ”

In January 2020, the Zendesk Customer Experience Trends 2020 report already showed that companies are starting to embrace the idea that every interaction with a customer is part of a conversation. And that it can, therefore, take place via different channels, including messaging and chat: today big favorites of companies and customers. The figures bear this out: in 2019, Germany, Italy, Spain and the United Kingdom were among the countries with the most WhatsApp users (respectively 44, 33, 30 and 27 million per year latest*). In addition, 76% of the Dutch population and 31% of the French population use WhatsApp **. “The crisis has only accelerated the process of appropriation of this messaging software by everyone, young and old ", underlines Gabriel Frasconi. Besides, when you look at it more closely, you realize that everything is linked: by equipping themselves, consumers have encouraged brands to use these channels to interact with them sap security architect.

It is important to note that despite the increase in wait times for most B2C companies, customer satisfaction remains broadly stable (and even recorded a slight increase since the end of February). Even though airlines are hit hard, customer satisfaction has only dropped by 3%, indicating that customers may be more lenient in times of crisis. Only carpool companies are an exception to this rule: the drop in their activity was accompanied by an 8% drop in customer satisfaction.

In recent months, we have noted the emergence of messaging and self-service. These channels have made it possible to maintain - or even improve - customer satisfaction despite the increase in volumes handled by the various departments. This has improved the customer experience on several levels.

In conclusion, according to Zendesk Benchmark data, companies that have successfully avoided increasing resolution times while processing tickets most efficiently are those that have rolled out new channels or quickly accelerate channel adoption existing.

Did you know
Discord , a free voice, video and text chat service popular with the gaming community, has seen its use soar by 300% as people start using it to host meetings, classes, and conferences of virtual book clubs. As Discord's user base grew, its robust help center helped mitigate peaks in support traffic. From February to March, page views jumped 70% and unique visitors more than doubled. Meanwhile, Discord ticket deflection rate increased ten points

Monday 6 July 2020

ISO / IEC 27701 - International standard for the management of privacy information

The need for trust and a sense of responsibility in the processing of personal information is growing in the mentality of customers, consumers and stakeholders; but the risk goes beyond mere compliance with the rules. Companies must have the right skills, processes and systems in place. As the number of complaints and fines related to privacy and data protection increases, there appears to be a growing demand for guidance and guidelines.

Based on the requirements of ISO / IEC 27001 , ISO / IEC 27701 provides this guidance and helps companies manage privacy risks related to personal identifiable information (PII). It can also help companies comply with the GDPR as well as other data protection regulations. The two standards can be certified in combination.


What job related tasks are required of an architect :

What is ISO / IEC 27701?
The ISO / IEC 27701 standard specifies the requirements and provides indications for implementing, implementing, maintaining and constantly improving a privacy information management system (PIMS). It is based on the requirements of ISO / IEC 27001, the standard for information security management systems (ISMS), and on the Code of good practices for information security controls in ISO / IEC 27002.

ISO / IEC 27701 provides the framework for the management system to protect personally identifiable information (PII). It is about how organizations need to manage personal data and is supportive in demonstrating compliance with applicable Privacy rules.

If you have already implemented ISO / IEC 27001, the new ISO / IEC 27701 enhances your security efforts by including managing Privacy. This includes the processing of personally identifiable information (PII) to demonstrate compliance with data protection regulations, such as the GDPR.

For organizations that do not have an information security management system compliant with ISO / IEC 27001, the two standards (ISO / IEC 27001 and ISO / IEC 27701) can be applied in a single project.

Who should apply the ISO / IEC 27701 standard?
ISO / IEC 27701 provides guidance to any organization responsible for the processing of personal identifiable information (PII) as part of an information security management system. Organizations of all sizes and types, including public and private enterprises, government bodies and other types of organizations can benefit. It provides a risk-based approach, helps organizations prevent specific privacy risks already addressed as well as new risks for personal data and privacy.

Why is ISO / IEC 27701 good for my company?
A privacy information management system (PIMS) has several advantages:

It builds trust in your company's ability to manage personal information, both for customers and employees.
It is supportive in demonstrating compliance with the GDPR and other applicable privacy rules.
Clarifies roles and responsibilities within your organization.
Improve internal expertise and processes to avoid infringements.
Provides transparency on controls established for privacy management.
Facilitates agreements with commercial partners where the processing of PII (identifiable personal information) is mutually relevant.
It integrates easily with the main standard for information security ISO / IEC 27001.
How can ISO / IEC 27701 be used to comply with the GDPR directive?
The implementation of a management system compliant with ISO / IEC 27701 and ISO / IEC 27001 will allow your company to meet the privacy and information security requirements established in the GDPR and other data protection regulations. The GDPR requires organizations to take appropriate technical and organizational measures (including information, procedures and processes) to protect the personal data they process (in accordance with article 5 (2)).

ISO / IEC 27001, the international standard for an ISMS (information security management system), provides an excellent starting point for achieving the technical and operational requirements necessary to reduce the risk of violation.

ISO / IEC 27701 provides indications for the establishment - and specifies the requirements for the implementation, maintenance and continuous improvement - of a PIMS (privacy information management system), always based on the requirements, objectives of verification and controls of ISO 27001, and extended to a series of requirements, verification objectives and specific controls for privacy. An annex refers to the GDPR and ISO / IEC 27701 even if the standard is not specific to the GDPR.

Both standards help compliant companies to meet and demonstrate compliance with GDPR privacy and information security requirements.

While ISO / IEC 27701 is not currently explicitly named in the certification mechanism outlined by the GDPR in article 42, it is possible to obtain an accredited ISO / IEC 27701 certification combined with ISO / IEC 27001 from an independent third party body such as DNV GL .

How can I prepare for certification?
Whether you are considering implementing ISO / IEC 27701 (as an extension to your current information security management system compliant with ISO / IEC 27001) or have just started the process, DNV GL can support you with:

GAP-Analysis to verify the level of preparation with respect to a certification
Training courses for ISO / IEC 27001
Certification of your management system according to ISO / IEC 27001 and ISO / IEC 27701
In addition, DNV GL is able to support your training needs in relation to the standards and the current GDPR (European Union General Data Protection Regulation).

To get certified, you need to implement an effective management system that meets the requirements of the standards. It is important that you commit yourself and set clear goals for implementation and evaluation. Before certification, it is recommended that your company carry out internal audits to identify potential gaps. One of the most important things to remember is that the development, implementation and certification of a management system is a continuous process, the certification audit represents an element of a path of continuous improvement.

Friday 3 July 2020

Fake news and its risks in times of COVID-19

The so-called fake news, false news or junk (if we want to use a word from our dictionary to refer to this type of publication), gained notoriety in recent times, mainly for two reasons: due to the ease and speed with which it is spread, and by the impact they can generate. In this article we analyze the impact that false news has had in recent months, mainly those related to a critical sector such as health.

In recent years, fake news has gained greater visibility in the context of electoral processes, being used to influence the population, especially among voters. In fact, in the latest report on security trends for 2020 , Tony Anscombe addressed the issue of fake news and its impact on the presidential elections, which left the door open to the analysis of the effects of disinformation in other areas, something that we can confirm from the large amount of false information about the disease that has been circulating since the beginning of the pandemic.

The subject is so delicate that even the WHO has used the term infodemic to refer to the practice of spreading false news or incorrect information related to the pandemic, given that in the current context, disinformation represents a more serious problem by having the ability to put at risk the health and integrity of people . Since the circulation of COVID-19 spread globally, misinformation has promoted, among other things, that someone with symptoms experiment with remedies that lacked scientific evidence to demonstrate their effectiveness in hopes of being cured, or that those living in countries with Hot climates did not have to worry, UNESCO explained.

Misinformation and how it threatens people's health tech architect job description
The viralization of false information directly influences the collective consciousness and the problem is in the speed with which it spreads, especially if its creator promotes and shares it from multiple accounts and networks at the same time.

According to data published by the World Health Organization, during the month of April more than 360 million videos were uploaded to YouTube under the category “COVID-19” and “COVID 19”, while in March this year about 550 million Tweets included the terms coronavirus, corona virus, covid19, covid-19, covid_19 or pandemic.

The false news about the pandemic have circulated from news, messages, audios and videos in which it was even claimed that the virus did not exist (which caused many people to ignore the sanitary measures), to the distribution of sensational information that contributed to the increased fear and anguish of people.

Other types of fake news encouraged to ignore the recommendations made by doctors, scientists and specialists, to the point that even recognized media were influenced by fake news and called to ignore the measures recommended by health authorities, exposing even more the health and integrity of people .

As we mentioned previously, the alleged cures or medications to treat the disease circulating through social networks proliferated, despite the fact that officially there is no specific treatment for the new coronavirus and only medications are indicated to alleviate the symptoms. In this sense, the dissemination of this type of information has caused the infodemic to enhance the impact of the pandemic.

In fact, according to data from a survey carried out by ESET Latin America in May, more than 70% of the participants assured that during the pandemic they received or had contact with false news related to COVID-19; mainly through social networks (72%), but also through WhatsApp (51%) and unreliable news portals (36%).

Given the impact and risk of this phenomenon, some social platforms, such as Facebook, Google, LinkedIn, Microsoft, Twitter, Reddit and YouTube joined forces in the fight against disinformation and scams that revolve around the pandemic, changing the rules. to censor, as in the case of Twitter, those messages that incited people to act against official recommendations.

Wednesday 1 July 2020

What Do Business Architects Do?

Do you have a convincing profile as a Corporate Architect? One of our clients in Laval needs your expertise. Your professional success is important to us and we hope to have you on the team!

Find out what is expected of you to successfully complete this mandate website architect job description.

The responsibilities of the position are: 
Define the directions and positioning of information technologies and see to their approval and dissemination;
Advise and participate in the approval of technological choices in the fields of applications, data and infrastructure including security;
Ensure the correspondence between the evolution of the company and technological progress;
Participate in the development and implementation of architectural principles and standards;
Document the architecture and its main processes;
Validate the architecture documents according to best practices and the overall architecture of the solution;
Promote, reuse or apply existing solutions if possible, or make them reusable and scalable;
Participate in the lookout and research and follow technological developments and industry trends; assess their applicability, functionality and reliability and recommend technologies that could improve the achievement of business objectives;
Design and structure business or product plans, including the identification of alternative approaches and proposals for return on investment and takes into account possible and applicable supply models;
Present the cost-benefit analysis related to technological choices and argue the choice of strategy;
Work closely with solution architects to define and apply the business and technological orientations of the IT project portfolio;
Respect the appropriate standards and procedures including change control and documentation;
Take part in other development, quality control and incident management activities, according to the specific needs of each project.

The profile sought is as follows:
Hold a bachelor's degree in a relevant field (computer science, software engineering, technology engineering or in a related discipline);
Have more than ten (10) years of experience as a business architect.
Have implemented enterprise architecture for enterprise data management (MDM-Master Data Management) as part of the business intelligence program;
Have set up a foundation of cloud solutions including identity management, tools and container orchestrations required for software development, DevOps development tools and practices with continuous integration required for the entire IT project portfolio;
Have participated in the definition of roadmap including aspects of digital online services, implementation of advanced telecommunications services and support for connected objects;
Have knowledge of architectural frameworks, methodologies and tools for designing technological solutions based on the TOGAF model; but also concepts of business strategy, SWOT analysis techniques (Strengths, Weaknesses, Opportunities and Threats) risk assessment techniques, profitability assessment and CTP calculations (total cost of ownership);
Know the requirements of systems architecture:performance, maintainability, scalability, dimensional adaptability, availability, security and accessibility, as well as the fundamental elements related to security;
Know the emerging technologies and their application markets;
Have experience with public and municipal procurement models (a major asset);
Have a strong capacity for analysis, synthesis and communication;
Demonstrate bilingualism in French and English (oral and written).

Aruba HPE Instant On Small Business Access Point Overview

Features of the Aruba brand and the Instant On line The Aruba brand is owned by the American company Hewlett Packard Enterprise (HPE) and is...