How do we want to proceed

Assignment Help Computer Engineering
Reference no: EM133499567

Question: The current Vitek is in the "Legacy configuration": BioMerieux (mfr) used to deploy these with a small Check Point SOHO-type firewall in front with a NAT'd address to our LAN, and that is how this Vitek is configured.

Vendor and Lab requestors are asking for the removal of the firewall, assignment of a static IP address, and "allowing" the pc to function as a web/application server.

Removal of the firewall, and putting the unit on the LAN is something we have done before with the other Vitek unit, but making it an application server obviously adds more risk, and I'm not sure that the requestors understand that.

How do we want toproceed? Do we want to meet with the Lab and the vendor? Put on hold? Proceed as requested? Something else? making it an application server obviously adds more risk...what risks?

Reference no: EM133499567

Questions Cloud

Identify local community resources in your area : Identify local community resources in your area where clients could receive services. Be sure to include pertinent contact information for the resource.
Discuss women and climate crisis : Discuss Women and Climate Crisis. Try to collect as much data as possible and make sure that it relates to Manitoba, Canada.
Do you think innovations in it should address issues : Do you think innovations in IT should address issues of sustainable operations? Will adhering to these standards have an advantage or disadvantage
Discuss the interface between organizational development : Discuss the interface between organizational development and career development. Please be sure to share at least 3 examples of each in the field of human
How do we want to proceed : How do we want to proceed? Do we want to meet with the Lab and the vendor? Put on hold? Proceed as requested? Something else? making it an application server
How to determine needs in data analytics : How to determine needs in data analytics and facilitate requirements gathering with business stakeholders to convert business problems into results
Explain major components of a data warehouse architecture : Explain the major components of a data warehouse architecture, including the various forms of data transformations needed to prepare data for a data warehouse.
Provide a list of your finding and highlight the information : Provide a list of your findings and highlight the information that you feel is most useful to you as a burgeoning counselor.
Explain what are the expected brain development : Explain what are the expected brain development during childhood and adolescence. Explain what are the development characteristics in the physical, cognitive

Reviews

Write a Review

Computer Engineering Questions & Answers

  What is the value of x

Assume that a vector processor operates 20 times faster on vector code than scalar code. If only x% of the program is vectorizable, what is the value of x.

  Explain your thoughts on the future of iot

Explain your thoughts on the future of IoT and the security implications. Why do you believe it is important to secure these devices as they become more common.

  Determine the rate of heat loss from all surfaces of tank

A 40-cm-diameter, 110-cm-high cylindrical hot water tank is located in the bathroom of a house maintained at 20°C.

  How does drying rate vary with steam-air ratio

Consider a laundry convective clothes dryer for which there is available dry air at 20°C and 1 atm. pressure. There is also available superheated steam.

  Calculate the point differential for each lineup

How many points does a particular lineup score vs how many do they give up to their opponents?

  Provide industry examples of a tps and an mis system

What is going on in the industry? Research a topic of interest to you that is currently making headlines and discuss how this topic relates to Management

  Generate email address and identification number

Write a C program so that a user can enter first and last name of students. Generate email address and identification number of the students.

  Write a test program to declare and initialize two integer

Write a test program (main) to declare and initialize two integer arrays of size entered by the user, invoke the method logicAnd, then display the array result.

  How are authentication and authorization alike

How are authentication and authorization alike and how are they different? What is the relationship, if any, between the two? The response must be typed.

  Define what use is information collected from the devices

Review the material on routers. Since information extracted from router or switch interfaces to not provide specific evidence of a particular crime in most case

  Prepare a maintenance plan to install windows updates

The hospital needs to display a HIPPA warning reminding employees of patient confidentiality requirements to all employees when they log on - Several teams need access to local printers which will be shared among the group.

  Write an instruction sequence to swap the two bytes

Write an instruction sequence to swap the two bytes at $205 and $405. 7. Write an instruction sequence to subtract the byte pointed to by index register Y

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd