How do we want to proceed

Assignment Help Computer Engineering
Reference no: EM133499567

Question: The current Vitek is in the "Legacy configuration": BioMerieux (mfr) used to deploy these with a small Check Point SOHO-type firewall in front with a NAT'd address to our LAN, and that is how this Vitek is configured.

Vendor and Lab requestors are asking for the removal of the firewall, assignment of a static IP address, and "allowing" the pc to function as a web/application server.

Removal of the firewall, and putting the unit on the LAN is something we have done before with the other Vitek unit, but making it an application server obviously adds more risk, and I'm not sure that the requestors understand that.

How do we want toproceed? Do we want to meet with the Lab and the vendor? Put on hold? Proceed as requested? Something else? making it an application server obviously adds more risk...what risks?

Reference no: EM133499567

Questions Cloud

Identify local community resources in your area : Identify local community resources in your area where clients could receive services. Be sure to include pertinent contact information for the resource.
Discuss women and climate crisis : Discuss Women and Climate Crisis. Try to collect as much data as possible and make sure that it relates to Manitoba, Canada.
Do you think innovations in it should address issues : Do you think innovations in IT should address issues of sustainable operations? Will adhering to these standards have an advantage or disadvantage
Discuss the interface between organizational development : Discuss the interface between organizational development and career development. Please be sure to share at least 3 examples of each in the field of human
How do we want to proceed : How do we want to proceed? Do we want to meet with the Lab and the vendor? Put on hold? Proceed as requested? Something else? making it an application server
How to determine needs in data analytics : How to determine needs in data analytics and facilitate requirements gathering with business stakeholders to convert business problems into results
Explain major components of a data warehouse architecture : Explain the major components of a data warehouse architecture, including the various forms of data transformations needed to prepare data for a data warehouse.
Provide a list of your finding and highlight the information : Provide a list of your findings and highlight the information that you feel is most useful to you as a burgeoning counselor.
Explain what are the expected brain development : Explain what are the expected brain development during childhood and adolescence. Explain what are the development characteristics in the physical, cognitive

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd