What servers and services should be monitored and why

Assignment Help Management Information Sys
Reference no: EM131031066

Windows Application Deployment Proposal

ShivCorp is has hired you as an IT consultant for improving on their current Windows Infrastructure. ShivCorp is a manufacturing company of automotive fabrics that have locations in Detroit, New York, Atlanta and Mexico. Majority of staff including IT is located in their headquarters in Atlanta. The Detroit and New York office has mostly sales and marketing personnel.

As you a consultant, you are bidding on a lucrative contract to design and implement a robust Windows network. ShivCorp has provided details of their current IT infrastructure.

• Main datacenter is located in Atlanta. The Atlanta office has one main data center with three offices converted to data center due to space issues in the main data center.

o Email system which is Microsoft Exchange runs on 4 physical servers.
o 20 SQL Servers
o 12 Oracle Database Servers
o 4 File and Print Servers
o 12 Web Servers
o 40 Application Servers (HR, finance, budget, inventory control, licensing, reporting, etc)

• WAN connectivity is in place between all sites using secure (IPSec) tunnel with redundancy.

• Security in terms of firewalls and IPS and IDS in place and will be handled separately.

• Assumptions can be made regarding any information not included here; all assumptions should be identified, however.

Topics to Cover in your Proposal:

Your document should cover the content presented in the course. The outline below contains recommended points to cover. You are free to add other related information.

Describe the technical and business reasons for each choice, citing other resources as appropriate.

The Windows Server 2012 operating system should be used for all aspects of the solution.

The topics include:

Policies and Guidelines

• Develop points to include in policies and guidelines since they are outdated. A detailed policy is not needed.

Monitor

• Implement monitoring plan for critical servers and services. What servers and services should be monitored and why?

Software Update

• Plan to update the servers

• Plan to update desktop

• Plan to update software (Office, Adobe Reader, etc.) and plugins (Java, Flash, etc.)

Clustering and NLB

• Identify, justify and develop a plan for clustering servers. Which service/servers should be clustered?

• Plan for load balancing web servers.

Virtualize

• Since space in data center is issue, plan for using virtual technology. Proposal should including but not limited to networking, storage/SAN, managing.

• Requirements for a virtual template

Single Sign ON

• Automotive manufactures who are ShivCorp want to access internal inventory so they can place orders. Develop a plan for ADFS.

Assignment Requirements

There are specific requirements for the assignment: The final submission should contain at least 6 pages' worth of text written by the student (not counting title page, images, diagrams, tables, or quotations), but may be longer, not to exceed approximately 12 pages' worth of student-supplied text. (With the required diagram, and other images, title page, etc., the final submission may end up being more than 12 pages in length.) It must be double-spaced, have 1-inch margins, and use 12-point Times New Roman or 10-point Arial/Helvetica font. A title page is required; APA format for the title page is optional.

• At least one diagram must be included (not counted towards the minimum length described above). Additional diagrams, images, or tables are welcome.

• The submission must cover all of the 6 major topics outlined above. Each choice should be explained with technical and business reasoning. The solution should be reasonably detailed. Additional topics may be covered as desired.

• The structure of the final submission is flexible. There is no specific format required, although it should be organized logically and represent a single, unified solution. It is likely that the format will include separate sections for each of the 6 topics required, as well as a summary.

• At least two non-textbook, non-LabSim, non-Wikipedia reference is required; preferably, this would be a "best practice" guide or similar content from Microsoft or an experienced provider of Microsoft solutions.

• Be sure to properly quote or cite any sources used. APA format is required for in-text citations and the list of works cited at the end. It is expected that you are already familiar with UMUC's "Policy on Academic Dishonesty and Plagiarism." It is available in the Academic Policies section of the Syllabus; there are also links in the Webliography. In its simplest form, if you are using text from a source, you must cite and/or quote it. If plagiarism is found, then there will be a penalty to the grade.

Reference no: EM131031066

Questions Cloud

Accurately be more suited for machines or human : There are some abilities (functions) that are more suited for humans than machines and others fall into the reverse arena. Would making a series of calculations rapidly and accurately be more suited for machines or human?
Explain the ethical issues in marketing field : Explain the ethical issues in marketing field and identify and discuss about two companies in Australia who has been having some issues regarding the way they pursue their business. You can elaborate on any aspects of marketing where these compani..
Companys quality training curriculum : Search a company that follows the principles of the Juran Trilogy. What influence did the elements of the Juran Trilogy have, if any, on the company's quality training curriculum? If the company does not have a quality curriculum, why do you believe,..
What servers and services should be monitored and why : Implement monitoring plan for critical servers and services. What servers and services should be monitored and why?
What are potential minefields for global expansion : Companies have successfully marketed globally for decades, yet global competition is intensifying as more companies are entering the international marketplace. What are key factors that Marketers must make when seeking to expand globally? What are po..
Market demassification has resulted in an ever-increasing : Market demassification has resulted in an ever-increasing number of market niches and the use of direct marketing to reach these niches is growing. The Christmas Shopping season provides Direct Marketers with opportunities to extend brand awareness a..
Challenges facing organisations in contemporary environment : This assessment encourages students to: Understand the challenges facing organisations in the contemporary business environment. Provide a critical perspective of the academic literature on a topic
Forward contract in hedging foreign currency firm commitment : Analyze the main reasons why a company might prefer a foreign currency option over a forward contract in hedging a foreign currency firm commitment. In contrast, analyze the main reasons why a company might prefer a forward contract over an option in..

Reviews

Write a Review

Management Information Sys Questions & Answers

  Describe the features of organizations

Define an organization and compare the technical definition of organizations with the behavioral definition.  Identify and describe the features of organizations that help explain differences in organizations' use of information systems

  Write an authentication policy for hypothetical organization

For this assignment you are asked to write an authentication policy for a hypothetical organization. This policy should address the use of various authentication schemes for different assets

  Describe the one thing about prototyping

In this article review, you will describe the one thing about prototyping that surprised you the most. Find an article on prototyping and write a one-page (250-word) paper that includes the following:  A description of the article and where it was ..

  Which is position manages firewalls

Which IS position manages firewalls and antivirus software and this managerial IS position is responsible for managing such computer hardware as firewalls, and software such as antivirus software.

  Enterenter rfid and privacy into the internet search engine

enterenter rfid and privacy into the internet search engine to select a page expressing privacy concerns. summarize

  Question 1a classify the subsequenta presentation serverb

question 1a classify the subsequenta. presentation serverb. application serverc. database serverd. software application

  What is incident response approach organization should take

Lately, their customers have been complaining about receiving calls from a competitor in another country with detailed information about their purchase histories and relationship with the organization. What is the incident response approach the or..

  Customized business software vs off the shelfcan you

customized business software vs. off the shelfcan you provide two examples where customization of business software

  Jakes computer repair service exerciseintroductionjakes

jakes computer repair service exerciseintroductionjakes computer repair service earned a small profit for the month of

  Description of computer crimeswrite an executive summary to

description of computer crimeswrite an executive summary to the board of directors that summarizes the following issues

  Determining vulnerabilities for a database server

Case Project: Determining Vulnerabilities for a Database Server, You have interviewed Ms. Erin Roye, an IT staff member, after conducting your initial security resting of the Alexander Rocco Corporation. She informs you that the company is running..

  Global value chain and global supply chain management

Global value chain and global supply chain management - describe which is used in the money transfer business , and why it is used. Be sure to cite your references in your analysis.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd