Vous êtes sur la page 1sur 8

48.

Remote Network Management

Classification:
Definition:
RMON (Remote Network Monitoring) provides standard information that a network administrator can use to
monitor, analyze, and troubleshoot a group of distributed local area networks (LANs) and interconnecting T1/E-1 and T-2/E-3 lines from a central site. RMON specifically defines the information that any network
monitoring system will be able to provide. It's specified as part of the Management Information Base (MIB)
in Request for Comments 1757 as an extension of the Simple Network Management Protocol (SNMP). The
latest level is RMON Version 2 (sometimes referred to as "RMON 2" or "RMON2").
RMON can be supported by hardware monitoring devices (known as "probes") or through software or some
combination. For example, Cisco's line of LAN switches includes software in each switch that can trap
information as traffic flows through and record it in its MIB. A software agent can gather the information for
presentation to the network administrator with a graphical user interface. A number of vendors provide
products with various kinds of RMON support.
RMON collects nine kinds of information, including packets sent, bytes sent, packets dropped, statistics by
host, by conversations between two sets of addresses, and certain kinds of events that have occurred. A
network administrator can find out how much bandwidth or traffic each user is imposing on the network and
what Web sites are being accessed. Alarms can be set in order to be aware of impending problems.
http://searchmobilecomputing.techtarget.com/definition/RMON

49.

WAN Security

Classification:
Definition:
A wide area network (WAN) is a geographically dispersed telecommunications network. The term
distinguishes a broader telecommunication structure from a local area network (LAN). A wide area network
may be privately owned or rented, but the term usually connotes the inclusion of public (shared user)
networks. http://searchenterprisewan.techtarget.com/definition/WAN
Control Standards
When you do see WAN-specifc standards, they address WAN management, Domain
Name Services (DNS), router security, protocols, and Web services. The standards
might call out specifc security requirements for WAN devices such as routers, switches,
and
wireless
devices.
http://my.safaribooksonline.com/book/networking/security/9780763791322/itinfrastructure-security-policies/sect198#X2ludGVybmFsX0J2ZGVwRmxhc2hSZWFkZXI/eG1saWQ9OTc4MDc2Mzc5MTMyMi8yNDY=
50.

LAN Security

Classification:
Definition:
In the field of networking, the specialist area of network security consists of the provisions and policies
adopted by the network administrator to prevent and monitor unauthorized access, misuse, modification, or
denial of the computer network and network-accessible resources.
http://en.wikipedia.org/wiki/LAN_security

51.

Operations Management (IT)

Classification:
Definition:
http://wiki.en.it-processmaps.com/index.php/IT_Operations_Management
The objective of IT Operations Management is to monitor and control the IT services and IT infrastructure. IT
Operations Management executes day-to-day routine tasks related to the operation of infrastructure components and
applications.

52.

Object (IT)

Classification:
Definition:
http://en.wikipedia.org/wiki/Object_(computer_science)
In computer science, an object is a location in memory having a value and referenced by an identifier. An object can
be a variable, function, or data structure. With the later introduction of object-oriented programming the same word,
"object," refers to a particular instance of a class. In relational Database management an object can be a table or
column in a relational database, or an association between data and a database entity (such as relating a person's
age to a specific person).

53.

IT Faults Monitoring

Classification:
Definition:
http://en.wikipedia.org/wiki/Fault_management
In network management, fault management is the set of functions that detect, isolate, and correct malfunctions in a
telecommunications network, compensate for environmental changes, and include maintaining and
examining error logs, accepting and acting on error detection notifications, tracing and identifying faults, carrying out
sequences of diagnostics tests, correcting faults, reporting error conditions, and localizing and tracing faults by
examining and manipulating database information.

54.

IT Performance Monitoring

Classification:
Definition:
Types of Monitoring
Basically, there are two approaches to monitor machines under test:
Internal Probes/Agents that run withinthe server (as a process/daemon) and sends counter
values to an application like the Windows Task Manager or out to aDiagnostics Mediator/Server
External Monitors (such as the unix rstad daemon) that respond to operator commands sent
using SSH (Secure Shell) protocol through the network to the server being monitored, which then
responds with another transmission over the network. http://www.wilsonmar.com/1perfmon.htm

Computer performance is characterized by the amount of useful work accomplished by a


computer system compared to the time and resources used.
Depending on the context, good computer performance may involve one or more of the following:
Short response time for a given piece of work
High throughput (rate of processing work)
Low utilization of computing resource(s)
High availability of the computing system or application
Fast (or highly compact) data compression and decompression
High bandwidth / short data transmission time http://en.wikipedia.org/wiki/Computer_performance

55.

Systems Environment (IT)

Classification:
Definition:
The system environment is primarily the set of variables that define or control certain aspects of
process execution.
They are set or reset each time a shell is started. From the system-management point of view, it is important to ensure
the user is set up with the correct values at log in. Most of these variables are set during system initialization. Their
definitions are read from the /etc/profile file or set by default.

http://publib.boulder.ibm.com/infocenter/pseries/v5r3/index.jsp?
topic=/com.ibm.aix.baseadmn/doc/baseadmndita/sysenv.htm

56.

Application Environment (IT)

Classification:

Definition:
Consists of the frameworks, libraries, and services along with associated APIs necessary for the
runtime execution of programs developed with those APIs. The application environments have
dependencies on all underlying layers of system software. ...
http://docs.info.apple.com/article.html?artnum=51908

57.

IT Infrastructure Management

Classification:
Definition:
http://en.wikipedia.org/wiki/Information_technology_management
IT management is the discipline whereby all of the information technology resources of a firm are managed in
accordance with its needs and priorities. These resources may include tangible investments like computer hardware,
software, data, networks and data centre facilities, as well as the staff who are hired to maintain them.
Managing this responsibility within a company entails many of the basic management functions, like budgeting,
staffing, change management, and organizing and controlling, along with other aspects that are unique to technology,
like software design, network planning, tech support etc.[1]

58.

PC Inventory

Classification:
Definition:
http://www.businessdictionary.com/definition/inventory-record.html
http://www.softinventive.com/products/total-network-inventory/?gclid=CMjr67vw-rkCFZE7MgodS1oAuw
Manual or computer-based record of the quantity and kind of inventory (1) at hand, (2) committed (allocated) to firm-orders or to work-in-process, and (3)
on order. It often also includes history of the recent transactions in each inventory item. Also called stock record.
Read more: http://www.businessdictionary.com/definition/inventory-record.html#ixzz2gfv0IWOK

59.

Ticket Creation (IT Services)

Classification:
Definition:
http://community.connectwise.com/index.php?option=com_k2&view=item&id=5271:creating-a-serviceticket&Itemid=158 Creating Service Tickets Throughout ConnectWise:
There are multiple places throughout ConnectWise to create service tickets, including:
Service Tickets can be entered manually, via the Customer Portal or through Email Connector.
Service Board
Service Search

Service tab of a Company record


Service tab of a Contact record
Service tab of the Company Finance screen
Service tab of My Activities
Right clicking on the My Schedule screen or the Dispatch Portal

Steps to Create a Service Ticket from the Service Desk Module


Please note that most Service Ticket fields will be populated automatically such as the Company info, Finance info, Service Board,
Agreement (should one be applied to the ticket).
1.Navigate to the Service Desk menu and select New Service Ticket. A new service ticket page will display.
2.Select or Search for the Company that this ticket is for. If there is a red flag that appears next to the company name, it
may mean that the company status needs to be changed or/approved. You can contact your company's Finance
department to get resolved.
3.Verify that the Contact and additional information that automatically populated in the fields is correct. If the information
needs to be changed they can be edited in each field or, use the picker to change the Contact, Site Name, orOpportunity.
4.Check the Agreement field to apply or determine if an Agreement needs to be added.
5.Select the Service Board for the ticket.
6.Designate the appropriate Service Type, Service Sub Type and Service Item from the drop down fields.
7.Enter a distinguishable and easy to identify Summary.
8.Enter complete and concise information about the issue/request in the Detail Description field.
9.For notes that are not client facing, enter them in the Internal Analysis field.
10.Save the ticket:
1.Click Save to save your changes and stay on the ticket page. After you click Save, you can
2.Click Save and Close to save the ticket and close page and open a New Service Ticket screen for you to enter
an additional ticke

60.

Server Management

Classification:
Definition:
Provision of hardware and operation systems management as well as data center facilities for
servers owned by another department or external entity
http://www.educause.edu/coredata/glossary
1.
http://trials.gfimax.com/en-gfi-max-remote-server-monitoring-and-management?
adv=987&loc=228&gclid=CNKT5sTy-rkCFbFDMgodT0kALQ
61.

Network Management

Classification:
Definition:
Network management refers to the activities, methods, procedures, and tools that pertain to the
operation, administration, maintenance, and provisioning of networked systems.
http://en.wikipedia.org/wiki/Network_management
http://www.webopedia.com/TERM/N/network_management.html

62.

Web Monitoring

Classification:
Definition:
http://www.webopedia.com/sgsearch/results?cx=partner-pub8768004398756183%3A6766915980&cof=FORID%3A10&ie=UTF-8&q=web+monitoring

63.

Network Operations Center

Classification:
Definition:
Network Operating System refers to software that implements an operating system of some kind that is oriented
to computer networking. For example, one that runs on a server and enables the server to manage data, users,
groups, security, applications, and other networking functions. [1] The network operating system is designed to
allow shared file and printer access among multiple computers in a network, typically a local area network (LAN),
a private network or to other networks.

http://en.wikipedia.org/wiki/Network_operating_system
Types of Operating Systems
The best-known operating systems are those used on personal computers:
Microsoft Windows
Mac OS X
Linux
Some operating systems are designed for certain types of equipment, such as
Google Android (a variant of Linux), and Symbian - for cell phones
Solaris, HP-UX, DG-UX, and other variants of Unix - for server computers
DEC VMS (Virtual Memory System) - for mainframe computers

http://compnetworking.about.com/od/basicnetworkingconcepts/a/network-operating-systems.htm
64.

Mission-Critical Site

Classification:
Definition:

Definition of 'Mission Critical'


An activity, device, service or system whose
failure or disruption will cause a failure in
business operations. For example, an online
business's mission critical is its
communication system. A water filtration
company will cease to function if its water filter
system is down and a bakery will have to shut
down if it does not get gas or electricity
services to fuel the ovens. In this case, the
critical function of this business is to bake
desserts and it's mission critical is the power
supply required to run the ovens.

Investopedia explains 'Mission Critical'


This is a popular term used to describe the essential
services required for day-to-day operations. If a business
operation cannot be interrupted under any circumstance
without hurting production, then this operation is considered
the business' mission critical because it is indispensable.
http://www.investopedia.com/term Databases and process control software are considered
mission critical to a company that runs on mainframes or
s/m/mission-critical.asp
workstations. Emergency call centers, computerized hospital
patient records, data storage centers, stock exchanges and
any other operations dependent on a computer and
communication systems have to be protected against
downtime or shutdowns due to the system's mission-critical
functions.

E-Business Systems Management


Solutions
65.

Classification:
Definition:
eBusiness (e-Business), derived from such terms as "e-mail" and "e-commerce," is the conduct of
business on the Internet, not only buying and selling, but also servicing customers and
collaborating with business partners. The sign of a good eBusiness is not just being able to sell
books, but knowing how many books you've sold, and to whom, and also to answer questions like
"what books are my customers buying next?"
Information Builders' iWay Software suite facilitates the implementation of e-business by accelerating business
integration. How does iWay accelerate business integration? By simplifying it dramatically eliminating custom

integration code, and replacing it with the straightforward assembly and configuration of off-the-shelf
components. iWay Software provides everything necessary to achieve real-time, near-real-time, or batch
integration more quickly and easily than competing tools and the "roll-your-own" approach.
iWay also provides highly efficient standard connections to over 300 back-office systems and data sources,
enabling organizations to quickly and easily leverage technologies such as IBM's Websphere, Microsoft's
BizTalk Server, XML, and Java. For more information on the newest suite of integration solutions, please
visit iWay Software's home page.
WebFOCUS a comprehensive suite of business intelligence software from Information Builders reduces the
cost and time for development and deployment of Web reporting and information delivery applications, while
providing powerful, scalable, enterprise-wide business intelligence. It is the only solution that enables every
process involved in creating and delivering interactive, actionable information, including:
Accessing all of your current information assets, including legacy and relational data sources, cubes, data
warehouses, and data marts
Providing visuals, advanced formatting, and output options such as charts, Excel spreadsheets and Adobe PDF
documents, and performing complex calculations
Processing requests quickly, intelligently, and efficiently
Delivering real-time actionable information anytime, anywhere via Web, e-mail, and mobile devices to
employees, managers, partners, and customers.
The combination of WebFOCUS BI suite on the front-end and iWay Software's integration technology on the
back-end provides a unique, single vendor solution that allows you to deliver real-time information to everyone in
your extended enterprise.

http://www.informationbuilders.com/ebusiness-e-business

Vous aimerez peut-être aussi