...I have been a nurse aide I have found how hard of work being a nurse aide is and how much many nursing home forget the importance of meeting the basic needs of their residents. You would think that this would be the most important aspect that all nursing homes must meet, but just like every other business a nursing home is also money base, it is not charity. Many times in this hard economy nursing homes have to make cuts, and unfortunately they are cutting all in the wrong places. Many times office jobs in the nursing home are the last to be cut and the nurse aides are the first to be cut, and the reason being is because many states do not have laws stating the aide to resident ratio. Today, a local nursing home has just got a new hope in recovering the problem of the loss of success that their nursing home has encountered. They have begun to cut nurse aides and have begun to run the halls short-handed, unfortunately their complaints have went up and their residents have become very unhappy. The nursing home has now decided to fire the current administrator and hire a new administrator in hope for new ideas and better success for their nursing home. Although the new administrator has many difficult problems to solve she has a lot of faith in recovering the problem the nursing home is now encountering. The new administrated began looking through past experiences working in a nursing home as a nurse aide. She remember the hard work that was endure every day, and how every...
Words: 1161 - Pages: 5
...authorization. One main unit of those units is the help desk unit that is responsible in brief for employees' requests to set services, solve problems or incidents. There are more than one way that is used by the help desk unit to interact with employees to help them with their IT needs i.e. call center, emails and the IT services system. This paper contains a comparison and evaluation of the two systems that have been used by QOC IT department to receive users' requests (HP open view, BMC9.1 & BMC10.1) in term of PIECES framework. The evaluation of the system is based on system administrator's point of view and end users' (QOC employees) point of view. An evaluation of the current system (BMC10.1) has been conducted based on employees & administrator surveys & interviews and after the analyzing of those surveys problems with performance and input has been highlighted. A suggested solution that might be taken to improve the effectiveness and the efficiency of the system has been given. System used by the help desk unit HP open view 4.5 There are two different systems that used by IT...
Words: 1469 - Pages: 6
...objective was to ensure that the Customers don’t have to leave the confines of their comfort to book a ticket, and to help them get a ticket when they need it the most. • The internet was being voted as a medium people couldn’t do without. PC and net penetration was increasing not only in urban areas, but also in rural India. Also, people were getting used to booking tickets for travel using IRCTC and private airline websites. So, why not buses? • Online system provides real time quotations, real time bus booking services for round trips, multiple payment channels, cost comparison, last minute booking, an in-house call center and even home delivery of tickets. ➢ Admin Back-End System(home page of administrator) : ➢ Able to view & edit customer details ➢ 3 types of admins, user level permissions ➢ Bus details display. ➢ Assigning drivers to buses and...
Words: 306 - Pages: 2
...Zenmap Specs * Supported Operating systems: Windows, Mac, Linux, BSD * Cost: Free * Requirements: Nmap Who’s it for? Zenmap is for any network or security administrator who needs to keep a constant check on their network topology. With it’s next-to-zero learning curve, just about any network administrator can have all of the information they need quickly. Zenmap will work for any size company or even a single-user consultancy, where a quick scan of a network topology can make the difference between spotting a security issue and finding a resolution or, well…not. What problem does it solve? There are two very key issues Zenmap solves. One is making the more-challenging Nmap scanner useable for the average administrator. Nmap is a console-only tool and the majority of administrators do not want to spend their day at the console (with a nod to the old-school Linux and UNIX admins who would much rather spend their day at the command line than in a GUI tool). Zenmap also gives the administrator a topology mapping tool where they can actually see an interactive, animated visualization of the hosts on your network. Key features * Free * Easy-to-use GUI * Quickly saves scans * Uses traceroute and ping * Saves profiles for frequent run tests * Topology mapping * Compares scan results of different scans * Runs multiple scans and views them as one big scan * Plenty of default scan profiles to choose from * Searches scan results...
Words: 251 - Pages: 2
...IT 331-CNS Capstone Network Solutions LLC 6/22/2012 Network Solutions IT Staff * Victor Santiago - Network, Systems Manager Job Description: Managers of information technology provide leadership, team management and stewardship for an organization's IT-enabled business systems, solutions and processes. They manage the technology portfolio, which typically includes personal computers, mainframes, servers, data storage, networks, middleware, Internet services and other IT systems that comprise the core infrastructure. Managers of information technology are dynamic, engaging and personable technologists, and provide leadership during projects ranging from large, strategic initiatives to small systems upgrades. * Jason Rush - Project Manager, Network Analyst Job Description: IT managers these types of managers are accountable for making certain an application, computer hardware product or service remains on target throughout the development process and delivery stages. They may have oversight of computer programmers, IT professionals, and system administrators. They have to also provide effective leadership and marketing communications expertise. A project manager job description can be defined as anyone that is given the responsibility of taking a project from start to finish and completing all the objectives along the way. At the same time maintaining control over what is said to be the three most important components of any job, Time, Cost, and Quality. More than...
Words: 800 - Pages: 4
...Section – I: 1) Explain why the performance of an Ethernet LAN decreases with an increase in the number of stations on the LAN, whereas it increases (at least initially) with the increase in the number of stations in a token-ring LAN? A) There are too many differences between Token Ring and Ethernet to list out here. You could read more about it from many useful search results for "ethernet vs. token ring." I'll point out a key difference and give you a source answering your question on performance. Ethernet is based on CSMA/CD (carrier sense multiple access with collision detection), meaning multiple stations sense the carrier at the same time and send data when the carrier is free. However, there might be multiple stations sending a free carrier and send the data at the same time, causing "collision." Collision is the main factor affecting ethernet's performance. The more stations on the same LAN, the higher the collision rate, the lower the performance. Token Ring, on the other hand, is based on a control/access given to the station owning the "token." Think of a token as the key to the media: whichever station has the token would be allowed to use the ring to send the data. So there would be no collision, just multiple stations competing for the same token. With not too many stations, the wait-for and claim of the token is very efficient (think of a video game with less players waiting to play it.) But if there are too many stations, most would just sit around and...
Words: 923 - Pages: 4
...addition we have security specialists, analysts and management to assure the compromise of assets never happens, which provide the best in security enterprise software built in house. Our company’s network architect team utilizes a precise mix of technology to provide acceptable network data transfer for the network users' requirements. Network bandwidth is the amount of data that can be transmitted on a network in a particular time span. We noticed in the proposal that there are video and graphic applications which require higher data transfer which our company will provide the needs of your request. In our company we have some of the most competent technicians in this field and other technicians that can assist. There are Network administrators on board to assist with load balancing to ration network bandwidth to compensate for rigorous applications so they won't bring down the network’s performance. Fiber-optic cabling is a new technology whereas it brings a much higher data rate than the conservative metal cables. For your merging desire, we suggest this type of cabling. Clustering is a popular strategy for implementing parallel processing applications (being able to handle many applications at a time) because it enables companies to control...
Words: 809 - Pages: 4
...“Manager” and (“asses” or “Assessor” or “assessment”) and (“refer” or “referral” or “referring”) and (“Learning disabilities” or “LD” or “mental health” or “learning disability”) and (NVQ4 or “NVQ 4” or “NVQ level 4” or “NVQ IV” or NVQ3 or “NVQ 3” or “NVQ level 3” or “NVQ III” or QCF4 or “QCF 4” or “QCF level 4” or “QCF IV” or QCF3 or “QCF 3” or “QCF level 3” or “QCF III” or “Registered manager award” or RMA) and (care or “social care” or “health care” or “home care” or “care home” or “residential care”) (“referral manager” or “assessment manager” or “referral and assessment manager” or “referral and assessment manager”) and (“Learning disabilities” or “LD” or “mental health” or “learning disability”) and (NVQ4 or “NVQ 4” or “NVQ level 4” or “NVQ IV” or NVQ3 or “NVQ 3” or “NVQ level 3” or “NVQ III” or QCF4 or “QCF 4” or “QCF level 4” or “QCF IV” or QCF3 or “QCF 3” or “QCF level 3” or “QCF III” or “Registered manager award” or RMA) (“care manager” or “home manager” or “registered manager” or “branch manager” or “home care manager” or “service manager” or “domiciliary manager” or “dom manager”) and (domiciliary or “dom care” or “homecare” or “home care” or “care agency” or “community care”) and (NVQ4 or “NVQ 4” or “NVQ level 4” or “NVQ IV” or NVQ5 or “NVQ 5” or “NVQ level 5” or “NVQ V” or QCF4 or “QCF 4” or “QCF level 4” or “QCF IV” or QCF5 or “QCF 5” or “QCF level 5” or “QCF V” or “Registered manager award” or RMA) (“live in carer” or “live in manager” or “live-in manager”...
Words: 2489 - Pages: 10
...Career Choice: Network and Computer Systems Administrator Business and Writing for the IT Professional July 26, 2009 Abstract A network and systems administrator is responsible for network security, installing new applications, implementing software updates, monitoring the integrity of the system, developing management programs, and performing routine backups. As has been noted throughout my research, there has been a decline in technology majors throughout the past couple of years, thus affecting the job market. The survey that was conducted on high school seniors, as well as research done by some universities, has proven that lack of information and interest affects this type of career choice. By properly informing potential technology students and offering them resources, we can better equip our future system and network administrators to perform to their potential. Topic Proposal Author Background An interest in computers came to my attention shortly after graduating from high school. I first involved myself in working with cameras and fixing them for several customers. The satisfying knowledge that I gained came from realizing that I could take apart, fix a piece of technology and do it well. Computers as a hobby came only after my brother gave me one to fix and keep for my use. Although I was daunted at first, I took apart and drew diagrams, to remember where the components where located. I had no previous experience from computers that I had learned...
Words: 1945 - Pages: 8
...Lauren Lamotte | 7714 Lancer Ct | Niceville, FL 32578 | (850) 408-6789 | lauren.lamotte@us.af.mil November 14, 2015 Linda Vinetti Hiring Manager Capriccio Software, Inc. 3556 Gen DeGualle Blvd New Orleans, LA 70128 Dear Ms. Vinetti: I read of your company’s need for a Linux Systems Administrator in the New Orleans area on Indeed.com. I will be returning to New Orleans after my military enlistment is complete, and I believe that I would be an excellent fit for the company. I have worked as an IT professional in the United States Air Force for over six years, with my last three years working as a Linux Systems Administrator, and I am confident in my ability to become a valuable member of your team. I have an Associates degree in IT, and I am working towards by Bachelors degree in Information Systems Management. I am also professionally certified from Microsoft, Cisco, and CompTIA. As a Linux System Administrator, I have extensive experience in the following areas: * System Administration and Repair * Systems Installation, Configuration & Upgrading * Programming and Scripting * System Security, Backup and Recovery As a supervisor in the United States Air Force, I have experience working in teams, and I thrive under pressure. Additionally, I have excellent communication and interpersonal skills, which has...
Words: 894 - Pages: 4
...Ellery Corley NT 1230 Wednesday Unit 4. Exercise 1 User-Profile Scenario From: Systems Administrator To: Manager I have reviewed your email inquiry and have the following recommendations. 1. Interns should not have the level of access that allows the changing of their workstations. Thus all interns will be combined into a group for restricted access. This group will be given standard access, not allowing for any changes to workstation unless authorized by System Administrator. This includes the changing of their password every 60 days. 2. Team leads need to have access to their files from any workstation. Thusly, all team leads will be assigned roaming user profiles. This will allow any team lead to access any work station at their convenience as long as the computer is on the network. This will also require team leads to lock or sign out of a work station when they are not using it. Due to the level of access and availability of said access, Team Lead passwords will be set to be changed every 30 days. 3. Since to Marketing Staff have dedicated work stations, they will be added to an ACL, and be designated user rights applicable to their needs. As System Admin, I do understand the need for access to applications, storage, the network, and the ability to change and customize as needed. Due to the level of access that the Marketing Staff will be assigned, they will be required to change their passwords every 30 days. They will be given a list...
Words: 326 - Pages: 2
...From: System Administrator To: Manager Per your request for a logical system to put into place for your support issues, Listed below are my Recommendations’. Manager Escalation Process for Service Desk Tickets and Incidents Manager Escalation Process Definition This process provides supervisors and managers (or VP/Dean-designated point person) the means for requesting urgent responses (beyond the planned SLA) to specific, previously-submitted Service Desk tickets. 1. Supervisor/manager (or VP/Dean-designated point person) submits a ticket in the Service Desk ticketing system. 2. This is outside of the automated SLA-defined escalation process (in planning stage). Assumptions 1. The user and the user's supervisor/manager have reviewed and understand the planned SLA-defined response times before initiating an escalation request. 2. The user and the user's supervisor/manager will not abuse the escalation process by inflating routine requests or inappropriately classifying them as urgent. Process flow with built-in (SLA-driven) escalation 1. User submits a Service Desk ticket via email, web, chat or voicemail. A ticket is assigned to a team or agent for response/resolution. 2. The Service Desk system automatically escalates the ticket if it is not responded to within two days. 3. Notices of escalations are sent to the respective ITS manager for follow-up. Process flow with supervisor/manager initiated escalation Process begins as outlined above (Steps 1...
Words: 647 - Pages: 3
... What entails to be a system administrator? * A system administrator (SA) is responsible for managing and maintaining a multiuser computing environment. * He /she looks after computers, networks, and the people who use them. * May look after hardware, operating systems, software, configurations, applications, or security. * A system administrator influences how effectively other people can or do use their computers and networks. SA responsibilities include: * Installing, maintaining and troubleshooting workstations, servers, OSs, software applications and other computing systems * Creating user accounts and assigning user permissions * Executing anti-virus mechanisms * Creating backup * Creating file systems * Monitoring network communication * Updating systems upon release of new OSs or software * Implementing computer, network and security policies for system and network users. * Light programming or scripting * User training and management * Hardware and software system security, such as protection against hardware theft and abuse, malware/spyware and unauthorized use of systems and components, including firewall and intrusion detection system maintenance (http://www.techopedia.com/definition/4815/system-administrator-sa Book:the practice of system and network administration second adition by:Tomas A,limoncile) Consequences of not doing your work as system administrator * There will be number of...
Words: 507 - Pages: 3
...System Administrator Description: Computer networking jobs involve designing, setting up, and maintaining a network. Requirements: Although most users today have their own home networks, setting up, troubleshooting, and maintaining a corporate network can be a much more complicated task. Often, networking jobs also require a good understanding of how a network works, and in some cases how all the underlying protocols and structure of how networks work. Recommendations: There are numerous network and network related certifications available today, such as the CCNA, MCSE, etc. Often depending on the level of certification and the job you are applying for, the certifications will be more than enough to quality you for most network jobs. Some of the higher networking positions, especially in the development of network hardware or programming side, may also require past experience in networking or a degree. Difficulty: (MEDIUM - HIGH) Depending upon the job specifications and the complexity of the network usually determines the difficulty of this job. Networking Security expert Description: Test and find vulnerabilities in a system, hardware device, or software program. Requirements: This position is for someone who has a strong familiarity with how software, hardware, and networks work and how to exploit them. Often, you need to have a good understanding of how the overall system works as well as good programming skills. Recommendations: Keep up-to-date with all security...
Words: 1124 - Pages: 5
...Network Design Proposal for Retail Technologies Corporation NETW410, Enterprise Network Design Team Leader: Juba Cochran Team Members: Brian Perez, Matthew Smith November 18, 2010 Table of Contents Executive Summary………………………………………………………………………….........2 Introduction……………………………………………………………….....................................3 Customer Introduction……………………………………………………………………….........4 Organizational Goals …………......5 Organizational Constraints...............................................................................................................6 Technical Goals of Existing Network..............................................................................................7 Technical Constraints of Existing Network.......………………………………………………..…8 Existing Network Design Analysis...……………………………………………………………...9 Technical Goals of New Network Design...……………………………………………………..10 Technical Constraints of New Network Design.....……………………………………………...11 New Network Design Analysis, Including Security………………………………….............12-19 Implementation Schedule……………………………………………………………….......…....20 Testing of The New Network……………………………………………………………............21 Budget............................................................................................................................................22 Detailed Summary.........................................................................................................................23 Detailed Components...
Words: 5466 - Pages: 22