...FL Company provides support responsible for the Computing Services through its Help Desk that 40,000 staffs spread over six geographic for providing support. Unresolved problems are passed from Guardian to CSSD T1 or T2 staff, and T2 pass to T3 vendors. For each transfer they will document status in IMS. There are about 1,000 requests are taken per day, and about 50 requests/day have unknown resolution and are never closed. So far, there are15,000 open requests of which more than half are more than one year old. Q: Why there are many unclosed tickets? A: Because there is no efficient solution been found to fix the user’s problem or even the company doesn’t have enough time to review all the coming requests in time. (This answer has TWO sub-questions to be analyzed) Q: Why there is no efficient solution for user to fix their problem? A: Because KEDB doesn’t contain as many unknown errors as it should be in its database and also each tier doesn’t have good enough knowledge to solve users’ problems. (This answer has TWO sub questions to be analyzed) Q: Why KEDB doesn’t have enough solutions for problems in database? A: Because there is no timely update of KEDB. Q: Why there is no update of KEDB? A: Because there is no established clarification of duties for each tier. Q: Why there are no duty clarifications for each tier? A: Because the duties are not assigned clear enough in their job descriptions. ...
Words: 864 - Pages: 4
... Geni.com provides its users with appropriate privacy settings and policies. Here are multiple ways Geni has incorporated privacy settings within its website: Each profile created is split into two categories: private profiles and public profiles. Private profiles consist of living relatives and minors, and can be viewed and edited by the family group, Geni curators or Geni employees. Public profiles consist of deceased relatives, presumed deceased relatives and public figures. They can be viewed by anyone but only edited by tree collaborators, relatives, Geni curators and employees. Geni curators are volunteer users that are granted special privileges to help maintain and improves the quality of the social network. To be granted this position, they are nominated through a voting process and must sign a Non Disclosure Agreement to guarantee that they will keep all information confidential. Curators are able to assist users in fixing their family trees (for examples: helping merge family tree). Geni employees are similar to curators, except they are granted full access to users profiles and information. This is so that they can provide customer support, check abuse complaints and resolve problems. On the Geni website, there is an option to “social share” your tree. This means to link Geni to outside applications such as your Facebook account. This cannot happen without attaining the users permission first. Granting Geni permission could also allow for release of personal information...
Words: 570 - Pages: 3
...assessment and business analysis with and without the client present. This provide for the development of both sub – processes and requirements which are used to generate milestones over the course of the project, and to assign responsilibity of development tasks throughout the team. The conclusion of the project is also listed as a milestone and serves as the final delivery of the project after multiple cycles of client interaction and user acceptance testing. 6.2 Methods, Tools, and Techniques The RMT development team, following the waterfall methodology for program managemnt in section 6.1, will also require a standard process by which development, testing,integration and documentation is performed. The following standards are to be implemented and adhered to throughout the lifecycle of the project: 1. Language – Java and associated libaries. 2. Database Implementation – MySQL, Oracle, and PostgreSQL. 3. Source code repository – Git. 4. Documentation – Microsoft word. 5. Testing – Junit. 6. Build and Deploy – Maven. All source code is to be written using spaces, tabs and comments only upon successful completion of all relevant unit and integration tests. Any builds not conforming to this standard are to be rolled back to the prior Git commit hash, fixed verified with automated testing, and pushed forward to the repository. This comment shall also include additional information specifying why the error was made, what was done to correct the action, and actions to be taken in the future...
Words: 593 - Pages: 3
...Question1: List five services provided by an operating system, and explain how each creates convenience for users. In which cases would it be impossible for user-level programs to provide these services? Explain your answer. Services provided by an operating system .the following are examples of services provided by an operating system context switching & scheduling, which allocate process cpu time to execute its instructions . Memory management , which deals with allocating memory to process . Context switching &scheduling which allocate a process cpu time to execute its instructions . Memory management, which deals with allocating memory to process. Interposes the communication, which deal with facilities to allow concurrently running the process to communicate with each each others . File system which provide higher level files out of low level unstructured data on disk . High levels I/O facilities , which free a process from the low level details of interrupt handling . Program execution: the contents are upload on operating system of a file into memory and brings it to the execution. The user cannot trust on os properly and allocate cup time. The main purpose of a cpu is to execute instructions .the cpu executes the binary representations Of the instructions, i.e., machine code .since programs can be very large, and since cups have limited memory, programs are stored in memory (RAM). However, cups do its processing on pc.execution of computer and software engineering...
Words: 1162 - Pages: 5
...1. Your organization keeps paper records for ten years, and you are purging records for destruction. What concern do you have with staff pulling records strictly based on the ten-year indicator? Primarily, every facility should have a detailed policy and procedure manual for destruction of personal health information (PHI). If it is the policy to destroy records that are ten years and older, when selecting records to be destroyed they need to pass through legal holds check. Organizations who do not operate under their destruction policies uniformly or where destruction happens conflicting the policy, a court may permit a jury to assume a negligence suit against the facility. Whereas, if the record were accessible, it would have revealed that...
Words: 508 - Pages: 3
...practices, various media and interconnection components), networking devices and their specifications and functions. Students will practice designing physical network solutions based on appropriate capacity planning and implementing various installation, testing and troubleshooting techniques for a computer network. Where Does This Course Belong? | | | NT2799 | | | | | | | | NSA Capstone | | | | | | | Project | | | | | NT2580 | | | NT2670 | NT2640 | | PT2520 | | Introduction to | | | | | | | | | | | Email and Web | | | | | Information | | | | IP Networking | | Database Concepts | | | | | Services | | | | | Security | | | | | | | | | | | | | | | | NT1330 | | | NT1230 | NT1430 | | PT1420 | | Client-Server | | | Client-Server | | | Introduction to |...
Words: 10839 - Pages: 44
...ITT TECHNICAL INSTITUTE NT1310 Physical Networking GRADED ASSIGNMENTS ------------------------------------------------- Student Professional Experience Project NSA SPE Project 1 (to be completed by the end of NT1310): Install, Configure, Test, Maintain and/or Document the Worksite Local Area Network and Its Components Purpose The purpose of the Student Professional Experience (SPE) project is to provide you an opportunity for work experience in your field or in a related field to add to your résumé. You may have an opportunity to serve your community or work for a local employer for a project that will take between 20 and 30 hours. Project Logistics Career Services will identify an employer with needs in the following areas: Network related tasks (mostly confined to the LAN and Microsoft Windows Server 2008 environments) Students are expected to practice various skills discussed in all the technical courses in Quarters 1 through 3 of the NSA program at an employer’s site on network related tasks (more confined to the LAN and Microsoft Windows Networking with Server 2008 environments) that would involve installation, configuration, testing, maintenance and documentation of the worksite network and its components, and to properly document the technical information in all involved activities. Such documentation will be used as the source material for Items 2 and 3 defined in the Deliverables section of this document. Possible example projects could...
Words: 6762 - Pages: 28