SlideShare a Scribd company logo
1 of 27
Information Technology
Charlie Stevenson
IT DEPARTMENT
What’s the IT department at IMS do? Who does it serve? Who helps out?
My Role
Responsible for planning, implementation,
security, and management of multiple
information and communications systems and
projects, including voice, data, imaging, Internet,
and office automation. Develop annual
departmental budgets and corporate IT policies
and procedures. Provide technical support and
training at all levels of the organization.
People I Serve
• Board of Directors
• Founders
• Guests
• Staff
• Teachers
• Volunteers
• Customers (aka Yogis )
Outside Help & Services
Eric Woudenberg – Dharma Seed
Geof Karlson – Yogi Enhanced System (YES)
Mark Pirani – Electrician
•Expert Laser Services (copiers)
•Charter Business (voice & Internet)
•Rapid7 (Nexpose)
•Gravity Switch (website)
•Prevco Audio (sound systems)
•CCB Nonprofits (software)
•Citrix (XenServer)
•Orange Oil (air conditioners)
•Dell (servers)
•Provantage (equipment)
Over 60 vendor/service providers including:
WHAT YOU SEE
The visible and tangible aspects of IMS IT
What you see: stuff
• Laptop & desktop computers, iPads, etc
• Copiers, fax machines, scanners, printers, labelers
• Credit card readers
• Hearing devices, microphones, amplifiers,
recording equipment
• Cameras, televisions, CD/DVD players, projectors
• Conference phones, desktop phones, cell phones,
helpdesk “red” phones, etc
What you see: website
WHAT YOU DON’T SEE
The invisible and/or intangible aspects of IMS IT
What You Don’t See
• Astounding layers of complexity
• Vast array of hardware, software and technical
standards & protocols to study and master
• Anticipating obsolescence/adoption of new
technologies
– rate of technological innovation leading to
dramatically short lifespan of assets and
investments in hardware, software, web presence,
data formats, storage resources, etc
TIP OF THE ICEBERG
How much are we talking about here?
By the numbers
• 15 wireless access points
• 2 VPN firewall routers
• 2 dharma talk recorders
• 4 fiber media converters
• 2 air conditioners
• 6 microphones, 2
amplifiers, 2 equalizers, 2
FM transmitters for dharma
hall wireless headsets
• 2 phone and voicemail
systems
• 2 photo copiers
• Fax machines, digital
cameras, video recorder,
etc..
• 23 telephone lines
• 2 locked fireproof storage
boxes
• Phones: 6 cell, 2
conference, 7 emergency,
40 system, 2 helpdesk “red”
phones
By the numbers
• 6 external drives, 2 network
attached storage (NAS), 2
storage area networks (SAN)
• 37 desktop and laptop
computers
• 20 servers
• 48 displays
• 25 network switches
• 26 print devices
• 39 battery backups
• ~11 different operating systems
• ~15 programming languages
• ~100 username and passwords
for internal systems, vendor
websites, etc
• Central anti-virus & software
management for all servers and
computers
• ~26,500 lines of code for online
registration and donation etc
• ~300,000 lines of code under
the hood in YES
• Death by acronym:
– DNS, DHCP, LDAP/AD, DFS,
HTTPS, MySQL, MS SQL,
Subversion, SSH, SAMBA, iSCSI,
VLAN, NTP, GPO, MSI, VNC,
WSUS, ODBC, IIS, SMTP, POP3,
IMAP, ARP, WPA2
• Myriad cyber threat vectors
monitored with Nexpose etc
PICTURE IT
My eyes just glazed over can you show me a picture?
Physical Inventory
* Entire inventory not depicted due to space constraints
Can you help me visualize IMS IT from another angle?
VISUALIZE IT
GLIMPSING COMPLEXITY
How do technologies intersect creating challenges for IMS IT?
Case study: Retreat Support
What’s needed?
A system that provides on-call help for yogis
after normal operating hours
• Needs to be easy to use
• Needs to be reliable
• Needs to be flexible—given time-off schedule
for respondents (aka retreat support fellows)
Case study: Retreat Support
• Red desk telephone
• No buttons
• Dials immediately when receiver lifted
• Calls Google Voice number
• Google Voice rings one or both
cell phones
Case study: Retreat Support
• Rugged cellphone + GPS
• Operates in all
conditions
• Clear audio
• 6 hours of talk time
• Rings when red phone
received lifted
• Receives notifications
for missed calls
Case study: Retreat Support
Case study: Retreat Support
Case study: Retreat Support
LOOKING AHEAD
Roadmap (Future Planning and
Investment)
• Yogi Enhanced System (YES)
– succession plan for ongoing enhancements and
maintenance of our mission critical database
application as Geof Karlson moves towards
retirement
– forward migration planning
• Upgrading obsolete wiring at Retreat Center
Questions?

More Related Content

What's hot

DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NO...
DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NO...DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NO...
DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NO...Andris Soroka
 
Selling to The IT Department
Selling to The IT DepartmentSelling to The IT Department
Selling to The IT Department3VR Inc.
 
Hem infotech company profile
Hem infotech  company profileHem infotech  company profile
Hem infotech company profileHem Infotech
 
It4 Coursework Help
It4 Coursework HelpIt4 Coursework Help
It4 Coursework HelpJTHSICT
 
Desktop Support Specialist
Desktop Support SpecialistDesktop Support Specialist
Desktop Support SpecialistSandy Klein
 
The ways in which ict is used
The ways in which ict is usedThe ways in which ict is used
The ways in which ict is usedgracepm28
 
BYOD and your favourite ITSM solution
BYOD and your favourite ITSM solutionBYOD and your favourite ITSM solution
BYOD and your favourite ITSM solutionMarko Ruusinen
 
Voxeo Summit Day 1 - Communications-enabled Business Processes (CEBP)
Voxeo Summit Day 1 - Communications-enabled Business Processes (CEBP)Voxeo Summit Day 1 - Communications-enabled Business Processes (CEBP)
Voxeo Summit Day 1 - Communications-enabled Business Processes (CEBP)Voxeo Corp
 
William Schnatz Resume I
William Schnatz Resume IWilliam Schnatz Resume I
William Schnatz Resume IWilliam Schnatz
 
Coffee on Kaseya: Indianapolis-Area IT Systems Management Session
Coffee on Kaseya: Indianapolis-Area IT Systems Management SessionCoffee on Kaseya: Indianapolis-Area IT Systems Management Session
Coffee on Kaseya: Indianapolis-Area IT Systems Management SessionKaseya
 
Network technologies ict gr10 pp
Network technologies ict gr10 ppNetwork technologies ict gr10 pp
Network technologies ict gr10 ppJunique Wepener
 
Computer_Specialsit_2016
Computer_Specialsit_2016Computer_Specialsit_2016
Computer_Specialsit_2016Sandy Klein
 
Howard Plotnicov Resume_2016
Howard Plotnicov Resume_2016 Howard Plotnicov Resume_2016
Howard Plotnicov Resume_2016 Howard Plotnicov
 

What's hot (20)

Mca Erg Oct 09
Mca Erg Oct 09Mca Erg Oct 09
Mca Erg Oct 09
 
DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NO...
DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NO...DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NO...
DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NO...
 
Selling to The IT Department
Selling to The IT DepartmentSelling to The IT Department
Selling to The IT Department
 
Hem infotech company profile
Hem infotech  company profileHem infotech  company profile
Hem infotech company profile
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Wilmer CV
Wilmer CVWilmer CV
Wilmer CV
 
SanerNow Endpoint Management
SanerNow Endpoint ManagementSanerNow Endpoint Management
SanerNow Endpoint Management
 
It4 Coursework Help
It4 Coursework HelpIt4 Coursework Help
It4 Coursework Help
 
STEVEN BROWN (1)
STEVEN BROWN (1)STEVEN BROWN (1)
STEVEN BROWN (1)
 
Desktop Support Specialist
Desktop Support SpecialistDesktop Support Specialist
Desktop Support Specialist
 
The ways in which ict is used
The ways in which ict is usedThe ways in which ict is used
The ways in which ict is used
 
BYOD and your favourite ITSM solution
BYOD and your favourite ITSM solutionBYOD and your favourite ITSM solution
BYOD and your favourite ITSM solution
 
Voxeo Summit Day 1 - Communications-enabled Business Processes (CEBP)
Voxeo Summit Day 1 - Communications-enabled Business Processes (CEBP)Voxeo Summit Day 1 - Communications-enabled Business Processes (CEBP)
Voxeo Summit Day 1 - Communications-enabled Business Processes (CEBP)
 
Sandeep saini
Sandeep sainiSandeep saini
Sandeep saini
 
William Schnatz Resume I
William Schnatz Resume IWilliam Schnatz Resume I
William Schnatz Resume I
 
Coffee on Kaseya: Indianapolis-Area IT Systems Management Session
Coffee on Kaseya: Indianapolis-Area IT Systems Management SessionCoffee on Kaseya: Indianapolis-Area IT Systems Management Session
Coffee on Kaseya: Indianapolis-Area IT Systems Management Session
 
ppt
pptppt
ppt
 
Network technologies ict gr10 pp
Network technologies ict gr10 ppNetwork technologies ict gr10 pp
Network technologies ict gr10 pp
 
Computer_Specialsit_2016
Computer_Specialsit_2016Computer_Specialsit_2016
Computer_Specialsit_2016
 
Howard Plotnicov Resume_2016
Howard Plotnicov Resume_2016 Howard Plotnicov Resume_2016
Howard Plotnicov Resume_2016
 

Viewers also liked

Ims architecture white_paper
Ims architecture white_paperIms architecture white_paper
Ims architecture white_paperPrashant Sengar
 
8 the path to voice over lte - vo lte
8 the path to voice over lte - vo lte8 the path to voice over lte - vo lte
8 the path to voice over lte - vo lteCPqD
 
IMS IP multimedia subsystem presentation
IMS IP multimedia subsystem presentationIMS IP multimedia subsystem presentation
IMS IP multimedia subsystem presentationWaldir R. Pires Jr
 
Generation of mobile communication systems
Generation of mobile communication systemsGeneration of mobile communication systems
Generation of mobile communication systemsjincy-a
 
Presentation on 1G/2G/3G/4G/5G/Cellular & Wireless Technologies
Presentation on 1G/2G/3G/4G/5G/Cellular & Wireless TechnologiesPresentation on 1G/2G/3G/4G/5G/Cellular & Wireless Technologies
Presentation on 1G/2G/3G/4G/5G/Cellular & Wireless TechnologiesKaushal Kaith
 

Viewers also liked (7)

Ericsson
EricssonEricsson
Ericsson
 
Ims architecture white_paper
Ims architecture white_paperIms architecture white_paper
Ims architecture white_paper
 
8 the path to voice over lte - vo lte
8 the path to voice over lte - vo lte8 the path to voice over lte - vo lte
8 the path to voice over lte - vo lte
 
4G Technology
4G Technology4G Technology
4G Technology
 
IMS IP multimedia subsystem presentation
IMS IP multimedia subsystem presentationIMS IP multimedia subsystem presentation
IMS IP multimedia subsystem presentation
 
Generation of mobile communication systems
Generation of mobile communication systemsGeneration of mobile communication systems
Generation of mobile communication systems
 
Presentation on 1G/2G/3G/4G/5G/Cellular & Wireless Technologies
Presentation on 1G/2G/3G/4G/5G/Cellular & Wireless TechnologiesPresentation on 1G/2G/3G/4G/5G/Cellular & Wireless Technologies
Presentation on 1G/2G/3G/4G/5G/Cellular & Wireless Technologies
 

Similar to Information Technology at IMS

Under the hood of a modern buddhist retreat center v2.0
Under the hood of a modern buddhist retreat center v2.0Under the hood of a modern buddhist retreat center v2.0
Under the hood of a modern buddhist retreat center v2.0Charles Stevenson
 
Cyber Security Overview for Small Businesses
Cyber Security Overview for Small BusinessesCyber Security Overview for Small Businesses
Cyber Security Overview for Small BusinessesCharles Cline
 
Community IT Webinar Series - Supporting Remote Workers
Community IT Webinar Series - Supporting Remote WorkersCommunity IT Webinar Series - Supporting Remote Workers
Community IT Webinar Series - Supporting Remote WorkersCommunity IT Innovators
 
Guy Jaszewski - In Depth Background Info
Guy Jaszewski - In Depth Background InfoGuy Jaszewski - In Depth Background Info
Guy Jaszewski - In Depth Background InfoGuy Jaszewski
 
Proactive Approach to OT incident response - HOUSECCON 2023
Proactive Approach to OT incident response - HOUSECCON 2023Proactive Approach to OT incident response - HOUSECCON 2023
Proactive Approach to OT incident response - HOUSECCON 2023Chris Sistrunk
 
3_Types of Computers and Data Representation.pptx
3_Types of Computers and Data Representation.pptx3_Types of Computers and Data Representation.pptx
3_Types of Computers and Data Representation.pptxhafizsaifullah5
 
Robert paulin resume -2015c
Robert paulin resume -2015cRobert paulin resume -2015c
Robert paulin resume -2015cBob Paulin
 
Competitive cyber security
Competitive cyber securityCompetitive cyber security
Competitive cyber securityWilliam Mathews
 
Zinia managed services brochure
Zinia managed services brochureZinia managed services brochure
Zinia managed services brochureDavid Pereira
 
Network Forensics- Social Media Forensics
Network Forensics- Social Media ForensicsNetwork Forensics- Social Media Forensics
Network Forensics- Social Media ForensicsDon Caeiro
 
Information Technology Department.pptx
Information Technology Department.pptxInformation Technology Department.pptx
Information Technology Department.pptxAQEELAHMAD938119
 
Netop remote control 12.5 Brochure
Netop remote control 12.5 BrochureNetop remote control 12.5 Brochure
Netop remote control 12.5 BrochureNanna Wang
 
Enterprise IT Security| CIO Innovation and Leadership
Enterprise IT Security| CIO Innovation and LeadershipEnterprise IT Security| CIO Innovation and Leadership
Enterprise IT Security| CIO Innovation and LeadershipRedZone Technologies
 

Similar to Information Technology at IMS (20)

Under the hood of a modern buddhist retreat center v2.0
Under the hood of a modern buddhist retreat center v2.0Under the hood of a modern buddhist retreat center v2.0
Under the hood of a modern buddhist retreat center v2.0
 
Cyber Security Overview for Small Businesses
Cyber Security Overview for Small BusinessesCyber Security Overview for Small Businesses
Cyber Security Overview for Small Businesses
 
Building a Hacker Resistant Network
Building a Hacker Resistant Network Building a Hacker Resistant Network
Building a Hacker Resistant Network
 
Community IT Webinar Series - Supporting Remote Workers
Community IT Webinar Series - Supporting Remote WorkersCommunity IT Webinar Series - Supporting Remote Workers
Community IT Webinar Series - Supporting Remote Workers
 
Guy Jaszewski - In Depth Background Info
Guy Jaszewski - In Depth Background InfoGuy Jaszewski - In Depth Background Info
Guy Jaszewski - In Depth Background Info
 
Proactive Approach to OT incident response - HOUSECCON 2023
Proactive Approach to OT incident response - HOUSECCON 2023Proactive Approach to OT incident response - HOUSECCON 2023
Proactive Approach to OT incident response - HOUSECCON 2023
 
1 - Introduction.ppt
1 - Introduction.ppt1 - Introduction.ppt
1 - Introduction.ppt
 
3_Types of Computers and Data Representation.pptx
3_Types of Computers and Data Representation.pptx3_Types of Computers and Data Representation.pptx
3_Types of Computers and Data Representation.pptx
 
Robert paulin resume -2015c
Robert paulin resume -2015cRobert paulin resume -2015c
Robert paulin resume -2015c
 
MMPL corporate overview mail
MMPL corporate overview mailMMPL corporate overview mail
MMPL corporate overview mail
 
ATC Delta Dinner - SOB 2022
ATC Delta Dinner - SOB 2022ATC Delta Dinner - SOB 2022
ATC Delta Dinner - SOB 2022
 
Competitive cyber security
Competitive cyber securityCompetitive cyber security
Competitive cyber security
 
Zinia managed services brochure
Zinia managed services brochureZinia managed services brochure
Zinia managed services brochure
 
Network Forensics- Social Media Forensics
Network Forensics- Social Media ForensicsNetwork Forensics- Social Media Forensics
Network Forensics- Social Media Forensics
 
Information Technology Department.pptx
Information Technology Department.pptxInformation Technology Department.pptx
Information Technology Department.pptx
 
SFScon19 - Francesco La Spina -7 Steps to Industry 40
SFScon19 - Francesco La Spina -7 Steps to Industry 40SFScon19 - Francesco La Spina -7 Steps to Industry 40
SFScon19 - Francesco La Spina -7 Steps to Industry 40
 
Netop remote control 12.5 Brochure
Netop remote control 12.5 BrochureNetop remote control 12.5 Brochure
Netop remote control 12.5 Brochure
 
Competitive Cyber Security
Competitive Cyber SecurityCompetitive Cyber Security
Competitive Cyber Security
 
Maior Technical Profile
Maior Technical ProfileMaior Technical Profile
Maior Technical Profile
 
Enterprise IT Security| CIO Innovation and Leadership
Enterprise IT Security| CIO Innovation and LeadershipEnterprise IT Security| CIO Innovation and Leadership
Enterprise IT Security| CIO Innovation and Leadership
 

Recently uploaded

Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftshyamraj55
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...FIDO Alliance
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch TuesdayIvanti
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?Paolo Missier
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...FIDO Alliance
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024Stephen Perrenod
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfFIDO Alliance
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...ScyllaDB
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...FIDO Alliance
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandIES VE
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfFIDO Alliance
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireExakis Nelite
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfFIDO Alliance
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctBrainSell Technologies
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimaginedpanagenda
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPTiSEO AI
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessUXDXConf
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 

Recently uploaded (20)

Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 

Information Technology at IMS

  • 2. IT DEPARTMENT What’s the IT department at IMS do? Who does it serve? Who helps out?
  • 3. My Role Responsible for planning, implementation, security, and management of multiple information and communications systems and projects, including voice, data, imaging, Internet, and office automation. Develop annual departmental budgets and corporate IT policies and procedures. Provide technical support and training at all levels of the organization.
  • 4. People I Serve • Board of Directors • Founders • Guests • Staff • Teachers • Volunteers • Customers (aka Yogis )
  • 5. Outside Help & Services Eric Woudenberg – Dharma Seed Geof Karlson – Yogi Enhanced System (YES) Mark Pirani – Electrician •Expert Laser Services (copiers) •Charter Business (voice & Internet) •Rapid7 (Nexpose) •Gravity Switch (website) •Prevco Audio (sound systems) •CCB Nonprofits (software) •Citrix (XenServer) •Orange Oil (air conditioners) •Dell (servers) •Provantage (equipment) Over 60 vendor/service providers including:
  • 6. WHAT YOU SEE The visible and tangible aspects of IMS IT
  • 7. What you see: stuff • Laptop & desktop computers, iPads, etc • Copiers, fax machines, scanners, printers, labelers • Credit card readers • Hearing devices, microphones, amplifiers, recording equipment • Cameras, televisions, CD/DVD players, projectors • Conference phones, desktop phones, cell phones, helpdesk “red” phones, etc
  • 8. What you see: website
  • 9. WHAT YOU DON’T SEE The invisible and/or intangible aspects of IMS IT
  • 10. What You Don’t See • Astounding layers of complexity • Vast array of hardware, software and technical standards & protocols to study and master • Anticipating obsolescence/adoption of new technologies – rate of technological innovation leading to dramatically short lifespan of assets and investments in hardware, software, web presence, data formats, storage resources, etc
  • 11. TIP OF THE ICEBERG How much are we talking about here?
  • 12. By the numbers • 15 wireless access points • 2 VPN firewall routers • 2 dharma talk recorders • 4 fiber media converters • 2 air conditioners • 6 microphones, 2 amplifiers, 2 equalizers, 2 FM transmitters for dharma hall wireless headsets • 2 phone and voicemail systems • 2 photo copiers • Fax machines, digital cameras, video recorder, etc.. • 23 telephone lines • 2 locked fireproof storage boxes • Phones: 6 cell, 2 conference, 7 emergency, 40 system, 2 helpdesk “red” phones
  • 13. By the numbers • 6 external drives, 2 network attached storage (NAS), 2 storage area networks (SAN) • 37 desktop and laptop computers • 20 servers • 48 displays • 25 network switches • 26 print devices • 39 battery backups • ~11 different operating systems • ~15 programming languages • ~100 username and passwords for internal systems, vendor websites, etc • Central anti-virus & software management for all servers and computers • ~26,500 lines of code for online registration and donation etc • ~300,000 lines of code under the hood in YES • Death by acronym: – DNS, DHCP, LDAP/AD, DFS, HTTPS, MySQL, MS SQL, Subversion, SSH, SAMBA, iSCSI, VLAN, NTP, GPO, MSI, VNC, WSUS, ODBC, IIS, SMTP, POP3, IMAP, ARP, WPA2 • Myriad cyber threat vectors monitored with Nexpose etc
  • 14. PICTURE IT My eyes just glazed over can you show me a picture?
  • 15. Physical Inventory * Entire inventory not depicted due to space constraints
  • 16. Can you help me visualize IMS IT from another angle? VISUALIZE IT
  • 17.
  • 18. GLIMPSING COMPLEXITY How do technologies intersect creating challenges for IMS IT?
  • 19. Case study: Retreat Support What’s needed? A system that provides on-call help for yogis after normal operating hours • Needs to be easy to use • Needs to be reliable • Needs to be flexible—given time-off schedule for respondents (aka retreat support fellows)
  • 20. Case study: Retreat Support • Red desk telephone • No buttons • Dials immediately when receiver lifted • Calls Google Voice number • Google Voice rings one or both cell phones
  • 21. Case study: Retreat Support • Rugged cellphone + GPS • Operates in all conditions • Clear audio • 6 hours of talk time • Rings when red phone received lifted • Receives notifications for missed calls
  • 26. Roadmap (Future Planning and Investment) • Yogi Enhanced System (YES) – succession plan for ongoing enhancements and maintenance of our mission critical database application as Geof Karlson moves towards retirement – forward migration planning • Upgrading obsolete wiring at Retreat Center

Editor's Notes

  1. Start with what they see (computers, phones, etc)
  2. We have over 60 vendor/service providers
  3. Determining entry threshold when new technology is superior…
  4. Virtual machines within yellow circle. SANs not depicted. UPSes etc etcetc not depicted
  5. Vast array of enterprise technology products and services in use at our small non-profit meditation center