Section 4 Cowlitz County Technical Requirements

Size: px
Start display at page:

Download "Section 4 Cowlitz County Technical Requirements"

Transcription

1 Section 4 Cowlitz County Technical Requirements 122

2 Cowlitz County ATS Technical Requirements A standard response of Yes/NCMod/Planned/Fee/No in the Vendor Response fields are to be completed by each submitter. Yes = Included in standard package. NCMod = No Cost Modification. (System does not contain this feature but will be furnished at no cost.) Planned = Not included but planned in a future update (Must estimate when the feature will be available). Fee = Not available but will develop and implement for and additional fee (Estimate fee if possible) No = Not available. 4.1 TECHINICAL REQUIREMENTS ID# Technical Requirements IT Administration 713 Proposed product operates on a Microsoft SQL Server 2010/12 database platform 714 Proposed product operates in a Windows Server 2012 R2 environment 715 Proposed product clients operate on a 32 bit Windows 7,8.1, and 10 Ent OS 716 Proposed product clients operate on a 64-bit Windows 7,8.1, and 10 Ent OS 717 Proposed product will run in a virtualized server VMWare environment Proposed product will run with a standard or reasonable number of required servers and storage capacity (please provide numbers of servers and storage capacity estimates based on our county 718 statistics/metrics) Vendor Response Vendor Notes General Systems 719 Proposed product supports unique logins Unique logins will be tied to active directory for single sign-on capability. Vendor must clarify if their system also maintains User/Password (outside of AD), and whether or not their AD 720 compatibility is through a link or a direct-connect. Proposed product allows corrections and deletions and provides an 721 audit trail that cannot be modified Proposed product allows all database fields to be fully searchable by 722 default 723 Proposed product provides full online screen-based help Proposed product allows all databases to be either directly backed up with a third party backup solution, or are programmatically 724 exportable for backup TECHNOLOGY ENVIRONMENT The Cowlitz County Assessor s and Treasurer s offices are connected to the Cowlitz County backbone network running at speeds at or about 1 GBit/Second. Cowlitz County uses TCP/IPv4 as our networking standard. 123

3 4.3. WORKSTATIONS Cowlitz County operates a network that contains approximately 750 workstations running Microsoft s 32-bit Windows 7, 8.1, and 10 Enterprise and 64-bit Windows 7, 8.1, and 10 Enterprise Operating Systems. Cowlitz County works to replace each workstation once it has been in service for 3 or 5 years (depending on hardware type). This means that the county regularly upgrades computing hardware at reasonable intervals; but that in some cases hardware can be up to 5 years behind currently available machines and/or operating systems. Our minimum supported station specifications follow: Minimum Workstation (Machines greater than 1 year old) Intel i7 Processors 2.4GHz+ 4GB of RAM 80+ GB hard drive Windows 32 bit Windows 7 Enterprise or 64-bit Windows 7 Enterprise Office 2010 and SERVERS The network contains several servers. Most of these servers run the Microsoft Windows operating system. Currently, Cowlitz County operates the following operating systems on our network servers: Microsoft Windows 2012 Standard Release 2 Cowlitz County has standardized on Dell PowerEdge hardware servers for its Windows servers. Cowlitz County has standardized on the Microsoft Windows Server 2012 operating system for our network environment which is running in conjunction with the VMWare virtualization platform. The successful vendor to this RFP shall have a solution that supports this standard. 4.5 DATABASE MANAGEMENT SYSTEM (DBMS) Cowlitz County has standardized on Microsoft s SQL Server for our DBMS. It is highly desirable that the vendor software uses Microsoft SQL Server as its database foundation, and that the vendor solution stays current with SQL Server upgrades in addition to supporting legacy versions. 124

4 4.6 INFORMATION INTEGRATION PHILOSOPHY All information that is produced by Cowlitz County employees and sub-contractors is viewed as owned by Cowlitz County. In this light, it is critical that Cowlitz County has the ability to seamlessly move information from one information system to another information system both manually and programmatically. This includes the free flowing and continually seamless movement of information to and from the vendor provided solution selected in response to this RFP and other selected Cowlitz County applications. Vendor systems, by design, are often vertical in nature; i.e. they assume that the information collected in the application will only be utilized by that application. We view information as essentially horizontal in nature. This horizontal data flow improves information integrity, enhances confidence in our information systems, allows information to be used in abstract data analysis, and enhances employee efficiencies, along with many other benefits. Consequently, Cowlitz County s information philosophy is to procure and/or create systems that provide the ability to seamlessly move information in and out of them in industry standard formats. The vendor/company awarded this RFP must assure that the application has been developed, tested and runs on a Microsoft SQL back-end. This is a critical requirement. This issue is so significant to Cowlitz County that applications that do not run Microsoft SQL will not be considered. 4.7 DATA CONVERSION The current Assessor/Treasurer system has been in operation for about 15 years for Treasurer and 10 years for Assessor. All data is stored in an Oracle database using Tyler s Eagle Computer System (ECS) product TIMS/CAMA/AIMS. Treasurer Information Management System (TIMS), Computer Assisted Mass Appraisal (CAMA) and Assessor Information Management System (AIMS). Cowlitz County requires that all data in the current Assessor/Treasurer system will be converted/moved into the new ATS. The current system also has building sketches stored in tables in the TIMS database. Additionally, photos and scanned images are stored as.jpg files with database pointers. It is required that these items will be migrated/converted into the new system as well. 4.8 ELECTRONIC MESSAGING SYSTEM Cowlitz County currently uses Microsoft Exchange 2010 and 2013 as our electronic messaging system. 125

5 4.9 INTERNET CONNECTIVITY AND USE Cowlitz County provides Internet connectivity for all employees that have workstations on Cowlitz County s network. Internet access is through a 100Mb fiber connection. Employees are authorized to use internet connectivity for Cowlitz County business purposes. Employees are not authorized to download software directly to workstations. If the system provides the capability of providing software enhancements through the internet, it is the expectation that the Cowlitz County Information Technology department will download such upgrades and package them as part of our network upgrade capabilities, unless software upgrades and installation are performed by the vendor as part of the maintenance/support costs. If this is the case, vendor will conform to Cowlitz County Computer User Policies including executing a non-disclosure agreement. All information residing on or originating from Cowlitz County servers/network is the property of Cowlitz County, and vendor has no authority to disclose or distribute any records or information about those records or their content in any format including verbally. Cowlitz County currently uses Microsoft Internet Explorer v9 as our Internet browser. Vendor will not create an application that will force Cowlitz County to upgrade browsers without consent and testing by Cowlitz County Information Technology. Use of the Internet by the vendor to provide support, troubleshooting, software upgrades or patches is highly desired. The Cowlitz County Information Technology Department can provide VPN access to facilitate vendor support. Vendor agrees to abide by all security measures as outlined in a signed VPN access agreement OFFICE AUTOMATION ENVIRONMENT Cowlitz County uses the Microsoft Office Suite as its primary office automation toolset NETWORK DEPLOYMENT OF SOFTWARE The Cowlitz County Information Technology department manually installs (or pushes with the assistance of Microsoft System Center or Dell KACE appliance) all client software installations, patches and upgrades. Vendor may load client software only with the expressed consent of Cowlitz County Information Technology BACKUP AND DISASTER RECOVERY Cowlitz County currently uses a combination of SQL database maintenance plans and technology to perform daily snapshots and data replication as its disaster recovery and enterprise backup solution for all production data. Cowlitz County currently employs the Barracuda 1090 Backup Appliance (with cloud replication) as its primary backup solution. Your proposal should indicate any issues with either solution. 126

6 4.13 TELECOMMUTING Cowlitz County operates a remote access system for offices outside of Cowlitz County s private network. It is highly desirable that the system can be accessed through a protected VPN tunnel. This access is currently provided through network tools associated with the WatchGuard firewall appliance. The vendor will agree to the following remote support requirements: 1) All employees of vendor shall be specifically identified. Cowlitz County requires that each employee of the vendor who works on our system be identified and that Cowlitz County can identify the times and dates that individuals accessed Cowlitz County s network or the system. It is highly recommended that the vendor use service desk software that will track all activities performed on Cowlitz County systems. 2) Remote support shall be done through the WatchGuard Java Based remote access system. Cowlitz County reserves the right to change methodologies of access by vendor for remote support. Vendor will provide a support mechanism that includes direct remote access support without the necessity of a Cowlitz County IT resource to intercede. 3) All configuration changes that are made to the system as part of remote support shall be logged in a mutually agreed location. 4) The Vendor shall be responsible for obtaining any client licenses that are required to access Cowlitz County s network, or for resources on vendor-owned workstations, personal computers, named licenses, or other computing devices. 5) Cowlitz County shall provide a login account to vendor employees for login purposes. Each activity must be tracked on the vendor side. Cowlitz County reserves the right to request the logs at any time and vendor agrees to provide them. 6) Cowlitz County shall take responsibility to ensure there are adequate licenses for vendor support technicians to operate on Cowlitz County s network. See item 4 in conjunction with this requirement SYSTEMS SUPPORT As Cowlitz County improves its security for remote access to its network, it becomes prudent from a security perspective to continually re-evaluate the support connections our vendors currently use to access our network in support of their products. Cowlitz County currently uses WatchGuard VPN as its method to allow vendors access to the appropriate equipment. Vendors/ support staff must request access to our system by signing a VPN access agreement. This agreement provides details, responsibilities, rules and guidelines directing vendor access to the county network(s). 127

7 4.15 TECHNICAL REQUIREMENTS Technical Requirements are provided in the Cowlitz ATS RFP S Please provide responses to our requirements and questions on the table. 128

ClockWork Enterprise 5

ClockWork Enterprise 5 ClockWork Enterprise 5 Technical Overview rev 5.1 Table of Contents Overview... 3 Database Requirements... 4 Database Storage Requirements... 4 Sql Server Authentication and Permissions... 5 ClockWork

More information

IT Discovery / Assessment Report Conducted on: DATE (MM/DD/YYY) HERE On-site Discovery By: AOS ENGINEER NAME Assessment Document By: AOS ENGINEER NAME

IT Discovery / Assessment Report Conducted on: DATE (MM/DD/YYY) HERE On-site Discovery By: AOS ENGINEER NAME Assessment Document By: AOS ENGINEER NAME IT Discovery / Assessment Report Conducted on: DATE (MM/DD/YYY) HERE On-site Discovery By: AOS ENGINEER NAME Assessment Document By: AOS ENGINEER NAME For: CLIENT NAME HERE CLIENT ADDRESS HERE 1. Current

More information

ISO27001 Preparing your business with Snare

ISO27001 Preparing your business with Snare WHITEPAPER Complying with ISO27001 Preparing your business with Snare T he technical controls imposed by ISO (International Organisation for Standardization) Standard 27001 cover a wide range of security

More information

Secure Remote Access And Password Management

Secure Remote Access And Password Management +44(0)1425 270 333 email: sales@dtrack.com website: dtt.dtrack.com Secure Remote Access And Password Management Data Track Technolo gy Ltd 153 Somerford Road Christchurch Dorset BH23 3TY UK Contents The

More information

Hardware and Software Requirements

Hardware and Software Requirements Hardware and Software Requirements WideOrbit s WO Media Sales is a full client-server based sales system. Users run a thick client on a Windows 10*, Windows 8 or Windows 7, which connects directly to a

More information

ICBA Migration to IaaS Cloud Platform REQUEST FOR PROPOSAL

ICBA Migration to IaaS Cloud Platform REQUEST FOR PROPOSAL INTERNATIONAL CENTER FOR BIOSALINE AGRICULTURE ICBA Migration to IaaS Cloud Platform REQUEST FOR PROPOSAL Imane Boujidane Procurement Officer +971 4 336 1100 ext. 201 i.boujidane@biosaline.org.ae International

More information

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide Copyright and Trademark Statements 2014 ViewSonic Computer Corp. All rights reserved. This document contains proprietary information that

More information

VDI Users Guide. Mac OS X

VDI Users Guide. Mac OS X Mac OS X VDI Users Guide NOTICE: Access to electronic resources at Moraine Park Technical College is restricted to employees, students, or other individuals authorized by the College. By connecting to

More information

Cloud Services. Introduction

Cloud Services. Introduction Introduction adi Digital have developed a resilient, secure, flexible, high availability Software as a Service (SaaS) cloud platform. This Platform provides a simple to use, cost effective and convenient

More information

Local Area Network (LAN) Deployment Hardware Requirements

Local Area Network (LAN) Deployment Hardware Requirements Local Area Network (LAN) Deployment Hardware Requirements There are a number of requirements that exist no matter how many users will be accessing SuccessWare 21. The individual workstation requirements

More information

Request for Proposal. I. Introduction. II. Scope of Work. IT Managed Services Support. IT Environment. Main Facility

Request for Proposal. I. Introduction. II. Scope of Work. IT Managed Services Support. IT Environment. Main Facility Request for Proposal IT Managed Services Support I. Introduction The Hoh Indian Tribe ( Tribe or Hoh Tribe ) is located in western Washington State in Jefferson County, 28 miles South of Forks, Washington.

More information

VMware Mirage Getting Started Guide

VMware Mirage Getting Started Guide Mirage 5.8 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,

More information

RFP #19-01 Vendor Questions. RFP # of 2 Copier/MFD Hardware and Service and RFP # of 2 Printer/MFP Service & Supplies

RFP #19-01 Vendor Questions. RFP # of 2 Copier/MFD Hardware and Service and RFP # of 2 Printer/MFP Service & Supplies RFP #19-01 Vendor Questions REQUEST FOR PROPOSAL: RFP #19-01 1 of 2 Copier/MFD Hardware and Service and RFP #19-01 2 of 2 Printer/MFP Service & Supplies Question #1: I spoke with you just prior to the

More information

MYOB ENTERPRISE SOLUTIONS. System Requirement Guidelines EXO BUSINESS. Version 2.9 Thursday 1 st May 2014 MYOB ENT ER P R IS E S OLUT IONS

MYOB ENTERPRISE SOLUTIONS. System Requirement Guidelines EXO BUSINESS. Version 2.9 Thursday 1 st May 2014 MYOB ENT ER P R IS E S OLUT IONS MYOB ENTERPRISE SOLUTIONS System Requirement Guidelines Version 2.9 Thursday 1 st May 2014 EXO BUSINESS MYOB ENT ER P R IS E S OLUT IONS Contents Important Please Read Carefully... 3 Quick Links... 3 System

More information

Managed Service. Managed Services. High Availability / Disaster Recovery Solutions. Cloud and Hosting Solutions. Security Solutions.

Managed Service. Managed Services. High Availability / Disaster Recovery Solutions. Cloud and Hosting Solutions. Security Solutions. Managed Service Managed Services IBM i Intel AIX High Availability / Disaster Recovery Solutions Design & Implementation Monitoring Cloud and Hosting Solutions Security Solutions Single Sign-On Assessments

More information

Modernize Your Backup and DR Using Actifio in AWS

Modernize Your Backup and DR Using Actifio in AWS FOR AWS Modernize Your Backup and DR Using Actifio in AWS 150105H FOR AWS Modernize Your Backup and DR Using Actifio in AWS What is Actifio? Actifio virtualizes the data that s the lifeblood of business.

More information

VMware Mirage Getting Started Guide

VMware Mirage Getting Started Guide Mirage 5.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,

More information

Unifia Environment (UE) Application & Security Overview

Unifia Environment (UE) Application & Security Overview Unifia Environment (UE) Application & Security Overview 2017 OLYMPUS CORPORATION OF THE AMERICAS PAGE 1 OF 14 SP3217V03 Unifia Environment UE Application & Security Overview The Olympus Unifia Environment

More information

Purchasing Department Finance Group INVITATION TO BID

Purchasing Department Finance Group INVITATION TO BID Purchasing Department Finance Group August 7, 2012 INVITATION TO BID The City of Norwalk, Information Technology Department, is soliciting bids for Computer Server Hardware and VMware vsphere Enterprise

More information

ISO/IEC Solution Brief ISO/IEC EventTracker 8815 Centre Park Drive, Columbia MD 21045

ISO/IEC Solution Brief ISO/IEC EventTracker 8815 Centre Park Drive, Columbia MD 21045 Solution Brief 8815 Centre Park Drive, Columbia MD 21045 About delivers business critical software and services that transform high-volume cryptic log data into actionable, prioritized intelligence that

More information

IBM Case Manager on Cloud

IBM Case Manager on Cloud Service Description IBM Case Manager on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means and includes the company, its authorized users or recipients of the

More information

IT Service Upgrades Announcement

IT Service Upgrades Announcement IT Service Upgrades Announcement Beginning in late 2008, AgriLife Information Technology under the direction of the Office of the Vice Chancellor and Dean of Agriculture and Life Sciences conducted a study

More information

ARCSERVE UDP CLOUD DIRECT DISASTER RECOVERY APPLIANCE VMWARE

ARCSERVE UDP CLOUD DIRECT DISASTER RECOVERY APPLIANCE VMWARE ARCSERVE UDP CLOUD DIRECT DISASTER RECOVERY APPLIANCE VMWARE [COMPANY NAME] [Company address] Table of Contents Arcserve UDP Cloud Direct Disaster Recovery Appliance for VMware... 2 Download the Arcserve

More information

Veeam Backup & Replication on IBM Cloud Solution Architecture

Veeam Backup & Replication on IBM Cloud Solution Architecture Veeam Backup & Replication on IBM Cloud Solution Architecture Date: 2018 07 20 Copyright IBM Corporation 2018 Page 1 of 12 Table of Contents 1 Introduction... 4 1.1 About Veeam Backup & Replication...

More information

OUR CUSTOMER TERMS CLOUD SERVICES - INFRASTRUCTURE

OUR CUSTOMER TERMS CLOUD SERVICES - INFRASTRUCTURE CONTENTS 1 ABOUT THIS PART... 2 2 GENERAL... 2 3 CLOUD INFRASTRUCTURE (FORMERLY UTILITY HOSTING)... 2 4 TAILORED INFRASTRUCTURE (FORMERLY DEDICATED HOSTING)... 3 5 COMPUTE... 3 6 BACKUP & RECOVERY... 8

More information

SECURITY PRACTICES OVERVIEW

SECURITY PRACTICES OVERVIEW SECURITY PRACTICES OVERVIEW 2018 Helcim Inc. Copyright 2006-2018 Helcim Inc. All Rights Reserved. The Helcim name and logo are trademarks of Helcim Inc. P a g e 1 Our Security at a Glance About Helcim

More information

Core Services for ediscovery Perfection

Core Services for ediscovery Perfection BEST-IN-CLASS DATA ENVIRONMENTS. Core Services for ediscovery Perfection MANAGE MANAGE IMPLEMENT IMPLEMENT ASSESS Core Services for ediscovery Perfection George Jon is an ediscovery infrastructure specialist

More information

Gladinet Cloud Enterprise

Gladinet Cloud Enterprise GLADINET, INC Gladinet Cloud Enterprise Technical White Paper Gladinet, Inc. 1/20/2013 This document discusses the technologies behind Gladinet Cloud Enterprise Copyright 2013 Gladinet, Inc. Table of Contents

More information

Introduction and Datacenter Topology For Your System

Introduction and Datacenter Topology For Your System Introduction and Datacenter Topology For Your System This chapter provides an introduction, a datacenter overview, and VMware vcenter requirements for your system. Introducing Cisco WebEx Meetings Server,

More information

Gladinet Cloud Enterprise

Gladinet Cloud Enterprise GLADINET, INC Gladinet Cloud Enterprise Multi-Zone Deployment Guide Gladinet, Inc. 4/5/2015 This document discusses the technologies behind Gladinet Cloud Enterprise Copyright 2015 Gladinet, Inc. Table

More information

Installation Guide. Help Desk Manager. Version

Installation Guide. Help Desk Manager. Version Installation Guide Help Desk Manager Version 12.3.0 Contents Introduction 1 Key Features 1 Parent/Child Service Relationships 1 Automated Ticketing Processing 1 Asset Management 2 Installation Requirements

More information

Implementation Guide for Symantec Endpoint Protection Small Business Edition

Implementation Guide for Symantec Endpoint Protection Small Business Edition Implementation Guide for Symantec Endpoint Protection Small Business Edition Implementation Guide for Symantec Endpoint Protection Small Business Edition The software described in this book is furnished

More information

Virtualized SQL Server Performance and Scaling on Dell EMC XC Series Web-Scale Hyper-converged Appliances Powered by Nutanix Software

Virtualized SQL Server Performance and Scaling on Dell EMC XC Series Web-Scale Hyper-converged Appliances Powered by Nutanix Software Virtualized SQL Server Performance and Scaling on Dell EMC XC Series Web-Scale Hyper-converged Appliances Powered by Nutanix Software Dell EMC Engineering January 2017 A Dell EMC Technical White Paper

More information

HPE Data Replication Solution Service for HPE Business Copy for P9000 XP Disk Array Family

HPE Data Replication Solution Service for HPE Business Copy for P9000 XP Disk Array Family Data sheet HPE Data Replication Solution Service for HPE Business Copy for P9000 XP Disk Array Family HPE Lifecycle Event Services HPE Data Replication Solution Service provides implementation of the HPE

More information

RFP # QUESTIONS AND ANSWERS Posted: February 5, 2016

RFP # QUESTIONS AND ANSWERS Posted: February 5, 2016 RFP # 2016-02 QUESTIONS AND ANSWERS Posted: February 5, 2016 REQUEST FOR PROPOSAL RFP # 2016-02 Q: Who currently manages your IT services today? A: Inspired Technologies. Q: Are you satisfied with their

More information

CA ARCserve Backup for Windows

CA ARCserve Backup for Windows CA ARCserve Backup for Windows Release Summary r12.5 This documentation and any related computer software help programs (hereinafter referred to as the Documentation ) is for the end user s informational

More information

68 - Point Checklist Revised May 2017

68 - Point Checklist Revised May 2017 karlp@smallbizthoughts.com www.smallbizthoughts.com 68 - Point Checklist Revised May 2017 Date: Client: Contact: Technician: Phone: Address: City / Zip: Client Interview 1. Are there any known issues?

More information

Fitness Manager V4 Install Guide

Fitness Manager V4 Install Guide Fitness Manager V4 Install Guide Table of Contents 1 Welcome to V4...3 License Agreement...4 Copyright...4 2. Minimum System Requirements...5 3. Navigating the Install...6 4. Installing V4 on the Server...7

More information

OnCommand Unified Manager Installation and Setup Guide for Use with Core Package 5.2 and Host Package 1.3

OnCommand Unified Manager Installation and Setup Guide for Use with Core Package 5.2 and Host Package 1.3 IBM System Storage N series OnCommand Unified Manager Installation and Setup Guide for Use with Core Package 5.2 and Host Package 1.3 GA32-1020-03 Table of Contents 3 Contents Preface... 10 Supported

More information

Brainware Intelligent Capture

Brainware Intelligent Capture Brainware Intelligent Capture Technical s Version: 5.9.x Written by: Product Knowledge, R&D Date: August 2018 2008-2018 Hyland Software, Inc. and its affiliates. Brainware Intelligent Capture Technical

More information

Echidna Concepts Guide

Echidna Concepts Guide Salt Group Concepts Guide Version 15.1 May 2015 2015 Salt Group Proprietary Limited. All rights reserved. Information in this document is subject to change without notice. The software described in this

More information

Administrative & Operations Network Security Assessment

Administrative & Operations Network Security Assessment TAMPA-HILLSBOROUGH COUNTY EXPRESSWAY AUTHORITY Letter of Clarification No. 1 FOR REQUEST FOR QUALIFICATIONS (RFQ) Administrative & Operations Network Security Assessment RFQ No. O-00418 Page 1 of 15 Letter

More information

Hardware and Software Security

Hardware and Software Security Hardware and Software Security Good Practice Guide Author: A Heathcote Date: 22/05/2017 Version: 1.0 Copyright 2017 Health and Social Care Information Centre. The Health and Social Care Information Centre

More information

Recommended System Requirements for Microsoft Dynamics SL 2018

Recommended System Requirements for Microsoft Dynamics SL 2018 Recommended System for Microsoft Dynamics SL 2018 Synergy Business Solutions recommends three separate servers but this can be discussed during the upgrade planning process. Dynamics SL / Management Reporter

More information

Pacific Knowledge Systems. RippleDown Deployment Guide: v8.0.5

Pacific Knowledge Systems. RippleDown Deployment Guide: v8.0.5 Pacific Knowledge Systems RippleDown Deployment Guide: v8.0.5 Copyright Notice The information provided in this User's Guide is subject to change without notice and is not a commitment by Pacific Knowledge

More information

Rapid Recovery DocRetriever for SharePoint User Guide

Rapid Recovery DocRetriever for SharePoint User Guide Rapid Recovery 6.1.3 Table of Contents Introduction to DocRetriever for SharePoint... 6 Using this documentation... 6 About DocRetriever for SharePoint...7 DocRetriever, AppAssure, and Rapid Recovery compatibility...

More information

Enhancing Oracle VM Business Continuity Using Dell Compellent Live Volume

Enhancing Oracle VM Business Continuity Using Dell Compellent Live Volume Enhancing Oracle VM Business Continuity Using Dell Compellent Live Volume Wendy Chen, Roger Lopez, and Josh Raw Dell Product Group February 2013 This document is for informational purposes only and may

More information

PretaGov Australia SaaS Hosting with Fully Managed Services, Support and Maintenance

PretaGov Australia SaaS Hosting with Fully Managed Services, Support and Maintenance PretaGov Australia SaaS Hosting with Fully Managed Services, Support and Maintenance Introduction to PretaGov PretaGov operates a Government Community Plone CMS (content management system) SaaS Cloud exclusively

More information

Wireless Security Access Policy and Agreement

Wireless Security Access Policy and Agreement Wireless Security Access Policy and Agreement Purpose The purpose of this policy is to define standards, procedures, and restrictions for connecting to Fort Valley State University s internal network(s)

More information

MYOB Enterprise Solutions

MYOB Enterprise Solutions Enterprise Solutions System Requirement Guidelines Last Updated: 16 May 2017 Contents Important Please Read Carefully 4 Quick Links 4 System Requirements 5 Overview... 5 Server Requirements... 6 Server

More information

Quest DL Appliance Family

Quest DL Appliance Family Quest DL Appliance Family June, 2017 Topics: Introduction Appliance Configuration Machine Protection Replication Virtual Machine Export/Virtual Standby Additional Information Contacting Quest 2017 Quest

More information

CITY OF MONTEBELLO SYSTEMS MANAGER

CITY OF MONTEBELLO SYSTEMS MANAGER CITY OF MONTEBELLO 109A DEFINITION Under general administrative direction of the City Administrator, provides advanced professional support to departments with very complex computer systems, programs and

More information

Intermedia. CX-E Cloud Hosting Provider. Introduction. Why Intermedia for CX-E Cloud? Cost of Ownership

Intermedia. CX-E Cloud Hosting Provider. Introduction. Why Intermedia for CX-E Cloud? Cost of Ownership CX-E Cloud Hosting Provider Intermedia Introduction AVST has selected Intermedia as the cloud provider for our hosted CX-E Cloud offering. Intermedia delivers an enterprise-grade cloud infrastructure that

More information

Server Specifications

Server Specifications Requirements Server s It is highly recommended that MS Exchange does not run on the same server as Practice Evolve. Server Minimum Minimum spec. is influenced by choice of operating system and by number

More information

Genesys Decisions. Genesys Decisions IT Administration Guide 8.5

Genesys Decisions. Genesys Decisions IT Administration Guide 8.5 Genesys Decisions Genesys Decisions IT Administration Guide 8.5 Information contained herein is proprietary and confidential and cannot be disclosed or duplicated without the prior written consent of Genesys

More information

Sample Security Risk Analysis ASP Meaningful Use Core Set Measure 15

Sample Security Risk Analysis ASP Meaningful Use Core Set Measure 15 Sample Security Risk Analysis ASP Meaningful Use Core Set Measure 15 Risk Analysis with EHR Questions Example Answers/Help: Status What new electronic health information has been introduced into my practice

More information

Section A - Standards that Apply to All RFPs

Section A - Standards that Apply to All RFPs These standards provide general information regarding the services provided by the Information Technology branch, in the context of implementation projects. These standards are published, at minimum, bi-annually

More information

Author: Janice M. Anderson Date: 5/1/2006

Author: Janice M. Anderson Date: 5/1/2006 Subject: AHC-IS Desktop Policies, Proc and Standards Policy No. 3001 Applicable to: AHC-IS Pages: 6 Author: Janice M. Anderson Date: 5/1/2006 Replaces version Dated: 2005 POLICY: AHC-IS goals for Workstation

More information

ADDENDUM NO. 2 BID-CONTRACT DOCUMENTS FOR. BID No District Wide Active Directory and Exchange Server Upgrade and Consolidation

ADDENDUM NO. 2 BID-CONTRACT DOCUMENTS FOR. BID No District Wide Active Directory and Exchange Server Upgrade and Consolidation ADDENDUM NO. 2 BID-CONTRACT DOCUMENTS FOR BID No. 2015 District Wide Active Directory and Exchange Server Upgrade and Consolidation COAST COMMUNITY COLLEGE DISTRICT COSTA MESA, CALIFORNIA COUNTY OF ORANGE

More information

NU Cloud Terms of Service

NU Cloud Terms of Service Overview This document represents the Terms of Service among Northwestern Information Technology (IT) and participating tenants in the NUCloud private cloud environment at Northwestern. The goal of these

More information

Altius IT Policy Collection

Altius IT Policy Collection Altius IT Policy Collection Complete set of cyber and network security policies Over 100 Policies, Plans, and Forms Fully customizable - fully customizable IT security policies in Microsoft Word No software

More information

IMC Network Traffic Analyzer 7.3 (E0504) Copyright 2015, 2017 Hewlett Packard Enterprise Development LP

IMC Network Traffic Analyzer 7.3 (E0504) Copyright 2015, 2017 Hewlett Packard Enterprise Development LP Network Traffic Analyzer 7.3 (E0504) Copyright 2015, 2017 Hewlett Packard Enterprise Development LP Table of Contents 1. What's New in this Release 2. Problems Fixed in this Release 3. Software Distribution

More information

Yellow Dog Inventory Upgrade System Requirements and Process

Yellow Dog Inventory Upgrade System Requirements and Process Yellow Dog Inventory Upgrade System Requirements and Process for Version 362/363 Document Date: February 2018 Y e l l o w D o g I n v e n t o r y U p g r a d e S y s t e m R e q u i r e m e n t s Page

More information

Brainware Intelligent Capture

Brainware Intelligent Capture Brainware Intelligent Capture Technical s Version: 5.8.1 Written by: Product Knowledge, R&D Date: Tuesday, February 20, 2018 2017 Hyland Software, Inc. and its affiliates. Perceptive Intelligent Capture

More information

IT Business Management System Requirements Guide

IT Business Management System Requirements Guide IT Business Management System Requirements Guide IT Business Management Advanced or Enterprise Edition 8.1 This document supports the version of each product listed and supports all subsequent versions

More information

Ensure that the server where you install the Primary Server software meets the following requirements: Item Requirements Additional Details

Ensure that the server where you install the Primary Server software meets the following requirements: Item Requirements Additional Details ZENworks 11 SP4 System July 2015 The following sections provide the Novell ZENworks 11 SP4 requirements for hardware and software: Section 1, Primary Server, on page 1 Section 2, Managed Device, on page

More information

Veeam and Azure Better together. Martin Beran Senior Systems Engineer; Czechia/Slovakia/Hungary

Veeam and Azure Better together. Martin Beran Senior Systems Engineer; Czechia/Slovakia/Hungary Veeam and Azure Better together Martin Beran Senior Systems Engineer; Czechia/Slovakia/Hungary Veeam helps enterprises achieve 24.7.365 Availability Private Cloud / On-Premises Private Cloud / On-Premises

More information

Request for Proposal

Request for Proposal IROQUOIS COUNTY INFORMATION SERVICES Request for Proposal Iroquois County Information Services Data Center Computer Server Consolidation R.G.Egolf, Consultant 12/3/2013 PROPOSALS DUE BY 4:00 PM MONDAY,

More information

Pre Bid Query Response. Request for Proposal for Procurement of Cloud Services

Pre Bid Query Response. Request for Proposal for Procurement of Cloud Services S No Section Existing Clause Revised Clause 1 Section 4 Calendar of Last Date & Time for Bid Submission : 5 th May Last Date & Time for Bid Submission : events 2018 : 3:30 pm or before 30 th April : 4:00

More information

SmartPay Installation & Setup Guide. Version: HR21 Limited

SmartPay Installation & Setup Guide. Version: HR21 Limited Version: 1.0.1 HR21 Limited All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or information

More information

Attachment 3 (B); Security Exhibit. As of March 29, 2016

Attachment 3 (B); Security Exhibit. As of March 29, 2016 Attachment 3 (B); Security Exhibit As of March 29, 2016 UVA Medical Center (UVaMC) Security Requirements The term System shall mean computer equipment, peripheral equipment, system software, application

More information

Launching a Highly-regulated Startup in the Cloud

Launching a Highly-regulated Startup in the Cloud Launching a Highly-regulated Startup in the Cloud Poornaprajna Udupi (@poornaudupi) 1 Starting in the 86%by 2020 Cloud Cisco Global Cloud Index: Forecast and Methodology, 2015 2020 2 Building blocks, Cost,

More information

Infrastructure: Local/Client Hosted

Infrastructure: Local/Client Hosted Infrastructure: Local/Client Hosted This section describes the infrastructure required to optimally run Profile in your organisation. It is advised that you check with your hardware vendor or IT consultant

More information

vrealize Suite Lifecycle Manager 1.0 Installation and Management vrealize Suite 2017

vrealize Suite Lifecycle Manager 1.0 Installation and Management vrealize Suite 2017 vrealize Suite Lifecycle Manager 1.0 Installation and Management vrealize Suite 2017 vrealize Suite Lifecycle Manager 1.0 Installation and Management You can find the most up-to-date technical documentation

More information

Data Protection Service Guide

Data Protection Service Guide Data Protection Service Guide Backup & Disaster Recovery Local Backup & Recovery Ancero Backup & Disaster Recovery Ancero Backup & Disaster Recovery provides device backups and onsite recovery as virtual

More information

System Overview. Security

System Overview. Security ImageSilo is an ultra-secure, on-demand Enterprise Content Management (ECM) system. As the largest on-demand installation of PaperVision Enterprise, it offers all the same features and functionality. ImageSilo

More information

Texas A&M AgriLife Research Procedures

Texas A&M AgriLife Research Procedures Texas A&M AgriLife Research Procedures 29.01.99.A0.02 Enterprise File Service Approved: December 15, 2011 Revised: September 12, 2014 Next Scheduled Review: September 12, 2019 PROCEDURE STATEMENT This

More information

Service Catalog. Infrastructure and Compute. Virtual Machines. Cirrus Compute. Test/Dev. Private Cloud. WebLogic Database. Platform Jboss IIS

Service Catalog. Infrastructure and Compute. Virtual Machines. Cirrus Compute. Test/Dev. Private Cloud. WebLogic Database. Platform Jboss IIS Cirrus Offerings Service Catalog Infrastructure and Compute Test/Dev Virtual Machines Cirrus Compute Private Cloud Platform Jboss IIS WebLogic Database Storage Business Continuity and Availability File

More information

Information Technology Security Audit RFP2018-P02 - Questions and Answers

Information Technology Security Audit RFP2018-P02 - Questions and Answers Information Technology Security Audit RFP2018-P02 - Questions and Answers Q: Page 9 (under the Pricing section) references Perimeter Vulnerability Assessment and Internal Vulnerability Scan. For clarification,

More information

Veritas System Recovery 16 Management Solution Readme

Veritas System Recovery 16 Management Solution Readme Veritas System Recovery 16 Management Solution Readme About this readme System requirements for software delivery policies of Veritas System Recovery 16 System requirements for Veritas System Recovery

More information

Juniper Vendor Security Requirements

Juniper Vendor Security Requirements Juniper Vendor Security Requirements INTRODUCTION This document describes measures and processes that the Vendor shall, at a minimum, implement and maintain in order to protect Juniper Data against risks

More information

Proposer Questions: The following are responses to all submitted questions:

Proposer Questions: The following are responses to all submitted questions: This Addendum forms a part of the Request for Proposal and modifies the original RFP issued February 17, 2011. Proposers shall acknowledge receipt of this Addendum in their cover letter. Failure to do

More information

Getting Started Guide. This document provides step-by-step instructions for installing Max Secure Anti-Virus and its prerequisite software.

Getting Started Guide. This document provides step-by-step instructions for installing Max Secure Anti-Virus and its prerequisite software. Getting Started Guide This document provides step-by-step instructions for installing Max Secure Anti-Virus and its prerequisite software. Contents 2 Contents Introduction... 3 System Requirements... 4

More information

escan for Windows: escan System Requirements

escan for Windows: escan System Requirements : escan System Requirements : escan Anti-Virus for Windows v11 Operating System: (Client) Windows 8 Family, Windows 7 Family, Windows Vista Family, Rollup patch 1 Other Requirements: Disk Space: 750 MB

More information

inforouter V8.0 Implementation Guide Active Innovations, Inc. A Document Management Company

inforouter V8.0 Implementation Guide Active Innovations, Inc. A Document Management Company inforouter V8.0 Implementation Guide www.inforouter.com inforouter V8.0 implementation Guide This guide will take you through the step-by-step installation procedures required for a successful inforouter

More information

This guide details the deployment and initial configuration necessary to maximize the value of JetAdvantage Insights.

This guide details the deployment and initial configuration necessary to maximize the value of JetAdvantage Insights. HP JetAdvantage Insights Deployment Guide This guide details the deployment and initial configuration necessary to maximize the value of JetAdvantage Insights. 1. Overview HP JetAdvantage Insights provides

More information

Backup and Recovery. Benefits. Introduction. Best-in-class offering. Easy-to-use Backup and Recovery solution

Backup and Recovery. Benefits. Introduction. Best-in-class offering. Easy-to-use Backup and Recovery solution DeltaV Distributed Control System Product Data Sheet Backup and Recovery Best-in-class offering Easy-to-use Backup and Recovery solution Data protection and disaster recovery in a single solution Scalable

More information

HP Network Automation Software Support Matrix

HP Network Automation Software Support Matrix HP Network Automation Software Support Matrix Software Version 9.00 / August 2010 Documentation Date: December 2011 This document provides an overview of the system requirements and supported platforms

More information

Cloud Security Whitepaper

Cloud Security Whitepaper Cloud Security Whitepaper Sep, 2018 1. Product Overview 3 2. Personally identifiable information (PII) 3 Using Lookback without saving any PII 3 3. Security and privacy policy 4 4. Personnel security 4

More information

Cloud Operations for Oracle Cloud Machine ORACLE WHITE PAPER MARCH 2017

Cloud Operations for Oracle Cloud Machine ORACLE WHITE PAPER MARCH 2017 Cloud Operations for Oracle Cloud Machine ORACLE WHITE PAPER MARCH 2017 Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and

More information

Delphi+ SP5-AP7 System Requirements

Delphi+ SP5-AP7 System Requirements Delphi+ SP5-AP7 System Requirements This document may not be copied, photocopied, reproduced, published, translated, or reduced to electronic medium or machine readable form, in whole or in part, without

More information

IT Managed Services. Schedule 1 Specification 11/07/18

IT Managed Services. Schedule 1 Specification 11/07/18 ` IT Managed Services Schedule 1 Specification 11/07/18 IT Managed Service ITT Schedule 1 Specification Table of Contents 1.0 Introduction... 2 1.1 Overview... 2 2.0 Scope... 2 3.0 Vendor Response Requirements...

More information

Upgrade to Webtrends Analytics 8.5: Best Practices

Upgrade to Webtrends Analytics 8.5: Best Practices Technical Best Practices 8.5 Software Upgrade Upgrade to Webtrends Analytics 8.5: Best Practices Version 4 Webtrends Analytics is a powerful application that must be installed on a dedicated computer.

More information

Netwrix Auditor for Active Directory

Netwrix Auditor for Active Directory Netwrix Auditor for Active Directory Quick-Start Guide Version: 8.0 4/22/2016 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment

More information

MicroMD PM + EMR Client Server Hardware and Software Requirements

MicroMD PM + EMR Client Server Hardware and Software Requirements MicroMD PM + EMR Client Server Hardware and Software Requirements Last Updated: January 23, 2018 MicroMD PM + EMR Version 14.0 MicroMD PM + EMR Server Specs This document describes minimum requirements

More information

HP Network Automation Support Matrix

HP Network Automation Support Matrix HP Network Automation Support Matrix Software Version 9.10 / March 2011 Documentation Date: May 2012 This document provides an overview of the system requirements and supported platforms for HP Network

More information

System Requirements - REST Professional v15.5

System Requirements - REST Professional v15.5 System Requirements - REST Professional v15.5 The following are minimum and recommended system requirements for REST Professional. Whilst the program will operate on the minimums listed, we strongly suggest

More information

Version v November 2015

Version v November 2015 Service Description HPE Quality Center Enterprise on Software-as-a-Service Version v2.0 26 November 2015 This Service Description describes the components and services included in HPE Quality Center Enterprise

More information

Lasso CDP. Lasso. Administration Tool Guide. August 2005, Version Lasso CDP Administration Tool Guide Page 1 of All Rights Reserved.

Lasso CDP. Lasso. Administration Tool Guide. August 2005, Version Lasso CDP Administration Tool Guide Page 1 of All Rights Reserved. Lasso CDP Administration Tool Guide August 2005, Version 1.6.1 Lasso CDP Administration Tool Guide Page 1 of 41 Copyright Copyright 2005 Lasso Logic, LLC. All Rights Reserved. No part of this publication

More information

Minimum Requirements for Cencon 4 with Microsoft R SQL 2008 R2 Enterprise

Minimum Requirements for Cencon 4 with Microsoft R SQL 2008 R2 Enterprise Minimum Requirements for Cencon 4 with Microsoft R SQL 2008 R2 Enterprise SQL 2008 R2 Enterprise Restrictions 8 CPU 2 TB Ram Use Limit 524 PB Database Size High Availability Options Database Mirroring,

More information