Section 4 Cowlitz County Technical Requirements
|
|
- Winifred Shepherd
- 5 years ago
- Views:
Transcription
1 Section 4 Cowlitz County Technical Requirements 122
2 Cowlitz County ATS Technical Requirements A standard response of Yes/NCMod/Planned/Fee/No in the Vendor Response fields are to be completed by each submitter. Yes = Included in standard package. NCMod = No Cost Modification. (System does not contain this feature but will be furnished at no cost.) Planned = Not included but planned in a future update (Must estimate when the feature will be available). Fee = Not available but will develop and implement for and additional fee (Estimate fee if possible) No = Not available. 4.1 TECHINICAL REQUIREMENTS ID# Technical Requirements IT Administration 713 Proposed product operates on a Microsoft SQL Server 2010/12 database platform 714 Proposed product operates in a Windows Server 2012 R2 environment 715 Proposed product clients operate on a 32 bit Windows 7,8.1, and 10 Ent OS 716 Proposed product clients operate on a 64-bit Windows 7,8.1, and 10 Ent OS 717 Proposed product will run in a virtualized server VMWare environment Proposed product will run with a standard or reasonable number of required servers and storage capacity (please provide numbers of servers and storage capacity estimates based on our county 718 statistics/metrics) Vendor Response Vendor Notes General Systems 719 Proposed product supports unique logins Unique logins will be tied to active directory for single sign-on capability. Vendor must clarify if their system also maintains User/Password (outside of AD), and whether or not their AD 720 compatibility is through a link or a direct-connect. Proposed product allows corrections and deletions and provides an 721 audit trail that cannot be modified Proposed product allows all database fields to be fully searchable by 722 default 723 Proposed product provides full online screen-based help Proposed product allows all databases to be either directly backed up with a third party backup solution, or are programmatically 724 exportable for backup TECHNOLOGY ENVIRONMENT The Cowlitz County Assessor s and Treasurer s offices are connected to the Cowlitz County backbone network running at speeds at or about 1 GBit/Second. Cowlitz County uses TCP/IPv4 as our networking standard. 123
3 4.3. WORKSTATIONS Cowlitz County operates a network that contains approximately 750 workstations running Microsoft s 32-bit Windows 7, 8.1, and 10 Enterprise and 64-bit Windows 7, 8.1, and 10 Enterprise Operating Systems. Cowlitz County works to replace each workstation once it has been in service for 3 or 5 years (depending on hardware type). This means that the county regularly upgrades computing hardware at reasonable intervals; but that in some cases hardware can be up to 5 years behind currently available machines and/or operating systems. Our minimum supported station specifications follow: Minimum Workstation (Machines greater than 1 year old) Intel i7 Processors 2.4GHz+ 4GB of RAM 80+ GB hard drive Windows 32 bit Windows 7 Enterprise or 64-bit Windows 7 Enterprise Office 2010 and SERVERS The network contains several servers. Most of these servers run the Microsoft Windows operating system. Currently, Cowlitz County operates the following operating systems on our network servers: Microsoft Windows 2012 Standard Release 2 Cowlitz County has standardized on Dell PowerEdge hardware servers for its Windows servers. Cowlitz County has standardized on the Microsoft Windows Server 2012 operating system for our network environment which is running in conjunction with the VMWare virtualization platform. The successful vendor to this RFP shall have a solution that supports this standard. 4.5 DATABASE MANAGEMENT SYSTEM (DBMS) Cowlitz County has standardized on Microsoft s SQL Server for our DBMS. It is highly desirable that the vendor software uses Microsoft SQL Server as its database foundation, and that the vendor solution stays current with SQL Server upgrades in addition to supporting legacy versions. 124
4 4.6 INFORMATION INTEGRATION PHILOSOPHY All information that is produced by Cowlitz County employees and sub-contractors is viewed as owned by Cowlitz County. In this light, it is critical that Cowlitz County has the ability to seamlessly move information from one information system to another information system both manually and programmatically. This includes the free flowing and continually seamless movement of information to and from the vendor provided solution selected in response to this RFP and other selected Cowlitz County applications. Vendor systems, by design, are often vertical in nature; i.e. they assume that the information collected in the application will only be utilized by that application. We view information as essentially horizontal in nature. This horizontal data flow improves information integrity, enhances confidence in our information systems, allows information to be used in abstract data analysis, and enhances employee efficiencies, along with many other benefits. Consequently, Cowlitz County s information philosophy is to procure and/or create systems that provide the ability to seamlessly move information in and out of them in industry standard formats. The vendor/company awarded this RFP must assure that the application has been developed, tested and runs on a Microsoft SQL back-end. This is a critical requirement. This issue is so significant to Cowlitz County that applications that do not run Microsoft SQL will not be considered. 4.7 DATA CONVERSION The current Assessor/Treasurer system has been in operation for about 15 years for Treasurer and 10 years for Assessor. All data is stored in an Oracle database using Tyler s Eagle Computer System (ECS) product TIMS/CAMA/AIMS. Treasurer Information Management System (TIMS), Computer Assisted Mass Appraisal (CAMA) and Assessor Information Management System (AIMS). Cowlitz County requires that all data in the current Assessor/Treasurer system will be converted/moved into the new ATS. The current system also has building sketches stored in tables in the TIMS database. Additionally, photos and scanned images are stored as.jpg files with database pointers. It is required that these items will be migrated/converted into the new system as well. 4.8 ELECTRONIC MESSAGING SYSTEM Cowlitz County currently uses Microsoft Exchange 2010 and 2013 as our electronic messaging system. 125
5 4.9 INTERNET CONNECTIVITY AND USE Cowlitz County provides Internet connectivity for all employees that have workstations on Cowlitz County s network. Internet access is through a 100Mb fiber connection. Employees are authorized to use internet connectivity for Cowlitz County business purposes. Employees are not authorized to download software directly to workstations. If the system provides the capability of providing software enhancements through the internet, it is the expectation that the Cowlitz County Information Technology department will download such upgrades and package them as part of our network upgrade capabilities, unless software upgrades and installation are performed by the vendor as part of the maintenance/support costs. If this is the case, vendor will conform to Cowlitz County Computer User Policies including executing a non-disclosure agreement. All information residing on or originating from Cowlitz County servers/network is the property of Cowlitz County, and vendor has no authority to disclose or distribute any records or information about those records or their content in any format including verbally. Cowlitz County currently uses Microsoft Internet Explorer v9 as our Internet browser. Vendor will not create an application that will force Cowlitz County to upgrade browsers without consent and testing by Cowlitz County Information Technology. Use of the Internet by the vendor to provide support, troubleshooting, software upgrades or patches is highly desired. The Cowlitz County Information Technology Department can provide VPN access to facilitate vendor support. Vendor agrees to abide by all security measures as outlined in a signed VPN access agreement OFFICE AUTOMATION ENVIRONMENT Cowlitz County uses the Microsoft Office Suite as its primary office automation toolset NETWORK DEPLOYMENT OF SOFTWARE The Cowlitz County Information Technology department manually installs (or pushes with the assistance of Microsoft System Center or Dell KACE appliance) all client software installations, patches and upgrades. Vendor may load client software only with the expressed consent of Cowlitz County Information Technology BACKUP AND DISASTER RECOVERY Cowlitz County currently uses a combination of SQL database maintenance plans and technology to perform daily snapshots and data replication as its disaster recovery and enterprise backup solution for all production data. Cowlitz County currently employs the Barracuda 1090 Backup Appliance (with cloud replication) as its primary backup solution. Your proposal should indicate any issues with either solution. 126
6 4.13 TELECOMMUTING Cowlitz County operates a remote access system for offices outside of Cowlitz County s private network. It is highly desirable that the system can be accessed through a protected VPN tunnel. This access is currently provided through network tools associated with the WatchGuard firewall appliance. The vendor will agree to the following remote support requirements: 1) All employees of vendor shall be specifically identified. Cowlitz County requires that each employee of the vendor who works on our system be identified and that Cowlitz County can identify the times and dates that individuals accessed Cowlitz County s network or the system. It is highly recommended that the vendor use service desk software that will track all activities performed on Cowlitz County systems. 2) Remote support shall be done through the WatchGuard Java Based remote access system. Cowlitz County reserves the right to change methodologies of access by vendor for remote support. Vendor will provide a support mechanism that includes direct remote access support without the necessity of a Cowlitz County IT resource to intercede. 3) All configuration changes that are made to the system as part of remote support shall be logged in a mutually agreed location. 4) The Vendor shall be responsible for obtaining any client licenses that are required to access Cowlitz County s network, or for resources on vendor-owned workstations, personal computers, named licenses, or other computing devices. 5) Cowlitz County shall provide a login account to vendor employees for login purposes. Each activity must be tracked on the vendor side. Cowlitz County reserves the right to request the logs at any time and vendor agrees to provide them. 6) Cowlitz County shall take responsibility to ensure there are adequate licenses for vendor support technicians to operate on Cowlitz County s network. See item 4 in conjunction with this requirement SYSTEMS SUPPORT As Cowlitz County improves its security for remote access to its network, it becomes prudent from a security perspective to continually re-evaluate the support connections our vendors currently use to access our network in support of their products. Cowlitz County currently uses WatchGuard VPN as its method to allow vendors access to the appropriate equipment. Vendors/ support staff must request access to our system by signing a VPN access agreement. This agreement provides details, responsibilities, rules and guidelines directing vendor access to the county network(s). 127
7 4.15 TECHNICAL REQUIREMENTS Technical Requirements are provided in the Cowlitz ATS RFP S Please provide responses to our requirements and questions on the table. 128
ClockWork Enterprise 5
ClockWork Enterprise 5 Technical Overview rev 5.1 Table of Contents Overview... 3 Database Requirements... 4 Database Storage Requirements... 4 Sql Server Authentication and Permissions... 5 ClockWork
More informationIT Discovery / Assessment Report Conducted on: DATE (MM/DD/YYY) HERE On-site Discovery By: AOS ENGINEER NAME Assessment Document By: AOS ENGINEER NAME
IT Discovery / Assessment Report Conducted on: DATE (MM/DD/YYY) HERE On-site Discovery By: AOS ENGINEER NAME Assessment Document By: AOS ENGINEER NAME For: CLIENT NAME HERE CLIENT ADDRESS HERE 1. Current
More informationISO27001 Preparing your business with Snare
WHITEPAPER Complying with ISO27001 Preparing your business with Snare T he technical controls imposed by ISO (International Organisation for Standardization) Standard 27001 cover a wide range of security
More informationSecure Remote Access And Password Management
+44(0)1425 270 333 email: sales@dtrack.com website: dtt.dtrack.com Secure Remote Access And Password Management Data Track Technolo gy Ltd 153 Somerford Road Christchurch Dorset BH23 3TY UK Contents The
More informationHardware and Software Requirements
Hardware and Software Requirements WideOrbit s WO Media Sales is a full client-server based sales system. Users run a thick client on a Windows 10*, Windows 8 or Windows 7, which connects directly to a
More informationICBA Migration to IaaS Cloud Platform REQUEST FOR PROPOSAL
INTERNATIONAL CENTER FOR BIOSALINE AGRICULTURE ICBA Migration to IaaS Cloud Platform REQUEST FOR PROPOSAL Imane Boujidane Procurement Officer +971 4 336 1100 ext. 201 i.boujidane@biosaline.org.ae International
More informationSC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide
SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide Copyright and Trademark Statements 2014 ViewSonic Computer Corp. All rights reserved. This document contains proprietary information that
More informationVDI Users Guide. Mac OS X
Mac OS X VDI Users Guide NOTICE: Access to electronic resources at Moraine Park Technical College is restricted to employees, students, or other individuals authorized by the College. By connecting to
More informationCloud Services. Introduction
Introduction adi Digital have developed a resilient, secure, flexible, high availability Software as a Service (SaaS) cloud platform. This Platform provides a simple to use, cost effective and convenient
More informationLocal Area Network (LAN) Deployment Hardware Requirements
Local Area Network (LAN) Deployment Hardware Requirements There are a number of requirements that exist no matter how many users will be accessing SuccessWare 21. The individual workstation requirements
More informationRequest for Proposal. I. Introduction. II. Scope of Work. IT Managed Services Support. IT Environment. Main Facility
Request for Proposal IT Managed Services Support I. Introduction The Hoh Indian Tribe ( Tribe or Hoh Tribe ) is located in western Washington State in Jefferson County, 28 miles South of Forks, Washington.
More informationVMware Mirage Getting Started Guide
Mirage 5.8 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,
More informationRFP #19-01 Vendor Questions. RFP # of 2 Copier/MFD Hardware and Service and RFP # of 2 Printer/MFP Service & Supplies
RFP #19-01 Vendor Questions REQUEST FOR PROPOSAL: RFP #19-01 1 of 2 Copier/MFD Hardware and Service and RFP #19-01 2 of 2 Printer/MFP Service & Supplies Question #1: I spoke with you just prior to the
More informationMYOB ENTERPRISE SOLUTIONS. System Requirement Guidelines EXO BUSINESS. Version 2.9 Thursday 1 st May 2014 MYOB ENT ER P R IS E S OLUT IONS
MYOB ENTERPRISE SOLUTIONS System Requirement Guidelines Version 2.9 Thursday 1 st May 2014 EXO BUSINESS MYOB ENT ER P R IS E S OLUT IONS Contents Important Please Read Carefully... 3 Quick Links... 3 System
More informationManaged Service. Managed Services. High Availability / Disaster Recovery Solutions. Cloud and Hosting Solutions. Security Solutions.
Managed Service Managed Services IBM i Intel AIX High Availability / Disaster Recovery Solutions Design & Implementation Monitoring Cloud and Hosting Solutions Security Solutions Single Sign-On Assessments
More informationModernize Your Backup and DR Using Actifio in AWS
FOR AWS Modernize Your Backup and DR Using Actifio in AWS 150105H FOR AWS Modernize Your Backup and DR Using Actifio in AWS What is Actifio? Actifio virtualizes the data that s the lifeblood of business.
More informationVMware Mirage Getting Started Guide
Mirage 5.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,
More informationUnifia Environment (UE) Application & Security Overview
Unifia Environment (UE) Application & Security Overview 2017 OLYMPUS CORPORATION OF THE AMERICAS PAGE 1 OF 14 SP3217V03 Unifia Environment UE Application & Security Overview The Olympus Unifia Environment
More informationPurchasing Department Finance Group INVITATION TO BID
Purchasing Department Finance Group August 7, 2012 INVITATION TO BID The City of Norwalk, Information Technology Department, is soliciting bids for Computer Server Hardware and VMware vsphere Enterprise
More informationISO/IEC Solution Brief ISO/IEC EventTracker 8815 Centre Park Drive, Columbia MD 21045
Solution Brief 8815 Centre Park Drive, Columbia MD 21045 About delivers business critical software and services that transform high-volume cryptic log data into actionable, prioritized intelligence that
More informationIBM Case Manager on Cloud
Service Description IBM Case Manager on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means and includes the company, its authorized users or recipients of the
More informationIT Service Upgrades Announcement
IT Service Upgrades Announcement Beginning in late 2008, AgriLife Information Technology under the direction of the Office of the Vice Chancellor and Dean of Agriculture and Life Sciences conducted a study
More informationARCSERVE UDP CLOUD DIRECT DISASTER RECOVERY APPLIANCE VMWARE
ARCSERVE UDP CLOUD DIRECT DISASTER RECOVERY APPLIANCE VMWARE [COMPANY NAME] [Company address] Table of Contents Arcserve UDP Cloud Direct Disaster Recovery Appliance for VMware... 2 Download the Arcserve
More informationVeeam Backup & Replication on IBM Cloud Solution Architecture
Veeam Backup & Replication on IBM Cloud Solution Architecture Date: 2018 07 20 Copyright IBM Corporation 2018 Page 1 of 12 Table of Contents 1 Introduction... 4 1.1 About Veeam Backup & Replication...
More informationOUR CUSTOMER TERMS CLOUD SERVICES - INFRASTRUCTURE
CONTENTS 1 ABOUT THIS PART... 2 2 GENERAL... 2 3 CLOUD INFRASTRUCTURE (FORMERLY UTILITY HOSTING)... 2 4 TAILORED INFRASTRUCTURE (FORMERLY DEDICATED HOSTING)... 3 5 COMPUTE... 3 6 BACKUP & RECOVERY... 8
More informationSECURITY PRACTICES OVERVIEW
SECURITY PRACTICES OVERVIEW 2018 Helcim Inc. Copyright 2006-2018 Helcim Inc. All Rights Reserved. The Helcim name and logo are trademarks of Helcim Inc. P a g e 1 Our Security at a Glance About Helcim
More informationCore Services for ediscovery Perfection
BEST-IN-CLASS DATA ENVIRONMENTS. Core Services for ediscovery Perfection MANAGE MANAGE IMPLEMENT IMPLEMENT ASSESS Core Services for ediscovery Perfection George Jon is an ediscovery infrastructure specialist
More informationGladinet Cloud Enterprise
GLADINET, INC Gladinet Cloud Enterprise Technical White Paper Gladinet, Inc. 1/20/2013 This document discusses the technologies behind Gladinet Cloud Enterprise Copyright 2013 Gladinet, Inc. Table of Contents
More informationIntroduction and Datacenter Topology For Your System
Introduction and Datacenter Topology For Your System This chapter provides an introduction, a datacenter overview, and VMware vcenter requirements for your system. Introducing Cisco WebEx Meetings Server,
More informationGladinet Cloud Enterprise
GLADINET, INC Gladinet Cloud Enterprise Multi-Zone Deployment Guide Gladinet, Inc. 4/5/2015 This document discusses the technologies behind Gladinet Cloud Enterprise Copyright 2015 Gladinet, Inc. Table
More informationInstallation Guide. Help Desk Manager. Version
Installation Guide Help Desk Manager Version 12.3.0 Contents Introduction 1 Key Features 1 Parent/Child Service Relationships 1 Automated Ticketing Processing 1 Asset Management 2 Installation Requirements
More informationImplementation Guide for Symantec Endpoint Protection Small Business Edition
Implementation Guide for Symantec Endpoint Protection Small Business Edition Implementation Guide for Symantec Endpoint Protection Small Business Edition The software described in this book is furnished
More informationVirtualized SQL Server Performance and Scaling on Dell EMC XC Series Web-Scale Hyper-converged Appliances Powered by Nutanix Software
Virtualized SQL Server Performance and Scaling on Dell EMC XC Series Web-Scale Hyper-converged Appliances Powered by Nutanix Software Dell EMC Engineering January 2017 A Dell EMC Technical White Paper
More informationHPE Data Replication Solution Service for HPE Business Copy for P9000 XP Disk Array Family
Data sheet HPE Data Replication Solution Service for HPE Business Copy for P9000 XP Disk Array Family HPE Lifecycle Event Services HPE Data Replication Solution Service provides implementation of the HPE
More informationRFP # QUESTIONS AND ANSWERS Posted: February 5, 2016
RFP # 2016-02 QUESTIONS AND ANSWERS Posted: February 5, 2016 REQUEST FOR PROPOSAL RFP # 2016-02 Q: Who currently manages your IT services today? A: Inspired Technologies. Q: Are you satisfied with their
More informationCA ARCserve Backup for Windows
CA ARCserve Backup for Windows Release Summary r12.5 This documentation and any related computer software help programs (hereinafter referred to as the Documentation ) is for the end user s informational
More information68 - Point Checklist Revised May 2017
karlp@smallbizthoughts.com www.smallbizthoughts.com 68 - Point Checklist Revised May 2017 Date: Client: Contact: Technician: Phone: Address: City / Zip: Client Interview 1. Are there any known issues?
More informationFitness Manager V4 Install Guide
Fitness Manager V4 Install Guide Table of Contents 1 Welcome to V4...3 License Agreement...4 Copyright...4 2. Minimum System Requirements...5 3. Navigating the Install...6 4. Installing V4 on the Server...7
More informationOnCommand Unified Manager Installation and Setup Guide for Use with Core Package 5.2 and Host Package 1.3
IBM System Storage N series OnCommand Unified Manager Installation and Setup Guide for Use with Core Package 5.2 and Host Package 1.3 GA32-1020-03 Table of Contents 3 Contents Preface... 10 Supported
More informationBrainware Intelligent Capture
Brainware Intelligent Capture Technical s Version: 5.9.x Written by: Product Knowledge, R&D Date: August 2018 2008-2018 Hyland Software, Inc. and its affiliates. Brainware Intelligent Capture Technical
More informationEchidna Concepts Guide
Salt Group Concepts Guide Version 15.1 May 2015 2015 Salt Group Proprietary Limited. All rights reserved. Information in this document is subject to change without notice. The software described in this
More informationAdministrative & Operations Network Security Assessment
TAMPA-HILLSBOROUGH COUNTY EXPRESSWAY AUTHORITY Letter of Clarification No. 1 FOR REQUEST FOR QUALIFICATIONS (RFQ) Administrative & Operations Network Security Assessment RFQ No. O-00418 Page 1 of 15 Letter
More informationHardware and Software Security
Hardware and Software Security Good Practice Guide Author: A Heathcote Date: 22/05/2017 Version: 1.0 Copyright 2017 Health and Social Care Information Centre. The Health and Social Care Information Centre
More informationRecommended System Requirements for Microsoft Dynamics SL 2018
Recommended System for Microsoft Dynamics SL 2018 Synergy Business Solutions recommends three separate servers but this can be discussed during the upgrade planning process. Dynamics SL / Management Reporter
More informationPacific Knowledge Systems. RippleDown Deployment Guide: v8.0.5
Pacific Knowledge Systems RippleDown Deployment Guide: v8.0.5 Copyright Notice The information provided in this User's Guide is subject to change without notice and is not a commitment by Pacific Knowledge
More informationRapid Recovery DocRetriever for SharePoint User Guide
Rapid Recovery 6.1.3 Table of Contents Introduction to DocRetriever for SharePoint... 6 Using this documentation... 6 About DocRetriever for SharePoint...7 DocRetriever, AppAssure, and Rapid Recovery compatibility...
More informationEnhancing Oracle VM Business Continuity Using Dell Compellent Live Volume
Enhancing Oracle VM Business Continuity Using Dell Compellent Live Volume Wendy Chen, Roger Lopez, and Josh Raw Dell Product Group February 2013 This document is for informational purposes only and may
More informationPretaGov Australia SaaS Hosting with Fully Managed Services, Support and Maintenance
PretaGov Australia SaaS Hosting with Fully Managed Services, Support and Maintenance Introduction to PretaGov PretaGov operates a Government Community Plone CMS (content management system) SaaS Cloud exclusively
More informationWireless Security Access Policy and Agreement
Wireless Security Access Policy and Agreement Purpose The purpose of this policy is to define standards, procedures, and restrictions for connecting to Fort Valley State University s internal network(s)
More informationMYOB Enterprise Solutions
Enterprise Solutions System Requirement Guidelines Last Updated: 16 May 2017 Contents Important Please Read Carefully 4 Quick Links 4 System Requirements 5 Overview... 5 Server Requirements... 6 Server
More informationQuest DL Appliance Family
Quest DL Appliance Family June, 2017 Topics: Introduction Appliance Configuration Machine Protection Replication Virtual Machine Export/Virtual Standby Additional Information Contacting Quest 2017 Quest
More informationCITY OF MONTEBELLO SYSTEMS MANAGER
CITY OF MONTEBELLO 109A DEFINITION Under general administrative direction of the City Administrator, provides advanced professional support to departments with very complex computer systems, programs and
More informationIntermedia. CX-E Cloud Hosting Provider. Introduction. Why Intermedia for CX-E Cloud? Cost of Ownership
CX-E Cloud Hosting Provider Intermedia Introduction AVST has selected Intermedia as the cloud provider for our hosted CX-E Cloud offering. Intermedia delivers an enterprise-grade cloud infrastructure that
More informationServer Specifications
Requirements Server s It is highly recommended that MS Exchange does not run on the same server as Practice Evolve. Server Minimum Minimum spec. is influenced by choice of operating system and by number
More informationGenesys Decisions. Genesys Decisions IT Administration Guide 8.5
Genesys Decisions Genesys Decisions IT Administration Guide 8.5 Information contained herein is proprietary and confidential and cannot be disclosed or duplicated without the prior written consent of Genesys
More informationSample Security Risk Analysis ASP Meaningful Use Core Set Measure 15
Sample Security Risk Analysis ASP Meaningful Use Core Set Measure 15 Risk Analysis with EHR Questions Example Answers/Help: Status What new electronic health information has been introduced into my practice
More informationSection A - Standards that Apply to All RFPs
These standards provide general information regarding the services provided by the Information Technology branch, in the context of implementation projects. These standards are published, at minimum, bi-annually
More informationAuthor: Janice M. Anderson Date: 5/1/2006
Subject: AHC-IS Desktop Policies, Proc and Standards Policy No. 3001 Applicable to: AHC-IS Pages: 6 Author: Janice M. Anderson Date: 5/1/2006 Replaces version Dated: 2005 POLICY: AHC-IS goals for Workstation
More informationADDENDUM NO. 2 BID-CONTRACT DOCUMENTS FOR. BID No District Wide Active Directory and Exchange Server Upgrade and Consolidation
ADDENDUM NO. 2 BID-CONTRACT DOCUMENTS FOR BID No. 2015 District Wide Active Directory and Exchange Server Upgrade and Consolidation COAST COMMUNITY COLLEGE DISTRICT COSTA MESA, CALIFORNIA COUNTY OF ORANGE
More informationNU Cloud Terms of Service
Overview This document represents the Terms of Service among Northwestern Information Technology (IT) and participating tenants in the NUCloud private cloud environment at Northwestern. The goal of these
More informationAltius IT Policy Collection
Altius IT Policy Collection Complete set of cyber and network security policies Over 100 Policies, Plans, and Forms Fully customizable - fully customizable IT security policies in Microsoft Word No software
More informationIMC Network Traffic Analyzer 7.3 (E0504) Copyright 2015, 2017 Hewlett Packard Enterprise Development LP
Network Traffic Analyzer 7.3 (E0504) Copyright 2015, 2017 Hewlett Packard Enterprise Development LP Table of Contents 1. What's New in this Release 2. Problems Fixed in this Release 3. Software Distribution
More informationYellow Dog Inventory Upgrade System Requirements and Process
Yellow Dog Inventory Upgrade System Requirements and Process for Version 362/363 Document Date: February 2018 Y e l l o w D o g I n v e n t o r y U p g r a d e S y s t e m R e q u i r e m e n t s Page
More informationBrainware Intelligent Capture
Brainware Intelligent Capture Technical s Version: 5.8.1 Written by: Product Knowledge, R&D Date: Tuesday, February 20, 2018 2017 Hyland Software, Inc. and its affiliates. Perceptive Intelligent Capture
More informationIT Business Management System Requirements Guide
IT Business Management System Requirements Guide IT Business Management Advanced or Enterprise Edition 8.1 This document supports the version of each product listed and supports all subsequent versions
More informationEnsure that the server where you install the Primary Server software meets the following requirements: Item Requirements Additional Details
ZENworks 11 SP4 System July 2015 The following sections provide the Novell ZENworks 11 SP4 requirements for hardware and software: Section 1, Primary Server, on page 1 Section 2, Managed Device, on page
More informationVeeam and Azure Better together. Martin Beran Senior Systems Engineer; Czechia/Slovakia/Hungary
Veeam and Azure Better together Martin Beran Senior Systems Engineer; Czechia/Slovakia/Hungary Veeam helps enterprises achieve 24.7.365 Availability Private Cloud / On-Premises Private Cloud / On-Premises
More informationRequest for Proposal
IROQUOIS COUNTY INFORMATION SERVICES Request for Proposal Iroquois County Information Services Data Center Computer Server Consolidation R.G.Egolf, Consultant 12/3/2013 PROPOSALS DUE BY 4:00 PM MONDAY,
More informationPre Bid Query Response. Request for Proposal for Procurement of Cloud Services
S No Section Existing Clause Revised Clause 1 Section 4 Calendar of Last Date & Time for Bid Submission : 5 th May Last Date & Time for Bid Submission : events 2018 : 3:30 pm or before 30 th April : 4:00
More informationSmartPay Installation & Setup Guide. Version: HR21 Limited
Version: 1.0.1 HR21 Limited All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or information
More informationAttachment 3 (B); Security Exhibit. As of March 29, 2016
Attachment 3 (B); Security Exhibit As of March 29, 2016 UVA Medical Center (UVaMC) Security Requirements The term System shall mean computer equipment, peripheral equipment, system software, application
More informationLaunching a Highly-regulated Startup in the Cloud
Launching a Highly-regulated Startup in the Cloud Poornaprajna Udupi (@poornaudupi) 1 Starting in the 86%by 2020 Cloud Cisco Global Cloud Index: Forecast and Methodology, 2015 2020 2 Building blocks, Cost,
More informationInfrastructure: Local/Client Hosted
Infrastructure: Local/Client Hosted This section describes the infrastructure required to optimally run Profile in your organisation. It is advised that you check with your hardware vendor or IT consultant
More informationvrealize Suite Lifecycle Manager 1.0 Installation and Management vrealize Suite 2017
vrealize Suite Lifecycle Manager 1.0 Installation and Management vrealize Suite 2017 vrealize Suite Lifecycle Manager 1.0 Installation and Management You can find the most up-to-date technical documentation
More informationData Protection Service Guide
Data Protection Service Guide Backup & Disaster Recovery Local Backup & Recovery Ancero Backup & Disaster Recovery Ancero Backup & Disaster Recovery provides device backups and onsite recovery as virtual
More informationSystem Overview. Security
ImageSilo is an ultra-secure, on-demand Enterprise Content Management (ECM) system. As the largest on-demand installation of PaperVision Enterprise, it offers all the same features and functionality. ImageSilo
More informationTexas A&M AgriLife Research Procedures
Texas A&M AgriLife Research Procedures 29.01.99.A0.02 Enterprise File Service Approved: December 15, 2011 Revised: September 12, 2014 Next Scheduled Review: September 12, 2019 PROCEDURE STATEMENT This
More informationService Catalog. Infrastructure and Compute. Virtual Machines. Cirrus Compute. Test/Dev. Private Cloud. WebLogic Database. Platform Jboss IIS
Cirrus Offerings Service Catalog Infrastructure and Compute Test/Dev Virtual Machines Cirrus Compute Private Cloud Platform Jboss IIS WebLogic Database Storage Business Continuity and Availability File
More informationInformation Technology Security Audit RFP2018-P02 - Questions and Answers
Information Technology Security Audit RFP2018-P02 - Questions and Answers Q: Page 9 (under the Pricing section) references Perimeter Vulnerability Assessment and Internal Vulnerability Scan. For clarification,
More informationVeritas System Recovery 16 Management Solution Readme
Veritas System Recovery 16 Management Solution Readme About this readme System requirements for software delivery policies of Veritas System Recovery 16 System requirements for Veritas System Recovery
More informationJuniper Vendor Security Requirements
Juniper Vendor Security Requirements INTRODUCTION This document describes measures and processes that the Vendor shall, at a minimum, implement and maintain in order to protect Juniper Data against risks
More informationProposer Questions: The following are responses to all submitted questions:
This Addendum forms a part of the Request for Proposal and modifies the original RFP issued February 17, 2011. Proposers shall acknowledge receipt of this Addendum in their cover letter. Failure to do
More informationGetting Started Guide. This document provides step-by-step instructions for installing Max Secure Anti-Virus and its prerequisite software.
Getting Started Guide This document provides step-by-step instructions for installing Max Secure Anti-Virus and its prerequisite software. Contents 2 Contents Introduction... 3 System Requirements... 4
More informationescan for Windows: escan System Requirements
: escan System Requirements : escan Anti-Virus for Windows v11 Operating System: (Client) Windows 8 Family, Windows 7 Family, Windows Vista Family, Rollup patch 1 Other Requirements: Disk Space: 750 MB
More informationinforouter V8.0 Implementation Guide Active Innovations, Inc. A Document Management Company
inforouter V8.0 Implementation Guide www.inforouter.com inforouter V8.0 implementation Guide This guide will take you through the step-by-step installation procedures required for a successful inforouter
More informationThis guide details the deployment and initial configuration necessary to maximize the value of JetAdvantage Insights.
HP JetAdvantage Insights Deployment Guide This guide details the deployment and initial configuration necessary to maximize the value of JetAdvantage Insights. 1. Overview HP JetAdvantage Insights provides
More informationBackup and Recovery. Benefits. Introduction. Best-in-class offering. Easy-to-use Backup and Recovery solution
DeltaV Distributed Control System Product Data Sheet Backup and Recovery Best-in-class offering Easy-to-use Backup and Recovery solution Data protection and disaster recovery in a single solution Scalable
More informationHP Network Automation Software Support Matrix
HP Network Automation Software Support Matrix Software Version 9.00 / August 2010 Documentation Date: December 2011 This document provides an overview of the system requirements and supported platforms
More informationCloud Security Whitepaper
Cloud Security Whitepaper Sep, 2018 1. Product Overview 3 2. Personally identifiable information (PII) 3 Using Lookback without saving any PII 3 3. Security and privacy policy 4 4. Personnel security 4
More informationCloud Operations for Oracle Cloud Machine ORACLE WHITE PAPER MARCH 2017
Cloud Operations for Oracle Cloud Machine ORACLE WHITE PAPER MARCH 2017 Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and
More informationDelphi+ SP5-AP7 System Requirements
Delphi+ SP5-AP7 System Requirements This document may not be copied, photocopied, reproduced, published, translated, or reduced to electronic medium or machine readable form, in whole or in part, without
More informationIT Managed Services. Schedule 1 Specification 11/07/18
` IT Managed Services Schedule 1 Specification 11/07/18 IT Managed Service ITT Schedule 1 Specification Table of Contents 1.0 Introduction... 2 1.1 Overview... 2 2.0 Scope... 2 3.0 Vendor Response Requirements...
More informationUpgrade to Webtrends Analytics 8.5: Best Practices
Technical Best Practices 8.5 Software Upgrade Upgrade to Webtrends Analytics 8.5: Best Practices Version 4 Webtrends Analytics is a powerful application that must be installed on a dedicated computer.
More informationNetwrix Auditor for Active Directory
Netwrix Auditor for Active Directory Quick-Start Guide Version: 8.0 4/22/2016 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment
More informationMicroMD PM + EMR Client Server Hardware and Software Requirements
MicroMD PM + EMR Client Server Hardware and Software Requirements Last Updated: January 23, 2018 MicroMD PM + EMR Version 14.0 MicroMD PM + EMR Server Specs This document describes minimum requirements
More informationHP Network Automation Support Matrix
HP Network Automation Support Matrix Software Version 9.10 / March 2011 Documentation Date: May 2012 This document provides an overview of the system requirements and supported platforms for HP Network
More informationSystem Requirements - REST Professional v15.5
System Requirements - REST Professional v15.5 The following are minimum and recommended system requirements for REST Professional. Whilst the program will operate on the minimums listed, we strongly suggest
More informationVersion v November 2015
Service Description HPE Quality Center Enterprise on Software-as-a-Service Version v2.0 26 November 2015 This Service Description describes the components and services included in HPE Quality Center Enterprise
More informationLasso CDP. Lasso. Administration Tool Guide. August 2005, Version Lasso CDP Administration Tool Guide Page 1 of All Rights Reserved.
Lasso CDP Administration Tool Guide August 2005, Version 1.6.1 Lasso CDP Administration Tool Guide Page 1 of 41 Copyright Copyright 2005 Lasso Logic, LLC. All Rights Reserved. No part of this publication
More informationMinimum Requirements for Cencon 4 with Microsoft R SQL 2008 R2 Enterprise
Minimum Requirements for Cencon 4 with Microsoft R SQL 2008 R2 Enterprise SQL 2008 R2 Enterprise Restrictions 8 CPU 2 TB Ram Use Limit 524 PB Database Size High Availability Options Database Mirroring,
More information