Month: March 2016

  • Legacy Systems

    Since Internet became accepted technology, systems developed pre-Internet could be deemed legacy. Organisations may have legacy systems as they have invested in them and may still be critical to operations. May be old or outdated technologies – can have specific requirements e.g. skill sets or support which could bring increased cost.

  • Technology Acceptance Model

    Commonly used for evaluating technologies. Uses criteria “perceived usefulness” and “perceived ease of use” to model how technology may be accepted in organisation.

  • Implementation of New Technologies

    Many areas to consider when planning implementation of new technologies. Link to business strategy – most important – how will new tech link to business strategy? Business strategy – statement of organisations goals and objectives. New acquisitions must contribute toward this. Technology needs to be considered in terms of: If it has new functionality, then functionality…

  • ORA-10873: file 1 needs to be either taken out of backup mode or media recovered

    Over the weekend, one of our Windows Oracle database servers suffered a power failure the same time it was being backed up by CommVault Oracle client. This left the database in a state where it wouldn’t start up, to rectify this, the following steps should help. Open a DOS window. set ORACLE_SID=<database SID> sqlplus / as…

  • Areas to Consider When Upgrading Technology

    Considerations when upgrading technology: What is the upgrade? Fix issue(s) in current technology Is issue impacting organisation? Is there new functionality? If so, is it required now or in future? Has support been removed for previous versions? Support for older technology only lasts for a certain time Are there dependent upgrades required? Is need to…

  • Upgrades to existing Technology

    I.T. infrastructure has various range of technologies to support components, such as software, middleware, hardware and network tech. Each piece of technology bought at different times to address different issues. Investment made can be quite significant. Any upgrade/changes to existing tech needs to be considered in terms of the investment already made and the potential…

  • Research Activity: Challenges of BYOD

    The growth of the usage of Bring You Own Devices (BYOD) has been a major challenge for IT departments. Research the topic of BYOD and discuss the challenges they brought and how they have been overcome with your module colleagues in the Group Discussion Forum. Organisations are finding it a significant expense equipping workforce with devices to…

  • Infrastructure Components

    Number of components varying in scale & size that make up the infrastructure: Software Management software e.g. OS, apps, RDBMS may be on centralised/decentralised servers, mobile devices copies and installed locations require managing – licensing implications. Key and costly asset. Version control of software requires management. Compatibility of software and versions. Networks Key component. Can…

  • Installing TFS 2015 Proxy Server

    Here are the steps I took to install Microsoft Team Foundation Server 2015 Proxy Server. Download the Visual Studio Team Foundation Server 2015 (with update 1) from MSDN. Use disk image software to mount the ISO image. Browse to the virtual device where the ISO is mounted and run tfs_server.exe. Choose the installation location and…

  • Research Activity: Three major IT outsourcing companies

    Identify three major IT outsource organisations and identify the services they provide and who their major customers are. Accenture (https://www.accenture.com) Customers include BMW, Oracle Corporation and SSE. Services provided include: Service desk outsourcing—Reduce risk through multi-site support and introduce remote or self-service capabilities to cut help desk costs by 30 percent to 50 percent. Workplace…