IT Administration

6K

Solutions

8K

Contributors

IT Administration is the processes and best practices for programming and development, and incorporates methodologies for managing activities and projects. Common methodologies include waterfall, prototyping, iterative and incremental development, spiral development, rapid application development, extreme programming and various types of agile methodology. The life-cycle "model" is a more general term for a category of methodologies, and a software development "process" a more specific term to refer to a specific process chosen by a specific organization.

Share tech news, updates, or what's on your mind.

Sign up to Post

Hi,
How can we apply ICP Filing for a Chinese Web-site?
https://www.akamai.com/us/en/products/performance/icp-license.jsp

For one given web-site, how can we check/validate if it is having ICP Filing or not?
0
Build an E-Commerce Site with Angular 5
LVL 19
Build an E-Commerce Site with Angular 5

Learn how to build an E-Commerce site with Angular 5, a JavaScript framework used by developers to build web, desktop, and mobile applications.

Question regarding gathering hardware ID. I was told that during the setup process of a new machine you can click on Shift F10 on the Regions page to get to the cmd prompt. Once there I typed the command powershell to run that and then set the proper execution policy. Once I get to the point that I install the WindowsAutoPilotInfo Script and run the Get-WindowsAutoPilotInfo.PS1 -OutputFile AutoPilotHWID.CSV I am wondering how do i extract that CSV File from the machine if its still in the middle of setup and i do not at that point have access to windows explorer. I tried to do the following but got credentials errors.
Get-WindowsAutoPilotInfo.PS1 -OutputFile \\ComputerName\HWID\AutoPilotHWID.CSV 

Open in new window

How can i use the -outputfile switch to put the file on a remote machine? On the remote machine I created a folder in the root of C and shared it. Also gave everyone full access to that folder.
0
Dear Experts
Please help understand the difference between Network architect and IT infrastructure architect, does both means the same or different and if different please list the scope of each, this will be great help. thanks in advance.
0
Dear Experts
We have project for 6 months where the data to be captured from the pdf document to captured and entered into excel and then imported into the application, it is found that the pdf documents in some sections are scanned some sections it is hand written, in some section it is table,  
1. looking for solution/software  please let us know the best solution to handle this work.
2.  also please suggest can we think of reading so that use some voice reorganization software if yes then please suggest the software
0
TOSHIBA e-STUDIO5005AC print codes.  Anyone know where to configure print codes in the web admin interface?  We like to track employee print jobs through code association.
0
We have an old laptop that has Windows 7 and some very specific software that our finance dept uses. We no longer have access to this software that was created by company that is no longer in business. Users typically remote into this machine to run this software that requires SOAP UI Utilities and Office 2003 to work. We would like to Clone this PC unto another similar PC so more than person can access this software and perform the same function. All that being said, can we close the hard drive of that laptop unto another laptop (Does it have to be the same make and model?) so we can have an exact duplicate of that system? I was thinking about using Clonezilla.
0
Say, My Android phone is backing up call log history to google drive. I can view the file under backups in Google Drive. How do I download this file and inspect it? I want to view the raw data.

Does Google keep older backups or each time over right them and if so is there a setting or way to keep a history of backup files?
0
Say, I have an android Black Berry Key one with Google Backups enabled. I'm after restoring a backup of my call logs from 5 months ago.
How do I go about this? tx Shaun
0
Hi,

I am restructuring my IT folder in my network and also tiding up access right. I thought you could advise me regarding "On how should I restructure my folders".

Can you please advice?


Best regards,
Mallony
0
Hello all,
I had double auth. using Microsoft authticator on my iPhone.
upon replacing my iPhone, I love my authenticator app, as I noticed I was supposed to enable icloud backup within the app settings itself.

anyways, I tried logging into Microsoft account, to notice I forgot my password, and I lost my authenticator app.
I can try guessing my password, but it would take the too many attempts.
I tried using the authentication with my alternate email address, but it wasn't enough, I had to use the app still as dual authentication.
I am unable to reach out to Microsoft for support.
although I still have access to my emails from outlook and ios mail.
any ideas?
0
CompTIA Network+
LVL 19
CompTIA Network+

Prepare for the CompTIA Network+ exam by learning how to troubleshoot, configure, and manage both wired and wireless networks.

I am working as an IT Specialist for a company. I do everything from IT Helpdesk, IT Network Engineer, IT Administrator, IT Technician, Website support, and IT Security. As far as I can recollect now I do anything else for the company related to IT and to Solve any issues.

I will renew my contract soon and I would like to change my Title from IT System Engineer and IT security. Now, I am not sure how I should ask for title. Maybe IT System Engineer/IT Security. (?)

Can you please advise?

Thanks,
Mallony
0
¿What is your opinion about this debate?¿What do you prefer like system administrator?

Best Regards,
David.
1
Dear Experts
We have software development resources 3 users we have asked them to do development on the development server once the changes are accepted then they can commit to the production server. we are using BitBucket repository for version control, have following doubts
Production server administrator privileges of the application is disabled but development server  administrator credentials are enabled so that they develop, in this case is it recommend project manager will be as admin for the Bitbucket and once the developer develops and testing is done and user is accepted from the development server then project manager will execute the commit changes so that production server is updated, please suggest the best practice
0
I am curious what technology trends are on Technology Officer's minds and what you think every company should be aware of right now.   What practices to you incorporate within your company to make sure your whole team is aware of these trends and making the right decisions?
1
Dear Experts
We have recently implemented veeam backup and replication solution, would like to set the best practice backup and retention policy for VM’s and files. Please suggest me to daily backups best way to rotate  and similarly weekly and monthly how many days retention to be set and rotate. please help me with best practice way to configure like first full backup and then daily incremental and weekly and monthy how to set please suggest the best backup policy and set the retention
0
Dear Experts

Can you please help with list of common security incidents , require this to prepare document for ISO 27001.thanks in advance.
0
Dear Experts
I am looking for few core points for ISMS objectives for IS027001 can you please on each of the section that it contains please. thanks in advance.
0
Hello all.

I am going to be tasked with deploying about 70 new machines to one of our client.   I am trying to figure out the best and most efficient way to do this.   They will all be HP machines running Windows 10 Pro.   I plan to provision 1 unit with every piece of application software they run.   This includes their EMR software, Trend Worry Free Business AV, Office 2016, our Remote monitoring software as well.   My question is because or product keys will it be a problem?  We are using the HP Desktop Minis for now and will probably use them going forward unless they become unavailable for purchase.  I am guessing the product key is built within the registry of the bios to activate the software.  

My question is what would be a best practice to roll out all these units.   I was thinking putting it on the domain, installing all the apps, updates, etc.   When completed?  Should I run sysprep?  I have no idea if that's even a thing anymore.   Reason being is computer name.   I will need all the new units to have new names once they are on the network and want to ensure the product keys for windows 10 are all specified to that machine.   Trend Worry Free comes from the web portal so there is no license key, same for RMM and their cloud EMR software.   Office is volume license so I don't need different keys for that.  

Also what would be a recommendation for a free tool to image the machine upon deployment so I can just plugin 5 machines at a time and boot of USB to…
0
I created custom a MMC Taskpad for ADUC, and before saving, selected the options below
console-setting.png
but when I log as a user, I can right click on the saved mmc and select 'author', which gives me the ability to change things. I can't figure out why I can't lock the mmc.
1
Starting with Angular 5
LVL 19
Starting with Angular 5

Learn the essential features and functions of the popular JavaScript framework for building mobile, desktop and web applications.

Does anyone know of a company that provides a hotspot device that will work international? Any type of internet connection. Asia preferred.
0
I have been directed to deploy a group of chrome books (30 or more) by a certain date.  My knowledge is limited =)  My thought is to get a Google admin console (gsuite) to manage the chromebook devices only, not users.  Another unit in the company already manages google user accounts.  

If I do get a Google admin console, and just enroll chromebooks with it (not create user accounts), can I also:

1. push security and functionality updates to the devices?
2. manage a central repository of approved "google play" apps, or push apps onto the chromebooks from a console?
3. prevent any user that is logged in from changing settings, adding unapproved apps, or removing apps that I have installed?  

Thank you!!
0
Management wants to know what employees are doing if working remotely. I would like to track and store their activity while they are connected to our work server via remote access.

I need to track all user activity such as select, insert, update and delete and put it into a table in order to create a report.

The Database we use is Microsoft SQL Server 2012.
0
Hi Experts,
How can I get to see the latest file I downloaded?
When I sort by date modified, it displays all folders first and after that many files, not necessary in order...
Thanks
0
I got a request to see the analytics of the trouble tickets over the last year.  What would be the best reports to show this? Meeting at 1:00 central time!
Any help would be most appreciated!
0
As a result of an audit, it's been suggested that we disable Dropbox and Google Drive to prevent distribution of sensitive information as an "inside job".
Yet, there are obviously more alternatives/"threats"
https://startupstash.com/dropbox-alternatives/
I can't imagine blocking these services one-by-one.
And, in the case of Google Drive, I haven't figured out yet just *how* to block it - perhaps by removing some Google app's from workstations?
I guess one could block outgoing ftp transfers....

I can well imagine that this is an unrealistic objective - given the number of "threats".
But, rather than jumping to that conclusion, I'd value other perspectives.
1

IT Administration

6K

Solutions

8K

Contributors

IT Administration is the processes and best practices for programming and development, and incorporates methodologies for managing activities and projects. Common methodologies include waterfall, prototyping, iterative and incremental development, spiral development, rapid application development, extreme programming and various types of agile methodology. The life-cycle "model" is a more general term for a category of methodologies, and a software development "process" a more specific term to refer to a specific process chosen by a specific organization.