Thursday, July 8, 2010


A visit to ROC Gilde Opleidingen Venray: Mr.Theo

DAY 10

We had a training on Active Directory:
The main concept was on how to manage users account and settings:
Active Directory is a first Security features to manage the networks. Current TPSC we are using Active Directory to manage only the network sponsored by CINOP. The rest of the Network are stand alone Computers which are not manageable.
Based on this training the first thing I should implement is to Design and Implement Active Directory other computers .
To ensure that the information is accessible centralily and secured. Also this will help to support staff and Students remotely. I should make sure that the keep is updated to mainatance Security and and make use of ftp rather http.
Two part of security can be used effectively:
Active Directory- Normal authentification on Username and Password
machine authentification: In order a computer to connect in the Network must have Machine key which will enable to be recorganized within an AD sessions.
Based on this new technology will be introduced and make use of it, in which I will be able Install Exchange and use outlooks instead of internet to exchange the materials

DAY 9

Networking and Virtualization
Learning was based on the Network Configuration and Virtualization.
In the morning we started building a Network. Juniper Switches was configure in which the following are the results at the end of a practical
-Switches well configured
-Sharing of resources within the Sam Office Network among user
One of switch was configured as a Management Switch to other switches
After configuration we manage to have access to Internet which seems to very important in our daily blogging activities.
In the Afternoon the concept on Cloud Computing Technology was introduced:
Cloud Computing is the internet based computing whereby shared resources and information are provided to computers and other devices on demand

Tuesday, July 6, 2010

DAY 8

  • Basic Knowledge on maintanace, support and management techniques:-
    Basics of Maintanance: Types of Maintanance
    We discussed on Active Maintanance: provide a wide range of services supporting the everyday needs of the modern workplace. In this topics we learn how to fix problems at TPSC on the use of Igels Technology and information resource centre to both TPSC Staff and Students once they occur.
    ICT keys Staff should be able support other and make sure that they knowledge have is introduced to other staff so that we minimize Active maintanance
    Pro Active Maintanace:is a maintanace strategy for stabilizing the reliability of computer or equipment. Its central theme involves directing corrective actions aimed at failure root causes, not active failure symptoms, faults, or machine wear conditions. This is aiming to ensure that TPSC's system are running at maximum level of expectation.
    Proactive maintenance regimen involves three steps:
    (1) setting a quantifiable target or standard relating to a root cause of concern
    (2) implementing a maintenance program to control the root cause property to within the target level and
    (3) routine monitoring of the root cause property using a measurement technique .
    By adapting this kind of Maintanance , then we assure that no problems will be report before ICT specialist has fixed it. We must be head to others(ICT Staff)
    Maintanance can be applied to Information and Systems, keys areas should be taken into considerations:-
  • Confidentiality
  • Integrity
  • Availability

Confidentiality of Information systems is important to TPSC to ensre that we have right user to a specific kind of resource. Under this it is simple to trace any miss use of both IRC and ICT systems. Here we need powerful tools for authentification.

Availability of resources for both staff and Students is very important . In order to guarantee availability of IRC and ICT service we must consider both internal and external factors which can lead to unavailability, like Hosting server Connectivities, Knowledge, and Power Failure. This weakness can be overcomed by using a Standby Generator particularly on ICT terminal, Good Network installed,Availability of Hosting server, Good internet connection,and ICT specialist trained on this system as well as good maintanance on the systems we are using.

INTEGRITY: ICT speciliast should make sure that they have write and complete information to communicate. We are responsible to suggest the methods, measures,standards, action and give out expectation to TPSC on how integrity is maintananed.

Standard are very important in order to manage our Customer in a Pro Active( SamOffice)

TPSC we should set standards and well documented on how to maintan

  • Cleaning of Students Class room
  • Steps to solve the problem

Centralization of very important to ensure good mainatance to the systems-which lead easy monitoring and easy to make additional features at one cental point. When centarizing a systems we need to consider Security: Current Active Directory pray a great role in the Network. This constitute to Availability of Information and Applications

Information for Organization is available vand secured. ICT specialist should be responsible to ensure that. Applications: Users applications should be in place once needed:

Friday, July 2, 2010

DAY 5

A study tour to Data Centre in Groningen. Where the Data for Different Companies stores their data at the Campus of Groningen University and Hanze University. Dat centre have mare than 1000 servers with differnt information. The Centre is located in two different bulding locations but with same information stored in it.

Kind of System their using are more advanced and with Large storage Capacity. Some of the Systems that they are using:-Sun Mail Systems :-for managing mails of companyies hosting their email server at the Data store center, Website systems-for managing website contents, Calculation Systems: Used for calculations purpose as Statistical manipulation done by some companies. Vmware Systems 6.0:- Used to support Vmware environment within the hosting server that contain Vmware applications. Supper Computers( IBM Blue Gese/p): Which allows multiple operation to done by many user at same time.EMC Software

Some of the Company/Instution hosting their information at data store centre: Groningen University, Hanze University, Hospitals,Internet.Current the Data Store center is runing a New project called Target Project sponsored by IBM .

Observation: A well organized and Document Data Store Centre , With reliable Cooling Systems, Good Fire extinguisher System in case of fire,Good Internet connect at 2*20Gb,Data store management Systems to report all activities or faults within the Data Centre.


Conclussion: TPSC at least should implement Desktop Management System to monitor the system we have,like IGEL systems, Install standby generator for ComputerLab and Servers. Investing in companies with High speed of internnet Connection. TPSC should improve Colling system within the Server and Labs, More advanced server should be purchase in order to implement E-Learning


Who to implement: ICT personel should be responsible for implemating of the suggested technogy and full supported by TPSC Management on the new requirements.

Thursday, July 1, 2010

DAY 4

This is day where we learn E-Learning Techniques and we manage to see the most important part of Implement E-Learning enviroment.
Learn about application of E-Learning - The Use of Blackboar Presentation ( Josef Sennokod, Frenke Nijhous)
Digital Education:
Learning Environment (HELO)
-Blackboard: The use of Course menu bar
-Perception
- Shgarepoint Communities: Students should be able to use the blackboard all over the
World . Digital collaboration is very important to Students
Lecturers
: Assignments and Disertation : A student a able to submit anything related to his/her course.

Open Educations

About the Advantage of E- Learning
The resource are centralized in which sharing is possible for both Students and Lecturers

Disadvantages of E-Learning
Assessment Techniques in E-Learning
Tools
WebLectures
How to Create a Course in E-Learning Environment
Multimedia Video in E-Learning environment

Wednesday, June 30, 2010

DAY 3

The training was conducted at the Library of Groningen. The follwing are the Time table and details information below:.

Visit University of Groningen Library:
09.15 am . Arrival and coffee in Lecture hall (4th floor of the UniversityLibrary)
09.30-10.15 : Introduction University of Groningen Library by Joke Bos, Co-ordinator
Information Literacy
10.15-11.15: Library tour 1

11.15- 11.30 Coffee break ( in canteen on 4th )
11.30-12.00 Meeting with Marjolein Nieboer( Director/Library University of Groningen
Library) and Klaran Visscher (Head of General Library Services and Collections)
1st Floor
12.00-12.45: Open Access and OpenCourseware ( by Esther Hoorn, Copyright Librarian ) in
Lecture hall
12.45- 13.30: Lunch (in Canteen on 4th floor)
13.30-14.15: Presentation Library Module/Nestor(Blackboard) and Electronic Papers
(Repository) by Margo van de Pluym( Subject Librarian Library of Economics and
Business/Special Science)
14.15-15.30 : Library tour 2 and tea break
University of Groningen
Library