Transcript: Before I learned about the various connections of society, I believed that I was a part of a "clustered network" consisting of only the people I had strong ties with. Danielle (Strong Tie) Danielle meets Drake through Charlotte Me Danielle (Sister node) Co-worker Degrassi Actress MTV VJ More than one connection to someone of fame (Weaker Tie) Girlfriend Through this social network he saw a tweet... (Strong Tie) There are two degrees of people between me and Drake & me and Charlotte. There is one degree of person between Charlotte and Danielle & Charlotte is the degree between Danielle and Drake. Danielle is bridge between Drake and Phoebe, who I met through two degrees of people. Either way I may have met Phoebe regardless of my friend Alex because Danielle knew Drake and Charlotte. Network Diagram Bridge between Charlotte & me To an individual of importance Charlotte Arnold Danielle (Super Node) Ego Network Alex Phoebe Charlotte Arnold (Stronger Mutual Tie) Friends with a co-worker at the Fusion hair salon who met Charlotte Arnold at an audition for Degrassi. Alex (Friend node) Famous Rapper & Actor Drake (Weaker Tie) Drake Bridge between Drake & me Met Phoebe though Danielle Bridge between Phoebe & Me Charlotte met Drake while shooting Degrassi High This makes both Danielle and Drake mutual friends of Charlotte. Since I know Danielle both celebrities will become mutual friends of one of my strongest ties. This changes the CLUSTER net into a SMALL WOLRD net. from his girlfriend who knew Phoebe from MTV and invited us to see her.
Transcript: START Put milk in cup Add boiled water Brew Warm teapot Fill it with water and bring to boil How to Enjoy Tea in British Way Put strainer in cup
Transcript: 3 days Separate food waste experiment START Research on angle Oil experiment on angle Research way to separate oil & water Testing 7 days 5 days 11 days Research on coating Research on mesh size & material 9 days Research on mesh & angle Obtain materials 3 days Build prototype 3 days FINISH 4 days Research way to separate food waste 2 days 3 days 5 NETWORK DIAGRAM 7 days
Transcript: Types of Network Diagram Cisco Topology Lab Network Wireless Network What is Network Diagram? Examples of Network Diagram Campus Network used in computer telecommunications useful for network engineers and designer consists of a network = interconnected groups or systems unique kind of cluster diagram NETWORK DIAGRAM Rack Diagram Examples of Network Diagram Outlook Web Access Home Network Mobile Network Wan Diagram Active Directory Examples of Network Diagram 3D Network Diagram Neural Network (NN) Diagram Computer Networking Diagram Project Network and PERT Network Semantic Network Diagram Sociogram Microwave Topology Examples of Network Diagram Ethernet Lan Hotel Network Topology Security Network Cisco Network
Transcript: Begin your project with a single milestone (i.e Start). Find all activities in the table that have no immediate predecessors — they can all start as soon as you begin your project. Begin your diagram by drawing the relationship between the start of your project and the beginning of an activity Find all activities that have your first activity as an immediate predecessor. Continue in the same way with the remaining activities. After adding all the activities to the diagram, draw a box to represent the end (i.e End), and draw an arrow from the last activity to that box. How it works? Pros & Cons Example (Successful-project-management.com, 2015) The purpose of Network Diagrams Network Diagram Askwillonline.com, (2015). Pros And Cons Of Network Diagrams ~ Helping Bloggers, Helping Students - Ask Will Online. [online] Available at: http://www.askwillonline.com/2012/01/pros-and-cons-of-network-diagrams.html [Accessed 10 Jan. 2015]. Diagram, H. (2015). How to Create a Network Diagram - For Dummies. [online] Dummies.com. Available at: http://www.dummies.com/how-to/content/how-to-create-a-network-diagram.html [Accessed 10 Jan. 2015]. Successful-project-management.com, (2015). The Network Diagram - logical sequencing of tasks. [online] Available at: http://www.successful-project-management.com/network-diagram.html [Accessed 10 Jan. 2015]. Techopedia.com, (2015). What is a Network Diagram? - Definition from Techopedia. [online] Available at: http://www.techopedia.com/definition/25062/network-diagram [Accessed 10 Jan. 2015]. Besart Kunushevci Leftiana Nasto A quality management tool that charts the flow of activity between separate tasks. It graphically displays interdependent relationships between groups, steps, and tasks as they all impact a project. Bubbles, boxes, and arrows are used to depict these activities and the links between them. This is also known as a flow chart, project network, or process map. (Techopedia.com, 2015). Solution Network Diagram Understanding and visualizing Project management planning Work breakdown structure Reference (Askwillonline.com, 2015) (Diagram, 2015) Pros Planning- Identify all tasks necessary to complete Identify 'critical' activities, also activities where 'float' exists Set deadlines to work towards. Interim + final Helps plan ordering of stocks/ materials or equipment. It helps cashflow Network can help solve problems that arise during the project Cons It takes time to produce It costs a lot to produce Is the network necessary? Is the task obvious or simple? It can become very complex- could be misinterpreted Reliability of data, e.g timescales, who has produced it and errors, e.g missing tasks Threat of external factors that cause problems, e.g weather
Transcript: BACKUP VDP Backup Replication Thank You! Storage Stacking SUNIVY NETWORK DIAGRAM Avaya 5530 Blade Server Virtual Network Hệ Thống EVN CPC Stacking 3549 GTS+ vShere 6.0 Deploy ESXi in Blade Server 62 ECG bpm
Transcript: Off site Server Servers VLAN 2 The data that is traveling on the network will be encrypted. All the data that is stored on the network will also be encrypted. When wanting to access the data, only qualified personnel will be able to access the data (CSC 14) Wireless intrusion detection will also be implemented to be able to be notified if there are any potential threats on the network. Devices that are able to connect to the wireless network will have to be authorized as well as the people trying to connect to the network (CSC 15) Wireless Router Firewall Application System Security to make sure that the code being acquired is the correct software and code from the source. Also making sure that employees know where to get software and data, to make sure it is from validated and secure sources. (CSC 18) Port filtering will be enabled on all firewalls to be able to monitor all traffic on the network that is coming from and going to ports that are allowed and not allowed on the network (CSC 9) Virtual Machine for our configuration baselines that is going to have a secure baseline configuration and then is distributed to all workstations on the network (CSC 5) Machines are also Synced to the US Naval Observatory time protocol system (CSC 6) Database -Spiceworks is also able to monitor and keep inventory all software devices on the network (CSC 2) IT Workstation Offsite backup server to backup the data from the network. This is offsite because it helps make it much more secure, in case of a situation where all of our data is corrupted, then we will have a back up that is not in the building. (CSC 10) VLAN 1 -Spiceworks is able to monitor and keep inventory of all hardware devices on the network and also gives a easy to use portal to gain information on these devices (CSC 1) The Access management system is used to track activity for the clients on the network. It helps by also by sending alerts if any suspicious activity is seen by users. If a user is inactive for more than 30 days then the account is deleted and the client will have to be authenticated again for future access. (CSC 16) Penetration testing will happen from a professional penetration team every year to make sure that our network is secure and to fix any vulnerabilities of the network. There will be a Red Team to perform penetration exercises and see to the security of the netowkr (CSC 20) All workstations will have specific authentication for users trying to access the machines. Every member will have a unique username and password to access the network and machines. Wireless devices will also hold the same authentication process. Anyone without these credentials will not be allowed access to the network. (CSC 11) All workstations will have their USB and CD drives disabled to all devices, except ones that are tested and verified as safe for the network. Hashes ill all be issued out to confirm data coming over the network to make sure no changes have happened. (CSC 13) There will be Intrusion Detection System (IDS) and Intrusion Prevention System (IPS) inside of the network to be able to alert and detect potential intrusions of the network, while also making sure that these intrusions can be prevented before they even happen. (CSC 12) -Alien Vault is used to monitor all security vulnerabilities to find and mitigate them. (CSC 3) Network Diagram Thomas Kempf VLAN 3 A workstation for the IT personnel. They have Administrative privileges for this workstation and all other workstations on the network. Only a specific number of IT members will have full administrative access to the workstations (CSC 4) Non-Software Training to make sure that all employees are educated on how to access data and use their machines to make sure that all employees are being as secure as possible, if employees need more training then they will be assigned for more. (CSC 17) Application Software Security to analyze and validate code and software that is being downloaded on the machines in the network. Scans of the software will be every day for the most used programs, with other programs being scanned every week. (CSC 18) Incident response and management will be conducted to make sure that if and when an attack happens to the network, that there are guidelines set in place to mitigate damage and make sure the network is able to recover. There will be assigned roles to employees so there is no panic on what to do when an incident happens to the network (CSC 19) Spiceworks is also used for whitelisting services that we allow on our machines. These whitelists will only allow the services that are comfirmed to be safe for the network. Spiceworks will also provide DNS filtering, logging, and alerting of any IP address that spiceworks feels is suspicious and might be a danger to our network (CSC 7,8)
Transcript: Network Diagram Tanya R. Mooney Husband & Kids Mom Dad Uncles & Aunts In-Laws Nieces & Nephews Sisters Faith Jesus Non-Christians Christians Families Baptist Assocation Pastors Community City Officials Business Owners Police Hospital & Staff Professional Campus Dean Supervisor Co Workers Group Faculty Senate Athletic Department Curriculum Committee Business Office Staff Senate Nursing Department Inter-Org NDECHEC IVN Classes NCAA/NJCAA NDUS Sodexho CCF ILL CampusConnection Gerta Faculty Dr. Brenner Dr. Olson Dr. Ozaki Dr. Anderson Technical PeopleSoft/Transcripts LMS Support Curriculum Designer IT Help Desk Live Chat Business Bookstore Business Office Financial Aid Registration Sallie Mae Support CoWorkers Mom & Dad Husband & Kids Faculty Self-Talk Community Members Family Thank you! Personal (cc) photo by theaucitron on Flickr Academic (cc) photo by theaucitron on Flickr Common Course Numbers Financial Software
Description: Storytelling is at the heart of great service. Use this stunning, customizable business presentation template to highlight employees who do exceptional work or position your customers as the heroes of your business.
Description: Add some color to your quarterly business review with this vibrant business presentation template. The bold visuals in this business template will make your next QBR a memorable one.
Description: Catch the eye and engage the imagination with this cool-looking Prezi proposal template. The bold, bright design and highly dynamic theme all but guarantee success for your next sales or marketing proposal. All Prezi presentation templates are easily customized.
Description: The sky’s the limit. Boost your new sales initiative into orbit with an engaging and compelling SKO presentation. This template features a effective sales kickoff theme that makes it easy to be engaging. Like all Prezi SKO templates, it’s fully customizable with your own information.
Now you can make any subject more engaging and memorable