Posts

Showing posts from November, 2010

The Governor (television epic that examined the life of Governor George Grey)

Image
SERIES SYNOPSISThe Governor was a television epic that examined the life of Governor George Grey in six thematic parts. Grey's "Good Governor" persona was undercut with laudanum, lechery and land confiscation. NZ TV's first (and only) historical blockbuster was hugely controversial, provoking a parliamentary inquiry and "test match sized" audiences. It won a 1978 Feltex Award for Best Drama. Auckland Star reviewer Barry Shaw trumpeted: "It has made Māori matter. If Pākehā now have a better understanding of the Māori point of view [...] it stems from The Governor. Reference: NZONSCREEN Track Name Duration Year The Governor - The Reverend Traitor (Episode One) 1977 The Governor : Episode One (clip 1) 18:37

Madge Networks Farm - August 1995

Image
Andy Cranston writes: "I worked at Madge from May 1995 to February 1996.  Initially at Lodge Farm near Chesham and then at Wexham just north of Slough.  I was one of the software testers working for a chap called Dominic Wilde who reported to one of my top five bosses called John Grubb.

Attached is a photo taken at Lodge Farm in August 1995.  Robert Madge's mother is in it (with one of her beloved canines) but my memory, alas,cannot recall any of the other faces!
"

Roald Amundsen

Another Madge photo from Woodside, August 1993

Image
Please inbox me details of who is in this photo.


Major incident tsunami

Image
A major incident tsunami, is when a single or a group of Information Technology major incidents occur in a single wave during a very short time period. A tsunami is a single large wave often caused by earthquakes with deep sea epicentres. As with a real tsunami, the effects of an IT major incident tsunami can be devastating.
Examples of major incident tsunamis are: worm or virus outbreak like the Nimda virus.patching bug that disables a large proportion of a corporate's desktop.power failure in the data centre where the backup systems fail to operate.when a redundant system experiences a failure to both redundant components.security certificates expiring on a large number of networked devices , resulting in them all becoming inoperable.a migration process fault where a flood of calls hits a call centre simultaneously. When a major incident tsunami hits, the internal support capabilities of an organization are overwhelmed. The best method to handle these occureneces is to bring i…

FCAPS checklist

Image
This FCAPS checklist is from Solarwinds. (Chapter 1: FCAPS, Network Management Fundamentals, and Fault Management)
Fault management
Fault detectionFault correctionFault isolationNetwork recoveryAlarm handlingAlarm filteringAlarm generationClear correlationDiagnostic testError loggingError handlingError statistics
Configuration management
Resource initializationNetwork provisioningAuto-discoveryBackup and restoreResource shut downChange managementPre-provisioningInventory/asset managementCopy configurationRemote configurationAutomated software distributionJob initiation, tracking, and executionAccounting management
Track service/resource useCost for servicesAccounting limitUsage quotasAuditsFraud reportingCombine costs from multiple resourcesSupport for different accounting modes
Performance management
Utilization and error ratesPerformance data collectionConsistent performance levelPerformance data analysisProblem reportingCapacity planningPerformance report generationMaintaining and examin…

Common incident management issues

Image
The following post on the Security Procedure blog lists some common incident management issues. Incident management is a fundamental ITIL process. Common incident management issues include: Extended resolution timesInconsistent service delivery/approach to resolutionIncomplete fixes/Incidents needing to be re-openedToo many touch points required to resolve an issueInefficient trouble shooting proceduresPoor visibility of impact of incidents upon the businessRouting errors/Multiple re-assignmentsInappropriate prioritization of incidentsInefficient workload managementPoor communication of outages and their impactLack of a closed loop process i.e. no formal closureContinuously re-inventing the wheelIneffective use of knowledge repositoriesPoor categorisation/classification of incidentsBuck passing between functional/implementation groupsLack of visibility of incident statusTemporary workarounds being left in place as permanent fixesUnnecessarily high levels of follow up/chase callsAvail…

Definition of the Ostrich principle

Image
The Ostrich Principle as defined by James McGovern: "Since you were so busy aligning with the business which really means that you are neither a real IT professional nor business professional, you have spent much of your time perfecting memorization of cliche phrases and nomenclature and hoping that the problem will go away if you ignore it."

Seffrican computer terms (we'll need them after the rolling blackouts)

Image
Monitor - keeping an eye on the braai.Download - get the firewood off the bakkie.Hard drive - trip back home without any cold beer.Keyboard - where you hang the bakkie and bike keys.Window - what you shut when it's cold.Screen - what you shut in the mosquito season.Byte - what mosquitoes do.Bit - what mosquitoes did.Megabyte - what mosquitoes at the water hole do.Chip - a bar snack.Microchip - what's left in the bag after you have eaten the chips.Modem -what you did to the lawns.Dot Matrix - Oom Jan Matrix's wife.Laptop - where the cat sleeps.Software - plastic knives and forks you get at KFC.Hardware - real stainless steel knives and forks from Checkers.Mouse - what eats the grain in the shed.Mainframe - what holds the shed up.Web - what spiders make.Web site - the shed (or under the verandah).Cursor - the old bloke that swears a lot.Search engine - what you do when the bakkie won't go.Yahoo - what you say when the bakkie does go.Upgrade - a steep hill.Server - the pe…

When fake is close to reality

I noticed this video over at Strech's blog, which is a viral Cisco campaign and a fake. But the scary thing was that it was too close to reality as I have too often seen people behave in this manner, maybe even myself. I admit, I did once lose it with a washing machine... IT service desks have to deal with these unreasonable ar... err... customers, on a daily basis.