8 years experience. I am a RHCE,CISSP,CCNA,MCSA,Linux+ Pro and a CEH "Certified Ethical Hacker".
Read More »
I work in a high availability server environment with over 30 servers of many flavours. I do put high importance on security issues and redundant configurations. My experience spawns over 9 years in multiple countries with a programming background. I handle all from AWS Amazon Web Service to Vsphere Vmware
I am a top provider at one of the most prestigious IT portals Experts Exchange online
# Profile available upon project start
Sep 26, 2012|System Administration|$320|Completed
Aug 9, 2012|System Administration|$0|Completed
Aug 4, 2012|Software Application|$250|Working
Dec 27, 2011|System Administration|$132|Completed
Successful business organizations recognize the importance of technology in running an efficient operation and maintaining their competitive edge. For many, the initial technology investment involves contacting firms such as QITAS to install systems, network hardware and software or to implement an automated system solution.
The daily administration of these advanced tools is generally delegated to part-time support personnel, employees identified as "computer savvy, along with their primary responsibilities. With limited time, experience, and expertise, these part-time system administrators spend virtually all of their administration hours reacting to crisis situations and responding to end-user issues to deliver on-site support. Rarely are critical issues such as planning or documentation addressed as a part of daily administration procedures.
The Challenge was to be able to provide supplementary administration and support services:
Proactive rather than re-active in approach
Promoting growth in skills and knowledge of internal staff
Delivering on-site support with remote monitoring capabilities
Offering set monthly/yearly service fees for better budgeting and control
The solution and result was our program which offers small and mid-sized organizations pro-active assistance in:
Written policies and procedures
System security guidelines
Disaster prevention planning
Read More »