Tuesday, September 2, 2008
The Information Technology Infrastructure Library (ITIL) is a set of concepts and techniques for managing information technology (IT) infrastructure, development, and operations. ITIL is published in a series of books, each of which cover an IT management topic. The names ITIL and IT Infrastructure Library are registered trademarks of the United Kingdom's Office of Government Commerce (OGC). ITIL gives a detailed description of a number of important IT practices with comprehensive checklists, tasks and procedures that can be tailored to any IT organization. ITIL was originally created by the CCTA under the auspices of the British government, and ITIL is a registered trademark of the UK Government's Office of Government Commerce (usually known as the OGC).
Many of the concepts did not originate within the original UK Government's Central Computer and Telecommunications Agency (CCTA) project to develop ITIL. According to IBM:
“ In the early 1980s, IBM documented the original Systems Management concepts in a four-volume series called A Management System for Information Systems. These widely accepted “yellow books,” ... were key inputs to the original set of ITIL books." ”
The primary author of the IBM yellow books was Edward A. Van Schaik, who compiled them into the 1985 book A Management System for the Information Business (since updated with a 2006 re-issue by Red Swan Publishing). In the 1985 work, Van Schaik in turn references a 1974 Richard L. Nolan work, Managing the Data Resource Function which may be the earliest known systematic English-language treatment of the topic of large scale IT management (as opposed to technological implementation).
What is now called ITIL version 1, developed under the auspices of the CCTA, was titled "Government Information Technology Infrastructure Management Methodology" (GITMM) and over several years eventually expanded to 31 volumes in a project initially directed by Peter Skinner and John Stewart at the CCTA. The publications were retitled primarily as a result of the desire (by Roy Dibble of CCTA) that the publications be seen as guidance and not as a formal method and as a result of growing interest from outside of the UK Government.
During the late 1980s the CCTA was under sustained attack, both from IT companies who wanted to take over the central Government consultancy service it provided and from other Government departments who wanted to break free of its oversight. Eventually CCTA succumbed and the concept of a central driving IT authority for the UK Government was lost. This meant that adoption of CCTA guidance such as ITIL was delayed, as various other departments fought to take over new responsibilities.
The Information Technology Infrastructure Library (ITIL) is a collection of best practices that aim to improve and then maintain a certain level of computing services quality in the information technology sector. ITIL covers organizational structure and skill requirements for an IT organization via a comprehensive set of procedures with which an organization can manage its IT operations. These procedures do not rely on a particular vendor's technology and apply to all aspects of IT infrastructure.
SEVEN SUBJECT OF ITIL
ITIL consists of a seven subject, which are sub-divided into disciplines, each one of them focusing specific level:
1. Service Delivery: Covers the processes required for the planning and delivery of quality IT services, and looks at the longer-term processes associated with improving the quality of IT services delivered. Example of it:
1. IT Financial Management
2. Capacity Management
3. Availability Management
4. IT Continuity Management
5. Service Level Management
2. Service Support: Describes the processes associated with the day-to-day support and maintenance activities involved in the provision of IT services. Example of service support:
1. Change Management
2. Release Management
3. Problem Management
4. Incident Management
5. Configuration Management
6. Service Desk
3. Planning to Implement Service Management: Examines the issues and tasks involved in planning, implementing, and improving service management processes within an organization; also addresses the issues associated with addressing cultural and organizational change, the development of a vision and strategy, and the most appropriate method of approach.
4. Security Management: Details the process of planning and managing a defined level of security for information and IT services, including all aspects of security incidents. Also includes the assessment and management of risks and vulnerabilities and the implementation of cost-justifiable countermeasures.
5. Information and Communications Technology (ICT) Infrastructure Management: Covers all aspects of ICT infrastructure management from identification of business requirements through the procurement process, to the testing, installation, deployment, and ongoing operation and optimization of ICT components and IT services.
1. Network service Management
2. Operations Management
3. Management of local processors
4. Computer installation and acceptance
5. Systems Management
6. The Business Perspective: Provides advice and guidance to help IT personnel understand how they can contribute to business objectives and how their roles and services can be better aligned and exploited to maximize contribution.
7. Application Management: Describes how to manage applications from the initial business need through all stages in the application lifecycle, up to and including retirement. Places emphasis on ensuring that IT projects and strategies are tightly aligned with those of the business through the application lifecycle, to ensure that business obtains the best value from its investment.
From the beginning, the ITIL framework has been publicly available (however, it is copyright protected). This means that any organization can use the framework described by the OGC in its numerous books. Because of this, ITIL guidance has been used by a wide range of organizations including government, energy, public utilities, retail, finance, and manufacturing. Very large organizations’, very small organizations’ and everything in between have implemented ITIL processes.
CENTRE for KNOWLEDGE, COMMUNICATION and TECHNOLOGY(PPKT)
Centre for Knowledge, Communication and Technology (PPKT –Malay acronym) was officially formed in late 2002. Encompassing 4 ICT base departments which are the Computer Centre, Information Technology Centre, SISMAP and IT Development Unit of Registry, PPKT serves the University needs on ICT matters and its key function is to plan and implement ICT projects. Its value added service is to consult / advise the University with regard to utilizing, managing and linking Knowledge / Information, Communications and Technology.
As the main ICT service centre, PPKT adopts the university IT Strategic Plan (ISP) since 2007. 4 areas of focus are:
1. Network Infrastructure
2. System Applications and databases integration
3. Disaster Recovery and server consolidation
4. ICT Governance and CRM
PPKT plays an important role in improvements to daily operational processes for administration and acts as a catalyst towards information and knowledge lead research campus.
1. Strategy as everyone’s business
2. Improve Business Processes
3. Improve on Information Availability
4. Improve on Communications between campus communities
5. Improve the Environment through Green IT Initiatives
"To lead and innovate in achieving
excellence as a recognized ICT
provider locally and globally in-line
with the University’s mission."
Providing sustainable, reliable, up-to-date, conducive and friendly ICT services supporting:
• Teaching and Learning
• Research and Development
• Administration and Management
Friday, August 8, 2008
The university has been developing and expanding since its inception, which started with the enrolment of 57 science based students. Now, USM offers courses at undergraduate and postgraduate levels to approximately 20,000 students. USM has also become a well-known university locally and internationally.
USM was founded after an agreement made on a resolution approved by the Penang State Legislative Council in 1962, which suggested that a university college be established in the state. An area in Sungai Ara was identified and later the foundation stone was placed by the then Prime Minister, Y.T.M Tunku Abdul Rahman Putra Al-Hajj on the 7th of August 1967.
In 1969, the
In April 1969, Professor Hamzah Sendut was elected the Vice-Chancellor. Two months later, a group of 57 students was accepted to begin their studies. Since the area of Sungai Ara could not be developed as fast as required, the group was placed at the Malayan Teachers’
Since its beginning, USM has implemented a school system, as opposed to the traditional faculty system. What is unique about this system is that each school could fulfill the needs of a more focused degree in the chosen area of study and at the same time, students could have the opportunity to explore other areas of study offered by another school.
The interdisciplinary approach ensures that USM, the first in the country to adopt this system, would produce trained, multi-skilled graduates.
THE EMBLEM of USM
The Emblem is divided into four parts representing the Malaysian environment. The emblem consists of a few symbols that reflect its identity as a Malaysian university of international standard.
The crescent and the star with its fourteen points which decorate the top of the emblem symbolize the membership and the unity of the thirteen states of the federation with the federal government. It also represents the greatness and the identity of the Islamic religion, the official religion in
The two tigers, symbols of the Federation of Malaya, reflect its strength, whereas the golden leaves symbolize the prosperity of the Malaysian economy.
The shield between the tigers is the original instrument used by the native Malaysians and purple is the official color of the university.
The open book above the shield signifies knowledge, appropriate to the role of an academic institution.
The two criss-crossed keris supporting the book are traditional Malaysian weapons in the Malay culture. These are used as props for royal functions reflecting the significance of the royalties. At the bottom of the emblem, a hibiscus, the national flower, is placed.
The motto, Kami Memimpin or ‘We Lead’ supports the whole emblem, stating the role of the university in the academic field in matters such as teaching, research and public service.
USM brand in the shape of type logo is specially design has been launch by Seri Paduka Baginda Raja Permaisuri Agong who is
D.Y.M.M. Tuanku Syed Sirajuddin Ibni Al-Marhum Tuanku Syed Putra Jamalullail
Y. Bhg. Tan Sri Dato’ Dr. Lin See-Yan
Y. Bhg. Tan Sri Razali Ismail
Chairman of the Board
Y. Bhg. Tan Sri Dato’ Haji Ani bin Arope
Y. Bhg. Profesor Dato’ Dzulkifli Abdul Razak
Y.Brs. Profesor Madya Omar Osman (Hal Ehwal & Pembangunan Pelajar)
Y.Brs. Profesor Ahmad Shukri Mustapa Kamal (Hal Ehwal Akademik & Antarabangsa)
Y.Brs. Profesor Asma Ismail (Penyelidikan & Inovasi)
Y.Brs. Profesor Lim Koon Ong (Jaringan Industri dan Masyarakat)
The University is administered by the executives under the Board of Directors whose members are chosen from the University, representatives from the government and the elected members from the Education Ministry. As an executive body, the Board of Directors is authorized to act according to the University Constitutions, Statutes, Acts and Rules and Regulations as stipulated
To lead and innovate in achieving excellence at the international level through:
- advancing and disseminating knowledge and truth;
- instilling qualities that stress academic excellence and professionalism;
- developing holistic individuals; and
- providing a strong commitment towards the society’s aspiration, the country’s vision, and universal aspirations
Cara-cara untuk mendapatkan wireless didalam windows vista
Terdapat 2 cara untuk mendapatkan MAC (Media Access Control) didalam Windows Vista.
1-) Klik pada Menu start.
· Taip CMD ( command prompt) pada search dan tekan enter.
· Ataupun boleh memilih menu command prompt pada list menu.
2-) Satu paparan command prompt akan terhasil.
· Taipkan ipconfig/all dan enter.
3-) Satu tertingkap terhasil yang mengandungi maklumat-maklumat
mengenai komputer tersebut.Seperti yang ditunjukkan didalam rajah CARA KEDUA
1-) Taip CMD ( command prompt) pada search dan tekan enter.
2-) Satu paparan command prompt akan terhasil.
Apabila paparan terhasil taipkan Getmac/v dan tekan enter.
3-) Selain daripada menggunakan ipconfig/all,kita juga dapat menggunakan
Getmac/v command prompt bagi windows jenis vista.
Saturday, August 2, 2008
Seperti biasa, saya melapor diri di Eureka dan memulakan kerja saya. Pada pukul 9.00 pagi, seorang pekerja yang bernama En. Zul datang untuk memberikan pemancar imej ataupun dipanggil "projector" untuk digunakan dalam pembentangan kami. Penyelia kami masuk dan kami mula bentang tugasan masing-masing dengan seorang 15 minit untuk dibentangkan.
Thursday, July 31, 2008
Pada pagi itu, penyelia kami telah memanggil kami tetapi penyelia kami ada mesyuarat yang beliau perlu hadiri. Kami meneruskan kerja seperti biasa sehingga tengahari. Pada petang itu, En. Shahrizal, penyelia kami ada datang dalam pukul 3.00 petang untuk memberitahu pembentangan mengenai ITIL akan dilakukan pada keesokan harinya dan disuruh bersiap sedia.Kami juga diberitahu cara-cara untuk mendapat melalui blog.