Yule Rule 2019 Submissions - What Do You NOT Want To Carry Into The New Year?


Video Link : 1265

Share your most interesting IT struggles, pet peeves, day-to-day annoyances, exasperations, troubleshooting tribulations, or any other work-related stuff you’d rather not carry into the New Year, and we’ll joyfully toss the best ones into our festive, flickering holiday hearth of happiness.

Suggestions will be accepted through December 10th.

Check back on December 17th to watch our heart-warming holiday video—certain to set your IT spirit aglow.

Parents
  • Change Management shall rule in the name of all departments going forward.

    1.  From now on departments will not receive funding for projects or products or services that touch the corporate network, or that contain PCI, PPI, or PHI (even if they don't touch the corporate network), without first having been reviewed and approved by the following departments or positions:

    • Information Security
    • System Administration
    • Networks
    • Communications Platforms (formerly Telecom)
    • End User Platform Support
    • Applications
    • Marketing
    • Facilities/Maintenance
    • IS Director
    • CIO
    • CFO or their designees
    • Corporate Legal Services
    • CSO

    Notice that Security has the first and last word in approval or denial.  This is non-negotiable.

    If approval is not received from each of these departments, funding for the wanted product/service will not be allocated and the purchase is cancelled.

    Any product contracted for or purchased or received that does not have approval will be returned, cancelled, and removed from the network.

    2.   The above mentioned departments will allocate resources to review proposals and requests within one business day of it being submitted.  This is to ensure projects are not sidelined and that corporate progress continues within scheduled or desired deadlines.

    3. The mentioned departments will provide resources adequate to the need to attend meetings that discuss:

    • The idea that sparked the conversation
    • The need(s) that must be addressed
    • What internal corporate resources can be used to fill these needs.  Let's never reinvent the wheel again.
    • What alternate solutions are available, those solutions that have been already considered and discarded, and why they were discarded.
    • Accurately estimated resources for accomplishing the task
    • Achievable timelines
    • The ability of the product or service to scale to Enterprise size, rather than isolated to one room, one floor, one building, one department, or one city.
    • Proof of scalability from other customers shall be provided.  There's no need for our organization to invent the wheel for others.  We are reliability-centric with a "safety first" focus.  Let others live on the bleeding edge; we don't risk our customers, employees, services, or our business on untested or weak solutions.
    • How every system/application/service/hardware will be:
      • Tested for security vulnerabilities weekly
      • Identified as "at risk" or "vulnerable" and automatically isolated
      • Remediated immediately or immediately removed from the network.  There shall be no exceptions.
    • A process by which additional review or expedited service may be requested.
    • The only solution for doing business with vulnerable solutions is not using them.
Comment
  • Change Management shall rule in the name of all departments going forward.

    1.  From now on departments will not receive funding for projects or products or services that touch the corporate network, or that contain PCI, PPI, or PHI (even if they don't touch the corporate network), without first having been reviewed and approved by the following departments or positions:

    • Information Security
    • System Administration
    • Networks
    • Communications Platforms (formerly Telecom)
    • End User Platform Support
    • Applications
    • Marketing
    • Facilities/Maintenance
    • IS Director
    • CIO
    • CFO or their designees
    • Corporate Legal Services
    • CSO

    Notice that Security has the first and last word in approval or denial.  This is non-negotiable.

    If approval is not received from each of these departments, funding for the wanted product/service will not be allocated and the purchase is cancelled.

    Any product contracted for or purchased or received that does not have approval will be returned, cancelled, and removed from the network.

    2.   The above mentioned departments will allocate resources to review proposals and requests within one business day of it being submitted.  This is to ensure projects are not sidelined and that corporate progress continues within scheduled or desired deadlines.

    3. The mentioned departments will provide resources adequate to the need to attend meetings that discuss:

    • The idea that sparked the conversation
    • The need(s) that must be addressed
    • What internal corporate resources can be used to fill these needs.  Let's never reinvent the wheel again.
    • What alternate solutions are available, those solutions that have been already considered and discarded, and why they were discarded.
    • Accurately estimated resources for accomplishing the task
    • Achievable timelines
    • The ability of the product or service to scale to Enterprise size, rather than isolated to one room, one floor, one building, one department, or one city.
    • Proof of scalability from other customers shall be provided.  There's no need for our organization to invent the wheel for others.  We are reliability-centric with a "safety first" focus.  Let others live on the bleeding edge; we don't risk our customers, employees, services, or our business on untested or weak solutions.
    • How every system/application/service/hardware will be:
      • Tested for security vulnerabilities weekly
      • Identified as "at risk" or "vulnerable" and automatically isolated
      • Remediated immediately or immediately removed from the network.  There shall be no exceptions.
    • A process by which additional review or expedited service may be requested.
    • The only solution for doing business with vulnerable solutions is not using them.
Children
No Data
Thwack - Symbolize TM, R, and C