- Business User Interaction - Retention as a low-cost methods to increase revenue (retention is cheaper than acquisition), Voluntary, Long-term relationships, Referrals and testimonials as powerful tools that result from Business User satisfaction or dissatisfaction (referral Business Unit users are already sold, before they even call you.)
- Management engagement and support - Visible & consistent support, Active role in communication & reward, Assuring linkage of information technology to corporate strategies, Clear prioritization (relative to other initiatives, programs & priorities), Use facts & data to support actions at all levels of decision-making, Creating accountability's, expectations, roles & responsibilities for the enterprise, Conducting and attending regular reviews to assure & verify progress.
- Projects -Establish a documented project inventory (refresh regularly), Assure linkage of projects to critical enterprise & Business Unit user needs, Establish projects of appropriate scope and size (significant savings & achievable), Assign a Champion and Black Belt to each project (and hold them accountable), Implement a project tracking system to facilitate replication & reuse, Review previous projects.
- Continuous improvement -Training, Skills analysis, Compelling need for change.
- Realistic goals and strategies - Plans & road maps, Budget forecasts, Measurable goals.
- Effectiveness - Empower team members so that they may deal with mistakes as they occur, Decisions are based on the best available cost, benefit & risk information, Broad based participation.
- Communications - Creation & communication of a human resources plan, Regular written communications on news & successes, Development & dissemination of communication aids to management, Attempt to understand the Business Unit user, commitment & communication, Business Unit users should call only once, after that they should be proactively called.
- Compliance/adherence to architecture & standards - Standards, Methodologies, Processes, Legal aspects.
Firewalls are becoming increasingly important in today’s world. Hackers and automated scripts are constantly trying to invade your system and use it for Bitcoin mining, botnets or other things. To prevent these attacks, you can use a firewall on your system. IPTables is the strongest firewall in Linux because it can filter packets in the kernel before they reach the application. Using IPTables is not very easy for Linux beginners. We have created easywall - the simple IPTables web interface . The focus of the software is on easy installation and use. Access this neat software over on github: easywall