Case Studies and White Papers
Below is a list of case studies that were designed to reveal problems our customers have encountered and the solutions that FedTechServices provided to resolve the issue.
Training Effectiveness Case Study
In the past, military network operators were not trained on Theater Network Management Architecture (TNMA), a network monitoring suite used by U.S. Forces-Afghanistan (USFOR-A) and U.S. Central Command (USCENTCOM), until they arrived at their duty stations. Most of the individuals were lacking experience on this network monitoring solution, and as a result, network operators sent to Afghanistan had to be trained on TNMA at their job locations, resulting in many weeks of lost time. Click here to read entire document.
Gambit Case Study
FTS uses several network management solutions (NMS), like IBM Tivoli Netcool/OMNIbus, IBM Tivoli Network Manager, HP OpenView and many other vendor applications. These applications are integrated with other tools to create required solutions for FTS' customers. They are tested against many networking devices. Click here to read entire document.
TNMA Case Study
U. S. Central Command (CENTCOM) was mandated in August 2006 by Joint Task Force - Global Network Order (JTF-GNO) to have an enterprise network monitoring and management capability providing a network common operating picture (NETCOP) and fault management, configuration, accounting, performance and security (FCAPS). Theater engineers traditionally performed cursory network management through rudimentary tools with no hierarchical design. Click here to read entire document.
Telgua Case Study
Telgua in 2009 purchased the HP Route Analytics Management Software (RAMS, OEM from Packet Design). The package included multiple elements and devices that required installation, software configuration and verification of correct functioning and integration, as well as administrator and user training on the product. Telgua staff lacked background and experience with the new product and required the services of a knowledgeable consulting company. Click here to read entire document.
Integra Case Study
Integra Telecom, a Portland, WA-based telecommunications company providing business voice, data, internet and integrated solutions, changed its network management tools vendor from Hewlett Packard (HP) to IBM in 2007 and needed training on the product. Its staff lacked background and experience with the new product and Integra was concerned it could not properly make use of the capabilities it sought. Click here to read entire document.
The white papers below were designed to inform the reader about the solutions we provide at FedTechServices and how they are developed.
The FTS Process
FedTechServices, INC offers a logical and comprehensive system for consulting that makes network consulting simple. This system is called the FTS Process. Click here to read entire document.
Network Management refers to the activities, methods, procedures, and tools that pertain to the operation, administration, maintenance, and provisioning of networked systems. Click here to read entire document.
Whether in the military, government, or private sector, network security is a critical component to an organization's health, and ultimately, its success. Threats from intruders are multiplying daily, and the ability to not only respond to attacks, but to anticipate and prevent those attacks is even more vital to optimize a network’s efficiency and operability. As networks become more complex and broader reaching, the opportunity for attacks increases. Click here to read entire document.
CS Soltions: Managing CyberSecurity
Malicious cyber activity has caused hundreds of billions of dollars in lost revenue every year along with disruptive operations to critical infrastructures extending to the computing platforms. Maintaining today’s mission critical infostructure (information infrastructure consisting of the computing platforms) has become center stage for industry, the Department of Defense (DoD) along with Federal agencies particularly DHS, NSA, DIA and the like. Click here to read entire document.
Enabling Distributed Security in Cyberspace
Like natural ecosystems, the cyber ecosystem comprises a variety of diverse participants--private firms, non-profits, governments, individuals, processes, and cyber devices (computers, software, and communications technologies)--that interact for multiple purposes. Today in cyberspace, intelligent adversaries exploit vulnerabilities and create incidents that propagat at machine speeds to steal identities, resources, and advantage. Click here to read entire document.
CS-Solutions' Platinum CS Protection: A Software Solution for 99.999% System, Application and Data High Availability
This business case analysis is to provide the guidelines and understanding to Total Coast of Ownership, TCO, and Return on Investment, ROI, with respect to the management of Personal Computers and Server within an enterprise. Consistent with best business IT practice processes, this business case is to provide its readers an informed basis to conclude the value of managed systems measured against industry standards. The deployment of CS‐Solutions' Platinum CS Protection solution provides the necessary management of these systems thus maximizing TCO across the enterprise. Click here to read entire document.