- 
							
Types of Inventory
The IT inventory range used at work is very wide. These are the most popular hardware equipment dealt with on a daily basis: desktop computers & peripherals, laptops, telephones, mobile phones, displays, projectors, printers & A0 plotters, scanners from A5 up to A0 sizes, network equipment such as switches, gateways, access points, and UPSs.
 - 
							
Inventory Lifecycle
Each piece of hardware has its date of purchase listed alongside with the warranty. This enables the monitoring of their age within the devices' lifecycle. In possible scenarios, hardware is upgraded. Some examples of these are storage & RAM for workstations. Obsolete hardware is then prepared to be replaced with new ones.
 - 
							
Forecasting & Planning
Apart from monitoring inventory from an IT perspective, collaboration with other departments is practiced when possible. These include the human resources department for on-boarding employees, and the finance for budgeting purposes. The purchasing process is also a key part of the process to obtain value for money and avoiding to end up acquiring cheap devices that have short lifecycle.
 - 
							
Acquiring New Hardware
Hardware acquisition is started off by identifying the core needs, usually by collaborating with the end-user. Apart from the performance and features, aftersales services are taken into consideration. A list of specifications is therefore created, and proceed forward to an expression of interest or a tender. Choosing the right specifications is a must due to government policies to opt for the cheapest quote. Example quoting for a laptop vs quoting for a 16GB RAM laptop. The 'laptop' quote would end up with a 4GB laptop which is inadequate.
 - 
							
Access Database
As soon as I started off my duties, I encountered several spreadsheets containing different inventory data. I started off by merging them into one single centralised spreadsheet, while building a more appropriate Access database for all the different types of hardware. This was more convenient and enabled better allocation control between hardware and their users. Monitoring has improved drastically due to the possibility of creating and extracting reports for presentation purposes.
 - 
							
Teams Power BI
MITA provides our IT department with access to Power BI via Microsoft Teams. This service enables us to monitor each of the active workstations that are registered with MITA for the Windows 11 upgrade project. The service provides information such as OS version, device age, Windows OS compatibility, and standard hardware security features such as secure boot, TPM, virtualisation, and BitLocker. These analytics are also presented by the means of data charts.
 - 
							
Software
Software used on workstations is constantly kept updated to the latest version for security reasons. This software is kept handy on one single USB drive, and is backed up from time to time. The update process is also pushed to workstations by MITA. However this practice is kept as last resort due to creating more bloat on the device software and may often lead to bugs and crashes. Purchased software is also managed through the respective portal for user licensing purposes. Two examples of such software are Adobe Acrobat Pro, and Autodesk ACAD.
 
- 
							
Network Access
My job duties include to set up network equipment. Starting off by setting up network racks and populate them with switches, Wi-Fi gateways, patch panels, PDUs, and UPSs. Network cables are usually passed on by the maintenance section or outsourced to a supplier in the case of major projects. Patch panels and RJ-45 jacks are crimped and labelled accordingly. Switches are usually configured by MITA, while uplinks are communicated for patching purposes. Some network ports are kept deactivated for security reasons, example at the reception and customers' waiting area.
 - 
							
Server Room
The server room is kept under the best condition possible. It is equipped with two air conditioners to keep the room temperature as low as possible with redundancy. The door is kept locked, and accessed only by authorised persons. Food, drinks, and smoking are prohibited for security reasons. The server room is also equipped with a VESDA system that acts as a monitoring and alert system in cases of emergency.
 - 
							
PABX Telephony
Our telephony system is an Alcatel-Lucent. I have the responsibility to setup basestations by using the OMC software. Barring settings, features, and divert keys are set. Additionally, basestations are set with pickup groups and hunting groups. On rare occations, the automated attendant function is modified to enhance customer experience. As time goes by, softphones are also being installed and set on all workstations, with remote workers being a priority.
 - 
							
Projects
Network projects are usually conducted in collaboration with MITA. Some examples of previous projects include the change in configuration settings of network switches, such as IP addresses, and VLANs. Another project that was coordinated with MITA is the introduction of Wi-Fi access points authority-wide & and their gateways. Network projects are carried out after working hours or on Saturdays to avoid disrupting users.
 - 
							
Outsourcing
Due to the government operating culture, outsourcing of certain IT elements is a inevitable. One of the most outsourced element is IT security. IT security is centralised by the government agency MITA, and has total control of IT security of all government departments and authorities. Consequently, VPN services are also the responsibility of MITA as they go hand-in-hand. Low wages amongst government authorities also push other IT elements such as programming to outsourcing, as it is almost impossible to find the required candidates.
 
- 
							
On-Boarding Employees
An official email by the HR department with employee details is received. Accounts are logged accordingly, prepared, and set up on an appropriate device based on the employment type. The device alongside with IT declaration and hardware receipt forms are distributed to the on-boarding employee for review and signature. A copy of the forms is provided to the employee. Members of the IT department will then provide a basic explanation of IT tools.
 - 
							
Off-Boarding Employees
Once the IT department is informed with an off-boarding situation by the HR, the hardware is collected on the respective date. The collection process involves inspection of the device condition for damages, and signatures for return receipt. The employee is provided with a copy of the forms. All accounts and unecessary data is deleted from IT information systems, to comply with GDPR regulations.
 - 
							
Instant Response
A crucial part of IT support is the response time. Downtimes are kept as low as possible to avoid user disruptions. Front-end offices such as customer care, and high-ranked officials are given a priority. It is a normal practice to have the break time disrupted to assist users with a problem. With regards to downtimes, a follow-up is made to opt for mitigation measures to prevent a repeated occurance.
 - 
							
Hardware Faults
Hardware failure occurs occasionally. As a response, reserve hardware is kept for immediate replacement, sometimes temporarily. When possible and reasonable, repairs are conducted internally. In the case of hardware under warranty and repairs beyond my skills, these are returned to the seller, or outsourced to specialists individuals. Faults by negligent employees are taken note of and reported to the management.
 - 
							
Software Faults
Cutting edge problem-solving skills are applied to software faults, even more than hardware ones. Different techniques such as 'by elimination' and 'A/B testing' methodologies are used. Most software faults are related to MITA's Windows OS environment. These include but are not limited to driver crashes, bugs, and BSODs.
 - 
							
Cybersecurity
Cybersecurity is given a priority, and treated in a serious manner. As part of the IT department, the CIA triad principles are applied in practice. Physical access rights, and access to information systems are given only when contacted in writing. Access rights can be customised into different areas and levels. In the case of doubt, the IT department provides their opinions and suggestions from a technical aspect. In the case of services offered by MITA, a request for service ticketing system is used by the IT department for logging and monitoring purposes. As part of the IT department, it is ensured that users are assisted in front of cybersecurity threats such as phishing emails, and keeping themselves educated.
 - 
							
Backup Tools
Users are provided with OneDrive backup tool on their workstation by the IT department. Adding to that, users are offered with access to online shared folders hosted on MITA's servers. These shared folders will be moving to Microsoft SharePoint in the near future, which will be a challenging data transfer project. Despite all these backup tools that are provided to users, according to government policy, data backup is still under the users' responsibility. The IT department is also equipped with storage cloning tools to easily create a copy of the data for redundancy purposes.
 - 
							
GDPR
Documents containing personal identifiable information are kept secure and locked at the office. The data itself is kept updated, and is cross-checked from time to time against the data at the HR department. Data is deleted once an employee resigns, if it is no longer necessary to keep. In case of doubt, clarifications are made with the data protection officer of the authority. Due to exposure amongst several different users, it is ensured that employee data is not shared via grapevine communication.
 
- 
							
Windows Preview
Future versions of Windows are continuously tested on a separate device for new features and compatibility. Windows 11 was tested with software used at the authority before the official rollout in order to inform MITA with any issues. One of the main issues was the deprication of Silverlight engine. Testing unreleased versions of Windows is possible by enrolling to the Windows Insider Programme and obtaining the respective ISO file.
 - 
							
Depricated Software
Software that is set for deprication is identified through testing and desk research. In the recent past, the department encountered depricated software that had some functionality Internet Explorer with Silverlight and Fujitsu scanning software after the acquisition by Ricoh. There are also changes in the Microsoft 365 license plan due to investigations by the EU for bundling Teams with the Office suite.
 - 
							
New Technologies
In such a fast-paced environment, research is conducted on the latest technology. This involves new releases, reviews, and first-hand experience for on-display products, and software. One of my favourite latest technology is Windows on Arm.
 - 
							
Market Availability
Government procurement policies impose to purchase most products from the local market. Hence,research about products and variants available locally is performed.