Kochetov Ilya Andreevich
Person
Russia
Southern Federal District of the Russian Federation
Volga Federal District of the Russian Federation
Information Technology
EDMS
01.11.1980
Southern Federal District of the Russian Federation
Volga Federal District of the Russian Federation
Information Technology
EDMS
01.11.1980
Previous jobs:
Lukoil NK
Expert
EAE-Consult
Lead Engineer
Administration of the Volgograd region
Consultant
Education:
VolSU - Volgograd State University - 2004
Biography
As of December 2014 - leading engineer of EAE-Consult.
Maintenance (system)
- Administration of Lotus Domino servers (about 150 pieces)
- Monitoring of Domino user accounts (about 50 thousand)
- Access Rights Administration for Lotus Domino Administrators
- Setting up the Domino server in terms of its purpose in the EDMS (skirt, regional node, communication server, etc.)
- Monitoring of EDMS operability.
- Configure the required level of Lotus Domino network information security
- Configuring Policies on Lotus Domino Servers
- Configuring Multi-Domain Network Administration
- Lotus Domino Server Monitoring
- Provides fault tolerance and load balancing (clustering) of Lotus Domino servers.
- Repair corrupted databases
- Configuring Lotus Domino subsystems (DDM, DAOS, Vault ID, Recovery ID, ECL, Smart Upgrade)
- Configuring Web Server Lotus Domino
- Support Organization SSL and S/MIME
- Monitor system availability
- Update the access to the required ports in terms of server-to-server interaction
- Enable data replication between servers
- Resolution of incidents with access to IEs and interacting IEs
- Monitor BackUP servers
- Deploying and Configuring the Business Application Server
- Building the Lotus Domino Network Architecture
- Elimination of incidents related to system functionality
- Monitor installed client software versions
- Lotus Notes Automated Client Update
- Bringing Lotus Domino Servers to the Next Version
- Maintain the required level of performance and manage system configuration without changing its functionality
- Ensure business application, related hardware, and software can work together
- Elimination of potential security threats of the business application (the possibility of violation of confidentiality, integrity, availability of the resource) and taking measures to eliminate detected threats or minimize the possible consequences of their implementation (if they cannot be eliminated), proposal of measures to exclude their appearance.