From 8641493ed684d9161d726a9cce8ee3d6c033fe01 Mon Sep 17 00:00:00 2001 From: ReachableCEO Date: Thu, 23 Nov 2023 17:20:14 -0600 Subject: [PATCH] gather it up --- book.toml | 1 + src/CIO/KnelCharter.md | 352 +++++++++--------- src/CIO/Processes/MoveToproduction.md | 1 - .../Systems/Admin-Network/WAN-HQ-routable.md | 50 +++ src/CIO/ThingsToDocument.md | 27 ++ src/CTO/team-hweng/HwEngSupplyChain.md | 18 +- src/CTO/team-hweng/labComponentInventory.md | 100 ----- src/SUMMARY.md | 1 - 8 files changed, 262 insertions(+), 288 deletions(-) delete mode 100644 src/CIO/Processes/MoveToproduction.md create mode 100644 src/CIO/Systems/Admin-Network/WAN-HQ-routable.md create mode 100644 src/CIO/ThingsToDocument.md delete mode 100644 src/CTO/team-hweng/labComponentInventory.md diff --git a/book.toml b/book.toml index 3f67398..9e84afb 100644 --- a/book.toml +++ b/book.toml @@ -4,3 +4,4 @@ language = "en" multilingual = false src = "src" title = "TSYS Group Member Handbook" + diff --git a/src/CIO/KnelCharter.md b/src/CIO/KnelCharter.md index 835359d..b44ebf7 100644 --- a/src/CIO/KnelCharter.md +++ b/src/CIO/KnelCharter.md @@ -1,176 +1,176 @@ - -# Known Element Enterprises LLC (KNEL) Charter - -- [Known Element Enterprises LLC (KNEL) Charter](#known-element-enterprises-llc-knel-charter) - - [Purpose of this document](#purpose-of-this-document) - - [KNEL Mission](#knel-mission) - - [Accountability](#accountability) - - [Independence](#independence) - - [Areas of responsibility](#areas-of-responsibility) - - [Scope](#scope) - - [Authority](#authority) - - [Assessment and Advisory Services](#assessment-and-advisory-services) - - [Risk Management Services](#risk-management-services) - - -## Purpose of this document - -The purpose of this document is to outline areas of responsibility and operational interaction within KNEL. The reader should be able to obtain the following information from this document: - -- Understanding the Organizational Structure of KNEL -- Understanding the Operational Responsibilities of the various hierarchical layers within the Organizational Structure -- Understanding the Intra-Operational Model of KNEL -- Understanding the Inter-Operational Model of KNEL - -## KNEL Mission - -Known Element Enterprises LLC (KNEL) supports the TSYS Group mission by fostering the information technology , information security/assurance/assessment and privacy approaches across all component -entities of TSYS Group. - -KNEL is a top level component entity of TSYS Group. KNEL has total responsibility for procurement, deployment, architecture operational support and retirement of the entire infrastructure stack -used to provision all IT services across TSYS Group. - -Known Element Enterprises seeks to establish a very specific culture that provides consistent, long term, zero variable , predictable , successful and stable outcomes in all tasks/projects and ongoing -service delivery and operations. - -KNEL core cultural tenants: - -- ruthless execution -- outstanding service delivery that pleasantly surprises and delights all stakeholders every time -- integrity and consistency -- privacy -- collaboration -- documentation , knowledge capture and dissemination -- sustainability -- stewardship -- strong information security/information assurance - - This culture underpins KNEL ability to be a good steward of TSYS Group information entrusted to it by its stakeholders. - -The goal of KNEL is to implement a framework of safeguards to protect the: - -- confidentiality (authorized access) -- integrity -- availability - -of TSYS Group information technology resources and information, and to ensure TSYS Group is able to meet statutory and regulatory obligations in a manner that enables and respects individual privacy. - -## Accountability - -The TSYS Group CIO, CISO , VP of Technical Operations and IT Director (the IT Management Committee) manage KNEL assets and staff and are accountable directly to the TSYS Group Board to: - -- Establish the strategic direction of KNEL -- Ensure the continuous enhancement and effectiveness of KNEL to present a proactive approach to information security at TSYS Group -- Promote public information sharing throughout TSYS Group -- To provide a one-stop point of information and accountability for information security and privacy at TSYS Group -- Provide periodic assessments on the adequacy and effectiveness of the TSYS Group processes for controlling its activities and managing its risks in the areas set forth under the mission and scope of work. -- Report significant issues affecting privacy, including recommended process improvements, and provide follow-up on mitigation. -- Provide information on the status and results of campus unit security assessments and Privacy Impact Assessments. -- Coordinate with, and provide oversight of, other privacy compliance, control, and monitoring functions. - -## Independence - -To provide for the independence of KNEL, the IT Management Committee reports directly to the TSYS Group Board. This ensures fierce independence of the IT organization and allows the Board to remain fully informed in it's role of providing effective and engaged group wide oversight and governance. - -In too many organizations, IT is stymied by senior management and it results in situations like the Equifax breach or ransomware. -Also by being an independent LLC under TSYS Group, it's able to function on an equal level with other TSYS Group components. -Like all TSYS Group component entities, it has an independent P&L (following the TSYS Group zero internal cost center model). -That's right, IT can be a profit center! - -## Areas of responsibility - -- Facilities IT (power/cooling/physical security) -- Enterprise IT (hypervisor/storage/networking/monitoring,alerting/backups) -- Platform IT - Data (database,block,object,file stores) -- Platform IT - Middleware (batch/sync/async task execution, API/microservices, enterprise service bus, intra system/application messaging,e-mail) -- Platform IT - Application Runtime (container runtime, legacy applications, PAAS) -- SRE (TSYS Group application catalog) - -## Scope - -The scope of Information Security/Assurance/Assessment and Privacy comprises multiple focus areas: - -- Policy -- Training/Awareness -- Incident Management and Response -- Consulting -- Assessments -- Risk Management -- Survivability - -- KNEL develops policies and guidelines to assist technology and information users to understand their responsibilities. - -- Through Training and Awareness initiatives, stakeholders learn secure behaviors that support the protection of TSYS Group, as well as personal, information. - -- When security incidents or privacy breaches occur, quick and effective response is crucial to limit damage and quickly restore services. The focus area of Incident Management & Response supports this effort by promoting consistent means to prepare, respond to, recover from, and report incidents. - -- KNEL partners and consults with component entities across TSYS Group to assist them in meeting their privacy and information security objectives. - -- KNEL conducts information security and privacy assessments in accordance with approved plans and its established policies and procedures. - -- Risk Management allows units to determine the risks that exist in their environments and how those risks can be reduced or eliminated. - -- Survivability supports the planning for recovery of technology services following an emergency or system disruption. - -The scope of information security centers on implementing appropriate technical, operational and management controls to protect confidentiality (authorized access), integrity, and availability of resources. - -The information privacy scope of work is to determine whether TSYS Group recognizes the risk associated with collecting and storing protected data and that TSYS Group is aware of and in compliance with applicable policies and laws. This supports: - -- The expectation that personally identifiable information collected, processed, or stored by TSYS Group is protected from misuse or unauthorized access; - -- Limiting personal data collection to only those data items required for legitimate business purposes; - -- Respecting the rights of the data owners as guaranteed by laws, regulations, and contractual obligations; - -- Confirming TSYS Group organizations incorporate privacy procedures as an integral part of business system design processes; - -- Significant legislative or regulatory privacy issues impacting the organization are recognized and addressed properly. - -## Authority - -KNEL is authorized to: - -- Have access to all functions, records, property, and personnel required for information security and privacy assessments. -- Make specific reports directly to TSYS Group Board and other entities as deemed appropriate. -- Allocate resources, set frequencies, select subjects, determine scopes of work, and apply the techniques required to accomplish information security objectives. -- When conducting risk reviews and assessments, obtain the necessary assistance of personnel in TSYS Group units, as well as specialized services from within or outside the organization. - -Responsibilities - -KNEL has responsibility to: - -- Maintain a professional staff with sufficient knowledge, skills, experience, and professional certifications to meet the requirements of this charter. -- Develop an information security strategy that presents a high-level plan for achieving information security goals. -- Research best practices and technologies that support information security. -- Establish a quality assurance program by which the Director assures the operation of KNEL activities. - -## Assessment and Advisory Services - -KNEL conducts information security and privacy assessments in accordance with Board approved plans and its established policies and procedures. - -KNEL can also conduct independent information security and privacy impact assessments. - -Assessment and Advisory services include: - -- Developing a flexible annual plan in consultation with the Board using appropriate risk-based methodology, including risks or control concerns identified by TSYS Group corporate/component leadership. -- Examining and evaluating the adequacy and effectiveness of the systems of internal privacy controls. -- Evaluating and assessing significant new or changing services, processes, operations, and controls coincident with their development and implementation. -- In coordination with the Board assessing compliance with laws, regulations, contract/grant provisions, and internal policies, plans, and procedures. -- Reviewing operations or programs to ascertain whether results are consistent with established objectives. -- Performing consulting services, assurance services, to assist component entities in meeting privacy objectives. -- Evaluating emerging information technology audit/assessment trends and implementing best practices. - -## Risk Management Services - -The focus area of Risk Management is the key to a successful information security program. - -Information security is not exact or all-encompassing. No one can ever eradicate all risk of improper, malicious or capricious use of information and resources. The goal of information security is that in a particular situation, the controls are commensurate with the value of the protected resource and weighed against the cost that would be incurred --financial or otherwise - in the event of unauthorized disclosure, degradation, or loss. The process of balancing risks, costs of protection strategies, and resource value is risk management. - -Risk Management Services include: - -- Partnering with TSYS Group units to conduct risk reviews that highlight strengths and weaknesses of a unit's information security profile; -- Consulting with TSYS Group units determine how best to minimize risk and protect resources; -- Directing assessments of critical program areas or new services to ensure appropriate security controls are in place; -- Perform network monitoring, intrusion detection/prevention, web scanning, and other security procedures to help secure the infrastructure and in response to malicious activity. -- Evaluating new and emerging security strategies and technologies for use in TSYS Group environment; -- Collaborating with the information security technology team to plan and implement the SANS Top 20 Security Controls. + +# Known Element Enterprises LLC (KNEL) Charter + +- [Known Element Enterprises LLC (KNEL) Charter](#known-element-enterprises-llc-knel-charter) + - [Purpose of this document](#purpose-of-this-document) + - [KNEL Mission](#knel-mission) + - [Accountability](#accountability) + - [Independence](#independence) + - [Areas of responsibility](#areas-of-responsibility) + - [Scope](#scope) + - [Authority](#authority) + - [Assessment and Advisory Services](#assessment-and-advisory-services) + - [Risk Management Services](#risk-management-services) + + +## Purpose of this document + +The purpose of this document is to outline areas of responsibility and operational interaction within KNEL. The reader should be able to obtain the following information from this document: + +- Understanding the Organizational Structure of KNEL +- Understanding the Operational Responsibilities of the various hierarchical layers within the Organizational Structure +- Understanding the Intra-Operational Model of KNEL +- Understanding the Inter-Operational Model of KNEL + +## KNEL Mission + +Known Element Enterprises LLC (KNEL) supports the TSYS Group mission by fostering the information technology , information security/assurance/assessment and privacy approaches across all component +entities of TSYS Group. + +KNEL is a top level component entity of TSYS Group. KNEL has total responsibility for procurement, deployment, architecture operational support and retirement of the entire infrastructure stack +used to provision all IT services across TSYS Group. + +Known Element Enterprises seeks to establish a very specific culture that provides consistent, long term, zero variable , predictable , successful and stable outcomes in all tasks/projects and ongoing +service delivery and operations. + +KNEL core cultural tenants: + +- ruthless execution +- outstanding service delivery that pleasantly surprises and delights all stakeholders every time +- integrity and consistency +- privacy +- collaboration +- documentation , knowledge capture and dissemination +- sustainability +- stewardship +- strong information security/information assurance + + This culture underpins KNEL ability to be a good steward of TSYS Group information entrusted to it by its stakeholders. + +The goal of KNEL is to implement a framework of safeguards to protect the: + +- confidentiality (authorized access) +- integrity +- availability + +of TSYS Group information technology resources and information, and to ensure TSYS Group is able to meet statutory and regulatory obligations in a manner that enables and respects individual privacy. + +## Accountability + +The TSYS Group CIO, CISO , VP of Technical Operations and IT Director (the IT Management Committee) manage KNEL assets and staff and are accountable directly to the TSYS Group Board to: + +- Establish the strategic direction of KNEL +- Ensure the continuous enhancement and effectiveness of KNEL to present a proactive approach to information security at TSYS Group +- Promote public information sharing throughout TSYS Group +- To provide a one-stop point of information and accountability for information security and privacy at TSYS Group +- Provide periodic assessments on the adequacy and effectiveness of the TSYS Group processes for controlling its activities and managing its risks in the areas set forth under the mission and scope of work. +- Report significant issues affecting privacy, including recommended process improvements, and provide follow-up on mitigation. +- Provide information on the status and results of campus unit security assessments and Privacy Impact Assessments. +- Coordinate with, and provide oversight of, other privacy compliance, control, and monitoring functions. + +## Independence + +To provide for the independence of KNEL, the IT Management Committee reports directly to the TSYS Group Board. This ensures fierce independence of the IT organization and allows the Board to remain fully informed in it's role of providing effective and engaged group wide oversight and governance. + +In too many organizations, IT is stymied by senior management and it results in situations like the Equifax breach or ransomware. +Also by being an independent LLC under TSYS Group, it's able to function on an equal level with other TSYS Group components. +Like all TSYS Group component entities, it has an independent P&L (following the TSYS Group zero internal cost center model). +That's right, IT can be a profit center! + +## Areas of responsibility + +- Facilities IT (power/cooling/physical security) +- Enterprise IT (hypervisor/storage/networking/monitoring,alerting/backups) +- Platform IT - Data (database,block,object,file stores) +- Platform IT - Middleware (batch/sync/async task execution, API/microservices, enterprise service bus, intra system/application messaging,e-mail) +- Platform IT - Application Runtime (container runtime, legacy applications, PAAS) +- SRE (TSYS Group application catalog) + +## Scope + +The scope of Information Security/Assurance/Assessment and Privacy comprises multiple focus areas: + +- Policy +- Training/Awareness +- Incident Management and Response +- Consulting +- Assessments +- Risk Management +- Survivability + +- KNEL develops policies and guidelines to assist technology and information users to understand their responsibilities. + +- Through Training and Awareness initiatives, stakeholders learn secure behaviors that support the protection of TSYS Group, as well as personal, information. + +- When security incidents or privacy breaches occur, quick and effective response is crucial to limit damage and quickly restore services. The focus area of Incident Management & Response supports this effort by promoting consistent means to prepare, respond to, recover from, and report incidents. + +- KNEL partners and consults with component entities across TSYS Group to assist them in meeting their privacy and information security objectives. + +- KNEL conducts information security and privacy assessments in accordance with approved plans and its established policies and procedures. + +- Risk Management allows units to determine the risks that exist in their environments and how those risks can be reduced or eliminated. + +- Survivability supports the planning for recovery of technology services following an emergency or system disruption. + +The scope of information security centers on implementing appropriate technical, operational and management controls to protect confidentiality (authorized access), integrity, and availability of resources. + +The information privacy scope of work is to determine whether TSYS Group recognizes the risk associated with collecting and storing protected data and that TSYS Group is aware of and in compliance with applicable policies and laws. This supports: + +- The expectation that personally identifiable information collected, processed, or stored by TSYS Group is protected from misuse or unauthorized access; + +- Limiting personal data collection to only those data items required for legitimate business purposes; + +- Respecting the rights of the data owners as guaranteed by laws, regulations, and contractual obligations; + +- Confirming TSYS Group organizations incorporate privacy procedures as an integral part of business system design processes; + +- Significant legislative or regulatory privacy issues impacting the organization are recognized and addressed properly. + +## Authority + +KNEL is authorized to: + +- Have access to all functions, records, property, and personnel required for information security and privacy assessments. +- Make specific reports directly to TSYS Group Board and other entities as deemed appropriate. +- Allocate resources, set frequencies, select subjects, determine scopes of work, and apply the techniques required to accomplish information security objectives. +- When conducting risk reviews and assessments, obtain the necessary assistance of personnel in TSYS Group units, as well as specialized services from within or outside the organization. + +Responsibilities + +KNEL has responsibility to: + +- Maintain a professional staff with sufficient knowledge, skills, experience, and professional certifications to meet the requirements of this charter. +- Develop an information security strategy that presents a high-level plan for achieving information security goals. +- Research best practices and technologies that support information security. +- Establish a quality assurance program by which the Director assures the operation of KNEL activities. + +## Assessment and Advisory Services + +KNEL conducts information security and privacy assessments in accordance with Board approved plans and its established policies and procedures. + +KNEL can also conduct independent information security and privacy impact assessments. + +Assessment and Advisory services include: + +- Developing a flexible annual plan in consultation with the Board using appropriate risk-based methodology, including risks or control concerns identified by TSYS Group corporate/component leadership. +- Examining and evaluating the adequacy and effectiveness of the systems of internal privacy controls. +- Evaluating and assessing significant new or changing services, processes, operations, and controls coincident with their development and implementation. +- In coordination with the Board assessing compliance with laws, regulations, contract/grant provisions, and internal policies, plans, and procedures. +- Reviewing operations or programs to ascertain whether results are consistent with established objectives. +- Performing consulting services, assurance services, to assist component entities in meeting privacy objectives. +- Evaluating emerging information technology audit/assessment trends and implementing best practices. + +## Risk Management Services + +The focus area of Risk Management is the key to a successful information security program. + +Information security is not exact or all-encompassing. No one can ever eradicate all risk of improper, malicious or capricious use of information and resources. The goal of information security is that in a particular situation, the controls are commensurate with the value of the protected resource and weighed against the cost that would be incurred --financial or otherwise - in the event of unauthorized disclosure, degradation, or loss. The process of balancing risks, costs of protection strategies, and resource value is risk management. + +Risk Management Services include: + +- Partnering with TSYS Group units to conduct risk reviews that highlight strengths and weaknesses of a unit's information security profile; +- Consulting with TSYS Group units determine how best to minimize risk and protect resources; +- Directing assessments of critical program areas or new services to ensure appropriate security controls are in place; +- Perform network monitoring, intrusion detection/prevention, web scanning, and other security procedures to help secure the infrastructure and in response to malicious activity. +- Evaluating new and emerging security strategies and technologies for use in TSYS Group environment; +- Collaborating with the information security technology team to plan and implement the SANS Top 20 Security Controls. diff --git a/src/CIO/Processes/MoveToproduction.md b/src/CIO/Processes/MoveToproduction.md deleted file mode 100644 index 7399626..0000000 --- a/src/CIO/Processes/MoveToproduction.md +++ /dev/null @@ -1 +0,0 @@ -# Processes - Move To Production diff --git a/src/CIO/Systems/Admin-Network/WAN-HQ-routable.md b/src/CIO/Systems/Admin-Network/WAN-HQ-routable.md new file mode 100644 index 0000000..d68f40e --- /dev/null +++ b/src/CIO/Systems/Admin-Network/WAN-HQ-routable.md @@ -0,0 +1,50 @@ +- [WAN Network - HQ - Public Routed Space](#wan-network---hq---public-routed-space) + - [Proxmox/opnsense interface / layer 2 info](#proxmoxopnsense-interface--layer-2-info) + - [AT&T Small business fiber network information](#att-small-business-fiber-network-information) + +# WAN Network - HQ - Public Routed Space + +## Proxmox/opnsense interface / layer 2 info + +net1 5c:74 vmbr1000 wan 5c:74 +net17 3a:bc vmbr1000 uversebiz vtnet17 3a:bc + +## AT&T Small business fiber network information + +- Address: 99.91.198.81 01100011.01011011.11000110.01010 001 +- Netmask: 255.255.255.248 = 29 11111111.11111111.11111111.11111 000 +- Wildcard: 0.0.0.7 00000000.00000000.00000000.00000 111 + +- Network: 99.91.198.80/29 01100011.01011011.11000110.01010 000 (Class A) +- Broadcast: 99.91.198.87 01100011.01011011.11000110.01010 111 +- HostMin: 99.91.198.81 01100011.01011011.11000110.01010 001 +- HostMax: 99.91.198.86 01100011.01011011.11000110.01010 110 +- Hosts/Net: 6 + +- WAN Rtr 1 IP: 99.91.198.81 +- WAN Rtr 2 IP: 99.91.198.82 + +- wireguard vpn, WAN Float, SIP, other services not on 80/443 IP: 99.91.198.83 + +- Cloudron IP: 99.91.198.84 +- Conost IP: 99.91.198.85 + +- GW IP: 99.91.198.86 + +```shell + +dig @8.8.8.8 -x 99.91.198.81 +short +tsyshq-corertr-01.knownelement.com. + +dig @8.8.8.8 -x 99.91.198.82 +short +tsyshq-corertr-02.knownelement.com. + +dig @8.8.8.8 -x 99.91.198.83 +short +tsyshq-wanfloat.knownelement.com. + +dig @8.8.8.8 -x 99.91.198.84 +short +my.knownelement.com. + +dig @8.8.8.8 -x 99.91.198.85 +short +app02.knownelement.com. +``` \ No newline at end of file diff --git a/src/CIO/ThingsToDocument.md b/src/CIO/ThingsToDocument.md new file mode 100644 index 0000000..5d092b1 --- /dev/null +++ b/src/CIO/ThingsToDocument.md @@ -0,0 +1,27 @@ + +- [Things to document](#things-to-document) + - [System Admin](#system-admin) + - [Facilities](#facilities) + - [Network](#network) + - [Hypervisor](#hypervisor) + - [Storage](#storage) + - [Authentication](#authentication) + - [SRE](#sre) + +# Things to document + +## System Admin + +### Facilities + +### Network + + VPN user addition to algo (opnsense soon) + +### Hypervisor + +### Storage + +### Authentication + +## SRE \ No newline at end of file diff --git a/src/CTO/team-hweng/HwEngSupplyChain.md b/src/CTO/team-hweng/HwEngSupplyChain.md index 76cc81f..71b60cb 100644 --- a/src/CTO/team-hweng/HwEngSupplyChain.md +++ b/src/CTO/team-hweng/HwEngSupplyChain.md @@ -1,6 +1,5 @@ # TSYS Group Handbook - Engineering Documentation - Team HwEng - Supply Chain - ## Introduction This article covers the high level overview of the hardware supply chain for all aspects of @@ -22,9 +21,9 @@ the orbiter: ## Pi Systems and USB accessories * raspberry pi - * subopi1 + * subopi1 * MorsePOD M6 - * subopi2 + * subopi2 * Lora Concentrator Pi Hat (Rak 833, 915mhz, SPI, FCC: 2AF6B-RAK833) * Arduino Uno connected to motor shield connected to * Servo @@ -34,12 +33,12 @@ the orbiter: * Dragino Lora/GPS hat * subopi5 * SenseHAT - * Seeduino LorawanGPS connected to + * Seeduino LorawanGPS connected to * IMU * Motor Controller * subopi6 * SenseHAT - * Seeduino LorawanGPS connected to + * Seeduino LorawanGPS connected to * IMU * Motor Controller @@ -67,7 +66,7 @@ Much to write here, very soon. ## Orbiter Avionics - Seeduino -This is the core of the "smarts" (electronic) system for the orbiter. It's where all domain awarness and decision making happens (along with communication), and is subject to full regulatory review/compliance requirements. +This is the core of the "smarts" (electronic) system for the orbiter. It's where all domain awareness and decision making happens (along with communication), and is subject to full regulatory review/compliance requirements. It must do very few things, and it must do them perfectly. @@ -79,7 +78,7 @@ It will be running FreeRTOS, with a handful of custom routines. * With the following groove boards connected to the seeduino: - * IMU: + * IMU: * Motor driver board: (or very similar , need to confirm) @@ -92,7 +91,6 @@ This is where the batteries, cells, load all comes together: * - ### Hardware Watchdog This is a critical fail safe component, and will reboot the seeduino or pi automatically if countdown timer expires: @@ -101,13 +99,13 @@ This is a critical fail safe component, and will reboot the seeduino or pi autom ## Orbiter Avionics - Raspberry pi -The pi is essentially a large disk (for geospatial db, holding avionics firmware, holding log data etc) and beefy CPU (for geospatial lookups, processing ads-b data, perhaps some data crunching for local optimizations based on weather) attached to the avionics. The pi is important, but not completely critical. It can crash (and if not fixed by watchdog) can remain offline and the orbiter can come in for service safely. We will utilize best practices with the pi, to ensure it's as reliable/avaiable as possible. +The pi is essentially a large disk (for geospatial db, holding avionics firmware, holding log data etc) and beefy CPU (for geo spatial lookups, processing ads-b data, perhaps some data crunching for local optimizations based on weather) attached to the avionics. The pi is important, but not completely critical. It can crash (and if not fixed by watchdog) can remain offline and the orbiter can come in for service safely. We will utilize best practices with the pi, to ensure it's as reliable/available as possible. In poc the pi will be attached via USB (and also serving as a host for the arduino for firware updates of the avionics ), in prototype/prod it will be on an integrated board as a Pi CM. * Payload power control: -Control of the power payload, on a geospatial basis, in a black box/non customer changeable is also super critical, and will likely receive the second most regulatory scruity. +Control of the power payload, on a geo spatial basis, in a black box/non customer changeable is also super critical, and will likely receive the second most regulatory scrutiny. This is used for power cycling the payload for regulatory compliance (geofence): diff --git a/src/CTO/team-hweng/labComponentInventory.md b/src/CTO/team-hweng/labComponentInventory.md deleted file mode 100644 index a5a32f3..0000000 --- a/src/CTO/team-hweng/labComponentInventory.md +++ /dev/null @@ -1,100 +0,0 @@ -# Lab Component Inventory - -| Drawer # | Contents | Source| -|---|---|---| -| 1 | Jumper Wires F2F 6" |to be identified| -| 2 | Jumper Wires F2F 6" |to be identified| -| 3 | Jumper Wires M2M 6" |to be identified| -| 4 | Jumper Wires M2M 6" |to be identified| -| 5 | Jumper Wires M2F 6" |to be identified| -| 6 | Mixed Jumper Wires M2M 6" |to be identified| -| 7 | Header Strips|to be identified| -| 8 | Heatshrink Tubing|| -| 9 | Heatshrink Tubing|""| -| 10 | Heatshrink Tubing|""| -| 11 | Wire Connector Butt Splice| | -| 12| Zipties| | -| 13| Push Buttons| amz,ck| -| 14| LED Screen|unknown origin| -| 15| Relays | amz but no specific link| -| 16| Sound | ck | -| 17| Diodes | | -| 18| Crystal Oscillators | | -| 19| Switches | ck | -| 20| Empty Drawer | n/a | -| 21| Empty Drawer | n/a | -| 22| Empty Drawer | n/a | -| 23| Empty Drawer | n/a | -| 24| Empty Drawer | n/a | -| 25| Empty Drawer | n/a | -| 26| Empty Drawer | n/a | -| 27| Empty Drawer | n/a | -| 28| Empty Drawer | n/a | -| 29| Empty Drawer | n/a | -| 30| Empty Drawer | n/a | -| 31| USB to DB9 | | -| 32| LiPO Batteries | misc | -| 33| LED assortment | | -| 34| Dual Row DIP IC Socket Adaptor Assortment | | -| 35| Inductors | | -| 36| Elenco CK Kit Electronic components not otherwise categorized| ck | -| 37| Resistors | | -| 38| Resistors | ""| -| 39| Empty Drawer | "" | -| 40| LED | amz | -| 41| USBA-proprietary | misc| -| 42| USBA-proprietary| misc | -| 43| USB (misc to misc) | misc | -| 44| Electrical Clip Assortment | | -| 45| Test Leads | | -| 46| USBA-Mini | misc | -| 47| USBA-Micro| misc | -| 48| Empty Drawer | n/a | -| 49| Empty Drawer | n/a | -| 50|Empty Drawer | n/a | -| 51|Empty Drawer | n/a | -| 52|Empty Drawer | n/a | -| 53|Empty Drawer | n/a | -| 54| Misc electronics/Rpi etc | misc | -| 55| Empty Drawer | n/a| -| 56| Wifi components | misc | -| 57| USB networking devices | misc| -| 58| Electrical Terminals | | -| 59| Electrical Terminals | "" | -| 60| Electrical Terminals | "" | -| 61| misc electronic components to be identified | amz | -| 62| misc electronic components to be identified | amz | -| 63| Wire| misc electronic components to be identified | -| 64| empty drawer| n/a| -| 65| empty drawer| n/a | -| 66| empty drawer| n/a | -| 67| empty drawer| n/a | -| 68| empty drawer| n/a | -| 69| screw terminals | misc electronic components to be identified | -| 70| misc electronic components to be identified | | -| 71| servos | unknown | -| 72| servos | unknown | -| 73| motors | unknown | -| 74| Transitors | | -| 75| Transistors| "" | -| 76| Transistors | "" | -| 77| Capacitors | | -| 78| Capacitors | "" | -| 79| Capacitors | "" | -| 80| mystery component | amz -| 81| mystery component | amz -| 82| empty drawer | n/a -| 83| empty drawer | n/a -| 84| empty drawer | n/a -| 85| empty drawer | n/a -| 86| empty drawer | n/a -| 87| empty drawer | n/a -| 88| empty drawer | n/a -| 89| empty drawer | n/a -| 90| empty drawer | n/a -| 91| empty drawer | n/a -| 92| empty drawer | n/a -| 93| empty drawer | n/a -| 94| empty drawer | n/a -| 95| LED Strip Connectors | misc | -| 96| empty drawer diff --git a/src/SUMMARY.md b/src/SUMMARY.md index 72e33a3..c784ba7 100644 --- a/src/SUMMARY.md +++ b/src/SUMMARY.md @@ -67,7 +67,6 @@ - [TeamMecheng - Supply Chain](./CTO/team-mecheng/MechEngSupplyChain.md) - [TeamMecheng - Tooling](./CTO/team-mecheng/MechEngTooling.md) - # Part 10: Functional Area: Chief Information Technology Officer - [Known Element Enterprises Charter](./CIO/KnelCharter.md)