IBM Tivoli Monitoring: Administrator's Guide Synchronizing Situation Events

Total Page:16

File Type:pdf, Size:1020Kb

IBM Tivoli Monitoring: Administrator's Guide Synchronizing Situation Events IBM Tivoli Monitoring Version 6.3 Administrator's Guide SC22-5446-00 IBM Tivoli Monitoring Version 6.3 Administrator's Guide SC22-5446-00 Note Before using this information and the product it supports, read the information in “Notices” on page 571. This edition applies to version 6, release 3 of IBM Tivoli Monitoring (product number 5724-C04) and to all subsequent releases and modifications until otherwise indicated in new editions. © Copyright IBM Corporation 2005, 2013. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Figures ...............ix Creating custom dashboard pages that display monitoring data .............51 Tables ...............xi Controlling UISolutions imports .......53 About this information........xiii Chapter 4. Editing your environment configuration settings ........55 Chapter 1. Introduction ........1 Tivoli Enterprise Portal client configuration settings 55 Editing the client parameters .......55 New in this release ............1 Portal client parameter list ........56 New in Version 6.3 ...........1 Enabling the HTTP proxy server ......62 IBM Tivoli Monitoring family of products ....4 Setting application properties for Linux and Tivoli Management Services components .....5 UNIX systems ............63 Tivoli Enterprise Portal client .........7 Setting the environment variable when the hub is Desktop, Browser, and Java Web Start clients . 7 on a z/OS system ...........64 Historical data collection .........8 Tivoli Enterprise Portal Server configuration settings 65 System administrator tasks ........9 Editing the portal server environment file . 65 Performance Monitoring service provider.....9 Portal server environment variables .....66 Pruning events on the portal server database . 67 Chapter 2. Preparing your Tivoli Controlling the size of event attachments . 68 Enterprise Portal environment ....13 Controlling the number of logon attempts . 69 Browser client .............13 Tivoli Enterprise Monitoring Server configuration Java runtime environment (JRE) versions . 13 settings ................70 First time logon ............13 Editing the monitoring server environment file 70 Internet Explorer security settings ......14 Duper process for optimizing situations ....71 Windows write and delete privileges .....14 Tivoli Enterprise Monitoring Automation Server Adding your company logo and URL ....15 configuration settings ...........73 Starting the Tivoli Enterprise Portal client ....15 Editing the Tivoli Enterprise Monitoring Using Web Start to download and run the desktop Automation Server ...........73 client ................16 Installing the IBM JRE ..........17 Chapter 5. Enabling user authentication 75 Enabling tracing for the JRE ........18 User authentication through the hub monitoring Downloading and running the desktop client . 19 server ................78 Manually creating a shortcut for the Web Start Prerequisites for configuring authentication on client ...............20 the hub monitoring server ........78 Starting the desktop client on another portal server 21 Configuration procedure .........80 Starting the browser client on another portal server 22 Ldapsearch for LDAP information ......82 Specifying the browser used for Launch Application LDAP user authentication through the portal server 85 and for online help ............23 Prerequisites for configuring LDAP Add operating platforms to the Navigator view . 25 authentication on the portal server .....85 About single sign-on ..........88 Chapter 3. Preparing your dashboard Roadmap for setting up the portal server to use environment ............27 an LDAP user registry and single sign-on . 90 Roadmaps ...............27 Using Manage Tivoli Enterprise Monitoring Setting up a basic monitoring environment Services to configure the portal server for LDAP without single sign-on and without per user authentication ............93 authorization controls ..........27 Using the Linux or UNIX command line to Setting up a monitoring dashboard environment configure the portal server for LDAP with single sign-on and with per user authentication ............97 authorization controls ..........31 Using the TEPS/e administration console . 99 Migrating a basic monitoring dashboard Mapping Tivoli Enterprise Portal user IDs to environment to a dashboard environment with LDAP distinguished names........106 single sign-on and per user authorization Reconfiguring the browser client for SSO . 108 controls...............42 Importing and exporting LTPA keys .....108 Creating a connection to the IBM Tivoli Monitoring Managing new LDAP users .......110 dashboard data provider ..........48 © Copyright IBM Corp. 2005, 2013 iii Disabling LDAP authentication on the portal Deployment scenarios .........186 server ...............111 Creating policies for specific IBM Tivoli Migrating LDAP authentication from the Monitoring domains ..........188 monitoring server to the portal server .....112 Authentication through the Tivoli Enterprise Chapter 8. Securing communications 193 Monitoring Automation Server .......113 Configuring TLS/SSL communication between the LDAP user authentication using Microsoft Active hub monitoring server and the LDAP server . 196 Directory ...............114 Configuring TLS/SSL communication between Before you begin ...........115 Dashboard Application Services Hub and the Roadmap overview ..........119 dashboard data provider .........196 Plan and create monitoring server and portal Using third party certificate authority signed server users within Active Directory.....120 certificates for the portal server ......197 Create and configure the portal server user Configuring TLS/SSL communication for the accounts and permissions, if desired.....120 Dashboard Application Services Hub server . 199 Enable and configure LDAP user authentication Configuring TLS/SSL communication with the for the portal server, if desired ......121 Authorization Policy Server ........200 Configure TEPS/e for TLS/SSL, if necessary 128 Using the WebSphere generated certificates to Enable and configure LDAP user authentication configure TLS/SSL for the Authorization Policy for the monitoring server, if desired .....128 Server ...............201 Active Directory LDAP verification tools . 130 Using third party certificates to configure User scenarios ............132 TLS/SSL for the Authorization Policy Server . 202 Configuring the tivcmd CLI for TLS/SSL . 204 Chapter 6. Using Tivoli Enterprise Configuring TLS/SSL communication between Portal user authorization ......147 the portal server and the Authorization Policy Administer Users ............148 Server ...............206 Users and User Groups .........149 Enabling FIPS for IBM Tivoli Monitoring ....206 Permissions .............149 Importing the TEPS/e certificates into the portal Applications.............152 server keyfile database ..........212 Navigator views ...........153 Using the GSKit command-line interface to work Member Of and Members ........153 with key databases and certificates ......213 Managing user IDs ...........153 Using the GSKit iKeyman utility to work with key Adding a user ID ...........154 databases and certificates .........214 Viewing and editing a user ID.......155 Setting the JRE for GSKit and starting Key Removing a user ID ..........156 Manager ..............214 Default user .............157 Creating a new key database .......215 Managing user groups ..........157 Creating a new public-private key pair and Viewing user group memberships .....157 certificate request ...........215 Adding a user group ..........158 Using a temporary self-signed certificate . 216 Reviewing and editing a user group.....159 Receiving the CA-signed certificate .....216 Removing a user group .........159 Saving the password to a stash file .....217 Notes on user administration ........160 Troubleshooting logon error messages .....163 Chapter 9. Audit logging ......219 Audit log XML elements mapped to the ITM Audit Chapter 7. Using role-based attribute group .............220 authorization policies ........165 Audit log XML example ..........223 Authorization policy concepts ........166 Audit environment variables ........225 Predefined roles and permissions.......168 Take Action and command execution audit logging 227 Preparing to enable authorization policies ....170 Policy management scenarios ........171 Chapter 10. Situation event integration Best practices for creating authorization policies 171 with Tivoli Enterprise Console ....229 Creating and assigning administrator roles . 173 Default mapping of situation events to IBM Tivoli Creating and assigning policy distributor roles 174 Enterprise Console events .........229 Policy management examples .......175 Expanding a generic event message situation Enabling authorization policies in the portal server 178 description .............231 Authorization policy auditing ........182 Generic mapping for agent specific slots . 231 Changing the Authorization Policy Server Assigning severity for Tivoli Enterprise Console configuration properties after installation and events ...............233 configuration .............183 Localizing message slots.........233 Managing the authorization policy store ....185 Situation event statuses and IBM Tivoli Working with multiple domains .......185 Enterprise Console event generation.....234 iv IBM Tivoli Monitoring: Administrator's Guide Synchronizing situation events .......236 Enabling or disabling the self-describing Checking the IBM Tivoli Enterprise
Recommended publications
  • Are You Eligible for the Senior Citizen Homeowner
    Please read but do not submit with your application Homeowner Tax Benefits Initial Application Instructions for Tax Year 2018/19 Please note: If the property has a life estate, only the individual retaining the life estate can apply. If the property is held in a trust, only the qualifying beneficiary/trustee can apply. Are you eligible for the Senior Citizen Homeowner Exemption (SCHE)? • Will all owners be 65 years of age or older by December 31, 2018? n Yes n No OR • If you own your property with either a spouse or sibling, will at least one of you be 65 years of age or older by December 31, 2018? • Will you have owned this property for at least 12 consecutive months prior n Yes n No to the date of filing this application? • Is the property the primary residence for ALL senior owners and their spouses? n Yes n No (All owners must reside on the property unless they are legally separated, divorced, abandoned or residing in a health care facility.*) *If an owner is residing in a health care facility, please submit documentation including total cost of care at the facility. • Is the Total Combined Income (TCI) for all owners and spouses $37,399 or less, n Yes n No regardless of where they live? (The income of a spouse may be excluded if he or she is absent from the residence due to divorce, legal separation or abandonment.) If you have answered NO to any of these questions, you MAY NOT be eligible for the Senior Citizen Homeowner Exemption.
    [Show full text]
  • OS 386 Multiuser/Multitasking Operating System
    OS 386 Multiuser/Multitasking Operating System REFERENCE GUIDE [Q] DIGITAL RESEARCH@ os REFERENCE GUIDE [jill DIGITAL RESEARCH~ COPYRIGHT Copyright © 1987 Digital Research Inc. All rights reserved. No part of this publication may be reproduced, transcribed, stored in a retrieval system, or translated into any language or computer language, in any form or by any means, electronic, mechanical, magnetic, optical, chemical, manual or otherwise without the prior written permission of Digital Research Inc, 60 Garden Court, Box DRI, Monterey, California 93942 DISCLAIMER DIGITAL RESEARCH MAKES NO REPRESENTATIONS OR WARRANTIES WITH RESPECT TO THE CONTENTS HEREOF AND SPECIFICALLY DISCLAIMS ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR ANY PARTICULAR PURPOSE. Further Digital Research Inc. reserves the right to revise this publication and to make changes from time to time in the content hereof without obligation of Digital Research Inc to notify any person of such revision or changes. NOTICE TO USER This manual should not be construed as any representation or warranty with respect to the software named herein. Occasionally changes or variations exist in the software that are not reflected in the manual. Generally, if such changes or variations are known to exist and to affect the product significantly, a release note or READ.ME file accompanies the manual and the distribution disks. In that event, be sure to read the release note or READ.ME file before using the product. ii TRADEMARKS Digital Research and its logo, CP/M, and CP/M-86 are registered trademarks of Digital Research Inc. Cardfile, Concurrent, Concurrent DOS 386, Concurrent DOS XM, DR EDIX, DOS Plus and MP/M-86 are trademarks of Digital Research Inc.
    [Show full text]
  • Chapter 10 Introduction to Batch Files
    Instructor’s Manual Chapter 10 Lecture Notes Introduction to Batch Files Chapter 10 Introduction to Batch Files LEARNING OBJECTIVES 1. Compare and contrast batch and interactive processing. 2. Explain how batch files work. 3. Explain the purpose and function of the REM, ECHO, and PAUSE commands. 4. Explain how to stop or interrupt the batch file process. 5. Explain the function and use of replaceable parameters in batch files. 6. Explain the function of pipes, filters, and redirection in batch files. STUDENT OUTCOMES 1. Use Edit to write batch files. 2. Use COPY CON to write batch files. 3. Write and execute a simple batch file. 4. Write a batch file to load an application program. 5. Use the REM, PAUSE, and ECHO commands in batch files. 6. Terminate a batch file while it is executing. 7. Write batch files using replaceable parameters. 8. Write a batch file using pipes, filters, and redirection. CHAPTER SUMMARY 1. Batch processing means running a series of instructions without interruption. 2. Interactive processing allows the user to interface directly with the computer and update records immediately. 3. Batch files allow a user to put together a string of commands and execute them with one command. 4. Batch files must have the .BAT or .CMD file extension. 5. Windows looks first internally for a command, then for a .COM files extension, then for a .EXE file extension, and finally for a .BAT or .CMD file extension. 6. Edit is a full-screen text editor used to write batch files. 7. A word processor, if it has a means to save files in ASCII, can be used to write batch files.
    [Show full text]
  • IBM Tivoli Monitoring: Administrator's Guide Private Situation Operation
    IBM Tivoli Monitoring Version 6.2.3 Fix Pack 1 Administrator's Guide SC32-9408-05 IBM Tivoli Monitoring Version 6.2.3 Fix Pack 1 Administrator's Guide SC32-9408-05 Note Before using this information and the product it supports, read the information in “Notices” on page 467. This edition applies to version 6, release 2, modification 3, fix pack 1 of IBM Tivoli Monitoring (product number 5724-C04 ) and to all subsequent releases and modifications until otherwise indicated in new editions. © Copyright IBM Corporation 2005, 2012. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Figures ..............vii Enabling the HTTP proxy server ......49 Setting application properties for Linux and Tables ...............ix UNIX systems ............50 Setting the environment variable when the hub is on a z/OS system ...........51 About this information ........xi Tivoli Enterprise Portal Server configuration settings 52 Editing the portal server environment file . 52 Chapter 1. Introduction ........1 Portal server environment variables .....53 New in this release ............1 Pruning events on the portal server database . 54 New in Version 6.2.3 Fix Pack 1 .......1 Controlling the size of event attachments . 55 New in Version 6.2.3...........2 Controlling the number of logon attempts . 56 New in Version 6.2.2 Fix Pack 2 .......4 Duper process for optimizing situations ....57 New in Version 6.2.2 Fix Pack 1 .......8 New in Version 6.2.2...........9 Chapter 4. Setting up asymmetric New in Version 6.2.1 ..........12 encryption .............59 New in Version 6.2.0 ..........15 Setting the JRE for GSKit and starting Key Manager 59 IBM Tivoli Monitoring family of products ....18 Creating a new key database ........60 Tivoli Management Services components ....19 Creating a new public-private key pair and Tivoli Enterprise Portal client ........20 certificate request ............60 Desktop, Browser, and Java Web Start clients .
    [Show full text]
  • 2. Letters and Sounds
    2. Letters and Sounds 2.1. Alphabet 2.1.1. The next table shows the relationship between the letters of the Greek alphabet and its derivatives, the Latin alphabet and the (newer) Cyrillic alphabet. GREEK LATIN CYRILLIC Α α Alpha A a А а Β β Beta B b Б б, В в Γ γ Gamma C c, G g Г г Δ δ Delta D d Д д Ε ε Epsilon E e Е е, Ё ё, Э э Ζ ζ Zeta Z z Ж ж, З з Η η (H)Eta H h И и, Й й Θ θ Theta Ι ι Iota I i, J j Κ κ Kappa K k К к Λ λ Lambda L l Μ μ Mu M m М м Ν ν Nu N n Н н Ξ ξ Xi Ο ο Omicron O o О о Π π Pi П п Ρ ρ Rho P p, R r Р р Σ σ ς Sigma S s С с Τ τ Tau T t Т т Υ υ Upsilon U u, Y y, W w У у Φ φ Phi Ф ф Χ χ Chi X x Х х Ψ ψ Psi Ω ω Omega F Digamma F f Q Qoppa Q q 55 Europaio: A Brief Grammar of the European Language 2.1.2. The Europaio Alphabet is similar to the English (which is in fact borrowed from the late Latin abecedarium), except that the C has a very different sound, similar to that of G. We also consider some digraphs part of the alphabet, as they represent original Europaio sounds, in contrast to those digraphs used mainly for transcriptions of loan words.
    [Show full text]
  • Windows in Concurrent PC
    Using Concurrent PC DOS OTHER BOOKS BY THE AUTHOR Microcomputer Operating Systems (1982) The Byte Guide to CP/M-86 (1984) Using Concurrent PC DOS Mark Dahmke McGraw-Hili Book Company New York St. Louis San Francisco Auckland Bogota Hamburg Johannesburg London Madrid Mexico Montreal New Delhi Panama Paris Sao Paulo Singapore Sydney Tokyo Toronto Library of Congress Cataloging-in-Publication Data Dahmke, Mark. U sing Concurrent PC DOS. Bibliography: p. Includes index. 1. Concurrent PC DOS (Computer operation system) 1. Title. QA76.76.063D34 1986 005.4' 469 85-15473 ISBN 0-07-015073-7 Copyright © 1986 by McGraw-Hili, Inc. All rights reserved. Printed in the United States of America. Except as permitted under the United States Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a data base or retrieval system, without the prior written permission of the publisher. 1234567890 DOC/DOC 893210876 ISBN 0-07-015073-7 The editors for this book were Steven Guty and Vivian Koenig, the designer was Naomi Auerbach, and the production supervisor was Teresa F. Leaden. It was set in Century Schoolbook by Byrd Data Imaging. Printed and bound by R. R. Donnelley & Sons Company. To my sister Patricia Contents Chapter 1. Introduction 1 What Is Concurrent PC DOS? 1 What Is an Operating System? 1 The DOS Family Tree 3 The Scope of This Book 5 Chapter 2. Concurrent PC DOS Compatibility 6 Concurrent PC DOS Compatibility 6 PC·DOS, TopView, and the IBM PC AT 7 Concurrent CP/M·86 9 Chapter 3.
    [Show full text]
  • Dihydroergotamine
    Journal of Pre-Clinical and Clinical Research, 2018, Vol 12, No 4, 149-157 REVIEW PAPER www.jpccr.eu Dihydroergotamine (DHE) – Is there a place for its use? Agnieszka Piechal1, Kamilla Blecharz-Klin1, Dagmara Mirowska-Guzel1 1 Medical University of Warsaw, Poland Piechal A, Blecharz-Klin K, Mirowska-Guzel D. Dihydroergotamine (DHE) – Is there a place for its use? J Pre-Clin Clin Res. 2018; 12(4): 149–157. doi: 10.26444/jpccr/99878 Abstract Nowadays, dihydroergotamine (DHE) is sporadically used as a vasoconstrictor in the treatment of acute migraine. The importance of this drug in medicine has significantly decreased in the recent years. Limitations on the use of dihydroergotamine are due to the high toxicity and increased the risk of severe adverse events after prolonged theraphy. The Committee for Medicinal Products for Human Use of the European Medicines Agency recommends limiting the use of drugs that contain ergotamine derivatives due to the potential risk of ischemic vascular events, fibrosis and ergotism. However, ergot alcaloids preparations are not recommended for use in the prophylaxis of migraine pain, although it is still a good alternative for people with status migrainosus, migraine recurrence or chronic daily headache that do not respond to the classical theraphy. In clinical practice, DHE can be used as a rescue medication to treat migraine attacks involving aura or without aura, as well as for the acute treatment of cluster headache episodes. The effectiveness of DHE in alleviating migraine headache was assessed in multiple clinical studies. This review describes the pharmacodynamic and pharmacokinetic properties of DHE in an expanded view and its role in modern therapy based on available clinical trials.
    [Show full text]
  • Tiparet E Sigurisë Seria Europa
    KONTROLLOJE KONTROLLOJE LËVIZË SHIKOJE 10 NDJEJE SERIA SERIA EUROPA € TIPARET E SIGURISË TIPARET PËRMBAJTJA o Hyrje o Dizajni i kartëmonedhës o Tiparet e sigurisë o Letra e kartëmonedhës o Shtypi me reliev o Shenja ujore me portret o Numri ngjyrë smeraldi o Shiriti metalik o Shiriti i sigurisë o Simbolet ne shiritin metalik o Nën dritën Ultra Violete (UV) o Mikroshtypi HYRJE Kartëmonedhat Euro janë prodhuar me një teknologji të sofistikuar të shtypjes. Ato përmbajnë disa veti të sigurisë, të teknologjisë më të lartë. Kjo i bën ato të dallohen lehtë nga ato të falsifikuara. Juve nuk ju duhet ndonjë mjet special. Në fakt, e tëra ajo që duhet të bëni është ta NDJENI, SHIKONI dhe ta LËVIZNI kartëmonedhën. Ashtu sikurse tek seria e parë të kartëmonedhave euro, edhe tek seria e re Europa kontrollimi i tipareve të sigurisë do të jetë i lehtë duke përdorur metodën “NDJEJE, SHIKOJE dhe LËVIZE". Nuk nevojiten mjete speciale për këtë gjë. Seria e re e kartëmonedhave do të quhen seria Europa për shkak se disa nga tiparet e tyre të sigurisë do të përmbajnë një portret të Europa-s, një figurë e mitologjisë Greke nga rrjedh edhe origjina e emrit të kontinentit tonë. Kartëmonedhat e reja përmbajnë tipare të avancuara të sigurisë. Gjithmonë kontrolloni disa veti. Nëse ende jeni të pasigurte, krahasojeni kartëmonedhën me një që jeni i sigurt se është e vërtetë. Ky manual tregon dhe sqaron vetitë e sigurisë së kartëmonedhës prej 10€. DIZAJNI I KARTËMONEDHËS Elementet kryesore te kartëmonedhës ne vlerë prej 10€ janë: o Ura, që paraqet njërën prej periudhave historike arkitekturale të Evropës (pjesa e prapme e kartëmonedhës) o Dritaret ose dyert që simbolizojnë shpirtin e hapur dhe bashkëpunimin në Evropë (pjesa e përparme e kartëmonedhës) o Emri i valutës i shkruar në alfabetin latin (EURO), atë grek (EYPΩ) dhe atë cyrillic (EBPO).
    [Show full text]
  • Study: Mapping Fake News and Disinformation in the Western
    STUDY Requested by the AFET committee Mapping Fake News and Disinformation in the Western Balkans and Identifying Ways to Effectively Counter Them Policy Department for External Relations Directorate General for External Policies of the Union EN PE 653.621 - February 2021 DIRECTORATE-GENERAL FOR EXTERNAL POLICIES POLICY DEPARTMENT STUDY Mapping Fake News and Disinformation in the Western Balkans and Identifying Ways to Effectively Counter Them ABSTRACT Disinformation is an endemic and ubiquitous part of politics throughout the Western Balkans, without exception. A mapping of the disinformation and counter-disinformation landscapes in the region in the period from 2018 through 2020 reveals three key disinformation challenges: external challenges to EU credibility; disinformation related to the COVID-19 pandemic; and the impact of disinformation on elections and referenda. While foreign actors feature prominently – chiefly Russia, but also China, Turkey, and other countries in and near the region – the bulk of disinformation in the Western Balkans is produced and disseminated by domestic actors for domestic purposes. Further, disinformation (and information disorder more broadly) is a symptom of social and political disorder, rather than the cause. As a result, the European Union should focus on the role that it can play in bolstering the quality of democracy and governance in the Western Balkans, as the most powerful potential bulwark against disinformation. EP/EXPO/AFET/FWC/2019-01/Lot1/R/01 EN February 2021 - PE 653.621 © European Union,
    [Show full text]
  • Commanders Guide to Human Intelligence (HUMINT)
    U.S. UNCLASSIFIED REL NATO, GCTF, ISAF, MCFI, ABCA For Official Use Only FOR OFFICIAL USE ONLY Commanders Guide to Human Intelligence (HUMINT) 20 August 2012 The material in this publication is under development. It is NOT approved doctrine and CANNOT be used for reference or citation. DISTRIBUTION RESTRICTION: Distribution authorized to U.S. Government agencies only because it requires protection in accordance with AR 380-5 or as specified by DCS G-3 Message DTG 091913ZMAR04. This determination was made on 21 March 2012. Contractor and other requests must be referred to ATTN: ATZS-CDI-D, U.S. Army Intelligence Center of Excellence, Fort Huachuca, AZ 85613-7017, or via e-mail at usarmy. [email protected]. DESTRUCTION NOTICE: Destroy by any method that will prevent disclosure of contents or reconstruction of the document in accordance with AR 380-5. FOR OFFICIAL USE ONLY U.S. UNCLASSIFIED REL NATO, GCTF, ISAF, MCFI, ABCA For Official Use Only Commanders Guide to Human Intelligence (HUMINT) Contents Page HUMAN INTELLIGENCE COLLECTION ACTIVITIES ................................................................... 1 HUMINT Mission and Capabilities ......................................................................... 1 HUMINT Functions ................................................................................................. 1 HUMINT Operational Focus ................................................................................... 3 Human Intelligence Versus Counterintelligence ...................................................
    [Show full text]
  • Lincolnton 2015 Strategic Plan Summary Report
    City of Lincolnton 2015 Strategic Planning Summary Report Draft Submitted by Centralina Council of Governments July 7, 2015 City of Lincolnton 2015 Strategic Planning Summary Report Table of Contents Introduction 3 Summary of Goal Rankings 3 Top Goals 3 Feedback Connection 4 Next Steps 6 Exhibit A – Detailed Results from June 2, 2015 Public Engagement Exhibit B – Balanced Decision Making Process 2 City of Lincolnton 2015 Strategic Planning Summary Report Introduction The City of Lincolnton has initiated a strategic planning process to respond to significant challenges and opportunities. The City specifically directed that their work be guided by strong public engagement. As a result, the City staff prepared materials to communicate the work of the City including chronology of significant achievements and changes, description of department responsibilities, achievement and future challenges facing the City. On Tuesday June 2, 2015 a community public engagement was held at The Lentz Center. Detailed responses are provided in Exhibit A. A summary of the priorities identified at the Open House include: On June 25, the City Council met to identify the 2015 strategic priorities. The results are shown below: Goals Total Council Staff Improve Infrastructure 12 3 9 Employee Benefits 10 3 7 Downtown Development 9 4 5 Water Customers (increase) 3 1 2 Extension of Rail Trail/more trails/improve upkeep around 3 2 1 trails/amenities/survey trails (determine who owns what) Recreational Opportunities 3 1 2 More Sidewalks 2 1 1 Top Goals Of the seven goals listed several were combined as noted: 1. Improve Infrastructure (including more sidewalks and trail maintenance) Develop long term plan to maintain, improve and fund infrastructure.
    [Show full text]
  • Dhe Fenetik Tîtcer
    IPA Index 1 Chronological List of Publications DHI FONÈTIK TÎTCER Dhi organ ov dhi fonétik tîtcer'z asóciécon édited bay PAUL PASSY 1886 1 May 1886 [1 - 4] [See Notes on Pagination] 2 June 1886 [1 - 4] 3 July 1886 [1 - 4] 4 August 1886 [1 - 4] 5 September 1886 [1 - 4] 6 October 1886 [1 - 4] 7 November 1886 [1 - 4] 8 December 1886 [1 - 4] 1887 9 January 1887 [1 - 4] 10 February 1887 [1 - 4] 11 March 1887 [1 - 4] 12 April 1887 [1 - 4] dhE fEnetik tîtcEr 13 May 1887 153 - 160 [See Notes on Pagination] 14 June 1887 185 - 191 15 July 1887 233 - 240 16 August 1887 285 - 288 17 September 1887 313 - 316 18 October 1887 341 - 348 19 November 1887 373 - 380 20 December 1887 405 - 412 © M K C MacMahon 2007 IPA Index 2 Chronological List of Publications 1888 3rd Year 1 January 1888 25/1 - 32/8 [See Notes on Pagination] 2 February 1888 73/9 - 80/16 3 March 1888 121/17 - 128/24 4 April 1888 169/25 - 176/32 5 May 1888 201/33 - 208/40 6 June 1888 249/41 - 256/48 7 July 1888 313/49 - 320/56 DE fonetik tîtcEr Di OrgEn Ev DE fonetik tîtcErz EsoucieicEn 7-8 August - September 1888 57 - 72 9 October 1888 425/73 - 432/80 Supplement to DE fonetik tîtcEr, October 1888: Letter from F Palmgren to P Passy, with 'Specimens of English in Swedish Phonetic Transcriptions' [1-4] 10 November 1888 457/81 - 464/88 11 December 1888 489/89 - 496/96 1889 4ème année de l'Association lE m”:tr fOnetik Organ dE l asOsjAsjõ fOnetik de prOf”s{r dE lãg vivãt 1 janvier 1889 1 - 16 2 février 1889 17 - 32 3 mars 1889 33 - 44 4 avril 1889 45 - 52 5 mai 1889 53 - 64 © M K C MacMahon 2007
    [Show full text]