Success Stories
I consider myself lucky. God Almighty has enabled me to join companies that have a high ability to challenge because they have large financial resources to complete projects with international standards.
Success Partner , and if they were not, i would not have succeeded
All those companies and entities that I had the honor to work with contributed to the formation of a great experience that I am proud of.
I have worked for more than 25 years and before I graduated from the university because I am a lover of technology and I have no interest in other activities. I have been working on a huge number of projects, the most important of which are
Hardware
Strategic & Software
NUB Data Center
Nahda University was interested in building a smart and secure data center to be the iron treasury for its data, which is worth millions of dollars. In building the data center, it was considered to obtain the best technical and engineering offers from the largest international companies with expertise and excellence to build a reliable data center in various electronic aspects and data processing, which can host more from 100 servers and giant storage units.
In most cases, the data center is called the server room. That building or room is the most important and sensitive for large companies and institutions. the data center represents the mind, the beating heart, and the information bank for any organization, because just stopping the data center or one of the data centers services for a moment may cause losses and possibly the collapse of the balances of some organizations.
Network Infrastructure and Construction
The design and implementation of many infrastructure works of various kinds, from the beginning of receiving project drawings to the final delivery, which are characterized by flexibility, reliability, security, scalability, expansion and ease of maintenance procedures, so they are able to help any organization achieve its goals and provide a competitive advantage in the market., If the IT infrastructure is not implemented correctly, companies may encounter connectivity, productivity, and security problems, such as system disruptions and hacks.
virtualization technology
Design and implementation of many integrated work environments based on virtualization technology because it has many capabilities that are not available in traditional systems, such as raising the efficiency of servers at a certain time and raising the levels of data transmission. There are many success stories in using this technology to highlight
- Transforming ordinary computer labs into a virtual machine to help students experiment and innovate with flexibility while not affecting or conflicting with internal protection systems.
- Compile unused servers in a virtual environment in order to make the most of those resources and make them as a test environment for software and development .
Due to the deep understanding of these technologies, cloud projects of all kinds (Private, Public Hybrid) have been worked using
Firewall Systems
It is the device that companies or institutions put in place to ensure the protection of the security of their programs and files from penetration and theft from third parties, so that this device is specifically placed between the internal network of the organization and the Internet, so that undesirable parties that infiltrate the internal computer network of the organization are identified. , then inform the system supervisor of this, knowing that the firewall is not only used to achieve security against external attacks, but can be used to identify sites that employees are not allowed to visit, including sites that lead to wasting time, such as gaming sites, news sites, and others. , It is worth noting that there are many companies that still do not use the firewall because of the high cost, or because they need experts or specialists to deal with it. The firewall can be software or hardware that helps identify any hacking attempts, and shows the presence of viruses that lead to disruption The work of systems, as it is considered a necessity that must be used to protect networks, especially whenever they are large and complex networks
The firewall is considered one of the most important steps that must be taken after the increase in threats and security risks to protect systems from penetration by hacking and malicious programs. It is certain that the Internet is unsafe and full of very dangerous security risks and viruses, so companies and institutions must respect the protection systems to be the shield The protector of those dangers
Work has been done on more than different types of global protection systems between software and hardware, the most important of which are (Barracuda, SonicWall, Fortinet, D-Link, Palo Alto, Sophos, pfsense)
Telephone Systems
There is no institution without an internal system for rapid communication between employees because it saves effort and communication costs because it is local. No monthly bills are paid for that communication, no matter how long the conversation takes. Rather, it became more productive for the possibility of making video and audio calls on a scale that extended to the branches of institutions in Cities and countries violated by VOIP technologies
These systems can now provide video conferencing meetings between desktop devices and mobile devices such as computers or mobile phones
Many related projects were implemented and different technologies were used according to the size and budget of the project using the famous international brands in addition to adding call recording and extracting various reports and full linkage with the CRM customer service system
Security Audit
Information security represents the nervous system of any place, as the presence of any malfunction in it causes many damages related to the various departments. It is a tool that guarantees the confidentiality of many of the information of the institution and works on its availability and credibility, and this reduces the occurrence of crises in the institution. Information security also refers to the processes and tools that are designed and used to protect all business-sensitive information from disruption, theft, inspection, and destruction.
Recently, the use of technology has become constantly increasing, which made the number of people who want to be protected from security threats increasing continuously, as well as all institutions and companies, small and large, need a strong information security system that protects the company from inspection, disruption and destruction, and the presence of information security helps everyone manage Business properly and avoid any security breaches.
Full supervision of penetration testing projects, finding security vulnerabilities and how to solve them and educating my collage
Unified Exam
The national project to conduct standardized exam for the medical sector of the Arab Republic of Egypt participated in a large and effective way to build a system to exam final-stage students from medical colleges on a standardized test electronically at the same time. It was a successful and successful experiment to support those in charge of it
Video Broussard
I see, no institution is devoid of important internal events that greatly affect the thought and knowledge of those who belong to it, and because my beloved University is abnormally intertwined with rapid and successive events, seminars, scientific meetings and recreational activities, and for the dissemination of these events and their internal broadcasting, a high-quality 8K internal broadcast system has been implemented on The internal network and its direct link to external cameras located in the university’s studios to publish videos very quickly and without any internet costs and on all university devices and screens at the same time. This project is being developed very quickly due to its importance.
Wi-Fi
The high-speed wireless networks known as Wi-Fi are one of the most used technologies today in all smart devices because they are characterized by high transmission speeds and the absence of the need for wired connections, in addition to the process of moving easily between more than one place for the large spread of mobile devices.
Therefore, it was urgent to depth study in those technologies that are directly related to my specialization as a communications engineer and my ability to build and design many Wi-Fi networks of various types at high and secure speeds to transfer data transmission service, Internet services and internal broadcasting to other countless services. Very complex wireless networks were built on different bands and extensions to cover entire tourist cities.
Backup & Disaster Recovery Solution
Backup is a mandatory process that must be done periodically and regularly according to the importance of the files, and this applies to the home user and files on devices in organizations to other sensitive and important files. Which may be damaged due to the consequences of losing files because of an accident such as a fire or flood, or damage to a computer component, or the computer was exposed to theft or deliberate sabotage, such as hacking. It may be difficult for the owner of the files to retrieve and recreate them, especially if they are large and important.
Backup copies of those files are made on external media that are secure, unusual, and fortunate in safes against theft and fire. The process is repeated according to a strategy determined by the importance and size of the files.
Several data protection projects have been implemented, which have contributed in an excellent way to protecting institutions from incurring huge amounts of money in the event of not being able to retrieve them.
The projects have been implemented using the following systems
Smart Home
25 years ago,, I have been dreaming of having a smart home that I can control the devices using the computer, and because that period is a long and there are no mobile phone devices like today, it was difficult to do that, but the grace of God is great, thank God, I made a design for a smart home that is already done Control it through a landline phone and the device was registered as a patent at the Academy of Scientific Research in 2004 and since this date I have been closely following all those systems of all kinds in terms of controlling devices, detecting thefts, turning on and off household appliances, controlling lighting and saving resources.
It has participated in many smart home projects inside and outside Egypt.
Professional Audio Systems
I have participated in several projects for professional audio systems, such as building isolation and equipping studios and building the infrastructure for audio montage devices, including recording programs, in addition to linking them directly to the live broadcast server via the Internet.
- Providing high-quality professional equipment at the university’s theater
- Building, designing, and supervising the construction of live audio and broadcast studios, both internally and online
- Building and designing a conference system in meeting rooms and linking audio systems with video conference systems across the institutions’ branches
- Reviewing audio device designs for many major and famous mosques
Professional Surveillance Cameras
Surveillance camera systems are among the most prevalent systems in our modern age, and no home or store without a surveillance camera system for reference when needed. i have participated in many large and smart projects for high-resolution and fast-imaging surveillance camera systems that are used to monitor people and track their movements. Through facial recognition, all these systems are equipped with 24-hour control and monitoring rooms integrated with artificial intelligence systems to access detailed analytical records to help the decision maker.
Many projects were worked on using a mixture of types and brands and their compatibility with each other to reach a complete coverage of places and sectors, with reduction in the number of cameras and their distribution in a well-thought-out engineering manner while not contradicting at all on the area to be covered to reduce costs, infrastructure works and maintenance procedures.
Access Control
Access Control systems are one of the modern methods that have developed very greatly for the provisions of security control and achieving the highest levels of security and data analysis. Many projects have been implemented to control individuals and vehicles using high-precision control units based on face or fingerprints, magnetic cards, and smart cards, and linking those systems in a secure manner. And quick, which helps the administrative control in a way that helps the administration to take the right decisions in a short time in addition to extracting a huge amount of the statistical report.
Institutional Memory
Institutional memory is a system for documenting, preserving, updating, retrieving and organizing the circulation and use of all university information and documents in various academic and administrative fields. The idea of “institutional memory” is based on:
- Electronic Archive
- Manuals and electronic work systems
- Voice messages
- Automated follow-up systems
The main objective of establishing and activating “institutional memory” is to control all papers used in the university’s operations, including decisions, minutes of meetings, agreements, contracts, internal and external correspondence, and all means of information exchange.
Control means the existence of a systematic mechanism that uses electronic media to track, compile and save all paper transactions exchanged between university units and between them and external institutions and devices and save them in an “electronic archive”, then follow up with updating and organize their retrieval and exchange between specialists according to the powers granted to each of them.
The Institutional Memory system has the following advantages:
- Enabling the different administrative levels to obtain their information needs in real time, around the clock, and from anywhere.
- Inventory of the levels and administrative units of the university that is licensed to view specific information.
- Keeping the original documents and documents and making them available only to the administrative levels authorized to deal in them and withholding them from all unauthorized persons.
- The possibility of immediate updating of information with the knowledge of the operator, and the existence of an electronic mechanism for approving such updates after verifying their validity.
- Dispose of papers and avoid allocating places for their safekeeping that are vulnerable to theft, fire or damage. Meaning managing files instead of saving them.
- Investing computers in reviewing stored informational contents instead of reading.
- The use of e-mail instead of the philosophy of incoming and outgoing and the transformation of the institution Paperless Organization.
- Relying on the structure of the Internet browser, where the user does not need to download any auxiliary programs.
Seminars &Workshops
It is not possible to implement any system except after training the users on how to use it. It was a duty and responsibility before God towards my colleagues and their constant encouragement to do intensive training courses to simplify the systems that are used within the organization to make maximum use of them, explain them and support them in an easy and simple way and a permanent attempt to simplify the matter for everyone, especially the non-specialists , And although I am not good at explaining, but my duty and my love for my colleagues was the motivation to do this and the success of the experiment in a way that I am proud of and increasing technological awareness for all.
More than one workshop and seminars were held, in addition to the publication of many short books for the following topics
- Information security and protection from hacking
- Digital Transformation
- IT Ticket System
- Advanced Microsoft Team
- Advanced Microsoft Outlook
- Yammer
- Advanced Microsoft OneDrive
- Internal team training
Microsoft Educational Platforms
Microsoft offers many cloud services through the Office365, which helps greatly in the productivity of each lecturer and student, in addition to organizing other administrative aspects through many services, the most important of which are
Azure Active Directory | Exchange Protection | Security & Compliance |
Microsoft Bookings | Microsoft Defender | Microsoft Forms |
Microsoft Planner | Microsoft Project | Microsoft Sway |
Microsoft Teams | Microsoft Viva | MyAnalytics service |
Office applications | OneDrive | SharePoint |
Power BI | Yammer | Exchange Archiving |
I have planned how to take advantage of those services and how to integrate them with the internal accounts of more than 25,000 users in the internal servers of the organization and the using the SSO technology to maximum use of all services. For the stability and security of these services, the dependence on these services has become throughout the day, with rates of use that exceed all expectations from email posts, lectures, meetings via the Internet, business organization, and daily and periodic duties.
All these services are followed up very carefully by my team I trained at the highest international levels to provide the necessary technical support to all users
Policy
There is no doubt that the existence of a policy to regulate the relationship between the users and the institution is indispensable because this policy is the borders and rights required to be preserved between the two parties to reach a secure and organized work environment.
Therefore, it was necessary to establish a project to implement global information policies and to supervise their proper implementation. 33 documents related to the organization of work and the internal procedures of the institution related to the management of information technology were drafted.
Smart & Secure Documents
I joined and integrated as the latest technological project and an integrated center for secured and smart issuances in the Middle East and Africa.
Which helps institutions and authorities to print high-security documents with optical technology and data encryption, which helps the government in digital governance with very accurate tracking of documents.
Digital Education & Distance learning
Digital education is an innovative educational method for digital tools and technologies during the educational process. This method of teaching is referred to as technology-enhanced learning or E-learning, which achieves instant communication between students and teachers via the Internet, so that the university becomes a networked institution. It also provides an opportunity to explore digital technologies for teachers, and an opportunity to design attractive methods in scientific courses, and these courses can take the form of integrated online courses, and many related platforms have been developed and improved to achieve the maximum of their potential and employment in the university and their integration with the various university systems and among the most important of these applications (Caroline , Moodle, Microsoft School Data Sync)
- Improving performance in getting work done.
- Creating a new atmosphere of creativity, excellence, and competition to reach the best results.
- Realizing the many benefits for both the student and the teacher.
- Enhance the ability to plan for a better future.
- Measuring student and teacher opinions on the ease of sharing information.
- Employing innovative and new solutions to solve problems.
- Develop a vision for integrating the digital components of the educational system.
- Applying new and innovative services and moving away from traditional methods.
- Encouraging students to prepare for and accept E-learning.
- Provide guarantees of measurement and accuracy in management and quality of performance in the system.
- Transforming the entire educational system into a digital education system.
- Providing the necessary security and security for information.
- Provide guarantees of access to information.
- Promote the real and economic operation of all possibilities of digital education.
- It provides many sources of information to the learner in an easy and distinctive way.
- Increases student interest when new technologies are used in education.
- Facilitate the method of communication via electronic networks.
- It creates an advanced education system in line with the rapid progress of the world.
- Increases opportunities for self-education and distance education.
- Develops communication skills and facilitates the process of communicating with all those involved in student learning.
- Facilitate the method of communication via electronic networks.
- It creates an advanced education system in line with the rapid progress of the world.
- Increases opportunities for self-education and distance education.
- Develops communication skills and facilitates the process of communicating with all those involved in student learning.
- It improves students’ skills in self-learning and self-learning and gives them personal skills.
- It also works on building and developing the educational system for the individual and society.
Create a software development unit
An internal programming unit has been established in all the institutions that supervised it, and these units were able to satisfy the needs of the institutions in return for the costs of the developers’ salaries
This has transformed an organization into 70% self-reliance in providing its various programs and applications, and implementing digital transformation
Nahda University has taken quick and innovative steps in the global plan for digital transformation, as it has created programs and applications that serve the educational process, in addition to the administrative and financial aspects in an integrated manner that helps the administration to make decisions based on statistics and data analysis. Many technical matters that help in the safety and stability of the efficiency of the work of those applications for which the university owns all intellectual rights have been considered, while allowing them to be modified, updated and integration with other systems.
1-Educational Programs
A system that helps the student to apply to university online and take entrance exams and paying the enrollment fees, which allows the university to organize the admission process in accordance with the admission criteria
A system for managing all student registration in terms of personal and educational data, academic record, college regulations and everything related to the student from the beginning of his admission until his graduation
It is a system that provides educational content to learners at anytime and anywhere via the Internet and in multiple forms commensurate with different circumstances and capabilities, and reduces assignments and training; It enables accurate follow-up of learning, it also helps the university to absorb large numbers of students and provide interactive education in remote areas while maintaining educational quality
A system for making electronic elections, which depends on the student’s code at the university to cast his vote, while maintaining complete confidentiality of data and not participating in the student more than once, which helps in the transparency of the elections
A system that facilitates the process of disbursing books for students through the use of the student card and the fingerprint machine, so that the book store official is not entitled to exchange any book, through which the system displays the books due to the student, and it is not permissible to disburse any books to the student other than those he studies; This is in addition to that the system preserves the previous exchange transactions made by the student in order to avoid the process of repeating the exchange for the same books
A system that aims to survey students’ opinions about the subjects they study and their opinion of the university in terms of the level of examinations, understanding of the lecturers, the quality of the place of teaching, and other matters that concern quality management in their application, considering the complete privacy of expressing the student’s opinion anywhere inside or outside the university
A system by which the attendance and departure process for lecturers and students is organized through a small electronic device that is permanently connected to the server to extract attendance rates, calculate deprivation rates and the salaries of faculty members
Providing all students with an E-Mail account in the name of the university @nub.edu.eg to be used in all Microsoft educational systems and all global services provided by international companies interested in developing education, in addition to downloading the latest versions of Windows, Office completely free of charge for every student and faculty member at the university
2-ERP
It aims to automate and manage all traditional manual accounting processes, which are often slow and erratic, to ensure obtaining accurate, fast, and orderly accounting data with confirmation of data confidentiality and no tampering with (accounts guide – check portfolio – cash receipts – temporary and permanent advances – advance payment – restrictions Journal – account statement – trial balance – income and expense lists – income statement – cost center)
allows the university to follow up the collection of tuition fees accurately of all kinds, as well as allowing the student to identify and extract a payment receipt from the Internet to pay the expenses
It aims to manage fixed assets in terms of asset evaluation, pricing, depreciation calculation, and linking it to the university’s accounting system; This is through adding, modifying, and deleting assets – buildings – covenant owners; Link it to the original and the place of the original
management of all stores (general store – hospital store – chemical store – pharmacy – tools library – systems and information management store – bookstore ………. etc.)
It aims at facilitating the human resources management process in terms of registration of employee personal data, wage operations and calculation, attendance record, leave record, permissions and everything related to the employee from the beginning of his appointment until the end of his service
An advertising site to introduce the university by presenting the university’s news, its various activities, the agenda of events and distinguished videos, in addition to the profile of each college, through a distinct group of pages of a distinct nature that attract visitors and link to social networking sites
It aims to facilitate the process of managing university hosts and their buildings and assigning students to rooms in an easy and smooth way in dealing and saving time and effort, as the university owns 8 hosts and rooms of different equipment and capacity
A system that monitors entry and exit to the campus and university Hosts, in addition to some important sectors in the university, as the doors of those sectors are only opened through authorized persons from the fingerprint or the magnetic card.
A system that distributes visitors and student inquiries to student affairs staff according to specialization and work intensity for each employee, as is the case with customer service systems that serve many customers at the same time, in addition to publishing news and instructions for students systems that serve many customers at the same time, in addition to publishing news and instructions for students
It is a system that allows all university employees to submit applications through a unified platform to take the required administrative approvals for permissions, vacations, and assignments, in addition to displaying their attendance and departure record.
A system for receiving technical support requests submitted by the Information Technology Department and distributing them to the specialists to solve them to be followed up very accurately, in addition to taking the opinions of service applicants to evaluate the ICT engineers
A system through which alert campaigns are sent to students and publicity via SMS text messages, which allows quick and effective communication in urgent matters.
A system for following-up teaching hospital and clinics patients, from following up on visits, history of patients, the treating doctor, and examinations conducted on the patient, in addition to the financial aspects.