Technical Troubleshooting 1. Disclaimer Vendor technology is being shared to illustrate this field and is not an endorsement of the product or vendor.

Slides:



Advertisements
Similar presentations
IT Technical Support South Nottingham College. Aims Knowledge of the Registry Discuss the tools available to support a technician Gain an understanding.
Advertisements

Creating HIPAA-Compliant Medical Data Applications with Amazon Web Services Presented by, Tulika Srivastava Purdue University.
IBM SMB Software Group ® ibm.com/software/smb Maintain Hardware Platform Health An IT Services Management Infrastructure Solution.
HIPAA Myths and Realities for Physician Practice Managers Presented by Shana Wolfe, CHC Corporate Compliance Officer, Washington County Health System Co-chair.
CASL Computer Programs Provisions and Challenges in Specific Vertical Sectors Michael Fekete (Osler) Howard Fohr (BlackBerry Limited) April 30, 2014.
Nocturne Requirements (Element14 discussion on UI) Caregiver 1. Essential - Mobile interface 2. Essential - Some form of user interface 3. Essential -
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
2014 HIPAA Refresher Omnibus Rule & HIPAA Security.
Network+ Guide to Networks, Fourth Edition
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Transform your desktop with virtualization. 22 Agenda Evolution of VDI VDI Solution VDI Use Cases Questions & Answers.
Chapter 19: Network Management Business Data Communications, 4e.
© Prentice Hall CHAPTER 1 Managing IT in an E-World.
S.R.F.E.R.S. State, Regional, and Federal Enterprise Retrieval System Inter-Agency & Inter-State Integration Using GJXML.
Discovering Computers Fundamentals, 2011 Edition Living in a Digital World.
Hubert Kairuki Memorial University Kaizilege Karoma.
Network+ Guide to Networks, Fourth Edition Chapter 1 An Introduction to Networking.
Mobile Data Sharing over Cloud Group No. 8 - Akshay Kantak - Swapnil Chavan - Harish Singh.
Chapter 13 Network Management and Operations. Agenda Objectives Scope Functions Software Security Physical Facility Staffing.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Microsoft ® Application Virtualization 4.5 Infrastructure Planning and Design Series.
Desktop in the Clouds Using Virtualization to Extend Client Outreach and Protect Data.
Nagios as a PC Health Monitor Sean
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
Computer Associates Solutions Managing eBusiness Catalin Matei, April 12, 2005
©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties MORE, BETTER, SIMPLER Security Oded Gonda.
CredoGov VDI Introduction James Gunn
Besoin Client Réponse Service satisfaction IGS BLAGNAC Cours LAN-010 CUSTOMER RELATIONSHIP MANAGEMENT Octobre 2013, Marie Claude SALIBER.
Network+ Guide to Networks, Fourth Edition Chapter 1 An Introduction to Networking.
SOFTWARE.
© 2006 Avaya Inc. All rights reserved. Avaya Services Michael Dundon Business Development Manager.
What does a Computer Do?. What is a Computer? A computer is an electronic device, operating under the control of instructions stored in its own memory,
Basic Concepts Of CITRIX XENAPP.
Utilities, Customers & SMS Rudi Leitner. Who in this room has a mobile phone? Who in this room has ever sent a text (SMS) message?
Sage Timberline Hosting
Advantages Cloud Computing. customers only pay for the access and interfaces that they need. The customer buys only the services they need Cost Advantages.
Oncor Electric Delivery October 2010 Oncor’s 500 In-Home Monitor Program.
University Health Care Computer Systems Fellows, Residents, & Interns.
IT Introduction to Information Technology CHAPTER 01.
Component 16-Professionalism/Customer Service in the Health Environment Unit 5-Regulatory Issues: HIPAA and Standard Precautions This material was developed.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
Patient Confidentiality and Electronic Medical Records Ann J. Olsen, MBA, MA Information Security Officer and Director, Information Management Planning.
Module 15 Managing Windows Server® 2008 Backup and Restore.
Imagine a health system that focuses on health, not just health care. Imagine a sustainable health system with one goal: to improve the lives of the people.
1 Chapter 12 Enterprise Computing. Objectives Overview Discuss the special information requirements of an enterprise-sized corporation Identify information.
Component 3-Terminology in Healthcare and Public Health Settings Unit 16-Definitions and Concepts in the EHR This material was developed by The University.
Apple Inc ISO. Organisation chosen Apple Store The company designs, manufactures and markets personal computers, portable digital.
Trouble ticket
BlueOS 1.5 Hello and Blue is loading your system files, and if you are a new user, welcome to Blue, our virtual assistant, Clara, will guide you on how.
Network management Network management refers to the activities, methods, procedures, and tools that pertain to the operation, administration, maintenance,
Ellis Paul Technical Solution Specialist – System Center Microsoft UK Operations Manager Overview.
Staff Assessment Technology Services Department Palmyra Area School District.
The Right Choice for Call Recording Voice Documentation for Healthcare HIPAA Compliant Communications Documentation.
“Candidates were not advantaged by defining every type of operating system provided as examples in the explanatory notes of the standard. Candidates who.
By the end of this lesson you will be able to explain: 1. Identify the support categories for reported computer problems 2. Use Remote Assistance to connect.
Ticket to Work Virtual Job Fair Webinar Series for Service Providers.
Terminology in Healthcare and Public Health Settings Electronic Health Records Lecture b – Definitions and Concepts in the EHR This material Comp3_Unit15.
Hubert Kairuki Memorial University Kaizilege Karoma CS200 - Computer.
Benefits of IT Outsourcing Services
 1- Definition  2- Helpdesk  3- Asset management  4- Analytics  5- Tools.
Cisco Unified Operations Manager Proactive Voice Troubleshooting
Mobile office system for personnel positioning
Physical Architecture Layer Design
Juno Technical Support Number
Juno Technical Support Number
Do You Want To Secure Your Gmail Account
Canon Printer Support Phone Number For Canon Users.
Presentation transcript:

Technical Troubleshooting 1

Disclaimer Vendor technology is being shared to illustrate this field and is not an endorsement of the product or vendor. 2

Statement of Purpose Discuss structures to efficiently address system issues Review ways to separate issues, identify the defect source and isolate issues Discuss intelligent systems that identify the defect and send notification for maintenance 3

Topics Familiarize students with different troubleshooting approaches Familiarize the students with issue isolation methodology Discuss smart systems and applications capabilities Technologies used for remote support 4

Terminology Troubleshooting: Help Desk: Triage Script: Secondary Support: Manager On Call: GUI: 5

Terminology continued Severity: CRM: Primary Support: VPN: VM: Monitoring Software: Encryption: Mobile Support Apps: 6

Virtualization o Virtualization is an architecture that moves all processing from the real physical desktop to a virtual machines(s) running on powerful servers in a protected data center 7

Virtualization - Advantages o There is NO local hard drive o Also these Graphical User Interface (GUI) Terminals use much less electricity 8

Virtualization – Continued. 9

Troubleshooting Script Troubleshooting can be a challenge, but is essentially just a method of problem solving. Fortunately, many products have the ability to monitor the network and report a problem when it occurs. 10

Triage Script Many triage scripts will have parts, or all, of the following key elements: Issue Identification Scope Identification Problem Isolation Contact party in charge of maintaining system with issue Issue fixing Fix test Bring system back online Send communication regarding problem resolution 11

Case Study – Help Desk Triage Common in many Help Desks are series of support scripts, called triage scripts, that are used to standardize the way common issues are resolved. These scripts are used to identify possible solutions that the help desk can use to resolve the issue, and if not successful, they would contact the experts with that particular issue. These are loaded into the software that is used for managing and tracking customer support. 12

Case Study – Help Desk Triage An example dialogue would be: Help Desk agent [from script] : “Thank you for calling the ABC help desk. This is _(insert name), May I get your name and please tell me how can I help you?” User: “Hi, my name is Mateo and my computer’s keyboard is not working anymore.” This is issue identification Help Desk agent: [from script] “Hello Mateo, I apologize for the difficulty that you are having, and I am happy to assist in resolving this for you. Is this the only issue that you are currently having?” Mateo: “Yes.” This is scope identification and problem isolation, the only issue is the keyboard not working 13

Case Study – Help Desk Triage At this point we can assume the only issue is that the keyboard is not working as reported by the user. Now the Help Desk agent would refer to a “keyboard issues” script which would guide them thru the process of resolving keyboard issues in a standard way. Example ‘Resolving Keyboard issues’ script: Confirm with the user that the keyboard is plugged in After reviewing, the Help Desk agent would then resume the dialogue with the user. 14

Case Study – Help Desk Triage The dialogue would continue with… Help Desk agent [from script] : “In the past when other customers have experienced this issue, they have found that the keyboard was not properly plugged into the computer. Could you please unplug and re-plug the keyboard to the computer.” Mateo: “OK, yes, I have done that, and my computer’s keyboard is working again. Thank you!” This is issue fixing, and confirming the issue is resolved Help Desk agent [from script] : “I am glad that I could assist you, was there anything else that I could help you with today?” Mateo: “Nope, I am all set, thanks again!” Help Desk agent [from script] : “Happy to help, have a good day.” 15

Case Study – Help Desk Triage (Summary) In Summary, the Help Desk agent had all the language to use to resolve this issue over the phone with the help of scripting. Also, by utilizing scripting, a standard approach is used to resolve the issue, making for better customer service. 16

HIPAA Review Health Information Portability & Accountability Act of The Office for Civil Rights enforces the HIPAA Privacy Rule, which protects the privacy of individually identifiable health information; the HIPAA Security Rule, which sets national standards for the security of electronic protected health information; and the confidentiality provisions of the Patient Safety Rule, which protect identifiable information being used to analyze patient safety events and improve patient safety. 17

Class Exercise 1. Please define the following terms: VPM, VM and Triage Script 2. Give examples of how these terms are utilized in a healthcare setting. 18

References technical_briefs/mobility-wlan-troubleshooting- healthcare-tb.pdf technical_briefs/mobility-wlan-troubleshooting- healthcare-tb.pdf shooting-technology-problems.htmlhttp://geekdoctor.blogspot.com/2010/08/trouble shooting-technology-problems.html 19