Final Presentation Tuesday, April 21 st, 2009 Project Advisor: Dr. Whit Smith Group Members - Chris A. Higginbotham -John Lewis - Nikhail Singh.

Slides:



Advertisements
Similar presentations
Copyright 2006 Mid-City Offices Systems. Busy people… How would your business be affected, if you suddenly lost all of your computer data? Rush through.
Advertisements

Network Login Username Login not case sensitive, but password is Password changes Keeps history of last 3 passwords Must be alpha-numeric & or use upper/lowercase.
© El-Helw Guy Nickerson Voicu | ECE4884L01WS3 1 The Atlanta Day Shelter for Women and Children Technical Infrastructure Improvement Strategy Sarah El-Helw.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
Group Presentation Design and Implementation of a company- wide networking & communication technologies strategy 9 th December 2003 Prepared By: …………
Welcome to Computing in Geoscience! A Brief Introduction to Computing at the University of Leicester. Andrew Myers. Please.
Unit 11 - Computer Networks Assignment B: Design a Computer Network
A+ Guide to Software, 4e Chapter 11 Supporting Printers and Scanners.
1 of 13 Back to Start Working Remotely Your company’s Windows SBS computer network makes it easy for you and your coworkers to work remotely—and to stay.
Meditech Remote Access Training September 2011 Page 1.
Providing Onboard and Onsite Ticketing Solutions to the Travel and Tourist Industry 1.
Moving to Win 7 Considerations Dean Steichen A2CAT 2010.
Welcome to Networking! 1. Connect your computer to the network with a cable 2. Copy the Networking folder from the flash drive to the computer or your.
Comprehensive IT Consulting Services an innovative approach to business.
MAINTAINING AND TROUBLESHOOTING COMPUTER SYSTEMS UNIT 6.
SWU Technology and Services for enrolled students Mike Preusz Information Technology.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
1 NTC TCS Training Dallas 2010 TaxWise Online (TWO) Practical Notes and TWO Wireless.
Elite Networking & Consulting Presents: Everything You Wanted To Know About Data Insurance* * But Were Afraid To Ask Elite Networking & Consulting, LLC,
Court IT Issues Windows XP Problem April 8, 2014 Microsoft Ends Security Updates April 9, 2014 XP Computers will contract an OS Infection as soon.
Natick Public Schools Technology Update September 11, 2006 Dennis Roche, CISA Director of Technology.
Module 4: Add Client Computers and Devices to the Network.
SLIR Computer Lab: Orientation and Training December 16, 1998.
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
Sterling High School © University of Houston 2004 Slide Number 1 OCTE2338 – Technology in the Community Team 5 Barbara Lipka, Steve Griesmyer, Phillip.
15 Maintaining a Web Site Section 15.1 Identify Webmastering tasks Identify Web server maintenance techniques Describe the importance of backups Section.
Expanding and Improving the Technical Infrastructure of the Atlanta Day Shelter for Women and Children Project Advisor Whit Smith Group Members - Taylor.
BUCS / Department of Pharmacy & Pharmacology Pharmacy & Pharmacology Computing Services Pascal Loizeau Computing Services Supporter Dept. of Pharmacy &
DECS Community IT DIVISION OF ENGINEERING COMPUTING SERVICES Michigan State University College of Engineering.
Information Services June 2015 Information Services June 2015 Information Services_ ctybrd16june15.1.
Keeping you Running Part I Experiences in Helping Local Governments Develop Cyber Security and Continuity Plans and Procedures Stan France & Mary Ball.
Chapter 16 Designing Effective Output. E – 2 Before H000 Produce Hardware Investment Report HI000 Produce Hardware Investment Lines H100 Read Hardware.
Welcome! West Allis: Yes you can!. Terms: Data – Any form of information stored in a computer Data – Any form of information stored in a computer Database.
7 7 Chapter 7 The University Lab: Conceptual Design Database Systems: Design, Implementation, and Management 4th Edition Peter Rob & Carlos Coronel.
Royal Latin School. Spec Coverage: a) Explain the advantages of networking stand-alone computers into a local area network e) Describe the differences.
{ Active Directory Security Why bother?.   Law #1: Nobody believes anything bad can happen to them, until it does   Law #2: Security only works if.
© CCI Learning Solutions Inc. 1 Lesson 5: Basic Troubleshooting Techniques Computer performance Care of the computer Working with hardware Basic maintenance.
ICT Standards and Guidelines The Structure of the Project Akram Najjar CNSI – Senior Consultant Director of InfoConsult.
St. Agnes School Technology for Teachers Acceptable Protocol.
Preliminary Design Review Monday, March 25 th, 2009 Project Advisor: Dr. Whit Smith Group Members - Chris A. Higginbotham -John Lewis - Nikhail Singh.
Natick Public Schools Technology Update April 23, 2007 Dennis Roche, CISA Director of Technology.
LESSON 4 COMPUTER MAINTENANCE BY: Morgan Bradley.
Computer Support for the Atlanta Day Shelter for Women and Children.
Networks.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
Tech Competencies for the 21st-Century Librarian Starr Hoffman Librarian for Digital Collections University of North Texas Libraries San Antonio Public.
Chapter 3 Installing and Learning Software. 2Practical PC 5 th Edition Chapter 3 Getting Started In this Chapter, you will learn: − What is in an application.
Business Data Communications, Fourth Edition Chapter 11: Network Management.
Our Company What your are Getting If your workstation or laptop has been giving you problems, we can fix it and restore your productivity without adding.
Epworth Villa Tony Gaeddert Network Administrator Men’s Coffee August 5, 2002 Computers and Technologies.
MOE – Experience 1.What do you get 2.It just works 3.Same look and feel across the university 4.Your documents and desktop available.
Expanding and Improving the Technical Infrastructure of the Atlanta Day Shelter for Women and Children Project Advisor Whit Smith Group Members - Taylor.
Ready for prime time Final version of Windows Free upgrade until July 29, 2016 New features Works on most computers < 6 years old Windows 10.
Toolooa SHS BYOD Parent Information Night. Why is BYOD (Bring Your Own Device)happening? The current hire devices were Federally funded and the funding.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Introduction TO Network Administration
I NTRODUCTION TO N ETWORK A DMINISTRATION. W HAT IS A N ETWORK ? A network is a group of computers connected to each other to share information. Networks.
John Samuels October, Why Now?  Vista Problems  New Features  >4GB Memory Support  Experience.
Staff Induction Log On Credentials & Security Resources Web Applications / Software LanSchool Projectors / Cameras / Printing Laptops / WiFi.
 Computer hardware refers to the physical parts of a computer and related devices. Internal hardware devices include motherboards, hard drives,
We are a HP tech support provider for HP users facing different level of technical issues with their HP devices like :- Desktop Computers, Laptops, Printers,
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Computer Technology. HardwareSoftware  Hardware ◦ Monitor ◦ Keyboard ◦ Hard disk drive ◦ Mouse ◦ CPU (Central Processing Unit) ◦ Graphic and sound cards.
Chapter 3 Installing and Learning Software
Information Technology (IT)
Unit 27: Network Operating Systems
Networks Software.
Information Technology Services (ITS) Quick Start for New Hires
Discovering Technology
Websites, Computers, and Resources
Presentation transcript:

Final Presentation Tuesday, April 21 st, 2009 Project Advisor: Dr. Whit Smith Group Members - Chris A. Higginbotham -John Lewis - Nikhail Singh

Design Approach Consulting thought process Evaluated list of problems and objectives Determined priorities for these issues Adapted to a dynamic environment

Original Expected Tasks 1. Interface volunteer portion of Donor Perfect with volunteers. 2. Donation Station in rear of building. 3. Install a PC in the volunteer check-in area. 4. Badges – Issue guests badges with bar codes. 5. Check the badges against list and notify if security alerts. 6. Download/upgrade additional Microsoft Software. 7. Website Upgrades. Do not touch donation portion. 8. Implement Donor Perfect Software. 9. Virus/Spyware on Server and PC’s. 10. Install UPS’ and surge protection on switches and DSL. 11. Interface ups software with ADSWC server so that it will do a controlled shutdown. 12. Map out Ethernet cabling. 13. Implement stronger passwords. 14. Implement Flash drives with USB extension cables. 15. Move printers onto print server for network printing. 16. Repair two teen lab computers 17. Use Database for verifying volunteers. k

Tasks Performed - Promised 1.Interface volunteer portion of Donor Perfect with volunteers. 2.Donation Station in rear of building. 3.Install a PC in the volunteer check-in area. 4.Badges – Issue guests badges with bar codes. 5.Check the badges against list and notify if security alerts. 6.Download/upgrade additional Microsoft Software. 7.Website Upgrades: Do not touch donation portion. 8.Worked with Donor Perfect to get the software installed onto the server. 9.Installed Symantec Antivirus and Malwarebytes onto 31 PC’s. 10.Install UPS’ and surge protection on switches and DSL. 11.Interface ups software with ADSWC server so that it will do a controlled shutdown. 12.Mapped out Ethernet cabling. 13.Added Admin passwords to all new PC’s in case users forget their password. 14.Implement Flash drives with USB extension cables in both the training lab and in job counseling. 15.Move printers onto print server for network printing. 16.Repaired two teen lab computers and several of the mice. 17.Set up volunteer scheduling using Volgistics.

Tasks Performed - Additional 18.Moved Symantec and MS Office downloads into easily accessible folders on the server. 19.Fixed Fontaine’s Adobe and Webmail problem. 20.Worked with office fax machine to get it working again. 21.Tried to install new wireless router for laptop usage. 22.Worked for many days on determining and labeling good monitors and PC’s in the storage room. Repaired many of the existing PC’s. 23.Worked on security camera system to determine status of cameras and cabling. 24.Updated Fontaine’s computer. 25.Fixed domains on Ebony’s PC because it wouldn’t log in. 26.Set up GT user/password accounts. 27.Constructed secure password list. 28.Worked for three days on getting rid of malware on the training lab computers. 29.Fixed the Internet connection problems in the training labs caused by the installation of the Symantec Antivirus on 3-4 PC’s. 30.Urgent repair of Cynthia’s PC. The hard drive crashed and needed to be replaced and to be reloaded with all of the software. 31.Urgent repair of Deb’s PC. The hard drive crashed and needed to be replaced and to be reloaded with all of the software. Also, the motherboard was bad on it. 32.Worked to find “lost” data on the Access database. 33.Worked with “Whentohelp” software to see if it would integrate with the web site.

Tasks Performed - Additional 34.Upgraded Microsoft Office 2007 on a couple of PC’s and put vrs on several others. 35.Worked unsuccessfully to uninstall the K9 software from the job counseling PC’s. 36.Worked with Nancy on problem with Thunderbird program. Installed MS Outlook, but later went back and reinstalled Thunderbird software. 37.Made many modifications/corrections to the web site. Do not touch donation portion. 38.Installed Donor Perfect Software onto five additional PC’s. 39.Constructed FAQ list for future Teams. 40.Constructed Volgistics document for future Teams. 41.Constructed Badge /Barcode Scanner document for future Teams. 42.Constructed website update document for future Teams. 43.Constructed contact list document for future Teams. 44.Constructed general tips document for future Teams. 45.Reset “Deep Freeze” application on job counseling PC’s. 46.Replaced Shirley’s printer. 47.Installed two new PC’s in Engineering office. 48.Ran Camera/power cable for new camera at the donation station. 49.Ran new CAT-5e cable for new donation station PC. 50.Updated Adobe Acrobat software on Fontaine’s PC. 51.Fixed Gean Jones’ logon problem. 52.Trained Deb on Volgistics usage for volunteers.

Projected vs. Actual Projected Tasks by Category Actual Tasks by Category

Project Objectives Website Modifications Shelter Security Hardware Issues Database Integration

Website Modifications Integrated online volunteer applications Provided volunteers with autonomous scheduling General website editing and maintenance Provided user guide for website maintenance to the staff

Volunteer Page

Volunteer Interface

Volgistics Functionality  Database to store volunteer information  Print volunteer reports  Schedule volunteers  Allows volunteers to sign-in and sign-out on site  Eliminates paper records

Volgistics Interface

Shelter Security ID Badges Virus/Malware Security Cameras

ID Badges

Virus/Malware Symantec Constant Virus Protection Malwarebytes Anti-Malware Protection from Malware (Free Edition)‏

Security Camera Status Found three dead security cameras All of the cables are functional Ran new cabling for Donation Station.

Hardware Issues Networking Computer Repair

Networking Mapped out network cabling Set up network printing for several PC’s Active Directory – User Accounts Web filtering (K9 software)‏

Computer Repair Hardware  Hardware Failures (PC’s, Printers, Monitors)‏ Software  Virus and Spyware  Software Installation  Internet Speed  Database Issues  Largest Time Absorber

Time Spent Percentage of Time Spent - Projected Percentage of Time Spent - Actual

Donor Perfect and Volgistics Integration Install the DonorPerfect program and ensure the system is functioning Collect volunteer records using Volgistics Integrate Volgistic's records with the DonorPerfect database

Access Database Integration Before After

Access Database Integration Decodes Barcode Output

Costs Material Costs: Barcode Scanner and Holder = $ Barcode Scanner and Holder = $ Donor Perfect Software = $ Donor Perfect Software = $ Donor Perfect Import Module = $ $100/year recurring cost. Donor Perfect Import Module = $ $100/year recurring cost. CAT-5e cabling = $ CAT-5e cabling = $ COAX cabling = $ COAX cabling = $ Volgistics = $130.00/month Volgistics = $130.00/month Total Material Costs = $ $1660/year recurring cost. Total Material Costs = $ $1660/year recurring cost. Still Need to purchase security camera equipment for approximately $ Still Need to purchase security camera equipment for approximately $ Labor: Labor Hours: 3.5 hours/day per Student = 10.5 Hours/day Labor Hours: 3.5 hours/day per Student = 10.5 Hours/day X 27 days X 27 days = 283 Total Hours

Future Needs Order more USB flash drives. Additional repair equipment. Acquire and install a wireless router. Install managed switches to be able to monitor network usage and bandwidth statistics. Sell all donated equipment on Craig’s list to bring in additional revenue. Install new cameras and power regulators. Implement badges to guests. Access Database optimization Active resident malware (purchase Malewarebytes). Fix web filtering software. Ensure that critical staff PC’s are being backed up on the server (set up separate backup process so that it doesn’t interfere with main server backup process). Reinforce staff training on all new software. Work with new group to lessen learning curve. Tell them to allot more time for maintenance needs. Important Documents Password List

Questions?