The Handover Process P6.

Slides:



Advertisements
Similar presentations
IT Service Continuity Management
Advertisements

P3, M2,M3,M4.
KS4 ICT BTEC Diploma Guide to your ICT options in KS4.
Backing Up Your Computer Hard Drive Lou Koch June 27, 2006.
Software Engineering – University of Tampere, CS DepartmentJyrki Nummenmaa INSTALLATIONS Software installation accommodates software.
ICASAS305A Provide Advice to Clients
Unit 1 Living in the Digital WorldChapter 4 – Smart Working This presentation will cover the following topics: Software choices Name:
BTEC Unit 29 – Lesson 02 Preparing to Change
Rational Unified Process Workflows. The Rational Unified Process.
Software Project Transition Planning
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 Systems Design, Implementation, Maintenance, and Review Chapter 13.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 12: Managing and Implementing Backups and Disaster Recovery.
Hands-On Microsoft Windows Server 2003 Chapter 2 Installing Windows Server 2003, Standard Edition.
Pertemuan Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
Week:#14 Windows Recovery
COMPUTER BACKUP A disaster will happen to you one day…an accidentally deleted file, a new program that caused problems or a virus that wreaked havoc, wiping.
HOMEWORK PAGE STAND ALONE PROGRAMS FUNCTION ON THEIR OWN AND SOMETIMES CANNOT SHARE DATA WITH OTHER PROGRAMS. INTEGRATED SOFTWARE COMBINES.
Chapter 10 Information Systems Controls for System Reliability—Part 3: Processing Integrity and Availability Copyright © 2012 Pearson Education, Inc.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
Release & Deployment ITIL Version 3
© 2006 Jupitermedia Corporation Webcast TitleSuccessful Rollout Planning 1 January 19, :00pm EST, 11:00am PST George Spafford, President Spafford.
Systems Life Cycle A summary of what needs to be done.
Client Management. Introduction In a typical organization there are a lot of client machines used for day to day operations Client management is a necessary.
ICAT3025A - Install and optimise operating system Information and Communications Technology (ICA05)
Business Continuity and Disaster Recovery Chapter 8 Part 2 Pages 914 to 945.
Tutorial 11 Installing, Updating, and Configuring Software
Programming and Application Packages
11 SECURITY TEMPLATES AND PLANNING Chapter 7. Chapter 7: SECURITY TEMPLATES AND PLANNING2 OVERVIEW  Understand the uses of security templates  Explain.
IT Essentials 1 v4.0 Chapters 4 & 5 JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Designing Smart Cities Conference University of Strathclyde, Glasgow 31 st March 2015 “Regulating Smart Cities: Policing & Privacy” Paul Mackie Chief Executive.
Lesson 14: Installing and Uninstalling Programs how to install a new program what to do if the new program doesn’t work how to uninstall a program © CCI.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 5 Windows XP Professional McGraw-Hill.
Concepts of Database Management Eighth Edition
Chapter 4: Overview of Preventive Maintenance
Please Note: Information contained in this document is considered LENOVO CONFIDENTIAL For Lenovo Internal Use Only Do Not Copy or Distribute!! For Lenovo.
 FFC backs up all of its data each day. It stores its most recent daily backup once a week at a company owned offsite location. FFC also stores the most.
Installing Windows Vista Lesson 2. Skills Matrix Technology SkillObjective DomainObjective # Performing a Clean Installation Set up Windows Vista as the.
End HomeWelcome! The Software Development Process.
1 Maintain System Integrity Maintain Equipment and Consumables ICAS2017B_ICAU2007B Using Computer Operating system ICAU2231B Caring for Technology Backup.
Chapter 6 Protecting Your Files. 2Practical PC 5 th Edition Chapter 6 Getting Started In this Chapter, you will learn: − What you should know about losing.
Mr C Johnston ICT Teacher BTEC IT Unit 05 - Lesson 13 Routine Network Management Tasks.
Chapter 3 Installing and Learning Software. 2Practical PC 5 th Edition Chapter 3 Getting Started In this Chapter, you will learn: − What is in an application.
Planning an Installation and d Upgrade. Learning Objectives  To learn how to plan an upgrade and installation.
P3 - prepare a computer for installation/upgrade By Ridjauhn Ryan.
GCSE ICT Systems Analysis. Systems analysis Systems analysis is the application of analytical processes to the planning, design and implementation of.
Page 1 of 38 Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Please Note: Information contained in.
Objectives  Legislation:  Understand that implementation of legislation will impact on procedures within an organisation.  Describe.
Understand why software needs installing or upgrading
Learning Outcomes 1. Know software installation processes 2. Be able to prepare for software installation 3. Be able to install and configure software.
Learning Intention Security of Information. Why protect files? To prevent unauthorised access to confidential information To prevent virus/corruption.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 4: Overview of Preventive Maintenance IT Essentials 5.0.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
P1 - Software licenses. Different types of license and software Single-user license Multi-user license Proprietary software Freeware Shareware.
Applications Software. Is a software used to carry out a particular task e.g. a game or word processor.
ICAICT201A USE COMPUTER OPERATING SYSTEM. USING THE CONTROL PANEL The Control Panel contains many options for configuring your computer, including: adding.
Chapter 3 Applications Software: Getting the Work Done.
Chapter 6 Protecting Your Files
CompTIA Security+ Study Guide (SY0-401)
Chapter 3 Installing and Learning Software
Processing Integrity and Availability Controls
Release Management Release Management.
Introduction to Operating Systems
Ian Ramsey C of E School GCSE ICT Smart working Software choices.
LO2 - Be Able to Design IT Systems to Meet Business Needs
What is Information Security?
Why Implement a Software Asset Management Plan?
Computer communications
DEPLOYING SECURITY CONFIGURATION
CIS MS Windows Operating System
Presentation transcript:

The Handover Process P6

Handover Procedures Task Your junior staff are very good at implementing and planning upgrades but there has been some issues in the company where the user acceptance testing hasn’t been carried out fully and consistently by all staff. You will create a user handover procedure that will explain fully explain - Configuration to meet user needs e.g. Having the language set to UK English in Office or setting up a virus scan every day at 18.00 hrs. You must design customer handover - training and testing, customer acceptance procedure, back-out procedures if there have been problems. This should include restoring data to the way it was prior to installation and upgrade ensuring that restored to prior point, copy of user data and image of hard drive. You should also explain about product registration, the benefits of registration; licensing, contractual implications and dongles This should be in the form of a Word Report

Assessment Criteria

What is Handover Fully functioning computer handed over to the customer Any issues found by the customer should be fixed however this should be avoided by thoroughly testing the system

Configuration to customer needs Does it work as expected Has configuration of softare been done e.g. virus updating etc

Handover to the customer/ user Formal handover and sign off to show that the customer is happy with the install This may include: Technical manuals User Acceptance Documentation User Acceptance Testing Any work to be re-done if user acceptance testing fails

Backing Out Procedures If the user acceptance testing fails and system cannot be fixed quickly then you must implement back out procedures Restore system and files to previous versions and uninstall new software or upgrade

Register Product with Vendors Explain what product registration is and what the purpose is Why is it important to the vendors What is the benefits to the organisation for registration

Licensing Explain what licencing is and EULA Explain other licences such as OEM and site license, open source licence, freeware licence

Contractual Implications Hat have you agreed to in the license agreement Are there any implications for the business for what you have agreed to in licence terms and conditions

Dongles A dongle may be used to allow software to work every time it is used. This is normally restricted from copying and means that software providers will control access

Data Integrity Ant change in computer software and hardware can result in damage to the data and systems must be put System Recovery Point is a type of backup snapshot that allows system to be rolled back to a certain time. These should be completed before each different type of upgrade and named appropriately If anything goes wrong these can be recovered

RegEdit You can also copy the registry data using regedit which will ensure the data registry is restored if any failure occurs for hardware and software

Copy of User Data Copying of user files and possible restore if fails Also can do full image of drive if needed. This takes a lot of time and should be last option if backups and files restore doesn’t work You can buy several different programs that will do a full image backup such as Norton Ghost