Preliminary Design Review Monday, March 25 th, 2009 Project Advisor: Dr. Whit Smith Group Members - Chris A. Higginbotham -John Lewis - Nikhail Singh.

Slides:



Advertisements
Similar presentations
This course is designed for system managers/administrators to better understand the SAAZ Desktop and Server Management components Students will learn.
Advertisements

Introduction to Computers Lecture By K. Ezirim. What is a Computer? An electronic device –Desktops, Notebooks, Mobile Devices, Calculators etc. Require.
Technology Staff: Patrick Kulbis and Bryan Smith
Network Login Username Login not case sensitive, but password is Password changes Keeps history of last 3 passwords Must be alpha-numeric & or use upper/lowercase.
© El-Helw Guy Nickerson Voicu | ECE4884L01WS3 1 The Atlanta Day Shelter for Women and Children Technical Infrastructure Improvement Strategy Sarah El-Helw.
Information and Technology Services Customer Services.
Installation and Deployment in Microsoft Dynamics CRM 4.0
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
Group Presentation Design and Implementation of a company- wide networking & communication technologies strategy 9 th December 2003 Prepared By: …………
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Project 2002 A Proposal Application Project 2002 Actions.
Unit 11 - Computer Networks Assignment B: Design a Computer Network
Computer Networks IGCSE ICT Section 4.
A+ Guide to Software, 4e Chapter 11 Supporting Printers and Scanners.
Welcome to Networking! 1. Connect your computer to the network with a cable 2. Copy the Networking folder from the flash drive to the computer or your.
Duties of a system administrator. A system administrator's responsibilities typically include:
SWU Technology and Services for enrolled students Mike Preusz Information Technology.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
A COMPUTER is an electronic device. Every computer performs 4 general operations: 1. Input 2. Process 3. Output 4. Storage.
1 NTC TCS Training Dallas 2010 TaxWise Online (TWO) Practical Notes and TWO Wireless.
Laptop Survival and Management Help Desk Services Pat Valiquette Mark Miller Campus tools – Fall 2006.
Elite Networking & Consulting Presents: Everything You Wanted To Know About Data Insurance* * But Were Afraid To Ask Elite Networking & Consulting, LLC,
Epworth Villa Tony Gaeddert Directory of MIS (Management Information Systems) Men’s Coffee August 20, 2007 Computers and Technologies Management Team.
Essential Computer Concepts
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
Natick Public Schools Technology Update September 11, 2006 Dennis Roche, CISA Director of Technology.
Keeping your computer current and trouble free Aaron Robertson.
SLIR Computer Lab: Orientation and Training December 16, 1998.
Affordable IT Solutions Copyright Scotts Computer Services 2003.
Sterling High School © University of Houston 2004 Slide Number 1 OCTE2338 – Technology in the Community Team 5 Barbara Lipka, Steve Griesmyer, Phillip.
Expanding and Improving the Technical Infrastructure of the Atlanta Day Shelter for Women and Children Project Advisor Whit Smith Group Members - Taylor.
IS Fall 2009 Chapter 3 8/31/2009. LOOKING AT THE PARTS 8/17/2009IS 2101/01---Fall
DECS Community IT DIVISION OF ENGINEERING COMPUTING SERVICES Michigan State University College of Engineering.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
Unit 5- Computer Software.  Identify how hardware & software interact  Explain how a software program works  Describe the difference between application.
Welcome! West Allis: Yes you can!. Terms: Data – Any form of information stored in a computer Data – Any form of information stored in a computer Database.
Royal Latin School. Spec Coverage: a) Explain the advantages of networking stand-alone computers into a local area network e) Describe the differences.
Final Presentation Tuesday, April 21 st, 2009 Project Advisor: Dr. Whit Smith Group Members - Chris A. Higginbotham -John Lewis - Nikhail Singh.
THE CVR NETWORK. The CVR Local Area Network (LAN)  The purpose of the network is to enhance productivity, provide users with access to resources, and.
Chapter 8 and Computer Hardware By: Holly Lusk. Hardware Selection Existing hardware that will address your need without any modifications. Existing hardware.
{ Active Directory Security Why bother?.   Law #1: Nobody believes anything bad can happen to them, until it does   Law #2: Security only works if.
Networks. A network is formed when a group of computers are connected together. Computers in a Local Area Network (LAN) are fairly close together, generally.
Section 2 Section 2.1 Identify hardware Describe processing components Compare and contrast input and output devices Compare and contrast storage devices.
Natick Public Schools Technology Update April 23, 2007 Dennis Roche, CISA Director of Technology.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Computer Support for the Atlanta Day Shelter for Women and Children.
Networks.
Chapter 3 Installing and Learning Software. 2Practical PC 5 th Edition Chapter 3 Getting Started In this Chapter, you will learn: − What is in an application.
Epworth Villa Tony Gaeddert Network Administrator Men’s Coffee August 5, 2002 Computers and Technologies.
CSCI 1033 Computer Hardware Course Overview. Go to enter TA in the “Enter Promotion Code” box on the bottom right corner.
---Troubleshooting step by step. Introduction This presentation will guide you through checking the network problems while you try to access Internet.
Expanding and Improving the Technical Infrastructure of the Atlanta Day Shelter for Women and Children Project Advisor Whit Smith Group Members - Taylor.
Introduction TO Network Administration
KEYBOARDING 1 Computer Basics. Definitions Computer  An electronic, digital, programmable machine that has four functions  accepts input  processes.
I NTRODUCTION TO N ETWORK A DMINISTRATION. W HAT IS A N ETWORK ? A network is a group of computers connected to each other to share information. Networks.
Chapter 1: Computer Basics Instructor:. Chapter 1: Computer Basics Learning Objectives: Understand the purpose and elements of information systems Recognize.
McAfee Antivirus Support By PCCare247 PCCare247 – Caring For Your PCs 24x7.
Staff Induction Log On Credentials & Security Resources Web Applications / Software LanSchool Projectors / Cameras / Printing Laptops / WiFi.
 Computer hardware refers to the physical parts of a computer and related devices. Internal hardware devices include motherboards, hard drives,
Windows Technical Support Service. Microsoft Windows Support to Resolve All Issues Windows blue screen error and frequent reboots. Quickbooks Outlook.
Lecture 1: Network Operating Systems (NOS)
Fix Computer Problems By 1Akal 1Akal – Technology Services for Home & Business.
BNU - HKBU United International College 信息科技服务中心 Information Technology Services Centre.
Computer Technology. HardwareSoftware  Hardware ◦ Monitor ◦ Keyboard ◦ Hard disk drive ◦ Mouse ◦ CPU (Central Processing Unit) ◦ Graphic and sound cards.
START. A room full of computers Two or more computers connected together in order to communicate A computer that can communicate with every living thing.
Chapter 3 Installing and Learning Software
Section II Terms Emily Stepp.
Unit 27: Network Operating Systems
Networks Software.
Discovering Technology
Presentation transcript:

Preliminary Design Review Monday, March 25 th, 2009 Project Advisor: Dr. Whit Smith Group Members - Chris A. Higginbotham -John Lewis - Nikhail Singh

Project Objectives Website Modifications and Maintenance Shelter Security Hardware Issues Database Integration

Design Approach Consulting thought process Evaluate list of problems and objectives Determine priorities for these issues Adapt to a dynamic environment

Expected Tasks 1.Interface volunteer portion of Donor Perfect with volunteers. 2.Donation Station in rear of building. 3.Install a PC in the volunteer check-in area. 4.Badges – Issue guests badges with bar codes. 5.Check the badges against list and notify if security alerts. 6.Download/upgrade additional Microsoft Software. 7.Website Upgrades. Do not touch donation portion. 8.Implement Donor Perfect Software. 9.Virus/Spyware on Server and PC’s. 10.Install UPS’ and surge protection on switches and DSL. 11.Interface ups software with ADSWC server so that it will do a controlled shutdown. 12.Map out Ethernet cabling. 13.Implement stronger passwords. 14.Implement Flash drives with USB extension cables. 15.Move printers onto print server for network printing. 16.Repair two teen lab computers 17.Use Access Database for verifying volunteers. k

Tasks Performed 1.Interface volunteer portion of Donor Perfect with volunteers. 2.Donation Station in rear of building. 3.Badges – Issue guests badges with bar codes. 4.Upgrade Microsoft Office 2007 on a couple of PC’s and put vrs on several others. 5.Website Upgrades: Set up volunteer scheduling using Volgistics. 6.Made many modifications/corrections to the web site. Do not touch donation portion. 7.Worked with Donor Perfect to get the software installed onto the server. 8.Installed Donor Perfect Software onto five PC’s. 9.Installed Symantec Antivirus and Malwarebytes onto 31 PC’s. 10. Install UPS’ and surge protection on switches and DSL. 11.Interface ups software with ADSWC server so that it will do a controlled shutdown. 12.Mapped out Ethernet cabling. 13.Added Admin passwords to all new PC’s in case users forget their password. 14.Implement Flash drives with USB extension cables in both the training lab and in job counseling. 15.Fixed Fontaine’s Adobe and Webmail problem. 16.Worked with office fax machine to get it working again. 17.Tried to install new wireless router for laptop usage.

Tasks Performed 1.Repaired two teen lab computers and several of the mice. 2.Worked for several days on determining and labeling good monitors and PC’s in the storage room. 3.Worked on security camera system to determine status of cameras and cabling. 4.Updated Fontaine’s computer. 5.Fixed domains on Ebony’s PC because it wouldn’t log in. 6.Set up GT user/password accounts. 7.Constructed password list. 8.Worked for three days on getting rid of malware on the training lab computers. 9.Fixed the Internet connection problems in the training labs caused by the installation of the Symantec Antivirus on 3-4 PC’s. 10.Urgent repair of Cynthia’s PC. The hard drive crashed and needed to be replaced and to be reloaded with all of the software. 11.Urgent repair of Deb’s PC. The hard drive crashed and needed to be replaced and to be reloaded with all of the software. Also, the motherboard was bad on it. 12.Worked to find “lost” data on the Access database. 13.Worked with “Whentohelp” software to see if it would integrate with the web site. 14.Worked with Nancy on problem with Thunderbird program. Installed MS Outlook, but later went back and reinstalled Thunderbird software. 15.Worked to uninstall the K9 software from the job counseling PC’s.

Projected vs. Actual Projected Tasks by Category Actual Tasks by Category

Website Modifications Integrate online volunteer applications Provide volunteers with autonomous scheduling General website editing and maintenance Provide user guide for staff

Volunteer Page

Volunteer Interface

Shelter Security ID Badges Virus/Malware Security Cameras

ID Badges

Virus/Malware Symantec Constant Virus Protection Malwarebytes Anti-Malware Protection from Malware (Free Edition)‏

Security Camera Status Found three dead security cameras All of the cables are functional

Hardware Issues Networking Computer Repair

Networking ● Map out network cabling Set up network printing for several PC’s Active Directory – User Accounts Web Filtering (K9)‏

Computer Repair ● Hardware ● Hardware Failures (PC’s, Printers, Monitors)‏ ● Software ● Virus and Spyware ● Software Installation ● Internet Speed ● Database Issues ● Largest Time Absorber

DonorPerfect and Volgistics Integration Install DonorPerfect Collect volunteer records using Volgistics Integrate Volgistics data with DonorPerfect

Volgistics

Access Database Integration Before After

Access Database Integration Decodes Barcode Output

Gantt Chart

Time Spent Percentage of Time Spent - Projected Percentage of Time Spent - Actual

Current Status Volunteer software (Volgistics) selected DonorPerfect installed and functioning All PC's updated with virus and spyware protection Preliminary security badges are available

Future Needs Order more USB flash drives Sell donated equipment on Craig's List Active Resident Malware Additional Repair Equipment Web Filtering Work with new group to ease transition

Questions?