Cost of Ownership of a PC Acknowledgements to Euan Wilson (Staffordshire University)

Slides:



Advertisements
Similar presentations
© Fujitsu Limited, 2010 Fixed Asset and Prepaid iProcurement Training.
Advertisements

Online Learning and the Laptop Initiative Hidden Valley High School Roanoke County Public Schools 2006.
Information Technology Disaster Recovery Awareness Program.
NETWORKS Review + Topology.
A new standard in Enterprise File Backup. Contents 1.Comparison with current backup methods 2.Introducing Snapshot EFB 3.Snapshot EFB features 4.Organization.
Overview Payback Analysis NPV
Exploring Computer Hardware and Networks
Organisational policies
Computer and Physical Security Recommendations. Assure that computers and work locations are secured when work areas are not staffed.  Log-off or lock.
The Remote Workplace Designing, deploying, and supporting the remote workplace environment Presented by: John Milhoan Information Technology Cooperative,
Exam ● On May 15, at 10:30am in this room ● Two hour exam ● Open Notes ● Will mostly cover material since Exam 2 ● No, You may not take it early.
Oracle Database Administration. Rana Almurshed 2 course objective After completing this course you should be able to: install, create and administrate.
Installing software on personal computer
Data Centers and IP PBXs LAN Structures Private Clouds IP PBX Architecture IP PBX Hosting.
Comprehensive IT Consulting Services an innovative approach to business.
Networking Computers. Advantages & Disadvantages of Networking.
November 2009 Network Disaster Recovery October 2014.
Desktop 1 Owning the Desktop: Is.edu like.com? Scott Bradner Harvard University University Technology Security Officer 28 June 2006.
User Services. Services Desktop Support Technical Support Help Desk User Services Customer Relationship Management.
UNIT 3C Security of Information. SECURITY OF INFORMATION Firms use passwords to prevent unauthorised access to computer files. They should be made up.
Security The Kingsway School. Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental.
Elite Networking & Consulting Presents: Everything You Wanted To Know About Data Insurance* * But Were Afraid To Ask Elite Networking & Consulting, LLC,
Fundamentals of Networking Discovery 1, Chapter 2 Operating Systems.
General Awareness Training
Service Options: Hardware Warranty, Software Maintenance and Support.
Chapter 2: Introduction to Computer User Support
what is contacts? In-contacts is an online contacts database designed from the ground up to be compatible with modern business needs.
Section 9 External and internal resources AQA ICT A2 Level © Nelson Thornes Section 9: External and internal resources Management of Internal Resources.
ITE 1 Chapter 5. Chapter 5 is a Large Chapter It has a great deal of useful information about operating systems. You will find this VERY helpful when.
For the next 4 years every Year 9 student is a NSW government school will be given access to a new laptop for use as a learning tool while they are working.
Proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission _ 1 Ingram Micro.
Royal Latin School. Spec Coverage: a) Explain the advantages of networking stand-alone computers into a local area network e) Describe the differences.
Impact Development in IT have had a major impact on the way organisations operate. Few organisations are able to survive in a competitive market without.
Introduction to Information and Computer Science Basic Computing Concepts Including History Lecture c This material (Comp4_Unit1c) was developed by Oregon.
Preventing Common Causes of loss. Common Causes of Loss of Data Accidental Erasure – close a file and don’t save it, – write over the original file when.
Chapter 2: Introduction to Computer User Support.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
Monday, October 26, 2015 Competitive analysis. The Pain PC repair service – The Pain Most repair professionals are expected to solve an infinite number.
Incident Security & Confidentiality Integrity Availability.
Cloning Windows NT Systems Mainly based on experiences at RAL and Oxford.
Computer security By Isabelle Cooper.
Chapter 13: LAN Maintenance. Documentation Document your LAN so that you have a record of equipment location and configuration. Documentation should include.
Unit 13: IT Trouble Shooting and Repair
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Toolooa SHS BYOD Parent Information Night. Why is BYOD (Bring Your Own Device)happening? The current hire devices were Federally funded and the funding.
TrainingRegister® Training Management Software Maintain Permanent Training Records for Each Individual Monitor and Track Required Training Know Who Needs.
CHAPTER 2 Laws of Security. Introduction Laws of security enable user make the judgment about the security of a system. Some of the “laws” are not really.
May07-02: Parking Meter Clint Hertz: Team Leader Austyn Trace: Communications Nick Hollander Christian Baldus.
Panayiotis Christodoulou. Objectives  •How historical changes in computer technology have affected computer use  •Ways to classify end users  •Computing.
2: Operating Systems Networking for Home & Small Business.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
Security Operations Chapter 11 Part 2 Pages 1262 to 1279.
Installing the ALSMS Software on a Windows Platform Configuration Example Alcatel-Lucent Security Products Configuration Example Series.
Evolution of Printing Services at CERN 2 Natalie Kane Print Service Manager.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Computer Security Keeping you and your computer safe in the digital world.
An Introduction to Local Area Networks An Overview of Peer-to-Peer and Server-Based Models.
Applications Software. Is a software used to carry out a particular task e.g. a game or word processor.
Network - definition A network is defined as a collection of computers and peripheral devices (such as printers) connected together. A local area network.
Malware Removal Could Be the Toughest Computer Repair Job Computer owners are often shocked at the price of computer repair services to clean up a virus.
Dec06-02: Parking Meter Ryan King: Team Leader Kristen Goering: Communications Justin Smith John Scapillato.
«My future profession»
My career compass to becoming a computer technician
Chapter 2 Introduction to Computer User Support
Information Technology (IT) Department
Business Risks of Insecure Networks
Unit 7 – Organisational Systems Security
Selling IIoT Solutions to Systems Integrators
PERA RIO System Upgrade Project Closeout Presentation
Presentation transcript:

Cost of Ownership of a PC Acknowledgements to Euan Wilson (Staffordshire University)

What is it? Its just the purchase price of the price and that’s it ! –Well not quite This lecture assumes that this is for an organisation rather than an individual

What do you get with the PC Operating System –included in the price ? What happens if you don’t want it ? Manuals Warranty period –and what type on site back to base

How long will it last ? 3 years ? 4 years ? –Need to budget for the “life” of it –May make financing easier Spread the cost Lease for 3 years etc.

Installation Operating system –may come pre-loaded –may need to alter / add permissions user ids IP addresses removal of games / none standard software –3d pinball, IE5 etc.

Installation Application installation –A minimum set would probably contain Office or equivalent package anti-virus software backup software etc.

Installation Configuration management –Printer drivers –Screen drivers –Network servers

Cost of Installation Employ a software technician –realistically this process could take three to four hours so at £5 per hour this could add £20 per machine but who covers the job while the techie is away

Alternative Ghost an image –provide the hardware vendor with a copy of all the software that is required usually costs about £50 per machine but still leaves configuration management –good for a small company and they can reduce the amount of technical staff employed has problems when the hardware specification is altered

Hardware failure How long does it take to fix? –Depends on the type of contract 4 hours, next day, 2 day ? Type of fix ? –Repair on site –Return to base –Hot swap out

Dealing with failure? What does the employee do without a machine? –Nothing –use someone else? –Filling –make the coffee The longer it takes to fix the greater the loss –4 hours at £5 per hour = £20 –2 days at £5 per hour = £70 –plus potential loss of earnings

Hot swap out Machine is replaced by identical machine –Same software –Same spec. –Same data ?

Hot swap out Therefore the organisation must provide a secure backup system each PC has its own internal tape system ? Each PC is linked to a file server ? –Costs »Increase in initial purchase costs »Consumables »Software –Education / Training

Training New system = new skills –but how does we train the staff everybody has training –time and cost ? learn as you go ? –Or as you hit a problem learn from piers ? –But does that work ? cascade training –Does that work ?