Computer Support for the Atlanta Day Shelter for Women and Children.

Slides:



Advertisements
Similar presentations
This course is designed for system managers/administrators to better understand the SAAZ Desktop and Server Management components Students will learn.
Advertisements

Online Tenant Request System Reliable and accurate, the IMPAK online tenant request system significantly reduces telephone time and paperwork.
Basic Concepts of a Computer Network
The Office Procedures and Technology
Introduction to Office Automation. 5.1 Basics of Office Automation 5.2 Software and Hardware for Office Automation 5.3 Basic Activities in Office Automation.
© El-Helw Guy Nickerson Voicu | ECE4884L01WS3 1 The Atlanta Day Shelter for Women and Children Technical Infrastructure Improvement Strategy Sarah El-Helw.
HOW WELL DO YOU KNOW THE BASICS OF USING YOUR COMPUTER?
The Remote Workplace Designing, deploying, and supporting the remote workplace environment Presented by: John Milhoan Information Technology Cooperative,
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Computing ESSENTIALS     Copyright 2003 The McGraw-Hill Companies, Inc CHAPTER Information Technology, the Internet, and You computing ESSENTIALS.
Initial Findings  Secure all contracts with third party vendors immediately  Develop a strong understanding of the ‘Flow of PHI’ within and outside of.
Intrusion Prevention, Detection & Response. IDS vs IPS IDS = Intrusion detection system IPS = intrusion prevention system.
Chapter 13 Organizing Information System Resources MIS Department Centralization and Decentralization Outsourcing Computer Facilities and Services.
Remote Access Mark Nicolay Computing & Communications.
Duties of a system administrator. A system administrator's responsibilities typically include:
For more notes and topics visit:
Elite Networking & Consulting Presents: Everything You Wanted To Know About Data Insurance* * But Were Afraid To Ask Elite Networking & Consulting, LLC,
Epworth Villa Tony Gaeddert Directory of MIS (Management Information Systems) Men’s Coffee August 20, 2007 Computers and Technologies Management Team.
Term 2, 2011 Week 3. CONTENTS The physical design of a network Network diagrams People who develop and support networks Developing a network Supporting.
Natick Public Schools Technology Update September 11, 2006 Dennis Roche, CISA Director of Technology.
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
Expanding and Improving the Technical Infrastructure of the Atlanta Day Shelter for Women and Children Project Advisor Whit Smith Group Members - Taylor.
Natick Public Schools Technology Update January 14, 2008 Dennis Roche, CISA Director of Technology.
Chapter 2: Information Technology and AISs
DECS Community IT DIVISION OF ENGINEERING COMPUTING SERVICES Michigan State University College of Engineering.
Information Services June 2015 Information Services June 2015 Information Services_ ctybrd16june15.1.
Objectives Overview Identify the qualities of valuable information Describe various information systems used in an enterprise Identify the components of.
Explain the purpose of an operating system
Final Presentation Tuesday, April 21 st, 2009 Project Advisor: Dr. Whit Smith Group Members - Chris A. Higginbotham -John Lewis - Nikhail Singh.
Preliminary Design Review Monday, March 25 th, 2009 Project Advisor: Dr. Whit Smith Group Members - Chris A. Higginbotham -John Lewis - Nikhail Singh.
Supporting Services in Schools ICT Service Level Agreement Howard Lazarus - ICT Support Manager Martin Morgans - Datacentre Manager.
Improving Security, Systems, and Statistics San Diego, CA June 4 th – 8 th, 2006 Jim Edgar, MPA State Registrar Montana Office of Vital Statistics Centralized.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
11 CHAPTER INFORMATION TECHNOLOGY, THE INTERNET, AND YOU.
Session 7 - Maintenance - contract and day-to-day Maintenance Support Presenter  Grenville Powell (Managing Director - of Shokaz Integrated Computing.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
Epworth Villa Tony Gaeddert Network Administrator Men’s Coffee August 5, 2002 Computers and Technologies.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Expanding and Improving the Technical Infrastructure of the Atlanta Day Shelter for Women and Children Project Advisor Whit Smith Group Members - Taylor.
April 28, A shared commitment to provide the most effective education to all students so they live successful lives. In order to accomplish the.
TrainingRegister® Training Management Software Maintain Permanent Training Records for Each Individual Monitor and Track Required Training Know Who Needs.
Module 9 Planning and Implementing Monitoring and Maintenance.
NETWORKING & SYSTEM UPDATES
Introduction TO Network Administration
Component 4: Introduction to Information and Computer Science Unit 7: Networks & Networking Lecture 1 This material was developed by Oregon Health & Science.
MICROSOFT TESTS /291/293 Fairfax County Adult Education Courses 1477/1478/1479.
Creating and Managing Networks CSC February, 1999.
Personal System Administration CS5493. SA SA is a Systems Administrator The SA is responsible for maintaining the overall wellbeing of a computing system.
I NTRODUCTION TO N ETWORK A DMINISTRATION. W HAT IS A N ETWORK ? A network is a group of computers connected to each other to share information. Networks.
IT Jobs Positions available in the field of Information Technology.
Computer Security Sample security policy Dr Alexei Vernitski.
© ExplorNet’s Centers for Quality Teaching and Learning 1 Install, configure, and deploy a SOHO wireless/wired router using appropriate settings. Objective.
Staff Induction Log On Credentials & Security Resources Web Applications / Software LanSchool Projectors / Cameras / Printing Laptops / WiFi.
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
IT Audit for non-IT auditors Cornell Dover Assistant Auditor General 31 March 2013.
3.1 Types of Servers.
Objectives Overview Explain why computer literacy is vital to success in today’s world Define the term, computer, and describe the relationship between.
Technology Department Annual Report
Hardware vs. Software Question 1 What is hardware?
3.1 Types of Servers.
Computer Hardware-Meeting the machine
3.1 Types of Servers.
Basic Introduction to Computers
System And Application Software
Tony Gaeddert Directory of MIS (Management Information Systems)
Objectives Overview Explain why computer literacy is vital to success in today’s world Define the term, computer, and describe the relationship between.
G061 - Network Security.
Tonight – Finishing off workshop
Ministry of Education Capacity Development Center
Presentation transcript:

Computer Support for the Atlanta Day Shelter for Women and Children

Georgia Institute of Technology School of Electrical and Computer Engineering Linda Larmore Soud Laskar Mark McDonald Jack Ogilvie Stephen Waddell Christina White

3 Computer Support for the Atlanta Day Shelter for Women and Children Georgia Institute of Technology Overview  Areas of support –Develop Shelter’s Database –Link Shelter’s Database to Pathways –Update Telecommunication Services –Improve Network Configurations  $3,600 actual equipment cost (vs. estimated $5,400 equipment cost)

4 Computer Support for the Atlanta Day Shelter for Women and Children Georgia Institute of Technology Shelter’s Database Development TaskStatus Fix reporting error in Shelter’s databaseResolved Flag barred clients in Shelter’s databaseResolved Track vital documents, i.e., birth certificatesNot Started

5 Computer Support for the Atlanta Day Shelter for Women and Children Georgia Institute of Technology Shelter’s Database and Pathways Link TaskStatus Obtain Shelter access to PathwaysIn Progress Identify method to automatically populate Pathways Complete Link Shelter’s database to PathwaysNot Started

6 Computer Support for the Atlanta Day Shelter for Women and Children Georgia Institute of Technology Shelter’s Database and Pathways Link

7 Computer Support for the Atlanta Day Shelter for Women and Children Georgia Institute of Technology Telecommunication Services TaskStatus Create Shelter’s websiteCompleted Setup Shelter’s accountsCompleted Investigate possibility of 911 call blocking on client accessible phones Completed Block long distance calls on client accessible phones Completed Expiration of telecommunication provider Pending

8 Computer Support for the Atlanta Day Shelter for Women and Children Georgia Institute of Technology Network Improvements Job Counseling Room TaskStatus Reconfigure Job Counseling Room Replace old computers with new computers Connect computers to the Internet via switches Install Internet filters Install and setup re-imaging software Install Adobe Acrobat Reader Install Microsoft Office Suite Install resume creation software Complete

9 Computer Support for the Atlanta Day Shelter for Women and Children Georgia Institute of Technology Network Improvements Year-Old Computer Room TaskStatus Reconfigure Teen Computer Room Replace old computers Connect computers to the Internet Install Internet filters Install age appropriate games Install and setup re-imaging software Complete

10 Computer Support for the Atlanta Day Shelter for Women and Children Georgia Institute of Technology Network Improvements Year-Old Computer Room TaskStatus Reconfigure Kids’ Computer Room Place three new computers in room Install age appropriate games Install age appropriate educational software Install and setup re-imaging software Complete

11 Computer Support for the Atlanta Day Shelter for Women and Children Georgia Institute of Technology Other Network Improvements TaskStatus Replace hubs with switchesCompleted Perform inventory of computer equipmentCompleted Setup computer for inventory of donationsIn Progress Establish off-site back-up storage (2 GB)Completed Replace staff computers as neededNot Started Provide method to remotely monitor computer usageNot Started

12 Computer Support for the Atlanta Day Shelter for Women and Children Georgia Institute of Technology Shelter’s Network Closet

13 Computer Support for the Atlanta Day Shelter for Women and Children Georgia Institute of Technology Future Work  Database Development  Network Development  Hardware Upgrades  Software Upgrades

14 Computer Support for the Atlanta Day Shelter for Women and Children Georgia Institute of Technology Future Work  Database Development –Continue Pathways work (if applicable) –Track vital documents, i.e., birth certificates –Consolidate duplicate records in Shelter’s database –Store client photos in Shelter’s database –Develop facial recognition program  Network Development  Hardware Upgrades  Software Upgrades

15 Computer Support for the Atlanta Day Shelter for Women and Children Georgia Institute of Technology Future Work  Database Development  Network Development –Use offsite backup storage –Place switches in locked box or cabinet –Replace staff computers as needed –Provide method to remotely monitor computer usage –Prevent Internet downloads (except in Job Counseling) –Establish timed user sessions  Hardware Upgrades  Software Upgrades

16 Computer Support for the Atlanta Day Shelter for Women and Children Georgia Institute of Technology Future Work  Database Development  Network Development  Hardware Upgrades –Install high speed printer, fax machine, scanner, copier in Job Counseling Room –Replace floppy disks with memory sticks –Setup video at check-in area explaining Shelter procedures –Prevent equipment closet from overheating  Software Upgrades

17 Computer Support for the Atlanta Day Shelter for Women and Children Georgia Institute of Technology Future Work  Database Development  Network Development  Hardware Upgrades  Software Upgrades –Implement groupware software (Facilitate Shelter staff electronic communication) –Obtain new educational software and resume program –Update Windows on all computers –Install antivirus software –Setup computer user accounts –Resolve usage

18 Computer Support for the Atlanta Day Shelter for Women and Children Georgia Institute of Technology Discussion

19 Computer Support for the Atlanta Day Shelter for Women and Children Georgia Institute of Technology Discussion  Does the Shelter want to implement Pathways considering burdens imposed?

20 Computer Support for the Atlanta Day Shelter for Women and Children Georgia Institute of Technology Discussion  Does the Shelter want to implement Pathways considering burdens imposed?  Who would the Shelter like to implement and maintain its website? –Dr. Cesari’s web developer –Consider responsibility to maintain and update website –Would the Shelter like students to immediately post the student-generated website?

21 Computer Support for the Atlanta Day Shelter for Women and Children Georgia Institute of Technology Discussion  Does the Shelter want to implement Pathways considering burdens imposed?  Who would the Shelter like to implement and maintain its website?  How would Shelter like to maintain security boundaries? –Computer passwords –Databases –Door keys

22 Computer Support for the Atlanta Day Shelter for Women and Children Georgia Institute of Technology Discussion  Does the Shelter want to implement Pathways considering burdens imposed?  Who would the Shelter like to implement and maintain its website?  How would Shelter like to maintain security boundaries?  Would the Shelter like participation by future Senior Design student groups?

23 Computer Support for the Atlanta Day Shelter for Women and Children Georgia Institute of Technology Discussion  Does the Shelter want to implement Pathways considering burdens imposed?  Who would the Shelter like to implement and maintain its website? –Dr. Cesari’s web developer –Consider responsibility to maintain and update website –Would the Shelter like students to immediately post the student- generated website?  How would Shelter like to maintain security boundaries? –Computer passwords –Databases –Door keys  Would the Shelter like participation by future Senior Design student groups?

24 Computer Support for the Atlanta Day Shelter for Women and Children Georgia Institute of Technology Questions?