1 / 32

OCTE2338 – Technology in the Community

OCTE2338 – Technology in the Community. Team 5 Barbara Lipka, Steve Griesmyer, Phillip Castleberry, Jesse Jimenez Philip Lau. Background Info. Client: Sterling High School CTC contact: Ms. Helen Connor Organization providing assistance: UH-COT

benita
Télécharger la présentation

OCTE2338 – Technology in the Community

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. OCTE2338 – Technology in the Community Team 5 Barbara Lipka, Steve Griesmyer, Phillip Castleberry, Jesse Jimenez Philip Lau

  2. Background Info • Client: Sterling High School • CTC contact: Ms. Helen Connor • Organization providing assistance: UH-COT • Nonprofit online technology planning: TechAtlas

  3. Project Info • Provide a project plan for a Technology Center • Acquisition of Grants for Technology Center

  4. Organizational Mission: • Provide better life skills • Provide means for underprivileged community to have access to technology

  5. Technological Mission: • Creation of Technology Center • Acquire Grant Money • Integrate Old Technology into Current Networking Schema.

  6. Stake Holders

  7. Requirements/Gap Analysis

  8. Research Technology • Interviews • Mrs. Helen Connor • Parents • Simple computer room • Pay bills • Type office documents • Write E-mails

  9. Desired Systems and Processes • Solution to Include: • 1. Donated Computers • 2. Office Suite • 3. Computer Security Measures • 4. Grant Money

  10. Existing Systems and Processes Assumptions: • Active Directory based Network • Computers meet Windows 2000 Minimum Requirements • All network drops, monitors, printers, tables, etc. will be provided by CTC.

  11. Requirements • Minimum: Pentium II class computers with 64mb of RAM, 10 GB Hard Drives, NIC’s • Recommended: Pentium III w/ 128mb of RAM, 10GB HD’s, NIC’s.

  12. Technology Plan

  13. Network Recommendations • Piggyback onto Sterling HS Network • Ethernet Router • Patch Cables • NICs

  14. Hardware • Donated Computers • If unusable • Modern systems cost ≈ $320 • Paid for by Grant Money

  15. Operating System • Windows 2000 Professional can be purchased for approximately $110 • Upgraded from a Windows 9x to Windows 2000 • Licensing Issues

  16. Application Software • Some sort of Office suite • Office XP • Office 2000 • Office XP Small Business Edition can be purchased for approximately $140

  17. Security • Symantec Norton Antivirus 2005 • Acts as both AV and Firewall Solution • Cost ≈ $760 for twenty users

  18. Maintenance • Current School IT team • Group policy • Tape backup/restore

  19. Training • IT Team will teach initially • Volunteers • Teachers • Basic Add/Remove Users • Basic Office Usage

  20. Migration Strategy • nPower • Central Information Storage • Inventory Information

  21. Feasibility Analysis • Organizational Feasibility • Very Feasible provided the following: • Funding is acquired • People use it for its intended purpose • People learn something from its use

  22. Feasibility Analysis (cont.) • Technical Feasibility • Feasible if: • Funding is met • Technically Savvy Personnel • Economic Feasibility • Not Feasible Unless funding is provided

  23. Project Schedule • Acceptance of Proposal • Grant Acquisition • Computer Rework • Allow time for Computer Repair • Network Installation • Training • Open Doors

  24. Changes in Project Plan • Structured way • Change form filed with the Project Manager • Project Manager will decide based on: • Time Left • Severity of Change • What it would take to implement Change

  25. Staffing • IT Team • Maintain Network • Secure Network • Initial Training • Teachers • Train Volunteers • School Primary Contact • Volunteers • Help End Users • Monitor Computer Usage

  26. Risk Analysis

  27. Risk Analysis • Budget • Theft • Hardware/Software Incompatibility • Viral Infection • Hackers • Lack of use

  28. RA: Budget • Mitigation: • Seek donations • Grants • Purchase Wisely

  29. RA: Theft • Mitigation: • Monitored lab • Locked lab • Computers locked down to desktop

  30. RA: Hardware/Software Incompatibility • Mitigation: • Replacement • Upgrade • Repair

  31. RA: Viral Infection/hackers • Mitigation: • Anti-Virus • Firewall • IT Team Vigilance

  32. Conclusion • Benefits the Community • Helps Professional Growth • Education of the Masses

More Related