Preview

Desktop Migration Proposal

Better Essays
Open Document
Open Document
2249 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Desktop Migration Proposal
Calvin Ritter
CMIT 364: Windows Desktop Operating Systems
University of Maryland University College Asia
Desktop Migration Proposal

Introduction
Upgrading HACKM, LLC from Windows 7 to Windows 8 is a change the company feels it needs to make to be prepared for future growth of the company with new technology ideas as they come out. Due to some difference in the layout of the two, we will have to take the necessary steps to make sure that end users do not have a long downtime between the changes, and are knowledgeable of the new system. Windows 8 is built on the foundation of Windows 7. Windows 8 can use the same hardware that was used for Windows 7. Throughout my proposal, I will show you how I plan to have HACKM, LLC upgrade to Windows 8 smoothly, and be able to add new hardware, like tablets. The proposal will also address issues of concern like Group Policies to control access to applications, how data storage will be managed, the network, security, and monitoring of the varies workstations to name a few areas.
Description of Hardware Needed for Upgrade
HACKM, LLC will not have to do much buying of new hardware, due to Windows 8 being able to work on the same hardware as Windows 7, which they already have in place. However, I will have them implement a Metropolitan Network (MAN) with gigabit Ethernet connection. The MAN will allow HACKM, LLC to have great internet speeds. They are going to have fast download and upload speeds of critical information, so employees will be able to work from anywhere through the use of mobile devices, such as tablets like they wanted. They will also have to buy a Virtual Private Network (VPN) to help keep the new network secure. I would also have them set up a cloud network through the SkyDrive feature of Windows 8 to allow for faster saving of keys files so they can be download on any of the companies’ computers being used no matter where the employee is at. This few changes, will give HACKM, LLC many options on

You May Also Find These Documents Helpful

  • Satisfactory Essays

    It240 Week 3

    • 370 Words
    • 2 Pages

    To solve the shared bandwidth problem with the company network new equipment is necessary. First off the 10mbps Ethernet hub should be replaced with a 100mbps, due to its better performance. An extended star topology with a logical switch topology will be the best setup for the situation. As for the five new computers a wireless approach will be best. For this method each new addition will need to be equipped with a wireless NIC (network interface card). To connect these to the network a wireless router and a wireless access point will also be needed.…

    • 370 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    It Management Mgt2 Task 3

    • 4060 Words
    • 13 Pages

    Time is a risk for this project on several levels. 173 employees this will be affected as well as their customers. The company has agreed that this is a good move, however, if the process of setting up the equipment, managing the security and providing training goes on too long, then it will start to negatively affect the company over-all. Currently there is concern if the technology will be delivered due to an unforeseen fire, this set back will be costly in time and work. Also, a second part of time being a risk is managing faulty or dying equipment. Home offices will take longer to assess and fix in the long run. IT staff will either have travel to employee’s homes, or employees will be held up having to come into the home office for repairs.…

    • 4060 Words
    • 13 Pages
    Better Essays
  • Powerful Essays

    The new location in South Dakota will need an Internet modem and wireless router. The modem will be used to connect the office to the Internet, and the router will be used to connect the workstations of the new locations together to create a LAN. A wireless router will allow authorized users to connect to the network from a wireless device. The settings in the router itself will be used to control what devices can connect to the network by using MAC filtering. User account controls will be set on all workstations to control which users have access to sensitive materials.…

    • 2001 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    NT2580 Project Part 1

    • 348 Words
    • 1 Page

    Access to the company network will be secured by multiple firewalls set up with our routers. Firewall filters will be set up with a specific list of allowed users and programs. All other traffic will be blocked by default until it has been approved by IT. There will be a limited number of wireless access points around the building, with password access. These passwords will be changed on a regular basis. Access to the local network will be secured by user authentication passwords. Users will be limited to only the system resources that they absolutely need to complete their work. Users’ passwords must be changed every 90 days.…

    • 348 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Company A is an organization with a moderate amount of employees that occupies three locations within one city. The three locations are connected via fast network connections and the IT/IS Administration is centralized with the helpdesk. Employees have the ability to utilize computers and printers within their department, but are not allowed to use these devices located in other departments. In addition, HR information is restricted to that department as well as the executive offices, which have access to all locations and data.…

    • 327 Words
    • 2 Pages
    Good Essays
  • Good Essays

    There will be 25 employees at the main office and 15 employees at the two new locations. Each employee will have their own workstation at their employed location. Each employee will have their own unique user id and password to log into their workstations. Each employees profile will be set up so they can log into any workstation at all three locations. All the profiles will be connected to a public shared drive that gives all employees access to all documentation under this drive. Each employee will also have a private drive that will give them access to private documentation at any location they may be working at. There are 10 employees that will be traveling to different locations when needed. Although the employees have the capability of logging onto any workstation and/or customer relations workstation at either location; we will also provide laptops and/or tablets connected to the network they will be able to access their profiles…

    • 598 Words
    • 3 Pages
    Good Essays
  • Good Essays

    CMGT/430 Week 4

    • 622 Words
    • 3 Pages

    As a consultant for the company, I would recommend they invest in Universal File Access (UFA). UFA, developed by NTP Software, is technology that integrates with common storage hosts, cloud, and object stores to make an organization’s file data available to end users on any device consistent with its active directory security and other policies. What separates it from consumer-oriented “sync and share” products is that UFA is an end-to-end enterprise solution that provides corporate end users the ability to create and interact safely and securely with an organization’s file data using any…

    • 622 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    IS3230 Final Project

    • 687 Words
    • 2 Pages

    End users are the number one security risk and must be dealt with first. In order to accomplish this goal, the company will need to replace the old, outdated systems with new, up-to-date systems. Dell is the optimal company to pursue these systems as they have a full support system that comes with the workstations.…

    • 687 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Netw410 Week2

    • 716 Words
    • 3 Pages

    The actual business goals for this project is to offer new and better services and support, open the network to key constituents, build relationships and information accessibility to a new level, as a basis for the network organizational model, avoid business disruption caused by network security problems, avoid business disruption caused by natural and unnatural disaster, modernize outdated technologies and reduce telecommunications and network costs, including overhead associated with separate networks for voice, data and video.…

    • 716 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 3

    • 2062 Words
    • 9 Pages

    An enterprise level company wishes to set up a network to support several hundred business users as well as manufacturing equipment in a new building. Describe what network device or devices you would recommend they purchase and explain why. Note, you are not required to detail the media or topology utilized, but thinking about these will help you to choose and justify your device choices. I would suggest the purchase of a rack system with two servers on large server to handle the few hundred computers and users and the other to handle the manufacturing equipment. This would give them choices for backups and file sharing between one another. The servers…

    • 2062 Words
    • 9 Pages
    Good Essays
  • Good Essays

    Employees will be also using the workstation domain is where they will connect to the company’s network. Tight security and access controls will be enforced on company equipment and users must have proper access rights…

    • 539 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    It 240 Week 2 Appendixb

    • 565 Words
    • 3 Pages

    I would suggest installing a Local Area Network, which will supply networking capabilities to computers in the company. The set up for installation requires a modem and wireless routers to be able to connect all computers to the internet, using Ethernet cables or wireless card connections will allow all computers access to the internet via a broadband connection. Each computer or client will be able to access all necessary information on the network this can be achieved by utilizing file sharing will allowing that company to dictate who has access to what information on the network. I would also suggest printer sharing, which will allow the company to dictate who has access to the printer. I would also utilize TCP/IP Protocols; which are the rules that allow computers to connect to one another and that enable computers and peripheral devices to exchange information.…

    • 565 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    The stakeholder’s of any company or project may be directly or indirectly affect or be affected by the organization’s actions, objectives and policies. In this case, the needs of the stakeholders will vary depending on the anticipated outcome of each individual who will be receiving the upgrade. This means that a total of 115 employees will be involved, thus making them the primary stakeholders. Another stakeholder in this project will be the company or companies involved in the upgrade and the ones maintaining the project from start to finish. Lastly, another stakeholder is the company that our company will be purchasing all of the upgrade equipment from for the 115 employees. The overall objective of the primary stakeholders is to save the company money in the long term.…

    • 842 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Club It Part 1

    • 732 Words
    • 3 Pages

    Keys and Tejeda wanted their club to be at the cutting edge of technology but they are struggling to make that happen. ClubIT can be a fun and inviting place. Having recently remodeled the club the owners now need to remodel their technology system. The club has an older intranet system available to their employees. The ClubIT can change the way their customers relate to their business by implementing a web based technology system that offers more up to date information about the club. This would also benefit their employees. Having a more user friendly web based system the employees and customers alike could offer the ability for each person to personalize the information that they see. A web based system could be used by employees to access their personnel files through a secure server where each would have a unique ID and password, they would then be able to access all of their information including hourly wages, year to date pay, the amount of vacation time they have available and reviews by their peers.…

    • 732 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Treats that this company is vulnerable to are but not limited to tornado, malware, equipment failure, stolen data, DoS attacks & social engineer. The like likelihood of each is moderate to high. Headquarter is located right in tornado alley. Since this building house all three serves, a direct hit would result in a total loss. Since the users connect to the LAN with Windows Vista which is very outdate the risk of malware is also high. Along with having all three servers in a central location, there is no mention of any backup locations or even if a DRP is in place. Therefore equipment failure (loss of data) is very high. There is a mention of a direct attached storage but it appears that there is no AUP in place. This means everyone has access to the data. Stolen confidential data of a customer is a serious and costly risk. There is no mention of any firewalls in place. If the servers are not protected by firewalls or intrusion detection systems can result in loss of availability. Users and social engineering is the weakest and easily the most vulnerable. Lack of access controls and security awareness can result in serious loss of confidentiality and hackers are real threat in today’s world. With the sales people accessing the network through a home office and share internet connection with headquarters, this is the bulk of the concern.…

    • 382 Words
    • 2 Pages
    Satisfactory Essays