technology implementation in po 1. overview of the training process objective method brief...

Post on 31-Mar-2015

214 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Technology implementation Technology implementation in POin PO

1

Overview of the training processOverview of the training processObjectiveMethod

◦Brief introduction

◦Group discussion

◦Group exercises

◦Syndicate presentations

2

Technology implementation

Project plan

Formulating the planFormulating the plan

Assess the needsIdentify the constituents of the projectForecast the project flowIdentify bottlenecksSchedule the project

4

Project TeamProject Team

Create a teamGuidelines on membersAssign jobsSchedule the meetingsMaintain a Project diaryFollow up progress and reviewControl

5

Project for PO ComputerisationProject for PO Computerisation

Identification of officePreparation of Project planSite preparationHardware/software installationTrainingBuilding the Security environment

6

Project for PO Computerisation – Project for PO Computerisation – cont’dcont’d

Installing and configuring applicationsTest run and review progressFinal switch over to computerised

operationsPost deployment support

7

Technology management

Site preparation

PrerequisitesPrerequisites

Ownership

Space

Physical security

9

Civil workCivil work

Required to provide faceliftModernized countersErgonomic furnitureProviding dust free environmentCo-ordination with Civil wing

10

Electrical workElectrical workCo-ordinate with electricity authoritiesGet the work done through licensed electriciansGood quality power supply

◦ Grounding (earthing)◦ Voltage between ground and neutral to be between 3

volts and 5 voltsAdequate plug pointsLength of cablesEmergency power off switches

11

UPSUPS

Computers and peripherals to draw power from UPS

Half an hour to one hour backupPower distribution of UPS

◦ PCs – 300, Server 600◦ Printers

80 cl – 300 132 cl – 500

Only computers and peripherals to be connected

12

Room selectionRoom selection

Large enough to accommodatePlan for future expansionAdequate walkwaysPlan for workflowStorage space for consumablesSecurityFire protection

13

Fire protectionFire protection

Try to use non combustible materialsFire extinguishers for fighting electrical

fireDevelop proper emergency procedure

14

Environment in the roomEnvironment in the room

Temperature

Humidity

Dust

Ventilation

15

Data communication linesData communication linesInstalled before systems arriveExclusive telephone connection for dialup

networkingUTP cabling for the networkNetwork cable to run parallel at least one

foot away from power lines Network and power cable should not be

housed in the same casingSufficient lengthProvide for redundancy

16

ChecklistChecklist

Follow up of site readinessProject team to visit and certifyInvolve the vendor in checkingPower systems to be checkedData communication to be also checked

17

Exercise on site preparation and Exercise on site preparation and presentationpresentation

18

Technology implementationTechnology implementation

Deployment of Hardware, OS and SQL server

Installing HardwareInstalling Hardware

PCs supplied for a project not to be diverted

Vendor installs hardware and configures network - coordination

Preserve the documents and related CDs received with each system

20

Installing Hardware – cont’dInstalling Hardware – cont’d

Stick a label on each hardware item with details

◦Serial number ◦Date of installation◦Date of expiry of warranty◦Contact person with telephone number

21

Installing OSInstalling OS

By the vendorCDs coming with systems usedInstallation to be monitoredNaming of machinesNetwork configurationRegional options configurationTesting network connectivity

22

Implementing OS securityImplementing OS security

Domain level securityTypes

◦User access permissions◦Password security◦Share level permissions◦NTFS permissions

23

Security guidelinesSecurity guidelines

User account restrictionsPassword policy

◦No blank password◦Restrict use of administrator account◦Users to control passwords◦Educate users on passwords

24

Password usagePassword usage

Avoid obvious associationsHave sufficiently long passwordsUse combination of charactersFrequent change of passwordsSet new password every timeNot to be barteredProtect against wrong usage

25

Deployment – SQL ServerDeployment – SQL Server

Role of SQL Server in relation to PO applications

Versions and editionsVulnerability, if not protected

26

Security issues in SQL serverSecurity issues in SQL server

Installation issues – Standard editionAvoid indiscreet access to management

toolsNo corrections in databasesSecure access to SQL Server

27

Technology implementationTechnology implementation

Application deployment

ChecklistChecklist

Check if the OS, RDBMS is loadedInvolve the administrator of the siteModular installationCollect the manual records for data entryConsult with the head of the office,

Supervisors and staff

29

Checklist - continuedChecklist - continued

Start installation on Sunday or holidayConsult the installation process in the

application CDConfirm compatibilityLoad the prerequisitesInstall only authorised applicationsEnsure that databases are not marked to

C drive; they can be on any other drive

30

Installing applicationsInstalling applications

Applications to be installed based on guidelines

Configuration for the office environmentInitial passwords set for various users to

be changed by usersCheck if applications can run from clients

before the day starts

31

Entering master dataEntering master dataOne time affair

Applications requiring master data

◦Sanchaya Post – Existing accounts◦Postman - Address description

Can be done in shifts

Needs validation32

Test runTest runMeans live testingInvolves hardware, software, integration and

performanceTest run for optimum time to build confidenceNot too long – involves duplication and sets in

monotonyMonitoring to

◦ Tackle user related issues◦ Initiate action to correct bugs◦ Check readiness of environment

33

Technology implementationTechnology implementation

HR issues

TrainingTrainingNeedTimingTypes of training

◦Operators, Supervisors, Head of office◦Administrator◦Inspecting staff

Levels of training◦PTC◦WCTC◦Workplace

35

StaffingStaffingImportanceSelecting people with right attitudeImmediate deployment of trained

personnelSelection of SupervisorsMaintaining continuityReserve pool to provide for redundancy

36

Technology implementationTechnology implementation

Post deployment issues

Final implementationFinal implementation

GradualConvince the site with results during trial

runFall back plan in case of failureSupervisor and head of office to be

involvedImplemented on time to avoid overruns Evolve a reliable and detailed disaster

recovery plan

38

Protection against failureProtection against failure

Disaster recovery plansBackup helpsBackup typesBackup mediaBackup strategy

39

Ongoing supportOngoing support

NeedManaging queries – Help deskTraining

◦Refresher- for new options, version changes◦Newcomers◦How Managed?

40

Ongoing supportOngoing support

Maintenance

Monitoring

Upgrades

Security

41

MaintenanceMaintenance

Computers, peripherals and UPS to be covered

Follow Directorate instructionsTerms to include periodical fine tuningDesignated officer to monitorDocument the problems for specific

performance

42

Maintenance – cont’dMaintenance – cont’d

In-house troubleshooting

Minor problems

System failure – How managed by AMC?

History sheet to contain info

43

Areas of maintenanceAreas of maintenanceNetwork errorsHardware failuresUPS issues

◦Equipment failure◦Battery failure

Generator issuesPower supply boards

44

MonitoringMonitoring

Follow up implementationMeasure effectivenessEnsure maximization in usageImplement all modulesMove towards total computerisationExamine the awareness and security

consciousness

45

Monitoring toolsMonitoring tools

Volume of transactions

Reports printed out

Reports in the integrated environment

Effect of downtime

46

Monitoring processMonitoring processDivisional head plays crucial roleImplementation to be checked during

visitsProblems in implementation to be

discussedSuggestions to be promptly considered,

importance weighed and implementation followed up

Incorporation of tasks relating to computers in MDW

47

Managing upgradesManaging upgrades

Changes in application to be followed upApplying patches and upgrades to be

planned Fall back plan to be thought ofBackup and other prerequisites to be in

place before applying upgrades

48

Managing upgrades – cont’dManaging upgrades – cont’dTypes of upgrades

◦Client upgrades◦Database upgrades

Upgrade process suggested should be read and understood

Upgrades to be applied on Sunday or holiday and tested

On upgrade failure, the existing version to be restored

49

Managing securityManaging security

Security policy to be in place based on Directorate instructions

To be testedManaging administrator’s accountHead of the office to exhibit great care –

training needs to be addressed

50

51

top related