Deploy latest version of Samsung android tablet to employees of medium size company in Milwaukee.

Okay, you’ve made it! You are now a Project manager of a medium sized company that is based out of Milwaukee Wisconsin. The region your company has is in Milwaukee, Indianapolis, Chicago. The company wants to upgrade their tech departments for the latest version Samsung has to offer. Our job is to figure out a good strategy that will help the users transition smoothly to the new applications. This scenario requires us to have 57 new Samsung devices, which means 57 users are getting a brand new deceives that they may never have used before. Organization and communication are paramount in the success of this mission. The first thing we need to do is identify a list of tasks that are required to accomplish the project. We need to: • Document number of devices • Create inventory of all applications installed on devices • Create a pilot upgrade device, with the new operating system installed • Install existing applications on to the pilot device • Verify compatibility of the applications on the new OS • Remediate issues with the applications (make changes to make apps work) • Create a migration plan • Execute migration plan • Support devices/users that still have issues • Close the project. Above is a sample list of tasks that will need to be completed to have a successful upgrade. Now it is my opinion that people can use multiple devices to connect to the existing internet. There has never been anything wrong with options. In fact, in my day to day life I have many different forms of electronic equipment that all can do...

Deploy Latest Version of Samsung Android Tablet to Employees of Mid-Size Company in Milwaukee

Objective This plan should be used to seamlessly and effectively roll out new tablets to the employees of a medium-sized Milwaukee company. Tablet devices can be used to streamline work flow and increase employee mobility. The Android system should allow for flexibility in choosing software. This plan includes a rough order of magnitude that estimates for timeline, monetary cost, and resources. Cooperation with the current IT staff should be considered a high priority. Timeline & List of Tasks There should be 12 weeks of initial planning before the roll out. This plan is for deployment only. Consideration should be given to post-roll out support. The devices and software will need technical support once implemented. Week 1 Hardware & software inventory Current IT staff should submit detailed list of current tablets & software Week 2-3 Research options & hardware requirement for new tablets Include current IT staff in the discussion Research & shop MDM services Request office printer compatibility information from IT staff (wireless print servers) Request wireless network & security report from IT staff Week 4-5 Submit cost estimate to stakeholders Research tech support requirements Shop vendor options Week 6-7 Obtain prototype tablet device & begin testing Task IT staff with the prototype tablet & request feedback Deploy prototype to an employee for regular simulation testing Week 8 Analyze tablet prototype feedback Finalize choice of tablet & software with IT staff Place order for new devices Week 9-10 Create plan with IT staff for organized software installation & migration on new tablets Receive & verify new devices – register & add to inventory Setup & test wireless network Week...

What are the differences between Adware Virus, Worms, Spyware, Trojan, Rootkits, Backdoors, Logic bomb, Botnets

Security breaches is a big problem that concerns every company. Many businesses are still unprepared or not protected at all from a variety of security  threat. There are many causes and many type  of security threat. These threats are referred to as malicious software program also known as “Malware”.  Some of them are not even known by the average computer users. Below are the most known malware that can harm our computers, each one will be define along with their characteristics. Adware: They are designed to display advertisements on your computer, redirect your search request to advertising websites and collect marketing-type data about you- in instance- the types of websites that you visit-so that customized adverts can be displayed. There is no signs of the program in your computer’s system making its presence unknown and challenging to detect. Visiting an infected website can result in unauthorized installation of adware on your computer. Virus: Is design to spread from host to host. It has the ability to replicate itself. A computer virus is a type of malicious program written to alter the way a computer operates. It is also designed to spread from one computer to another. A virus operates by inserting itself to a legitimate program in order to execute its code. Worms: A computer worm is a self-b replicating computer program that penetrates an operating system with the intend of spreading malicious codes.  Worms utilizes networks to send copies of the original code to others computers. Worms cause harm by consuming bandwidth or sometimes deleting files or sending document via e-mail. Worms can also install backdoor on computers. Worms are often...

How to prepare for your CompTia Network+ Certification and Pass Exam in Milwaukee Area

If you are looking to get into a networking field you will want to receive the CompTia Network+ certification to get a basic understanding of networking.  This will teach you many of the industry’s standard practices and guidelines for networking as a whole.  It is important that you understand what you are supposed to learn before taking this exam.  It can be a time-consuming process even if you have a basic understanding of networking already.  It is important to try and find official documentation and practice tests for review to make sure you know the terminology they utilize.  It can be difficult to go in with knowledge you possess, as you may misunderstand questions if you do not study their way.  The following steps can help you prepare to study for the exam the correct way and become certified in no time. Before you go into the exam it is important to be well prepared, and to be well prepared you need a plan.  It is important to set goals to accomplish and to have a reasonable timeline to complete them in, do not try to rush the process.  First you should create a timeline, second you should make sure you are confident that you are meeting those timeline goals effectively.  It is okay to adjust your timeline if you see issues arise or are getting frustrated, just remember not to stray too far off.   Next execute your strategy properly, make sure that you are reviewing material that you know is on the test.  Take a practice exam if you understand basic networking already, see if any of it...

Quick Guide to using the Spell Checker in Microsoft Word

Iris Barreto

Iris Barreto

My name is Iris Barreto (aka Sister Iris Marie). I am a Schoenstatt Sister of Mary getting updated and learning about the world of IT. I began my studies at MATC in the Fall of 2016. Studying the IT Support Specialist program, I hope to be a great asset to my community and to the Schoenstatt Movement.
Iris Barreto
This Quick Guide gives you a simple picture rundown of the different features of Spellcheck and helps you discover all the ins and outs....

Quick Guide to using the Sort and Filter in Excel

Iris Barreto

Iris Barreto

My name is Iris Barreto (aka Sister Iris Marie). I am a Schoenstatt Sister of Mary getting updated and learning about the world of IT. I began my studies at MATC in the Fall of 2016. Studying the IT Support Specialist program, I hope to be a great asset to my community and to the Schoenstatt Movement.
Iris Barreto
This Quick Guide will offer you some simple tips and tricks to using the Sort and Filter to your advantage for any Spreadsheet you...