Tech Presentation 2
-
date post
21-Oct-2014 -
Category
Technology
-
view
725 -
download
1
description
Transcript of Tech Presentation 2
TECHNOLOGYJohn M. Doe
VP of Information Technology
PLEASE TURN YOUR CELL PHONES OFF OR PUT
THEM ON VIBRATE.
OVERWHELMING?
Do you find new waves of technology to be…
If so, we’re here to help you navigate the waters!
THE I.T. DEPARTMENT’S GOAL
Is to insure that all Jenny Pruitt & Associates
agents have access to leading edge technology
as well as proper training and support in order
to utilize this technology to their greatest
professional advantage.
THESE SHOULD BE YOUR FIRST POINTS OF
CONTACT IN ALL AREAS OF TECHNOLOGY
Members of your Office Staff are also available to serve you in the
form of Tech Reps:
Betty Williams (North Fulton)Angie Slaton (Buckhead)Trisha Care (Cobb)Mark Knopfler (Sandy Springs)Gail Drew (John’s Creek)
HOW STRONG IS OUR COMMITMENT?
1) The Help Line number is 678-805-5411 and the
e-mail address is [email protected]
Both are monitored 24/7.
*Tip- Send an e-mail first as it sends a text message
to everyone in the I.T. Department at once.
2) Jenny Pruitt & Associates has $100,000+
budgeted for technological improvements to help
your business this year.
TECHNOLOGY COMMITMENTS CONTINUED…
3) Computer Speed will double by year end.
4) Our intranet will continue to grow.
5) The offices have new color Copiers/Printers with
Scanner capabilities.
6) Office 2007 has been added to all shared
computers.
7) www.jennypruitt.com is the flagship of general
real estate websites!
REMEMBER THE COMPUTER IS YOUR BUSINESS TOOL, NOT YOUR BUSINESS
We take small steps.
We decide on a platform and stick with it. Why?
Changing software or hardware every six months is
expensive…
Plus there is the time associated with a learning curve
as well as working out the inevitable bugs…
Both which lead to a subsequent loss in productivity.
We provide on-going training.
We also recommend you spend at least 2 hours a week
playing/learning.
How We Help You Manage Our Technology
EXAMPLES OF EQUIPMENT AT JENNY PRUITT & ASSOCIATES
Work Room Computers
High Speed Printers (25 pages per minute)
Color Printer/Copier/Scanner machines (35 cents per
colored copy)
Fast Fax Machines
E-Fax Solution
Professional E-mail Server
Voice Mail System
Digital Camera
LCD Projector (for use by brokers in sales meetings)
WORK ROOM COMPUTERS PROVIDE YOU
MS Office 2007
Word
Excel
Power Point
Photo Editor
Publisher
Internet Explorer
Real Quest (via Intranet)
Icon with a link to the No Call List (Reminder: The fine can be a minimum of
$10,000!!!)
Access to Network
Access to all Printers
Computers in Conference Rooms…They give you a professional environment
to show clients listings and write
contracts.
Presentation Laptops…These can be checked out to show a live
listing presentation to your clients.
And Coming Soon to a Lobby near you, the Lobby Marketing Program…This will scroll through all the listings in your office.
EQUIPMENT TO WOW YOUR CUSTOMERS!
ARE YOU CONNECTING YOUR PERSONAL
COMPUTER TO THE JP&A NETWORK?
If so, we provide you…
1) FREE wireless connectivity
2) Use of all workroom printers
3) High speed access to the internet and FMLS
4) Access to the servers (I drive, K drive)
IT GIVES YOU A SECURE PLACE TO STORE AND BACKUP YOUR
FILES AND THE ABILITY TO ACCESS THEM FROM ANY
WORKSTATION!
What’s so great about having access to the JP&A network drives?
HOW DO YOU CONNECT TO OUR NETWORK?
Obtain a Wireless Network
Interface Card if you don’t already
have one.
Install some type of Firewall
software on your PC (we
recommend Norton Internet
Security).
Send an e-mail to techsupport@
jennypruitt.com to make an
appointment.
Randy or Tyrone will set up your
laptop to connect to the network.
Please note: You should find an
outside source to set up the basic functions and
software of your laptop.
CAUTION!
A few points to remember regarding software…
1) We suggest that you check with the I.T. Department before loading
additional software onto your computer to avoid complications.
2) Before purchasing the software, are you sure it will do what you
want it to?
3) Watch out for spyware, viruses and hackers!
ARE YOU READY TO JOIN THE REVOLUTION
SWEEPING THE GLOBE?
WELCOME TO THE AGE OF TECHNOLOGY!
WHAT HARDWARE SHOULD YOU HAVE?
A dedicated computer for business only
(preferably a laptop, see accompanying
handout)
A dedicated connection to the Internet at home
A PDA (personal digital assistant), e.g. Palm
A digital camera (see handout)
Access to the JPA network on your laptop
Thumb drive, flash drive, etc.
RECOMMENDED SOFTWARE PROGRAMS
Microsoft Office Products (Word, Excel, Power Point, Publisher)
Outlook (not Outlook Express)
PIM (Personal Information Manager)
Outlook, Act, Top Producer, Online Agent
Norton Internet Security:
Regularly checks your system for viruses
Examines incoming e-mails to protect you from viruses
Includes a firewall to prevent people from outside getting into your
computer
Provides parental controls
Contains anti-spam features
BEWARE OF SPYWARE!
What is Spyware? A program which gives others
total access to your computer
without your knowledge.
It sends private information to
others about your computer.
It also allows the user to track
your online banking id’s and
software.
How do you combat it? Don’t load Kazza, Lime Light or
Lime Wire onto your computer.
Stay off questionable websites
such as porn and gambling.
If you obtain software from a
source other than a qualified
retailer, be careful!
Install some type of Anti-Spyware
program such as Spysweeper,
Counterspy , Ad-Ware or Spybot in
order of preference.WARNING!!
PERSONAL HARDWARE RECOMMENDATIONS
FOR A DEDICATED INTERNET CONNECTION
Dial-up/Modem Least expensive is $22 per month
Slow
Need second line or can’t use
telephone at same time
ISDN 2.5 faster than dial-up
$30 per month for limited amount
of hours
Need second line or can’t use
telephone at same time
DSL 20x faster than dial-up
$40-$50 per month
Can use same phone line
Can be on the phone and internet
at same time
Cable 50x faster than dial-up
$40 per month
Uses the same cable as TV
HOW TO CHOOSE A PDA
Do You Want a Phone/PDA
Combo?
Is having an integrated lock
box key a must?
Treo device (which one
depends on cell provider)
Blackberry or other device that has e-mail and
internet
Choose a Palm based PDA
Yes No
Yes No
PDA OPTIONS
Palm Tungsten Palm Treo 650-Uses Palm OS - Uses Qwerty Keyboard
-Address book -Access to wireless applications
-To do’s -Access to any standard e-mail
-Calendar
Blackberry Pocket PC (iPaq) or Treo 700w-Biggest plus is e-mail capabilities - Windows OS
-Access to wireless applications -MS Office
-Uses Qwerty Keyboard -Address book
-Doesn’t have its own PIM software -To do’s
-Calendar
OTHER CONSIDERATIONS
Data plansText MessagingTethering- The ability to connect your phone to your laptop in order to provide you high speed internet connectivity.
E-MAIL RECOMMENDATIONS
You should have a dedicated ISP…
We don’t recommend Hotmail, MSN or AOL.
Use an E-mail Client program, Outlook is the preferred
software.
Have your e-mail sent to your JPA account…
This is more professional, it also helps strip out
viruses.
Keep your JPA and personal e-mail accounts separate and
don’t forward your JPA e-mail to your personal e-mail.
Check your e-mail at least 4 times a day.
HOW DO YOU GET YOUR JPA E-MAIL?
Sender
Local ISP
Internet World
(looks up
where to
deliver e-mail
to)
JPA Spam
Filter
JPA E-Mail
Server
Receives all e-mails not identified as
SPAM. E-mail can be read using IE,
Eudora or Outlook if not forwarded to
your personal e-mail.
Looks at e-mails and filters based on
phrases, # of e-mails from a given
address, # of recipients, subject, etc.
Strips out all attachments except .pub,
.xls, .ppt, .doc, .pdf, and .jpg. You will
still receive the e-mail.
Filtered e-mails appear
on the JPA Spam Report
Remember the CAN-SPAM Act Requirements which includes 3 main
provisions spammers must adhere to:1) The first is labeling. Unsolicited e-mails must be clearly identified as
solicitation or advertisements for products and services.
2) The second is offering an opt-out option. Senders must provide easily
accessible, legitimate means for recipients to “opt-out” of receiving future
messages. Additionally, senders of e-mail must comply with a recipient’s request
not to receive commercial e-mails within 10 business days. It is not a defense
under the CAN-SPAM Act for a business to advertise its services through illegal
spam sent by a third-party because the act holds businesses knew, or should
have known, their services were being promoted through illegal spam.
3) The third is the revelation of the sender’s addresses. Unsolicited e-mails
must contain legitimate return e-mail addresses, as well as the sender’s postal
address.
For complete rules and regulations, go to http://www.ftc.gov/spam
BEFORE YOU USE E-MAIL MARKETING…
WHAT I.T. IS KEY FOR YOUR BUSINESS?
LEARN FILE MANAGEMENT FOR ALL YOUR PROGRAMS!!!
-Where the data files are stored-How to move and copy files
-Sending and receiving-Know how to send and read attachments-Become accustomed to checking your e-mail on a regular basis
1st Forms
MS Office Programs
Real Quest
TERMINOLOGY/VOCABULARY LIST
Desktop- The first screen you see after you logon. This is comprised of 3 parts;
the background, task bar and icons.
Task bar- The gray area at the bottom of your screen which will show open
applications, toolbars and the system tray.
Icons- Pictures that represent short cuts, programs, folders, etc.
Active Window- The current window that is open.
Title Bar- The area that describes the Active Window.
Minimize- Located in the top right corner of your screen and it looks like a small
minus sign. This allows you to leave the application on but will only show it on the
task bar.
TERMINOLOGY CONTINUED…
Drive/Media Capacity- The amount of data a given media can hold usually
measured in KB (Kilobytes), MB (Megabytes) or GB (Gigabytes). The number of files
is not relevant only to the size.
KB (Kilobytes) = Thousands of bytes 1 kb = 1,000 bytes
MB (Megabytes) = Millions of bytes 1mb = 1,000,000 bytes
GB (Gigabytes) = Billions of bytes 1 gb = 1,000,000,000
TB (Terabytes) = Trillions of bytes 1 tb = 1,000,000,000,000
TERMINOLOGY CONTINUED…
Operating System- Examples would be Windows 98, Windows XP, Linux.
Application Software- Examples would be Office 97, Office 2000, Publisher.
File extension- These are the last three characters of the file name after the
period; not all files have extensions.
File type- This identifies the file as Word, Power Point, executable or etc.
Reboot- This means to restart your computer, preferably by clicking on Start,
Shutdown, Restart.
Blue Screen of Death and “Close Ignore” Error- This is what would cause you to
reboot your computer.
FILE MANAGEMENT TERMINOLOGY
Folder/Directories- For computers, these words are synonymous.
Files- These are individual Word Documents, Power Point presentations,
Publisher documents, etc. that you create.
Directory Structure- This is a generic term describing how your folders are set up
on available drives.
File location- This tells you what Drive the file is located on and then the
directory structure.
FINAL RECOMMENDATIONS…
Take SMALL steps!! You don’t need to buy or learn about
everything we just talked about.
If you have a PC, have some type of Anti-Spyware, Anti-
Virus and Firewall software installed on it.
We advise you not to let your spouse or children use your
business computer as accidents happen.
Have fun with technology! It’s here to stay and the more
you know, the more you’ll grow!!