Technology implementation in PO 1. Overview of the training process Objective Method Brief...
-
Upload
sincere-jaggard -
Category
Documents
-
view
215 -
download
0
Transcript of Technology implementation in PO 1. Overview of the training process Objective Method Brief...
Technology implementation Technology implementation in POin PO
1
Overview of the training processOverview of the training processObjectiveMethod
◦Brief introduction
◦Group discussion
◦Group exercises
◦Syndicate presentations
2
Technology implementation
Project plan
Formulating the planFormulating the plan
Assess the needsIdentify the constituents of the projectForecast the project flowIdentify bottlenecksSchedule the project
4
Project TeamProject Team
Create a teamGuidelines on membersAssign jobsSchedule the meetingsMaintain a Project diaryFollow up progress and reviewControl
5
Project for PO ComputerisationProject for PO Computerisation
Identification of officePreparation of Project planSite preparationHardware/software installationTrainingBuilding the Security environment
6
Project for PO Computerisation – Project for PO Computerisation – cont’dcont’d
Installing and configuring applicationsTest run and review progressFinal switch over to computerised
operationsPost deployment support
7
Technology management
Site preparation
PrerequisitesPrerequisites
Ownership
Space
Physical security
9
Civil workCivil work
Required to provide faceliftModernized countersErgonomic furnitureProviding dust free environmentCo-ordination with Civil wing
10
Electrical workElectrical workCo-ordinate with electricity authoritiesGet the work done through licensed electriciansGood quality power supply
◦ Grounding (earthing)◦ Voltage between ground and neutral to be between 3
volts and 5 voltsAdequate plug pointsLength of cablesEmergency power off switches
11
UPSUPS
Computers and peripherals to draw power from UPS
Half an hour to one hour backupPower distribution of UPS
◦ PCs – 300, Server 600◦ Printers
80 cl – 300 132 cl – 500
Only computers and peripherals to be connected
12
Room selectionRoom selection
Large enough to accommodatePlan for future expansionAdequate walkwaysPlan for workflowStorage space for consumablesSecurityFire protection
13
Fire protectionFire protection
Try to use non combustible materialsFire extinguishers for fighting electrical
fireDevelop proper emergency procedure
14
Environment in the roomEnvironment in the room
Temperature
Humidity
Dust
Ventilation
15
Data communication linesData communication linesInstalled before systems arriveExclusive telephone connection for dialup
networkingUTP cabling for the networkNetwork cable to run parallel at least one
foot away from power lines Network and power cable should not be
housed in the same casingSufficient lengthProvide for redundancy
16
ChecklistChecklist
Follow up of site readinessProject team to visit and certifyInvolve the vendor in checkingPower systems to be checkedData communication to be also checked
17
Exercise on site preparation and Exercise on site preparation and presentationpresentation
18
Technology implementationTechnology implementation
Deployment of Hardware, OS and SQL server
Installing HardwareInstalling Hardware
PCs supplied for a project not to be diverted
Vendor installs hardware and configures network - coordination
Preserve the documents and related CDs received with each system
20
Installing Hardware – cont’dInstalling Hardware – cont’d
Stick a label on each hardware item with details
◦Serial number ◦Date of installation◦Date of expiry of warranty◦Contact person with telephone number
21
Installing OSInstalling OS
By the vendorCDs coming with systems usedInstallation to be monitoredNaming of machinesNetwork configurationRegional options configurationTesting network connectivity
22
Implementing OS securityImplementing OS security
Domain level securityTypes
◦User access permissions◦Password security◦Share level permissions◦NTFS permissions
23
Security guidelinesSecurity guidelines
User account restrictionsPassword policy
◦No blank password◦Restrict use of administrator account◦Users to control passwords◦Educate users on passwords
24
Password usagePassword usage
Avoid obvious associationsHave sufficiently long passwordsUse combination of charactersFrequent change of passwordsSet new password every timeNot to be barteredProtect against wrong usage
25
Deployment – SQL ServerDeployment – SQL Server
Role of SQL Server in relation to PO applications
Versions and editionsVulnerability, if not protected
26
Security issues in SQL serverSecurity issues in SQL server
Installation issues – Standard editionAvoid indiscreet access to management
toolsNo corrections in databasesSecure access to SQL Server
27
Technology implementationTechnology implementation
Application deployment
ChecklistChecklist
Check if the OS, RDBMS is loadedInvolve the administrator of the siteModular installationCollect the manual records for data entryConsult with the head of the office,
Supervisors and staff
29
Checklist - continuedChecklist - continued
Start installation on Sunday or holidayConsult the installation process in the
application CDConfirm compatibilityLoad the prerequisitesInstall only authorised applicationsEnsure that databases are not marked to
C drive; they can be on any other drive
30
Installing applicationsInstalling applications
Applications to be installed based on guidelines
Configuration for the office environmentInitial passwords set for various users to
be changed by usersCheck if applications can run from clients
before the day starts
31
Entering master dataEntering master dataOne time affair
Applications requiring master data
◦Sanchaya Post – Existing accounts◦Postman - Address description
Can be done in shifts
Needs validation32
Test runTest runMeans live testingInvolves hardware, software, integration and
performanceTest run for optimum time to build confidenceNot too long – involves duplication and sets in
monotonyMonitoring to
◦ Tackle user related issues◦ Initiate action to correct bugs◦ Check readiness of environment
33
Technology implementationTechnology implementation
HR issues
TrainingTrainingNeedTimingTypes of training
◦Operators, Supervisors, Head of office◦Administrator◦Inspecting staff
Levels of training◦PTC◦WCTC◦Workplace
35
StaffingStaffingImportanceSelecting people with right attitudeImmediate deployment of trained
personnelSelection of SupervisorsMaintaining continuityReserve pool to provide for redundancy
36
Technology implementationTechnology implementation
Post deployment issues
Final implementationFinal implementation
GradualConvince the site with results during trial
runFall back plan in case of failureSupervisor and head of office to be
involvedImplemented on time to avoid overruns Evolve a reliable and detailed disaster
recovery plan
38
Protection against failureProtection against failure
Disaster recovery plansBackup helpsBackup typesBackup mediaBackup strategy
39
Ongoing supportOngoing support
NeedManaging queries – Help deskTraining
◦Refresher- for new options, version changes◦Newcomers◦How Managed?
40
Ongoing supportOngoing support
Maintenance
Monitoring
Upgrades
Security
41
MaintenanceMaintenance
Computers, peripherals and UPS to be covered
Follow Directorate instructionsTerms to include periodical fine tuningDesignated officer to monitorDocument the problems for specific
performance
42
Maintenance – cont’dMaintenance – cont’d
In-house troubleshooting
Minor problems
System failure – How managed by AMC?
History sheet to contain info
43
Areas of maintenanceAreas of maintenanceNetwork errorsHardware failuresUPS issues
◦Equipment failure◦Battery failure
Generator issuesPower supply boards
44
MonitoringMonitoring
Follow up implementationMeasure effectivenessEnsure maximization in usageImplement all modulesMove towards total computerisationExamine the awareness and security
consciousness
45
Monitoring toolsMonitoring tools
Volume of transactions
Reports printed out
Reports in the integrated environment
Effect of downtime
46
Monitoring processMonitoring processDivisional head plays crucial roleImplementation to be checked during
visitsProblems in implementation to be
discussedSuggestions to be promptly considered,
importance weighed and implementation followed up
Incorporation of tasks relating to computers in MDW
47
Managing upgradesManaging upgrades
Changes in application to be followed upApplying patches and upgrades to be
planned Fall back plan to be thought ofBackup and other prerequisites to be in
place before applying upgrades
48
Managing upgrades – cont’dManaging upgrades – cont’dTypes of upgrades
◦Client upgrades◦Database upgrades
Upgrade process suggested should be read and understood
Upgrades to be applied on Sunday or holiday and tested
On upgrade failure, the existing version to be restored
49
Managing securityManaging security
Security policy to be in place based on Directorate instructions
To be testedManaging administrator’s accountHead of the office to exhibit great care –
training needs to be addressed
50
51