760 likes | 906 Views
Technology As A Management Tool. Pat Sine Office of Educational Technology College of Human Resources, Education & Public Policy University of Delaware. Topics. Technology strategic planning Purchasing hardware and software Security Networking Your presence on the web
E N D
Technology As A Management Tool Pat Sine Office of Educational Technology College of Human Resources, Education & Public Policy University of Delaware
Topics • Technology strategic planning • Purchasing hardware and software • Security • Networking • Your presence on the web • Online communications tools This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
Technology Strategic Planning Strategic TechnologyPlanning
Elements of Strategic Planning This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
Pointers for Strategic Planning • Keep focus on the goals of the organization • Use the plan as an ongoing map – not a task to be completed • If you don’t know…get an expert • Question all experts! This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
Budgeting • TCO – Total Cost of Ownership • 70 / 30 rule • 30% -> initial purchase of hardware, software and peripherals • 70% ->technical support, repairs, training and upgrades This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
Planning Resources • Tech Soup www.techsoup.org • Tech Atlas – Online Tech Plan Development Tooltechatlas.org/tools/default.asp This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
Stakeholders • Decision makers across the organization • Clients to be served • Staff and volunteers who will use the technology This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
The only reason to have a computer is to run software. So… decide on your general software needs first.
How do we measure? • Bits • Bytes • Kilo 103 • Mega 106 • Giga 109 • Tera 1012 • Peta 1015 This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
Basic Hardware Decisions What kind of machine? • Windows or Macintosh? • Desktop, laptop, tablet? • Desktop and laptop? This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
Basic Hardware Decisions • Processor type and speed • Measured in GHz • Dual, Quad and 8 Core • Windows (1.8 to 2.4) • Intel Core Duo Series • AMD Athlon™ 64 X2 Dual-Core • Mac (1.8 to 2.2) • Intel Core 2 Duo processor This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
Basic Hardware Decisions • Memory – RAM • Measured in MB or GB • Preferably 1- 2 GB • (some specs say 512, but weigh it against later update costs) This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
Basic Hardware Decisions • Hard drive size • Measured in GB • 150 GB and up • More in a desktop (price limitations) • More to store multimedia This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
Basic Hardware Decisions • Optical Drives • DVD ROM & CD R/W (the old way) • CDRW/DVD Combo (2006) • CD writer / DVD • CD/DVD writer This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
Basic Hardware Decisions • Connectivity • Modem – 56 Kbps (but for how long) • Network card – 1Gbps • Wireless adapter – 802.11b/g • heading for 802.11n This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
Other Hardware Decisions Things you don’t need to think about, much. • Monitors – DVI capable • Mouse and keyboard • Video cards • Sound cards • Modems • Ethernet (network) connectivity • Wireless access in a notebook This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
Even More Hardware Decisions • What else? • Backup devices and data transport • CD-R,CD-RW, DVD +/-RW • Tape • Thumb drive (pen, USB, flash, jump) • Direct Attached Storage (e.g., Drobo) • Printers, scanners, digital cameras This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
The biggest mistake to avoid… Waiting just one more week for the prices to drop and the technology to stabilize. This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
One More HardwareDecision • What about recycled computers? • www.techsoup.org/recycle/index.cfm • TCO – Total Cost of Ownership This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
Software Characteristics • Compatibility • Capability • Stability • Scalability • Ease of Use • Longevity and Support This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
Software Categories • Commercial or purchased • Free • Open Source • Shareware • Freeware • Public Domain This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
What’s Available For Free Look for software at download.com or tucows.com This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
What’s Available For Free Online This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
Purchasing Software Donated and Discount Products for Nonprofits • TechSoup Stock • www.techsoup.org/stock This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
Using Online Apps • Google Apps • Free for Nonprofits • www.google.com/a This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
What Else? • Virus and Spyware Protection! • AVG Antivirus free.grisoft.com • Windows Defenderwww.microsoft.com/athome/security/spyware/software/default.mspx • TechSoup: Virus Protection Resource Page • Firewall • Built-in Windows Firewall • Your wireless or network router This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
Databases: Powerful, Somewhat more daunting, but Priceless • Capabilities • Next step after spreadsheets for organizing data • Can grow with the organization • ebase and eTapestry • Specifically for non-profits to conduct business This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
Tech Skills Considerations • How will you train all your staff to use technology to improve productivity? • How will you reward those who do excel and encourage those who shy away? • As your operations become more computer-based, what will you do about technophobes? This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
Tech Skills Considerations • Technology Literacy Benchmarks for Nonprofit Organizations(2002) www.benton.org/publibrary/stratcom/techlit.pdf • Guidelines for assessing how the organization is managing technology and staff This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
Categories of Malware • Infectious • Viruses • A program or piece of code that is designed to replicate itself and spread from file to file, usually attaching itself to applications. Replicates itself via the network or email. • Worms • A program or algorithm that replicates itself over a computer network without user intervention and usually performs malicious actions. Source: Jeff MacArthur, commandNpodcast, October 12, 2007 This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
Categories of Malware • Concealment • Trojan Horses • A destructive program that masquerades as a benign application. • RootKits • modifies operating system • Backdoors This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
Categories of Malware • For Profit • Spyware • Send info back to someone who uses it for commercial profit or redirects to a profit site • Botnets • Key Loggers • Dialers This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
Defenses • Virus and Malware scanner, along with antivirus/malware software • OS updates • Only download from trusted sites or the program creator’s site • Think twice about installing software • Use a firewall • Use wireless access controls – WEP and WPA • No unnecessary rights (ie., no extra administrators) • Vista UAC • Apple’s password protection for software installs This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
Invasions: the enemy outside • Hacking and Cracking • Viruses • Worms • Trojan Horses • Hoaxes • Phishing and pharming This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
User Practices: the enemy inside • Insecure passwords • Posted passwords • Poor back up practices • Internet firewall non-use • Lack of virus software updates • Lack of OS and other software updates This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
Connecting To The Internet Broadband This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
Types Of Local Area Networks • Peer-to-Peer • Local • Virtual • Client-Server This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.