Tech Presentation 2
Upcoming SlideShare
Loading in...5
×
 

Tech Presentation 2

on

  • 713 views

This is a PowerPoint Presentation I updated for the VP of I.T. Most of the copy is his, however the format itself is all new. Due to the fact I downgraded this to a PDF for this site's purposes, the ...

This is a PowerPoint Presentation I updated for the VP of I.T. Most of the copy is his, however the format itself is all new. Due to the fact I downgraded this to a PDF for this site's purposes, the movement and sound has been compromised. With that in mind, I've been told it's quite a zippy slideshow for such a dry subject! I have also deleted several slides which had pictures of employees and changed their names elsewhere.

Statistics

Views

Total Views
713
Views on SlideShare
713
Embed Views
0

Actions

Likes
1
Downloads
9
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Tech Presentation 2 Tech Presentation 2 Presentation Transcript

  • TECHNOLOGY John M. Doe VP of Information Technology
  • PLEASE TURN YOUR CELL PHONES OFF OR PUT THEM ON VIBRATE.
  • Do you find new waves of technology to be… OVERWHELMING? If so, we’re here to help you navigate the waters!
  • THE I.T. DEPARTMENT’S GOAL Is to insure that all Jenny Pruitt & Associates agents have access to leading edge technology as well as proper training and support in order to utilize this technology to their greatest professional advantage.
  • Members of your Office Staff are also available to serve you in the form of Tech Reps: Betty Williams (North Fulton) Angie Slaton (Buckhead) Trisha Care (Cobb) Mark Knopfler (Sandy Springs) Gail Drew (John’s Creek) THESE SHOULD BE YOUR FIRST POINTS OF CONTACT IN ALL AREAS OF TECHNOLOGY
  • HOW STRONG IS OUR COMMITMENT? 1) The Help Line number is 678-805-5411 and the e-mail address is techsupport@jennypruitt.com Both are monitored 24/7. *Tip- Send an e-mail first as it sends a text message to everyone in the I.T. Department at once. 2) Jenny Pruitt & Associates has $100,000+ budgeted for technological improvements to help your business this year.
  • TECHNOLOGY COMMITMENTS CONTINUED… 3) Computer Speed will double by year end. 4) Our intranet will continue to grow. 5) The offices have new color Copiers/Printers with Scanner capabilities. 6) Office 2007 has been added to all shared computers. 7) www.jennypruitt.com is the flagship of general real estate websites!
  • How We Help You Manage Our Technology take small steps. We We decide on a platform and stick with it. Why? Changing software or hardware every six months is expensive… Plus there is the time associated with a learning curve as well as working out the inevitable bugs… Both which lead to a subsequent loss in productivity. provide on-going training. We We also recommend you spend at least 2 hours a week playing/learning. REMEMBER THE COMPUTER IS YOUR BUSINESS TOOL, NOT YOUR BUSINESS
  • EXAMPLES OF EQUIPMENT AT JENNY PRUITT & ASSOCIATES Room Computers Work Speed Printers (25 pages per minute) High Printer/Copier/Scanner machines (35 cents per Color colored copy) Fax Machines Fast Solution E-Fax E-mail Server Professional Mail System Voice Camera Digital Projector (for use by brokers in sales meetings) LCD
  • WORK ROOM COMPUTERS PROVIDE YOU MS Office 2007 Word Excel Power Point Photo Editor Publisher Internet Explorer Real Quest (via Intranet) Icon with a link to the No Call List (Reminder: The fine can be a minimum of $10,000!!!) Access to Network Access to all Printers
  • Computers in Conference Rooms… They give you a professional environment to show clients listings and write contracts. Presentation Laptops… These can be checked out to show a live listing presentation to your clients. And Coming Soon to a Lobby near you, the Lobby Marketing Program… This will scroll through all the listings in your office. EQUIPMENT TO WOW YOUR CUSTOMERS!
  • ARE YOU CONNECTING YOUR PERSONAL COMPUTER TO THE JP&A NETWORK? If so, we provide you… 1) FREE wireless connectivity 2) Use of all workroom printers 3) High speed access to the internet and FMLS 4) Access to the servers (I drive, K drive)
  • What’s so great about having access to the JP&A network drives? IT GIVES YOU A SECURE PLACE TO STORE AND BACKUP YOUR FILES AND THE ABILITY TO ACCESS THEM FROM ANY WORKSTATION!
  • HOW DO YOU CONNECT TO OUR NETWORK? Obtain a Wireless Network Interface Card if you don’t already have one. Please note: You Install some type should find an of Firewall outside source to software on your set up the basic PC (we functions and recommend software of your Norton Internet laptop. Security). Send an e-mail to Randy or Tyrone techsupport@ will set up your jennypruitt.com laptop to connect to make an to the network. appointment.
  • 1) We suggest that you check with the I.T. Department before loading additional software onto your computer to avoid complications. 2) Before purchasing the software, are you sure it will do what you want it to? 3) Watch out for spyware, viruses and hackers! A few points to remember regarding software… CAUTION!
  • ARE YOU READY TO JOIN THE REVOLUTION SWEEPING THE GLOBE? WELCOME TO THE AGE OF TECHNOLOGY!
  • WHAT HARDWARE SHOULD YOU HAVE?  A dedicated computer for business only (preferably a laptop, see accompanying handout)  A dedicated connection to the Internet at home  A PDA (personal digital assistant), e.g. Palm  A digital camera (see handout)  Access to the JPA network on your laptop  Thumb drive, flash drive, etc.
  • RECOMMENDED SOFTWARE PROGRAMS Microsoft Office Products (Word, Excel, Power Point, Publisher)  Outlook (not Outlook Express)  PIM (Personal Information Manager)  Outlook, Act, Top Producer, Online Agent Norton Internet Security:  Regularly checks your system for viruses  Examines incoming e-mails to protect you from viruses  Includes a firewall to prevent people from outside getting into your  computer Provides parental controls  Contains anti-spam features 
  • BEWARE OF SPYWARE! What is Spyware? How do you combat it? A program which gives others Don’t load Kazza, Lime Light or   total access to your computer Lime Wire onto your computer. without your knowledge. Stay off questionable websites  It sends private information to such as porn and gambling.  others about your computer. If you obtain software from a  It also allows the user to track source other than a qualified  your online banking id’s and retailer, be careful! software. Install some type of Anti-Spyware  program such as Spysweeper, Counterspy , Ad-Ware or Spybot in order of preference. WARNING!!
  • PERSONAL HARDWARE RECOMMENDATIONS FOR A DEDICATED INTERNET CONNECTION Dial-up/Modem DSL   Least expensive is $22 per month 20x faster than dial-up   Slow $40-$50 per month   Need second line or can’t use Can use same phone line   telephone at same time Can be on the phone and internet  at same time ISDN  Cable  2.5 faster than dial-up  $30 per month for limited amount 50x faster than dial-up   of hours $40 per month  Need second line or can’t use Uses the same cable as TV   telephone at same time
  • HOW TO CHOOSE A PDA Do You Want a Phone/PDA Combo? Yes No Is having an Choose a Palm integrated lock based PDA box key a must? Yes No Treo device Blackberry or (which one other device that depends on cell has e-mail and provider) internet
  • Palm Tungsten Palm Treo 650 -Uses Palm OS - Uses Qwerty Keyboard -Address book -Access to wireless applications -To do’s -Access to any standard e-mail -Calendar Blackberry Pocket PC (iPaq) or Treo 700w -Biggest plus is e-mail capabilities - Windows OS -Access to wireless applications -MS Office -Uses Qwerty Keyboard -Address book -Doesn’t have its own PIM software -To do’s -Calendar PDA OPTIONS
  • OTHER CONSIDERATIONS Data plans Text Messaging Tethering- The ability to connect your phone to your laptop in order to provide you high speed internet connectivity.
  • E-MAIL RECOMMENDATIONS You should have a dedicated ISP… We don’t recommend Hotmail, MSN or AOL. Use an E-mail Client program, Outlook is the preferred software. Have your e-mail sent to your JPA account… This is more professional, it also helps strip out viruses. Keep your JPA and personal e-mail accounts separate and don’t forward your JPA e-mail to your personal e-mail. Check your e-mail at least 4 times a day.
  • HOW DO YOU GET YOUR JPA E-MAIL? Local ISP Internet World Sender (looks up where to deliver e-mail to) Filtered e-mails appear on the JPA Spam Report Strips out all attachments except .pub, .xls, .ppt, .doc, .pdf, and .jpg. You will JPA E-Mail still receive the e-mail. JPA Spam Server Filter Receives all e-mails not identified as Looks at e-mails and filters based on SPAM. E-mail can be read using IE, phrases, # of e-mails from a given Eudora or Outlook if not forwarded to address, # of recipients, subject, etc. your personal e-mail.
  • BEFORE YOU USE E-MAIL MARKETING… Remember the CAN-SPAM Act Requirements which includes 3 main provisions spammers must adhere to: 1) The first is labeling. Unsolicited e-mails must be clearly identified as solicitation or advertisements for products and services. 2) The second is offering an opt-out option. Senders must provide easily accessible, legitimate means for recipients to “opt-out” of receiving future messages. Additionally, senders of e-mail must comply with a recipient’s request not to receive commercial e-mails within 10 business days. It is not a defense under the CAN-SPAM Act for a business to advertise its services through illegal spam sent by a third-party because the act holds businesses knew, or should have known, their services were being promoted through illegal spam. 3) The third is the revelation of the sender’s addresses. Unsolicited e-mails must contain legitimate return e-mail addresses, as well as the sender’s postal address. For complete rules and regulations, go to http://www.ftc.gov/spam
  • WHAT I.T. IS KEY FOR YOUR BUSINESS? LEARN FILE MANAGEMENT FOR ALL YOUR PROGRAMS!!! -Where the data files are stored -How to move and copy files E-mail -Sending and receiving -Know how to send and read attachments -Become accustomed to checking your e-mail on a regular basis 1st Forms MS Office Programs Real Quest
  • TERMINOLOGY/VOCABULARY LIST Desktop- The first screen you see after you logon. This is comprised of 3 parts; the background, task bar and icons. Task bar- The gray area at the bottom of your screen which will show open applications, toolbars and the system tray. Icons- Pictures that represent short cuts, programs, folders, etc. Active Window- The current window that is open. Title Bar- The area that describes the Active Window. Minimize- Located in the top right corner of your screen and it looks like a small minus sign. This allows you to leave the application on but will only show it on the task bar.
  • TERMINOLOGY CONTINUED… Drive/Media Capacity- The amount of data a given media can hold usually measured in KB (Kilobytes), MB (Megabytes) or GB (Gigabytes). The number of files is not relevant only to the size. KB (Kilobytes) = Thousands of bytes 1 kb = 1,000 bytes MB (Megabytes) = Millions of bytes 1mb = 1,000,000 bytes GB (Gigabytes) = Billions of bytes 1 gb = 1,000,000,000 TB (Terabytes) = Trillions of bytes 1 tb = 1,000,000,000,000
  • TERMINOLOGY CONTINUED… Operating System- Examples would be Windows 98, Windows XP, Linux. Application Software- Examples would be Office 97, Office 2000, Publisher. File extension- These are the last three characters of the file name after the period; not all files have extensions. File type- This identifies the file as Word, Power Point, executable or etc. Reboot- This means to restart your computer, preferably by clicking on Start, Shutdown, Restart. Blue Screen of Death and “Close Ignore” Error- This is what would cause you to reboot your computer.
  • FILE MANAGEMENT TERMINOLOGY Folder/Directories- For computers, these words are synonymous. Files- These are individual Word Documents, Power Point presentations, Publisher documents, etc. that you create. Directory Structure- This is a generic term describing how your folders are set up on available drives. File location- This tells you what Drive the file is located on and then the directory structure.
  • FINAL RECOMMENDATIONS… Take SMALL steps!! You don’t need to buy or learn about  everything we just talked about. If you have a PC, have some type of Anti-Spyware, Anti-  Virus and Firewall software installed on it. We advise you not to let your spouse or children use your  business computer as accidents happen. Have fun with technology! It’s here to stay and the more  you know, the more you’ll grow!!