SlideShare a Scribd company logo
1 of 28
Running head: UPGRADE BRIEF 1
Operating System Upgrade Brief
for ACME
Erik W. House
Date Submitted 2/21/2016
For Dr. Harry Jackson
UPGRADE BRIEF 2
Abstract
The plans for ACME’s upcoming Operating System (OS) upgrade have been implemented in
three different milestones as requested by the Help Desk Supervisor. These milestones consisted
of a review of programming, Network design and Access databases, Information Assurance and
web browser setup. To assist with a better understanding of these implementations they have
been compiled into this single document to be archived for future use by the Help Desk.
Keywords: Operating System, Operating System Upgrade, ACME, Information
Assurance, Access Database, Database, JavaScript, Programming, Web Tutorials, Archive, Brief.
UPGRADE BRIEF 3
Table of Content
1. Opening Statement
2. Coding Review
3. Network Review
4. Access Database Review
5. Information Assurance Presentation
6. Web Tutorials
a. Homepage Setup
b. Enabling and Disabling Cookies
7. Glossary
8. References
UPGRADE BRIEF 4
Operating System Upgrade Brief
for ACME
ACME has been growing in leaps and bounds. Since its last operating system upgrade it
has grown from fourteen employees to nineteen. To help create a smooth upgrade process to our
new operating system the following projects have been conducted. A review of computer
coding, its core components was conducted resulting in the implementation of a countdown to
allow users to know when their workstation will be unviable to do the upgrade. The current
network structure was examined, recommendations for changes to the network and updates to the
network map were made.
An Access Database was created to organize and sort the information regarding which
employee had which workstation and to allow the Help Desk a quick reference for contacting
employees, what additional software maybe installed on the employees system.
Recommendations were also made to update the requested data query to include advanced
software packets.
To help both Help Desk workers, as well as employees understand the importance of
Information Assurance a PowerPoint presentation was created and included in this document. It
is also available on ACME’s intranet for new employees to review when hired.
Finally two short tutorials were created to assist Help Desk workers in updating the web
browsers of employee workstations, to reflect the company policies. These included setting the
browser homepage to the company’s webpage, and also how to enable and disable cookies as
needed.
UPGRADE BRIEF 5
Coding Review
All programming languages have five basic components in common. These are syntax,
variables, control structures, data structures, and tools (Page, 2012). One way to understand
these five components is to look at how they relate to natural or human language.
In human language, syntax are the rules that governor how a language is structured. “1.
a. The set of rules and principles in a language according to which words, phrases, and clauses
are arranged to create well-formed sentences; (also) the analysis or study of such principles; the
branch of grammar concerned with this” (Syntax Def 1a). In programming language the syntax
is the structure needed to allow the code to be executed properly (Syntax Def 4; Page, 2012).
Variables are the storage of data in a retrievable format that allows for easy access over
multiple occurrences (Page, 2012). The variables of programming language relate to the
function of words in natural language, just as values relate to the individual letters (Elkner,
Downey, & Meyers, n.d.).
Control structures are similar to the use of punctuation in written English, they allow the
programmer to tell the program when to execute the commands in the code flow (Page, 2012).
Data structure is the control system for the programming language, and can be considered
neurolinguistics level of the programming language. Neurolinguistics is the study inside of
linguistics and natural language that deals with how the brain stores and interprets language
(Menn, n.d.) and data structure deals with the meta-level of the programs data (Page, 2012),
“[d]ata structure is an arrangement of data in a computer's memory or even disk storage. An
example of several common data structures are arrays, linked lists, queues, stacks, binary trees,
and hash tables (…)” (Hunter, 2011).
UPGRADE BRIEF 6
The final commonality between all programming languages are tools. The tools used for
programming languages are designed to help the programmer work quicker (Page, 2012). These
consist of code/text editors like NotePad++ and Sublime Text Editor (Notepad. n.d.; Sublime
text. n.d.), to Integrated Development Environment (IDE) (Furey & Pottjewjid, n.d.; Page, 2012).
IDEs in particular are helpful for allowing the programmer to write the code, as well as compile,
and test it, quickly to see the results (O'Dell, 2010). The tools of programming language can be
compared to both the invention of moveable type, and now the computer word processor,
allowing for quick replication and testing of the written world.
With our upcoming Operating System upgrade, an announcement was needed to alert our
fellow workers when their computers would be upgrade. A provided JavaScript code was
provided to be modify to make this announcement. The variable of Upgrade Day was modified,
var UpgradeDay = new Date (“March 5, 2016”);, allowing the initial group to know when there
upgrade would be occurring, and then was additionally modified for the additional upgrade
groups. The following screenshots provide documentation of these changes.
UPGRADE BRIEF 7
Figure 1. Initial date, Group 1.
UPGRADE BRIEF 8
Figure 2. Two days after initial date, Group 2.
UPGRADE BRIEF 9
Figure 3. Five days after initial date, Group 3. (Please note that Group 2, and 3 show the
same number of days until upgrade due to an error in saving the original screen shot for Group
3.)
UPGRADE BRIEF 10
Figure 4. Eight days after initial date, Group 4.
UPGRADE BRIEF 11
Figure 5. Ten days after initial date, Group 5.
UPGRADE BRIEF 12
Network Review
The upcoming Operating System upgrade presents an opportune time to review and make
possible changes to ACME’s Local Area Network (LAN)
ACME currently uses the following LAN diagram:
Figure 6. Current ACME network map.
It uses six icons to represent fourteen nodes. These consist of the router-firewall,
department server, printers (one for each department) and nine IP addresses for nine computers
split evenly between three departments.
The router-firewall functions to encrypt and filter incoming traffic to prevent
unauthorized access from sources outside of the LAN (Smith, 2015c). There is a department
server which allows for each department to access information that is too large to store on a
UPGRADE BRIEF 13
single workstation or that multiple users need to access (Smith, 2015b). Each department has its
own printer which permits them to print without interfering with other departments’ printing
needs. There are nine workstations listed in the Network. The final component is the Ethernet:
Ethernet defines two units of transmission, packet and frame. The frame includes not just
the "payload" of data being transmitted but also addressing information identifying the
physical "Media Access Control" (MAC) addresses of both sender and receiver, VLAN
tagging and quality of service information, and error-correction information to detect
problems in transmission. (Rouse, n.d.b)
The structure of this Network currently follows a bus configuration, meaning that all the
data travels over a single communication line (Rouse, n.d.a; Smith, 2015a). This allows for each
node to function independently, so that if a single node goes down, the others are still able to
function (Rouse, n.d.a; Smith, 2015a). However, with the growth that ACME has experienced,
the bus configuration will not be sufficient much longer. Since the last update to the Network
diagram, ACME now has fourteen workstations compared to the nine shown on the diagram.
This information can be found in the Access database for the operating system and in the report
on said database when looking at the screenshot of the query results. Any additional growth will
mean that the Network configuration will most likely need to be changed.
Recommendations
The Network diagram needs to be updated to show the IP addresses of the additional five
workstations that ACME has recently added. It is also recommended that in addition to IP
addresses, location information should be available in the Access database regarding the
upcoming Operating System upgrade (Galler, 2013). A backup server for the department server
UPGRADE BRIEF 14
should also be added to the Network in case there is any disruption or damage to the primary
server (Wilson, n.d.).
A star network would be the best solution for any additional growth. It would allow for
additional nodes to be added, and it would present nearly the same level of stability to the bus
configuration (Rouse, n.d.c; Smith, 2015a).
UPGRADE BRIEF 15
Access Database Review
For the Operating System upgrade, the Help Desk needs to have quick access to when
specific computers will be unavailable during the upgrade. To that end an Access Database has
been created so that any Help Desk worker can quickly find this information. Additional
information regarding the data types, and modifications have been included below, along with
recommendations.
Review of Database Tables
Microsoft Access Database Data Type Terms.
To assist Help Desk workers who many not be as familiar with Access as others, the non-
text Data Types that have been used for this database that are explained briefly in a glossary that
is hyperlinked at the end of this document.
Database Tables
For this section the information presented in regular view is listed, as are the Data Types
in the Design View that are not Text. There is not a one to one correspondence between the
views.
Computer Information Table
Regular View:
Shows the Computer ID, its location, the employee ID, and which computers/users have
the Advanced Software Packet.
UPGRADE BRIEF 16
Design View
Here we see that the Computer ID Data Type is Number, Employee ID is Number, and
the Advanced Software Packet is Yes/No.
Employee Information Table
Regular View
Here we have Employee IDs, Last Name, First Name, Job Title, Office Phone (note that
this is just the employees’ extensions. If any Help Desk workers are offsite you will need to call
the office number (555)-555-5555, then the extension), and the employees’ mobile phones.
Design View
Both Employee ID and Office Phone are the Data Type of Number.
Job Titles Table
Regular View
The Job Titles at ACME are Administrative Assistant, CEO, Chairman, Director, Finance
Officer, Marketing Officer, Sales Associate, and Vice President.
Design View
The only Data Type for Job Title table is Short Text.
Upgrade Information Table
Regular View
This table shows the Computer ID, the Current OS Version a user/computer has, the
version of the OS that the Computer will be upgraded to, the Upgrade Group, and the Upgrade
Date.
UPGRADE BRIEF 17
Design View
Here we see Computer ID with a Data Type of Number. The Data Type for Upgrade Date
was Short Text and has been changed to Date/Time per supervisor’s instructions.
Review of Database Modifications
The Upgrade Dates for Operating System have been entered into the Access Database, for
this process the Upgrade Group Field was filtered by group to make sure that the dates for each
group were entered properly, and no date would be given to the wrong group. Instead of entering
the date by hand, the calendar form was utilized to take advantage of shifting the Data Type from
Short Text to Date/Time.
Review of Database Query
For the query for the database OS Upgrade, the tables are structured to pull first from the
Employee Information, then the Computer Information, and then the Upgrade Information. The
Primary Key for Employee Information is the Employee ID. For Computer Information and
Upgrade Information the Primary Key is the Computer ID.
The tables connect the Employee ID in Employee Information to the Employee ID in the
Computer Information table. The Computer Information table’s Computer ID is connected to the
Upgrade Information table’s Computer ID. These are connected to allow for easily recognizable
information across the tables, so that when the query is run it is easy for the Help Desk worker to
quickly see which user is associated with which computer.
The query pulls the Last Name, First Name and Job Title from the Employee Information
Table, the Location from Computer Information, and the Upgrade Group from the Upgrade
UPGRADE BRIEF 18
Information Table. A screen shot of query has been included:
Figure 7: Query run.
UPGRADE BRIEF 19
Recommendation
Upon review, it is my recommendation that the query be updated to also show which users have
the Advanced Software Pack. This could be helpful for the Help Desk workers if complications
arise because of the Advanced Software Pack during the OS upgrade. Screen shots of design
view and run for this query change have also been included here.
Figure 8: Design view of recommended change, showing the inclusion of Advance Software
Packet.
UPGRADE BRIEF 20
Figure 9: Query ran with Advance Software Pack recommendation, showing the addition of the
Advanced Software Packet column.
UPGRADE BRIEF 21
Information Assurance
In preparation for the Operating System Upgrade the following presentation on
information assurance was created.
WHYTAKETHE
RISK?
The importance of information assurance
at ACME.
UPGRADE BRIEF 22
Web Tutorials
Help Desk workers will need to update the company’s work station to reflect ACME’s
web policies. Google Chrome should be the only installed web browser, ACME’s website
should be set as the homepage, and that unless approved by a supervisor cookies should not be
turned on. The following tutorials are to assist Help Desk workers in completing the last two
processes.
UPGRADE BRIEF 23
Web Tutorial: Setting Company Homepage
Per company policy Google Chrome is the only browser that should be installed on
workstations, and the company’s website should be the default home page. To that end the
following tutorial has been provide to assist Help Desk workers in setting the default homepage.
Once Google Chrome is open navigate to the icon of three horizontal lines, this is the
Menu icon.
Move down to Settings:
Once the Setting screen comes up you will see Appearance, and you will need checkmark the
box Show Home Page:
Next click on the Change link and the following dialog will appear:
In the Open this Page section type http://www.acme.com and click Ok:
You have now successfully changed the default homepage on Google Chrome to the
ACME website per policy.
UPGRADE BRIEF 24
Web Tutorial: Enabling and Disabling Cookies
Cookies small text files that websites download to a user’s computer to keep track of the
websites they visit. This allows for easy information gathering, and advertisement track
(Allaboutcookies.org. n.d.). This tutorial will explain how to turn cookies on and off.
First you will neet to navigate to the three hortizonal bars, which in Chrome is the
Menu: . Next you’ll need to go to Settings:
and at the bottom you will see Show Advanced Settings:
Once this has been clicked go to the Privacy section, and click on Content Settings:
Inside of Content settings you will see:
This will need to be change to Block sites from setting any data:
You have now finished turning off cookies in Google Chrome.
UPGRADE BRIEF 25
Glossary
Data Type Number: Is specifically for numeric input, this does not include currency
which should be done with the Data Type Currency ("Introduction to data types properties,"
n.d.).
Data Type Yes/No: Is a simple Boolean value input, for those unfamiliar with Boolean
inputs are a simple True or False ("Introduction to data types and field properties," n.d.; Groh,
Alexander, & Kusleika, 2013).
Data Type Date/Time: Are meant to be used for both Date and Time, instead of using the
Short Text Data Type:
When working with dates, you’re almost always better off storing the data in a Date/Time
field than as a Short Text field. Text values sort differently from dates (dates are stored
internally as numeric values), which can upset reports and other output that rely on
chronological order. (Groh et al., 2013)
UPGRADE BRIEF 26
References
allaboutcookies.org. (n.d.). What is a cookie? Retrieved from
http://www.allaboutcookies.org/cookies/
Blake, A. (2015). Ashley Madison hack could cost dating site more than $1 billion as lawsuits
mount. Retrieved from http://www.washingtontimes.com/news/2015/aug/25/ashley-
madison-hack-could-cost-dating-site-more-1-/?page=all
Designed for security. (n.d.). Retrieved from https://lastpass.com/enterprise/security
Elkner, J., Downey, A. B. & Meyers, C. (n.d.). How to think like a computer scienintst: Learning
with python 2nd edition documentation. Retrieved from
http://www.openbookproject.net/thinkcs/python/english2e/ch02.html
Furey, A., & Pottjewjid, A. (n.d.). Integrated development environment (IDE) definition.
Retrieved from http://searchsoftwarequality.techtarget.com/definition/integrated-
development-environment
Galler, C. (2013). Network documentation best practices: What's important & how to track it.
Retrieved from http://packetpushers.net/network-documentation-best-practices-whats-
important-how-to-track-it/
Google chrome and browser security. (n.d.). Retrieved from
https://tools.google.com/dlpage/res/chrome/en-GB/more/security.html
Groh, M. R., Alexander, M., & Kusleika, D. (2013). Access 2013 bible. Somerset, NJ, USA:
John Wiley & Sons. Retrieved from http://www.ebrary.com
Introduction to data types and field properties. (n.d.). Retrieved from
https://support.office.com/en-us/article/Introduction-to-data-types-and-field-properties-
30ad644f-946c-442e-8bd2-be067361987c
UPGRADE BRIEF 27
Lowrey, A. (2014). Sony's very, very expensive hack. Retrieved from
http://nymag.com/daily/intelligencer/2014/12/sonys-very-very-expensive-hack.html
Menn, L. (n.d.). Neurolinguistics. Retrieved from
http://www.linguisticsociety.org/resource/neurolinguistics
Morgan, P. (2011). Most costly computer hacks of all time. Retrieved from
http://www.investopedia.com/financial-edge/0711/most-costly-computer-hacks-of-all-
time.aspx
Notepad++. (n.d.). Retrieved from https://notepad-plus-plus.org/
O'Dell, J. (2010). A beginner's guide to integrated development environments. Retrieved from
http://mashable.com/2010/10/06/ide-guide/#KENS3M.o7uqW
Page, T. (2012). Programming 101-the 5 basic concepts of programming language. Retrieved
from https://howtoprogramwithjava.com/programming-101-the-5-basic-concepts-of-any-
programming-language/
Perez, S. (2014). Target's data breach gets worse: 70 million customers had info stolen, including
names, emails and phones. Retrieved from http://techcrunch.com/2014/01/10/targets-data-
breach-gets-worse-70-million-customers-had-info-stolen-including-names-emails-and-
phones/
Rouse, M. (n.d.). Bus network definition. Retrieved from
http://searchnetworking.techtarget.com/definition/bus-network
Rouse, M. (n.d.). Ethernet definition. Retrieved from
http://searchnetworking.techtarget.com/definition/Ethernet
Rouse, M. (n.d.). Star network definition. Retrieved from
http://searchnetworking.techtarget.com/definition/star-network
UPGRADE BRIEF 28
Smith, J. (2015). Jan's computer basics: Computer to computer network configurations.
Retrieved from http://www.jegsworks.com/lessons/computerbasics/lesson7/lesson7-6.htm
Smith, J. (2015). Jan's computer basics: Computer to computer: Network servers. Retrieved from
http://www.jegsworks.com/lessons/computerbasics/lesson7/lesson7-7.htm
Smith, J. (2015). Jan's computer basics: Glossary firewall. Retrieved from
http://www.jegsworks.com/lessons/ComputerBasics/reference/glossary.htm#GlossF
Sublime text: The text editor you'll fall in love with. (n.d.). Retrieved from
http://www.sublimetext.com/
Syntax Def 1a, 4. (n.d.). OED online. Retrieved from
http://www.oed.com/view/Entry/196559?redirectedFrom=syntax
What is information assurance? (n.d.). Retrieved from http://www.iac.iastate.edu/
Wilson, M. (n.d.). Why is it necessary to backup your server? Retrieved from
http://www.eukhost.com/blog/webhosting/why-is-it-necessary-to-backup-your-server/

More Related Content

What's hot

WSUS Deployment on Windows Server 2008
WSUS Deployment on Windows Server 2008WSUS Deployment on Windows Server 2008
WSUS Deployment on Windows Server 2008SolarWinds
 
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSesTECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSesSymantec
 
Migrating workloads to OpenStack
Migrating workloads to OpenStackMigrating workloads to OpenStack
Migrating workloads to OpenStackopenstackstl
 
How-To: WSUS Reporting Made Easier
How-To: WSUS Reporting Made EasierHow-To: WSUS Reporting Made Easier
How-To: WSUS Reporting Made EasierSolarWinds
 
DevOps_SelfHealing
DevOps_SelfHealingDevOps_SelfHealing
DevOps_SelfHealingAtul Dhingra
 
VMware End-User-Computing Best Practices Poster
VMware End-User-Computing Best Practices PosterVMware End-User-Computing Best Practices Poster
VMware End-User-Computing Best Practices PosterVMware Academy
 
Malcolm_Spiller_CV_Current
Malcolm_Spiller_CV_CurrentMalcolm_Spiller_CV_Current
Malcolm_Spiller_CV_CurrentMalcolm Spiller
 
A hitchhiker’s guide to troubleshooting ibm connections
A hitchhiker’s guide to troubleshooting ibm connectionsA hitchhiker’s guide to troubleshooting ibm connections
A hitchhiker’s guide to troubleshooting ibm connectionsSharon James
 
V mware vdi environment
V mware vdi environmentV mware vdi environment
V mware vdi environmentajitambekar
 
Md install guide
Md install guideMd install guide
Md install guidephucnv
 
So, You're Going to the Cloud? Start Preparing NOW!
So, You're Going to the Cloud? Start Preparing NOW!So, You're Going to the Cloud? Start Preparing NOW!
So, You're Going to the Cloud? Start Preparing NOW!Wes Morgan
 

What's hot (14)

Jaime Gutierrez Resume_
Jaime Gutierrez Resume_Jaime Gutierrez Resume_
Jaime Gutierrez Resume_
 
WSUS Deployment on Windows Server 2008
WSUS Deployment on Windows Server 2008WSUS Deployment on Windows Server 2008
WSUS Deployment on Windows Server 2008
 
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSesTECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
 
Migrating workloads to OpenStack
Migrating workloads to OpenStackMigrating workloads to OpenStack
Migrating workloads to OpenStack
 
How-To: WSUS Reporting Made Easier
How-To: WSUS Reporting Made EasierHow-To: WSUS Reporting Made Easier
How-To: WSUS Reporting Made Easier
 
DevOps_SelfHealing
DevOps_SelfHealingDevOps_SelfHealing
DevOps_SelfHealing
 
VMware End-User-Computing Best Practices Poster
VMware End-User-Computing Best Practices PosterVMware End-User-Computing Best Practices Poster
VMware End-User-Computing Best Practices Poster
 
Malcolm_Spiller_CV_Current
Malcolm_Spiller_CV_CurrentMalcolm_Spiller_CV_Current
Malcolm_Spiller_CV_Current
 
A hitchhiker’s guide to troubleshooting ibm connections
A hitchhiker’s guide to troubleshooting ibm connectionsA hitchhiker’s guide to troubleshooting ibm connections
A hitchhiker’s guide to troubleshooting ibm connections
 
Z13 update
Z13 updateZ13 update
Z13 update
 
Operating system done_by_ashok
Operating system done_by_ashokOperating system done_by_ashok
Operating system done_by_ashok
 
V mware vdi environment
V mware vdi environmentV mware vdi environment
V mware vdi environment
 
Md install guide
Md install guideMd install guide
Md install guide
 
So, You're Going to the Cloud? Start Preparing NOW!
So, You're Going to the Cloud? Start Preparing NOW!So, You're Going to the Cloud? Start Preparing NOW!
So, You're Going to the Cloud? Start Preparing NOW!
 

Similar to Module9-1-Final-Project-ErikWHouse

Running Head WINDOWS AND LINUX 1WINDOWS AND LINUX12.docx
Running Head WINDOWS AND LINUX     1WINDOWS AND LINUX12.docxRunning Head WINDOWS AND LINUX     1WINDOWS AND LINUX12.docx
Running Head WINDOWS AND LINUX 1WINDOWS AND LINUX12.docxjeffsrosalyn
 
Custom Software Development Checklist by Michael Cordova
Custom Software Development Checklist by Michael CordovaCustom Software Development Checklist by Michael Cordova
Custom Software Development Checklist by Michael Cordovahoolikar77
 
Ease of full Stack Development
Ease of full Stack DevelopmentEase of full Stack Development
Ease of full Stack DevelopmentIRJET Journal
 
Developing multithreaded database application using java tools and oracle dat...
Developing multithreaded database application using java tools and oracle dat...Developing multithreaded database application using java tools and oracle dat...
Developing multithreaded database application using java tools and oracle dat...csandit
 
DEVELOPING MULTITHREADED DATABASE APPLICATION USING JAVA TOOLS AND ORACLE DAT...
DEVELOPING MULTITHREADED DATABASE APPLICATION USING JAVA TOOLS AND ORACLE DAT...DEVELOPING MULTITHREADED DATABASE APPLICATION USING JAVA TOOLS AND ORACLE DAT...
DEVELOPING MULTITHREADED DATABASE APPLICATION USING JAVA TOOLS AND ORACLE DAT...cscpconf
 
Full Stack Web Development: Vision, Challenges and Future Scope
Full Stack Web Development: Vision, Challenges and Future ScopeFull Stack Web Development: Vision, Challenges and Future Scope
Full Stack Web Development: Vision, Challenges and Future ScopeIRJET Journal
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
HIGH AVAILABILITY AND LOAD BALANCING FOR POSTGRESQL DATABASES: DESIGNING AND ...
HIGH AVAILABILITY AND LOAD BALANCING FOR POSTGRESQL DATABASES: DESIGNING AND ...HIGH AVAILABILITY AND LOAD BALANCING FOR POSTGRESQL DATABASES: DESIGNING AND ...
HIGH AVAILABILITY AND LOAD BALANCING FOR POSTGRESQL DATABASES: DESIGNING AND ...ijdms
 
Database performance management
Database performance managementDatabase performance management
Database performance managementscottaver
 
127801976 mobile-shop-management-system-documentation
127801976 mobile-shop-management-system-documentation127801976 mobile-shop-management-system-documentation
127801976 mobile-shop-management-system-documentationNitesh Kumar
 
Final Internship Presentation
Final Internship PresentationFinal Internship Presentation
Final Internship PresentationThekra Alqaeed
 
NMS Projects and POCs completed and ongoing for OSS NAM v 1.5 Linkedin
NMS Projects and POCs completed and ongoing for OSS NAM v 1.5 LinkedinNMS Projects and POCs completed and ongoing for OSS NAM v 1.5 Linkedin
NMS Projects and POCs completed and ongoing for OSS NAM v 1.5 LinkedinJavier Guillermo, MBA, MSc, PMP
 
Agile Data: Automating database refactorings
Agile Data: Automating database refactoringsAgile Data: Automating database refactorings
Agile Data: Automating database refactoringsIJERA Editor
 

Similar to Module9-1-Final-Project-ErikWHouse (20)

Running Head WINDOWS AND LINUX 1WINDOWS AND LINUX12.docx
Running Head WINDOWS AND LINUX     1WINDOWS AND LINUX12.docxRunning Head WINDOWS AND LINUX     1WINDOWS AND LINUX12.docx
Running Head WINDOWS AND LINUX 1WINDOWS AND LINUX12.docx
 
Custom Software Development Checklist by Michael Cordova
Custom Software Development Checklist by Michael CordovaCustom Software Development Checklist by Michael Cordova
Custom Software Development Checklist by Michael Cordova
 
Ease of full Stack Development
Ease of full Stack DevelopmentEase of full Stack Development
Ease of full Stack Development
 
Lakshmankumar_Resume
Lakshmankumar_ResumeLakshmankumar_Resume
Lakshmankumar_Resume
 
Ems
EmsEms
Ems
 
Developing multithreaded database application using java tools and oracle dat...
Developing multithreaded database application using java tools and oracle dat...Developing multithreaded database application using java tools and oracle dat...
Developing multithreaded database application using java tools and oracle dat...
 
DEVELOPING MULTITHREADED DATABASE APPLICATION USING JAVA TOOLS AND ORACLE DAT...
DEVELOPING MULTITHREADED DATABASE APPLICATION USING JAVA TOOLS AND ORACLE DAT...DEVELOPING MULTITHREADED DATABASE APPLICATION USING JAVA TOOLS AND ORACLE DAT...
DEVELOPING MULTITHREADED DATABASE APPLICATION USING JAVA TOOLS AND ORACLE DAT...
 
Full Stack Web Development: Vision, Challenges and Future Scope
Full Stack Web Development: Vision, Challenges and Future ScopeFull Stack Web Development: Vision, Challenges and Future Scope
Full Stack Web Development: Vision, Challenges and Future Scope
 
Fulltext01
Fulltext01Fulltext01
Fulltext01
 
Sdd 4
Sdd 4Sdd 4
Sdd 4
 
MichaelRichardsonResume2016
MichaelRichardsonResume2016MichaelRichardsonResume2016
MichaelRichardsonResume2016
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
HIGH AVAILABILITY AND LOAD BALANCING FOR POSTGRESQL DATABASES: DESIGNING AND ...
HIGH AVAILABILITY AND LOAD BALANCING FOR POSTGRESQL DATABASES: DESIGNING AND ...HIGH AVAILABILITY AND LOAD BALANCING FOR POSTGRESQL DATABASES: DESIGNING AND ...
HIGH AVAILABILITY AND LOAD BALANCING FOR POSTGRESQL DATABASES: DESIGNING AND ...
 
Database performance management
Database performance managementDatabase performance management
Database performance management
 
127801976 mobile-shop-management-system-documentation
127801976 mobile-shop-management-system-documentation127801976 mobile-shop-management-system-documentation
127801976 mobile-shop-management-system-documentation
 
Final Internship Presentation
Final Internship PresentationFinal Internship Presentation
Final Internship Presentation
 
NMS Projects and POCs completed and ongoing for OSS NAM v 1.5 Linkedin
NMS Projects and POCs completed and ongoing for OSS NAM v 1.5 LinkedinNMS Projects and POCs completed and ongoing for OSS NAM v 1.5 Linkedin
NMS Projects and POCs completed and ongoing for OSS NAM v 1.5 Linkedin
 
Agile Data: Automating database refactorings
Agile Data: Automating database refactoringsAgile Data: Automating database refactorings
Agile Data: Automating database refactorings
 
Project seminar
Project seminarProject seminar
Project seminar
 
Subbu_WM
Subbu_WMSubbu_WM
Subbu_WM
 

Module9-1-Final-Project-ErikWHouse

  • 1. Running head: UPGRADE BRIEF 1 Operating System Upgrade Brief for ACME Erik W. House Date Submitted 2/21/2016 For Dr. Harry Jackson
  • 2. UPGRADE BRIEF 2 Abstract The plans for ACME’s upcoming Operating System (OS) upgrade have been implemented in three different milestones as requested by the Help Desk Supervisor. These milestones consisted of a review of programming, Network design and Access databases, Information Assurance and web browser setup. To assist with a better understanding of these implementations they have been compiled into this single document to be archived for future use by the Help Desk. Keywords: Operating System, Operating System Upgrade, ACME, Information Assurance, Access Database, Database, JavaScript, Programming, Web Tutorials, Archive, Brief.
  • 3. UPGRADE BRIEF 3 Table of Content 1. Opening Statement 2. Coding Review 3. Network Review 4. Access Database Review 5. Information Assurance Presentation 6. Web Tutorials a. Homepage Setup b. Enabling and Disabling Cookies 7. Glossary 8. References
  • 4. UPGRADE BRIEF 4 Operating System Upgrade Brief for ACME ACME has been growing in leaps and bounds. Since its last operating system upgrade it has grown from fourteen employees to nineteen. To help create a smooth upgrade process to our new operating system the following projects have been conducted. A review of computer coding, its core components was conducted resulting in the implementation of a countdown to allow users to know when their workstation will be unviable to do the upgrade. The current network structure was examined, recommendations for changes to the network and updates to the network map were made. An Access Database was created to organize and sort the information regarding which employee had which workstation and to allow the Help Desk a quick reference for contacting employees, what additional software maybe installed on the employees system. Recommendations were also made to update the requested data query to include advanced software packets. To help both Help Desk workers, as well as employees understand the importance of Information Assurance a PowerPoint presentation was created and included in this document. It is also available on ACME’s intranet for new employees to review when hired. Finally two short tutorials were created to assist Help Desk workers in updating the web browsers of employee workstations, to reflect the company policies. These included setting the browser homepage to the company’s webpage, and also how to enable and disable cookies as needed.
  • 5. UPGRADE BRIEF 5 Coding Review All programming languages have five basic components in common. These are syntax, variables, control structures, data structures, and tools (Page, 2012). One way to understand these five components is to look at how they relate to natural or human language. In human language, syntax are the rules that governor how a language is structured. “1. a. The set of rules and principles in a language according to which words, phrases, and clauses are arranged to create well-formed sentences; (also) the analysis or study of such principles; the branch of grammar concerned with this” (Syntax Def 1a). In programming language the syntax is the structure needed to allow the code to be executed properly (Syntax Def 4; Page, 2012). Variables are the storage of data in a retrievable format that allows for easy access over multiple occurrences (Page, 2012). The variables of programming language relate to the function of words in natural language, just as values relate to the individual letters (Elkner, Downey, & Meyers, n.d.). Control structures are similar to the use of punctuation in written English, they allow the programmer to tell the program when to execute the commands in the code flow (Page, 2012). Data structure is the control system for the programming language, and can be considered neurolinguistics level of the programming language. Neurolinguistics is the study inside of linguistics and natural language that deals with how the brain stores and interprets language (Menn, n.d.) and data structure deals with the meta-level of the programs data (Page, 2012), “[d]ata structure is an arrangement of data in a computer's memory or even disk storage. An example of several common data structures are arrays, linked lists, queues, stacks, binary trees, and hash tables (…)” (Hunter, 2011).
  • 6. UPGRADE BRIEF 6 The final commonality between all programming languages are tools. The tools used for programming languages are designed to help the programmer work quicker (Page, 2012). These consist of code/text editors like NotePad++ and Sublime Text Editor (Notepad. n.d.; Sublime text. n.d.), to Integrated Development Environment (IDE) (Furey & Pottjewjid, n.d.; Page, 2012). IDEs in particular are helpful for allowing the programmer to write the code, as well as compile, and test it, quickly to see the results (O'Dell, 2010). The tools of programming language can be compared to both the invention of moveable type, and now the computer word processor, allowing for quick replication and testing of the written world. With our upcoming Operating System upgrade, an announcement was needed to alert our fellow workers when their computers would be upgrade. A provided JavaScript code was provided to be modify to make this announcement. The variable of Upgrade Day was modified, var UpgradeDay = new Date (“March 5, 2016”);, allowing the initial group to know when there upgrade would be occurring, and then was additionally modified for the additional upgrade groups. The following screenshots provide documentation of these changes.
  • 7. UPGRADE BRIEF 7 Figure 1. Initial date, Group 1.
  • 8. UPGRADE BRIEF 8 Figure 2. Two days after initial date, Group 2.
  • 9. UPGRADE BRIEF 9 Figure 3. Five days after initial date, Group 3. (Please note that Group 2, and 3 show the same number of days until upgrade due to an error in saving the original screen shot for Group 3.)
  • 10. UPGRADE BRIEF 10 Figure 4. Eight days after initial date, Group 4.
  • 11. UPGRADE BRIEF 11 Figure 5. Ten days after initial date, Group 5.
  • 12. UPGRADE BRIEF 12 Network Review The upcoming Operating System upgrade presents an opportune time to review and make possible changes to ACME’s Local Area Network (LAN) ACME currently uses the following LAN diagram: Figure 6. Current ACME network map. It uses six icons to represent fourteen nodes. These consist of the router-firewall, department server, printers (one for each department) and nine IP addresses for nine computers split evenly between three departments. The router-firewall functions to encrypt and filter incoming traffic to prevent unauthorized access from sources outside of the LAN (Smith, 2015c). There is a department server which allows for each department to access information that is too large to store on a
  • 13. UPGRADE BRIEF 13 single workstation or that multiple users need to access (Smith, 2015b). Each department has its own printer which permits them to print without interfering with other departments’ printing needs. There are nine workstations listed in the Network. The final component is the Ethernet: Ethernet defines two units of transmission, packet and frame. The frame includes not just the "payload" of data being transmitted but also addressing information identifying the physical "Media Access Control" (MAC) addresses of both sender and receiver, VLAN tagging and quality of service information, and error-correction information to detect problems in transmission. (Rouse, n.d.b) The structure of this Network currently follows a bus configuration, meaning that all the data travels over a single communication line (Rouse, n.d.a; Smith, 2015a). This allows for each node to function independently, so that if a single node goes down, the others are still able to function (Rouse, n.d.a; Smith, 2015a). However, with the growth that ACME has experienced, the bus configuration will not be sufficient much longer. Since the last update to the Network diagram, ACME now has fourteen workstations compared to the nine shown on the diagram. This information can be found in the Access database for the operating system and in the report on said database when looking at the screenshot of the query results. Any additional growth will mean that the Network configuration will most likely need to be changed. Recommendations The Network diagram needs to be updated to show the IP addresses of the additional five workstations that ACME has recently added. It is also recommended that in addition to IP addresses, location information should be available in the Access database regarding the upcoming Operating System upgrade (Galler, 2013). A backup server for the department server
  • 14. UPGRADE BRIEF 14 should also be added to the Network in case there is any disruption or damage to the primary server (Wilson, n.d.). A star network would be the best solution for any additional growth. It would allow for additional nodes to be added, and it would present nearly the same level of stability to the bus configuration (Rouse, n.d.c; Smith, 2015a).
  • 15. UPGRADE BRIEF 15 Access Database Review For the Operating System upgrade, the Help Desk needs to have quick access to when specific computers will be unavailable during the upgrade. To that end an Access Database has been created so that any Help Desk worker can quickly find this information. Additional information regarding the data types, and modifications have been included below, along with recommendations. Review of Database Tables Microsoft Access Database Data Type Terms. To assist Help Desk workers who many not be as familiar with Access as others, the non- text Data Types that have been used for this database that are explained briefly in a glossary that is hyperlinked at the end of this document. Database Tables For this section the information presented in regular view is listed, as are the Data Types in the Design View that are not Text. There is not a one to one correspondence between the views. Computer Information Table Regular View: Shows the Computer ID, its location, the employee ID, and which computers/users have the Advanced Software Packet.
  • 16. UPGRADE BRIEF 16 Design View Here we see that the Computer ID Data Type is Number, Employee ID is Number, and the Advanced Software Packet is Yes/No. Employee Information Table Regular View Here we have Employee IDs, Last Name, First Name, Job Title, Office Phone (note that this is just the employees’ extensions. If any Help Desk workers are offsite you will need to call the office number (555)-555-5555, then the extension), and the employees’ mobile phones. Design View Both Employee ID and Office Phone are the Data Type of Number. Job Titles Table Regular View The Job Titles at ACME are Administrative Assistant, CEO, Chairman, Director, Finance Officer, Marketing Officer, Sales Associate, and Vice President. Design View The only Data Type for Job Title table is Short Text. Upgrade Information Table Regular View This table shows the Computer ID, the Current OS Version a user/computer has, the version of the OS that the Computer will be upgraded to, the Upgrade Group, and the Upgrade Date.
  • 17. UPGRADE BRIEF 17 Design View Here we see Computer ID with a Data Type of Number. The Data Type for Upgrade Date was Short Text and has been changed to Date/Time per supervisor’s instructions. Review of Database Modifications The Upgrade Dates for Operating System have been entered into the Access Database, for this process the Upgrade Group Field was filtered by group to make sure that the dates for each group were entered properly, and no date would be given to the wrong group. Instead of entering the date by hand, the calendar form was utilized to take advantage of shifting the Data Type from Short Text to Date/Time. Review of Database Query For the query for the database OS Upgrade, the tables are structured to pull first from the Employee Information, then the Computer Information, and then the Upgrade Information. The Primary Key for Employee Information is the Employee ID. For Computer Information and Upgrade Information the Primary Key is the Computer ID. The tables connect the Employee ID in Employee Information to the Employee ID in the Computer Information table. The Computer Information table’s Computer ID is connected to the Upgrade Information table’s Computer ID. These are connected to allow for easily recognizable information across the tables, so that when the query is run it is easy for the Help Desk worker to quickly see which user is associated with which computer. The query pulls the Last Name, First Name and Job Title from the Employee Information Table, the Location from Computer Information, and the Upgrade Group from the Upgrade
  • 18. UPGRADE BRIEF 18 Information Table. A screen shot of query has been included: Figure 7: Query run.
  • 19. UPGRADE BRIEF 19 Recommendation Upon review, it is my recommendation that the query be updated to also show which users have the Advanced Software Pack. This could be helpful for the Help Desk workers if complications arise because of the Advanced Software Pack during the OS upgrade. Screen shots of design view and run for this query change have also been included here. Figure 8: Design view of recommended change, showing the inclusion of Advance Software Packet.
  • 20. UPGRADE BRIEF 20 Figure 9: Query ran with Advance Software Pack recommendation, showing the addition of the Advanced Software Packet column.
  • 21. UPGRADE BRIEF 21 Information Assurance In preparation for the Operating System Upgrade the following presentation on information assurance was created. WHYTAKETHE RISK? The importance of information assurance at ACME.
  • 22. UPGRADE BRIEF 22 Web Tutorials Help Desk workers will need to update the company’s work station to reflect ACME’s web policies. Google Chrome should be the only installed web browser, ACME’s website should be set as the homepage, and that unless approved by a supervisor cookies should not be turned on. The following tutorials are to assist Help Desk workers in completing the last two processes.
  • 23. UPGRADE BRIEF 23 Web Tutorial: Setting Company Homepage Per company policy Google Chrome is the only browser that should be installed on workstations, and the company’s website should be the default home page. To that end the following tutorial has been provide to assist Help Desk workers in setting the default homepage. Once Google Chrome is open navigate to the icon of three horizontal lines, this is the Menu icon. Move down to Settings: Once the Setting screen comes up you will see Appearance, and you will need checkmark the box Show Home Page: Next click on the Change link and the following dialog will appear: In the Open this Page section type http://www.acme.com and click Ok: You have now successfully changed the default homepage on Google Chrome to the ACME website per policy.
  • 24. UPGRADE BRIEF 24 Web Tutorial: Enabling and Disabling Cookies Cookies small text files that websites download to a user’s computer to keep track of the websites they visit. This allows for easy information gathering, and advertisement track (Allaboutcookies.org. n.d.). This tutorial will explain how to turn cookies on and off. First you will neet to navigate to the three hortizonal bars, which in Chrome is the Menu: . Next you’ll need to go to Settings: and at the bottom you will see Show Advanced Settings: Once this has been clicked go to the Privacy section, and click on Content Settings: Inside of Content settings you will see: This will need to be change to Block sites from setting any data: You have now finished turning off cookies in Google Chrome.
  • 25. UPGRADE BRIEF 25 Glossary Data Type Number: Is specifically for numeric input, this does not include currency which should be done with the Data Type Currency ("Introduction to data types properties," n.d.). Data Type Yes/No: Is a simple Boolean value input, for those unfamiliar with Boolean inputs are a simple True or False ("Introduction to data types and field properties," n.d.; Groh, Alexander, & Kusleika, 2013). Data Type Date/Time: Are meant to be used for both Date and Time, instead of using the Short Text Data Type: When working with dates, you’re almost always better off storing the data in a Date/Time field than as a Short Text field. Text values sort differently from dates (dates are stored internally as numeric values), which can upset reports and other output that rely on chronological order. (Groh et al., 2013)
  • 26. UPGRADE BRIEF 26 References allaboutcookies.org. (n.d.). What is a cookie? Retrieved from http://www.allaboutcookies.org/cookies/ Blake, A. (2015). Ashley Madison hack could cost dating site more than $1 billion as lawsuits mount. Retrieved from http://www.washingtontimes.com/news/2015/aug/25/ashley- madison-hack-could-cost-dating-site-more-1-/?page=all Designed for security. (n.d.). Retrieved from https://lastpass.com/enterprise/security Elkner, J., Downey, A. B. & Meyers, C. (n.d.). How to think like a computer scienintst: Learning with python 2nd edition documentation. Retrieved from http://www.openbookproject.net/thinkcs/python/english2e/ch02.html Furey, A., & Pottjewjid, A. (n.d.). Integrated development environment (IDE) definition. Retrieved from http://searchsoftwarequality.techtarget.com/definition/integrated- development-environment Galler, C. (2013). Network documentation best practices: What's important & how to track it. Retrieved from http://packetpushers.net/network-documentation-best-practices-whats- important-how-to-track-it/ Google chrome and browser security. (n.d.). Retrieved from https://tools.google.com/dlpage/res/chrome/en-GB/more/security.html Groh, M. R., Alexander, M., & Kusleika, D. (2013). Access 2013 bible. Somerset, NJ, USA: John Wiley & Sons. Retrieved from http://www.ebrary.com Introduction to data types and field properties. (n.d.). Retrieved from https://support.office.com/en-us/article/Introduction-to-data-types-and-field-properties- 30ad644f-946c-442e-8bd2-be067361987c
  • 27. UPGRADE BRIEF 27 Lowrey, A. (2014). Sony's very, very expensive hack. Retrieved from http://nymag.com/daily/intelligencer/2014/12/sonys-very-very-expensive-hack.html Menn, L. (n.d.). Neurolinguistics. Retrieved from http://www.linguisticsociety.org/resource/neurolinguistics Morgan, P. (2011). Most costly computer hacks of all time. Retrieved from http://www.investopedia.com/financial-edge/0711/most-costly-computer-hacks-of-all- time.aspx Notepad++. (n.d.). Retrieved from https://notepad-plus-plus.org/ O'Dell, J. (2010). A beginner's guide to integrated development environments. Retrieved from http://mashable.com/2010/10/06/ide-guide/#KENS3M.o7uqW Page, T. (2012). Programming 101-the 5 basic concepts of programming language. Retrieved from https://howtoprogramwithjava.com/programming-101-the-5-basic-concepts-of-any- programming-language/ Perez, S. (2014). Target's data breach gets worse: 70 million customers had info stolen, including names, emails and phones. Retrieved from http://techcrunch.com/2014/01/10/targets-data- breach-gets-worse-70-million-customers-had-info-stolen-including-names-emails-and- phones/ Rouse, M. (n.d.). Bus network definition. Retrieved from http://searchnetworking.techtarget.com/definition/bus-network Rouse, M. (n.d.). Ethernet definition. Retrieved from http://searchnetworking.techtarget.com/definition/Ethernet Rouse, M. (n.d.). Star network definition. Retrieved from http://searchnetworking.techtarget.com/definition/star-network
  • 28. UPGRADE BRIEF 28 Smith, J. (2015). Jan's computer basics: Computer to computer network configurations. Retrieved from http://www.jegsworks.com/lessons/computerbasics/lesson7/lesson7-6.htm Smith, J. (2015). Jan's computer basics: Computer to computer: Network servers. Retrieved from http://www.jegsworks.com/lessons/computerbasics/lesson7/lesson7-7.htm Smith, J. (2015). Jan's computer basics: Glossary firewall. Retrieved from http://www.jegsworks.com/lessons/ComputerBasics/reference/glossary.htm#GlossF Sublime text: The text editor you'll fall in love with. (n.d.). Retrieved from http://www.sublimetext.com/ Syntax Def 1a, 4. (n.d.). OED online. Retrieved from http://www.oed.com/view/Entry/196559?redirectedFrom=syntax What is information assurance? (n.d.). Retrieved from http://www.iac.iastate.edu/ Wilson, M. (n.d.). Why is it necessary to backup your server? Retrieved from http://www.eukhost.com/blog/webhosting/why-is-it-necessary-to-backup-your-server/