SlideShare a Scribd company logo
1 of 13
ISSC340_Presentation_Ronald_Averion.pptx
NAME: Ronald Averion
TITLE: SHARED iDRIVE
INTRODUCTION
Efficiency in data storage and data retrieval is a key factor in
the productivity of an organization.
iDRIVE enables data to be securely stored, retrieved and shared
in an efficient manner.
Background information
Shared drive enhances sharing of data in a networked
environment.
Users are divided into user groups so that privileges can be
effected and managed easily
For security purposes, users can access specific data depending
on their user group.
Conventional storage mechanisms don’t offer this flexibility.
This is an Information Technology Supported, which has been
authorized and one that is managed to give space for storage
space electronically for the users that has been authorized for
some given network. In some cases the drive is given the name
as the J: Drive (Phillips & Skagerberg, 2003). The use of the
share drive is necessary because it enables information to be
store in one place and the users from same department can share
it increasing efficiency in an organisation.
2
OBJECTIVES
To carry out research on how old methods of sharing data was
done.
To investigate the drawbacks of the old methods of storing data.
To carry out research on how shared drive is implemented.
To show the advantages of using shared drive technology in an
organization.
To carry out research on how old method of sharing files was
done.
To investigate the drawbacks of the old method of storing files.
To carry out research on how shared drive is implemented.
To recommend use of shared drive in an organization.
3
REQUIREMENTS
The shared drive should conform to Professional and Ethical
standards.
Enough funds to facilitate the whole project.
Hardware requirements(computers, servers , internetworking
tools)
Software requirements(Windows server2012 R2)
Contribute to society and human well-being.
Does your application infringe on any fundamental human
rights?
Avoid harm to others.
Be honest and trustworthy.
4
ADVANTAGES OF IDRIVE
It enables various users in an organization to share information
and data
Facilitates easier retrieval of data. This enhances performance
and productivity.
Enhances data security by implementing user groups and
privileges
Eliminates unnecessary duplication of data(Besanko, 2010).
This makes it easier when it comes to sorting out of the files
and hence makes it easier to retrieve it.
It enables the various members of a given staff who are working
in some work areas to have knowledge of the exact place from
which they have the ability of accessing enjoy form of
information that they want.
It enables folders to be kept in a hierarchy that can be
controlled hence enabling the electronic folders and the tittles
of the documents which have been stored hence easing the
situation in which some given form of information is required to
be retrieved from the system.
The third advantage is that the electronic information which
relates to a given single subject are able to be kept within a
given place together. This makes it easier in the case anyone
wants to have an access to any piece of information which are
related.
For the sake of the places ad offices where the shared drive is
used to store information in large number, it will help the
concerned parties with ensuring that not even a single of the
documents are duplicated since most of the data required will be
stored at a central space for storage for the respective work area
(Besanko, 2010). This makes it easier when it comes to sorting
out of the files and hence makes it easier to retrieve it.
5
Conclusion and recommendation
Shared Drive implements security, increases productivity,
safety and reliability.
Shared Drive enhances data sharing.
With all these advantages, it is highly recommended that
organizations should adopt and implement this new technology.
Shared Drive is to be basically designed to improve the
efficiency in information and data sharing in networked
organization. Through that the productivity of employees is
increased drastically thus increasing the profits. Security for
confidential data and information is also ensured. Because most
of the objectives of the system will be met, I can safely say that
the project will be successful. I recommend the use of the
Shared Drive as it will be of great benefit to the organisations
with networked computers.
6
REFERENCES
Besanko, D. (2010). Economics of strategy. Hoboken, NJ: John
Wiley & Sons.
Phillips, H. L., & Skagerberg, E. (2003). New perspectives on
Microsoft Windows 2000 MS-DOS command line:
Comprehensive enhanced. Boston, MA: Course Technology.
Tuemmler, B. (2012). Network shared drives: How to clean up
files for better information management. Information
Management, 46(1), 26-30,47. Retrieved from
http://search.proquest.com/docview/920207867?accountid=8289
7
ISSC340_Outline_Ronald_Averion.docx
SECTION 1.0 INTRODUCTION
1.1 Introduction of the Project
This is an Information Technology Supported, which has been
authorized and one that is managed to give space for storage
space electronically for the users that has been authorized for
some given network. In some cases the drive is given the name
as the J: Drive (Phillips & Skagerberg, 2003). The use of the
share drive is necessary because it enables information to be
store in one place and the users from same department can share
it increasing efficiency in an organisation.
1.2 Problem Statement
In most of the organisations information from all departments is
stored in a common storage. This becomes very difficult in
retrieving the information that is required by a specific user in a
specific department. Also some information from some
departments such as accounts, human resource and procurement
should be confidential and other users should not access it.
SECTION 2.0 BACKGROUND REVIEW
2.1 Background
Shared drive is storage drive that stores data and information
which is accessed and shared by a certain group of employees in
an organization. In a local area network of an organization
shared drives should be implemented for each department
because the employees of specific departments handle common
type of data and information making it easier to access it and
run daily business processes efficiently.
2.2 Aims
To research and analyse on how to create a Shared Drive that
will provide solutions to problem caused by normal storage
method in an organization.
2.3 Objectives
To carry out research on how old method of sharing files was
done.
To investigate the drawbacks of the old method of storing files.
To carry out research on how shared drive is implemented.
To recommend use of shared drive in an organization.
2.4 Professional and Ethical Issues
Professional and ethical issues addresses what is seen to be
right and wrong within a profession as whole rather than just
within specific company. There are several ethics involved in
Information Technology Professionals:
1) Contribute to society and human well-being.
In this principle the following considerations must be taken care
of:
· Does your application infringe on any fundamental human
rights?
· Could it be seen as culturally insensitive?
· Could it pose a threat to the health and safety of users or to
the environment?
Successfully this consideration has been taken care of in
implementation of Shared Drive and there are no side effects
that will be caused by the application. As an application
developer you would (hopefully) never intentionally design an
application that does any of the above ethical principles.
2) Avoid harm to others.
In the context of this principle, harm relates not only injury or
environment impact, but also to loss of data, information or
property, both intentional and accidental. Shared Drive
considers this principle in that data integrity will be ensured.
3) Be honest and trustworthy.
This principle applies to your applications, your organization
and yourself. It is about;
· Being honest about your qualifications.
· Being honest about what data you collect, why you collect it,
and how it is stored.
· Being honest about what your application ca and cannot do.
4) Give proper credit for intellectual property.
As per ACM “…one must not take credit for other’s ideas or
work, even in cases where the work has not been explicitly
protected by copyright, patent etc.”
5) Honour contracts, agreements and assigned responsibilities.
This has more to do with professional conduct than it does with
a code of ethics, and is also more applicable to developers who
work within an organization, or who take on contracted work
for others.
SECTION 3.0 TECHNICAL SOLUTION TO THE PROJECT
3.1 Budget
The project budget is the estimated financial plan for the
project, for which funding is required. The table below shows
the budget for the Shared Drive project.
REQUIREMENTS
COST(KSHS)
1
Computer
45000
2
Software
4000
3
UPS
3500
4
Backups (External HDD & CD’s)
5000
5
Papers & other stationery
2500
TOTAL
60000
3.2 Resources List
3.2.1 Hardware
The minimum hardware requirements needed to develop the
system are:-
5-10 computers
Networking tools
Network attached drives
3.2.2 Software
The software used in developing this system are:-
Windows server 2012 R2
3.3 Logical Functionality
After networking all computers in an organisation shared drive
is installed and the appropriate users over the network are
dedicated to use the drive. The information stored on a shared
drive can only be accessed by specific users over the network.
3.4 Deliverables
i. Simple LAN
ii. Shared Drive
SECTION 4.0 DISCUSSION OF THE SOLUTION
4.1 Advantages of the
Solution
I. It enables the various members of a given staff who are
working in some work areas to have knowledge of the exact
place from which they have the ability of accessing enjoy form
of information that they want.
II. It enables folders to be kept in a hierarchy that can be
controlled hence enabling the electronic folders and the tittles
of the documents which have been stored hence easing the
situation in which some given form of information is required to
be retrieved from the system.
III. The third advantage is that the electronic information which
relates to a given single subject are able to be kept within a
given place together. This makes it easier in the case anyone
wants to have an access to any piece of information which are
related.
IV. For the sake of the places ad offices where the shared drive
is used to store information in large number, it will help the
concerned parties with ensuring that not even a single of the
documents are duplicated since most of the data required will be
stored at a central space for storage for the respective work area
(Besanko, 2010). This makes it easier when it comes to sorting
out of the files and hence makes it easier to retrieve it.
4.2 Recommendations
I recommend the use of shared drive because it increases
efficiency in carrying out business processes and also it ensures
security of confidential data and information of and
organization since it is only some users who can access it.
SECTION 5.0 CONCLUSION
Shared Drive is to be basically designed to improve the
efficiency in information and data sharing in networked
organization. Through that the productivity of employees is
increased drastically thus increasing the profits. Security for
confidential data and information is also ensured. Because most
of the objectives of the system will be met, I can safely say that
the project will be successful. I recommend the use of the
Shared Drive as it will be of great benefit to the organisations
with networked computers.
REFERENCES
Besanko, D. (2010). Economics of strategy. Hoboken, NJ: John
Wiley & Sons.
Phillips, H. L., & Skagerberg, E. (2003). New perspectives on
Microsoft Windows 2000 MS-DOS command line:
Comprehensive enhanced. Boston, MA: Course Technology.
ISSC340_Project.docx
Project Final Report
Prepare a final report for your project in Microsoft Word. The
final project report should have 10-15 pages, excluding the title
page and the references page, all in APA format. The report is
such that it would serve as a guide for the actual
implementation of the project.
Follow the following general format of the report:
· Title of project, name, class, etc.
· Abstract of the project
· Description and goal of the project
· Technical background and literature review on the project
subject
· Technical description of the proposed solution to the project
(including diagrams, graphics, equipment specs, vendors)
· Analysis and discussion of the solution to the project (e.g.,
benefits to your employer)
· References (minimum of 5, in APA)
Please note:
1 A network diagram is required to illustrate the project, embed
the diagram into the final report
2 You may use resources from any library, government library,
or any peer-reviewed reference (Wikipedia and any other
publicly-reviewed source is not accepted). The final document
must by at least 8 pages double-spaced, 1" margin all around,
black12 point fonts (Times New Roman or Arial) with correct
citations of all utilized references/sources, (pictures, graphics,
etc.). The title page and references are also required but don't
count in the minimum page count. A minimum of 5 references
are needed.
3 The final project report will be subjected to checking against
plagiarism upon submission. Turnitin is built into the Sakai
classroom. The paper must follow acceptable originality criteria
(no more than 15% max originality index, and 2% per individual
source match are allowed).
Topic.docx
An area where the drive can be easily used is in the military.
The large space for storage that it offers will enable the military
to keep as many files of its operations as possible. The fact that
they can be easily removed without causing any form of damage
enables the military to evacuate their stations with the drive at
hand in case of an attack.

More Related Content

Similar to ISSC340_Presentation_Ronald_Averion.pptxNAME Ronald Averi.docx

Exercises portfolio-Digital Curation Tools (IS40620)
Exercises portfolio-Digital Curation Tools (IS40620)Exercises portfolio-Digital Curation Tools (IS40620)
Exercises portfolio-Digital Curation Tools (IS40620)
softwaresatish
 
IT488_JaySexton_Week5GP
IT488_JaySexton_Week5GPIT488_JaySexton_Week5GP
IT488_JaySexton_Week5GP
Jay T Sexton
 
CESSI Digital Library Case Study Eng
CESSI Digital Library Case Study EngCESSI Digital Library Case Study Eng
CESSI Digital Library Case Study Eng
atolomei
 

Similar to ISSC340_Presentation_Ronald_Averion.pptxNAME Ronald Averi.docx (20)

ESG - HDS HCP Anywhere Easy, Secure, On-Premises File Sharing
ESG - HDS HCP Anywhere Easy, Secure, On-Premises File SharingESG - HDS HCP Anywhere Easy, Secure, On-Premises File Sharing
ESG - HDS HCP Anywhere Easy, Secure, On-Premises File Sharing
 
Impact of cloud services on software development life
Impact of cloud services on software development life Impact of cloud services on software development life
Impact of cloud services on software development life
 
Exercises portfolio-Digital Curation Tools (IS40620)
Exercises portfolio-Digital Curation Tools (IS40620)Exercises portfolio-Digital Curation Tools (IS40620)
Exercises portfolio-Digital Curation Tools (IS40620)
 
Choosing A Secondary Storage
Choosing A Secondary StorageChoosing A Secondary Storage
Choosing A Secondary Storage
 
Your Data is Waiting. What are the Top 5 Trends for Data in 2022? (ASEAN)
Your Data is Waiting. What are the Top 5 Trends for Data in 2022? (ASEAN)Your Data is Waiting. What are the Top 5 Trends for Data in 2022? (ASEAN)
Your Data is Waiting. What are the Top 5 Trends for Data in 2022? (ASEAN)
 
IT488_JaySexton_Week5GP
IT488_JaySexton_Week5GPIT488_JaySexton_Week5GP
IT488_JaySexton_Week5GP
 
Huddle Sync - Intelligent File Sync
Huddle Sync - Intelligent File SyncHuddle Sync - Intelligent File Sync
Huddle Sync - Intelligent File Sync
 
data-mesh_whitepaper_dec2021.pdf
data-mesh_whitepaper_dec2021.pdfdata-mesh_whitepaper_dec2021.pdf
data-mesh_whitepaper_dec2021.pdf
 
Syncing up with business mobility: A look at the capabilities and uses of fil...
Syncing up with business mobility: A look at the capabilities and uses of fil...Syncing up with business mobility: A look at the capabilities and uses of fil...
Syncing up with business mobility: A look at the capabilities and uses of fil...
 
Cloudciti Enterprise File Share (EFS)
Cloudciti Enterprise File Share (EFS)Cloudciti Enterprise File Share (EFS)
Cloudciti Enterprise File Share (EFS)
 
Cloud Storage System like Dropbox
Cloud Storage System like DropboxCloud Storage System like Dropbox
Cloud Storage System like Dropbox
 
IRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on CloudIRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on Cloud
 
50120140504001
5012014050400150120140504001
50120140504001
 
Challenges and Proposed Solutions for Cloud Forensic
Challenges and Proposed Solutions for Cloud ForensicChallenges and Proposed Solutions for Cloud Forensic
Challenges and Proposed Solutions for Cloud Forensic
 
CESSI Digital Library Case Study Eng
CESSI Digital Library Case Study EngCESSI Digital Library Case Study Eng
CESSI Digital Library Case Study Eng
 
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
 
IRJET- Secured Hadoop Environment
IRJET- Secured Hadoop EnvironmentIRJET- Secured Hadoop Environment
IRJET- Secured Hadoop Environment
 
Enterprise data protection meeting
Enterprise data protection meetingEnterprise data protection meeting
Enterprise data protection meeting
 
Cloud Data Protection for the Masses
Cloud Data Protection for the MassesCloud Data Protection for the Masses
Cloud Data Protection for the Masses
 
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
 

More from christiandean12115

10.11771066480704270150THE FAMILY JOURNAL COUNSELING AND THE.docx
10.11771066480704270150THE FAMILY JOURNAL COUNSELING AND THE.docx10.11771066480704270150THE FAMILY JOURNAL COUNSELING AND THE.docx
10.11771066480704270150THE FAMILY JOURNAL COUNSELING AND THE.docx
christiandean12115
 
10.11771066480703252339 ARTICLETHE FAMILY JOURNAL COUNSELING.docx
10.11771066480703252339 ARTICLETHE FAMILY JOURNAL COUNSELING.docx10.11771066480703252339 ARTICLETHE FAMILY JOURNAL COUNSELING.docx
10.11771066480703252339 ARTICLETHE FAMILY JOURNAL COUNSELING.docx
christiandean12115
 
10.11770022427803260263ARTICLEJOURNAL OF RESEARCH IN CRIME AN.docx
10.11770022427803260263ARTICLEJOURNAL OF RESEARCH IN CRIME AN.docx10.11770022427803260263ARTICLEJOURNAL OF RESEARCH IN CRIME AN.docx
10.11770022427803260263ARTICLEJOURNAL OF RESEARCH IN CRIME AN.docx
christiandean12115
 
10.11770022487105285962Journal of Teacher Education, Vol. 57,.docx
10.11770022487105285962Journal of Teacher Education, Vol. 57,.docx10.11770022487105285962Journal of Teacher Education, Vol. 57,.docx
10.11770022487105285962Journal of Teacher Education, Vol. 57,.docx
christiandean12115
 
10.11770011000002250638ARTICLETHE COUNSELING PSYCHOLOGIST M.docx
10.11770011000002250638ARTICLETHE COUNSELING PSYCHOLOGIST  M.docx10.11770011000002250638ARTICLETHE COUNSELING PSYCHOLOGIST  M.docx
10.11770011000002250638ARTICLETHE COUNSELING PSYCHOLOGIST M.docx
christiandean12115
 
10.0 ptsPresentation of information was exceptional and included.docx
10.0 ptsPresentation of information was exceptional and included.docx10.0 ptsPresentation of information was exceptional and included.docx
10.0 ptsPresentation of information was exceptional and included.docx
christiandean12115
 
10-K1f12312012-10k.htm10-KUNITED STATESSECURIT.docx
10-K1f12312012-10k.htm10-KUNITED STATESSECURIT.docx10-K1f12312012-10k.htm10-KUNITED STATESSECURIT.docx
10-K1f12312012-10k.htm10-KUNITED STATESSECURIT.docx
christiandean12115
 
10-K 1 f12312012-10k.htm 10-K UNITED STATESSECURITIES AN.docx
10-K 1 f12312012-10k.htm 10-K UNITED STATESSECURITIES AN.docx10-K 1 f12312012-10k.htm 10-K UNITED STATESSECURITIES AN.docx
10-K 1 f12312012-10k.htm 10-K UNITED STATESSECURITIES AN.docx
christiandean12115
 
10 What does a golfer, tennis player or cricketer (or any othe.docx
10 What does a golfer, tennis player or cricketer (or any othe.docx10 What does a golfer, tennis player or cricketer (or any othe.docx
10 What does a golfer, tennis player or cricketer (or any othe.docx
christiandean12115
 
10 September 2018· Watch video· Take notes withfor students.docx
10 September 2018· Watch video· Take notes withfor students.docx10 September 2018· Watch video· Take notes withfor students.docx
10 September 2018· Watch video· Take notes withfor students.docx
christiandean12115
 
10 Research-Based Tips for Enhancing Literacy Instruct.docx
10 Research-Based Tips for Enhancing Literacy Instruct.docx10 Research-Based Tips for Enhancing Literacy Instruct.docx
10 Research-Based Tips for Enhancing Literacy Instruct.docx
christiandean12115
 
10 Strategic Points for the Prospectus, Proposal, and Direct Pract.docx
10 Strategic Points for the Prospectus, Proposal, and Direct Pract.docx10 Strategic Points for the Prospectus, Proposal, and Direct Pract.docx
10 Strategic Points for the Prospectus, Proposal, and Direct Pract.docx
christiandean12115
 
10 Most Common Err.docx
10 Most Common Err.docx10 Most Common Err.docx
10 Most Common Err.docx
christiandean12115
 
10 Introduction Ask any IT manager about the chall.docx
10 Introduction Ask any IT manager about the chall.docx10 Introduction Ask any IT manager about the chall.docx
10 Introduction Ask any IT manager about the chall.docx
christiandean12115
 
10 Customer Acquisition and Relationship ManagementDmitry .docx
10 Customer Acquisition and Relationship ManagementDmitry .docx10 Customer Acquisition and Relationship ManagementDmitry .docx
10 Customer Acquisition and Relationship ManagementDmitry .docx
christiandean12115
 
10 ELEMENTS OF LITERATURE (FROM A TO Z)   1  ​PLOT​ (seri.docx
10 ELEMENTS OF LITERATURE (FROM A TO Z)   1  ​PLOT​  (seri.docx10 ELEMENTS OF LITERATURE (FROM A TO Z)   1  ​PLOT​  (seri.docx
10 ELEMENTS OF LITERATURE (FROM A TO Z)   1  ​PLOT​ (seri.docx
christiandean12115
 
10 ers. Although one can learn definitions favor- able to .docx
10 ers. Although one can learn definitions favor- able to .docx10 ers. Although one can learn definitions favor- able to .docx
10 ers. Although one can learn definitions favor- able to .docx
christiandean12115
 

More from christiandean12115 (20)

100 Original WorkZero PlagiarismGraduate Level Writing Required.docx
100 Original WorkZero PlagiarismGraduate Level Writing Required.docx100 Original WorkZero PlagiarismGraduate Level Writing Required.docx
100 Original WorkZero PlagiarismGraduate Level Writing Required.docx
 
10.11771066480704270150THE FAMILY JOURNAL COUNSELING AND THE.docx
10.11771066480704270150THE FAMILY JOURNAL COUNSELING AND THE.docx10.11771066480704270150THE FAMILY JOURNAL COUNSELING AND THE.docx
10.11771066480704270150THE FAMILY JOURNAL COUNSELING AND THE.docx
 
10.11771066480703252339 ARTICLETHE FAMILY JOURNAL COUNSELING.docx
10.11771066480703252339 ARTICLETHE FAMILY JOURNAL COUNSELING.docx10.11771066480703252339 ARTICLETHE FAMILY JOURNAL COUNSELING.docx
10.11771066480703252339 ARTICLETHE FAMILY JOURNAL COUNSELING.docx
 
10.11770022427803260263ARTICLEJOURNAL OF RESEARCH IN CRIME AN.docx
10.11770022427803260263ARTICLEJOURNAL OF RESEARCH IN CRIME AN.docx10.11770022427803260263ARTICLEJOURNAL OF RESEARCH IN CRIME AN.docx
10.11770022427803260263ARTICLEJOURNAL OF RESEARCH IN CRIME AN.docx
 
10.11770022487105285962Journal of Teacher Education, Vol. 57,.docx
10.11770022487105285962Journal of Teacher Education, Vol. 57,.docx10.11770022487105285962Journal of Teacher Education, Vol. 57,.docx
10.11770022487105285962Journal of Teacher Education, Vol. 57,.docx
 
10.11770011000002250638ARTICLETHE COUNSELING PSYCHOLOGIST M.docx
10.11770011000002250638ARTICLETHE COUNSELING PSYCHOLOGIST  M.docx10.11770011000002250638ARTICLETHE COUNSELING PSYCHOLOGIST  M.docx
10.11770011000002250638ARTICLETHE COUNSELING PSYCHOLOGIST M.docx
 
10.1 What are three broad mechanisms that malware can use to propa.docx
10.1 What are three broad mechanisms that malware can use to propa.docx10.1 What are three broad mechanisms that malware can use to propa.docx
10.1 What are three broad mechanisms that malware can use to propa.docx
 
10.0 ptsPresentation of information was exceptional and included.docx
10.0 ptsPresentation of information was exceptional and included.docx10.0 ptsPresentation of information was exceptional and included.docx
10.0 ptsPresentation of information was exceptional and included.docx
 
10-K1f12312012-10k.htm10-KUNITED STATESSECURIT.docx
10-K1f12312012-10k.htm10-KUNITED STATESSECURIT.docx10-K1f12312012-10k.htm10-KUNITED STATESSECURIT.docx
10-K1f12312012-10k.htm10-KUNITED STATESSECURIT.docx
 
10-K 1 f12312012-10k.htm 10-K UNITED STATESSECURITIES AN.docx
10-K 1 f12312012-10k.htm 10-K UNITED STATESSECURITIES AN.docx10-K 1 f12312012-10k.htm 10-K UNITED STATESSECURITIES AN.docx
10-K 1 f12312012-10k.htm 10-K UNITED STATESSECURITIES AN.docx
 
10 What does a golfer, tennis player or cricketer (or any othe.docx
10 What does a golfer, tennis player or cricketer (or any othe.docx10 What does a golfer, tennis player or cricketer (or any othe.docx
10 What does a golfer, tennis player or cricketer (or any othe.docx
 
10 September 2018· Watch video· Take notes withfor students.docx
10 September 2018· Watch video· Take notes withfor students.docx10 September 2018· Watch video· Take notes withfor students.docx
10 September 2018· Watch video· Take notes withfor students.docx
 
10 Research-Based Tips for Enhancing Literacy Instruct.docx
10 Research-Based Tips for Enhancing Literacy Instruct.docx10 Research-Based Tips for Enhancing Literacy Instruct.docx
10 Research-Based Tips for Enhancing Literacy Instruct.docx
 
10 Strategic Points for the Prospectus, Proposal, and Direct Pract.docx
10 Strategic Points for the Prospectus, Proposal, and Direct Pract.docx10 Strategic Points for the Prospectus, Proposal, and Direct Pract.docx
10 Strategic Points for the Prospectus, Proposal, and Direct Pract.docx
 
10 Most Common Err.docx
10 Most Common Err.docx10 Most Common Err.docx
10 Most Common Err.docx
 
10 Introduction Ask any IT manager about the chall.docx
10 Introduction Ask any IT manager about the chall.docx10 Introduction Ask any IT manager about the chall.docx
10 Introduction Ask any IT manager about the chall.docx
 
10 Customer Acquisition and Relationship ManagementDmitry .docx
10 Customer Acquisition and Relationship ManagementDmitry .docx10 Customer Acquisition and Relationship ManagementDmitry .docx
10 Customer Acquisition and Relationship ManagementDmitry .docx
 
10 ELEMENTS OF LITERATURE (FROM A TO Z)   1  ​PLOT​ (seri.docx
10 ELEMENTS OF LITERATURE (FROM A TO Z)   1  ​PLOT​  (seri.docx10 ELEMENTS OF LITERATURE (FROM A TO Z)   1  ​PLOT​  (seri.docx
10 ELEMENTS OF LITERATURE (FROM A TO Z)   1  ​PLOT​ (seri.docx
 
10 ers. Although one can learn definitions favor- able to .docx
10 ers. Although one can learn definitions favor- able to .docx10 ers. Although one can learn definitions favor- able to .docx
10 ers. Although one can learn definitions favor- able to .docx
 
10 academic sources about the topic (Why is America so violent).docx
10 academic sources about the topic (Why is America so violent).docx10 academic sources about the topic (Why is America so violent).docx
10 academic sources about the topic (Why is America so violent).docx
 

Recently uploaded

Recently uploaded (20)

Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
latest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answerslatest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answers
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Basic Intentional Injuries Health Education
Basic Intentional Injuries Health EducationBasic Intentional Injuries Health Education
Basic Intentional Injuries Health Education
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 

ISSC340_Presentation_Ronald_Averion.pptxNAME Ronald Averi.docx

  • 1. ISSC340_Presentation_Ronald_Averion.pptx NAME: Ronald Averion TITLE: SHARED iDRIVE INTRODUCTION Efficiency in data storage and data retrieval is a key factor in the productivity of an organization. iDRIVE enables data to be securely stored, retrieved and shared in an efficient manner. Background information Shared drive enhances sharing of data in a networked environment. Users are divided into user groups so that privileges can be effected and managed easily For security purposes, users can access specific data depending on their user group. Conventional storage mechanisms don’t offer this flexibility. This is an Information Technology Supported, which has been authorized and one that is managed to give space for storage space electronically for the users that has been authorized for some given network. In some cases the drive is given the name as the J: Drive (Phillips & Skagerberg, 2003). The use of the share drive is necessary because it enables information to be store in one place and the users from same department can share it increasing efficiency in an organisation. 2
  • 2. OBJECTIVES To carry out research on how old methods of sharing data was done. To investigate the drawbacks of the old methods of storing data. To carry out research on how shared drive is implemented. To show the advantages of using shared drive technology in an organization. To carry out research on how old method of sharing files was done. To investigate the drawbacks of the old method of storing files. To carry out research on how shared drive is implemented. To recommend use of shared drive in an organization. 3 REQUIREMENTS The shared drive should conform to Professional and Ethical standards. Enough funds to facilitate the whole project. Hardware requirements(computers, servers , internetworking tools) Software requirements(Windows server2012 R2) Contribute to society and human well-being. Does your application infringe on any fundamental human rights? Avoid harm to others. Be honest and trustworthy.
  • 3. 4 ADVANTAGES OF IDRIVE It enables various users in an organization to share information and data Facilitates easier retrieval of data. This enhances performance and productivity. Enhances data security by implementing user groups and privileges Eliminates unnecessary duplication of data(Besanko, 2010). This makes it easier when it comes to sorting out of the files and hence makes it easier to retrieve it. It enables the various members of a given staff who are working in some work areas to have knowledge of the exact place from which they have the ability of accessing enjoy form of information that they want. It enables folders to be kept in a hierarchy that can be controlled hence enabling the electronic folders and the tittles of the documents which have been stored hence easing the situation in which some given form of information is required to be retrieved from the system. The third advantage is that the electronic information which relates to a given single subject are able to be kept within a given place together. This makes it easier in the case anyone wants to have an access to any piece of information which are related. For the sake of the places ad offices where the shared drive is used to store information in large number, it will help the concerned parties with ensuring that not even a single of the documents are duplicated since most of the data required will be
  • 4. stored at a central space for storage for the respective work area (Besanko, 2010). This makes it easier when it comes to sorting out of the files and hence makes it easier to retrieve it. 5 Conclusion and recommendation Shared Drive implements security, increases productivity, safety and reliability. Shared Drive enhances data sharing. With all these advantages, it is highly recommended that organizations should adopt and implement this new technology. Shared Drive is to be basically designed to improve the efficiency in information and data sharing in networked organization. Through that the productivity of employees is increased drastically thus increasing the profits. Security for confidential data and information is also ensured. Because most of the objectives of the system will be met, I can safely say that the project will be successful. I recommend the use of the Shared Drive as it will be of great benefit to the organisations with networked computers. 6 REFERENCES Besanko, D. (2010). Economics of strategy. Hoboken, NJ: John Wiley & Sons. Phillips, H. L., & Skagerberg, E. (2003). New perspectives on Microsoft Windows 2000 MS-DOS command line: Comprehensive enhanced. Boston, MA: Course Technology. Tuemmler, B. (2012). Network shared drives: How to clean up files for better information management. Information Management, 46(1), 26-30,47. Retrieved from
  • 5. http://search.proquest.com/docview/920207867?accountid=8289 7 ISSC340_Outline_Ronald_Averion.docx SECTION 1.0 INTRODUCTION 1.1 Introduction of the Project This is an Information Technology Supported, which has been authorized and one that is managed to give space for storage space electronically for the users that has been authorized for some given network. In some cases the drive is given the name as the J: Drive (Phillips & Skagerberg, 2003). The use of the share drive is necessary because it enables information to be store in one place and the users from same department can share it increasing efficiency in an organisation. 1.2 Problem Statement In most of the organisations information from all departments is stored in a common storage. This becomes very difficult in retrieving the information that is required by a specific user in a specific department. Also some information from some departments such as accounts, human resource and procurement should be confidential and other users should not access it. SECTION 2.0 BACKGROUND REVIEW 2.1 Background Shared drive is storage drive that stores data and information which is accessed and shared by a certain group of employees in an organization. In a local area network of an organization shared drives should be implemented for each department because the employees of specific departments handle common type of data and information making it easier to access it and run daily business processes efficiently.
  • 6. 2.2 Aims To research and analyse on how to create a Shared Drive that will provide solutions to problem caused by normal storage method in an organization. 2.3 Objectives To carry out research on how old method of sharing files was done. To investigate the drawbacks of the old method of storing files. To carry out research on how shared drive is implemented. To recommend use of shared drive in an organization. 2.4 Professional and Ethical Issues Professional and ethical issues addresses what is seen to be right and wrong within a profession as whole rather than just within specific company. There are several ethics involved in Information Technology Professionals: 1) Contribute to society and human well-being. In this principle the following considerations must be taken care of: · Does your application infringe on any fundamental human rights? · Could it be seen as culturally insensitive? · Could it pose a threat to the health and safety of users or to the environment? Successfully this consideration has been taken care of in implementation of Shared Drive and there are no side effects that will be caused by the application. As an application developer you would (hopefully) never intentionally design an application that does any of the above ethical principles. 2) Avoid harm to others. In the context of this principle, harm relates not only injury or environment impact, but also to loss of data, information or property, both intentional and accidental. Shared Drive considers this principle in that data integrity will be ensured. 3) Be honest and trustworthy. This principle applies to your applications, your organization and yourself. It is about;
  • 7. · Being honest about your qualifications. · Being honest about what data you collect, why you collect it, and how it is stored. · Being honest about what your application ca and cannot do. 4) Give proper credit for intellectual property. As per ACM “…one must not take credit for other’s ideas or work, even in cases where the work has not been explicitly protected by copyright, patent etc.” 5) Honour contracts, agreements and assigned responsibilities. This has more to do with professional conduct than it does with a code of ethics, and is also more applicable to developers who work within an organization, or who take on contracted work for others. SECTION 3.0 TECHNICAL SOLUTION TO THE PROJECT 3.1 Budget The project budget is the estimated financial plan for the project, for which funding is required. The table below shows the budget for the Shared Drive project. REQUIREMENTS COST(KSHS) 1 Computer 45000 2 Software 4000 3
  • 8. UPS 3500 4 Backups (External HDD & CD’s) 5000 5 Papers & other stationery 2500 TOTAL 60000 3.2 Resources List 3.2.1 Hardware The minimum hardware requirements needed to develop the system are:- 5-10 computers Networking tools Network attached drives 3.2.2 Software The software used in developing this system are:- Windows server 2012 R2 3.3 Logical Functionality After networking all computers in an organisation shared drive is installed and the appropriate users over the network are dedicated to use the drive. The information stored on a shared drive can only be accessed by specific users over the network. 3.4 Deliverables i. Simple LAN ii. Shared Drive SECTION 4.0 DISCUSSION OF THE SOLUTION 4.1 Advantages of the
  • 9. Solution I. It enables the various members of a given staff who are working in some work areas to have knowledge of the exact place from which they have the ability of accessing enjoy form of information that they want. II. It enables folders to be kept in a hierarchy that can be controlled hence enabling the electronic folders and the tittles of the documents which have been stored hence easing the situation in which some given form of information is required to be retrieved from the system. III. The third advantage is that the electronic information which relates to a given single subject are able to be kept within a given place together. This makes it easier in the case anyone wants to have an access to any piece of information which are related. IV. For the sake of the places ad offices where the shared drive is used to store information in large number, it will help the concerned parties with ensuring that not even a single of the documents are duplicated since most of the data required will be stored at a central space for storage for the respective work area (Besanko, 2010). This makes it easier when it comes to sorting
  • 10. out of the files and hence makes it easier to retrieve it. 4.2 Recommendations I recommend the use of shared drive because it increases efficiency in carrying out business processes and also it ensures security of confidential data and information of and organization since it is only some users who can access it. SECTION 5.0 CONCLUSION Shared Drive is to be basically designed to improve the efficiency in information and data sharing in networked organization. Through that the productivity of employees is increased drastically thus increasing the profits. Security for confidential data and information is also ensured. Because most of the objectives of the system will be met, I can safely say that the project will be successful. I recommend the use of the Shared Drive as it will be of great benefit to the organisations with networked computers. REFERENCES Besanko, D. (2010). Economics of strategy. Hoboken, NJ: John Wiley & Sons. Phillips, H. L., & Skagerberg, E. (2003). New perspectives on Microsoft Windows 2000 MS-DOS command line:
  • 11. Comprehensive enhanced. Boston, MA: Course Technology. ISSC340_Project.docx Project Final Report Prepare a final report for your project in Microsoft Word. The final project report should have 10-15 pages, excluding the title page and the references page, all in APA format. The report is such that it would serve as a guide for the actual implementation of the project. Follow the following general format of the report: · Title of project, name, class, etc. · Abstract of the project · Description and goal of the project · Technical background and literature review on the project subject · Technical description of the proposed solution to the project (including diagrams, graphics, equipment specs, vendors) · Analysis and discussion of the solution to the project (e.g., benefits to your employer) · References (minimum of 5, in APA) Please note:
  • 12. 1 A network diagram is required to illustrate the project, embed the diagram into the final report 2 You may use resources from any library, government library, or any peer-reviewed reference (Wikipedia and any other publicly-reviewed source is not accepted). The final document must by at least 8 pages double-spaced, 1" margin all around, black12 point fonts (Times New Roman or Arial) with correct citations of all utilized references/sources, (pictures, graphics, etc.). The title page and references are also required but don't count in the minimum page count. A minimum of 5 references are needed. 3 The final project report will be subjected to checking against plagiarism upon submission. Turnitin is built into the Sakai classroom. The paper must follow acceptable originality criteria (no more than 15% max originality index, and 2% per individual source match are allowed). Topic.docx An area where the drive can be easily used is in the military. The large space for storage that it offers will enable the military to keep as many files of its operations as possible. The fact that they can be easily removed without causing any form of damage enables the military to evacuate their stations with the drive at
  • 13. hand in case of an attack.