Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Cincinnati window shade technology overview
1. CINCINNATI WINDOW SHADE
TECHNOLOGY OVERVIEW
TEAM 5: Alex Rippe, Justin Cline-Bailey, Rodney Phelps
INFO 357-01
2. Introduction
• Family-owned business since 1933
• They install and service everything from
manual to high tech shade systems
• They sell, service, maintain, and provide
warranty services for multiple manufacturers
3. Technology History
• Their initial intranet was wired as thin net
• Upgraded up to 1 GB ethernet and wireless
access
• Using some cloud based servers, such as
Google Calendar.
4. Technology in Use
• Full T1 supporting a network of 11 PCs, 2 laptops,
2 desktop printers, a shared Fax/copier/printer,
drafting plotter, and a digital phone system.
• They maintain video and motion sensor security,
along with the ability to remote monitor their
security camera feeds
• They help to maintain two websites
5. Physical Layout
• Using a full T1 to support digital phone system
and data service
• Services extend from the CSU/DSU to the
front office area
• The T1 is extended to the wireless router with
a built-in switch.
• Services go from the router to a 36 port
Gigabit switch
6. • Started with Thin net
• Currently running a combination of cat5 and
cat5e
• Potential throughput issues with cat5 cable’s
ability to handle the 1 Gigabit Ethernet
connection
• Cable runs not tagged at switch
7. • Their setup uses a Wireless N router with a
built-in 4-port switch
• Networked with 10/100 or 1 Gigabit Network
Cards
• The wireless access point is both secured and
encrypted
8. Networking
• Running a P2P network
• Using one workstation as a file share and data
storage device
• Multifunction fax device is shared through
that workstation.
9. Equipment
• Computers: Most work stations contain Power
Spec computers. 1 IBM and 1 HP as well.
• Printers: Two directly connected printers and a
plotter. One printer is a multi-use and is a fax
machine as well
• Other: Two credit card terminals. Video
recording and Security System
• Inventory: There is no system in place to track
assets (serial numbers or asset tags)
10. Software
• OS: Most systems are running Windows 7 Pro,
3 are running XP, XP Home, or XP Pro. Some
laptops are using Vista
• Anti-Virus: Norton 360
• Other: Microsoft Office, Peach Tree, and an
industry specific design program
• Licensing: All softwares are licensed and
recorded
• Maintenance: All are set to automatic updates
11. File Storage
• Employees are given a share of a file server
• Server is backed up daily on an external hard
drive and then to Iron Mountain weekly
• Some information is still stored in paper
format
12. Email
• External email service provided by web host
• Google Calendar, synched with Outlook, is
used to share calendars with Mason Location
13. Security
• Physical: Motion sensors and cameras ran
through a cellular service
• Logical: Microsoft’s built-in firewall. Router
software provides a firewall. Data encryption
is not being used.
15. Policies
• Currently there are no written information system
policies.
• This could be an issue with employees not
understanding issues related to information systems
and security
• Potentially leaves the company exposed to loss and
or down time
16. Merchant’s Concerns
• What are the government’s requirements for
storage of email and protection of privacy of
employee and customer information?
• Which side of the firewall should a VPN be
placed?
17. Recommendations
•Cisco recommends placing the VPN on an
inbound port of the firewall.
•Remove the switch and router and mount it on
a shelf or place it in a closet
•Label cabling to simplify troubleshooting
•Best solution: place router, switch, back up
device, power backup, and file server all in one
closet
18. Recommendations Cont.
• Hide the SSID on the wireless access point
from public view
• Install a mount in the wire closet for the
CSU/DSU to remove from the floor
• Written policy should be created to give
guidance for automation security and
acceptable use for technology