SlideShare a Scribd company logo
1 of 17
Health Care HQ
Comprehensive Assessment/Review
Technology Improvement Plan
Version 0.0: [Date published] Presented by: Jonathan Paxtor
HEALTH CARE HQ.LLC CONFIDENTIAL PAGE 2
Abstract
The role of a System Administrator is constantly evolving through the ever growing
demands of Information Technology to create and maintain a successful organization on the
cutting edge of productivity (Florentine, 2016). The job description entails installation and
maintenance of servers, software, security, hardware, network infrastructure, and user
administration, and the root user and account holder. As we implement a client/server
network all installation and maintenance of such is my responsibility in any case of file
recovery, troubleshooting, and connectivity issues. Regarding all software my job is not to
design; but rather to familiarize with all software used for installation, maintenance
including updating, compatibility with operating systems, and file recovery. As Sys Admin my
task is to implement and regulate all security IPS, firewall, and virus log revisions to each
performing all required actions to keep all confidentiality and data integrity as well as
keeping all software and hardware secure. User accounts, passwords, and access is also
regulated by the System Administrator. The root account holds access to all databases, user
accounts information, hardware, and software by keeping a master copy all files for
implementation and recovery having full control of each with the task with the task of
delegating the access to staff as each required by position.
As a Network Administrator the task includes but are not limited to remote access, access
control to regulate security issues, file server access through password and user accounts,
and primarily implementing and maintaining all WAN and LAN ensuring that the
workstations are communicating with each other. As Network Administrator they would be
the first point of contact for remote access issues including making sure all security
measures are in place to prevent any intellectual property theft and maintain data integrity
implementing VPN’s etc. Using a client/server network the connectivity and ensuring a
smooth flow of operations would be ensured by the Network Admin.
Over all, the difference between the Sys Admin and Net Admin is that the Sys Admin is
responsible for the infrastructure and maintenance of all software and hardware, and the
Net admin is responsible for the connectivity and flow of operation of the organizations
operation.
HEALTH CARE HQ.LLC CONFIDENTIAL PAGE 3
HEALTH CARE HQ.LLC CONFIDENTIAL PAGE 4
TECHNOLOGY ASSESSMENT
Table of Contents
Table of Contents............................................................................................................................5
[COMPANY NAME] CONFIDENTIAL PAGE 5
COMPETITIVE ANALYSIS
Operating Systems
REVIEW AND SUMMARY OF THE DECIDING FACTORS FOR THE NEW OPERATING SYSTEM:
Once you have completed the analysis fill in
the table below
Solution details for New OS Solution details
LINUX Ubuntu OS The new OS will be installed on every work
station offering an open source standardized OS
for ease of implementing new software available
through LINUX distributors.
Alignment Alignment Details
Old OS: Windows 10 New OS Choice: Ubuntu
Strengths Strengths
OS Features: applications for DBA, programs
That will create spreadsheets, presentations,
back
Office management, tools to maintain
And install new WAN and LAN networks.
New OS Choice: This is an open source OS that
can enable secure Third Party Administrators
update, install, delete information without
compromising security lessening the workload of
administrators on staff.
Weaknesses Weaknesses
Old OS Weakness: Privately owned by Window’s
and any alteration or customization requires
higher budget being all Windows products must
be purchased for complete usage.
New OS Weakness: not an everyday user’s OS
so training will be required to staff.
Strategy Strategy
Our company's strategy for replacing the old OS
with the new OS will be as following: every
workstation will have Ubuntu installed along with
all applications necessary for daily operations
along with copies of files. All work stations will be
rebooted and a copy of old OS will remain on the
workstations until all employees are fully
knowledgeable, and once that is complete we will
solely be using Ubuntu.
Determine the qualifying factors for the old to
replace the new. Incase operations are not
flowing as planned the old OS will be still installed
to keep operations flowing while Troubleshooting
Ubuntu's installation.
HEALTH CARE HQ.LLC CONFIDENTIAL PAGE 6
COMPETITIVE ANALYSIS
PROPOSED SOLUTION FOR: HEALTH CARE HQ.LLC
Hardware Components
Desktops/Workstations:
ASUS A6420: The ASUS All-in-One PC A6420 is powered by the
Intel® 4th generation Core™ processor with support for up to 16GB of DDR3 memory.
Includes a NVIDIA GT930M graphics card with 1GB VRAM. The A6420 Series also
features 802.11 ac/g/n Wi-Fi + BT 4.0 and an integrated VGA and HDMI ports to keep
you connected to external monitor and displays. The ASUSPRO A6420 Series is designed
for convenient connectivity, equipped with COM ports, USB 3.0 ports and VGA port, the
A6420 can easily connect to other commercial devices. LAN Intel 10/100/1000/Gigabits
Mbps. Wireless Data Network 802.11 b/g/n, Bluetooth V4.0, or 802.11 b/g/n/ac,
Bluetooth V4.0, NFC. Storage 3.5" 500GB Up to 2TB SATA III Hard Drive 3.5" 128GB SSD
ASUS Hyper Storage:1TB HDD+128GB SSD.
Notebooks/Laptop for remote access:
Asus ASUSPRO P2520LA: 15.6 inch FHD/HD display with
Windows 8.1 Professional, Intel® Core™ i7, up to 16GB RAM, Integrated Intel® HD
Graphics 5500, up to 1TB storage w/SSD option. Memory 2 x DIMM socket for expansion
up to 16 GB SDRAM. Display 15.6'' 16:9 HD (1366x768)/Full HD (1920x1080). Storage
1TB HDD 5400 RPM. Card Reader4 -in-1 card reader ( SD/ SDHC/ MS/ MMC).
Networking Dual-band 802.11 b/g/n or 802.11 a/b/g/n/ac (WiDi) Built-in Bluetooth™
V4.0. Security Kensington lock LoJack TPM (Trusted Platform Module) (Optional) Finger
Print Reader. Certificates UL, FCC Compliance, BSMI, CCC, GOST-R, CB, EPEAT, Energy
star, IDA, CECP, WEEE, Erp 2013, RoHS.
HEALTH CARE HQ.LLC CONFIDENTIAL PAGE 7
COMPETITIVE ANALYSIS
Server:
Asus TS100-E9-P14: Super quiet green design, lowest as
26 dB. Advanced IO support with 6 expansion slots and 8 USB ports. Complete remote
management saving time and efforts. Storage
SATA Controller: Intel® C232, 6 x SATA3 6Gb/s ports, Intel® Rapid Storage Technology
Enterprise(RSTe) (For Linux/Windows) (Support Software RAID 0, 1, 5, 10). OS RedHat®
Enterprise Linux SuSE® Linux Enterprise Server. Networking LAN controller Intel I210AT.
Operating System:
Ubuntu OS: Fully translated into 100+ languages
Open source — free from licensing restrictions. Virus free and highly secure. On-site
consulting services and training available. Long-term support releases come with five
years of security patches and updates
The reason that I chose to use Asus products for the desktops, notebooks, and servers is that by
standardizing with this vendor the upgrades and the maintenance will come from the same
vendor providing a contact support through Asus. This vendor also offers a cloud storage that
can be used in any case of emergency can present. Finally, the OS I am implementing is
supported by the server that will be used in the network making things compatible for ease of
installation and patching moving forward. The warranty and repair in any due case are also held
through ASUS so through standardization all hardware will be shipped to same vendor for any
repairs that are covered through the warranty.
HEALTH CARE HQ.LLC CONFIDENTIAL PAGE 8
COMPETITIVE ANALYSIS
HEALTH CARE HQ.LLC CONFIDENTIAL PAGE 9
COMPETITIVE ANALYSIS
Networking
I recommend HealthCare HQ to use http://www.labtechsoftware.com/corporate-
it/solutions/global-client-management/labtech for the client/server network provider. First of
all, I propose this provider because it offers the ability to train its users for basic maintenance in
as little as 15 min. It also offers workstation monitoring, troubleshooting ticket system, user
information, support and software management at a reasonable cost. Another reason I
recommend is that this organization has a high review amongst the IT professionals because of
its reliability and practicality while providing a cutting edge in the service it provides. In
conclusion, it also offers virtual machine cloud storage that takes a giant workload off the hard
drives from our workstations while not compromising the security of the sensitive data that we
work with daily. All the work is done through one user interface providing the ability to multi-
task without compromising productivity.
HEALTH CARE HQ.LLC CONFIDENTIAL PAGE 10
Desktop/Note-
book
Desktop/Note-
book
Client/Server
Labtech.com
Cloud Storage
Firewall
Database
Sys
Admin
Root
Asus
Server
COMPETITIVE ANALYSIS
HEALTH CARE HQ.LLC CONFIDENTIAL PAGE 11
COMPETITIVE ANALYSIS
Security
Our security system for entrance to Healthcare HQ is similar to the design of The Lemon
Tree Hotel in Dubai India that has a state of the art security controlled access (Hospitality Biz,
2013) with CCTV monitoring the parking lot entrance to the HQ parking lot. Followed by baggage
and x-ray scanners to the entrances controlled by armed security guards. Fish Eye cameras on
all elevators, fire exits, and public areas. Face recognition for entrance to each departments main
entrance. Panic button located in all areas that would notify quick responders like EMS, and
Authority.
To maintain the data integrity, I will implement https://www.upguard.com/solutions/integrity-
monitoring because it will report any unauthorized data changes in the data base through a data
breach.
To cover remote access security
http://www.labtechsoftware.com/corporate-it/solutions/security will be used to prevent any
intrusion caused by remote access to our servers from a public WIFI location. For example, if our
staff is in a conference and required to log into a public WIFI location this vendor will provide the
necessary software that will prevent any intrusion or damage to hardware.
For all applications regarding access control I will be implementing
https://help.ubuntu.com/lts/serverguide/apparmor.html
(Dua, 2016).
HEALTH CARE HQ.LLC CONFIDENTIAL PAGE 12
COMPETITIVE ANALYSIS
HEALTH CARE HQ.LLC CONFIDENTIAL PAGE 13
COMPETITIVE ANALYSIS
System Administrators
The role of a System Administrator is constantly evolving through the ever growing demands
of Information Technology to create and maintain a successful organization on the cutting
edge of productivity (Florentine, 2016). The job description entails installation and
maintenance of servers, software, security, hardware, network infrastructure, and user
administration, and the root user and account holder. As we implement a client/server
network all installation and maintenance of such is my responsibility in any case of file
recovery, troubleshooting, and connectivity issues. Regarding all software my job is not to
design; but rather to familiarize with all software used for installation, maintenance
including updating, compatibility with operating systems, and file recovery. As Sys Admin my
task is to implement and regulate all security IPS, firewall, and virus log revisions to each
performing all required actions to keep all confidentiality and data integrity as well as
keeping all software and hardware secure. User accounts, passwords, and access is also
regulated by the System Administrator. The root account holds access to all databases, user
accounts information, hardware, and software by keeping a master copy all files for
implementation and recovery having full control of each with the task with the task of
delegating the access to staff as each required by position. Being that we will be using
LINUX/UBUNTU OS the Sys Admin must take the following seminar:
https://training.linuxfoundation.org/linux-courses/system-administration-training/linux-
system-administration so that it will ensure that as much knowledge as possible will be
provided to enable a successful operation.
HEALTH CARE HQ.LLC CONFIDENTIAL PAGE 14
COMPETITIVE ANALYSIS
Summary
As the Sys Admin will be working with all the hardware and software and the Net Admin will be
ensuring the communication and practicality of each workstation their roles may differ but it is
essential that they work hand in hand communicating and facing the issues that will present
within the organization as a team to provide all the IT support needed to Healthcare HQ.
Problem solving, collaboration, and the ability to follow protocols will be essential for the flow
of operations to be successful. LINUX/UBUNTU OS offers an open source market that taking all
the security measures available can offer a competitive edge and enable our staff to complete
each task successfully. ASUS offers a superb customer service department that can respond to
our team needs while offering cutting edge technology. For security purposes every
preventative measure will ensure our staff with a peace of mind to protect not only their lives in
daily operations, but also provide a peace of mind to our clients because they will be ensured
data integrity with all healthcare records. Each Security vendor covers all the departments such
as Human Resources, DBA, and real time access to all the files necessary.
Complete training will be provided to our staff using the UBUNTU resources available to ensure
that the staff knows how to use each tool provided through that powerful OS. Software patching
will be done regularly to ensure that our software is completely up to date so that our
organization can be in the forefront in our industry.
HEALTH CARE HQ.LLC CONFIDENTIAL PAGE 15
COMPETITIVE ANALYSIS
References
Florentine, S. (2016). Career roadmap: Systems admin role isn't
dead. Cio, Retrieved from
http://search.proquest.com.proxy.cecybrary.com/docview/1850168109?
accountid=45927
Gregory, P. H. (2015). Getting an information security job for dummies.
Hoboken, NJ: John Wiley and Sons, Inc. Retrieved from:
http://proquestcombo.safaribooksonline.com.proxy.cecybrary.com/book/career-
development/9781119002628/chapter-2-understanding-infosec-roles-one-day-in-the-
life/h2_1_html_3?query=(((network+admin+job+description)))#snippet
Lemon tree premier and red fox hotel now operational at delhi aerocity. (2013,
Dec 27). HospitalityBiz, Retrieved from
http://search.proquest.com.proxy.cecybrary.com/docview/1686862953?
accountid=45927
Dua, R. (2016). Learning docker networking. Packt Publishing Limited.
Retrieved from:
http://proquestcombo.safaribooksonline.com.proxy.cecybrary.com/book/operating-systems-
and-server-administration/linux/9781785280955/learning-docker-networking/ch05_html?
query=(((apparmour+security)))#X2ludGVybmFsX0h0bWxWaWV3P3htbGlkPTk3ODE3ODUyODA
5NTUlMkZjaDA1czA2X2h0bWwmcXVlcnk9KCgoYXBwYXJtb3VyJTIwc2VjdXJpdHkpKSk=
HEALTH CARE HQ.LLC CONFIDENTIAL PAGE 16
COMPETITIVE ANALYSIS
HEALTH CARE HQ.LLC CONFIDENTIAL PAGE 17

More Related Content

What's hot

TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...
TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...
TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...Symantec
 
Empower your business with TeamViewer 13
Empower your business with TeamViewer 13Empower your business with TeamViewer 13
Empower your business with TeamViewer 13Logicom Distribution
 
Khalid suliman sideg hamdan original ts
Khalid suliman sideg hamdan original tsKhalid suliman sideg hamdan original ts
Khalid suliman sideg hamdan original tsKhalid Sideg
 
Symantec Endpoint Protection 12.1 RU6 MP6
Symantec Endpoint Protection 12.1 RU6 MP6Symantec Endpoint Protection 12.1 RU6 MP6
Symantec Endpoint Protection 12.1 RU6 MP6Sarah Isaacs
 
Sophos products - Health CheckPlus
Sophos products - Health CheckPlusSophos products - Health CheckPlus
Sophos products - Health CheckPlusLee Dalton
 
Open security controller security orchestration for openstack
Open security controller security orchestration for openstackOpen security controller security orchestration for openstack
Open security controller security orchestration for openstackPriyanka Aash
 
Bangalore IT Pro Full Day Event on Intune and SCCM
Bangalore IT Pro Full Day Event on Intune and SCCMBangalore IT Pro Full Day Event on Intune and SCCM
Bangalore IT Pro Full Day Event on Intune and SCCMAnoop Nair
 
201104 Best Practices For Keeping Your Home Network Secure
201104   Best Practices For Keeping Your Home Network Secure201104   Best Practices For Keeping Your Home Network Secure
201104 Best Practices For Keeping Your Home Network Securermpall
 
How Endpoint Encryption Works
How Endpoint Encryption WorksHow Endpoint Encryption Works
How Endpoint Encryption WorksSymantec
 
It essentials pc hardware and software overview
It essentials pc hardware and software overviewIt essentials pc hardware and software overview
It essentials pc hardware and software overviewAhmed Sultan
 
Symantec Endpoint Encryption - Proof Of Concept Document
Symantec Endpoint Encryption - Proof Of Concept DocumentSymantec Endpoint Encryption - Proof Of Concept Document
Symantec Endpoint Encryption - Proof Of Concept DocumentIftikhar Ali Iqbal
 
Ksos retail portal v2
Ksos retail portal v2Ksos retail portal v2
Ksos retail portal v2kaspersky-lab
 
Tenda2500.com.au org-sainsmatematiskomputeri1995 bmz@gmail.com ddns1995
Tenda2500.com.au org-sainsmatematiskomputeri1995 bmz@gmail.com ddns1995Tenda2500.com.au org-sainsmatematiskomputeri1995 bmz@gmail.com ddns1995
Tenda2500.com.au org-sainsmatematiskomputeri1995 bmz@gmail.com ddns1995GODIVA4000MESSERI
 
Nsa best practices for keeping your home network secure
Nsa   best practices for keeping your home network secureNsa   best practices for keeping your home network secure
Nsa best practices for keeping your home network secureFort Rucker FRSA
 

What's hot (19)

IP-guard Catalog
IP-guard CatalogIP-guard Catalog
IP-guard Catalog
 
TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...
TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...
TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...
 
Desktop Security 8 9 07
Desktop Security 8 9 07Desktop Security 8 9 07
Desktop Security 8 9 07
 
Empower your business with TeamViewer 13
Empower your business with TeamViewer 13Empower your business with TeamViewer 13
Empower your business with TeamViewer 13
 
Khalid suliman sideg hamdan original ts
Khalid suliman sideg hamdan original tsKhalid suliman sideg hamdan original ts
Khalid suliman sideg hamdan original ts
 
Ite pc v40_chapter9
Ite pc v40_chapter9Ite pc v40_chapter9
Ite pc v40_chapter9
 
Symantec Endpoint Protection 12.1 RU6 MP6
Symantec Endpoint Protection 12.1 RU6 MP6Symantec Endpoint Protection 12.1 RU6 MP6
Symantec Endpoint Protection 12.1 RU6 MP6
 
Sophos products - Health CheckPlus
Sophos products - Health CheckPlusSophos products - Health CheckPlus
Sophos products - Health CheckPlus
 
Open security controller security orchestration for openstack
Open security controller security orchestration for openstackOpen security controller security orchestration for openstack
Open security controller security orchestration for openstack
 
Bangalore IT Pro Full Day Event on Intune and SCCM
Bangalore IT Pro Full Day Event on Intune and SCCMBangalore IT Pro Full Day Event on Intune and SCCM
Bangalore IT Pro Full Day Event on Intune and SCCM
 
201104 Best Practices For Keeping Your Home Network Secure
201104   Best Practices For Keeping Your Home Network Secure201104   Best Practices For Keeping Your Home Network Secure
201104 Best Practices For Keeping Your Home Network Secure
 
How Endpoint Encryption Works
How Endpoint Encryption WorksHow Endpoint Encryption Works
How Endpoint Encryption Works
 
It essentials pc hardware and software overview
It essentials pc hardware and software overviewIt essentials pc hardware and software overview
It essentials pc hardware and software overview
 
Symantec Endpoint Encryption - Proof Of Concept Document
Symantec Endpoint Encryption - Proof Of Concept DocumentSymantec Endpoint Encryption - Proof Of Concept Document
Symantec Endpoint Encryption - Proof Of Concept Document
 
Ksos retail portal v2
Ksos retail portal v2Ksos retail portal v2
Ksos retail portal v2
 
Ksos retail portal
Ksos retail portalKsos retail portal
Ksos retail portal
 
Tenda2500.com.au org-sainsmatematiskomputeri1995 bmz@gmail.com ddns1995
Tenda2500.com.au org-sainsmatematiskomputeri1995 bmz@gmail.com ddns1995Tenda2500.com.au org-sainsmatematiskomputeri1995 bmz@gmail.com ddns1995
Tenda2500.com.au org-sainsmatematiskomputeri1995 bmz@gmail.com ddns1995
 
IT ESSENTIALS 6.0
IT ESSENTIALS 6.0IT ESSENTIALS 6.0
IT ESSENTIALS 6.0
 
Nsa best practices for keeping your home network secure
Nsa   best practices for keeping your home network secureNsa   best practices for keeping your home network secure
Nsa best practices for keeping your home network secure
 

Viewers also liked

[금융교육의중심 머니Q} 상환방식
[금융교육의중심 머니Q} 상환방식[금융교육의중심 머니Q} 상환방식
[금융교육의중심 머니Q} 상환방식dayoung Choi
 
International Journal of Prevention and Control of Industrial Pollution - Vol...
International Journal of Prevention and Control of Industrial Pollution - Vol...International Journal of Prevention and Control of Industrial Pollution - Vol...
International Journal of Prevention and Control of Industrial Pollution - Vol...JournalsPub www.journalspub.com
 
International Journal of Environmental Chemistry - Vol 2_Issue 2
International Journal of Environmental Chemistry - Vol 2_Issue 2International Journal of Environmental Chemistry - Vol 2_Issue 2
International Journal of Environmental Chemistry - Vol 2_Issue 2JournalsPub www.journalspub.com
 
개인맞춤 패션 쇼핑몰 상품 추천 시스템
개인맞춤 패션 쇼핑몰 상품 추천 시스템개인맞춤 패션 쇼핑몰 상품 추천 시스템
개인맞춤 패션 쇼핑몰 상품 추천 시스템Kweonwoo Moon
 
Mentes colonizadas promoción de charla
Mentes colonizadas promoción de charlaMentes colonizadas promoción de charla
Mentes colonizadas promoción de charlaRafael Contreras
 
designing innovation, insitutions for social transformation D1s3 gupta anil i...
designing innovation, insitutions for social transformation D1s3 gupta anil i...designing innovation, insitutions for social transformation D1s3 gupta anil i...
designing innovation, insitutions for social transformation D1s3 gupta anil i...Dr Anil Gupta
 
10 Ways Your Boss Kills Employee Motivation
10 Ways Your Boss Kills Employee Motivation10 Ways Your Boss Kills Employee Motivation
10 Ways Your Boss Kills Employee MotivationOfficevibe
 
Recovery: Job Growth and Education Requirements Through 2020
Recovery: Job Growth and Education Requirements Through 2020Recovery: Job Growth and Education Requirements Through 2020
Recovery: Job Growth and Education Requirements Through 2020CEW Georgetown
 
Beyond the Gig Economy
Beyond the Gig EconomyBeyond the Gig Economy
Beyond the Gig EconomyJon Lieber
 
African Americans: College Majors and Earnings
African Americans: College Majors and Earnings African Americans: College Majors and Earnings
African Americans: College Majors and Earnings CEW Georgetown
 
Shall we play a game?
Shall we play a game?Shall we play a game?
Shall we play a game?Maciej Lasyk
 
Creative Traction Methodology - For Early Stage Startups
Creative Traction Methodology - For Early Stage StartupsCreative Traction Methodology - For Early Stage Startups
Creative Traction Methodology - For Early Stage StartupsTommaso Di Bartolo
 
The Online College Labor Market
The Online College Labor MarketThe Online College Labor Market
The Online College Labor MarketCEW Georgetown
 
3 hard facts shaping higher education thinking and behavior
3 hard facts shaping higher education thinking and behavior3 hard facts shaping higher education thinking and behavior
3 hard facts shaping higher education thinking and behaviorGrant Thornton LLP
 
8 Tips for Scaling Mobile Users in China by Edith Yeung
8 Tips for Scaling Mobile Users in China by Edith Yeung8 Tips for Scaling Mobile Users in China by Edith Yeung
8 Tips for Scaling Mobile Users in China by Edith YeungEdith Yeung
 
The French Revolution of 1789
The French Revolution of 1789The French Revolution of 1789
The French Revolution of 1789Tom Richey
 
What's Trending in Talent and Learning for 2016?
What's Trending in Talent and Learning for 2016?What's Trending in Talent and Learning for 2016?
What's Trending in Talent and Learning for 2016?Skillsoft
 
GAME ON! Integrating Games and Simulations in the Classroom
GAME ON! Integrating Games and Simulations in the Classroom GAME ON! Integrating Games and Simulations in the Classroom
GAME ON! Integrating Games and Simulations in the Classroom Brian Housand
 

Viewers also liked (19)

[금융교육의중심 머니Q} 상환방식
[금융교육의중심 머니Q} 상환방식[금융교육의중심 머니Q} 상환방식
[금융교육의중심 머니Q} 상환방식
 
Historia y receta carne al pastor
Historia y receta carne al pastorHistoria y receta carne al pastor
Historia y receta carne al pastor
 
International Journal of Prevention and Control of Industrial Pollution - Vol...
International Journal of Prevention and Control of Industrial Pollution - Vol...International Journal of Prevention and Control of Industrial Pollution - Vol...
International Journal of Prevention and Control of Industrial Pollution - Vol...
 
International Journal of Environmental Chemistry - Vol 2_Issue 2
International Journal of Environmental Chemistry - Vol 2_Issue 2International Journal of Environmental Chemistry - Vol 2_Issue 2
International Journal of Environmental Chemistry - Vol 2_Issue 2
 
개인맞춤 패션 쇼핑몰 상품 추천 시스템
개인맞춤 패션 쇼핑몰 상품 추천 시스템개인맞춤 패션 쇼핑몰 상품 추천 시스템
개인맞춤 패션 쇼핑몰 상품 추천 시스템
 
Mentes colonizadas promoción de charla
Mentes colonizadas promoción de charlaMentes colonizadas promoción de charla
Mentes colonizadas promoción de charla
 
designing innovation, insitutions for social transformation D1s3 gupta anil i...
designing innovation, insitutions for social transformation D1s3 gupta anil i...designing innovation, insitutions for social transformation D1s3 gupta anil i...
designing innovation, insitutions for social transformation D1s3 gupta anil i...
 
10 Ways Your Boss Kills Employee Motivation
10 Ways Your Boss Kills Employee Motivation10 Ways Your Boss Kills Employee Motivation
10 Ways Your Boss Kills Employee Motivation
 
Recovery: Job Growth and Education Requirements Through 2020
Recovery: Job Growth and Education Requirements Through 2020Recovery: Job Growth and Education Requirements Through 2020
Recovery: Job Growth and Education Requirements Through 2020
 
Beyond the Gig Economy
Beyond the Gig EconomyBeyond the Gig Economy
Beyond the Gig Economy
 
African Americans: College Majors and Earnings
African Americans: College Majors and Earnings African Americans: College Majors and Earnings
African Americans: College Majors and Earnings
 
Shall we play a game?
Shall we play a game?Shall we play a game?
Shall we play a game?
 
Creative Traction Methodology - For Early Stage Startups
Creative Traction Methodology - For Early Stage StartupsCreative Traction Methodology - For Early Stage Startups
Creative Traction Methodology - For Early Stage Startups
 
The Online College Labor Market
The Online College Labor MarketThe Online College Labor Market
The Online College Labor Market
 
3 hard facts shaping higher education thinking and behavior
3 hard facts shaping higher education thinking and behavior3 hard facts shaping higher education thinking and behavior
3 hard facts shaping higher education thinking and behavior
 
8 Tips for Scaling Mobile Users in China by Edith Yeung
8 Tips for Scaling Mobile Users in China by Edith Yeung8 Tips for Scaling Mobile Users in China by Edith Yeung
8 Tips for Scaling Mobile Users in China by Edith Yeung
 
The French Revolution of 1789
The French Revolution of 1789The French Revolution of 1789
The French Revolution of 1789
 
What's Trending in Talent and Learning for 2016?
What's Trending in Talent and Learning for 2016?What's Trending in Talent and Learning for 2016?
What's Trending in Talent and Learning for 2016?
 
GAME ON! Integrating Games and Simulations in the Classroom
GAME ON! Integrating Games and Simulations in the Classroom GAME ON! Integrating Games and Simulations in the Classroom
GAME ON! Integrating Games and Simulations in the Classroom
 

Similar to Healthcare HQ Technology Assessment

Phantosys overview - Intelligent Desktop Virtualization
Phantosys overview - Intelligent Desktop VirtualizationPhantosys overview - Intelligent Desktop Virtualization
Phantosys overview - Intelligent Desktop VirtualizationJose Bittencourt
 
Owny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring FeaturelistOwny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring FeaturelistNCS Computech Ltd.
 
jentu-product-press-release-july-16th2016--omni_axcess-final
jentu-product-press-release-july-16th2016--omni_axcess-finaljentu-product-press-release-july-16th2016--omni_axcess-final
jentu-product-press-release-july-16th2016--omni_axcess-finalBen Ohana
 
General Ubuntu Advantage Service Guide
General  Ubuntu Advantage Service Guide General  Ubuntu Advantage Service Guide
General Ubuntu Advantage Service Guide The World Bank
 
Ge powerpoint presentation group 4!
Ge powerpoint presentation group 4!Ge powerpoint presentation group 4!
Ge powerpoint presentation group 4!Kenneth Regalado
 
CryptionPro Hdd Flyer English
CryptionPro Hdd Flyer EnglishCryptionPro Hdd Flyer English
CryptionPro Hdd Flyer Englishcynapspro GmbH
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소GE코리아
 
Thin Client Smart Station Smart 2590
Thin Client Smart Station Smart 2590Thin Client Smart Station Smart 2590
Thin Client Smart Station Smart 2590Nirav Ambani
 
Network Diagram of a company ABCD Roshan basnet it 29
Network Diagram of a company ABCD Roshan basnet it 29Network Diagram of a company ABCD Roshan basnet it 29
Network Diagram of a company ABCD Roshan basnet it 29rosu555
 
Bus Tour Windows 7 Deck (Full)
Bus Tour   Windows 7 Deck (Full)Bus Tour   Windows 7 Deck (Full)
Bus Tour Windows 7 Deck (Full)Stephen L Rose
 
Web sever environmentA Web server is a program that uses HTTP (Hy.pdf
Web sever environmentA Web server is a program that uses HTTP (Hy.pdfWeb sever environmentA Web server is a program that uses HTTP (Hy.pdf
Web sever environmentA Web server is a program that uses HTTP (Hy.pdfaquacareser
 
PowerPro Flyer English
PowerPro Flyer EnglishPowerPro Flyer English
PowerPro Flyer Englishcynapspro GmbH
 
Encoding Enhancers Woolpack virtualization services
Encoding Enhancers   Woolpack virtualization servicesEncoding Enhancers   Woolpack virtualization services
Encoding Enhancers Woolpack virtualization servicesAditi Shrivastava
 

Similar to Healthcare HQ Technology Assessment (20)

Phantosys overview - Intelligent Desktop Virtualization
Phantosys overview - Intelligent Desktop VirtualizationPhantosys overview - Intelligent Desktop Virtualization
Phantosys overview - Intelligent Desktop Virtualization
 
Owny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring FeaturelistOwny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring Featurelist
 
jentu-product-press-release-july-16th2016--omni_axcess-final
jentu-product-press-release-july-16th2016--omni_axcess-finaljentu-product-press-release-july-16th2016--omni_axcess-final
jentu-product-press-release-july-16th2016--omni_axcess-final
 
General Ubuntu Advantage Service Guide
General  Ubuntu Advantage Service Guide General  Ubuntu Advantage Service Guide
General Ubuntu Advantage Service Guide
 
Hoshiyar Singh
Hoshiyar SinghHoshiyar Singh
Hoshiyar Singh
 
Resume l
Resume lResume l
Resume l
 
Ge powerpoint presentation group 4!
Ge powerpoint presentation group 4!Ge powerpoint presentation group 4!
Ge powerpoint presentation group 4!
 
CryptionPro Hdd Flyer English
CryptionPro Hdd Flyer EnglishCryptionPro Hdd Flyer English
CryptionPro Hdd Flyer English
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소
 
Thin Client Smart Station Smart 2590
Thin Client Smart Station Smart 2590Thin Client Smart Station Smart 2590
Thin Client Smart Station Smart 2590
 
Network Diagram of a company ABCD Roshan basnet it 29
Network Diagram of a company ABCD Roshan basnet it 29Network Diagram of a company ABCD Roshan basnet it 29
Network Diagram of a company ABCD Roshan basnet it 29
 
Bus Tour Windows 7 Deck (Full)
Bus Tour   Windows 7 Deck (Full)Bus Tour   Windows 7 Deck (Full)
Bus Tour Windows 7 Deck (Full)
 
Consumerization
ConsumerizationConsumerization
Consumerization
 
Smbtechedge
SmbtechedgeSmbtechedge
Smbtechedge
 
Web sever environmentA Web server is a program that uses HTTP (Hy.pdf
Web sever environmentA Web server is a program that uses HTTP (Hy.pdfWeb sever environmentA Web server is a program that uses HTTP (Hy.pdf
Web sever environmentA Web server is a program that uses HTTP (Hy.pdf
 
PowerPro Flyer English
PowerPro Flyer EnglishPowerPro Flyer English
PowerPro Flyer English
 
Security PFE
Security PFESecurity PFE
Security PFE
 
Hoshiyar_Singh
Hoshiyar_SinghHoshiyar_Singh
Hoshiyar_Singh
 
RESUME RABEEH IT
RESUME RABEEH ITRESUME RABEEH IT
RESUME RABEEH IT
 
Encoding Enhancers Woolpack virtualization services
Encoding Enhancers   Woolpack virtualization servicesEncoding Enhancers   Woolpack virtualization services
Encoding Enhancers Woolpack virtualization services
 

Healthcare HQ Technology Assessment

  • 1. Health Care HQ Comprehensive Assessment/Review Technology Improvement Plan
  • 2. Version 0.0: [Date published] Presented by: Jonathan Paxtor HEALTH CARE HQ.LLC CONFIDENTIAL PAGE 2
  • 3. Abstract The role of a System Administrator is constantly evolving through the ever growing demands of Information Technology to create and maintain a successful organization on the cutting edge of productivity (Florentine, 2016). The job description entails installation and maintenance of servers, software, security, hardware, network infrastructure, and user administration, and the root user and account holder. As we implement a client/server network all installation and maintenance of such is my responsibility in any case of file recovery, troubleshooting, and connectivity issues. Regarding all software my job is not to design; but rather to familiarize with all software used for installation, maintenance including updating, compatibility with operating systems, and file recovery. As Sys Admin my task is to implement and regulate all security IPS, firewall, and virus log revisions to each performing all required actions to keep all confidentiality and data integrity as well as keeping all software and hardware secure. User accounts, passwords, and access is also regulated by the System Administrator. The root account holds access to all databases, user accounts information, hardware, and software by keeping a master copy all files for implementation and recovery having full control of each with the task with the task of delegating the access to staff as each required by position. As a Network Administrator the task includes but are not limited to remote access, access control to regulate security issues, file server access through password and user accounts, and primarily implementing and maintaining all WAN and LAN ensuring that the workstations are communicating with each other. As Network Administrator they would be the first point of contact for remote access issues including making sure all security measures are in place to prevent any intellectual property theft and maintain data integrity implementing VPN’s etc. Using a client/server network the connectivity and ensuring a smooth flow of operations would be ensured by the Network Admin. Over all, the difference between the Sys Admin and Net Admin is that the Sys Admin is responsible for the infrastructure and maintenance of all software and hardware, and the Net admin is responsible for the connectivity and flow of operation of the organizations operation. HEALTH CARE HQ.LLC CONFIDENTIAL PAGE 3
  • 4. HEALTH CARE HQ.LLC CONFIDENTIAL PAGE 4
  • 5. TECHNOLOGY ASSESSMENT Table of Contents Table of Contents............................................................................................................................5 [COMPANY NAME] CONFIDENTIAL PAGE 5
  • 6. COMPETITIVE ANALYSIS Operating Systems REVIEW AND SUMMARY OF THE DECIDING FACTORS FOR THE NEW OPERATING SYSTEM: Once you have completed the analysis fill in the table below Solution details for New OS Solution details LINUX Ubuntu OS The new OS will be installed on every work station offering an open source standardized OS for ease of implementing new software available through LINUX distributors. Alignment Alignment Details Old OS: Windows 10 New OS Choice: Ubuntu Strengths Strengths OS Features: applications for DBA, programs That will create spreadsheets, presentations, back Office management, tools to maintain And install new WAN and LAN networks. New OS Choice: This is an open source OS that can enable secure Third Party Administrators update, install, delete information without compromising security lessening the workload of administrators on staff. Weaknesses Weaknesses Old OS Weakness: Privately owned by Window’s and any alteration or customization requires higher budget being all Windows products must be purchased for complete usage. New OS Weakness: not an everyday user’s OS so training will be required to staff. Strategy Strategy Our company's strategy for replacing the old OS with the new OS will be as following: every workstation will have Ubuntu installed along with all applications necessary for daily operations along with copies of files. All work stations will be rebooted and a copy of old OS will remain on the workstations until all employees are fully knowledgeable, and once that is complete we will solely be using Ubuntu. Determine the qualifying factors for the old to replace the new. Incase operations are not flowing as planned the old OS will be still installed to keep operations flowing while Troubleshooting Ubuntu's installation. HEALTH CARE HQ.LLC CONFIDENTIAL PAGE 6
  • 7. COMPETITIVE ANALYSIS PROPOSED SOLUTION FOR: HEALTH CARE HQ.LLC Hardware Components Desktops/Workstations: ASUS A6420: The ASUS All-in-One PC A6420 is powered by the Intel® 4th generation Core™ processor with support for up to 16GB of DDR3 memory. Includes a NVIDIA GT930M graphics card with 1GB VRAM. The A6420 Series also features 802.11 ac/g/n Wi-Fi + BT 4.0 and an integrated VGA and HDMI ports to keep you connected to external monitor and displays. The ASUSPRO A6420 Series is designed for convenient connectivity, equipped with COM ports, USB 3.0 ports and VGA port, the A6420 can easily connect to other commercial devices. LAN Intel 10/100/1000/Gigabits Mbps. Wireless Data Network 802.11 b/g/n, Bluetooth V4.0, or 802.11 b/g/n/ac, Bluetooth V4.0, NFC. Storage 3.5" 500GB Up to 2TB SATA III Hard Drive 3.5" 128GB SSD ASUS Hyper Storage:1TB HDD+128GB SSD. Notebooks/Laptop for remote access: Asus ASUSPRO P2520LA: 15.6 inch FHD/HD display with Windows 8.1 Professional, Intel® Core™ i7, up to 16GB RAM, Integrated Intel® HD Graphics 5500, up to 1TB storage w/SSD option. Memory 2 x DIMM socket for expansion up to 16 GB SDRAM. Display 15.6'' 16:9 HD (1366x768)/Full HD (1920x1080). Storage 1TB HDD 5400 RPM. Card Reader4 -in-1 card reader ( SD/ SDHC/ MS/ MMC). Networking Dual-band 802.11 b/g/n or 802.11 a/b/g/n/ac (WiDi) Built-in Bluetooth™ V4.0. Security Kensington lock LoJack TPM (Trusted Platform Module) (Optional) Finger Print Reader. Certificates UL, FCC Compliance, BSMI, CCC, GOST-R, CB, EPEAT, Energy star, IDA, CECP, WEEE, Erp 2013, RoHS. HEALTH CARE HQ.LLC CONFIDENTIAL PAGE 7
  • 8. COMPETITIVE ANALYSIS Server: Asus TS100-E9-P14: Super quiet green design, lowest as 26 dB. Advanced IO support with 6 expansion slots and 8 USB ports. Complete remote management saving time and efforts. Storage SATA Controller: Intel® C232, 6 x SATA3 6Gb/s ports, Intel® Rapid Storage Technology Enterprise(RSTe) (For Linux/Windows) (Support Software RAID 0, 1, 5, 10). OS RedHat® Enterprise Linux SuSE® Linux Enterprise Server. Networking LAN controller Intel I210AT. Operating System: Ubuntu OS: Fully translated into 100+ languages Open source — free from licensing restrictions. Virus free and highly secure. On-site consulting services and training available. Long-term support releases come with five years of security patches and updates The reason that I chose to use Asus products for the desktops, notebooks, and servers is that by standardizing with this vendor the upgrades and the maintenance will come from the same vendor providing a contact support through Asus. This vendor also offers a cloud storage that can be used in any case of emergency can present. Finally, the OS I am implementing is supported by the server that will be used in the network making things compatible for ease of installation and patching moving forward. The warranty and repair in any due case are also held through ASUS so through standardization all hardware will be shipped to same vendor for any repairs that are covered through the warranty. HEALTH CARE HQ.LLC CONFIDENTIAL PAGE 8
  • 9. COMPETITIVE ANALYSIS HEALTH CARE HQ.LLC CONFIDENTIAL PAGE 9
  • 10. COMPETITIVE ANALYSIS Networking I recommend HealthCare HQ to use http://www.labtechsoftware.com/corporate- it/solutions/global-client-management/labtech for the client/server network provider. First of all, I propose this provider because it offers the ability to train its users for basic maintenance in as little as 15 min. It also offers workstation monitoring, troubleshooting ticket system, user information, support and software management at a reasonable cost. Another reason I recommend is that this organization has a high review amongst the IT professionals because of its reliability and practicality while providing a cutting edge in the service it provides. In conclusion, it also offers virtual machine cloud storage that takes a giant workload off the hard drives from our workstations while not compromising the security of the sensitive data that we work with daily. All the work is done through one user interface providing the ability to multi- task without compromising productivity. HEALTH CARE HQ.LLC CONFIDENTIAL PAGE 10 Desktop/Note- book Desktop/Note- book Client/Server Labtech.com Cloud Storage Firewall Database Sys Admin Root Asus Server
  • 11. COMPETITIVE ANALYSIS HEALTH CARE HQ.LLC CONFIDENTIAL PAGE 11
  • 12. COMPETITIVE ANALYSIS Security Our security system for entrance to Healthcare HQ is similar to the design of The Lemon Tree Hotel in Dubai India that has a state of the art security controlled access (Hospitality Biz, 2013) with CCTV monitoring the parking lot entrance to the HQ parking lot. Followed by baggage and x-ray scanners to the entrances controlled by armed security guards. Fish Eye cameras on all elevators, fire exits, and public areas. Face recognition for entrance to each departments main entrance. Panic button located in all areas that would notify quick responders like EMS, and Authority. To maintain the data integrity, I will implement https://www.upguard.com/solutions/integrity- monitoring because it will report any unauthorized data changes in the data base through a data breach. To cover remote access security http://www.labtechsoftware.com/corporate-it/solutions/security will be used to prevent any intrusion caused by remote access to our servers from a public WIFI location. For example, if our staff is in a conference and required to log into a public WIFI location this vendor will provide the necessary software that will prevent any intrusion or damage to hardware. For all applications regarding access control I will be implementing https://help.ubuntu.com/lts/serverguide/apparmor.html (Dua, 2016). HEALTH CARE HQ.LLC CONFIDENTIAL PAGE 12
  • 13. COMPETITIVE ANALYSIS HEALTH CARE HQ.LLC CONFIDENTIAL PAGE 13
  • 14. COMPETITIVE ANALYSIS System Administrators The role of a System Administrator is constantly evolving through the ever growing demands of Information Technology to create and maintain a successful organization on the cutting edge of productivity (Florentine, 2016). The job description entails installation and maintenance of servers, software, security, hardware, network infrastructure, and user administration, and the root user and account holder. As we implement a client/server network all installation and maintenance of such is my responsibility in any case of file recovery, troubleshooting, and connectivity issues. Regarding all software my job is not to design; but rather to familiarize with all software used for installation, maintenance including updating, compatibility with operating systems, and file recovery. As Sys Admin my task is to implement and regulate all security IPS, firewall, and virus log revisions to each performing all required actions to keep all confidentiality and data integrity as well as keeping all software and hardware secure. User accounts, passwords, and access is also regulated by the System Administrator. The root account holds access to all databases, user accounts information, hardware, and software by keeping a master copy all files for implementation and recovery having full control of each with the task with the task of delegating the access to staff as each required by position. Being that we will be using LINUX/UBUNTU OS the Sys Admin must take the following seminar: https://training.linuxfoundation.org/linux-courses/system-administration-training/linux- system-administration so that it will ensure that as much knowledge as possible will be provided to enable a successful operation. HEALTH CARE HQ.LLC CONFIDENTIAL PAGE 14
  • 15. COMPETITIVE ANALYSIS Summary As the Sys Admin will be working with all the hardware and software and the Net Admin will be ensuring the communication and practicality of each workstation their roles may differ but it is essential that they work hand in hand communicating and facing the issues that will present within the organization as a team to provide all the IT support needed to Healthcare HQ. Problem solving, collaboration, and the ability to follow protocols will be essential for the flow of operations to be successful. LINUX/UBUNTU OS offers an open source market that taking all the security measures available can offer a competitive edge and enable our staff to complete each task successfully. ASUS offers a superb customer service department that can respond to our team needs while offering cutting edge technology. For security purposes every preventative measure will ensure our staff with a peace of mind to protect not only their lives in daily operations, but also provide a peace of mind to our clients because they will be ensured data integrity with all healthcare records. Each Security vendor covers all the departments such as Human Resources, DBA, and real time access to all the files necessary. Complete training will be provided to our staff using the UBUNTU resources available to ensure that the staff knows how to use each tool provided through that powerful OS. Software patching will be done regularly to ensure that our software is completely up to date so that our organization can be in the forefront in our industry. HEALTH CARE HQ.LLC CONFIDENTIAL PAGE 15
  • 16. COMPETITIVE ANALYSIS References Florentine, S. (2016). Career roadmap: Systems admin role isn't dead. Cio, Retrieved from http://search.proquest.com.proxy.cecybrary.com/docview/1850168109? accountid=45927 Gregory, P. H. (2015). Getting an information security job for dummies. Hoboken, NJ: John Wiley and Sons, Inc. Retrieved from: http://proquestcombo.safaribooksonline.com.proxy.cecybrary.com/book/career- development/9781119002628/chapter-2-understanding-infosec-roles-one-day-in-the- life/h2_1_html_3?query=(((network+admin+job+description)))#snippet Lemon tree premier and red fox hotel now operational at delhi aerocity. (2013, Dec 27). HospitalityBiz, Retrieved from http://search.proquest.com.proxy.cecybrary.com/docview/1686862953? accountid=45927 Dua, R. (2016). Learning docker networking. Packt Publishing Limited. Retrieved from: http://proquestcombo.safaribooksonline.com.proxy.cecybrary.com/book/operating-systems- and-server-administration/linux/9781785280955/learning-docker-networking/ch05_html? query=(((apparmour+security)))#X2ludGVybmFsX0h0bWxWaWV3P3htbGlkPTk3ODE3ODUyODA 5NTUlMkZjaDA1czA2X2h0bWwmcXVlcnk9KCgoYXBwYXJtb3VyJTIwc2VjdXJpdHkpKSk= HEALTH CARE HQ.LLC CONFIDENTIAL PAGE 16
  • 17. COMPETITIVE ANALYSIS HEALTH CARE HQ.LLC CONFIDENTIAL PAGE 17