Services and Products


Published on

This presentation describes the structural issues that effect a small businesses information systems. The products and services provided by TechNecessities to address these issues are covered at a high level.

Published in: Business, Economy & Finance
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Services and Products

  1. 2. TechNecessities <ul><li>Scott Reimers </li></ul><ul><li>Bachelor of Science in IT: University Of Texas at Arlington </li></ul><ul><li>Programmer for American Airlines </li></ul><ul><li>Mainframe support for IBM </li></ul><ul><li>Application Operations for HP </li></ul><ul><li>5yrs IT manager and Director </li></ul><ul><li>2yrs Director of ASP Design and Operations </li></ul><ul><li>5yrs Owner of Technecessities </li></ul>
  2. 3. Technical Issues Effecting Business Today <ul><li>Reliability </li></ul><ul><li>Security </li></ul><ul><li>Efficiency </li></ul>
  3. 4. Reliability <ul><li>Loss of productivity and data due to computer failure is not acceptable to today’s clients. </li></ul><ul><li>Taking Orders </li></ul><ul><ul><li>Customers don’t like to wait for information or estimates, they need it now. </li></ul></ul><ul><li>Communication </li></ul><ul><ul><li>Customers need to reach your business. Customers and Vendors need to be able to send and receive documents in a timely manner. </li></ul></ul><ul><li>Accounting </li></ul><ul><ul><li>Need to keep accounts current and track resources. </li></ul></ul><ul><li>One report states just the loss of a small business Accounting system may require over 21 days of work and cost over $19,000 to re-type. </li></ul>
  4. 5. Security: Virus <ul><li>Virus: a software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer </li></ul><ul><li>Can effect reliability </li></ul><ul><ul><li>Instability of Windows. </li></ul></ul><ul><li>Can Destroy Corporate Data </li></ul><ul><li>Can effect professional image </li></ul><ul><ul><li>Infection of a Customer’s PC. </li></ul></ul><ul><li>Although 99% of companies use antivirus software, 82% of them were hit by viruses and worms. (CSI/FBI, 2003) </li></ul>
  5. 6. Security: Spyware <ul><li>Spyware: software installed without a user’s knowledge; it can record your keystrokes, history, passwords, and other private information. </li></ul><ul><li>Performance </li></ul><ul><ul><li>Spyware is the primary reason most systems run slowly. </li></ul></ul><ul><li>Tracking </li></ul><ul><ul><li>Marketing companies and identity thieves can use spyware to obtain personal information and track your preferences on the internet. </li></ul></ul><ul><li>Professional image: Inappropriate material </li></ul><ul><ul><li>Popups </li></ul></ul><ul><li>There more than 7,000 spyware programs. (Aberdeen Group, 2003) </li></ul>
  6. 7. Security: Hacking <ul><li>Tools: </li></ul><ul><ul><li>Spyware </li></ul></ul><ul><ul><li>Viruses </li></ul></ul><ul><ul><li>Trojans </li></ul></ul><ul><ul><li>Browser and OS Exploits </li></ul></ul><ul><ul><li>Social Engineering </li></ul></ul>
  7. 8. Security: Hacking: Common Misconceptions <ul><li>1 Hacker per PC. </li></ul><ul><ul><li>Zombies </li></ul></ul><ul><ul><li>System Scan </li></ul></ul><ul><ul><li>Reporting relevant material </li></ul></ul><ul><li>I have nothing of value. </li></ul><ul><ul><li>Accounting data </li></ul></ul><ul><ul><li>Customer personal information: Identity theft </li></ul></ul><ul><ul><li>Customer Personal Information: Investigations, Legal Matters, Stalking, Revenge. </li></ul></ul>
  8. 9. Efficiency <ul><li>Applications which allow you to work smarter. </li></ul><ul><li>Eliminate redundancy </li></ul><ul><ul><li>Information in multiple locations </li></ul></ul><ul><ul><li>Collaboration/Communication between employees </li></ul></ul><ul><li>Access to data from anywhere: </li></ul><ul><ul><li>Remote Access from home. </li></ul></ul><ul><ul><li>Create Quotes and Invoices at job site </li></ul></ul><ul><ul><li>Palm PDAs and Handheld Devices </li></ul></ul>
  9. 10. Benefits of Reliability, Security and Efficiency <ul><li>Customer Satisfaction </li></ul><ul><ul><li>Right information, right now. </li></ul></ul><ul><li>Reduced Overhead. </li></ul><ul><ul><li>Less staff required to perform daily business </li></ul></ul><ul><li>Reduced Liability </li></ul><ul><ul><li>Keeping your customer information secure. </li></ul></ul><ul><li>Professional Image </li></ul><ul><ul><li>Immediate communication, printed documents, sending color, professional documents make a good impression. </li></ul></ul><ul><li>Customer Retention </li></ul><ul><ul><li>Immediate access to previous orders, preferences, and automatic reminders for schedules and services. </li></ul></ul>
  10. 11. Technecessities’ Services: Reliability. <ul><li>Build your Computer and Network Systems to ensure access to programs and data, even in the event of system failure. </li></ul><ul><ul><li>Redundant equipment : Dual harddrive systems. </li></ul></ul><ul><ul><li>Fault tolerant networks: </li></ul></ul><ul><ul><li>Access from more than one computer. </li></ul></ul><ul><ul><li>Automated off-site backup systems: Only what is required and immediate restoration. </li></ul></ul>
  11. 12. Technecessities’ Services: Security. <ul><li>Firewall Systems </li></ul><ul><ul><li>Protect against direct attacks by hackers and zombies. Full Monitoring and Alerts. </li></ul></ul><ul><li>Antivirus Products </li></ul><ul><ul><li>From automated workgroup to individual PCs </li></ul></ul><ul><li>Anti-Spyware products. </li></ul><ul><li>Access Control. </li></ul><ul><ul><li>Prevent unauthorized access to customer and accounting information through levels of control for employees, customers, and vendors. </li></ul></ul>
  12. 13. Technecessities’ Services: Efficiency. <ul><li>Assistance in finding and using applications. </li></ul><ul><ul><li>Quickbooks, Peachtree, Outllook, Databases and industry-specific programs. </li></ul></ul><ul><li>Communication and Scheduling. </li></ul><ul><ul><li>Internet Setup, Email Setup, Shared Calendars, Customer Secure access to information. </li></ul></ul><ul><li>Remote Access from Home or Job Site. </li></ul><ul><li>Personal Productivity. </li></ul><ul><ul><li>PDAs, Integrated Cell Phones, helping you carry your data with you. </li></ul></ul>
  13. 14. TechNecessities <ul><li>“ Some day, on the corporate balance sheet, there will be an entry which reads, &quot;Information&quot;; for in most cases, the information is more valuable than the hardware which processes it.” - Grace Murray Hopper (1906 - 1992) US military leader, mathematician, educator </li></ul><ul><li>“ Part of the inhumanity of the computer is that, once it is competently programmed and working smoothly, it is completely honest”. - Isaac Asimov (1920 - 1992) </li></ul><ul><li>Questions? </li></ul>