Premium Essay

Recommendation on Hardware

In: Computers and Technology

Submitted By lightblue8741
Words 1500
Pages 6
| |
Memo
To: | | From: | | cc: | | Date: | September 26, 2012 | Re: | Recommendation on Hardware | | | i. PC versus Mac
It’s been years for Mac and PC user to dislike each other. When the newer versions of operating systems were introduced by Microsoft and Apple, the war between PC windows 8 and for Mac OSX 10.8 Mountain Lion really heats up. It makes it hard for a business to choose and implement a computer system that is easy to use, efficient with cost and performance, reliable and long lasting. Let’s look into some specification on the PC and Mac:
Mac refers to Macintosh that produced by apple that runs on Mac OSX. Mac is only manufactured by Apple Inc. Most of its applications are from app stores. For example: iLife, iTunes, Time Machine, Safari browser are among the popular applications. The Mac attracts a smaller group of people compare to PCs’. A smaller group of user means less chance of getting virus attack. However, the threats of malicious software are growing. The repair of Mac is not hard, anyone with operating system understanding should be able to perform repair on the Mac OS.
On the other hand, PC refers to various brands computers runs Windows operating systems. There are many companies that manufacture PCs, such as HP, Dell, Toshiba, and Lenovo. Microsoft Office and internet Explorer are the most used software application among them all. PC users are from business to personal for its compatibility. It’s a much large group than Mac users. And this is also the reason that virus writers choose windows based system as target. Repairing a windows based system is also easy; anyone with knowledge of windows should be able to perform the repair.

ii. Laptop versus Desktop
At a store we will sure consider about a desktop over a laptop for perform the main tasks on a table or a cashier check outs. The laptop is a personal...

Similar Documents

Free Essay

Hardware Recommendation for Ftk 4 Accessdata

...Quantifying Hardware Selection in an FTK 4.0 Environment Introduction and Background The purpose of this analysis is to evaluate the relative effectiveness of individual hardware component selection in the FTK 4.0 environment. While it is useful to document the individual hardware components which result in maximum performance, it is also important to identify those components which provide the best value. This effort is part of an ongoing commitment by Digital Intelligence to assist customers in making educated choices when selecting individual components for their forensic workstations. Approach Four basic steps were used to evaluate the application’s resource requirements. Step 1 (Establish Test Environment): A suite of tests was developed for the application. These tests were intended to represent the demands of a typical forensic examination. These tests were then automated in order to provide accurate and repeatable recording of results. Step 2 (I/O Channel Evaluation): The automated test suite was then used to determine the basic configuration of the I/O channels. As a starting point, the application manufacturer recommends up to 5 I/O channels: 1.) 2.) 3.) 4.) 5.) Operating System Casework Database Cache/TempDB Evidence A demonstrated ability to combine two or more of these I/O channels could easily result in a less expensive and more manageable configuration. Evaluation of the I/O channel requirements would be essential in determining an optimal I/O configuration...

Words: 3324 - Pages: 14

Free Essay

Cypress Security

...IT 201: Case Report One Guidelines and Grading Guide Overview The first case report for this course is to determine the hardware requirements for a company. In this assignment, you are to read the given scenario. Then, you are to analyze the scenario, write a list of questions for the company, and provide recommendations in a case report. Your list of questions is due in Module Two, and your case report is due in Module Three. Scenario Suppose you have been hired by SNHUConsulting, a leader in information technology. Widget Wonders is a worldwide leader in widgets. They are building a state-of-the-art facility to manufacture and distribute the next generation of widgets. SNHUConsulting has been retained to implement information technology on the expansion project. The new facility for Widget Wonders will be the main manufacturing and distribution center in the United States. The network in the distribution center will connect to the main network located at headquarters. The various departments in the distribution center, the number of employees, and the department needs are listed below.  Sales: The 50 employees in this department require mobility to access company resources while visiting customers and presenting at sales meetings and conferences.  Manufacturing: The 45 employees in this department require access to word processing and spreadsheet programs and the internet.  Inventory Control: The 30 employees in this department require mobility and power......

Words: 718 - Pages: 3

Free Essay

Secuiirty

...Running head: SECURITY ASSESSMENT AND RECOMMENDATIONS Security Assessment and Recommendations for Quality Web Design Mike Mateja October 9, 2011 Submitted to: Dean Farwood SE571 Principles of Information Security and Privacy Keller Graduate School of Management 1 SECURITY ASSESSMENT AND RECOMMENDATIONS 2 Table of Contents Executive Summary ............................................................................................ 3 Company Overview............................................................................................. 4 Security Vulnerabilities ....................................................................................... 4 Hardware Vulnerability: Unrestrained Components .................................................................. 4 Software Vulnerability: Unsecure Wireless Access Points .......................................................... 6 Recommended Security Solutions ....................................................................... 7 Hardware Solution: Physical Restraints ...................................................................................... 7 Impact: Hardware Solution ..................................................................................................... 8 Budget: Hardware Solution ..................................................................................................... 9 Software Solution: Configuring the Wireless access points for security .......

Words: 2829 - Pages: 12

Premium Essay

Office Health and Staftly

...manufacturing services and solutions to a worldwide customer base. It operates manufacturing facilities in Singapore, Thailand, Taiwan and China in addition to its global sales network. This is a manufacturing company and there are multiple departments that support the organization strategies and objectives. Mainly, they are the Product, Equipment and Production Department. In a Wafer Sort Operation, the Equipment Engineering Department is a department that maintains all wafer sort equipment and its supporting hardware. They are responsible for the management of the Overall Equipment Effectiveness (OEE) of the Wafer Sort Operation to produce the highest possible equipment up-time for meeting the production output goals and projection forecast. In this OSH assignment, the focus is the Wafer Sort Hardware Room. Its main responsibility is in the managing of all hardware going in/out of the production floor; ensuring that there are enough spares and hardware available. All hardware are maintained within their periodical maintenance schedule and are diligently done, it's always available and ready for the next production set-up when it’s required. All activities are recorded and updated in the system for internal or external audits. A typical Wafer Sort Operations works in a required controlled environment, which is the Class 10,000 (10K), designed to never allow more than 1,000 particles (0.5 microns or larger) per cubic foot of air, thus minimising dust particles (ISO......

Words: 2064 - Pages: 9

Free Essay

System Recommendation

...System Recommendation for UM&UC Executive Summary UM&UC is a firm that designs, builds, and sells precision measurement tools which are used in scientific, medical, and energy industries. The sales team has become extremely mobile and are facing challenges that impact the effectiveness of the team. UM&UC hired an independent consulting firm to analyze these challenges and make recommendations to improve the sales and sales support effectiveness. The findings of the consulting firm were that the sales and sales support teams are mainly mobile. The sales and sales support teams also need the same capabilities available at a UM&UC facility, but through a mobile device. The IT infrastructure of UM&UC has not kept up with the growing needs of the sales and sales support teams, and many of the team members are trying to use personal mobile devices to help bridge the gap; team members are finding that these devices do not have the necessary access to company IT resources. UM&UC has set aside funding to act upon the recommendations set by the independent consulting firm. They will transition the sales team and other members to tablet style mobile devices. UM&UC has set aside funding and is ready to choose a standard device and implement it for the sales and sales support teams. Recommendation Scope A standard tablet style device will be chosen for each member of the sales and sales support teams. Each unit will not exceed $750. The tablet...

Words: 1327 - Pages: 6

Premium Essay

Risk Assessement Plan

...CEO, CRO, and CITO. B.) Identify assets – Determined assets are hardware, software, systems, and data. C.) Identify threats- This will identify threats that are a potential danger to data, hardware, and systems D.) Identify vulnerabilities- The process to identify is by implementing and assessment and once identified a penetration test will be implemented E.) Identify and evaluate countermeasures- Identified risks will be counter measured to reduce the risk. F.) Assess threats vulnerabilities, and exploits- Test will be implemented to reduce the threat and help identify the problem. G.) Evaluate risks- The counter measure will be implemented to reduce the impact of the threat. H.) Develop recommendations to mitigate risks- Data taken will be used to reduce the threat and evaluate it. I.) Present recommendations to management- Threats and vulnerabilities and the risk that impacts will be presented. Key Personnel The personnel involved in making the key decisions will be the CEO, CRO, and CITO. No other personnel other than the above mention will play in a role in any of the risk management planning. Assets Assets identified will be determined accordingly. The value will be determined from the replacement value asset. It can be determine by what this asset provides to the organization and the cost to recover the asset. Assets can be systems access, system functions, hardware assets, software assets, personnel assets, data, and......

Words: 695 - Pages: 3

Premium Essay

Security Project

................................... 4 Company Background.............................................................................................................................. 4 Software Weaknesses and Recommendations......................................................................................... 5 Hardware Weaknesses and Recommendations........................................................................................ 6 Network Security flaws and Recommendations ....................................................................................... 7 REFERENCES:........................................................................................................................................... 7 Introduction A company that deals with making web site and web business solutions is known as Quality web design. The company provides its customers to provide an opportunity so that they can spread their business through the internet. The other business solutions accompanied are accounting, payroll marketing, also parts of the business process and for which it assets are employed. Abstract The company Quality Web Design provides business solutions to the customers. The circuit used by the company may prove various flaws to security and the hardware and software used have various limitations as Microsoft share point which have limitations in supporting virtualization, upgrade...

Words: 1406 - Pages: 6

Free Essay

Site Survey Report

...Wireless Site Survey Recommendation Wireless Site Survey Recommendation Orchard Street Art Center Orchard Street Art Center Summary This report summarizes a plan to conduct a wireless site survey, also called a radio frequency (RF) survey, at Orchard Street Art Center. This survey will generate recommendations for maximizing network security, coverage, and capacity. Expert Advice Earlier this year, the board of directors of Orchard Street Art Center asked me to propose a plan to improve wireless coverage throughout the center’s public areas, offices, classrooms, music studios and indoor and outdoor theaters. To make sure I proposed the most effective plan possible, I decided to seek the advice of experts. Fortunately, one of the area’s top experts in wireless networking, Jamie Brookstone, president of Brookstone Network Consulting, offered the services of his staff pro bono. Thanks to his offer, I was able to meet several times with the following consultants: Lyn Luzerne Associate Engineer Dean Armstrong Senior Engineer Suzanne j. Sheffield-Harper Project Manager Our conversations focused on ways to improve network connections for the center’s staff and patrons. I also studied information obtained from leading hardware manufacturers and software distributors. This research suggests that our first step is to conduct a site survey of our entire facility. What Is a Wireless Site Survey? A wireless site survey is an analysis of a facility’s wireless......

Words: 896 - Pages: 4

Premium Essay

Riordan Manufacturing Company Inc. Wide Area Network

...fold. Our first will be to provide an inventory of the existing network components for Riordan Manufacturing designated by location, review the network security for each site, and our last goal is to document the current security plan for use in future planning. Because of the limited scope of the project, several assumptions must be made. The first assumption is that Riordan Manufacturing has accurate records of the current infrastructure and no changes will be made during this study. Furthermore, we must assume the equipment at each location is similarly configured. The deliverables for this project will consist of an inventory by location of the network in a Visio format, description of the security by location of the network, and recommendations for changes to the network design, circuit speeds, and reasons why the changes should be...

Words: 11081 - Pages: 45

Premium Essay

Erp Implementation

...| IS-560 Enterprise SystemsDePaul UniversityRobert W. Starinsky, InstructorWinter Quarter, 2004 | ERP Implementation Report of Findings and Recommendations CISCO Systems, Inc. Table of Contents Table of Contents 1 Background and Scope 2 ERP Implementation scenario 2 Situation Analysis 3 Conclusion and Recommendations 4 Background and Scope Cisco System, Inc is a Computer Technologies company that was founded in 1984. The company’s primary product is the “router.” The router is hardware and software that control Intranet and Internet traffic. With the growth of the Internet, Cisco products became in high demand. In 1997 Cisco was ranked among the top five companies in return on revenues and on assets. Cisco has been classified in the same category of successful companies as Microsoft and Intel. With the growth of Cisco, their computer systems were unable to handle the increase volume. The Cisco legacy system was a Unix-Based software package that supported its operations of: Financial; Manufacturing; and Order Entry. The system lacked reliability and the ability to expand. Eventually in January 1994, Cisco’s legacy computer system malfunctioned corrupting Cisco’s central database. The company was practically shutdown for two days. As Cisco struggle to recovered from the major shutdown, the company realized that they needed to act quickly and elected to implement an ERP system. Little over a year later, Cisco successfully implemented an ERP......

Words: 1835 - Pages: 8

Premium Essay

Masters

...Retailer Woolworths Limited and Mooresville, North Carolina (United States) based hardware chain, Lowe's.[2] Masters was created as a way for Woolworths Limited to crack into the hardware retail space, which has been historically dominated by Bunnings Warehouse, which is owned by arch rival Wesfarmers. The two companies already compete with each other with groceries and general merchandise. The brand name was announced on 2 May 2011,[3] coinciding with the launch of a website at masters.com.au.[4] Hans Hulsbosch, who has designed brand identities for Woolworths & Qantas designed the Masters brand and logo.[5] The first outlet, located in Braybrook, Victoria, opened to tradesmen on 31 August 2011, and the general public on 1 September 2011.[6] In the Sydney Morning Herald, CEO Don Stallings is attributed as saying that staff will be trained for at least 100 hours, and the stores will offer over 35,000 products.[7] Ways in which Masters will differentiate from its competitors include stores which are more brightly lit, more colourful with polished concrete, large colour signage and store displays, it aims to place more emphases on attracting female shoppers, buzzers scattered around the store which when pressed, will send a nearby staff member to that location to help out a customer, pagers handed to customers which enables them to continue shopping while their paint is tinted, selling more 'non hardware' lines such as whitegoods as well as having McDonald's restaurants......

Words: 2133 - Pages: 9

Premium Essay

Software Architecture Project

...Software Architecture Project Team A CSS 422 11-7-11 Mohammad Shakir Kamali Executive Summary This paper will discuss in detail the software currently in use at the four facilities of Riordan Manufacturing. Likewise, the paper will discuss the recommended software upgrades suggested by Team A in week 2. These recommendations will allow Riordan Manufacturing and its employee’s to work more efficiently and have greater overall productivity. This will ensure that Riordan Manufacturing will stay one step ahead of their competitors and have the ability to do business in a more professional manner. To do this, Riordan Manufacturing will need upgrades involving both hardware and software with minimal training and downtime. Introduction Riordan Manufacturing must update their current software and hardware systems to become up-to-date and competitive. Riordan Manufacturing consists of four separate locations, which all currently use dated software systems such as Microsoft 98 OS and Microsoft Office 2K, updating these outdated systems will increase efficiency with the advancements in newer systems. Riordan Manufacturing also has older outdated servers and switches that should be replaced to increase computing speed and transfer time. Updating the overall software architecture of Riordan will see gains overall for Riordan Manufacturing. Company Background Riordan Manufacturing is a global plastics manufacturer employing 550 people with projected annual earnings of $46......

Words: 1655 - Pages: 7

Premium Essay

It Audit

...IT AUDIT REPORT FOR Contents Contents 2 Contents 2 1. Introduction 4 1.1 Purpose 4 1.2 Scope 4 2. Background Information 4 3. Assets Identification 5 4. Threat Assesment 5 5. LAWS, REGULATIONS AND POLICY . 5 5.1 Hospital Policy. 5 5.2 Vulnerabilities. 5 6. PERSONNEL 5 6.2 Management. 6 6.3 Operations. 6 6.4 Development 6 6.5 Vulnerabilities. 7 7. Systems and Applications. 7 7.1 Vulnerabilities. 7 8. Information Processing Facilities (Data Centers) 7 8.1 Vulnerabilities 7 9. Systems Development 8 9.1 Vulnerabilities 8 10. Management of IT and Enterprise Architecture 8 11. Client, Server, Telecommunications, Intranets and Extranets 8 11.1 Building Vulnerabilities 8 11.1 Security Perimeter 8 11.1 Server Area 8 12. Summary 8 12.1 Action Plan 8 1. Introduction • At present the Hospital has 250 beds including 40 adult ICU and 8 Pediatric ICU beds. • The Hospital is well equipped with latest technology like 1.5 Tesla MRI, 6 Slice Spiral CT Scan, Digital X-ray, Mammography, Intense Pulse Light (Cosmetic) and Diabetic Foot Care Equipment’s in the year 2007-08, the hospital provided services to 46000 patients. So far the hospital has repaired approximately 2400 cleft lip and cleft......

Words: 2618 - Pages: 11

Free Essay

Cross Cultural Communication

...Finding Number 2 5 Finding Number 3 6 Recommendations 6 Conclusion 7 References 8 Executive Summary As we begin our business venture at XYZ Company, technology plays an important part in our success. We must be able to provide an infrastructure that is robust enough to support our customers and employees. It must also be reliable, providing “always on” access. The challenge is being able to accomplish this using new technology at a cost that will not have a big impact to our capital spend. Per other Partners requests, the following report has been created to address identify a piece of technology that can be used at XYZ Company. The requirements of this tool is that is must be relevant within the last five years, widely accepted in the IT industry, and implemented and supported at a low cost. The tool must show the ability to make a positive impact to our business areas (Marketing, Accounting, Sales, and Quality Assurance). After extensive research, Virtualization has been recommended as the technology that meets the requirements stated above. In reviewing potential vendors, VMware is the recommended choice due to their market share and offerings. VMware provides significant savings in cost, increased application availability, and desktop management. By moving to VMware, we reduce cost by not having to spend money on additional server hardware. Multiple applications can be installed to one machine, saving hardware costs. This in turn reduces......

Words: 2239 - Pages: 9

Premium Essay

Network Evaluation

...In a computer network evaluation it is important to cover various areas to determine which are satisfactory and which are in need of improvement. The following 15 evaluations will be used to access the current state of the network: 1. Evaluation of Client Computer Hardware In the evaluation of client computer hardware, this evaluation seeks to identify all client computer assets owned by the company. All laptops and desktops owned by the company should be made available as needed in order for the evaluation to be as accurate as possible. It will be necessary to perform a review of all client computers that connect to the company assets. These machines will be analyzed for speed, performance, and reliability. I will look for variations in hardware manufacturers. Depending on the circumstance, it can result in better TCO (Total Cost of Ownership) if client computers are limited to one or two manufacturers. In addition, machines that are broken, out of warranty, or outdated will be recommended for repair or replacement. 1. 2. Evaluation of Client Computer Software In the evaluation of client computer software, I will seek to identify all software that is installed on client computers and being used in the workplace. This evaluation can be performed using software metering in software such as Microsoft System Center Configuration Manager, if installed. If not installed, this information will be collected manually by viewing the installed software on each......

Words: 2399 - Pages: 10