Technology As A Management Tool
description
Transcript of Technology As A Management Tool
Pat SineOffice of Educational Technology
College of Human Resources, Education & Public PolicyUniversity of Delaware
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
March 2008
Technology strategic planning Purchasing hardware and software Security Networking Your presence on the web Online communications tools
TopicsTopics
Strategic TechnologyStrategic TechnologyPlanningPlanning
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
March 2008
Elements of Strategic Elements of Strategic PlanningPlanning
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
March 2008
Keep focus on the goals of the organization
Use the plan as an ongoing map – not a task to be completed
If you don’t know…get an expert
Question all experts!
Pointers for Strategic Pointers for Strategic PlanningPlanning
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
March 2008
TCO – Total Cost of Ownership
70 / 30 rule
◦ 30% -> initial purchase of hardware, software and peripherals
◦ 70% ->technical support, repairs, training and upgrades
BudgetingBudgeting
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
March 2008
Tech Soup www.techsoup.org
Tech Atlas – Online Tech Plan Development Tooltechatlas.org/tools/default.asp
Planning ResourcesPlanning Resources
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
March 2008
Decision makers across the organization
Clients to be served
Staff and volunteers who will use the technology
StakeholdersStakeholders
So… decide on your general software needs first.
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
March 2008
Bits Bytes
Kilo 103
Mega 106
Giga 109
Tera 1012
Peta 1015
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
March 2008
Basic Hardware DecisionsBasic Hardware Decisions
What kind of machine?
Windows or Macintosh?
Desktop, laptop, tablet?
Desktop and laptop?
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
March 2008
• Processor type and speed• Measured in GHz• Dual, Quad and 8 Core
• Windows (1.8 to 2.4)• Intel Core Duo Series• AMD Athlon™ 64 X2 Dual-Core
• Mac (1.8 to 2.2)• Intel Core 2 Duo processor
Basic Hardware DecisionsBasic Hardware Decisions
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
March 2008
Memory – RAM Measured in MB or GB Preferably 1- 2 GB
(some specs say 512, but weigh it against later update costs)
Basic Hardware DecisionsBasic Hardware Decisions
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
March 2008
Hard drive size
◦Measured in GB
◦150 GB and up
◦More in a desktop (price limitations)
◦More to store multimedia
Basic Hardware DecisionsBasic Hardware Decisions
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
March 2008
Optical Drives
◦DVD ROM & CD R/W (the old way)
◦CDRW/DVD Combo (2006)
◦CD writer / DVD
◦CD/DVD writer
Basic Hardware DecisionsBasic Hardware Decisions
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
March 2008
Connectivity
◦Modem – 56 Kbps (but for how long)
◦Network card – 1Gbps
◦Wireless adapter – 802.11b/g◦ heading for 802.11n
Basic Hardware DecisionsBasic Hardware Decisions
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
March 2008
Things you don’t need to think about, much. Monitors – DVI capable Mouse and keyboard Video cards Sound cards Modems Ethernet (network) connectivity Wireless access in a notebook
Other Hardware Other Hardware DecisionsDecisions
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
March 2008
What else?
◦ Backup devices and data transport CD-R, CD-RW, DVD +/-RW Tape Thumb drive (pen, USB, flash, jump) Direct Attached Storage (e.g., Drobo)
◦ Printers, scanners, digital cameras
Even More Hardware Even More Hardware DecisionsDecisions
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
March 2008
The biggest mistake to avoid…
Waiting just one more week for the prices to drop and the technology to stabilize.
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
March 2008
What about recycled computers? www.techsoup.org/recycle/index.cfm
TCO – Total Cost of Ownership
One More Hardware One More Hardware DecisionDecision
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
March 2008
Compatibility Capability Stability Scalability Ease of Use Longevity and Support
Software CharacteristicsSoftware Characteristics
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
March 2008
Commercial or purchased
Free◦ Open Source
◦ Shareware
◦ Freeware
◦ Public Domain
Software CategoriesSoftware Categories
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
March 2008
What’s Available For FreeWhat’s Available For Free
Office Suite OpenOffice
Web Browsers
Internet ExplorerMozilla Firefox
E-mail clients
Outlook ExpressMozilla Thunderbird
Non-profitDatabases
E-baseEtapestry
Look for software at download.com or tucows.com
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
March 2008
What’s Available For Free What’s Available For Free OnlineOnline
Word Processor, Spreadsheet, Presentation
Google Docs
E-mail Gmail or Yahoo Mail
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
March 2008
Donated and Discount Products for Nonprofits
◦ TechSoup Stock◦ www.techsoup.org/stock
Purchasing SoftwarePurchasing Software
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
March 2008
Google Apps
◦ Free for Nonprofits◦ www.google.com/a
Using Online AppsUsing Online Apps
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
March 2008
Virus and Spyware Protection!◦ AVG Antivirus free.grisoft.com
◦ Windows Defenderwww.microsoft.com/athome/security/spyware/software/default.mspx
◦ TechSoup: Virus Protection Resource Page
Firewall ◦ Built-in Windows Firewall◦ Your wireless or network router
What Else?What Else?
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
March 2008
Capabilities◦ Next step after spreadsheets for organizing data◦ Can grow with the organization
ebase and eTapestry◦ Specifically for non-profits to conduct business
Databases: Powerful, Databases: Powerful, Somewhat more daunting, Somewhat more daunting, but Pricelessbut Priceless
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
March 2008
How will you train all your staff to use technology to improve productivity?
How will you reward those who do excel and encourage those who shy away?
As your operations become more computer-based, what will you do about technophobes?
Tech Skills ConsiderationsTech Skills Considerations
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
March 2008
Technology Literacy Benchmarks for Nonprofit Organizations(2002)
www.benton.org/publibrary/stratcom/techlit.pdf
◦ Guidelines for assessing how the organization is managing technology and staff
Tech Skills ConsiderationsTech Skills Considerations
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
March 2008
Infectious
◦Viruses A program or piece of code that is designed to replicate itself and
spread from file to file, usually attaching itself to applications. Replicates itself via the network or email.
◦Worms A program or algorithm that replicates itself over a computer
network without user intervention and usually performs malicious actions.
Source: Jeff MacArthur, commandNpodcast, October 12, 2007
Categories of MalwareCategories of Malware
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
March 2008
Concealment
◦ Trojan Horses A destructive program that masquerades as a benign
application.
◦ RootKits modifies operating system
◦ Backdoors
Categories of MalwareCategories of Malware
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
March 2008
For Profit
◦ Spyware Send info back to someone who uses it for commercial
profit or redirects to a profit site
◦ Botnets
◦ Key Loggers
◦ Dialers
Categories of MalwareCategories of Malware
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
March 2008
Virus and Malware scanner, along with antivirus/malware software
OS updates
Only download from trusted sites or the program creator’s site
Think twice about installing software
Use a firewall
Use wireless access controls – WEP and WPA
No unnecessary rights (ie., no extra administrators) Vista UAC Apple’s password protection for software installs
DefensesDefenses
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
March 2008
Hacking and Cracking
Viruses
Worms
Trojan Horses
Hoaxes
Phishing and pharming
Invasions: the enemy outsideInvasions: the enemy outside
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
March 2008
Insecure passwords
Posted passwords
Poor back up practices
Internet firewall non-use
Lack of virus software updates
Lack of OS and other software updates
User Practices: the enemy User Practices: the enemy insideinside
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
March 2008
Connecting To The InternetConnecting To The Internet
Dial-up 56Kbps
DSL Generally 1-3 Mbps (distance-dependent, asymmetrical)
FiOS 5-30 Mbps (“fiber to the home”)
Cable Generally 384 Kbps (upload) - 6 Mbps (asymmetrical, shared)
T1 1.5Mbps (symmetrical, dedicated)
Bro
adba
nd
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
March 2008
Types Of Local Area Types Of Local Area NetworksNetworks Peer-to-Peer
◦ Local◦ Virtual
Client-Server
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
March 2008
Router
Source: Techsoup.org,www.techsoup.org/articlepage.cfm?ArticleID=210&topicid=3
Peer-to-peer NetworkingPeer-to-peer Networking
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
March 2008
Client-server NetworkingClient-server Networking
RouterRouter
Source: Techsoup.org,www.techsoup.org/articlepage.cfm?ArticleID=210&topicid=3
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
March 2008
Authentication E-mail Applications File and Print Servers Security Backups
Why not on the Internet?
Why A Server?Why A Server?
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
March 2008
4 or fewer ► Peer-to-Peer - maybe 20 or more ► Client/Server
In between ► determine by◦ Business practice◦ Availability of network support staff
When A Server?When A Server?
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
March 2008
Internet
LAN – Local Area Network◦ Single site network
VPN – Virtual Private Network◦ Network that uses public wires to allow access to a
network (usually a LAN)
Reaching Further on the NetworkReaching Further on the Network
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
March 2008
General information – puts you on the map
Disseminate special materials more efficiently
“Any time” connections
Create a library of materials
Involve new people less intrusively
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
March 2008
Space from your connection provider Local server Vendors Web Hosting
You must have a domain name for your organization
Where to PublishWhere to Publish
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
March 2008
Criteria for a Web Hosting Service
◦FindMyHosting: Web Host Guidewww.findmyhosting.com/webhosting-guide.htm
◦How to Choose a Web Host by Christopher Hengwww.thesitewizard.com/archive/findhost.shtml
FindMyHosting◦ www.findmyhosting.com/
Where to PublishWhere to Publish
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
March 2008
Publications – writing & organizing
Graphics arts
Technical
Skills Needed for a Great SiteSkills Needed for a Great Site
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
March 2008
Brochure - static
Magazine – regular updates
Direct Mail Appeal – tied to membership or outreach database
Community – closer to a portal
Source: The Stages of Site Development, Rick Christ
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
March 2008
Center for Democracy &Technology www.cdt.org/
Creative Mentoring www.creativementoring.org/index.shtml
OceanHealth.org oceanhealth.org/
NPO Web Site SamplesNPO Web Site Samples
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
March 2008
Web logsWeblogsBlogs
Nonprofit Blog Exchangenonprofitblogexchange.blogspot.com/
A Nonprofit's Guide to the Blogospherewww.techsoup.org/learningcenter/internet/page5509.cfm?cg=searchterms&sg=blogging
BloggingBlogging
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
March 2008
1. To report back from an event or conference
2. To involve staff and take advantage of their knowledge
3. To involve volunteers and document their work
4. To provide resources and information to constituents
5. To provide resources and information from constituents
6. To give constituents a place to voice their opinion
7. To give constituents support
8. To create the media coverage constituents want
9. To give constituents the power and tools to create change
10. To reach potential donors Source:Netsquared.org,http://www.netsquared.org/blog/britt-bravo/10-ways-nonprofits-can-use-blogs
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
March 2008
Email Listservs Blogs Wikis
Asynchronous Asynchronous CommunicationCommunication
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
March 2008
Netiquette Management and storage Clarity Lists managed through an Address book
E-mailE-mail
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
March 2008
“Chatty”Charity Channel Forums
charitychannel.com/forums/index.asp
E-zines or newslettersDo-it-yourself
◦Yahoo! Groups◦Google Groups
ListservsListservs
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
March 2008
Chatrooms Instant Messaging Video conferencing Skype
Synchronous Synchronous CommunicationCommunication
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
March 2008
AOL Instant MessengerAOL Instant Messenger
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
March 2008
SkypeSkype
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License.
March 2008
Great Sources of Great Sources of Additional HelpAdditional Help
TechSoupwww.techsoup.org
NetSquaredwww.netsquared.org
www.udel.edu/sine/nonprof
Materials for this Materials for this presentation can be found atpresentation can be found at