SlideShare une entreprise Scribd logo
1  sur  9
IDLEWILD INSTALLATION PROJECT TIMELINE

                                              11/12   11/19   11/26   12/3   12/10   12/15
                TASK                   11/9     –       –       –      –       –       –     12/17
                                              11/16   11/23   11/30   12/7   12/14   12/16
Sign Contract
Project meeting schedule
Assign project task list to teams
Site survey – data room
Order hardware/software
Order Telco
Create a training/backup/disaster
plan
Follow-up on equipment/telco orders
Inventory hardware/software
Tech Briefing
Preload OS/apps/drivers on CPUs
    Test
System installation
    Telco
    Desktops
    Copier/Scanner/Fax machine
    Test all hardware/software
Training
Test backup and recovery plan
Make last minute corrections/changes
System cutover
Post cut evaluation


                  GenX Solutions - Proprietary and Confidential
HARDWARE
           Hardware                Price            Quantity               Total Cost
HP Desktop PC                 599.99 ea.              11           $ 6,599.89
  8 GB DDR3-1333MHz
      SDRAM (2 DIMMs)
  1.0 TB Hard Drive
  3.0 GHz Processor
  6 MB shared cache
  DVD burner
  Keyboard & mouse
  Windows 7 Home
  1 Yr. Kaspersky S/W
HP 17” Monitor                119.99 ea.               24          $ 2,879.76
Dual Monitor Stand             56.50 ea.               11          $ 621.50
HP LaserJet Pro 200           399.99 ea.               1           $ 399.99
M276nw Color Multi-
Function Laser Printer
   Print/Copy/Scan/Fax
   Duplex printing
Interlink Electronics ePad    110.00 ea.                2          $   220.00
Signature Terminal
Belkin Network Interface       59.00 ea.               11          $   649.00
Card

Total Hardware Costs                                               $10,810.14

                   GenX Solutions - Proprietary and Confidential
SOFTWARE


           Software                    Price                 Quantity                     Total Cost
Upgrade from Windows 7               83.00 ea                  11            $   913.00
Home to Windows 7 Prof.
Upgrade Windows 8                   69.99 ea.                    11          $ 769.89
Intuit Quick books                 179.99 ea.                    11          $ 1,979.89
Intuit Lacerte                     395.00 ea.                    11          $ 4,345.00
Engagement CS                  5 @ 1,500.00                       2          $ 3,290.00 – Licenses renew @ 50% of
                               1@     290.00                      1          license value/yr.
Peachtree 2013                 5@     659.99                      2          $ 1,319.98
                               1@     194.00                      1          $ 194.00
My PC Backup                      $356.40/Year                3 Years        $ 1,069.20
Kaspersky Renewal after 1      3@      49.99                      4          $ 199.96
yr.
Cisco ASA Security 5510 w/          1,802.00                     1           $ 1,802.00
Firewall

Total Software Costs                                                         $15,882.92




                             GenX Solutions - Proprietary and Confidential
SERVICE & TOTAL EST. EXPENSES


             Software                     Price                 Quantity                 Total Cost
Labor Fee (Estimated 25-32 hours)                               $100.00       $   2500.00-$3200.00

Hardware Maintenance                     3 years                 $500.00      $   1500.00
User Training                                                    $125.00      $    125.00
Help Desk Support                                                  Incl.      Incl. in Maintenance


Total Service Cost Estimate                                                   $ 4,125.00 - 4,825.00

Total Software Costs                                                          $15,882.92

Total Hardware Costs                                                          $10,810.14


TOTAL COSTS                                                                   $30,818.06 - $31,518.06




                              GenX Solutions - Proprietary and Confidential
PROJECT DESCRIPTION

I.    Project Planning

      Meet with customer to review scope of work, timeline, documentation and review any changes.

II.   Pre-Installation

        • Review equipment (pre-packaged or custom), including new and existing (customer owned)
          hardware, software and peripherals (including racks and power equipment).

        • Ensure customer understands power (including voltages and receptacle types), network
          infrastructure, equipment and HVAC requirements and that they will be properly installed prior to
          the implementation.

        • Collect technical configuration information required for implementation. Explain any items
          that are unclear to ensure customer understands the information needed.

III. Desktop PCs

        •    Build and configure desktop hardware
        •    Install and configure Windows 7 and customer specified financial software
        •    Configure DHCP
        •    Add users to the network
        •    Add printer/copier/scanner to network

VI.    Signature Pad

       Setup and configure Interlink Electronics ePads
                              GenX Solutions - Proprietary and Confidential
PROJECT DESCRIPTION – Continued

V.    Backups

      Configure to My PC Back-up(hosted vendor) and setup daily backup schedule to include data files

VI.   Firewall / Router / VPN

      Install and configure Cisco ASA security appliance firewall/router on local network
       • Configure Access Rules, LAN, NAT, remote desktop, direct VPN connection

VII. Test Configuration

VIII.End User Training

IX.   Project Wrap-Up

X.    Optional - Anti-Virus / Anti-Spam / Anti-Spyware
             •Install Kaspersky on server.
             •Install anti-virus administrator console and related agents.
             •Configure system to automatically update and scan local PCs on regular basis.
             •Uninstall current AV clients from (11) existing local PCs, as applicable.
             •“Push” AV client from server to 11 total PCs on network
             •Setup remote access page to allow remote users to “attach” to AV server
             •Run scans on local PCs to look for current viruses.


XI.   Post-Project Support per Service Level Agreement

                                GenX Solutions - Proprietary and Confidential
SERVICE LEVEL AGREEMENT

Report the System Event to our Technical Support Department available 24 by (except in the event of
planned or emergency outages) by:

      •   telephone 866-555-1212
      •   by email at genxsolutions.com, or
      •   through the tech support portal on our website.

 SYSTEM EVENT
 “Priority 1”       25% or more of the functionality of the System is adversely affected by the System Event.
 “Priority 2”       5% - 24% of the functionality of the System is Adversely affected by the System Event.
 “Priority 3”       5% or less of the functionality of the System is adversely affected by the System Event.



 RESPONSE TIMES
       Priority 1                   2 hours
       Priority 2                  12 hours
       Priority 3                  24 hours


 System will be monitored 24 hours a day, seven days a week.

 Idlewild is responsible for providing a dedicated isolated grounded receptacle (“IGR”). If Idlewild is
 unable to or does not provide the IGR, then the Vendor will provide the IGR on a time and materials
 basis at the installer’s then-current billing rates.

                             GenX Solutions - Proprietary and Confidential
LAYOUT

                                                ePad




                                     SWITCH

ePad

                                 CISCO ASA S/W
                                     ROUTER/
                        VPN          FIREWALL
                                      SERVER
                    Authentication
  HP
  PRINTER
                                                                           SERVER w/
                                                                           Kaspersky S/W
                                     Internet




                                                            My PC Backup
                Remote Access


            GenX Solutions - Proprietary and Confidential
CONCLUSION



By choosing GenX Solutions you will get:


•   The leader in terms of experience, capabilities, technology, and customer service

•   The leading financial solutions platform available

•   The dedication of more than 250 GenX associates to exceed your expectations

•   A partner who understands your needs and has the resources and commitment to meet your
          changing needs in the future




We sincerely thank you for this opportunity




                        GenX Solutions - Proprietary and Confidential

Contenu connexe

Tendances

Streamed Cloud Gaming Solutions for Android* and PC Games
Streamed Cloud Gaming Solutions for Android* and PC GamesStreamed Cloud Gaming Solutions for Android* and PC Games
Streamed Cloud Gaming Solutions for Android* and PC GamesIntel® Software
 
Adding a-new-network-device
Adding a-new-network-deviceAdding a-new-network-device
Adding a-new-network-devicebhimt00
 
Dedicated Server Hosting
Dedicated Server HostingDedicated Server Hosting
Dedicated Server Hostingwebhostingguy
 
OpenEye IP Video Basics
OpenEye IP Video BasicsOpenEye IP Video Basics
OpenEye IP Video Basicsopeneyevideo
 
I server wireless server sales sheet
I server wireless server sales sheetI server wireless server sales sheet
I server wireless server sales sheetQBsoft Solutions
 
OSSJP/ALS19: The Road to Safety Certification: Overcoming Community Challeng...
OSSJP/ALS19:  The Road to Safety Certification: Overcoming Community Challeng...OSSJP/ALS19:  The Road to Safety Certification: Overcoming Community Challeng...
OSSJP/ALS19: The Road to Safety Certification: Overcoming Community Challeng...The Linux Foundation
 
Video streaming
Video streamingVideo streaming
Video streamingVideoguy
 
The Architecture of 11th Generation Intel® Processor Graphics
The Architecture of 11th Generation Intel® Processor GraphicsThe Architecture of 11th Generation Intel® Processor Graphics
The Architecture of 11th Generation Intel® Processor GraphicsIntel® Software
 
OpenEye Digital Video Recorder Overview
OpenEye Digital Video Recorder OverviewOpenEye Digital Video Recorder Overview
OpenEye Digital Video Recorder Overviewopeneyevideo
 
Arista @ HPC on Wall Street 2012
Arista @ HPC on Wall Street 2012Arista @ HPC on Wall Street 2012
Arista @ HPC on Wall Street 2012Kazunori Sato
 
Issnip Presentation
Issnip PresentationIssnip Presentation
Issnip Presentationpauldeng
 
Programming The Real World
Programming The Real WorldProgramming The Real World
Programming The Real Worldpauldeng
 
Network Assurance and Testing During the Migration to VoIP
Network Assurance and Testing During the Migration to VoIPNetwork Assurance and Testing During the Migration to VoIP
Network Assurance and Testing During the Migration to VoIPVideoguy
 
Forts and Fights Scaling Performance on Unreal Engine*
Forts and Fights Scaling Performance on Unreal Engine*Forts and Fights Scaling Performance on Unreal Engine*
Forts and Fights Scaling Performance on Unreal Engine*Intel® Software
 
Offsite Backups Company Info
Offsite Backups Company InfoOffsite Backups Company Info
Offsite Backups Company InfoNathan Flow
 

Tendances (20)

Streamed Cloud Gaming Solutions for Android* and PC Games
Streamed Cloud Gaming Solutions for Android* and PC GamesStreamed Cloud Gaming Solutions for Android* and PC Games
Streamed Cloud Gaming Solutions for Android* and PC Games
 
F5d7234
F5d7234F5d7234
F5d7234
 
Adding a-new-network-device
Adding a-new-network-deviceAdding a-new-network-device
Adding a-new-network-device
 
Project report
Project reportProject report
Project report
 
Dedicated Server Hosting
Dedicated Server HostingDedicated Server Hosting
Dedicated Server Hosting
 
OpenEye IP Video Basics
OpenEye IP Video BasicsOpenEye IP Video Basics
OpenEye IP Video Basics
 
I server wireless server sales sheet
I server wireless server sales sheetI server wireless server sales sheet
I server wireless server sales sheet
 
OSSJP/ALS19: The Road to Safety Certification: Overcoming Community Challeng...
OSSJP/ALS19:  The Road to Safety Certification: Overcoming Community Challeng...OSSJP/ALS19:  The Road to Safety Certification: Overcoming Community Challeng...
OSSJP/ALS19: The Road to Safety Certification: Overcoming Community Challeng...
 
Video streaming
Video streamingVideo streaming
Video streaming
 
Computer graphic lecturer no 3
Computer graphic lecturer no 3Computer graphic lecturer no 3
Computer graphic lecturer no 3
 
The Architecture of 11th Generation Intel® Processor Graphics
The Architecture of 11th Generation Intel® Processor GraphicsThe Architecture of 11th Generation Intel® Processor Graphics
The Architecture of 11th Generation Intel® Processor Graphics
 
OpenEye Digital Video Recorder Overview
OpenEye Digital Video Recorder OverviewOpenEye Digital Video Recorder Overview
OpenEye Digital Video Recorder Overview
 
How toguide remotebackup
How toguide remotebackupHow toguide remotebackup
How toguide remotebackup
 
Arista @ HPC on Wall Street 2012
Arista @ HPC on Wall Street 2012Arista @ HPC on Wall Street 2012
Arista @ HPC on Wall Street 2012
 
Issnip Presentation
Issnip PresentationIssnip Presentation
Issnip Presentation
 
Tech 101 for Retail
Tech 101 for RetailTech 101 for Retail
Tech 101 for Retail
 
Programming The Real World
Programming The Real WorldProgramming The Real World
Programming The Real World
 
Network Assurance and Testing During the Migration to VoIP
Network Assurance and Testing During the Migration to VoIPNetwork Assurance and Testing During the Migration to VoIP
Network Assurance and Testing During the Migration to VoIP
 
Forts and Fights Scaling Performance on Unreal Engine*
Forts and Fights Scaling Performance on Unreal Engine*Forts and Fights Scaling Performance on Unreal Engine*
Forts and Fights Scaling Performance on Unreal Engine*
 
Offsite Backups Company Info
Offsite Backups Company InfoOffsite Backups Company Info
Offsite Backups Company Info
 

Similaire à Idlewild

VMworld 2013: Quantifying the Business Value of VMware Horizon View
VMworld 2013: Quantifying the Business Value of VMware Horizon View VMworld 2013: Quantifying the Business Value of VMware Horizon View
VMworld 2013: Quantifying the Business Value of VMware Horizon View VMworld
 
Mersive Solstice Appliance
Mersive Solstice ApplianceMersive Solstice Appliance
Mersive Solstice AppliancePaul Richards
 
Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Srinivasa Addepalli
 
Kaseya Connect 2011 - Leveraging vPro (intel)
Kaseya Connect 2011 - Leveraging vPro (intel)Kaseya Connect 2011 - Leveraging vPro (intel)
Kaseya Connect 2011 - Leveraging vPro (intel)Kaseya
 
Virtual desktop infrastructure
Virtual desktop infrastructureVirtual desktop infrastructure
Virtual desktop infrastructureGokulan Subramani
 
Security Grade Servers and Storage - Quantifying Value
Security Grade Servers and Storage - Quantifying ValueSecurity Grade Servers and Storage - Quantifying Value
Security Grade Servers and Storage - Quantifying ValueJan Robin
 
Why Security-Grade Servers and Storage?
Why Security-Grade Servers and Storage?Why Security-Grade Servers and Storage?
Why Security-Grade Servers and Storage?Jan Robin
 
IT Network Solutions
IT Network SolutionsIT Network Solutions
IT Network Solutionsrichlan421
 
Stephan pfister flexcast remote pc new
Stephan pfister flexcast remote pc newStephan pfister flexcast remote pc new
Stephan pfister flexcast remote pc newDigicomp Academy AG
 
Citrix virtual computing
Citrix virtual computingCitrix virtual computing
Citrix virtual computinggadi_fe
 
Team-Based Approach to Deploying VDI in Learning Environments
Team-Based Approach to Deploying VDI in Learning EnvironmentsTeam-Based Approach to Deploying VDI in Learning Environments
Team-Based Approach to Deploying VDI in Learning EnvironmentsJeremy Anderson
 
Netsft2017 day in_life_of_nfv
Netsft2017 day in_life_of_nfvNetsft2017 day in_life_of_nfv
Netsft2017 day in_life_of_nfvIntel
 
DeltaV Development Systems in a Virtualized Environment
DeltaV Development Systems in a Virtualized EnvironmentDeltaV Development Systems in a Virtualized Environment
DeltaV Development Systems in a Virtualized EnvironmentEmerson Exchange
 
Cyberdyne systems (2)
Cyberdyne systems (2)Cyberdyne systems (2)
Cyberdyne systems (2)Bryan Moss
 
Netpod - The Merging of NPM & APM
Netpod - The Merging of NPM & APMNetpod - The Merging of NPM & APM
Netpod - The Merging of NPM & APMBoni Bruno
 
CENTRAL MANAGEMENT OF NETWORK AND CALL SERVICES
CENTRAL MANAGEMENT OF NETWORK AND CALL SERVICESCENTRAL MANAGEMENT OF NETWORK AND CALL SERVICES
CENTRAL MANAGEMENT OF NETWORK AND CALL SERVICESNazmul Hossain Rakib
 
Exploring the Final Frontier of Data Center Orchestration: Network Elements -...
Exploring the Final Frontier of Data Center Orchestration: Network Elements -...Exploring the Final Frontier of Data Center Orchestration: Network Elements -...
Exploring the Final Frontier of Data Center Orchestration: Network Elements -...Puppet
 
A Citrix Masterclass
A Citrix MasterclassA Citrix Masterclass
A Citrix Masterclassbluechipper
 
Desktop virtualisation
Desktop virtualisationDesktop virtualisation
Desktop virtualisationBlueChipICT
 

Similaire à Idlewild (20)

VMworld 2013: Quantifying the Business Value of VMware Horizon View
VMworld 2013: Quantifying the Business Value of VMware Horizon View VMworld 2013: Quantifying the Business Value of VMware Horizon View
VMworld 2013: Quantifying the Business Value of VMware Horizon View
 
Mersive Solstice Appliance
Mersive Solstice ApplianceMersive Solstice Appliance
Mersive Solstice Appliance
 
Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2
 
Kaseya Connect 2011 - Leveraging vPro (intel)
Kaseya Connect 2011 - Leveraging vPro (intel)Kaseya Connect 2011 - Leveraging vPro (intel)
Kaseya Connect 2011 - Leveraging vPro (intel)
 
Virtual desktop infrastructure
Virtual desktop infrastructureVirtual desktop infrastructure
Virtual desktop infrastructure
 
Security Grade Servers and Storage - Quantifying Value
Security Grade Servers and Storage - Quantifying ValueSecurity Grade Servers and Storage - Quantifying Value
Security Grade Servers and Storage - Quantifying Value
 
Why Security-Grade Servers and Storage?
Why Security-Grade Servers and Storage?Why Security-Grade Servers and Storage?
Why Security-Grade Servers and Storage?
 
IT Network Solutions
IT Network SolutionsIT Network Solutions
IT Network Solutions
 
Stephan pfister flexcast remote pc new
Stephan pfister flexcast remote pc newStephan pfister flexcast remote pc new
Stephan pfister flexcast remote pc new
 
Citrix virtual computing
Citrix virtual computingCitrix virtual computing
Citrix virtual computing
 
Team-Based Approach to Deploying VDI in Learning Environments
Team-Based Approach to Deploying VDI in Learning EnvironmentsTeam-Based Approach to Deploying VDI in Learning Environments
Team-Based Approach to Deploying VDI in Learning Environments
 
Netsft2017 day in_life_of_nfv
Netsft2017 day in_life_of_nfvNetsft2017 day in_life_of_nfv
Netsft2017 day in_life_of_nfv
 
DeltaV Development Systems in a Virtualized Environment
DeltaV Development Systems in a Virtualized EnvironmentDeltaV Development Systems in a Virtualized Environment
DeltaV Development Systems in a Virtualized Environment
 
Cyberdyne systems (2)
Cyberdyne systems (2)Cyberdyne systems (2)
Cyberdyne systems (2)
 
Netpod - The Merging of NPM & APM
Netpod - The Merging of NPM & APMNetpod - The Merging of NPM & APM
Netpod - The Merging of NPM & APM
 
CENTRAL MANAGEMENT OF NETWORK AND CALL SERVICES
CENTRAL MANAGEMENT OF NETWORK AND CALL SERVICESCENTRAL MANAGEMENT OF NETWORK AND CALL SERVICES
CENTRAL MANAGEMENT OF NETWORK AND CALL SERVICES
 
Exploring the Final Frontier of Data Center Orchestration: Network Elements -...
Exploring the Final Frontier of Data Center Orchestration: Network Elements -...Exploring the Final Frontier of Data Center Orchestration: Network Elements -...
Exploring the Final Frontier of Data Center Orchestration: Network Elements -...
 
William Elkins 2015
William Elkins 2015William Elkins 2015
William Elkins 2015
 
A Citrix Masterclass
A Citrix MasterclassA Citrix Masterclass
A Citrix Masterclass
 
Desktop virtualisation
Desktop virtualisationDesktop virtualisation
Desktop virtualisation
 

Dernier

A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 

Dernier (20)

A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 

Idlewild

  • 1. IDLEWILD INSTALLATION PROJECT TIMELINE 11/12 11/19 11/26 12/3 12/10 12/15 TASK 11/9 – – – – – – 12/17 11/16 11/23 11/30 12/7 12/14 12/16 Sign Contract Project meeting schedule Assign project task list to teams Site survey – data room Order hardware/software Order Telco Create a training/backup/disaster plan Follow-up on equipment/telco orders Inventory hardware/software Tech Briefing Preload OS/apps/drivers on CPUs Test System installation Telco Desktops Copier/Scanner/Fax machine Test all hardware/software Training Test backup and recovery plan Make last minute corrections/changes System cutover Post cut evaluation GenX Solutions - Proprietary and Confidential
  • 2. HARDWARE Hardware Price Quantity Total Cost HP Desktop PC 599.99 ea. 11 $ 6,599.89 8 GB DDR3-1333MHz SDRAM (2 DIMMs) 1.0 TB Hard Drive 3.0 GHz Processor 6 MB shared cache DVD burner Keyboard & mouse Windows 7 Home 1 Yr. Kaspersky S/W HP 17” Monitor 119.99 ea. 24 $ 2,879.76 Dual Monitor Stand 56.50 ea. 11 $ 621.50 HP LaserJet Pro 200 399.99 ea. 1 $ 399.99 M276nw Color Multi- Function Laser Printer Print/Copy/Scan/Fax Duplex printing Interlink Electronics ePad 110.00 ea. 2 $ 220.00 Signature Terminal Belkin Network Interface 59.00 ea. 11 $ 649.00 Card Total Hardware Costs $10,810.14 GenX Solutions - Proprietary and Confidential
  • 3. SOFTWARE Software Price Quantity Total Cost Upgrade from Windows 7 83.00 ea 11 $ 913.00 Home to Windows 7 Prof. Upgrade Windows 8 69.99 ea. 11 $ 769.89 Intuit Quick books 179.99 ea. 11 $ 1,979.89 Intuit Lacerte 395.00 ea. 11 $ 4,345.00 Engagement CS 5 @ 1,500.00 2 $ 3,290.00 – Licenses renew @ 50% of 1@ 290.00 1 license value/yr. Peachtree 2013 5@ 659.99 2 $ 1,319.98 1@ 194.00 1 $ 194.00 My PC Backup $356.40/Year 3 Years $ 1,069.20 Kaspersky Renewal after 1 3@ 49.99 4 $ 199.96 yr. Cisco ASA Security 5510 w/ 1,802.00 1 $ 1,802.00 Firewall Total Software Costs $15,882.92 GenX Solutions - Proprietary and Confidential
  • 4. SERVICE & TOTAL EST. EXPENSES Software Price Quantity Total Cost Labor Fee (Estimated 25-32 hours) $100.00 $ 2500.00-$3200.00 Hardware Maintenance 3 years $500.00 $ 1500.00 User Training $125.00 $ 125.00 Help Desk Support Incl. Incl. in Maintenance Total Service Cost Estimate $ 4,125.00 - 4,825.00 Total Software Costs $15,882.92 Total Hardware Costs $10,810.14 TOTAL COSTS $30,818.06 - $31,518.06 GenX Solutions - Proprietary and Confidential
  • 5. PROJECT DESCRIPTION I. Project Planning Meet with customer to review scope of work, timeline, documentation and review any changes. II. Pre-Installation • Review equipment (pre-packaged or custom), including new and existing (customer owned) hardware, software and peripherals (including racks and power equipment). • Ensure customer understands power (including voltages and receptacle types), network infrastructure, equipment and HVAC requirements and that they will be properly installed prior to the implementation. • Collect technical configuration information required for implementation. Explain any items that are unclear to ensure customer understands the information needed. III. Desktop PCs • Build and configure desktop hardware • Install and configure Windows 7 and customer specified financial software • Configure DHCP • Add users to the network • Add printer/copier/scanner to network VI. Signature Pad Setup and configure Interlink Electronics ePads GenX Solutions - Proprietary and Confidential
  • 6. PROJECT DESCRIPTION – Continued V. Backups Configure to My PC Back-up(hosted vendor) and setup daily backup schedule to include data files VI. Firewall / Router / VPN Install and configure Cisco ASA security appliance firewall/router on local network • Configure Access Rules, LAN, NAT, remote desktop, direct VPN connection VII. Test Configuration VIII.End User Training IX. Project Wrap-Up X. Optional - Anti-Virus / Anti-Spam / Anti-Spyware •Install Kaspersky on server. •Install anti-virus administrator console and related agents. •Configure system to automatically update and scan local PCs on regular basis. •Uninstall current AV clients from (11) existing local PCs, as applicable. •“Push” AV client from server to 11 total PCs on network •Setup remote access page to allow remote users to “attach” to AV server •Run scans on local PCs to look for current viruses. XI. Post-Project Support per Service Level Agreement GenX Solutions - Proprietary and Confidential
  • 7. SERVICE LEVEL AGREEMENT Report the System Event to our Technical Support Department available 24 by (except in the event of planned or emergency outages) by: • telephone 866-555-1212 • by email at genxsolutions.com, or • through the tech support portal on our website. SYSTEM EVENT “Priority 1” 25% or more of the functionality of the System is adversely affected by the System Event. “Priority 2” 5% - 24% of the functionality of the System is Adversely affected by the System Event. “Priority 3” 5% or less of the functionality of the System is adversely affected by the System Event. RESPONSE TIMES Priority 1 2 hours Priority 2 12 hours Priority 3 24 hours System will be monitored 24 hours a day, seven days a week. Idlewild is responsible for providing a dedicated isolated grounded receptacle (“IGR”). If Idlewild is unable to or does not provide the IGR, then the Vendor will provide the IGR on a time and materials basis at the installer’s then-current billing rates. GenX Solutions - Proprietary and Confidential
  • 8. LAYOUT ePad SWITCH ePad CISCO ASA S/W ROUTER/ VPN FIREWALL SERVER Authentication HP PRINTER SERVER w/ Kaspersky S/W Internet My PC Backup Remote Access GenX Solutions - Proprietary and Confidential
  • 9. CONCLUSION By choosing GenX Solutions you will get: • The leader in terms of experience, capabilities, technology, and customer service • The leading financial solutions platform available • The dedication of more than 250 GenX associates to exceed your expectations • A partner who understands your needs and has the resources and commitment to meet your changing needs in the future We sincerely thank you for this opportunity GenX Solutions - Proprietary and Confidential