The user acceptance process is a protocol that the person who uses the system must be aware of and sign off on to allow the person to actually be able to update/install software. This process is a contract which ensures that the owner is aware of all changes and risks of which their system will be vulnerable to, and wipes all liablility from the actual person doing the installation.
This is presented as a form like the terms and conditions you see on software like iTunes, so a long list of items which will be either changed or at risk of accedental corruption/deletion by the process. The owner then must consent to these changes and get multiple updates at different stages of the process so as they know that what they have signed off and allowed for is actually getting done.
Thursday, 19 July 2012
Monday, 16 July 2012
Friday, 6 July 2012
Planned Software Update
I know an owner of a internet based sales business run from his home. He wants to be a completely online store, so will need a good piece of antivirus software in order to protect his business from malware whilst it is operating on the internet.
After doing some research i have narrowed the software down to 3 options:
Due to this i have selected AVG, as it is commonly used, reliable, frequently updated, and free. This means that He will not need to pay out for the software, and it will keep on top of all the different and sophisticated types of malware out there.
In order for the installation to go smoothly, with none of the businesses data being lost or corrupted, i would recommend a protocol for the system to undergo before any software is installed/upgraded. The protocol will be as follows:
If at any point there is a problem detected by the before mentioned protocol, then there is a seperate system that must be followed to minimise damage to data and data loss.
After doing some research i have narrowed the software down to 3 options:
- AVG
- Norton
- McAfee
Due to this i have selected AVG, as it is commonly used, reliable, frequently updated, and free. This means that He will not need to pay out for the software, and it will keep on top of all the different and sophisticated types of malware out there.
In order for the installation to go smoothly, with none of the businesses data being lost or corrupted, i would recommend a protocol for the system to undergo before any software is installed/upgraded. The protocol will be as follows:
- Buy one or multiple hard drives or invest in a backup server.
- Store all information which you do not want lost/corrupted on these hard drives
- Install the new software onto a closed system and immediately sweep the system for bugs/malware
- Once this is done, run for one hour to ensure no drastic changes are made
- Run the system for a trial period with no important/real data to ensure everything is running properly and without fault (maybe for 2-3 weeks)
- After this, undergo an assessment on the system, and ensure that there has been no anomalies such as data loss, information leeks etc.
- Reintroduce important data into the real system, back up new system.
If at any point there is a problem detected by the before mentioned protocol, then there is a seperate system that must be followed to minimise damage to data and data loss.
- First, ensure that you know where the software files are saved
- Now backup the current version of the system
- Then run the uninstallation software
- Now ensure that all of the files from the software have been removed
- Scan all data to ensure it has not been altered in any way
Subscribe to:
Comments (Atom)