WOW !! MUCH LOVE ! SO WORLD PEACE !
Fond bitcoin pour l'amélioration du site: 1memzGeKS7CB3ECNkzSn2qHwxU6NZoJ8o
  Dogecoin (tips/pourboires): DCLoo9Dd4qECqpMLurdgGnaoqbftj16Nvp


Home | Publier un mémoire | Une page au hasard

 > 

Design , implementation and management of secured lan

( Télécharger le fichier original )
par Eliud Ir. Eliud Aganze
Jomokenyatta university of agriculture and technology - B.sc information technology 2014
  

précédent sommaire suivant

Bitcoin is a swarm of cyber hornets serving the goddess of wisdom, feeding on the fire of truth, exponentially growing ever smarter, faster, and stronger behind a wall of encrypted energy

6.5 Changeover Technique Used

After thorough evaluation and scrutiny, the changeover technique that I decided to use was the parallel running technique. This is because:

· It allows for ease of implementation.

· End users are more likely to respond positively and offer less resistance to the new system.

· If there are initial problems with the new system then the old one can still be used as the problems are getting fixed.

· It is easy to train staff by letting them learn new skills on the parallel system.

· It is easy to evaluate because the new and old systems are both running.

6.6 Chosen strategy

This the type of implementation used our new network system since there is another system running currently. The 2 system will run together

This the type of implementation used our network management system since there was not help desk system. It will take over the manual system.

précédent sommaire suivant






Bitcoin is a swarm of cyber hornets serving the goddess of wisdom, feeding on the fire of truth, exponentially growing ever smarter, faster, and stronger behind a wall of encrypted energy








"Des chercheurs qui cherchent on en trouve, des chercheurs qui trouvent, on en cherche !"   Charles de Gaulle