Premium Essay

Ugrade Email

In:

Submitted By mekell3302
Words 520
Pages 3
TO: Valerie Bernier, Dentist
RE: Office Upgrade
Thank you for allowing me the opportunity to act as your consultant, I would be more than willing to help you with your upgrade. The information below will describe the best options for your office.
I would upgrade the operating system to Windows 7 Professional, since your network is built around a Windows domain; this is the least expensive Windows 7 edition that can join a domain. This edition also includes the capability to allow Remote Desktop access to your computer from the network.
The Windows backup program offers the same set of features in all editions, however Professional edition adds the option to store backed-up files and system images to a network location instead of limiting you to local hard drives and removable media.
Without actually having the programs running you will use an average 40% of 4GB of memory if you use the user interface enchantments.
Microsoft requirement are:
1 gigahertz (GHz) or faster 32-bit (x86) or 64-bit (x64) processor
1 gigabyte (GB) RAM (32-bit) or 2 GB RAM (64-bit)

16 GB available hard disk space (32-bit) or 20 GB (64-bit)
DirectX 9 graphics device with WDDM 1.0 or higher driver
BitLocker helps keep everything from documents to passwords safer by encrypting the entire drive that Windows and your data reside on. Once BitLocker is turned on any file you save on that drive is encrypted automatically this requires Trusted Platform Module (TPM) 1.2.
BitLocker To-Go, a new feature of Windows 7, gives the lockdown treatment to easily misplaced portable storage devices like USB flash drives and external hard drives. BitLocker To-Go requires a USB flash drive. (Optional feature)
Some programs might require a graphics card compatible with DirectX 10 or higher for optimal performance.
There may be additional requirements for use with certain features:
Internet

Similar Documents

Free Essay

You Decide 3

...You Decide Scenario: Week 3 Detecting and preventing insider threats is its own discipline, with its own dynamics. If you put these countermeasures in place, you can reduce the threat dramatically. First, you can use an IP packet-filtering router. This type of router permits or denies the packet to either enter or leave the network through the interface on the basis of the protocol, IP address, and the port number. The protocol may be TCP, UDP, HTTP, SMTP, or FTP. The IP address under consideration would be both the source and the destination addresses of the nodes. The port numbers would correspond to the well-know port numbers (Vacca, 2009). Packet filtering lets you control data transfer based on the address the data is, the address the data is going to, and the session and application protocols being used to transfer data. The main advantage of packet filtering is leverage. It allows you to provide, in a single place, particular protections for an entire network. Consider the Telnet service. If you disallow Telnet by turning off the Telnet server on all your hosts, you still have to worry about someone in your organization installing a new machine (or reinstalling an old one) with the Telnet server turned on. On the other hand if Telnet is not allowed by your filtering router, such a new machine would be protected right from the start, regardless of whether or not its Telnet server was actually running. Another advantage of a packet filtering router is that...

Words: 622 - Pages: 3