Upload
ben-dahl
View
219
Download
0
Embed Size (px)
Citation preview
7/27/2019 Vantage Point Computing Progress Report
http://slidepdf.com/reader/full/vantage-point-computing-progress-report 1/2
Vantage Point Computing 202 69th Street, Darien, IL, 60561
(630)887.8980
Vantage Point Computing Progress Report Page 1
MEMORANDUM
Date: May 18, 2009
To: Professor Amy Hornat-Kaval
From: Ben Dahl, President
Benny Leung, Chief Technology Officer
Tony James, Chief Network Security Officer
Subject: Security Manual Progress Report
1) ACCOMPLISHED
a. Project Proposal Information• First topic (Penetration testing) rejected due to time and scope constraints
• Second topic (Wireless Security) accepted and approved
b. Audience Analysis Information
• Address the target audience for the Security Manual
• Select a medium for the best results
• Vantage Point Computing chose Security Manual
• Vantage Point Computing explored digital option
• Decided client will need to have basic computer knowledge
• Address the need for the Security Manual
c. Progress Report Information
• Document what has been created.
• Document all revisions
• Verify all issues have been resolved before presentation
• Update Professor with progress of project
d. Usability Testing of Manual
• 90% of test subjects found technical manual useful
• Subjects found pictures helpful
• 20% of subjects wanted an index page
• Subjects would like a Table of Contents
• Information about specific settings was requested
• Page numbers need to be revised e. Security Manual
• First draft finished (5/05/2009)
• First revision (5/07/2009)
• Second revision after usability testing (5/14/09)
• Final Security Manual (6/01/09)
• Final presentation (6/02/09)
7/27/2019 Vantage Point Computing Progress Report
http://slidepdf.com/reader/full/vantage-point-computing-progress-report 2/2
Vantage Point Computing 202 69th Street, Darien, IL, 60561
(630)887.8980
Vantage Point Computing Progress Report Page 2
2) PROJECTS AIM AND GOAL
f. Proposal Revision
• First project proposal rejected due to time constraint and scope.
• Focused on a specific router for security set up. Too many routers are available, so we
chose the most common.
• Our focus is to have the client set up their own secured wireless network.
g. Audience Analysis
• Minor changes to specify what was required of the client.
• The target is to small business owners in their mid 20’s - 40’s.
h. Usability Test
• Positive feedback with Usability Testing. Most test subjects found manual complete and
informative.
• Our aim is to have clients with little computer knowledge set up their own secure
wireless network.
• Add index and reference page.
• Our goal is 100% approval from all test subjects.
i. Technical Manual
• First draft of manual had too much white space.
• Revised format to be smaller and more convenient.
• Second draft included pictures to make the manual easier to follow.
• Final draft includes Table of Contents and Reference.
• Our goal is for the manual to be the only reference for router setup.
3) DEPLOYMENT DAY
j. Usability Test
• More test subjects needed for unbiased results.
• All suggestions considered
• Usability Test completion (5/14/09)
k. Security Manual
• Added Table of Contents and Reference (5/15/09)
• Revisions completed (5/31/09) l. Completion Dates
• Usability Test Information completed by two group members (5/14/09)
• Completed Index and reference page for Security Manual (5/15/09)
• Group meeting to review material for errors.
• All revisions completed (6/1/09)
• Final Security Manual and presentation (6/2/09)