Five Steps for a Victorious Windows 7 Migration - Slide 4

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6
Next Brief those in charge-4 Next

Brief those in charge

Make sure you have reporting processes/tools in place to report on progress and ROI. This starts with providing a clear picture of incompatible hardware and software to secure funding for necessary updates. And once deployment starts, make sure you have the ability to generate automatic reports on how many machines and users have been converted, roadblocks or failures encountered, and how the project is tracking against the planned timeline.

Umesh Shah of Numara Software gave us this helpful rundown of steps to prepare for the move to Windows 7. (You can check out Shah's full column on the issue here.)

If you’re planning to move to Windows 7 before 2012, questions you should be asking yourself now are:

  • How will we identify which systems can be upgraded and which cannot, and how will this impact our budget?
  • What do we need to do to prepare targeted systems and users for the migration?
  • How will we create a plan that is both measurable and attainable and regularly report on progress to executives?
  • How will we maintain user productivity during the migration?
  • What is our plan for ensuring a successful migration?
  • How will we prepare for unforeseen issues following the migration?
You should also keep up on our ongoing coverage of issues related to Windows 7. Be sure to read:
 

Related Topics : Thin Clients

 
More Slideshows

hurricanes How Communications, Preparation and Willingness to Help Were Keys in Hurricane Crises

Entrepreneurial thinking, innovation and selflessness can make things better during crises. Here is a look at how organizations reacted and telecommunications products helped during recent hurricane crises. ...  More >>

PAM PAM Solutions: Critical to Securing Privileged Access

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution. ...  More >>

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.