Here’s how it works:
We come to your office and start things off with an initial meeting where we discuss briefly about AITS and what we do.
We then interview you and your team and talk all about your likes, dislikes, frustrations, hopes and dreams in terms of your technology.
Most of the time, if time permits, we like to have a walkthrough of the location to see the computers and networking environment. This also gives us a chance to talk to the users about their experience with the computers in their day-to-day workings.
We find many times the users have had frustrations or issues they have “lived with” for quite some time.
These issues cause slowdowns and loss of production and can many times be easily solved.
We collect information about the network such as computer configurations, software, and system usage.
Any company data or personal information is untouched.
We do not look at data, only at your system design and configuration.
Any information we obtain regarding your systems will be treated in a confidential manner.
After we complete our technical assessment we usually have a brief meeting to discuss any remaining questions anyone may have before we leave.
At our office we analyze the data we collected and produce a report of our findings.
A few days after our walkthrough and assessment, we meet with you to discuss our findings.
We will identify the strengths and weaknesses of your systems.
The results of our findings will be given to you in a comprehensive IT report.