Choose network components that meet the business needs. The vendors will sell almost anything. Ensure the devices in the network meet the needs of the business. Purchase cheap computers with lower processing capacity, if the business requires only word processing capability. This is because such programs have a low memory use. According to Barua, Kriebel, & Mukhopadhyay (1995), computers with high processing capabilities are necessary if the computer is used directly in the production of the product or service. These include businesses, such as printing, music, and gaming industries. Consider the specific components like keyboards, screens, and mice, how they suit the employees. Ensure they are comfortable and easy to use. Only purchase a networked route if it is necessary in the business. Internet connection gets the business online. The business has increased opportunities through the ability of marketing online. The network may also require additional security measures. A telephone line connection to the Internet is cheap and fast. If the business uses the Internet to a greatt extent other connections are available, which provide faster, and more reliable connections. When purchasing the IT system, consider resellers. Shop around to find a shop offering a suite that fits the business requirements. The prices should also be competitive.
Based on the needs of the business include all the devices the business needs. The network should be capable of expanding. If the budget is limiting only buy the core components of the IT system. Developing an IT system may take considerable time, the best option is to have an elaborate plan and work the list of items in order of importance. Some extras like webcams and headsets make communication within the employees cheap. The IT system must have support. Most hardware comes with a years warranty. According to Issa-Salwe (2011), some companies allow upgrade of warranty to guarantee rapid response in case of a system failure. The company sends an engineer within an hour after reporting the failure. In case the system is unredeemable within a few hours, the company offers another system to keep the business running.
Office information is available through portable computers and handheld devices. Those spending much of the time mobile, include waiters and other attendants. Portable computers are more expensive than desktops. The data is available through the Internet. The internet supports e-mail and peer-to-peer networks. For data in the IT system to be available through the Internet, the systems must be up to standards. Standards are the strategic issue. This includes securing the data against unauthorized access. The business IT system includes all computer related technology in the office, including laptops and handheld devices if they carry office data. The devices have only the necessary functionality to allow effective management of information. The system should maintain expansion capabilities. The cost of a portable device is 20 to 30% higher compared with a desktop of similar specifications (Barua, Kriebel, & Mukhopadhyay, 1995).
The business may use a hardware firewall to secure the local network and the data. The business should have a functioning backup system. Barua, Kriebel, & Mukhopadhyay (1995), insists that the business data in the local server should be backed up regularly in a safe location. The backup location should be away from heat, moisture, or magnetism. The business portable devices must have password protection to ensure the data is available only to the authorized user. Avoid saving sensitive data on portable devices.
Software
To get the most out of the IT system the right software for the business is paramount. Most computers come with Microsoft windows pre-installed. Purchasing a package like the professional version has some benefits for the business. The employees may be familiar with the program; this reduces the necessity for training the employees. If the IT system includes a server, buy software that allows users to perform common tasks. Some of the programs and software may be available free. Explore this option but also consider the sensitivity of the data involved. Other task specific programs make the running of the business easier and more efficient. Some programs can predict the buying and manufacturing needs of the business. This helps in the decision-making and increase the customer satisfaction. Purchase only what the business needs (2004 business technology solutions award final four, 2004).
Business information in the IT system is valuable to the business. It includes financial and customer information. Other than stealing the business information, hackers can cause major disruptions to the business. To safeguard against this install security software that guards against viruses and hackers. An all in one security software offers all the protection the business needs. Alternatively, purchase protection against viruses, hackers, and spyware separately. A firewall is important if the business server is connected to the Internet. The firewall application is in each computer in the network (Issa-Salwe, 2011).
Conclusion
The IT system for the Whiskey Mikes Bar & Grill uses link layer Transmission Control Protocol (TCP) for inter-computer communication. this is important for the transmission of sensitive data. The Internet layer of the TCP is only handles advertismenets and receiving orders through the website and email. The sports channels are also provided by the Internet service provider. Although the Internet provides a process-to-process function, many risks come with an Internet connection. To safeguard against data theft and sabotage, the business must use security software, firewall, and a hardware firewall. These applications monitor the flow of information and restrict access to ensure only authorized access. Portable devices are part of the IT system for ordering purposes. The employees should only work on the original file saved in the server. No saving the data in any other location except for backup purposes. The data backup location should be secure, free from heat, moisture, and magnetism.
References
2004 business technology solutions award final four. (2004). ELT, 16(5), 6.
Barua, A., Kriebel, C. H., & Mukhopadhyay, T. (1995). Information Technologies and Business Value: An Analytic and Empirical Investigation. Information Systems Research, 6(1), 3.
Issa-Salwe, A. M. (2011). Setting up a Secure Information System Using Information Security Management. International Journal Of Research & Reviews In Computer Science, 2(1), 138-143.
No comments:
Post a Comment