When mobile
Office information is available through portable computers and hand held devices. Those spending much of the time out of the office can manage data through them. Laptops are more expensive than desktops. The data is available through the Internet. The internet support e-mail and peer-to-peer networks. For data in the IT system to be available through the Internet, the systems must be up to standards. Standards are the strategic issue. This includes securing the data against unauthorized access.
The business IT system includes all computer related technology in the office, including laptops and handheld devices if they carry office data. The devices have only the necessary functionality to allow effective management of information. The system should maintain expansion capabilities. The cost of a portable device is 20 to 30% higher compared with a desktop of similar specifications (Barua, Kriebel, & Mukhopadhyay, 1995). The laptops are mobile, which is preferable if the employees travel a lot. The portable device must connect to the server directly to ensure the work is saved only in the server and not the portable device. In case the business has no mobile employees or has a policy of leaving office work at the office, connection to the Internet is unnecessary. The business should acquire a dedicated the computers in the business premises. If the computers in business network are five or less, there is no need for a dedicated server to network them.
IT system security
Business information in the IT system is valuable to the business. It includes financial and customer information. Other than steal the business information, hackers can cause major disruptions to the business. To safe guard against this install security software that guards against viruses and hackers. An all in one security software offers all the protection the business needs. Alternatively, purchase protection against viruses, hackers, and spyware separately. A firewall is important if the business server is connected to the Internet. The firewall application is in each computer in the network. The business may use a hardware firewall to secure the local network and the data. The business should have a functioning backup system. Barua, Kriebel, & Mukhopadhyay (1995), insists that the business data in the local server should be backed up regularly in a safe location. The backup location should be away from heat, moisture, or magnetism. The business portable devices must have password protection to ensure the data is available only to the authorized user. Avoid saving sensitive data in portable devices.
A budget
Choose network components that meet the business needs. The vendors will sell almost anything. Ensure the devices in the network meet the needs of the business. Purchase cheap computers with low processing capacity, if the business requires only word processing capability. This is because such programs have low memory use. According to Barua, Kriebel, & Mukhopadhyay (1995), computers with high processing capabilities are necessary if the computer is used directly in the production of the product or service. These include businesses, such as printing, music, and gaming industries. Consider the specific components like keyboards, screens, and mice, how they suit the employees. Ensure they are comfortable and easy to use. Only purchase a networked route if it is necessary in the business. Internet connection gets the business online. The business has increased opportunities through the ability of marketing online. The network may also require additional security measures. A telephone line connection to the Internet is cheap and fast. If the business uses the Internet to a get extent other connections are available, which provide faster, and more reliable connections. When purchasing the IT system, consider resellers. Shop around to find a shop offering a suite that fit the business requirements. The prices should also be competitive.
Based on the needs of the business include all the devices the business needs. The network should be capable of expanding. If the budget is limiting only buy the core components of the IT system. Developing an IT system may take considerable time, the best option is to have an elaborate plan and work the list of items by order of importance. Some extras like webcams and headsets make communication within the employees cheap. The IT system must have support. Most hardware comes with a years warranty. Some companies allow upgrade of warranty to guarantee rapid response in case of a system failure. The company sends an engineer within an hour after reporting the failure. In case the system is unredeemable within a few hours, the company offers another system to keep business running.
To get the most out of the IT system the right software for the business is paramount. Most computers come with Microsoft windows pre-installed. Purchasing a package like the professional version has some benefits for the business. The employees may be familiar with the program; this reduces the necessity for training the employees. If the IT system includes a server, buy software that allows users to perform common tasks. Some of the programs and software may be available free. Explore this option but also consider the sensitivity of the data involved. Other task specific programs make the running of the business easier and more efficient. Some programs can predict the buying and manufacturing needs of the business. This helps in the decision-making and increase the customer satisfaction. Purchase only what the business needs (2004 business technology solutions award final four, 2004).
Conclusion
The IT system for the business uses link layer Transmission Control Protocol (TCP) for inter-computer communication if there is no need for the Internet. The Internet layer of the TCP is only necessary if the business requires Internet to operate effectively. Although the Internet provides a process-to-process function, many risks come with Internet connection. To safe guard against data theft and sabotage, the business must use security software, firewall, and hardware firewall. These applications monitor the flow of information and restrict access to ensure only authorized access. Portable devices should only be part of the IT system if it is necessary. The employees should only work on the original file saved in the server. no saving the data in any other location except for backup purposes. The data backup location should be secure, free from heat, moisture, and magnetism.
Barua, A., Kriebel, C. H., & Mukhopadhyay, T. (1995). Information Technologies and Business Value: An Analytic and Empirical Investigation. Information Systems Research, 6(1), 3.
2004 business technology solutions award final four. (2004). ELT, 16(5), 6. Retrieved from http://search.proquest.com/docview/202678103?accountid=458
With the free school education in place in kenya, it emerged that a high number of turkana county children did not go to school for lack of food. A group of students from this region resolved to support a food program through a donation page that would offer free essay resources to university students. Touched with this story, we ask for your support to show that poor turkana child that we care for their education and a better future
Subscribe to:
Post Comments (Atom)
Leadership Trends in Common Wealth Bank
Overview of Common Wealth Bank of Australia Commonwealth bank of Australia is one out of four largest integrated financial institutions. T...
-
Introduction SAP an acronym for Systems, Applications, and Products in Data Processing, refers to software that has wide range of applicat...
-
Introduction The rise in globalization has led to the diversification of workforce. With the concept of employee diversification, people f...
-
Overview of Common Wealth Bank of Australia Commonwealth bank of Australia is one out of four largest integrated financial institutions. T...
No comments:
Post a Comment