Premium Essay

Requirements for the Corporate Computing Function

In:

Submitted By richards2985
Words 420
Pages 2
Requirements For The Corporate Computing Function
Meeting information requirements of management is in the top 9 points because managers require timely, accurate information to make organizational decisions. The CIO is looking to ensure business processes are optimal, ensure compliance regulations are adhered to, and to improve upon how data is collected, stored, and used (Robertson, 2005). A second assumption is the CIO is looking to educate other managers on the pros and cons of both technologies, then solicit their inputs as to which is better suited for the company to implement.
The initial rollout phase should be implemented as follows: First, contain the capital and operating cost for computing services. These services can be costly so computing cost must aligned with an organization’s business plans. This leaves management with the task of determining which computing services are feasible. If yes, then this service becomes a part of the budget (Strassman, 1998). Next identify which units within the organization have a legitimate computing need. Although this isn’t an easy task, organizations can survive with less. Consider replacing un-needed workstations with smaller servers. They’re easier to maintain and require lesser IT personnel to administrate them (Burrows and Green, 2001). Finally, provide computing services in reliable manner by educating workers on the capabilities and software applications that are included. Have a trained professional onsite to answer and assist in solving hardware and software issues.
A mission statement that addresses security is critical because if an organization’s data is comprised, it has a negative impact in the public’s eye. Trust is lost, and it may take years to regain that trust. I believe some security controls are loosened because some believe it reduces the effectiveness of employees to get their

Similar Documents

Premium Essay

Requirements for the Corporate Computing Function

...Assignment 2: Requirements for the Corporate Computing Function Student Name Dr Abdel Ismail CIS 505: Communication Technologies April 28, 2013 Meeting the Information Requirements of Management From the Requirements for the Corporate Computing Function, the fifth computing facility fulfillment point reads, “Meet information requirements of management” (Stallings, 2009, p. 58). Stated in another way, this Chief Information Officer’s (CIO) mission statement’s component implies that company information can be utilized by management for a great deal of things. While the security of all company-owned data is immensely important to the success of the organization, some of the information carries significant value when used by management in order to allow the company to make better informed decisions to keep the company competitive in today’s market and to comply with the organization’s legal responsibilities. Today’s markets are vastly competitive. “To succeed in multi-channel, high-speed environments, organizations need to leverage the data they have at their disposal. Organizations today have access to almost unlimited amounts of data - sales, demographics, economic trends, competitive data, consumer behavior, efficiency measures, financial calculations, etc” (Kennerley, 2008, p. 4). Understanding the company’s data metrics is the job of the management tiers of the organization so that better decisions can be made for the direction of the company as a whole...

Words: 1245 - Pages: 5

Premium Essay

Dontbefoled

...CIS 505 Business Data Communications Professor Dr. ED. Lindoo Strayer University Requirements for the Corporate Computing Function By Zena Shabazz The Corporate Computing Function, are needs that the facility must fulfill. The fifth point would be in the 9 point list because it would be a critical aspect of the Corporate Computing Function. The information requirement would implement the intelligence or the knowledge that is needed to support the actions or the decisions of the company. The information is absorbed by human beings. Information requirements dictate data and the processing specifications. I believe that if the information requirements are not correct that whatever follows will not be correct. There are needs that must be fulfilled by every company who uses the requirements for the corporate computing function, a case can clearly be made that requirements 1,3,7,8, and 9 can be satisfied with a distributed arrangement of low-cost servers, workstations, and personal computers. Widespread use of small computers can provide highly individualistic service to all the departments needing computing, allow users to establish and maintain autonomy in their operations using their own equipment, and provide users with hands-on opportunity to enjoy computing use while improving departmental productivity. Two aspects of the needs of users demonstrate the truth of the preceding statement: the need for new applications and the need for short response time....

Words: 911 - Pages: 4

Premium Essay

Cis 505 Wk 3 Assignment 2 Requirements for the Corporate

...CIS 505 WK 3 ASSIGNMENT 2 REQUIREMENTS FOR THE CORPORATE To purchase this visit here: http://www.activitymode.com/product/cis-505-wk-3-assignment-2-requirements-for-the-corporate/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 505 WK 3 ASSIGNMENT 2 REQUIREMENTS FOR THE CORPORATE CIS 505 WK 3 Assignment 2 - Requirements for the Corporate Computing Function Your new corporate CIO has devised a nine-point mission statement for the company. As one of the operations managers in the department, you have received a memo on the new policy and an associated task. The CIO wants to address the new strategy in a three-phase rollout plan and wants your feedback on LAN and MAN technology. Refer to Table 3.1 in Chapter 3 of the textbook for the nine points of the mission statement. Write a three to four (3-4) page paper in which you: 1.From Table 3.1, speculate why the fifth point, “Meet information requirements of management”, is in the CIO’s list of nine (9) points. 2.Imagine only three (3) points are to be rolled out in the first phase. Evaluate each point to determine the most important three (3) for the initial rollout phase. 3.Recommend one (1) additional point the CIO should include in order to ensure the topic of security is addressed in the mission statement. Explain your rationale for the inclusion. 4.Use at least four (4) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these...

Words: 725 - Pages: 3

Premium Essay

The Benefits of Cloud Computing

...Benefits and Risks of Corporate Cloud Computing To compete in the competitive world of business entrepreneurs, business owners, and investors alike must think outside the box. There is no secret with today’s economy and all the hype surrounding government incentives that a major fact to doing business on a global scale is an efficiency information system. Information systems is define as interrelated components working together to collect, process, store, and disseminate information to support decision-making, coordination, control, analysis, and visualization in an organization. (Laudon G-7) This is one of the largest burdens face by corporate America. How to overcome the costs and obstacles which confronts companies seeking to break ground into new industries with adequate tools to accomplish their business goals can seem insurmountable. The Cloud’s computing utilities enable a nimble start up to compete with the capacity of established competitors’ captive data centers. Cloud programming models promise to democratize the web, enabling end user application development that supports enterprise and even Internet scale applications. (D. Thomas) Therefore, with the ever changing rate of new technology development corporations with small to medium infrastructure requirements have turned to cloud computing. With lower investment, training, planning and hardware requirements businesses have seemingly reap the benefits of cloud computing. However, do the associated...

Words: 2203 - Pages: 9

Premium Essay

Implementing Corporate Computing

...heading: Implementing Corporate Computing According to our text “Meeting information requirement of management” is a key factor that makes Distributed Data Processing (DDP) possible. The information requirements of management require centralized organization and access of most company resources. Companies prefer to spend less but get more power and performance for their investment. Management requires newer application with short response times while increasing overall productivity. (Business Data Communications, Sixth Edition, 2009, p. 58). The corporation will have to decide whether they require a LAN, Local Area Network, if the corporation only needs their network to share resources within a building, (Local Area Network Technologies, 2012). The corporation may want to use MAN, Metropolitan Area Network, if they have multiple building that need to share a network. An example would be a college campus. (Metropolitan Area Network, 2012). The information requirement of management leads us to the three points of the initial roll out phase and network security. The points of initial roll out are plan, analyze, and implementation. (eWeek, 2004). The first point of initial roll out is plan. The planning process is a very critical part of the roll out process. During the planning point, this is where the developers have to take in consideration the growth and acceleration of the computer industry and how this growth effects the computing and information service...

Words: 757 - Pages: 4

Premium Essay

Global Security Policy - Week 5 - Cmgt-400

...countries across the globe are personnel, cyber threats, and cloud computing. Managing Human Resources Employees of global organizations and mobile businesses have great challenges while trying to protect sensitive information. Cisco commissioned a third-party market research firm, InsightExpress to conduct a study of IT professionals around the world generating 2000 respondents of end users and IT professionals. They found that employees can put personal and corporate data at risk because of the following (Cisco, 2008): 1. Unauthorized application usage possibly caused company data loss 2. Misuse of corporate computers by sharing with other employees without supervision 3. Unauthorized physical and network access 4. Employees transferring files from work and personal computers when working from home. 5. Employees sharing passwords with co-workers. The organizational structure involves balanced leadership and board diversity. Even though the offices are in multiple locations, the company's structure must allow for local offices to make important decisions to promote innovations that can eventually expand globally. Human resource models that use shared service platforms can help a company remain globally efficient. Establishing a shared service center can include a redesign of HR processes for consistency and local relevance. They can quickly be adapted to meet local market requirements. Diageo, a...

Words: 948 - Pages: 4

Premium Essay

1 Vmware Whitepaper - Business Agility and the True Economics of Cloud Computing

...Business Agility and the True Economics of Cloud Computing B u s i n e s s W H iTe PA P e R Business Agility and the True Economics of Cloud Computing Executive Summary New groundbreaking global survey findings demonstrate the true value of cloud computing to the business. While it is understood in the industry that cloud computing provides clear cost benefits, CIOs are having difficulty getting a true fix on the business value that cloud might offer beyond cost reduction. These survey results reveal a direct link between cloud computing and business agility—how business outcomes are associated with agility, the role of IT for agile companies and the importance of cloud computing to business leaders. value to the enterprise. It shows that the hype around cloud computing is maturing into facts about what cloud can really deliver to both IT and the business. Game-changing CIOs think business transformation first, then how technology enables it. They are the ones strategizing with their CEOs and other business leaders to look beyond simple cost calculations to the business agility that cloud computing can enable. Defining Business Agility Business agility is the ability of a business to adapt rapidly and cost-efficiently in response to changes in the business environment. According to McKinsey & Company, the leading global management consulting firm, the benefits of agility include faster revenue growth, greater and more lasting cost reduction, and more effective...

Words: 2949 - Pages: 12

Premium Essay

Cloud Computing

...Cloud computing A collection of working papers Thomas B Winans John Seely Brown Cloud Computing frequently is taken to be a term that simply renames common technologies and techniques that we have come to know in IT. It may be interpreted to mean data center hosting and then subsequently dismissed without catching the improvements to hosting called utility computing that permit near realtime, policy-based control of computing resources. Or it may be interpreted to mean only data center hosting rather than understood to be the significant shift in Internet application architecture that it is. Perhaps it is the name. Certainly it is more nebulous than mnemonic, if you’ll pardon the poor pun. We happen to think so too. We’d rather use the term service grid, frankly, but that name also has its problems. The fact is that cloud and service grid computing are paradigmatically different from their common interpretations, and their use can shed light on how internet architectures are constructed and managed. Cloud computing represents a different way to architect and remotely manage computing resources. One has only to establish an account with Microsoft or Amazon or Google to begin building and deploying application systems into a cloud. These systems can be, but certainly are not restricted to being, simplistic. They can be web applications that require only http services. They might require a relational database. They might require web service infrastructure and message queues...

Words: 20471 - Pages: 82

Premium Essay

Layered Security in Plant Control Environments

...Layered Security in Plant Control Environments Ken Miller Senior Consultant Ensuren Corporation KEYWORDS Plant Controls, Layered Security, Access Control, Computing Environment, Examination, Detection, Prevention, Encryption, Compartmentalization ABSTRACT Process control vendors are migrating their plant control technologies to more open network and operating environments such as Unix, Linux, Windows, Ethernet, and the Internet Protocol. Migrating plant controls to open network and operating environments exposes all layers of the computing environment to unauthorized access. Layered security can be used to enhance the level of security for any computing environment. Layered security incorporates multiple security technologies in each computing layer to provide resistance to unauthorized intrusion, while reducing the risk of failure from a single technology. Layered security requires acceptance of a model, development of an access control plan, compartmentalization of the network, and implementation of core security products that address examination, detection, prevention, and encryption. Layered security is considered a “best practice” in any computing environment, and should be widely used in critical control environments. INTRODUCTION Plant control environments have traditionally been built on proprietary technology. This proprietary technology provided a reasonable level of security from unauthorized access due to its “closed” nature, and lack of connection...

Words: 2711 - Pages: 11

Premium Essay

Essay

...Editor’s note: More and more, organizations around the globe recognize their responsibility to protect and sustain the environment. This article describes the benefits of and first steps toward a green computing strategy. Read “HP and the Environment” to learn what HP is doing to reduce its environmental footprint. Faced with the stark realities of global warming and rising energy costs, government agencies and private firms worldwide are examining ways to protect the environment. To address what is increasingly being perceived as a crisis, there is a growing global movement to implement more environmentally friendly computing “Green computing” is the name attached to this movement, which represents an environmentally responsible way to reduce power and environmental waste. Toward this goal, the U.S. Environmental Protection Agency’s Energy Star program has developed compliance requirements for computer equipment. The U.S. House of Representatives Resolution 5646, passed in July 2006, calls for the EPA’s Energy Star program to research: •The amount of power consumed by corporate and federal data centers •Industry measures to develop energy-efficient servers •Possible incentives to convince businesses to use energy-saving technologies In Europe, government agencies have set up a number of environmental regulations addressing waste management, recycling, disposal of certain types of waste, industrial emissions and pollution control. The European Union is also setting up a system...

Words: 1236 - Pages: 5

Premium Essay

Cloud

...Internal Cloud | | American Military UniversityISSC 340Professor Wang | | | George L Ragland | 11/19/2015 | | Introduction Cloud computing is a Web-Based processing, that allows user to share software , information, and resources provided to computers and other personal devices such as Smartphone's via the Internet. By utilizing the cloud, users have the capability to provide computing resources dynamically and corporate businesses can essentially change their Information Technology plan. As the technology grows, Cloud computing introduces new ways to conduct business but also bring in some new challenges, specifically when planning the privacy and security of the information stored within the cloud servers. This technology also uses expandable computer resources and offers them as to users using Internet as a medium. Allowing companies to share resources and among vast number of consumers cuts a large amount of costs in ownership of Information Technology. In today's business world many companies are shifting to Cloud Services which improves the scalability and also makes the companies have a larger reach of clients. Private clouds are a type of cloud computing that delivers some of the advantages of public cloud, including self-service and scalability, but through a user built architecture. A private cloud is dedicated to a single organization unlike public clouds, which deliver services to multiple organizations. Also, private cloud offers protection...

Words: 894 - Pages: 4

Premium Essay

Information Technlogy

...Typically, IT is used in the context of enterprise operations as opposed to personal or entertainment technologies. The commercial use of IT encompasses both computer technology and telephony. The term information technology was coined by the Harvard Business Review, in order to make a distinction between purpose-built machines designed to perform a limited scope of functions and general-purpose computing machines that could be programmed for various tasks. As the IT industry evolved from the mid-20th century, it encompassed transistors and integrated circuits -- computing capability advanced while device cost and energy consumption fell lower, a cycle that continues today when new technologies emerge. IT software and hardware IT includes several layers of physical equipment (hardware), virtualization and management or automation tools, operating systems and applications (software) used to perform essential functions. User devices, peripherals and software, such as laptops, smartphones or even recording equipment, can be included in the IT domain. IT can also refer to the architectures, methodologies and regulations governing the use and storage of data. Business applications include databases like SQL Server, transactional systems such as real-time order entry, email servers like Exchange, Web servers like Apache, customer relationship management and enterprise resource planning systems. These applications execute programmed instructions to manipulate, consolidate...

Words: 338 - Pages: 2

Free Essay

Enterprise Cloud Computing

...Enterprise Cloud Computing: The future of enterprise networking Justin Winter American Military University The term “cloud computing” is one of many new buzzwords in the technology world. Unfortunately as buzzwords go they tend to become obsequious and as a result of this obsequiousness, the term “cloud computing” is so broad that it can encompass anything from online storage products like Dropbox to entire online enterprise solutions provided by Amazon Web Services. While the term cloud computing may be obsequious, there is a reason IBM recently invested $3 billion to further research and development to benefit cloud computing and big data. ("IT Digest") Enterprise cloud networking is a relatively new technology, yet it is already available in multiple favors. For instance Amazon Web Services offers complete cloud solutions for anything from personal website and database solutions to full corporate solutions that range from simple storage solutions to user defined security groups. On the other hand, components provided by Cisco's Meraki division, offer complete network management as an easily accessible web based tool. The National Institute of Standards and Technology (NIST), which is a part of the U.S. Department of Commerce defines Cloud Computing as “a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned...

Words: 2967 - Pages: 12

Premium Essay

Cloud Computing

...summary Time-to-market, more flexible support for business strategies by IT, and faster response time to competitive conditions are combining to accelerate cloud computing adoption today. This report aims to learn the major aspects of IT sales especially in cloud computing, which involves understanding the technologies involved in the functioning of an IT business model. For this purpose, various articles were referred and few corporate visits were done within the span of two-week of the SLIP. The report discusses various information about overview of top IT companies, types of cloud, virtualization, Saas, Paas, DRaas, Capex, Opex, Marketing and pricing strategies involved in cloud solutions. Our professional mentor was from Zenith Infotech. Zenith Infotech is an international company that specializes in delivering innovative business continuity and cloud computing solutions for IT service providers. The report further discusses Zenith’s products,learnings imbibed from the programme and the future scope of cloud computing in detail. Literature Review 1.Identifying Cloud Computing Security Risks (February 2011) -Paul Wooley Tyco Electronics Abstract Cloud computing services including Infrastructure as a Service promise potential cost savings for businesses by offering remote, scalable computing resources. However attractive these services are, they pose significant security risks to customer applications and data beyond what is expected using traditional on-premises...

Words: 3858 - Pages: 16

Premium Essay

Human Resoucre

...Implementation of information systems……………….97 9. Managing knowledge……………………………………………….106 10. Decision support systems………………………………………….129 THE STRUCTURE OF THIS STUDY MODULE The Module has margin icons that show the student the objectives, activities, in-text questions, feedback, further reading, key words and terms, stop and reflex signs. Chapter One covers the importance of Information Systems in running today’s organizations. Chapter Two looks at the strategic role played by information systems in today’s organizations. Chapter Three focuses on the impact of Information Systems on the organizational structure and how information systems help managers improve their decision making. Chapter Four looks at the hardware and software requirements for organizations to be able to implement information systems structures Chapter Five looks at the traditional file environments and the rise of the database management systems. Chapter 6 shows looks at networks and how they make information systems a reality. Chapter 7 focuses on Systems Development in the creation of Information Systems in today’s organizations. Chapter 8 focuses on how information systems can be implemented as well as the factors that contribute to success and failure in trying to implement information systems. Chapter 9...

Words: 43854 - Pages: 176