Wednesday, May 6, 2020
Information System Project Management IT Infrastructure
Question: Discuss about the Information System Project Management for IT Infrastructure? Answer: IT infrastructure development The major IT infrastructure evolution stages are the enterprise computing era, the mainframe era, mobile and cloud computing era, the client server ear and the personal computing era. IT infrastructure helps the organization or individual to do a faster organizational operation (Henfridsson Bygstad, 2013). Yes, the Law of Mass Digital Storage or the Moores Law is creating the effect of the cloud and mobile computing by increasing the power of the device and reducing the cost of the devices or system (Wang Gai, 2014). Three different services of the cloud computing are cloud infrastructure service, cloud platform as a service, cloud software as a service. Amazon is the example of IT infrastructure as a service which was selling the IT infrastructure service. The user can store their data in Amazon IT infrastructure service. IBM is an example of the cloud platform as a service (Ferrer et al., 2012). They offer the smart application for the business. Google apps are the example of the cloud software as a service. They provide online business application. The uses of this services can access and maintain their application and software on the web. Pete uses many different types of platforms in his shop, those are the operating system, to operate a computer, excel sheet to maintain the seals record. Cloud platform as a service is the best computer service for Pete's PC shop. Pete maintains his shop record in an excel sheet. But this process is freezing and less secure. A new IT business system can help him to maintain his business properly. Cloud platform is the best option for Pete's PC shop. Yes, cloud computing will be used in this new IT business system. Cloud system helps Pete to main this business records in a cloud which can be easily accessible from anywhere. Pete can store his enterprise data in the cloud which is much safer process than excel sheet. Databases and Business Intelligence Difference between database and data warehouse The joining of the tables in the RDBMS is very easy. RDBMS delete the redundant data to save the database place, but in the data warehouse, all the data are stored for analysis purpose. The data warehouse take more place than a normal relational database management system (Shute et al., 2012). Business intelligence (BI) is an apparatuses and frameworks which are a key part of the strategic planning process. Database system helps the business organization to maintain their business information (Chen, et al., 2012). The business intelligence system this database system to maintain their business data. OODBMS is one type of database management system which helps to create a data as an object. This type of database support the object class, also support the class inheritance. In RDBMS (relational database management system) entity and tuples are used as an object, but an OODBMS directly use the object to specify the behavior of the database and instance is used in the OODBMS to provide more restrictive data (Shute et al., 2012). Networks, The Internet, the Web, and Security A computer network system is an arrangement of a computer associated with sharing data or information with each other. Other shared assets can incorporate a printer or a document server. The most common component of a computer network system is shared data, server, network hardware, network operating system (Simmons, 2014). BYOD system is used by most of the organization to minimize the data risk and consumer technology risk. And the cloud computing is used to provide to maintain the organizational data in a secure way. The Internet is a huge network system of a network which is the help to connect many computers, and the web is the simple network system which is mainly used to shear data. No, these two things are totally different from each other web is a part of the internet (Simmons, 2014). The main unique features of a wireless system are many different devices can connect to this wireless network which is not available on the wired network. In the wireless network. WiMax is the type of wireless network and similar as the Wifi. WiMax system is enormous and powerful then the WiFi network system. In the WiMax network system bars are not used in the frequency (Elhedhli Merrick, 2012). For mobile devices, websites must be responsive, and HTML 5 helps the developer to make a website responsive. Most of the mobile browser support the HTML5. Basic security is the firewall security system that an organization mostly used (Chen et al.., 2013). For the Company in Exhibit1: Figure 1: Network design (Source: Created by author) By using the cloud computing, this system can be smart. Yes, cloud computing will be used in this new IT business system. Cloud system helps Pete to main this business records in a cloud which can be easily accessible from anywhere. Pete can store his business data in the cloud which is much safer process than excel sheet (Dinh et al., 2013). Also, cloud computing system will help the user to connect with each other and also help the different stores to connect with each other. If a firewall system is used in the above-designed network system, then this system can be secure (Balmer et al., 2014). The firewall should be placed on every router. The firewall will protect the entire system from the hackers. IT architecture diagram Figure 2: IT Architecture Diagram (Source: Created by author) References Chen, E. Y., Tan, C. M., Kou, Y., Duan, Q., Wang, Z., Meirelles, G. V., ... Maayan, A. (2013). Enrichr: interactive and collaborative HTML5 gene list enrichment analysis tool. BMC bioinformatics, 14(1), 128. Chen, H., Chiang, R. H., Storey, V. C. (2012). Business Intelligence and Analytics: From Big Data to Big Impact. MIS quarterly, 36(4), 1165-1188. Dinh, H. T., Lee, C., Niyato, D., Wang, P. (2013). A survey of mobile cloud computing: architecture, applications, and approaches. Wireless communications and mobile computing, 13(18), 1587-1611. Ferrer, A. J., Hernndez, F., Tordsson, J., Elmroth, E., Ali-Eldin, A., Zsigri, C., ... Ziegler, W. (2012). OPTIMIS: A holistic approach to cloud service provisioning. Future Generation Computer Systems, 28(1), 66-77. Henfridsson, O., Bygstad, B. (2013). The Generative Mechanisms of Digital Infrastructure Evolution. Mis Quarterly, 37(3), 907-931. Shute, J., Oancea, M., Ellner, S., Handy, B., Rollins, E., Samwel, B., ... Littlefield, K. (2012, May). F1: the fault-tolerant distributed RDBMS supporting google's ad business. In Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data (pp. 777-778). ACM. Simmons, J. M. (2014). Optical network design and planning. Springer. Wang, L., Gai, S. (2014). The next generation mass storage devicesPhysical principles and current status. Contemporary Physics, 55(2), 75-93. Balmer, M. L., Slack, E., de Gottardi, A., Lawson, M. A., Hapfelmeier, S., Miele, L., ... Bernsmeier, C. (2014). The liver may act as a firewall mediating mutualism between the host and its gut commensal microbiota. Science translational medicine, 6(237), 237ra66-237ra66. Elhedhli, S., Merrick, R. (2012). Green supply chain network design to reduce carbon emissions. Transportation Research Part D: Transport and Environment, 17(5), 370-379.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.