Professional Documents
Culture Documents
1. Latency Proof
Latency is the delay that may happen in the communication of data over the network.
There are 2 types of latency:
There may be few ways as to what can be done to remove network latency. One of
them is provisioning servers with high-capacity ports.
With WAN optimization, you can be assured of better network management. With it,
you can prioritize the traffic and ensure that business critical applications get the
bandwidth they require. It not just lowers the traveling costs, it also increases the
productivity. Let’s take a look at some of the technologies which are used:
Traffic Shaping.
The traffic is prioritized, and bandwidth allocation is done.
Data Deduplication.
It eliminates the redundant data. In this instead of sending the actual data,
the references are sent
Data Compression.
It helps in contracting the size of data to limit bandwidth usage
Data Caching.
In this, frequently used data is hosted locally on a local server for faster
access.
The importance of WAN Optimization is more in the current business environment
where more and more companies are moving to cloud. There are two ways to
address this, first, purchase more bandwidth, and second, use what you have
already more efficiently.
5. Virtualization
Server virtualization is a technology which is in existence for a decade, but some still
consider this as something new. Any multimedia integration is easy, and it provides
efficiencies and capabilities which aren’t possible with a physical world. There are
many benefits of virtualization:
Energy Saving.
Virtualization can save you a lot of energy. This means cost reduction and
more saving and more budget to focus on other areas.
Faster Server Provisioning.
With server virtualization, the administrators are enabled to provide system
provisioning and deployment at a short notice.
6. Security
2nd Answer
Information systems are complex sets of interconnected information, data, and
processes. They are used in all aspects of human life, business, and industry.
The information system definition in technology is a broad term that refers to any
information system or tool that helps with the collection and use of data. Information
systems can be used to provide assistance in an organization, or they can be used
for personal gain.
Put simply, information systems are sets of technological methods and techniques
used to store, organize, manage, and retrieve information digitally. They take on
many forms such as computers, mobile devices, tablets, and software programs.
In technology, information systems are mainly used as a platform for information
gathering and processing. They can be hardware or software and use computer
systems to perform tasks like data storage or data analysis.
Primary IS:
Decision support systems are computer programs that analyse enormous amounts
of data and compile information that can be used in decision-making and to solve
problems.
These programs are used by businesses and other organizations to support
determinations, judgments, and courses of action.
They are informational applications, and unlike ordinary operations applications that
simply collect data, a decision support system collects, analyses, and synthesizes
data to create comprehensive information reports.
They may present the information graphically and they could include AI or an expert
system.
Decision support systems help humans make decisions much faster than we would
tend to on our own.
1. DSS Database
The database contains information from multiple sources. It can either be a small
database, a standalone system, or an enormous data warehouse, depending on the
organizational requirements.
3. Communication
Top management gets accurate data from the systems and are able to communicate
with each other clearly and make effective decisions.
4. Automation
It automates simple managerial decisions, allowing your staff to concentrate on
higher-level tasks.
5. Cost-effectiveness
The traditional method of organizing and processing data takes too much manpower.
Using a DSS takes fewer resources and even reduces the opportunity cost that
would arise due to the delay caused by the manual.
1. Speed
Decision support systems make it possible for users to take informed decisions
quickly.
3. Communication
Top management gets accurate data from the systems and are able to communicate
with each other clearly and make effective decisions.
4. Automation
It automates simple managerial decisions, allowing your staff to concentrate on
higher-level tasks.
5. Cost-effectiveness
The traditional method of organizing and processing data takes too much manpower.
Using a DSS takes fewer resources and even reduces the opportunity cost that
would arise due to the delay caused by the manual.
Secondary IS:
Personalized Analysis:
Built-in functions are used to examine problematic situations in EIS. With the help of
these functions, executives become capable to specify the data required for the
analysis and the format type (in which results are displayed) of results.
5) Navigation of Information:
This allows access of large amounts of data in a very short time span with accurate
results. Forward and backward path access, skipping screens while accessing a
selected part of the system are the examples of it.
3rd Answer
3a.
Bring your own device (BYOD) refers to the trend of employees using personal
devices to connect to their organizational networks and access work-related systems
and potentially sensitive or confidential data. Personal devices could include
smartphones, personal computers, tablets, or USB drives.
The policy should also address how the company will go about protecting the private
information that it comes into contact with when carrying out monitoring. Drafting a
BYOD policy does not give the company a ‘blank cheque’ to closely examine
everything in the device. The monitoring of the device has to be proportionate to the
stated reasons for the monitoring. For example, if the purpose of the monitoring is to
ensure that employees do not spend company time on personal matters, then
monitoring may not be appropriate on weekends. In applying the BYOD policy, the
company should ensure that employees are made aware of and clearly agree to it
before approving the employee’s use of a personal device and before the company
accesses any information on that device.
Revise the policy to account for the evolution of industry security measures and
changes to privacy legislation
Remind employees that they are bound to the terms of the BYOD policy
Other considerations may include whether the employee will be allowed to keep the
phone number if the company owns the contract with the mobile network provider,
and whether the employee will be required to sign a declaration confirming that all
company information has been returned and/or destroyed.
3b.
A BYOD policy is best implemented and enforced with the support of a BYOD
security solutions such as Forcepoint's CASB (Cloud Access Security Broker).
With Forcepoint CASB, an organization can identify and categorize cloud apps to
access risk and pinpoint which services to allow and monitor. In addition, the solution
can apply unique access and security policies on a per-device bases by easily
distinguishing between managend and unmanaged BYOD devices.