You are on page 1of 10

1st Answer

The Ideal IT Infrastructure Solution: What Should It Look Like?

Introduction: A well-planned IT infrastructure solution can significantly reduce the


costs and boost revenues. With the rapid growth of the organization, IT infrastructure
grows even more rapidly from few servers initially to large data centers housing the
modern technology. Thanks to virtualization, now you can have multiple virtual
servers on a single real server. So what’s the best infrastructure solution? Let’s take
a look at some facts first.

1. Latency Proof

Latency is the delay that may happen in the communication of data over the network.
There are 2 types of latency:

 Low Latency Networks: These are the network connections in which


small delays occur.
 High Latency Networks: They are the network connections which suffer
from long delays. This kind of latency creates bottlenecks, and it prevents
the data to take the full advantage of the network and decreases the
communication bandwidth.
Bottlenecks Causing Latency: In some cases, the problem may be with
transmission medium. The network router or switch may have a problem. Some
software may be malfunctioning due to which the network may be facing latency
issues.

There may be few ways as to what can be done to remove network latency. One of
them is provisioning servers with high-capacity ports.

2. Optimized WAN Network

With WAN optimization, you can be assured of better network management. With it,
you can prioritize the traffic and ensure that business critical applications get the
bandwidth they require. It not just lowers the traveling costs, it also increases the
productivity.  Let’s take a look at some of the technologies which are used:

 Traffic Shaping.
The traffic is prioritized, and bandwidth allocation is done.
 Data Deduplication.
It eliminates the redundant data. In this instead of sending the actual data,
the references are sent
 Data Compression.
It helps in contracting the size of data to limit bandwidth usage
 Data Caching.
In this, frequently used data is hosted locally on a local server for faster
access.
The importance of WAN Optimization is more in the current business environment
where more and more companies are moving to cloud. There are two ways to
address this, first, purchase more bandwidth, and second, use what you have
already more efficiently.

5. Virtualization

Server virtualization is a technology which is in existence for a decade, but some still
consider this as something new. Any multimedia integration is easy, and it provides
efficiencies and capabilities which aren’t possible with a physical world. There are
many benefits of virtualization:

 Energy Saving.
Virtualization can save you a lot of energy. This means cost reduction and
more saving and more budget to focus on other areas.
 Faster Server Provisioning.
With server virtualization, the administrators are enabled to provide system
provisioning and deployment at a short notice.
6. Security

Security plays a major role in moving an IT infrastructure from a vulnerable state to


an optimized state.

 Controlling information access. 


It allows the access of information to managed and defined. It means
identity management, network access control. Simple access to critical
resources is granted only when the authentication is successful.
 Implementation of standards.
Implementing the ISO/IEC standards makes systems more secure. They
are widely used and help in formulating the security policy, so it is
important to have the business processes aligned to the international
standards. One of the commonly used standards is ISO/IEC 27002. It is a
rule which is published by the ISO and provides best practices
recommendations on information security management.
1. Increasing complexity
While IT infrastructure has never been a simple topic, it would be hard to argue that
the practice has not drastically changed over the last few decades. Indeed, modern
IT infrastructure diagrams would be practically unrecognizable to IT managers of
yesterday. The development of support systems such as Hubspot allows for more
interactivity over a business network. However, they place a greater demand on it
than 1st generation systems, which mostly facilitated one-way traffic.
The solution: Although network engineers often cite increased complexity as their
major concern in modern IT infrastructures, automation minimizes the need for
human intervention in network management. This frees up network engineers to
handle larger tasks as the more granular work falls to automated processes. There is
indeed a learning curve to these systems. However, the perks of built-in data
scripting capabilities help maintain your uptime and keep administrators engaged in
their work without getting bogged down by granular, routine tasks.
As networks grow, so do the demands on that network. While older “spoke and hub”
network models were relatively easy to maintain in terms of user need, modern
networks require that engineers speed up deployment and shield networks from
cyber threats. Over the last few years, the rise of remote work has placed an even
greater demand on network administrators to provide more network options. This
requires using an even larger perimeter of SaaS programs delivered via the cloud
and third-party vendor solutions.

The solution: Infrastructure management solutions offer redundant virtual network


functions (VNF) in the form of routers, firewalls, switches, and 5G backup for 24/7
availability, all while minimizing the endpoints that complicate remote networks.
Without integrating these different vendor solutions according to the companies’
needs, they often have to compromise on features, security, redundancy, etc.—
making building a truly custom-fit network difficult. This inflated infrastructure can
lead to feature overlap, where the same safety feature covered by multiple vendors
causes authentication problems in a network’s infrastructure.
The solution: Flexibility and agility are key here; enterprises need to adopt a network
infrastructure that can accommodate their exact needs and adapt when those needs
change. This requires a Linux-based solution that accommodates multi-vendor
environments and 100% unique customization options. This unifies the IT
infrastructure under a single umbrella and gives enterprises options to adjust their IT
networks when necessary.

Conclusion: IT management solutions offer availability and flexibility for modern


network needs, while integrating with third-party vendors and legacy systems. These
features work to unify devices and hardware under a single, user-friendly UI that
uses automation and intelligent systems to take the brunt of the routine tasks off of
administrators, freeing them to focus on more specialized tasks. Finally, these
solutions must be scalable, offering options to grow with the business as it grows.
 

2nd Answer
Information systems are complex sets of interconnected information, data, and
processes. They are used in all aspects of human life, business, and industry.
The information system definition in technology is a broad term that refers to any
information system or tool that helps with the collection and use of data. Information
systems can be used to provide assistance in an organization, or they can be used
for personal gain.
Put simply, information systems are sets of technological methods and techniques
used to store, organize, manage, and retrieve information digitally. They take on
many forms such as computers, mobile devices, tablets, and software programs.
In technology, information systems are mainly used as a platform for information
gathering and processing. They can be hardware or software and use computer
systems to perform tasks like data storage or data analysis.

Primary IS:
Decision support systems are computer programs that analyse enormous amounts
of data and compile information that can be used in decision-making and to solve
problems.
These programs are used by businesses and other organizations to support
determinations, judgments, and courses of action. 
They are informational applications, and unlike ordinary operations applications that
simply collect data, a decision support system collects, analyses, and synthesizes
data to create comprehensive information reports.
They may present the information graphically and they could include AI or an expert
system.
Decision support systems help humans make decisions much faster than we would
tend to on our own.

1. DSS Database
The database contains information from multiple sources. It can either be a small
database, a standalone system, or an enormous data warehouse, depending on the
organizational requirements. 

2. DSS Software System


It is made up of mathematical and analytical models which are utilized for the
analysis of complex data. The models predict outputs based on inputs or conditions
or even combinations of inputs and conditions. 
The decision support system could even have multiple models, each of them
performing particular tasks. The models could include statistical models, sensitivity
analysis models, optimization analysis models, forecasting models, and backward
analysis sensitivity models.
1. Speed
Decision support systems make it possible for users to take informed decisions
quickly. 

2. Lower scope for error


If the data fed into the system is relevant and accurate, the output data will be
accurate.

3. Communication
Top management gets accurate data from the systems and are able to communicate
with each other clearly and make effective decisions.

4. Automation
It automates simple managerial decisions, allowing your staff to concentrate on
higher-level tasks.

5. Cost-effectiveness
The traditional method of organizing and processing data takes too much manpower.
Using a DSS takes fewer resources and even reduces the opportunity cost that
would arise due to the delay caused by the manual.

1. Speed
Decision support systems make it possible for users to take informed decisions
quickly. 

2. Lower scope for error


If the data fed into the system is relevant and accurate, the output data will be
accurate.

3. Communication
Top management gets accurate data from the systems and are able to communicate
with each other clearly and make effective decisions.

4. Automation
It automates simple managerial decisions, allowing your staff to concentrate on
higher-level tasks.
5. Cost-effectiveness
The traditional method of organizing and processing data takes too much manpower.
Using a DSS takes fewer resources and even reduces the opportunity cost that
would arise due to the delay caused by the manual.

Secondary IS:

What is Executive Support System ESS?


Executive Support System (ESS) is a software used by companies which has
information related to business, which enables the top management to take better
decisions in favour of the company.
ESS mainly deals with data related to key departments like billing, accounting,
scheduling, staffing etc. In addition to providing quick access to the data, ESS helps
to analyze the data systematically and helps the companies to even forecast and
prepare for the future.
ESS thus saves valuable time of the executives in digging the huge pile of
information to identify the critical data and helps them spend more time on
brainstorming and decision making by providing only the required data. ESS can be
used to view and analyze both the present data and predicted future data.

Depending on the utility, the software can be adjusted according to parameters to


deliver the best results.
Some of the advantages of ESS are:

Improved personal efficiency

Increased organizational control

Competitive advantage over competitors

Automation of the managerial processes.

Designed with Management's Critical Success Factors In Mind: 


Each company has its own critical aspects to achieve the organisational objectives.
These aspects can be at the individual, departmental and organisational level.

Status Access, Trend Analysis and Exception Reporting: 


This permits executives to get the recent data on any key variable. Trend analysis
supports the executive to study data over a given timeline. Hence, timing and
significance of information are too crucial. Permission to highlight deviations from the
established norm in the organisation is allowed in case of exception reporting, which
also include reason of deviation.

Personalized Analysis: 
Built-in functions are used to examine problematic situations in EIS. With the help of
these functions, executives become capable to specify the data required for the
analysis and the format type (in which results are displayed) of results.

5) Navigation of Information: 
This allows access of large amounts of data in a very short time span with accurate
results. Forward and backward path access, skipping screens while accessing a
selected part of the system are the examples of it.
3rd Answer

3a.
Bring your own device (BYOD) refers to the trend of employees using personal
devices to connect to their organizational networks and access work-related systems
and potentially sensitive or confidential data. Personal devices could include
smartphones, personal computers, tablets, or USB drives.

As more and more organizations support employees working from home,


maintaining a flexible schedule, or connecting on the go while on work travel or
commutes, BYOD solutions have become more prevalent. Some companies may
sanction BYOD, while others may consider it part of “shadow IT,” which refers to
software or hardware not supported by IT.

1. Beginning BYOD: disclosure is king

The policy should also address how the company will go about protecting the private
information that it comes into contact with when carrying out monitoring. Drafting a
BYOD policy does not give the company a ‘blank cheque’ to closely examine
everything in the device. The monitoring of the device has to be proportionate to the
stated reasons for the monitoring. For example, if the purpose of the monitoring is to
ensure that employees do not spend company time on personal matters, then
monitoring may not be appropriate on weekends. In applying the BYOD policy, the
company should ensure that employees are made aware of and clearly agree to it
before approving the employee’s use of a personal device and before the company
accesses any information on that device.

Working with BYOD: review, revise, remind


2. The BYOD policy should be a living document that changes as both technology
and the company’s needs change. This can be achieved by following ‘the three Rs’:

Periodically review the policy to make sure that it accurately reflects the ways


personal devices are used in the company

Revise the policy to account for the evolution of industry security measures and
changes to privacy legislation

Remind employees that they are bound to the terms of the BYOD policy

Additionally, companies should consider giving employees a grace period to adapt to


substantial changes, and should let employees know that if they no longer agree to
the policy, they should refrain from using the device for work, and, optionally, may be
required to deliver the device to IT to ensure that company’s proprietary information
is properly and permanently deleted.

3. Checking out of BYOD


Companies should also be prepared for a refusal by an employee to hand over his or
her device and consider whether it is technically possible to remotely wipe company
data from the device and whether such remote wiping would capture all data –
including company confidential data or the personal data of other employees. This
will largely depend on the device used by the employee and whether the company
obtained the proper employee consents in the BYOD policy.

Other considerations may include whether the employee will be allowed to keep the
phone number if the company owns the contract with the mobile network provider,
and whether the employee will be required to sign a declaration confirming that all
company information has been returned and/or destroyed.

3b.

Important elements of BYOD policies include:

 Types of approved devices


 Security and data ownership policies
 Levels of IT support granted to personal devices (if any)
A strong BYOD security policy should be integrated with overall IT security and
acceptable use policies. As IT leaders determine the level of support they will apply
to personal devices, they must ensure a balance between organizational security
and employees’ personal privacy.

Use BYOD Security Solutions to Manage your Policy

A BYOD policy is best implemented and enforced with the support of a BYOD
security solutions such as Forcepoint's CASB (Cloud Access Security Broker).
With Forcepoint CASB, an organization can identify and categorize cloud apps to
access risk and pinpoint which services to allow and monitor. In addition, the solution
can apply unique access and security policies on a per-device bases by easily
distinguishing between managend and unmanaged BYOD devices. 

BYOD Pros and Cons

The advantages of supporting BYOD within your organization include:

 Higher employee productivity, according to a study that shows a 16 percent


boost in productivity over a 40-hour workweek*
 Increased employee job satisfaction and retention through supporting flexible
work arrangements
 Increased employee effectiveness due to more comfort and speed with their
own devices
 Upgraded technologies are integrated into the workplace without IT spend on
hardware, software licensing, or device maintenance
Disadvantages of employees using personal devices on the job could include:
 Possible data breaches due to lost or stolen personal devices or employees
leaving the company
 Lack of firewall or anti-virus software applied to personal devices
 Possible IT cost increases if the department determines they will offer support
to personal devices
 Lack of network
 BYOD solutions can potentially create efficiencies in the way employees work.
However, they also introduce vulnerabilities in the network through accessing
sensitive data on unsupported and/or unsecured personal devices.
 BYOD has both advantages and disadvantages, but its growing ubiquity
means that all IT departments must be aware and proactive. Policies on
BYOD management are becoming more prevalent within organizations and
are important to addressing what can be a daunting security challenge.

You might also like