0% found this document useful (0 votes)
17 views13 pages

Information System For Managers PDF

The document discusses improving an IT infrastructure for business growth. It provides seven considerations for revamping the infrastructure including choosing the right cloud provider, preparing for increased workloads, ensuring compliance with legal requirements, minimizing response speed, increasing data volume, protecting against attacks, and enabling disaster recovery.

Uploaded by

Dirghayu Mali
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views13 pages

Information System For Managers PDF

The document discusses improving an IT infrastructure for business growth. It provides seven considerations for revamping the infrastructure including choosing the right cloud provider, preparing for increased workloads, ensuring compliance with legal requirements, minimizing response speed, increasing data volume, protecting against attacks, and enabling disaster recovery.

Uploaded by

Dirghayu Mali
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

Ans – 1:

INTRODUCTION
In the current 21st century, and the last few years, the information technology infrastructure
has become very strong due to the amazing development in the field of information technology,
and in the coming years, it will grow even more with the help of 5G internet speed. And stay
updated with this kind of technology is essential for any company. Just as a home needs
furniture to be well decorated, Similarly, information technology infrastructure consists of the
facilities that are needed by an organization to function. The IT facilities are in the form of
hardware, software, networks, and services that combine to form applications that are used by
the organization. Information technology is essential in any type of business, such as e-
commerce, materials management, accounting, etc. Every different department in any company
is connected with IT, due to which every employee can do his work easily and in less time.
And it is equally necessary for the employer because through it the employer can keep control
over every department of the company, from field workers to office staff. The infrastructure
components are the basis on which the organization performs its various functions, and a lack
of any component affects the functionality of the organization. If the information technology
infrastructure of the company is strong, then the company can save much of its confidential
data, and can also keep a hold on the internal affairs of the company. Otherwise, in the field
where there are positive working IT engineers, in the same field there are also engineers who
steal and hack the company's data. And if the IT structure is not strong, the larger the company,
the more losses it may suffer, so it is necessary to keep it updated and very strong. It is necessary
to keep the infrastructure of the company in such a way that the environment is not harmed.

So, Farokh should improve the company's infrastructure keeping in mind all the things
mentioned above.

CONCEPT
Let us discuss the technical and business consideration, which has to follow by Farokh
Motorwala to revamp the D’Costa cosmetics’ IT infrastructure:

There are seven considerations to ensure IT infrastructure for business growth, which are as
below:
Choose the
right cloud
provider

Enable Prepare for


disaster an increased
recovery workload

IT
Protect Ensure you
business from Infrastructure meet regional
DDos attacks legal and
and malicious compliance
bots requirements

Minimize
Increase data
response
volume
speed

1. Choose the right cloud provider:

In recent times, all international, as well as corporate companies, are increasingly


joining the cloud infrastructure. And many companies find it too difficult and don't
move to the cloud because it involves system crashes, data loss, financial costs, and
time costs. But finding a good cloud provider and migrating to it is very essential. And
it should be a provider that can manage our infrastructure needs well at the top level.
Things to look for are a robust test migration process (including unlimited testing) and
a cloud built with the right APIs to support migration, such as Google Cloud, and IBM
Cloud.
2. Prepare for an increased workload:

Every company's IT department needs to keep confirming that their company's IT


structure is sufficient to handle any type of problem or not. They need to recalculate the
server workload to track the moving target. Needing to regularly readjust is why cloud
servers are now so common, as they can scale to our needs. Cloud servers can upgrade
a company’s server capacity on both a long-term and short-term basis. cloud providers
can allow us to easily improve our core servers, with certain providers even offering
access to bare-metal servers. And cloud service is an important service that also fulfills
that when we have less need for short term then we have to pay according to that less
time.

3. Ensure you meet regional legal and compliance requirements:

When we update IT infrastructure or expand to a new location, meeting local


compliance and legal requirements is very important, and if not, the company has to
suffer a huge penalty. Data protection laws worldwide are becoming more complex,
and keeping tabs on legislation between countries can be challenging. Processing data
in local clouds can go a long way to meeting requirements, as it removes the need to
transfer data internationally.

4. Minimize response speed:

A slow response time damages our business. All are suffering if the response time is
longer than three seconds. And to improve that we have to continuously update our
Content Delivery Network (CDN). Check the leading providers with tools like
CDNPerf to compare performance in the region we're expanding into. Also, ensure our
CDN provider has points of presence in the same regions our users are located in (this
improves response speed). If not, we could use a multi-CDN to cover all the regions
needed.

5. Increase data volume:

As our business grows and expands to different places, the data size increases rapidly,
and it becomes very difficult to handle it. Cloud or hybrid storage is a good option for
it and offers fast access to data with greater scalability and cost-effectiveness than on-
site storage. And machine learning is becoming valuable to handle all this. Artificial
Intelligence (AI) provides ready-made platforms that give us access to the architecture
and expertise needed to roll out AI are now available, making it more achievable than
ever.
6. Protect your business from DDoS attacks and malicious bots:

Nowadays, it is very important to keep our IT structure secure and safe, the bigger the
size of the company, the more data there is, and the more cyber-attacks are increasing.
Having the latest DDoS protection is non-negotiable: Ensure either our cloud provider
is constantly improving our tech stack for DDoS and malicious bot protection.

7. Enable disaster recovery:

All firms require strong disaster recovery (DR) procedures for their IT structure.
Recovery is the primary business driver for cloud computing, as it can eliminate the
need for traditional infrastructure and significantly increase recovery time at a lower
cost than traditional DR. Cloud platforms can create an online backup that's faster,
safer, and less resource-intensive than an offline backup.

Let us now discuss the Laws of IT infra which Farokh must keep in mind.

The latest IT Indian Act establish is 2000, in this act there are 65 to 71 sections are related to
IT infrastructure, which are mentioned below:

Sec:65 Tempring with computer source documents

Hacking with computer system & Receving stolen computer device,


Sec:66 Using password of another person,Cheating using computer resource,
publishing private images of others, Acts of cyber terrorism

Publishing information which is obscene in electronic form, Publishing


Sec:67 images containing sexual acts, Publishing child porn or predating
children online, Failure to maintain records

Sec:68 Failure / refusel to comply with orders

Sec:69 Failure/ refusal to decrypt data

Sec:70 Securing access or attempting to secure access to a protected system

Sec:71 Fraud, Misreprasentation


CONCLUSION
So, all the things mentioned above are very important for IT infrastructure, but it depends on
the type of business of the company. How many employees work there, how many branches of
the company, thus the size and needs of the company determines who to include in it. Also, to
be aware of all the laws related to IT and also to keep other staff of the company to be alert so
that technology is not misused, and also pointing out that doing so can be a punishable offence.
Ans – 2:

INTRODUCTION
An important task of all employees within the organization is to make decisions about various
things. At the lowest level of the organization, the workers have to decide how to go about their
work. Although their work is usually quite structured, they have to make choices and evaluate
consequences, using the given details. Decision making is the developing concepts leading to
the selection of a course of action among variations. Every decision-making process produces
a final choice. It can be an action or an option. It begins when we need to do something but we
do not know what. Management information system (MIS) process the information generated
by the transaction processing system of an organization and create reports for use by the
management. The need of managers at various levels in the organization are different. Some
need information that is real time detailed while others need information that is aggregated and
covers a long period of time.

CONCEPT
Decision making with MIS:

Tactical Decisions:

An important task of all employees within the organization is to make decisions about various
things. At the lowest level of the organization, the workers have to decide how to go about their
work. Although their work is usually quite structured, they have to make choice and evaluate
consequences, using the given details.

Ex: For example, an employee working in an account department in a company makes a list of
his work and prioritizes the work, even though he always has to do the same work every week
and month, but he takes tactical decisions to move the work day-wise and time-wise.

Operational decision:

Decisions made by managers that have a medium-term scope are often called operational
decisions. These decisions are based on aggregate data and impact the activities for the medium
term that could range from the next few months to the next few quarters. Operational decisions
are often supported by decision support systems that use specialised models to provide detailed
and carefully analysed solution to decision problems.
Ex: A manager working in a bank himself goes to the field and does marketing and sales, and
also takes the decision for the total sales made in his branch.

Strategic decision:

Another set of decisions made by top managers of an organization are termed as strategic
decisions. These are long term in scope and have a long-time horizon of years. By nature, these
decisions impact the very manner in which the organization does its work. Strategic decisions
are related to the vision and mission of the organization. The decision determines how the
organization will realise what it was created for originally and what it strives to achieve
eventually. Information systems such as executive information system are used for making
strategic decisions.

Ex: In the healthcare industry, strategic decisions are taken that in which area the pollution is
high, in which area the aged person is high, and in which area doctors of which specialty are
available, according to this they think to develop their healthcare industry.

Database Concept:

A database is a collection of files that have stored data. The files and the data within them are
related in some manner, either they are from the same domain, function, firm, or some other
category. The files in the database are created according to the needs of the function or
department and are maintained with data that is relevant for the applications the department
runs. A file in the database consists of particular spaces, called structures, in which data is
maintained. The basic structure of a file is called a field. A field is a define space, of specific
dimensions, in which data is placed. Data is read and from and can be deleted from fields.
When defining or designing a field, the contents of the field have to be specified exactly.

Data Warehouses:

Since the inception of computing, in the mid-1980s, around the world, there has been a
proliferation of data use and needs for data storage. Almost all employees of organizations,
above a certain size, now use computers and produce, modify or read data. For very large
organizations, the amount of data that is used a day-to-day basis could be as high as in
petabytes. With this huge explosion in data, organizations felt the need for:

1. Consolidating much of the data from various databases into a whole that could be
understood clearly.
2. Focusing on the use of data for decision making, as opposed to simply for running
transactions.
The need for creating data warehouses arose from the above two needs. The technology of data
warehouses draws on enterprise database to create a separate set of tables and relations that can
be used to run particular kinds of queries and analytical tools. Warehouse are different from
transaction databases, as users can run complex queries on them, which are related to the
functions of the enterprise that need not affect the transaction processing.

There are four types of data that are as follow:

Click-stream data

Point-of-sale purchase data

Online search data

Text data

 Click-stream data:

This data is collected from website pages as users click on links or other items on the
web page. Data on where users click, after what interval, what page the users go to,
does the user return and visit other links are collected.

 Point-of-sale purchase data:

Data obtained from retail sales counters is the classic data set to which mining software
was applied. The data pertains to the item quantities, price values, date and time of
purchase, and details about customers that are obtained from point-of-sale terminals.

 Online search data:

This data is about search that users type in search boxes on web pages. Many
organizations collect the text typed in by users while they are searching for some
information. This text data reveals what users are interested in and is mind for patterns.
 Text data:

The text data is posted by users on webpages, blogs, emails, wikis, twitter feeds and
others. Many organizations have found that by mining this data they can glean
interesting insights and trends. Many tools and software programs have been created
recently to mine text data.

CONCLUSION

The leader of an organisation is responsible for making choices that continuously increase or
decrease the value of the company. In the end, they should have the capacity to reason
creatively to the point of arriving at wise judgments and providing accurate records. You should
have the choice to assess the situation, identify any barriers, and make workable adjustments
to keep the fundamental cycle moving forward as intended. Each business has its unique set of
competencies for a CEO, hence there is no conventional configuration (Leader). Whether or
whether they understand the nuances of these sorts of exercises, pioneers have an ethical duty
to make judgements about each delegate's manner of behaviour. Younger, less seasoned
spearheads often need more significant ability to tolerate making disastrous mistakes.
Ans – 3(A):

INTRODUCTION

BYOD means bring your own device. BYOD is an alternative strategy allowing employees,
business partners and other users to utilize a personally selected and purchased client device to
execute enterprise applications and access data. systems used in client care to provide
surprisingly high levels of comfort while also assisting clients in understanding complicated in
IT ideas. In this session, the emphasis will be on reading and responding to emails, comparing
and organising delegates, and utilising important reports and business-related data. Formal
BYOD programs are a relatively new but fast-growing phenomenon. The rapid proliferation of
employee’s mobile devices is changing the traditional IT environment in enterprises.

CONCEPT

Let us discuss the three levels of BYOD:

Communication of
Plan Secure & Manage
the BYOD policy

▪ Plan:

First, a cost/benefit analysis is in order! Conduct the analysis when deciding how you’ll
be enabling the mobile and who will be using it. Avoiding the determination of a policy
is dicey – if there isn’t a policy, BYOD will only lead to chaos. The depth of access that
will be allowed for each user segment needs to be decided – ‘Mobile enhance’, ‘mobile
optional’, or ‘mobile primary’. Apart from this, security policies and mobile device
funding for each segment needs to be determined, after which an estimate of the entire
IT support must be conducted.

▪ Secure and manage:

It is important to carefully choose the technologies to use for the management and
security of mobile devices so things don't go awry. For instance, a smartphone with
large amounts of sensitive data may be stolen, putting the information in the wrong
hands and putting the company at risk. The enterprise system that will be planned needs
to be flexible enough to control and monitor the connections to a growing number of
devices.

▪ Communication of the BYOD policy:

Do employees understand the risks? Clear, unambiguous communication on the types


of data that may be accessed on which type of device needs to be shared with all
employees to ensure seamless implementation.

CONCLUSION

On affiliation experts, the benefits of BYOD are anticipated to be similar to those shown in the
models above. All parties involved benefit from the agreement, since businesses put aside
money and employees are less fatigued from carrying heavy equipment. Additionally, it allows
customers the option to choose a device that is less problematic but still acceptable to use. With
BYOD, the IT department may split pay by not giving the deals experts as many devices.
Ans – 3(B):

INTRODUCTION

A "bring your own device" (BYOD) initiative encourages employees to use their own PCs,
tablets, and smartphones for work-related reasons. There are a few important caveats to be
aware of, but evidence suggests that BYOD tactics may try to support low-stress work
environments. A gathering should weigh the benefits and drawbacks of a "bring your own
device" policy before accepting responsibility.

CONCEPT
Let use discuss the pros & cons of BYOD:

Pros:
Reduce technology costs for field service firms:
It is very helpful for every employee working in the field and it can also reduce the cost of the
company, and it is most useful for the general marketing field employees, because if they have
to tell a customer about the product information, features, photos. He can easily show it from
his own device, he doesn't have to pay the company separately for that product or travel.
Takes advantage of newer devices and their cutting-edge features:

Every employee can take advantage of the devices he has as well as new ones in the market
and if any features are new in it, he can also take advantage of them. And thus, he remains very
interested in the work and does not get bored.

Cons:

Security:

Security is a concern across all platforms today, and this holds true for a BYOD policy as well,
but it is not impossible to overcome this challenge. All it requires is for the IT departments to
be prepared. Password-protection and antivirus programs need to be installed to separate work-
deck and apps from personal information.
Retrieving data:

What happens to the company data when an employee leaves the organization? Who will
discontinue their access to your company data? Do they have their own phone number? What
if clients were calling that number directly? For an employee in the sales environment, this
becomes extremely risky, and BYOD policies need to address this issue. Otherwise, an ex-
employee may suddenly turn into a competitor with easy access to client information.

CONCLUSION

So, BYOD is very useful concept in every organization and improve work/life balance. Using
personal devices enables employees to stay connected to both personal and work life. This is a
definite advantage for those employees who have home commitments such as childcare. There
is also an argument that BYOD allows for greater work-day flexibility.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy