0% found this document useful (0 votes)
39 views74 pages

Unit 1

This document provides an introduction to IT systems. It discusses the basic components of a computer system including input, output, processing, storage, and the central processing unit. It then describes the key components of an IT system such as hardware, software, databases, networks, and human resources. Finally, it covers classifications of computers based on generations and usage, discussing characteristics of personal computers, workstations, mini-computers, and mainframes.

Uploaded by

Ishika Verma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
39 views74 pages

Unit 1

This document provides an introduction to IT systems. It discusses the basic components of a computer system including input, output, processing, storage, and the central processing unit. It then describes the key components of an IT system such as hardware, software, databases, networks, and human resources. Finally, it covers classifications of computers based on generations and usage, discussing characteristics of personal computers, workstations, mini-computers, and mainframes.

Uploaded by

Ishika Verma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 74

Introduction to ITM

Ashima Wadhwa
Introduction to IT System

INPUT PROCESS OUTPUT


Computer Architecture
INPUT UNIT
 Computer receives data and instructions
through the Input Unit.
 The input unit consists of one or more input

devices.
 Input devices include:

Keyboard
Mouse
Joystick
Scanner
FUNCTIONS OF INPUT UNIT
 Accept the data and instructions from the
outside world.
 Convert it to a form that the computer can

understand.
 Supply the converted data to the computer

system for further processing.


OUTPUT UNIT
 Computer provides information and results of
computation to the outside world through the
Output Unit.
 The output unit consists of one or more output
devices.
 Output devices include:
Monitor
Printer
Scanner
Webcam
Speakers
FUNCTIONS OF OUTPUT UNIT
 Accept the results produced by the computer.
(These are in a coded form.)
 Convert it to a form that the outside world

can understand. (OR, Converts it into human


readable form.)
 Supply the converted results to the outside

world.
CPU
 It is the brain of the computer.
 The ALU and the Control Unit (CU) of a

computer system are jointly known as the


central processing unit.
 CPU performs actual processing of data,

according to instructions from programs.


 CPU performs all major calculations and

comparisons, and also receives and controls


the operations of other units of computer
system.
FUNCTIONS OF CPU
 It performs all arithmetic operations.
 It takes all decisions.
 It controls all units of the computer.
CONTROL UNIT
 It controls all other units in the computer.
 It is the central nervous system of the

computer that controls and synchronizes its


working.
ARITHMETIC LOGICAL UNIT
 All calculations are performed in the
Arithmetic Logic Unit (ALU) of the computer
 It performs all arithmetic operations

(addition, subtraction, multiplication, and


division).
 It performs all logic operations
STORAGE
 The storage unit of the computer holds data and
instructions that are entered through the input
unit, before they are processed
 Storage devices are divided into two
categories:
◦ Primary storage or Primary memory
or Main memory
◦ Secondary storage or Secondary
memory
STORAGE FUNCTIONS
 It received the data and instructions required
for processing from the input unit.
 It stores the intermediate results.
 It stores the final results before these results

are released to the output unit.


 It saves data for later use.
Components of IT System

 An Information system is a combination of


hardware and software and
telecommunication networks that people
build to collect, create and distribute useful
data, typically in an organization. It defines
the flow of information within the system.
The objective of an information system is to
provide appropriate information to the user,
to gather the data, process the data and
communicate information to the user of the
system.
Components of IT System
 1. Computer Hardware:
Physical equipment used for input, output and
processing. The hardware structure depends upon the
type and size of the organization. It consists of an input
and an output device, operating system, processor, and
media devices. This also includes computer peripheral
devices.
 2. Computer Software:
The programs/ application program used to control and
coordinate the hardware components. It is used for
analysing and processing of the data. These programs
include a set of instruction used for processing
information.

Software is further classified into 3 types:


System Software
 Application Software
 Procedures
 3. Databases:
Data are the raw facts and figures that are unorganized that
are later processed to generate information. Softwares are
used for organizing and serving data to the user, managing
physical storage of media and virtual resources. As the
hardware can’t work without software the same as software
needs data for processing. Data are managed using Database
management system.
Database software is used for efficient access for required
data, and to manage knowledge bases.
 4. Network:
Networks resources refer to the telecommunication networks
like the intranet, extranet and the internet.
 These resources facilitate the flow of information in the
organization.
 Networks consists of both the physicals devices such as
networks cards, routers, hubs and cables and software such
as operating systems, web servers, data servers and
application servers.
 Telecommunications networks consist of computers,
communications processors, and other devices interconnected
by communications media and controlled by software.
 Networks include communication media, and Network
Support.
 5. Human Resources:
It is associated with the manpower required to run
and manage the system. People are the end user of
the information system, end-user use information
produced for their own purpose, the main purpose
of the information system is to benefit the end user.
The end user can be accountants, engineers,
salespersons, customers, clerks, or managers etc.
People are also responsible to develop and operate
information systems. They include systems analysts,
computer operators, programmers, and other
clerical IS personnel, and managerial techniques.
Classification of Computers
on the basis of Generations
• Generation of Computers
• First Generation (1946-59)
• Second Generation(1957-64)
• Third Generation(1965-70)
• Fourth Generation(1970-90)
• Fifth Generation(1990 till date)
Classification of Computers
on the basis of Generations
Generation 0: Mechanical Calculators
Generation 1: Vacuum Tube Computers
Generation 2: Transistor Computers
Generation 3: Integrated Circuits
Generation 4: Microprocessors
Generation 1 : ENIAC (Vacuum Tube Computers)
The ENIAC (Electronic Numerical Integrator and Computer) was unveiled in
1946: the first all-electronic, general-purpose digital computer
Generation 2: IBM7094 (Transistors)
Generation 3: Integrated Circuits
Generation 4: VLSI Improvements to IC technology made it
possible to integrate more and more transistors
in a single chip
SSI (Small Scale Integration): 10-100
MSI (Medium Scale Integration): 100-
1,000
LSI (Large Scale Integration): 1,000-
10,000
VLSI (Very Large Scale Integration):
Microprocessors >10,000
Generation 5?
The term “Generation 5” is used sometimes to refer to all
more or less “sci fi” future developments
Voice recognition
Artificial intelligence
Quantum computing
Bio computing
Nano technology
Learning
Natural languages
Classification of Computers on the basis of
Usage
SNo. Type Specifications

1 PC (Personal It is a single user computer system having a moderately


Computer) or powerful microprocessor. It is termed as a computer that is
Micro-Computers equipped microprocessor as its CPU.

2 Workstation It is also a single user computer system, similar to the


personal computer, however, has a more powerful
microprocessor.

3 Mini-Computer It is a multi-user computer system, capable of supporting


hundreds of users simultaneously.

4 Main Frame It is a multi-user computer system, capable of supporting


hundreds of users simultaneously. Software technology is
different from minicomputer.
PC (Personal Computer)

 A PC can be defined as a small, relatively inexpensive computer


designed for an individual user. PCs are based on the
microprocessor technology that enables manufacturers to put an
entire CPU on one chip. Businesses use personal computers for
word processing, accounting, desktop publishing, and for
running spreadsheet and database management applications. At
home, the most popular use for personal computers is playing
games and surfing the Internet.

 Although personal computers are designed as single-user


systems, these systems are normally linked together to form a
network. In terms of power, nowadays high-end models of the
Macintosh and PC offer the same computing power and graphics
capability as low-end workstations by Sun Microsystems,
Hewlett-Packard, and Dell.
Workstation
 The workstation is a computer used for engineering applications
(CAD/CAM), desktop publishing, software development, and other
such types of applications which require a moderate amount of
computing power and relatively high-quality graphics capabilities.

 Workstations generally come with a large, high-resolution graphics


screen, a large amount of RAM, inbuilt network support, and a
graphical user interface. Most workstations also have mass storage
device such as a disk drive, but a special type of workstation,
called diskless workstations, comes without a disk drive.

 Common operating systems for workstations are UNIX and


Windows NT. Like PC, workstations are also single-user computers
like PC but are typically linked together to form a local area
network, although they can also be used as stand-alone systems.
Minicomputer

 A minicomputer is a type of computer that


possesses most of the features and capabilities of a
large computer but is smaller in physical size.
 A minicomputer fills the space between the
mainframe and microcomputer, and is smaller than
the former but larger than the latter. Minicomputers
are mainly used as small or mid-range servers
operating business and scientific applications.
However, the use of the term minicomputer has
diminished and has merged with servers.
 A minicomputer may also be called a mid-range
computer.
Mainframe

 The mainframe is very large in size and is an


expensive computer capable of supporting
hundreds or even thousands of users
simultaneously. Mainframe executes many
programs concurrently and supports much
simultaneous execution of programs.
Supercomputer

 Supercomputers are one of the fastest


computers currently available. Supercomputers
are very expensive and are employed for
specialized applications that require an
immense amount of mathematical calculations
(number-crunching).
 For example, weather forecasting, scientific
simulations, (animated)graphics, fluid dynamic
calculations, nuclear energy research,
electronic design, and analysis of geological
data (e.g. in petrochemical prospecting).
CHARACTERISTICS OF COMPUTERS
SPEED
 Computers operate at extremely high speeds

 Their speed is measured in millions for


instructions per second (MIPS).
ACCURACY
 The computer’s accuracy is consistently high.
 Almost without exception, the errors in

computing are due to human rather than to


technological weakness i.e. due to vague
thinking by the programmer, inaccurate data,
user instructions or hardware problems.
AUTOMATIC
 The computers are automatic. They do not
need any supervision in order to perform
programs when instructed or execute the
work assigned.
DILIGENCE
 Computers have the ability to perform the
same task over for long time without getting
tired. This is because a computer is a
machine, and so does not have from human
behaviors of tiredness and lack of
concentration
Versatility
 Modern Computers can perform different
kind of tasks simultaneously (doing many
tasks at the same time). For example you can
play music while typing a document at the
same time. This is also known as multi-
tasking.
Adaptability
 Modern Computers can comply with different
settings. For example, they can be used as
personal computers, for home use, banking,
communication, entertainment, weather
forecasting, space explorations, teaching,
railways, medicine etc.
Artificial intelligence
 Computers are artificially intelligent. i.e.
They can be programmed to assume
capabilities such as learning, reasoning,
adaptation, and self-correction. For
example computers can respond as if they
were thinking by play chess, recognize
handwriting and speech. However, the
computers themselves cannot think. The
artificial intelligence is only supported by
the power of the programs installed in
them.
Storage
 For a computer to be able to work, it must
have some form of work space where data is
stored before being processed. All
information is stored on a hard disk or in the
memory, for example on a Ram.
Need user Input
 Computers cannot initiate themselves and
make the decisions. They need instructions
from users to enhance the process. After all,
a computer is only a machine.
Different Types of Memory in a Computer

 Although many types of memory in a computer exist, the most basic


distinction is between primary memory, often called system memory,
and secondary memory, which is more commonly called storage.
 The key difference between primary and secondary memory is speed
of access.
 Primary memory includes ROM and RAM, and is located close to the
CPU on the computer motherboard, enabling the CPU to read data
from primary memory very quickly indeed. It is used to store data that
the CPU needs imminently so that it does not have to wait for it to be
delivered.
 Secondary memory by contrast, is usually physically located within a
separate storage device, such as a hard disk drive or solid state drive
(SSD), which is connected to the computer system either directly or
over a network. The cost per gigabyte of secondary memory is much
lower, but the read and write speeds are significantly slower.
Primary Memory Types
RAM and ROM

 There are two key types of primary memory:


 RAM, or random access memory
 ROM, or read-only memory
RAM Computer Memory

 The acronym RAM stems from the fact that data stored in random
access memory can be accessed – as the name suggests – in any
random order. Or, put another way, any random bit of data can be
accessed just as quickly as any other bit.
 The most important things to understand about RAM are that RAM
memory is very fast, it can be written to as well as read, it is volatile (so
all data stored in RAM memory is lost when it loses power) and, finally,
it is very expensive compared to all types of secondary memory in
terms of cost per gigabyte. It is because of the relative high cost of RAM
compared to secondary memory types that most computer systems use
both primary and secondary memory.
 Data that is required for imminent processing is moved to RAM where it
can be accessed and modified very quickly, so that the CPU is not kept
waiting. When the data is no longer required it is shunted out to slower
but cheaper secondary memory, and the RAM space that has been freed
up is filled with the next chunk of data that is about to be used.
Types of RAM
 DRAM: DRAM stands for Dynamic RAM, and it is the most
common type of RAM used in computers. The oldest type is
known as single data rate (SDR) DRAM, but newer computers use
faster dual data rate (DDR) DRAM. DDR comes in several versions
including DDR2 , DDR3, and DDR4, which offer better
performance and are more energy efficient than DDR. However
different versions are incompatible, so it is not possible to mix
DDR2 with DDR3 DRAM in a computer system. DRAM consists of a
transistor and a capacitor in each cell.
 SRAM: SRAM stands for Static RAM, and it is a particular type of
RAM which is faster than DRAM, but more expensive and bulker,
having six transistors in each cell. For those reasons SRAM is
generally only used as a data cache within a CPU itself or as RAM
in very high-end server systems. A small SRAM cache of the most
imminently-needed data can result in significant speed
improvements in a system
ROM Computer Memory

 ROM stands for read-only memory, and the name stems from the
fact that while data can be read from this type of computer memory,
data cannot normally be written to it. It is a very fast type of
computer memory which is usually installed close to the CPU on the
motherboard.
 ROM is a type of non-volatile memory, which means that the data
stored in ROM persists in the memory even when it receives no power
– for example when the computer is turned off. In that sense it is
similar to secondary memory, which is used for long term storage.
 When a computer is turned on, the CPU can begin reading
information stored in ROM without the need for drivers or other
complex software to help it communicate. The ROM usually contains
“bootstrap code” which is the basic set of instructions a computer
needs to carry out to become aware of the operating system stored
in secondary memory, and to load parts of the operating system into
primary memory so that it can start up and become ready to use.
Types of ROM
 PROM PROM stands for Programmable Read-Only Memory, and it is
different from true ROM in that while a ROM is programmed (i.e. has
data written to it) during the manufacturing process, a PROM is
manufactured in an empty state and then programmed later using a
PROM programmer or burner.
 EPROM EPROM stands for Erasable Programmable Read-Only Memory,
and as the name suggests, data stored in an EPROM can be erased and
the EPROM reprogrammed. Erasing an EPROM involves removing it from
the computer and exposing it to ultraviolet light before re-burning it.
 EEPROM EEPROM stands for Electrically Erasable Programmable Read-
Only Memory, and the distinction between EPROM and EEPROM is that
the latter can be erased and written to by the computer system it is
installed in. In that sense EEPROM is not strictly read-only. However in
many cases the write process is slow, so it is normally only done to
update program code such as firmware or BIOS code on an occasional
basis
Differences between RAM and ROM
 ROM:
 Non-volatile
 Fast to read
 Usually used in small quantities
 Cannot be written to quickly
 Used to store boot instructions or firmware
 Relatively expensive per megabyte stored compared to RAM
 RAM:
 Volatile
 Fast to read and write
 Used as system memory to store data (including program code)
that the CPU needs to process imminently
 Relatively cheap per megabyte stored compared to ROM, but
relatively expensive compared to secondary memory
Secondary Memory/ Mass Storage
Devices
 We have read so far, that primary memory is volatile
and has limited capacity. So, it is important to have
another form of memory that has a larger storage
capacity and from which data and programs are not
lost when the computer is turned off. Such a type of
memory is called secondary memory. In secondary
memory, programs and data are stored. It is also
called auxiliary memory. It is different from primary
memory as it is not directly accessible through the
CPU and is non-volatile. Secondary or external
storage devices have a much larger storage capacity
and the cost of secondary memory is less as
compared to primary memory.
Mass Storage Devices
 A mass storage device (MSD) is any storage
device that makes it possible to store and
port large amounts of data across computers,
servers and within an IT environment. MSDs
are portable storage media that provide a
storage interface that can be both internal
and external to the computer.
 A mass storage device may also be referred

to as an auxiliary storage device. The term is


commonly used to describe USB mass storage
devices.
Use of Secondary memory

 Secondary memory is used for different purposes but


the main purposes of using secondary memory are:
 Permanent storage: As we know that primary memory
stores data only when the power supply is on, it loses
data when the power is off. So we need a secondary
memory to stores data permanently even if the power
supply is off.
 Large Storage: Secondary memory provides large
storage space so that we can store large data like
videos, images, audios, files, etc permanently.
 Portable: Some secondary devices are removable. So, we
can easily store or transfer data from one computer or
device to another.
Secondary memory devices
 1. Floppy Disk: A floppy disk consists of a magnetic disc in a square
plastic case. It is used to store data and to transfer data from one
device to another device. Floppy disks are available in two sizes (a)
Size: 3.5 inches, the Storage capacity of 1.44 MB (b) Size: 5.25 inches,
the Storage capacity of 1.2 MB. To use a floppy disk, our computer
needs to have a floppy disk drive. This storage device becomes
obsolete now and has been replaced by CDs, DVDs, and flash drives.
 2. Compact Disc: A Compact Disc (CD) is a commonly used secondary
storage device. It contains tracks and sectors on its surface. Its shape
is circular and is made up of polycarbonate plastic. The storage
capacity of CD is up to 700 MB of data. A CD may also be called a
CD-ROM (Compact Disc Read-Only Memory), in this computers can
read the data present in a CD-ROM, but cannot write new data onto
it. For a CD-ROM, we require a CD-ROM. CD is of two types:
 CD-R (compact disc recordable): Once the data has been written onto
it cannot be erased, it can only be read.
 CD-RW (compact disc rewritable): It is a special type of CD in which
data can be erased and rewritten as many times as we want. It is also
called an erasable CD.
 Digital Versatile Disc: A Digital Versatile Disc also known as
DVD it is looks just like a CD, but the storage capacity is
greater compared to CD, it stores up to 4.7 GB of data. DVD-
ROM drive is needed to use DVD on a computer. The video
files, like movies or video recordings, etc., are generally
stored on DVD and you can run DVD using the DVD player.
DVD is of three types:
 DVD-ROM(Digital Versatile Disc Readonly): In DVD-ROM the
manufacturer writes the data in it and the user can only read
that data, cannot write new data in it. For example movie
DVD, movie DVD is already written by the manufacturer we
can only watch the movie but we cannot write new data into it.
 DVD-R(Digital Versatile Disc Recordable): In DVD-R you can
write the data but only one time. Once the data has been
written onto it cannot be erased, it can only be read.
 DVD-RW(Digital Versatile Disc Rewritable and Erasable): It is a
special type of DVD in which data can be erased and rewritten
as many times as we want. It is also called an erasable DVD.
 4. Blu-ray Disc: A Blu-ray disc looks just like a CD or a
DVD but it can store data or information up to 25 GB
data. If you want to use a Blu-ray disc, you need a Blu-
ray reader. The name Blu-ray is derived from the
technology that is used to read the disc ‘Blu’ from the
blue-violet laser and ‘ray’ from an optical ray.
 5. Hard Disk: A hard disk is a part of a unit called a
hard disk drive. It is used to storing a large amount of
data. Hard disks or hard disk drives come in different
storage capacities.(like 256 GB, 500 GB, 1 TB, and 2 TB,
etc.). It is created using the collection of discs known as
platters. The platters are placed one below the other.
They are coated with magnetic material. Each platter
consists of a number of invisible circles and each circle
having the same centre called tracks. Hard disk is of
two types
 (i) Internal hard disk (ii) External hard disk.
 6. Flash Drive: A flash drive or pen drive comes in various storage
capacities, such as 1 GB, 2 GB, 4 GB, 8 GB, 16 GB, 32 GB, 64 GB, up
to 1 TB. A flash drive is used to transfer and store data. To use a
flash drive, we need to plug it into a USB port on a computer. As a
flash drive is easy to use and compact in size, Nowadays it is very
popular.
 7. Solid-state disk: It is also known as SDD. It is a non-volatile
storage device that is used to store and access data. It is faster,
does noiseless operations(because it does not contain any moving
parts like the hard disk), consumes less power, etc. It is a great
replacement for standard hard drives in computers and laptops if
the price is low and it is also suitable for tablets, notebooks, etc
because they do not require large storage.
 8. SD Card: It is known as a Secure Digital Card. It is generally used
in portable devices like mobile phones, cameras, etc., to store
data. It is available in different sizes like 1 GB, 2 GB, 4 GB, 8 GB, 16
GB, 32 GB, 64 GB, etc. To view the data stored in the SD card you
can remove them from the device and insert them into a computer
with help of a card reader. The data stores in the SD card is stored
in memory chips(present in the SD Card) and it does not contain
any moving parts like the hard disk.
cloud computing
 In Simplest terms, cloud computing means storing and
accessing the data and programs on remote servers
that are hosted on the internet instead of the
computer’s hard drive or local server. Cloud computing
is also referred to as Internet-based computing.
 Cloud Computing Architecture: Cloud computing
architecture refers to the components and sub-
components required for cloud computing. These
components typically refer to:
 Front end(fat client, thin client)
 Back-end platforms(servers, storage)
 Cloud-based delivery and a network(Internet, Intranet,
Inter cloud).
Difference between
Thin clients and Thick Clients
 1. Thin clients :
A thin client is a computer system that runs on a server based
computing environment. They work by connecting to a remote server
based environment, where most applications and data is stored. The
server performs most of the tasks like computations and calculations.
They are more secure than thick client systems when it comes to
security threats. In Thin clients the system management is much
easier as there are centralized servers. With the help of centralization,
there is optimization of hardware and maintenance of software is also
comparatively easier.

 2. Thick clients :
A thick client is a system which can be connected to the server even
without the network. Thick clients are also referred as heavy or fat
clients. Thick clients are not dependent on server’s applications. They
have their own operating system and software applications. They
have high flexibility and high server capacity. Thick clients have more
security threats and are less secure than thin clients.
Factors Thin clients Thick clients

Thin clients have browser based


Installation Thick clients are installed locally.
installation.

Thin clients are used by handheld


Type of devices Customization systems use thick clients.
devices.

In thin clients there is complete Thick clients make use of computer


Processing Type
processing on server side. resources more than server.

Thin clients are easily deployable as


Deployability Thick clients are more expensive to deploy.
compared to thick clients.

The data verification is required from


Data validation The data verification is done by client side.
the server side.

In thin clients continuous


In thick clients communication is done at
Communication communication is required from server
particular intervals with the server.
side.

It cannot be interfaced with other It is robust as compared to thin client and it


Interfacing
equipment. can be interfaced with other equipment.

It has more security threats as compared to


Security It has less security threats.
Benefits of Cloud Computing:
 Scalability: With Cloud hosting, it is easy to grow and shrink the number
and size of servers based on the need. This is done by either increasing
or decreasing the resources in the cloud. This ability to alter plans due
to fluctuation in business size and needs is a superb benefit of cloud
computing, especially when experiencing a sudden growth in demand.
 Instant: Whatever you want is instantly available in the cloud.
 Save Money: An advantage of cloud computing is the reduction in
hardware costs. Instead of purchasing in-house equipment, hardware
needs are left to the vendor. For companies that are growing rapidly,
new hardware can be large, expensive, and inconvenient. Cloud
computing alleviates these issues because resources can be acquired
quickly and easily. Even better, the cost of repairing or replacing
equipment is passed to the vendors. Along with purchase costs, off-site
hardware cuts internal power costs and saves space. Large data centers
can take up precious office space and produce a large amount of heat.
Moving to cloud applications or storage can help maximize space and
significantly cut energy expenditures.
 Reliability: Rather than being hosted on one single instance
of a physical server, hosting is delivered on a virtual
partition that draws its resource, such as disk space, from
an extensive network of underlying physical servers. If one
server goes offline it will have no effect on availability, as
the virtual servers will continue to pull resources from the
remaining network of servers.
 Physical Security: The underlying physical servers are still
housed within data centers and so benefit from the security
measures that those facilities implement to prevent people
from accessing or disrupting them on-site.
 Outsource Management: When you are managing the
business, Someone else manages your computing
infrastructure. You do not need
Flexibility
 Your business has only a finite amount of focus to divide

between all of its responsibilities. If your current IT solutions


are forcing you to commit too much of your attention to
computer and data-storage issues, then you aren't going to be
able to concentrate on reaching business goals and satisfying
customers. On the other hand, by relying on an outside
organisation to take care of all IT hosting and infrastructure,
you'll have more time to devote toward the aspects of your
business that directly affect your bottom line.
 The cloud offers businesses more flexibility overall versus

hosting on a local server. And, if you need extra bandwidth, a


cloud-based service can meet that demand instantly, rather
than undergoing a complex (and expensive) update to your IT
infrastructure.
Mobility
 Cloud computing allows mobile access to corporate

data via smart phones and devices, which,


considering over 2.6 billion smart phones are being
used globally today, is a great way to ensure that no
one is ever left out of the loop. Staff with busy
schedules, or who live a long way away from the
corporate office, can use this feature to keep instantly
up to date with clients and co-worker.
 Through the cloud, you can offer conveniently

accessible information to sales staff who travel,


freelance employees, or remote employees, for better
work-life balance.
 Increased Collaboration
 If your business has two employees or more, then you
should be making collaboration a top priority. After all,
there isn't much point to having a team if it is unable to
work like a team. Cloud computing makes collaboration
a simple process. Team members can view and share
information easily and securely across a cloud-based
platform. Some cloud-based services even
provide collaborative social spaces to connect
employees across your organisation, therefore
increasing interest and engagement. Collaboration may
be possible without a cloud-computing solution, but it
will never be as easy, nor as effective.
 Disaster Recovery
 One of the factors that contributes to the success of a business
is control. Unfortunately, no matter how in control your
organisation may be when it comes to its own processes, there
will always be things that are completely out of your control,
and in today's market, even a small amount of unproductive
downtime can have a resoundingly negative effect. Downtime
in your services leads to lost productivity, revenue, and brand
reputation.
 But while there may be no way for you to prevent or even
anticipate the disasters that could potentially harm your
organisation, there is something you can do to help speed
your recovery. Cloud-based services provide quick data
recovery for all kinds of emergency scenarios, from natural
disasters to power outages
 Automatic Software Updates
 For those who have a lot to get done, there

isn't anything more irritating than having to


wait for system updates to be installed.
Cloud-based applications automatically
refresh and update themselves, instead of
forcing an IT department to perform a manual
organisation wide update. This saves valuable
IT staff time and money spent on outside IT
consultation.
Data Center

 A data center is a facility that centralizes an organization’s shared


IT operations and equipment for the purposes of storing,
processing, and disseminating data and applications. Because
they house an organization's most critical and proprietary assets,
data centers are vital to the continuity of daily operations.
Consequently, the security and reliability of data centers and their
information are among any organization’s top priorities.
 In the past, data centers were highly controlled physical
infrastructures, but the public cloud has since changed that
model. Except where regulatory restrictions require an on-
premises data center without internet connections, most modern
data center infrastructures have evolved from on-premises
physical servers to virtualized infrastructure that supports
applications and workloads across multi-cloud environments.
The Role of the Data Center
Data centers are an integral part of the
enterprise, designed to support business
applications and provide services such as:
 Data storage, management, backup and

recovery
 Productivity applications, such as email
 High-volume e-commerce transactions
 Powering online gaming communities
 Big data, machine learning and artificial

intelligence
Data Center Challenges
 Data Security
 A consistent issue of data center networking challenges is data
security. Data breaches can cost millions of dollars in lost
intellectual property, private data breaches, and theft of personal
information. Risk management and protecting the data stored and
transmitted over the network are the primary concerns of every
data center administrator.
 Power Management
 The most common causes of unplanned downtime are poor
planning and UPS battery failure. As virtualization reduces the
number of servers, the power consumption required for cabinets
and racks continues to decrease. Despite the dramatic increase in
efficiency, blade servers consume four to five times the energy of
previous data storage technologies. This requires data center
managers to avoid this by planning wisely and investing in the right
UPS that can handle the expected load.
 Capacity Planning
 Maintaining optimal performance requires operating your data
center at maximum capacity. Running out of capacity is a
mortal challenge, so IT managers often set aside some fault
tolerance to ensure the operation of the data center.
Additionally, data center infrastructure management (DCIM)
systems, as an efficient way to manage capacity, are also
increasingly favored by managers. DCIM systems can be used to
identify compute, storage, and cooling capacity, while also
helping to manage data centers more efficiently and achieve full
capacity, keeping data centers at risk within limits.
 The Internet of Things (IoT)
 The ability to remotely control sensors creates several
additional problems for data center management. With the
development of the Internet of Things and the massive growth
of system data, data centers have to increase the bandwidth
rate to preferentially process, store and analyze data streams.
Therefore, new data center strategies such as edge computing
must be adopted to control the amount of data.
 Mobile Enterprise
 Mobile computing and some personal devices are also further
troubling data security in the data center. Company employees
also need to be monitored and protected when they access
critical business data through their devices to prevent data
leakage. Also, data breaches require some extra protection
when remotely wiping mobile device memory, tracking and
locking lost or stolen devices. Mobile enterprise computing
presents technical, organizational, and legal issues that data
centers must ultimately address.
 Real-Time Reporting
 The traditional approach to IT monitoring, which involves using
reports, has certain limitations. It can only show what has
already happened and by the time it is analyzed, identified
trends and predicted any instances of failure, it may be too late
to make the right fix. Real-time reporting helps fill this gap by
providing you with real-time data, alerts and notifications to
handle failures in a timely manner.
 Balancing Cost Controls with Efficiency
 High efficiency and low cost are inherent contradictions
of data centers. In data center management, it is not
only necessary to ensure the efficiency, innovation, and
flexibility of the data center, but also to control costs
carefully. As a sustainable construction goal, green data
center requires enterprises to strictly control the energy
efficiency of data centers and enhance their sense of
social and environmental responsibility. The currently
developing virtualization technology can reduce the
physical limitations of servers, storage, and network
equipment on applications, solve the inefficiency
problem caused by application configuration dedicated
servers, and achieve load balance, thereby effectively
reducing data center operating costs.
Queries?

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy