Intranet project and Self-service portal system for Dingwow Inc.

Intranet project and Self-service portal system for Dingwow Inc. Business goals and project goals There are a number of business goals associated with the project. First, the self-service portal aims at enabling users to combine data from a variety of sources into a configurable and highly flexible interface. Second, the self-service portal will provide customizable and self-sufficient IT solution that will bring more benefits to the company. The major business goal will be to cut down the costs of running the business or administrative costs. Another benefit is streamlining common processes in the organization which will enhance smooth workflow between departments and various branches nationwide. As such, sharing of information between departments and branches in different geographical locations will be much easier. The self-service portal solution is tailored to meet the needs of both large and medium organizations (Meyler & Bengtsson, 2015). Other goals include centralization of service requests for internal services, built-in customizable routing, form data capture from various processors such...
Read More
Services in my Area

Services in my Area

Services in my Area Identify the DSL and cable modem services referenced in this assignment The local carriers in the region include Verizon, AT&T, and Road Runner. Verizon Communication Inc. is responsible for providing digital subscriber line technology (DSL). Specifically, Verizon provides what is commonly referred to as Asymmetric xDSL. This comprises of an optical carrier. It uses fiber optics to carry data among users, although it is not cable modem internet technology. Verizon provides its services in numerous states such as Louisiana, District of Columbia, Connecticut, Kansas, and others. AT&T provides DSL internet access in the area of which I am currently subscribed. AT&T lacks compatibility with dial-up and cable modems, meaning that it only provides DSL internet access. AT$T provides services in places such as Washington, Montana, Colorado, Utah, Idaho, Montana, Oregon, Iowa, Missouri, Minnesota, North Dakota, Kansas, Wyoming, and among others. Speeds of DSL and cable modem The speeds of DSL and cable modem vary greatly. Most Americans are faced with...
Read More
Case Study 3: Carlson Companies

Case Study 3: Carlson Companies

Carlson Companies How the Carlson SAN approach would be implemented in today’s environment SAN approach can be implemented in a similar fashion to the one outlined in the case study. The main focus during implementation lies in ensuring a seamless migration from the old system to the new one. In database management, IT experts aim at ensuring there is a smooth flow of data from one point to another. During implementation, IT experts must ensure that users are not in any way affected by the migration process. Since problems are likely to occur, they must ensure that these are identified early enough before leading to high losses. The approach used by the company meets all the necessary requirements, for instance higher storage capacity, use of common IP networking protocols, data backup, and cost effectiveness. Pros and cons of consolidating data on a SAN central data facility versus the dispersed arrangement it replaces There are a number of benefits and drawbacks in consolidating data on...
Read More
Case Study 2: ING Life

Case Study 2: ING Life

Case Study 2: ING Life Technology is rapidly evolving in the modern business world and thus the need for ING Life to embrace new and emerging technologies. New inventions and innovations are coming up and any serious business has to understand the changes that occur in its technological environment. This will ensure that they stay competitive and keep up with the market trends otherwise they will lose business to the competition. There are various risks and difficulties that businesses face in their day to day operations through interactions with their environment and to deal with them, they would have to understand and classify the risks. The internet, which is widely used as a medium of communication in different geographical areas, is one of the public infrastructures which ING Life heavily depends on for normal business operations. Despite the multiple benefits associated with using the internet, it may come at a high cost to the business.  The internet poses numerous risks and difficulties...
Read More
Elastic and Inelastic Traffic

Elastic and Inelastic Traffic

Elastic and Inelastic Traffic Internet traffic to an organization's web page is a fundamental component of the company’s ability to conduct its business through the internet. It is a frustrating experience when a specific website is not reachable, or the access is slow (Zhang, 2012). Basically, there are two types of internet traffic: elastic and inelastic internet traffic. Elastic traffic can adjust, over wide ranges, to changes in delay and throughout across the internet and still meets the requirements of its application. On the other hand, inelastic traffic does not easily adapt, if at all, changes in delay and throughout across the internet. Currently, web traffic is about one trillion bits per second and surprisingly, it is on the rise, and soon it will hit three tbps. Names are assigned to varied genres of devices in the modern networks, workstation, servers, and routers. A well-designed naming model should enable users to access the created device by name. The name of the sources...
Read More
Florida Department of Management Services

Florida Department of Management Services

Florida Department of Management Services What security mechanisms are need to protect the DMS systems from both state employees and users accessing over the internet? There a two security mechanisms that can greatly help in protecting the DMS system from threats caused by state employees and users either knowingly or unknowingly. These security mechanisms include use of Internet Protocol Security (IPsec) and Virtual Private Networks (Shoniregun, 2007). Internet Protocol Security is defined as a protocol suite that enhances security of internet protocol communications through encrypting IP packet data for every communication session. IPsec can be applied in implementing mutual authentication between various agents and also in determining the cryptographic keys necessary during each session. IPsec can be used in enhancing security primarily of data flows through three major ways. First, it can be used to secure data flows between security gateways. This is also referred to as network-to-network protection. Second, it can protect data flows between a pair of hosts, and lastly,...
Read More
Requirements for the Corporate Computing Function

Requirements for the Corporate Computing Function

Requirements for the Corporate Computing Function The new policy identifies meeting the information requirements of management as one of the key objectives in the requirements for the corporate computing function. A project’s life cycle is determined by the ability to meet requirements. In information management, the system should be able meet the needs of users or otherwise it is deemed an information systems failure (Watson & Jones, 2013). The functionality of a system is of critical concern to the management. The functionality of an information management system relates to what the system should do and how it should be done. Functionality is one of the key requirements of management in an information management system. Another critical aspect that management is concerned with is the performance of the system. Performance requirements in an information management system are met by the number of transactions the system can handle per second, response time for any transaction, and resource utilization in terms of disk and...
Read More
Environmental Assessment Group of the IEEE-Standards Research

Environmental Assessment Group of the IEEE-Standards Research

Environmental Assessment Group of the IEEE -Standards Research The Environmental Assessment Group of the IEEE is currently engaged in developing standards that outline environmental performance criteria of electronic products. The aim of the group is to ensure a safe design of electronic products to reduce their impact on the environment. The group develops standards for design and manufacturing and which can be applied in the industry by governments, consumers, corporate bodies, and institutions. The group plays an important role in enabling corporations to earn market recognition. The IEEE 802 is of great significance in networking. IEEE 802 defines LAN standards for various physical components applied in a network such as cabling and interface cards (Stallings, 2009). The networking standards identified under the IEEE 802 define the physical layer specifications that are applicable to Ethernet and wireless technologies. By identifying defining standards in this field, IEEE 802 ensures that equipment from different manufacturers are able to share information and at high speeds. Some...
Read More
Desktop Virtualization

Desktop Virtualization

Desktop Virtualization  Desktop virtualization has gained prominence in the recent period with most organizations opting to adopt the technology. Desktop virtualization refers to a software technology in which the desktop environment is separated from the physical desktop or computer. In other words, there is the physical computer which depends on a segregated or virtualized desktop stored on a remote environment. Although the concept is new, there is not much difference to the traditional desktop environment. The major difference is that in desktop virtualization, input-output functions as well as other user commands are handled by a centralized server. This gives the administrator more control of the entire system. This paper will analyze desktop virtualization including the associated software and make a recommendation of the best virtualization software to use in the organization. Compare and contrast top three brands of virtualization software available             The leading brands of virtualization software available include VMware vSphere, Citric XenServer and Microsoft Windows Server. VMware is one of the...
Read More