MSM Team Paper

Great Essays
Introduction This paper will cover the IT operating technology that the MSM team relies on and the impact that technology has on the customer. This paper will cover the dominant IT strategy of the MSM team and how it impacts the decision making process. This paper will discuss the technology barriers that present that make continued success difficult. This paper will cover a plan for immediate change including the considerations and processes for that change.
MSM Team’s Operational Technology Here at our work center the MSM team has several networks it must maintain. Most of the networks do not interact with each other so in order for the networks to operate correctly they must all have independently working parts. For example, we must have
…show more content…
For instance, most of the networks have no connection to the outside world. Because of this, updates for our operations systems and applications must be downloaded, scanned and manually uploaded to the servers. This process is somewhat automated by using an off line server called a Windows Server Update Services (WSUS) (Leznek, 2004).
As mentioned before the backup system in place for many of the networks is lacking. Some networks have tape backup. Other networks have no backup system at all. This has a major impact on the continued success of the team’s network. The network will not succeed if there is no data to host. Another technical barrier is the lack of automation of some data transfer processes. For example, there is data that gets sent to our users that must be moved manually between networks of equal classification. The networks are connected to each other and there is no reason the process cannot be automated. This causes the customer to have to wait longer for data that could arrive
…show more content…
Another would be to ensure all networks have dual domain controllers. The more important change would be to replace the current data storage and backup system with an enterprise level solution that incorporates regular backups. The final change would be to implement an out-of-band management network for hard to reach areas of the building. The most important part is the process for the change.
The process of the planned change to take effect would need to be careful thought out. The presentation given to upper management will need to be impressive as to “sell” the solution. Often managers may think a solution will work but, if an IT manager does not do their homework, the solution may not have a resounding impact. Without a resounding impact, the solution may be put on the back burner and never

Related Documents

  • Improved Essays

    Nt1310 Unit 1 Lab 1

    • 439 Words
    • 2 Pages

    Speed, availability, and reliability are vital for a successful network infrastructure in terms of productivity and user experience. When first configuring this lab, I had to make the decision of whether or not to use one server to run all of the services or if the load should be distributed amongst multiple machines. I decided to go with the later, having a separate server hosting the wiki, another providing monitor services, and yet another acting as the DHCP, DNS and AD controller. While the last three were not required in the scope of this lab, I wanted to set up my initial network in a scalable manner, and this was the best solution for future growth. Distributing the services across multiple machines helps to reduce the processing that each box is required to do in order to fulfill requests.…

    • 439 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    Introduction The current information technology (IT) infrastructure consists of a mix of 2008 and 2008 R2 servers, with two legacy Windows 2000 servers, and four Windows Server 2012. In addition to the Windows server environment, the network consists of routers, switches, and security appliances, such as firewalls. The environment also consists of important services to ensure the security, and stability of the network.…

    • 922 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    What different people will use the system for 5. Recourses needed Everything is done by hand and there is a poor filing system, therefore there is a great likelihood that important documents will end up accidently misplaced, disregarded or out of date. Basic tasks take much longer than they should and customers have to wait in long queues. A lot of money gets thrown away unnecessarily, for example, on paper and printer ink.…

    • 577 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    In OSI stack, presentation layer converts data transferred by the application layer of the transport node. The functions of presentation layer are : 1. Data transcription 2. Data reconstruction 3.…

    • 139 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Upon determining what should be in the intranet, what risk is the organization willing to tolerate should be tackled. An assessment of the privacy controls and security controls can be determined by using NIST Special Publication 800-53A: Assessing Security and Privacy Controls in Federal Information Systems and Organizations, Building Effective Assessment Plans as a guide along with NIST Special Publication 800-30, Rev-1, Guide for Conducting Risk Assessments (NIST SP 30-1, 800-53A). To truly understand this publication is prohibitive to fully explain; however, this step is critical and will impact your intranet dramatically. To simplify: you cannot always have the risk metric you desired because by doing so would make your system so slow and unusable you could not accomplish much.…

    • 428 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Nt1310 Unit 3

    • 115 Words
    • 1 Pages

    Network security specialists detect, prevent and resolve security threats to computer networks. Security is an important aspect in businesses operating various Networking systems. Securing your company’s network consists of identifying all devices and connections on the network; setting boundaries between your company’s systems, enforcing controls to ensure that unauthorized access can be prevented, and contained. Network should be separated from the public Internet by strong user authentication mechanisms and policy enforcement systems such as firewalls. Another important factor is that Wireless Local Area Network should be separate from your company main network so that traffic from the public network cannot navigate through the internal…

    • 115 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    At last, there are different workplaces in the building. Each of these workplaces will have one PC for staff use, except for the confirmations office, which will have five PCs. There will be two server rooms, one on the first floor and one on the second floor. The main requirements for designing the network are: • Student-got to PCs ought to be on separate network from the staff systems. PCs for open utilization ought to be on a different system.…

    • 877 Words
    • 4 Pages
    Great Essays
  • Decent Essays

    This would lower some of the work load on the IT section and furthermore provide staff members with an opportunity of growth in their…

    • 246 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Most wide area networks are made from several Local area networks connected together. A Local area network covers a small area. However, the Internet is a wide area network. This means the devices can be shared and this is effective for the reason that employees can see the possessions and it is faster and it ensures the company knows what is occurring. Network users can communicate by email and instant messenger.…

    • 542 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    For this section of the report I will explain the management tools and technologies used for communicating through network to network, I will also give example on how these tools are used especially in business. Operating systems are simple software which will enable the user to be able to access function to the computer itself, the process is an input and output process where the user will input a function, e.g. through keyboard, and the output will be shown through the monitor. There are many different types of operating systems and depending on your hardware (computer), you can have a different operating systems, in different electronic devices, from computers to mobile phones and tablets. Here are the most common computer operating system:…

    • 2216 Words
    • 9 Pages
    Improved Essays
  • Improved Essays

    MGMT-591 Week 3 Team Project Team Collaboration Solutions DeVry University Professor: Dr. Rachid Ameur Introduction The golden gees to any organization is the employees. They are the factor that influence company’s profitability and productivity. Productivity in an organization is the direct result of the amount of motivation an employee has within his/her work environment. If the employees of an organization are not motivated, the productivity falls and employee turnover may increase significantly.…

    • 672 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Roles of Core Technologies in an Effective IT System Technology permeates all aspects of modern civilization. It is woven into the fabric of our daily lives. What was once barriers to knowledge and communication have been stripped down as we are now connected, in an instant, to the farthest reaches of the globe. With every new advancement comes an opportunity to usher in a revolution in how societies live, work, and play. The major players that make it all possible are the men and women who create and manage the technology we use today.…

    • 996 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Notably, a successful change initiative depends on how employees understand such change. Change of any kind will always encounter some challenge. To attain successful change, change initiators in the within an organisation should understand the change implications, not solely to the organisation but to the concerned employees as well. Seemingly, when the choice of initiating change is made, initiators will be required to state the vision for such practice. Unless such visions are shared with concerned subordinates, it is unlikely that they will accept the practice totally.…

    • 1041 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    The purpose of this paper is to describe the network configuration, explaining the role of each component and connection of the scenario provided. Specifically, I will discuss the functions of the components and describe how they contribute to the network. Along with this I will modify the appropriate components of the provided database with the information regarding the employees’ computers and the upgrade. Network Configuration Network configuration allows a system admin to set up a network to use to communicate. Per Techopedia, “Network configuration is the process of setting a network 's controls, flow and operation to support the network communication of an organization and/or network owner.”…

    • 923 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    It is important that the message be sent loud and clear to all employees within the organization that the change must be attacked with an extreme sense of urgency. It is also important for the top level of the organization to have a realistic plan in implementing change. Many times top level management overestimates how many big changes they can force early on. They also underestimate how hard it is to drive people out of their comfort zones (Kotter, 1996). In order to achieve this management must create a powerful…

    • 1777 Words
    • 8 Pages
    Superior Essays

Related Topics