MSM Team Paper

Great Essays
Introduction This paper will cover the IT operating technology that the MSM team relies on and the impact that technology has on the customer. This paper will cover the dominant IT strategy of the MSM team and how it impacts the decision making process. This paper will discuss the technology barriers that present that make continued success difficult. This paper will cover a plan for immediate change including the considerations and processes for that change.
MSM Team’s Operational Technology Here at our work center the MSM team has several networks it must maintain. Most of the networks do not interact with each other so in order for the networks to operate correctly they must all have independently working parts. For example, we must have
…show more content…
For instance, most of the networks have no connection to the outside world. Because of this, updates for our operations systems and applications must be downloaded, scanned and manually uploaded to the servers. This process is somewhat automated by using an off line server called a Windows Server Update Services (WSUS) (Leznek, 2004).
As mentioned before the backup system in place for many of the networks is lacking. Some networks have tape backup. Other networks have no backup system at all. This has a major impact on the continued success of the team’s network. The network will not succeed if there is no data to host. Another technical barrier is the lack of automation of some data transfer processes. For example, there is data that gets sent to our users that must be moved manually between networks of equal classification. The networks are connected to each other and there is no reason the process cannot be automated. This causes the customer to have to wait longer for data that could arrive
…show more content…
Another would be to ensure all networks have dual domain controllers. The more important change would be to replace the current data storage and backup system with an enterprise level solution that incorporates regular backups. The final change would be to implement an out-of-band management network for hard to reach areas of the building. The most important part is the process for the change.
The process of the planned change to take effect would need to be careful thought out. The presentation given to upper management will need to be impressive as to “sell” the solution. Often managers may think a solution will work but, if an IT manager does not do their homework, the solution may not have a resounding impact. Without a resounding impact, the solution may be put on the back burner and never

Related Documents

  • Improved Essays

    Top Secret Inc Case Study

    • 765 Words
    • 4 Pages

    Security Security is one of the major issues faced by the TSI office. Everyone who has access to their network password can easily access the information on the server. This is due to the lack of any security for login (they operate based on sensor input). 7. Lack of Device Drivers The office of TSI also faces issues of lack of device drivers.…

    • 765 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    It has yet been changed to adapt to the new influx of electronic devices. This leaves the integrity policies vulnerable to more advanced cheating methods using electronic devices. As long as the outdated rules and regulations are still in effect, it can not efficiently prevent cheating. Rather as it encourages cheating since it has become easier [1]. The main problem with cheating or exploitation is not so much the individual, but rather the rules and regulations themselves.…

    • 1245 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Hubs, bridges, switches, and routers act in different manners to direct that information traffic so it makes gaining access to the computer(host) or server much more difficult. That being said, there is no such thing as a computer that is 100% secure. In regards to the security of a network, having network segmenting is essential to help protect your information on the…

    • 862 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Even with all these risks, I will still report it to higher member of organization because if our model is not effective then it will badly effect our organization and also data mining team will get a bad reputation. The effectiveness of the data model depends on how it made, if it made good then it will effective otherwise it will be bad. So it is important for a data analyst to make an effective data model otherwise people will start to believe that data mining is always ineffective and there is no good in doing it. Reporting the faults in data model is one of my duty and my other duty is to fix the faults that in found in the data…

    • 758 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    First, the bureaucracy does not work when more than half people in it do not follow the rules. As the bureaucracy must has a clear hierarchical, the target is also separated into different levels. When these tasks has an order, the prerequisites’ not meet will leads to dysfunctions of the after task. In the example, once the mathematics modeling and flowchart absent, the programmer needs to finish all works for members in the same hierarchical level, which is impossible. And the non-fully carrying through of a lower hierarchical level will influence the perfection of upper hierarchical.…

    • 978 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Cost Of Paperless

    • 1035 Words
    • 5 Pages

    with , “To maintain a digital document requires an infrastructure of hardware: servers, personal computers, power cables, electric sockets and software applications for word processing to name one.” Enriquez-Gibson, J. (2015) Next, “In many organizations, the introduction of a new technology is not a good experience. Employees are frequently given access to it, but they are not provided training or a succinct model to follow. This leaves them feeling lost and frustrated. Stratton, A.…

    • 1035 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    Cornerstone Ondemand Essay

    • 1079 Words
    • 5 Pages

    ("Cornerstone OnDemand Reviews", 2017) Weaknesses However, CSOD also has many weaknesses. Cornerstone’s most purchased product suite is their learning management system. Yet, CSOD does not have any learning content of its own, so it either has to resell other vendors courses or allow clients to purchase their content separately and host the content on CSOD’s LMS. This puts CSOD at the mercy of the content providers as they could refuse to work with CSOD which would eliminate their ability to resell their content. Another weakness is that it is sometimes hard to manage remote employees as you cannot observe them as you can in an office.…

    • 1079 Words
    • 5 Pages
    Great Essays
  • Superior Essays

    Virtual Group Challenges

    • 1850 Words
    • 8 Pages

    Working in a virtual group presents numerous difficulties. When you can 't see your team members face to face, and you can 't have the social interaction that fabricates connections and affinity, it can be hard to secure trust. If it isn 't overseen accurately, this absence of trust can undermine everything that the virtual group is attempting to attain. An alternate real test is correspondence, particularly when a virtual group incorporates parts from distinctive countries and cultures. Imparting via email, IM, or phone can be troublesome, in light of the fact that there are no visual signals, (for example, body language or facial expressions) to help individuals comprehend each other and build trust.…

    • 1850 Words
    • 8 Pages
    Superior Essays
  • Superior Essays

    Another key factor leading the reader to believe that the Department of State uses the wisdom method, is that it is extremely difficult for a person to replicate the entire process by which the Department of State gathers information. How is someone supposed to go through the entire process, without having special permissions from the department itself, let alone get their hands on the telegrams which are being traded? It is nearly impossible. There is also a lack of generalization. There are no patterns that the Department of State uses.…

    • 1386 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Even though nowadays most of the places have internet there are still remote places where there is no availability of internet. This disadvantage will soon disappear with the help of mobile browsing and other improvements in connectivity. Security Security is one of the major concern for WBPMS. Even though they are built with topnotch security firewalls there is still a minor chance for the leakage of the data. Infrastructure Companies must have proper infrastructure for using WBPMS.…

    • 776 Words
    • 4 Pages
    Improved Essays

Related Topics