StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Internal Feasibility Analysis to Upper Management - Example

Summary
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96% of users find it useful

Extract of sample "Internal Feasibility Analysis to Upper Management"

Summary of system design The system that the Impressive Network Studio (INS) intends to design for the QSL Criminal Lawyers is certainly going to solve its major issue of lack of a good network system in its office; hence ineffective communication within the business premises, information inefficiencies and documents security. To solve this problem, INS will design an appropriate system that is effective and efficient to implement in the QSL. Being a company that is dedicated to develop and design network, the company’s main goal is to ensure high customer satisfaction. INS bases its operations on its core principles, which include building up the best, fastest, efficient, secure, and most affordable network. INS proposes to design a network system for the QSL. The system will compose of a network connection between its three offices in New Castle, Sydney and Wollolong. The offices need a central network for the business to ensure effective, efficient, fast, and secure information exchange. The system will see the end of the traditional means of communication in the company, which involved use of emails, hard copy deliveries by couriers and post. The system will be designed in such a way that each company staff has an account in which he can log in and read or send any information to colleagues in the same department, other department and the other offices. Through the network, the office records will be kept centrally and anybody who needs to access them can easily do so through their respective accounts. Users can also send work reports to their seniors through the system. Besides, the network will allow the firm to store its customer information in its database, where confidentiality and accuracy will prevail. The network type that will be connected to the QSL Criminal Lawyers will be Local Area Network (LAN) and a wireless internet connection. Internet cables will be connected to all computers in every office and a hub will be installed in the office. The network will allow easy and fast uploading and sharing of files and documents among staff members in the company. It will also involve basic word processor software, which is MS Office 2003 version to facilitate an improved management of the business documents. Additionally, the central storage server system will be necessary in safeguarding documents and will require a minimum speed of 200kb/s. In the system, the staff of the QSL Criminal Lawyers will be able to access all the vital information regarding the firm’s operation as long as they are authorized. The system will be user friendly for the users will interact with it easily and efficiently. The fast network will manage all the business cases as well as connecting the three offices of the company. What is more, the system will be connected to every office devices including scanners, laser printers, and computer servers. This will offer the company an opportunity to effectively satisfy its customer needs through a fast, efficient, and secure means. The network will greatly minimize the use of email in handling its sensitive business documents and information. The new system will also be a low maintainability and fault tolerance. Nevertheless, it is important to ensure suitable scalability. Further, the fact that QSL Criminal Lawyers handle highly sensitive information in terms of legal cases, there is a great need for a secure system of managing information. Therefore, the proposed system will be essential in providing the crucial security in terms of storage and handling of the information. This will be achieved through restricted access to the documents. The use of passwords and encryption will also enhance data security in the network (Gutwirth, Poullet, & Hert, 2010). The ability of the system to handle heavy workloads will be a great advantage to the company as portrayed by the existence of three offices and many members of staff. The new system will require updated office equipment. The new system will be efficient in that it will be capable of interfacing with other existing technology in the company. This implies that the company will not completely get rid of its old technology and staff, but will rather be required to upgrade. For instance, the existing staff will be trained on the new system’s usage, even though new staff with information technology skills and experience will be highly indispensable. Another important thing that that will be necessitated by the new connection is the need to redesign the office environment. The current environment is quite different in the sense that there is no connection between three offices. There are so many hard copy files in the office cabinets and huge stacks of papers in the office. With the new system in place, there will be need for additional computers, printers, scanners and other necessary hardware and software in the office. Since the internet cable connection to all the devices in the office, redesigning the office environment will be essential. It will be imperative to redesign it because cables should be arranged in one area so as to avoid obstruction of people or even falls. Poor arrangement of the data and electric cables can cause serious damages in the office, such as, electric faults and falling of people and devices to which they are connected (Gutwirth, Poullet, & Hert, 2010). As well, INS intends to create a safe working environment for the QSL staff through the connection of the new network. It plans to achieve this by ensuring that the office environment is designed to allow for safe connection and use of the new network. This can also be achieved by putting in place proper security systems. The server and storage systems in the company will need serious security measures because of the sensitivity of the information involved. Some of the information kept in the office belongs to trainee lawyers, lawyers, supervisory legal secretaries, receptionist, and managers. Besides connecting the new network in the company might compromise with the security and privacy of the information. In terms of the budgetary requirements involved in the connection of the new system, the company will incur various costs. These costs will include capital items, which relate to the purchasing of new and additional software and hardware. It will also involve costs regarding materials used, as well as service provider costs. The management and maintenance of the system will also require specific costs, especially annually. To make the design tolerant to faults, various steps will be followed. First, INS will ensure that information redundancy, which seeks to offer fault tolerance by coding or replicating the data. Some of the information redundancy samples include Error Correcting Codes (ECC) memory, parity memory, and ECC codes on information blocks (Nelson, 2011). Secondly, the system’s fault tolerance can be attained though time redundancy. This is possible as the system will perform an operation repeatedly. Some of the instances of time redundancy include retransmissions and timeouts in dependable point-to-point as well as group communication. This will help the system especially during intermittent or transient faults (Hill, 2009). The third of creating fault tolerance of the system is through physical redundancy. This handles only devices, and not data. Here, INS will put in place additional equipment that will allow the system to manage the loss of certain faulty components. Backup name servers and RAID disks are some of the ways of achieving physical redundancy (Nelson, 2011). Power control is another way in which the company proposes to make a fault-tolerant system. This is attainable through the use of an Uninterruptible Power Supply (UPS). The effectiveness of this measure lies on the ability of the systems to shut down systematically without losing information (Hill, 2009). References Boehm, F 2011, Information Sharing and Data Protection in the Area of Freedom, Security and Justice: Towards Harmonized Data Protection Principles for Information Exchange at EU-level. Verlag, Berlin: Springer Science & Business Media. Pp. 1-30. Gutwirth, S & Poullet, Y, Hert, P 2010, Data Protection in a Profiled World. Verlag, Berlin: Springer. Pp. 10-40. Hill, DG 2009, Data Protection: Governance, Risk Management, and Compliance. New York: CRS Press. Pp. 15-35. Nelson, S 2011. Pro Data Backup and Recovery. New York. Apress. Pp. 1-25 Read More
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us