StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Summary hardware, software findings - Research Paper Example

Cite this document
Summary
There are different hardware components which have been installed in the company. Most of the software is Windows based as the…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.7% of users find it useful
Summary hardware, software findings
Read Text Preview

Extract of sample "Summary hardware, software findings"

Hardware and software component summary Number: Lecturer: Hardware and software component summary Intel Corp has done all it could do to ensure that the departments are well equipped with the latest in terms of computer software and hardware. There are different hardware components which have been installed in the company. Most of the software is Windows based as the operating system is also Windows. There are information systems which have been installed in the company that are used to undertake the various issues and processes within the organization.

One such information system is that of Customer Relationship Management software. This is special software that is used by the human resource department people and the marketing department to record and manage knowledge of the customer. This is a special information system that is procured differently from the rest of the software. This information system, however, is not fully owned by the Intel Corp company. This is because it is hired from the cloud service provider (Blundell, 2008). Another important feature of the architecture of hardware and software of Intel Corp is that it has adopted the latest technologies in their system.

There is the use of cloud computing in their network. This technology helps to overcome the challenges of having servers and whole applications on the local site. This system and arrangement are seen in the way the company operates the CRM software. The CRM software is accessed from the cloud service provider. This means that the company does not own the software system in full (Hamlet, 2010). Another important aspect that can be seen in the software is that of using one vendor to procure the software.

Most computers are installed with Windows Operating systems and Windows based software applications, like office suites and utility programs. The hardware components that are found in the company are seen to adopt client-server architecture in most of the structures that have been analyzed and presented so far. Most of the computer hardware is structured in such a way that the machines depend on each other to access the important server parts of the hardware. The hardware that is used use the latest technologies and have higher speeds in their structures.

They are installed with the latest technologies and applications. One deficiency that I find with the software is that they are from one vendor. As stated earlier, most of the applications are for Windows. In case there will be a need to have an upgrade so that there other applications from the other vendors, this could be a tedious and difficult task. This is because there is no arrangement that has been done to ensure that the future installations of different applications are well taken care of.

Another deficiency is that of efficient security. In the arrangement, there are no security policies that have been set in place to ensure that the users are aware the importance of security in the organization. There is also some lack of privacy in the way human resource data are handled. The data has been outsourced to a third-[arty, the people handling the cloud computing architecture. There is no clear policy that has been put in place to ensure that the data in the cloud are safe. Even though this is a new technology, a clear cut policy that will define how the third-party will use and share the data has not been put in place.

Another issue is that there is no parallel system that has been set to ensure data recovery and business continuity. In case there is problem/disaster, the business continuity will be disrupted. ReferencesBlundell, B. (2008). Computer hardware. Cengage Learning EMEA.Hamlet, D. (2010). Composing software components: A Software-testing perspective. Springer.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Summary hardware, software findings Research Paper”, n.d.)
Summary hardware, software findings Research Paper. Retrieved from https://studentshare.org/architecture/1609411-summary-hardware-software-findings
(Summary Hardware, Software Findings Research Paper)
Summary Hardware, Software Findings Research Paper. https://studentshare.org/architecture/1609411-summary-hardware-software-findings.
“Summary Hardware, Software Findings Research Paper”, n.d. https://studentshare.org/architecture/1609411-summary-hardware-software-findings.
  • Cited: 2 times

CHECK THESE SAMPLES OF Summary hardware, software findings

Analysis of Technological Activities and Their Impact on the Financial Performance of the Firm Article

summary It is vital to note that this paper analyzes technological strategies' impact on financial performance of a firm.... It is vital to note that this paper analyzes technological strategies' impact on financial performance of a firm.... It is analytic in the sense of relating different firm articulations to financial scenarios… Critical review on the article “Technological Activities and Their Impact on the Financial Performance of the Firm: Exploitation and Exploration Within and Between Firms”....
8 Pages (2000 words) Essay

Client Software Requirements

Information System for a FBO Name Institution Table of Contents Information System for a FBO 1 Name 1 2 Introduction 3 Schematic 3 System requirements 4 Hardware Requirements 4 Other peripheral devices 5 Basic Structure of the network 6 software Requirements 6 Server software 6 Client software requirements 7 Operating system 7 Application software 7 Conclusion 8 Reference 9 Introduction A fixed base operator to a commercial business which is given to entrepreneurs by airport authorities to operate in the airport by providing anaerobically services....
4 Pages (1000 words) Assignment

Simulation of Address Resolution Protocol

HTYPE (hardware Type).... HLEN (hardware Length).... SHA (Sender hardware Address).... THA (Target hardware Address).... LEN (hardware Length).... HA (Sender hardware Address).... HA (Target hardware Address)....
28 Pages (7000 words) Dissertation

Project Analysis and Planning in VMware

nc, 2014) Virtualization software has four main objectives.... In the event that a computer crashes, retrieving software becomes very difficult if the computers do not have a virtualized infrastructure causing increased costs in rectifying the problem and downtime before the problem has... Use of more hardware resources than before, reduction in cost of management and resources, improves flexibility of businesses, security and downtime.... Earlier, hardware resources were not being put to full use....
15 Pages (3750 words) Essay

Performing Effective Project Monitoring and Risk Management

Sponsorship brings in a lot for a product or service and this is because it adds the purchase propensity, it builds a… Therefore, the mobile application development project would need good sponsorship in order to be able to buy the best software and hardware for the product to be a success. A project plan summary is a way of providing details information It provides the tools that are going to be and guidance on the way forward.... Therefore, the application should function well and the software should be up to date....
4 Pages (1000 words) Essay

Validation of Forensic Tools and Software

A forensic tool validation report focuses on how the report could be used to support the findings of a forensic examination.... The paper "Validation of Forensic Tools and software"  explains how the tools are validated and the information required in a tool validation report.... One can use them in the evaluation of software in order to find out their effectiveness in performing an attack or defense....
7 Pages (1750 words) Coursework

Virtualization of Information Systems Technology

First, a study of virtualization at different levels is given detailing information about hardware level, operating system level, and application-level virtualization in the contemporary application of information systems.... nbsp;   … In addition, an examination of how this spectacular innovation has enhanced the ability of existing hardware has been provided.... With virtualization, hardware has been stretched to unimaginable levels, and concerns over storage, safety, and availability of information will soon be a thing of the past....
9 Pages (2250 words) Essay

Current Framework for Dicom Annotations and Viewer

The software is very expensive and cannot be easily accessible by an average radiologist.... The software is called PROPAXX whereby it is used in archiving, processing, and viewing thereby offering flexible and functional support for diagnosing the acquired x-ray images.... Due to a reduction in the prices of peripheral devices and hardware, machines having higher hardware specifications can be found at affordable prices....
6 Pages (1500 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us