Looking for a good sample?

Let us find the best one for you! What is your topic?

Over 850,000 documents to help brainstorm your essay topic

Haven't found the Essay You Want?
GET YOUR CUSTOM ESSAY SAMPLE
For Only $13/page
3 views

Case Study Example Essays

Case Study, Stage 1| Analysis and Recommendation| | | Challenge/Opportunity Area for SUH The SUH Corporation historically has enjoyed success based upon the efforts of its regional sales representatives. The case study dictates that the sales force currently utilizes individual laptops and does not have policies in place that govern information storage nor data replication. Additionally, the organization faces challenges when equipment reaches its life-cycle as well as when personnel must receive product training.
Because SUH has recently acquired two organizations beneath it management umbrella and will be a sales based enterprise instead of a service-oriented venture, I selected sales support as the area of improvement. Recommendations The first area that must be addressed through the use of recommendation in order to improve the productivity of the workforce is the implementation of a scalable foundation for the network infrastructure.
The infrastructure could be created through the allocation the assets currently located at CarbonTech as the enterprise server farm. Next, the individual laptops, CarbonTech’s automated resources and any assets possessed by MyRentals will become clients of these devices. Because CarbonTech is resistant to change and has already established a robust infrastructure that has enabled it to be very profitable, all subordinate organizations will utilize the software environment established by CarbonTech.
The use of assets already owned by the organization will significantly reduce the cost of implementation of a universal automated solution for the organization. In spite of the vast quantity of information detailing operations of client-server computing, there still remains confusion in defining what exactly constitutes the client and what constitutes the server within this concept. Both the client and server are software applications and not the hardware components or platforms upon which the code is executed.
In its simplest form, the client-server architecture involves a software application, the client, making a specific request which is fulfilled by another software application, the server. In order to satisfy the client’s transaction request, the server may have to refer to an additional information source which could include but is not limited to: a software database or another autonomous system. In many automated infrastructure architectures, a client can make requests of multiple servers and a server can service multiple clients (Gallaugher, Ramanathan, 1996).
The implementation of the client-server based network infrastructure model inherently lends itself to scalability which will mitigate the costs incurred should the organization experience growth because it will not require a redesign due to its hierarchical design. More importantly, this solution will provide a solid foundation to build upon to address the challenges faced by the organization when data is stored or replicated. The next area that must be addressed is the organizational operational policies and security.
Because there are not established guidelines that govern the storage or replication of data from the individual mobile computing devices that the workforce utilizes, this inherently creates challenges with securing vital business transactional information as well as any proprietary information that may be contained on the platform as well as other automation resources located throughout the corporate intranet. Therefore, this recommendation must be two-fold.
First it requires the drafting of a document that clearly indentifies acceptable methods of transferring data between devices on the organizational intranet, protection methodologies that will utilized to protect the corporate intranet form vulnerabilities contained on the Internet and finally penalties for violating the established guidelines. Next, my recommendation would be to implement a software device protection asset such as McAfee’s Host Based Security System.
Establishment of the network infrastructure and protecting it through the use of organizational policy and asset protection deployments will allow us to transition to the final recommendation for improvement, integration of mobile high speed Internet connections onto the individual laptops and a high speed Internet connection for the server platform. Benefits to the organization will include but not be limited to: mitigating the need to travel to company headquarters’ for product training and increasing security by ensuring that the individual laptops are in compliance with applicable security policies.
Proposed IT Solution Because SUH Corporation will be composed of three organizations that will produce components and be tied together in their pursuit of success, a solid network infrastructure that ties the entities together becomes paramount. The recommendation I would purse with aggression is the utilization of the assets currently located at CarbonTech to become the organization’s enterprise server farm. As the enterprise server farm, these assets would become the centralized point for data storage and replication. Solution fit to Challenge/Opportunity
The enterprise server solution will benefit SUH Corporation by providing structure to the organization in its information storage needs. Additionally, the enterprise server solution could be utilized to implement the necessary security polices throughout the corporate intranet with moderate incurred expenses. Works Cited: 1. Gallaugher, J. ; Ramanathan, S (1996) The Critical Choice of Client Server Architecture: A Comparison of Two and Three Tier Systems Retrieved from https://www2. bc. edu/~gallaugh/research/ism95/cccsa. html

Sorry, but copying text is forbidden on this website. If you need this or any other sample register now and get a free access to all papers, carefully proofread and edited by our experts.

Sign Up Login We can't stand spam as much as you do No, thanks. I prefer suffering on my own