Download as pdf or txt
Download as pdf or txt
You are on page 1of 7

INFORMATION SYSTEM FOR MANAGERS

1. IT infrastructure is a cluster of IT elements, networking, programming, and human resources working


together to help in the design, growth, release, management, administration, and keep a company's
entire IT. IT infrastructure can be installed on company or else cloud's properties. Hardware,
programming, connection components, a software system, and information management are
distributed throughout the body to supply IT items and solutions. Even when an IT infrastructure isn't
correctly built, firms might have connection and performance, consisting of cybersecurity troubles,
such as systems disruptions and assaults.

Some of the business considerations that Farokh must keep in mind include:

a) The need of reliable IT infrastructure

A well-managed IT infrastructure gives reputed & reliable security, quick rates, links, staff
member relationships, and a jubilant consumer experience. A solid IT infrastructure would help
the company in creating, managing, along with high treat products that suffice the demands of
their consumers and produce revenue. In addition, a robust IT architecture can scan and provide
business clients' expertise.

b) The need for a flexible IT infrastructure that can easily be adapted to changing company needs

Flexible infrastructure can adapt changes while also becoming more promising till the end. It is
an infrastructure in which flexibility has been inculcated into the design. This reduces the
management prices as well as increase economic production for a business. Resilient and flexible
infrastructure is important for establishing an encouraging IT infrastructure that satisfies the
firm's ever-changing expectations.

c) The need for an IT infrastructure that is robust and cost-effective.

A small or medium-sized is least likely to be concerned about its infrastructure expenditures -


functional divisions don't effectively understand whatever is contained inside this concept.

Some of the technical problems that Farokh must take into account include:

a) Ensuring that the company's IT infrastructure is secure

Network protection is the method of protecting crucial information and networks from physical
as well as electronic attacks. IT infrastructure safety and security are important for safegaurding
companies from cyber assaults. Large-scale cyber on a company's current IT network could
damage its brand and threaten its procedures.

b) Ensuring that the company's IT infrastructure is scalable

A company's or entity's capacity to increase to meet the growing need is concerned by


scalability. Expanding a company requires management for new customers, properties,
and information which is why scalability is very crucial. The ability to effectively manage such
improvements indicates that a firm might maintain the overall prevalence of its items or
procedures simultaneously maintaining its system effectiveness.

c) Ensuring that the company's IT infrastructure is reliable

IT infrastructure that is versatile, reliable, and secured might help a company accomplish its
objectives, consisting of offering a benefit on the market.

Infrastructure Law Farokh has to keep in mind are as follows: -

1. Moore’s law and Micro processing power: -

Moore’s Law states that computing capacity can be increased every two years if we double
the number of transistors. With the increase in the number of transistors, the performance
also increases and the cost decreases. This observation was done by Intel engineer Gordon
Moore, who was a pioneer in integrated circuit development and computer microprocessors.

2. Law of Mass Digital storage: -

The Law of Mass Digital Storage states that the amount of digital information produced
worldwide doubles every year and on the other hand the cost of storing digital information is
falling at an exponential rate

3. Metcalfe’s Law and network economics: -

Metcalfe’s Law is one of the most foundational principles of network economics. It also
states that as much as network grows its value grows even faster than its user base.

Metcalfe’s law states that while network cost generally grows as direct proportion of its total
number of nodes, its value grows in proportion to the square of that particular number.

So, to conclude, Farokh Motorwala being the CTO at D’Costa Cosmetics has to keep the above mentioned
Technical and Business Considerations as well as Laws of IT Infra in order to revamp the firm's IT
Infrastructure and align it to the Corporate Strategy.
2. The chief executive officer must be directly accountable for a sector's success or failure and controls
numerous activities. Such as management, financing, promo, income, human resource management,
regulative, and technological, while managing the requirements of workers, customers, shareholders,
and various other components.

The chief executive officer supplies data primarily on the external globe to top management, leads,
and aids workers with establishing, implementing, examining, and evaluating sprucing up plans at
critical operations systems' based on crucial preparation.

Chief executive officers must make informed options for themself; however, they create their team's
judgment skills, enable judgments that enhance marketing methods, and gain buy-in to decisions
made. Skilled, in addition, to prompt choices, increase a company's effectiveness.

The Chief executive officer could deliver reasonable service offerings, consisting of all shareholders,
from strategy to execution, including multiple aspects and functionalities of business.

Human Resources Management including Sequence Preparation, Labour Relations, Training and
Development, Refine Improvement, Payment And benefits, Compensation & Benefits, Assistance
Legislation, Disciplinary Strategic planning, and so on.

The Chief executive officer claims that such prenatal introduction to toughness training at numerous
locations helped them understand business and interpersonal operating procedures and how to
combine personal dignity with business demands.

He appears to be a significant follower in the practice of simplification and individualized solutions,


as each business is a human organization. Any firm cannot take advantage of raw data.

Database handling is the procedure of getting the essential information and turning everything into a
helpful strategy and therefore a promising aspect for profit maximisation.

Phase process method is mostly used by a group of data professionals, including software
programmers at such a firm. Raw information is collected, refined, classified, adjusted, assessed, and
archived before being shown in a form of complete processed data. Data processing is important for
companies to create more Impactful advertising and marketing strategies and acquire market share.

A Primary source of information is a source of information, suggesting it was collected primarily by


a private investigator directly for a certain research or task's purpose. Crucial information can be
collected in a range of approaches.

The commodity chain's core features consist incoming logistics, running logistics operations,
marketing and service, and services. Few of the Examples of sustaining or supplemental operations
are procedures approach, human resources management, consisting of investing.

Fundamental activities use the ambiance's sources such as soil, freshwater, flora, building and
construction devices, and mineral deposits so they are thoroughly related to the atmosphere. CEOs
within the coming before category believe method development comes near customers in functional
departments.
Based on these Chief executive officers, the fundamental duty appears to be to inculcate specific
worth, habits, and attitudes within the firms by carefully monitoring their employees' development
and growth. Such administrators are usually on the move, committing most of their power to expert
jobs, including recruitment, performance appraisal, and career management.

Employees of whatsoever degrees of the firm behave and carry out selections the same way as the
Chief Executive Officer does. Typically, prolonged employees regularly show "corporate
requirements value service technique" behaviours.

So, to conclude, the chief executive officer seems to be the best police officer in any BPCL, reporting
to the business's directors. Developing and executing the business instructions, distribution of cash,
and establishing as well as monitoring the executive group are all critical responsibilities. CEOs must
take on decisions that has good influence on the business daily. Therefore, they must have great
decisions and genuine issue capacities. To keep the system operating on the ideal course, they
should've assessing events, find out the troubles, and implement appropriate solutions. The CEO's
placement is unique inside the company, CEO is the oil in the water, although he is into water he will
always be above and has a bird’s eye over each and every aspect as well as functions of the company.
Top officials continue to be, while additionally necessary, wholly accountable for every action and
decision taken by each team employee especially when they are unaware of that decision. CEOs,
specifically novice executives, have been permitted to make minimal errors. CEOs utilizing this
approach feel that their primary role seems to be to create, evaluate, and evaluate the application of
prolonged approaches, which might stretch into the direct beyond in specific situations.
3. a.
The approach that allows employees to use their equipment for occupational purposes is called as
“BYOD brings your device". This refers to a strategy for end-user computer systems, in which a
business's end-users are being supported or even urged connect necessary IT solutions through their
gimmicks.
These actions include reviewing emails, signing up for the business network, and accessing business
applications as well as information.

BYOD assesses the risk environment for services. Companies must participate in unsafe applications
that can steal individual information or offer unauthorized users access to inner properties. They have
to take care of individual data and safety, including damage caused by device robbery or malfunction
comparable to how they have dealt with remote employees and other personal devices, On top of it,
the manner BYOD consumers are available in the present has increased, worsening difficulties. In
fact, the business regularly must fit the numerous BYOD internet protocols listed here, which
position separate data privacy and safety and security issues.

Three Levels

Produce indigenous apps targeting BYOD employees. With simply this method, different security
problems appear to be resolved. Network connectivity through a BYOD native app continues to be
kept mainly on a mobile device, demanding methods to download information when it is erased or
harmed and a method to delete information whenever a device is stolen or misplaced. Worker
verification and permission are important as the users will additionally have access to this
information related to just that program. Whenever a device has been infected, the enemies may get
uncontrolled accessibility to the information. Utilize applications or web browsers on a BYOD gizmo
to direct consumers to mobile-friendly gateways and Web Pages. Clients and staff might now access
the system and present the information. Therefore, user identification and password security,
including monitoring anomalous tasks, seem vital. Allow BYOD individuals to connect to company
systems and information through virtualization innovations. Such a technique can store information
on business databases, streamlining the protection process. However, because BYOD users have
much more access to venture resources, employee safe and secure authentication techniques must be
robust. For that reason, safety and security management, vulnerability scanning, identification
protection, and material understanding are needed to safeguard information and applications.

Thus, BYOD is beneficial to both services and their personnel. Newbies are no longer required to
bring various devices which is why they use exceptional comfort for staff members. This also makes
enables individuals to choose the device they are much more comfortable with and pleased with.
Also, the need for companies' IT divisions to acquire more mobile phones among workers has been
eliminated by BYOD.
3. b.
Businesses utilize BYOD policies to allow them to utilize their mobile phone, computer systems, and
tablet computer tools for business objectives. A BYOD technique can aid a company to be
successful, particularly a smaller business, yet there are specific drawbacks to consider. Whether
you're considering introducing a BYOD plan, this is an intelligent choice to weigh the disadvantages
and advantages first.
Advantages: -
Cost Saving:
For a large company, the ultimate expenditure increases by Offering gizmos to all workers. All
employees could not be well acquainted with someone or particular making use of the devices
offered by the firm. Whenever the workers bring their gadgets, they tend to take excellent care of
those gadgets or devices, which saves the business cash on providing substitute devices.

Updated Technology:
Often workers fail to upgrade firm machinery. Businesses could still opt to disregard any security
enhancements which puts their private information at risk. Companies will be much more persistent
in preserving workers' devices and computers existing by updating and setting up the most recently
accessed upgrades. Workers regularly update their devices when the latest variations come to be
easily accessible. When people utilize these devices for business, the business will have quicker,
more reliable, and much more present widgets, which will carry out smoothly also without errors.
Disadvantages: -
Higher Security risk:
Staff members move something between the office and house when they use their gadgets for work.
This increases the risk of burglary or mild misalignment. Experts can also have little access on
utilizing workers' gadgets when they aren't at the firm. By utilizing unprotected WiFi networks, the
employee might intentionally or unintentionally expose business tricks and other crucial information
to cybercriminals.

Legal issues:
Several legal, security, and possible susceptibilities may develop while executing a BYOD system.
Numerous obstacles, such as preserving, transmitting, and getting, consisting of destroying company
data, must be taken care of explicitly within a method. Employees, specifically recruits, may not even
entirely understand the proper standards to be adhered to throughout making use of personal tools
while at the office.

Conclusion
Individuals ought to balance both sides when choosing to utilize it in their firm. For example, it
might be challenging to preserve control amongst all gadgets and secure company classified
information if the company has composed substantial and varying obligations. On the other extreme,
the BYOD contract might significantly reduce business expenditures whether the firm operates a
start-up or probably a restricted business and doesn't have a specialised IT staff

You might also like