Professional Documents
Culture Documents
Viona Noronha Arden TO
Viona Noronha Arden TO
Viona Noronha Arden TO
Technology in Organisations 1
Portfolio
Submission ID:
Date:
Table of Contents
Introduction......................................................................................................................................3
Task 01.............................................................................................................................................3
Overall Benefits...............................................................................................................................4
Task 02.............................................................................................................................................6
Advancements in telecommunications............................................................................................6
Task 03.............................................................................................................................................9
For hardware..............................................................................................................................12
For software...............................................................................................................................12
Task 04...........................................................................................................................................13
The poster......................................................................................................................................13
Description.................................................................................................................................15
Conclusion.....................................................................................................................................18
References......................................................................................................................................19
Introduction
As time progresses, technical developments become more important to the prosperity of every
business. Organisations depend on technology to manage information and communication flows,
coordinate processes, and monitor personnel. Companies that invest heavily in cutting-edge
technology also have an advantage over their rivals. Technology has allowed businesses to
simplify their operations and increase efficiency (Zhang et al., 2022) to the point where they can
get by with a smaller staff. Hence, this portfolio report will include a case study based on the
investment of cloud computing service models of an organisation, an analysis of the
advancement of telecommunication, an analysis of key provisions of GDPR with its significance,
and a poster pressing step-by-step guide to using mail merge.
Task 01
Using the internet, IaaS makes available virtualised servers. In this configuration, a company
hires a third party to manage its storage, hardware, hosts, and networking (Mohanty et al., 2023).
Equipment is housed, operated, and maintained by the service provider. Standard practice has it
that the client pays as they go. With IaaS, a company has a flexible and adaptable infrastructure
that can grow or shrink with different needs. The ability to rapidly scale up infrastructure to
accommodate huge transaction volumes (Mounika et al., 2021) might be useful for a company
like Walmart during busy times like Black Friday.
PaaS (Wang and Chang, 2021) eliminates the need for customers to construct and maintain the
underlying infrastructure necessary for application development, operation, and management.
Both software and hardware are hosted by the service provider, who also provides the necessary
software and hardware components for networking, archiving, and operating systems. PaaS frees
Walmart's developers from concerns over storage, capacity, and the underlying infrastructure
(Wang and Chang, 2021), allowing them to focus on building apps to enhance customer service
or manage inventories.
Serverless computing, another name for FaaS (Sayre et al., 2020), allows businesses to run
programmes in response to predefined events. FaaS allows Walmart to create and release
software or services without having to worry about the underlying resources. Walmart is freed
from worrying about infrastructure administration and can instead concentrate on core business
logic (Sayre et al., 2020), thanks to the model's granular scalability, cost-effectiveness, and
promotion of a pay-per-use strategy.
Overall Benefits
Efficiency
Walmart has saved a lot of money by switching to cloud computing. Saving money on IT
hardware, software, and personnel is a side benefit. Because cloud services are often metered,
users may adjust their use according to their budget constraints.
Flexibility
Cloud services give Walmart a flexible and scalable IT platform they can tailor to their own
business demands. It can instantly expand to meet demand at peak periods like the holidays and
contract to save money when fewer people are using it (Garcia and Red, 2020). The savings and
productivity gains from such adaptability can be substantial.
Better Teamwork
Thanks to cloud computing, Walmart's employees can work together more effectively. With a
central repository for team files, members can get their data whenever they need it (Glover,
2021), no matter where they are. Cloud-based workflows have the potential to improve
efficiency, speed up the completion of activities, and boost productivity.
Security of data
Walmart creates a tremendous quantity of data every day, making data security a top priority for
the company. Cloud providers use cutting-edge safety measures (Sayre et al., 2020) to protect
user data during storage and retrieval. That is why it is important to encrypt data, implement
stringent permissions, and conduct frequent vulnerability scans.
Walmart will be able to deploy successful disaster recovery plans without investing in a
dedicated data centre for cloud-based recovery and backup options (Mounika et al., 2021). As a
result, data backup costs are decreased, recovery times are shortened, and dependability is
enhanced.
Agility
PaaS enables rapid application development and deployment, allowing Walmart to respond
rapidly to changing business requirements. This not only speeds up the rate of invention but also
gives the company an edge in the market by allowing it to react rapidly to shifting client tastes.
Environmental sustainability
Cloud computing helps Walmart achieve its sustainability goals by lessening the retailer's impact
on the environment. Cloud computing has allowed Walmart to more efficiently utilise company
resources, cutting down on wasted energy and equipment. Since the cloud service provider may
share its infrastructure with several customers (Glover, 2021), it can reduce its overall energy
usage and have a smaller footprint. Using cloud-based services, Walmart can coordinate its
sustainability initiatives and contribute to a more eco-friendly and ethical approach to IT.
Expansion
Cloud computing has made it easy for Walmart to extend its operations throughout the world. By
utilising the cloud, Walmart can rapidly enter new markets without having to spend heavily on
new physical facilities. Walmart is able to expand its business and better serve customers all over
the world thanks to the cloud, which provides a scalable and easily accessible platform that
facilitates seamless communication and data exchange across multiple locations.
Task 02
Advancements in telecommunications
Technology is having a wide-ranging impact on the telecommunications industry. 5G will bring
about significant changes. With 5G, we may expect ultra-low latency, better data speeds, and the
ability to slice networks (Wisesa et al., 2020), all while supporting a hundred-fold rise in linked
devices per unit area. The usage of AI has spread across numerous sectors, including
telecommunications. Improved customer service and happiness are made possible by AI-
powered virtual companions and chatbots used by the telecom industry (Bhattacharyya and
Dash., 2022). The telecom sector is a major participant in the Internet of Things (Pei and Cheng,
2022) industry, which consists of commonplace objects that can communicate with each other
and the Internet. In addition, the area of cutting-edge telecommunications is seeing additional
developments, such as the adoption of big data analytics, robotic process automation, etc.
McDonald's has profited greatly from the proliferation of mobile technologies. McDonald's has
taken advantage of this by creating a streamlined mobile app that acts as a hub for
communication between the company and its patrons. Without mobile technology, it would be
impossible to use the app's features, such as finding the nearest restaurant, browsing the menu,
making orders, and paying for food (Zhang et al., 2022). In the United States, customers can use
the "Mobile Order & Pay" (Zhang et al., 2022) option to place an order ahead of time and pick it
up via the Drive-Thru, curbside delivery, or the restaurant's lobby. Because of this, both
customer satisfaction and productivity in the workplace have risen significantly.
McDonald's communication with franchisees, suppliers, and consumers has been revolutionised
by increased internet access and digital platforms. The organisation may now exchange critical
information in real-time and receive timely responses. This has been extremely important
throughout recent crises. For instance, the fast-food chain was able to swiftly disseminate
information on safety standards and operational improvements across its extensive network in
the wake of the COVID-19 outbreak (Wisesa et al., 2020), all owing to modern forms of
communication.
Task 03
When it comes to protecting personal information and doing business online, the following main
items (Chhetri et al., 2022) should be present:
Article 5.1a says that personal information must be handled legitimately, equitably, and
transparently. Information technology solutions should make it very obvious to users why and
how their data will be utilised. In addition, they need to make sure that information is only
utilised in ways that make sense to the average person.
Data Minimization
Article 5.1c stipulates that organisations must acquire just the minimum amount of personal data
required to fulfil the declared purpose. Information technology systems should be crafted to
gather, store, and use data just as much as is necessary for a given task.
Accuracy
Article 5.1d of the GDPR specifies that organisations use appropriate measures to guarantee that
incorrect personal data is updated or destroyed. Therefore, it is important for IT systems to
include procedures for users to update their data.
Storage Limitation
Article 5.1e says that personal data shall be retained in a readily identifiable form for no further
time than is required in light of the reasons for which they are processed. After the information
has served its purpose, it should be deleted or anonymised automatically.
Article 5.1f stipulates that individuals' data must be handled in a way that protects their privacy
and confidentiality. This includes safeguards against intentional or inadvertent deletion,
alteration, or other destruction of data. Encryption, permissions, and reliable backups are just a
few examples of the kinds of technological and organisational safeguards that should be included
in IT systems.
Consent
Article 7 says that before collecting or processing personal information, organisations need the
individual's affirmative, explicit, informed, and unequivocal permission. Clear means for
obtaining and documenting such permission should be included in IT systems.
Article 15 says that consumers have the ability to review their personal data and transfer such
data to another data processor (Article 20). Information technology systems should make it
simple for individuals to get their data in a standard, machine-readable format upon request.
Right to Erasure
Article 17 grants people the right to have their personal information erased under specific
conditions. Information technology infrastructures must make it simple to carry out such
demands.
Article 25 specifies that data protection be built into the foundation of all new systems from the
start. This necessitates a high default level of privacy settings.
Organisations can avoid heavy penalties and protect their reputations by adopting these essential
safeguards, which guarantee the confidentiality and security of user data. GDPR compliance is
not a destination but rather a process that demands constant dedication and frequent assessments.
Businesses should install physical security measures to limit who may access servers and
other mission-critical devices. Biometric access control systems, closed-circuit television,
locks, and access cards are all examples of this.
Encrypting data on hard drives and other forms of storage protects it even if the device is
lost or stolen.
There should be stringent procedures in place for the proper disposal and recycling
(Meszaros, 2022) of hardware in all organisations. Degaussing, secure erasure, and
outright physical annihilation (Meszaros, 2022) are all methods that may be used to
render data unrecoverable.
Firewalls and intrusion detection/prevention systems are two examples of hardware that
may be installed to assist in monitoring and managing network traffic based on
established security policies.
Devices should have chassis intrusion surveillance systems (Meszaros, 2022) to identify
and react to tampering attempts.
For software
The purpose of software security is to keep programmes safe from being exploited online. The
goal is to safeguard data (Zanca et al., 2022) from being improperly accessed, used, disclosed,
disrupted, modified, or destroyed.
Task 04
The poster
Description
Professionals across fields agree that GMass is quite useful (Jacobs, 2020) as it facilitates users
with essential uses that are absent in Microsoft Excel. It is able to manage and integrate a large
number of messages in a user's Gmail account (Jacobs, 2020). It is also often used by
businesspeople to reach out to certain demographics. Mail merge is a powerful tool for sending
out large emails, and GMass breaks it down into four simple stages.
Step 1
The user's initial action is to import their Excel document into Google Sheets. Google Sheets is a
formidable alternative to Microsoft Excel because its automatic online sync is a time-saver and
productivity booster. To use the file picker, launch Google Sheets and click the folder icon.
Then, the user should use the displayed upload tab to bring in the datasheet. Then, the
user will utilise the device's selection or dragging features to bring across the desired file. At last,
he will select the file and hit open. Then the programme will import itself, and the user will have
a mailing list ready to combine.
Step 2
Step two involves the user choosing a preferred layout for the document. He needs to format it
appropriately and systematically. He is responsible for maintaining a problem-free and
straightforward file. Each column and its given names will be identified automatically by the
system. The labels will be utilised mechanically as well.
Step 3
Configuring Gmail and linking it to GMass are the only two required steps in this part. In this
section, the add-on will be installed if it has not already been. Firstly, the user will look for the
GMass site in the web store for Chrome. In Step B, then, he will proceed to install the extension.
Step C involves a drop box into which he must select in order to affirm the extension's addition.
At long last, the user will access his Gmail and link it to GMass by entering his credentials.
Step 4
The last steps involve establishing a connection between the Google Sheet and GMass, editing
and sending a customised email. Here, at step A, he will access his Gmail inbox and hit the
GMass spreadsheet icon. Then, the user will select the desired Google sheet from the drop-down
option and proceed with the mail merging. Then, the user will click the Connect button, at which
point GMass will immediately scan the information and substitute an identical alias address for
each of the previously listed addresses. BCC, CC, etc., can be used to tailor the message to the
recipient's preferences. To customise his experience, the user will go to the GMass button's
settings by clicking the arrow next to it, then click the Personalisation button in the resulting
drop-down menu. In this case, you may expect a one-on-one demonstration. At last, the user
will hit the GMass icon to send the message and finish up.
Conclusion
Business operations are being affected by the rapid development of technology. Notably, in the
retail sector, cloud computing and telecommunications technology have been enhancing
corporate operations. As technology evolves, new vulnerabilities to privacy and security threats
emerge. Because of this emerging situation, businesses cannot ignore the GRPR. A corporate
user will benefit immensely from the detailed instructions for performing a mail merge. The
report has included the step-by-step activities that will be needed to use GMass for a mail merge
properly.
References
Al-Alwan, M., Al-Nawafah, S., Al-Shorman, H., Khrisat, F., Alathamneh, F. and Al-Hawary, S.,
2022. The effect of big data on decision quality: Evidence from telecommunication
industry. International Journal of Data and Network Science, 6(3), pp.693-702.
Bhattacharyya, J. and Dash, M.K., 2022. What do we know about customer churn behaviour in
the telecommunication industry? A bibliometric analysis of research trends, 1985–2019. FIIB
Business Review, 11(3), pp.280-302.
Chhetri, T.R., Kurteva, A., DeLong, R.J., Hilscher, R., Korte, K. and Fensel, A., 2022. Data
Protection by Design Tool for Automated GDPR Compliance Verification Based on
Semantically Modeled Informed Consent. Sensors, 22(7), p.2763.
Garcia, G.J.V. and Red, E.R., 2020. Information Systems Utilization of an Organization: The
Case of Walmart Inc. College of Computer and Information Science.
Glover, H., 2021. Study Shows the Benefits of Walmart Education Effort: Retail Giant's Live
Better U Program Is Proving Its Value. Lumina Issue Paper. Lumina Foundation.
Jacobs, T.M., 2020. Big Fish, Little Fish: The Effect of Integration Approach, Commitment,
Organizational Identity, and the Ethics/Compliance Culture on Post-Merger and Acquisition
Core Self-evaluation (Doctoral dissertation, Trident University International).
Kuma, P., Bender, F., Schuddeboom, A. and McDonald, A., 2022, May. Cloud type machine
learning shows better present-day cloud representation in climate models is associated with
higher climate sensitivity. In EGU General Assembly Conference Abstracts (pp. EGU22-4247).
Kuma, P., Bender, F.A.M., Schuddeboom, A., McDonald, A.J. and Seland, Ø., 2023. Machine
learning of cloud types in satellite observations and climate models. Atmospheric Chemistry and
Physics, 23(1), pp.523-549.
Meszaros, J., 2022. The next challenge for data protection law: AI revolution in automated
scientific research. The Next Challenge for Data Protection Law: AI Revolution in Automated
Scientific Research.
Mohanty, S., Alfurhood, B.S., Bakhare, R., Poongavanam, S. and Khanna, R., 2023, January.
The Role and Impact of Artificial Intelligence on Retail Business and its Developments. In 2023
International Conference on Artificial Intelligence and Smart Communication (AISC) (pp. 1098-
1101). IEEE.
Mounika, S., Sahithi, Y., Grishmi, D., Sindhu, M. and Ganesh, P., 2021. Walmart Gross Sales
Forecasting Using Machine Learning. Journal of Advanced Research in Technology and
Management Sciences (JARTMS), 3(4), pp.22-27.
Pei, J. and Cheng, L., 2022. Discursive profile of international telecommunication regulations as
institutional dialogue: A sociosemiotic perspective. Social Semiotics, 32(1), pp.17-34.
Sayre, K., Smith, K., Pacheco, B. and King, V., 2020. Walmart InfoSec team talks about
leveraging STEM to build a world class team. Hispanic Engineer and Information
Technology, 35(2), pp.18-21.
von Grafenstein, M., 2022. Co-regulation and competitive advantage in the GDPR: Data
protection certification mechanisms, codes of conduct and data protection-by-design.
In Research Handbook on Privacy and Data Protection Law (pp. 402-432). Edward Elgar
Publishing.
Wang, Y. and Chang, J., 2021, April. Future development trend of “new retail” and e-commerce
based on big data. In Journal of Physics: Conference Series (Vol. 1852, No. 3, p. 032029). IOP
Publishing.
Wisesa, O., Adriansyah, A. and Khalaf, O.I., 2020, September. Prediction analysis sales for
corporate services telecommunications company using gradient boost algorithm. In 2020 2nd
International Conference on Broadband Communications, Wireless Sensors and Powering
(BCWSP) (pp. 101-106). IEEE.
Zanca, F., Brusasco, C., Pesapane, F., Kwade, Z., Beckers, R. and Avanzo, M., 2022, October.
Regulatory Aspects of the Use of Artificial Intelligence Medical Software. In Seminars in
Radiation Oncology (Vol. 32, No. 4, pp. 432-441). WB Saunders.
Zhang, X., Jiang, D. and Zhao, Z., 2022, September. Forecasting MCDONALD’S Corporation
Performance of 2022–2031 Based on Forecasting Financial Statements and Valuation Models.
In Proceedings of the 2022 International Conference on Business and Policy Studies (pp. 809-
820). Singapore: Springer Nature Singapore.