Information system uses a set of components to collect, store and process data in order to deliver information, knowledge as well as digital products. Operations of business firms and organizations are carried through information system. It is also responsible for interacting with customers, competing in the market and managing operations of organizations. Corporations also use IS to process financial accounts, reach target customers and also to manage their resources. Apart from corporations, governments also use IS to provide services to citizens in a cost-effective manner.
Some of the Major forms of Information systems comprise of information management software and structural databases that may also cover the following:
1. Executive Support Systems (ES)
2. Transaction Process Systems (TPS),
3. Decision Support Systems (DSS),,
4. Management Information Systems (MIS),
5. Enterprise Collaboration systems (ECS) etc.
A technology that makes use of the central remote servers and the internet to keep the data and applications intact is referred to as cloud computing. It provides optimum opportunity to the consumers as well as businesses to make use of applications without any installation. Any personal file can be accessed from a computer having an internet connectivity, thanks to cloud computing. More efficient computing is possible due to this technology as it makes use of centralized storage, memory and processing.
As cloud computing is becoming the latest buzz word in the technology world, let us discuss its effects when in practice on various people and organizations;
Small start-up companies as well as technology companies will experience sweeping rise in the monetary efficiency thanks to cloud computing. It has now become cheaper to start new services as hosting an internet application has become much cheaper.
In case of larger organizations, the cloud turns computing from a capital expense to an operating expense. There are associated technical and security confronts and risks for several huge firms in switching over to the cloud, however with time it must definitely enable managing and utilizing computerized resources much more resourceful for larger firms. It also represents a large opportunity for enterprise software start-ups to move present applications with cloud-based resolutions which are being sold in the form of service. (“What is cloud computing”, 1)
Drawbacks of Cloud Computing
Critics are apprehensive of cloud computing and point out many drawbacks of this latest rage.
Security: As you are handling over all your personal and professional information to a third party over the web network, it does pose a few security threats.
Reliability: Like all computer applications, if as a matter of fact, the cloud does not respond properly, so will your app. Yet those supporting clouds reason out that the cost incurred during downtimes is much less than the expenses of reviving desktop software that can constantly decrease due to bugs and crashes. Also upgrades for desktop software’s are much more than upgrades for cloud software, which can be upgraded easily.
Unpredicted Costs: Moreover, most well known cloud companies also cost you more for the used spikes, which may result in accounting an extra cost to the pockets of a common man.
Software as a Service
Applications hosted by vendors and service providers are made accessible to the users and common people all over the vast spread internet. Software as a Service (SaaS) is a distribution model used by vendors for this purpose.
With the overwhelming support of latest technologies such as service oriented architecture and support web services and their latest versions like Ajax, Software as a service has gained utmost importance as a delivery stature. During this period, there is another form of high speed internet services, called Broadband services has been developed to connect people all around the world. Advantages of SaaS:
SaaS has received great reviews from an array of business communities. People are willing to readily invest in it and the intensity of the cash-fall has translated into good news for its supporters. The dollars are flowing in big numbers and the business communities look pleased. The pertinent question still remains. What is so special regarding SaaS that gives everyone a positive vibe? The popular consensus is that SaaS is still one of the budding organizations. Not too long back the suppliers of SaaS applications were nicknamed as the industry’s lunatic fringe. However, the perception has faded away. The plus points of SaaS have clearly outdone its critics, and now the spotlight is on SaaS benefits. So, let’s learn what are these plus points?
For the Consumer:
No software installation or maintenance required from the client/server end– The procedure is made easy. Users have to longer refer to manuals or get embroiled in understanding difficult technical jargon.
Less deployment time – Precisely, it takes not more than minutes as against a phased accomplishment that could take even months.
Global presence – Undoubtedly, the functionality is accessible all round the world with the help of an internet connection but the technology makes possible the existence of on-premise software outside the premises also.
Upgrades, smaller and constant – Constant miniscule upgrades are possible due to the SaaS. Such small upgrades greatly improve the application experience. Even though the change are small, when added up they make a great difference to the allocation and its usability.
Managing the IT Budget– when the enterprise outsources the software functionality to a provider, it can save marginally on infrastructure and IT personnel knowledge requirements. This also provides an opportunity to the enterprise to concentrate on its core competencies.
Ease Your Internal tensions (IT) – As discussed in previous points, SaaS helps to relieve a great deal of IT related pains that are faced by software consumers in the traditional client/server model. Due to this the IT personnel’s of the company get busy in solving day to day technical issues rather than solving third party problems or maintaining the infrastructure.
For the Provider:
Combined operating environment – As you yourself are the owner of your domain you no longer need to send technicians to change or fix your software in order to fit into the clients infrastructure which maybe outdated or highly-specialized. You can now control the infrastructure according to the SaaS application. This helps in savings and makes the whole process less cumbersome.
Sales and its importance– Even though gaining new customers is important, SaaS requires you as a provider to retain your customers and provide them with best service. This new age marketing mantra for Saas is very important to follow. Along with retention also focus a team on landing new customers.
Growth – The more customers visit your site to use the application the larger base you cover. This automatically translates into growth. Right approach can help you increase not just customer base but also revenues.
Definite revenue – As SaaS uses a subscription module, you can expect continuous revenue from your customers. A flexible cycle will also help you as a provider to forecast revenues. There are various cycles that can be adopted for the same such as monthly, quarterly or even weekly payments. The more flexible you cycle the better your revenues.
Benefits of smaller upgrades– Your technicians can concentrate on dishing out smaller upgrades rather than monster rollouts as it makes significant changes and also the customer does not have to give out more money.
Computer security is not at all a difficult thing to know and understand as it is a broad term that encompasses many aspects The main problem lies in proposing a precise definition that is vast enough to be applicable irrespective of the system being involved. In a lay man’s terminology, security is defined as freedom from any sort of risk or threat. While, technically when we talk in terms of computer science, security poses a different definition . It is the preclusion of, or security against,
admittance to information by unknown or unauthorized beneficiary
wanted but illegal devastation or change of that information1
The above facts can be collectively restated as follows: “The ability of a system to cover and safeguard information and system specific sources in accordance with integrity and confidentiality is defined as security.” Reader should keep in mind that the second statement is an extension of the above mentioned facts and differ only with respect to system resources which are nothing but a combination of programs, CPU’s , information and disks.
Further, a functional analysis of Computer security is given below. It is essentially classified as five different functional areas:3
Risk prevention — Any system is definitely prone to a virus attack either through internal or external ways. A common security measure arouses questions like these in mind: Am I or my firm responsible for a damage? Are we causing any sort of risk to the system activities by any means? Do we really require an unbounded and free Internet connectivity? Do we also need to automate that protected business method? Should we actually normalize on a virtual operating system with no or limited access organized intrinsics?
Prevention Prevention is better than cure, undoubtedly stands tall here the very old and true fact. Minimizes the risk to data assets through panic. Prevention can be any mode of communication methodology formulated to electrify potential enemy of the probability of getting trapped..
Avoidance Needless to mention, avoidance is the conventional heart of computer security. It comprises of putting into practice protection such as the tools roofed in this book. Theoretically, absolute prevention is. Not excluding the fading point where additional precautionary methods are no more cost-effective and reasonable.
Detection – Beyond doubt, detection works best in relation to precautionary measures. In case of prevention failure, it is the detection which should take space immediately, most probably when there is enough time to prevent disaster. It also covers auditing methods and log keeping techniques.
Recovery – Rightly said, when there is nothing in hand, all what had to happen has happened already, it is the time to recovery. It is the system restoration, recovery and backup time. All formatting and back files are checked and restored from the scratch. Needless to mention, this function should be paid attention to prior to all others in the queue above. This will keep risk and threat at a distance away from your system.
As per the procedure of the security planning process, Analyzing security by way of function has proved to be an important part. A fixed security policy addresses the five main areas, beginning with recovery. This textbook, although, is primarily concerned with preclusion and avoidance.
As the world is getting smaller thanks to the internet, so are the security risks getting higher. Organizations and companies need to stay alert of computer frauds and other security issues. Staying updated with latest technology and also the threats evolving over the internet is important in order to avoid facing frauds and scams. Using latest technology one should always keep the computer risk and danger free.
1. Hartig K. “What is cloud computing?”. Web. 13 December 2009
2. Cornerstone On Demand Empowering People “What is Software-as-a-service (Saas)?” .Web. 17 March 2011
3. Advanced Supply Management. “ Supply Chain Management Systems”. Web. 21 October 2010
4. Cloud Computing. “ Software as a service (SaaS)”. Web. 23 March 2006