Introduction
This is about computer failure of Royal Bank of Scotland (RBS) that happens in India. It is said that it happens because of “inexperienced operative” by Indian staff was accidentally wiped information when doing software upgrade. It is also a blame that the problem occurs because of outsourcing. But, it has been opposed by Stephen Hester, the chief executive of RBS because there was no evidence that outsourcing had caused the problem. However, it is already happen and the company needs to responsible to what had happen. Even though the problem was solved in three days, the company has to bear losses from 17 million customers and it created a backlog of more than 100 million transaction and all the losses is cost up between £50 million and £100 million.
Nowadays, many large companies are using outsourcing through IS/IT sector it is because the company was not in the field of IT / IS also in order to gain benefits to their company especially reducing expenses. It also to ensure that the company can focus on their core business and give other operation to outsourcing company that is expertise on the field.
Question 1
Critically evaluate the competitive advantage that can be gained by companies through IS/IT outsourcing. Provide suitable example to support your answer.
Competitive advantage is when a company or country can produce a product or services at the lowest opportunity cost compare to their competitor. Meanwhile, outsourcing is when one company outsourced their portion of work or job to another company that are more expert and experienced to handle the task and also almost every large company outsources their portion of work or job in order to gain competitive advantage.
There are some competitive...
... middle of paper ...
...oftware that help automatic maintenance schedule, troubleshoot problem, and
give information about the computer systems. By doing disk maintenance, it helps computer systems stand in it top performance. At the same time it can reduce the probability of computer systems failure will happen.
Lastly, by implement security features to the computer systems also helps the computer systems from failure. It can be done by using password or control the network access. With that, an authorized user cannot access to the network or computer systems easily. It helps prevent the data and information in the computer systems be stolen. It also true that there are many ways computer systems might be failure even there are many ways that have been done to avoid it. But, the above ways is between the best ways can be performed as a precautionary alert to prevent it from happen.
Outsourcing simply means acquiring services from an external organization instead of using internal resources (Butler, 2000). By using outsourced resources, organizations can gain a competitive advantage by utilizing contingent staff to accomplish strategic goals without incurring the fixed overhead. By focusing on the leading edge and highly specialized skill sets, outsourcing providers can often offer higher quality services, or at a lower price than the client organization. Typical reasons for outsourcing go beyond simple contingent staffing. Outsourcing providers are able to maintain economies of scale with regard to specialization (...
The summary we can make after read the case study is the system down in RBS Company has make the million of customer unable to access their account. The management in Royal Bank of Scotland (RBS) have found people who have caused the problem which is the junior technician from India, who accidentally erased a massive swathe of information during a routine software upgrade...
Almost every process of day to day life is controlled by computers and the banking sector is one of them. Every bank has adopted computer integrated systems to make their process easier and it does. Minor computer malfunctions causes major glitch to banks as the complete system is depended on computer and software. We can take the example of latest computer crisis faced by Royal Bank of Scotland (RBS). This system failure caused major damages and millions of customers faced difficulties to access their account, all this happened because of inexperienced operator in India as per the reports.
Outsourcing is a technique for companies to reassign specific responsibilities to external entities. There are several motivations for outsourcing including organizational, improvement, cost, and revenue advantages (Ghodeswar & Vaidyanathan, 2008).
...urcing services, the company operation will be became a mess. This is because one organization can’t run a lot of task or project at one time. Therefore an organization need outsourcing in the way to help their organization run smoothly.
In order to be a good and dependable computer technician it is essential that you have two things. The first thing that is essential to being a good computer technician is having the knowledge needed to work on and repair computers. A computer technician that doesn’t have the correct knowledge needed to work on computers isn’t going to be a dependable technician. The second thing essential to being a good and dependable computer technician is having all of the equipment needed to work on computers and other electronic equipment. Making sure you have all of the needed equipment to repair computers is the most important thing to being a computer technician because if you do not have sufficient equipment you cannot make any repairs regardless of the knowledge you have on the subject. A workstation with all of that equipment is essential to the repair of computers and other equipment. Your workstation should be set up in the most efficient way possible for you to get all of your work done in the most sufficient amount of time.
In order to ensure optimal functioning of any type of computer-based technology maintenance must be performed. Whether it is regular updates done by staff or maintenance performed by service engineer, maintenance is extremely important to the overall performance of a system. Preventative maintenance can drastically reduce the possibility of a device being unreliable and provide the user with more accurate as well as reliable functioning of the system.
To combat those threats and ensure that e-business transactions are not compromised, security technology must play a major role in today's networks. Why Networks Must Be Secured? Attacks: -. Without proper protection, any part of any network can be susceptible to attacks or unauthorized activity. Routers, switches, and hosts can all be violated by professional hackers, company competitors.
We the computer user, turn on the machine, load software program, and use that software to accomplish a task without knowing what goes on behind the scenes or the basic functions of the computer components. It is also important to know how to protect the computer.
Implement a system Intrusion Detection/Prevention System (IDS/IPS): - Make the investment in an IDS/IPS to distinguish and prevent potential system dangers. sensors ought to be circulated all through the system, with a specific focus on general society untrusted section. Take alerts very seriously.
A different perspective of approaching competitive advantage is its relationship with different business models, the degree of innovation and the information systems present. A competitive advantage is imminent if the current strategy of a company is value adding and is not in the present moment being implemented by its would-be competitors. The sustainability of a competitive advantage
...ntial information from a user. Luckily, there are reliable ways of defending against them. The most reliable way is to install strong security software that has the capacity to defend against the multifaceted forms of threats. Avoiding P2P file sharing sites and scanning email attachments before downloading them are also a surefire way of protecting a computer against malware threats. Basic acts like using an updated browser and allowing Windows updates to install and update themselves are also necessary to keep a machine safe. Furthermore, checking validity of individual website addresses and installing authenticated software can also help a computer user remain safe from potential data theft and possible damage of useful programs. It may also pay good dividends to backup files. In case of a lethal malware attack, backed-up files can always be recovered easily.
The operating system organizes the computer’s memory and storage. It makes sure that every program
Software services may take longer to complete a repair; the computer tech will have to look through your files, programs, and drivers to see if something is causing an error or drivers aren’t working. Common reasons people need repairs are viruses that shut down hardware and corrupt drivers. In 1968 Hewlett Packard began selling the first mass-market PC, which was a desktop by the name of HP9100A. The first Apple computer was introduced by Steve Wozniak in 1976 and was named the Apple 1. Without these inventors we wouldn’t have any modern day electronics, the TV would be the only thing to advance and everything would still be analog not digital. Facebook would not exist and the internet certainly would not exist.
Businesses can further protect their computers by installing security cameras and hiring security guards. Home and personal computer users can protect their computers by making sure that they leave their devices in safe places and always know where their device is when they leave their home.