Introduction
This is about computer failure of Royal Bank of Scotland (RBS) that happens in India. It is said that it happens because of “inexperienced operative” by Indian staff was accidentally wiped information when doing software upgrade. It is also a blame that the problem occurs because of outsourcing. But, it has been opposed by Stephen Hester, the chief executive of RBS because there was no evidence that outsourcing had caused the problem. However, it is already happen and the company needs to responsible to what had happen. Even though the problem was solved in three days, the company has to bear losses from 17 million customers and it created a backlog of more than 100 million transaction and all the losses is cost up between £50 million and £100 million.
Nowadays, many large companies are using outsourcing through IS/IT sector it is because the company was not in the field of IT / IS also in order to gain benefits to their company especially reducing expenses. It also to ensure that the company can focus on their core business and give other operation to outsourcing company that is expertise on the field.
Question 1
Critically evaluate the competitive advantage that can be gained by companies through IS/IT outsourcing. Provide suitable example to support your answer.
Competitive advantage is when a company or country can produce a product or services at the lowest opportunity cost compare to their competitor. Meanwhile, outsourcing is when one company outsourced their portion of work or job to another company that are more expert and experienced to handle the task and also almost every large company outsources their portion of work or job in order to gain competitive advantage.
There are some competitive...
... middle of paper ...
...oftware that help automatic maintenance schedule, troubleshoot problem, and
give information about the computer systems. By doing disk maintenance, it helps computer systems stand in it top performance. At the same time it can reduce the probability of computer systems failure will happen.
Lastly, by implement security features to the computer systems also helps the computer systems from failure. It can be done by using password or control the network access. With that, an authorized user cannot access to the network or computer systems easily. It helps prevent the data and information in the computer systems be stolen. It also true that there are many ways computer systems might be failure even there are many ways that have been done to avoid it. But, the above ways is between the best ways can be performed as a precautionary alert to prevent it from happen.
Outsourcing is a technique for companies to reassign specific responsibilities to external entities. There are several motivations for outsourcing including organizational, improvement, cost, and revenue advantages (Ghodeswar & Vaidyanathan, 2008).
Implement a system Intrusion Detection/Prevention System (IDS/IPS): - Make the investment in an IDS/IPS to distinguish and prevent potential system dangers. sensors ought to be circulated all through the system, with a specific focus on general society untrusted section. Take alerts very seriously.
The competitive advantage that can be gained by the companies through IS/IT outsourcing is Improved business processes. IT outsourcing an identification method and rigor of IT resources that can help the business run smoothly. It can control the development of the project budget and expenditures. It also can promote information technology investment proposals from outside and provide skilled individuals in managing IT resources available in the company. Through these companies are able to provide appropriate information and report to the company. This can give competitive advantage to the company. For example, expenditures, progress, and issues the company can be viewed and controlled.
There are many reasons for a company to want to outsource the services or products that they need or want. Six of the biggest reasons for companies to outsource are motivation, specialization, survival of the economically fittest, economies of scale, heavier market coverage, and independence from any single manufacturer.
...urcing services, the company operation will be became a mess. This is because one organization can’t run a lot of task or project at one time. Therefore an organization need outsourcing in the way to help their organization run smoothly.
The conclusion attained from the discussion is that the malfunctions of computer systems are common but these can be prevented using safety measures. Data loss and theft can be answered by backing up the data and using the strong security systems, disaster recovery plans are important in case of data loss or theft.
The operating security protects the system from threats, viruses, worms, malware, and hackers. An ounce of preventative is better than a pound of cure, as the old saying goes. The same is true for operating systems. The security preventative keeps the computer assets safe from being stolen, compromised, or deleted. The operating system’s security allows applications that have been scanned for viruses and deemed clean to run smoothly. It allows the system to perform required tasks and prevent unauthorized programs from
We the computer user, turn on the machine, load software program, and use that software to accomplish a task without knowing what goes on behind the scenes or the basic functions of the computer components. It is also important to know how to protect the computer.
One main apprehension that they have against Information System is the high investment cost. In addition to this there is the high maintenance and upgrade costs associated with the deployment of new IT systems. In fact they prefer to outsource the heavy IT department expenditures to other companies having IT as their core activities. In return they expected to receive a full solution pack to meet their requirements and they are ready to pay these IT services as an operating cost. At the same time the risks associated with IS are being shifted to the other
A different perspective of approaching competitive advantage is its relationship with different business models, the degree of innovation and the information systems present. A competitive advantage is imminent if the current strategy of a company is value adding and is not in the present moment being implemented by its would-be competitors. The sustainability of a competitive advantage
Software services may take longer to complete a repair; the computer tech will have to look through your files, programs, and drivers to see if something is causing an error or drivers aren’t working. Common reasons people need repairs are viruses that shut down hardware and corrupt drivers. In 1968 Hewlett Packard began selling the first mass-market PC, which was a desktop by the name of HP9100A. The first Apple computer was introduced by Steve Wozniak in 1976 and was named the Apple 1. Without these inventors we wouldn’t have any modern day electronics, the TV would be the only thing to advance and everything would still be analog not digital. Facebook would not exist and the internet certainly would not exist.
...ntial information from a user. Luckily, there are reliable ways of defending against them. The most reliable way is to install strong security software that has the capacity to defend against the multifaceted forms of threats. Avoiding P2P file sharing sites and scanning email attachments before downloading them are also a surefire way of protecting a computer against malware threats. Basic acts like using an updated browser and allowing Windows updates to install and update themselves are also necessary to keep a machine safe. Furthermore, checking validity of individual website addresses and installing authenticated software can also help a computer user remain safe from potential data theft and possible damage of useful programs. It may also pay good dividends to backup files. In case of a lethal malware attack, backed-up files can always be recovered easily.
An ideal security system would provide protection against these types of risks and vulnerabilities. When equipment failure and errors take place, it puts the government and military in great danger. Important components can be stolen and misused such as confidential documents, defense plans, terrorist information, etc. and can ultimately harm or military and turn our government upside down.
In order to be a good and dependable computer technician it is essential that you have two things. The first thing that is essential to being a good computer technician is having the knowledge needed to work on and repair computers. A computer technician that doesn’t have the correct knowledge needed to work on computers isn’t going to be a dependable technician. The second thing essential to being a good and dependable computer technician is having all of the equipment needed to work on computers and other electronic equipment. Making sure you have all of the needed equipment to repair computers is the most important thing to being a computer technician because if you do not have sufficient equipment you cannot make any repairs regardless of the knowledge you have on the subject. A workstation with all of that equipment is essential to the repair of computers and other equipment. Your workstation should be set up in the most efficient way possible for you to get all of your work done in the most sufficient amount of time.
Businesses can further protect their computers by installing security cameras and hiring security guards. Home and personal computer users can protect their computers by making sure that they leave their devices in safe places and always know where their device is when they leave their home.