Disaster Recovery Plan (DRP) in Business

Fire, flood, earthquake and accidental deletion of data are all acts that can cause disastrous consequences on data. Such disasters can prevent the network from operating normally, which in turn can hamper the organisation’s business. These disasters can be classified into man-made disasters and environmental disasters. Man-made disasters are intentionally or unintentionally caused by humans. For example, a user accidentally deletes the data, virus and malicious programs can damage data and various other events can cause data loss and downtime. Environmental disasters are non-preventive but can be reduced if appropriate precautions are taken. Environmental disasters include fire, flood, earthquake, tornado and hurricane.

Disaster recovery deals with recovery of data that is damaged due to destructive activities. The time required to recover from a disaster depends on the disaster recovery plan implemented by the organisation. A good disaster recovery plan can prevent an organisation from any type of disruption.

Disaster Recovery Plan/Business Continuity Plan

A Disaster Recovery Plan (DRP) helps to identify threats to an existing business such as terrorism, fire, earthquake and flood. It also provides guidance on how to deal with occurrence of such events. Disasters are unpredictable; hence, planning for the worst is important for any business. A DRP is also called a Business Continuity Plan (BCP). The only difference between Disaster Recovery Plan and Business Continuity Plan is the focus. The focus of Business Continuity Plan is to provide continuity of operations in the organisation. Whereas, Disaster Recovery Plan focuses on recovery and rebuilding of the organisation after a disaster has occurred.

Read the rest

Business Intelligence (BI)

Business Intelligence is the process of discovering and analyzing data to make informed business decisions. The management in any business needs this aspect of management as part of the companies integral infrastructure in today’s world in order for the business to succeed. The data collected from many of the data collecting sources is used to determine trends, or measure, manage and improve on the performances of individuals, processes, teams and business units. The enterprise refers to any business organisation that uses computers as an integral part of their business and relies on it for that businesses development.

The History Of Business Intelligence

The term Business Intelligence was coined by the Gartner group in mid-1990s. But Business Intelligence was around before that, it originated in the Management Information Systems reporting systems of the 1970s. Reports in this era was only two fold, there was no analytical dimension to reporting. In the early 1980s, Executive Information Systems emerged. This introduced ad hoc (on demand) reporting forecasting, prediction, trend analysis, drill down to details, status access and critical success factors. It was available to top level managers who were the ones to make decisions for the businesses future. Some of the capabilities from the 1990s appeared in products along with some new ones and it was called Business Intelligence. A good Business Intelligence based enterprise information system contains all the information executives need. By 2005 Business Intelligence systems started to include artificial intelligence capabilities and more powerful analytical capabilities. The most sophisticated Business Intelligence Products include most of these capabilities.… Read the rest

Case Study: Success Story of Google Search Engine

One of the most popular search engines is Google. Unknown to many, the term is coined by Milton Sirotta, the nephew of Edward Kasner who is an American Mathematician. The term is in reference with the number which is represented by the number 1 followed by 100 zeros. The same utilization of the term reflects the mission of the company to deliver immense and infinite resources to be available online.

The founders of the company, Larry Page and Sergey Brin, were not in good terms back then when they met as graduate students of computer science in Stanford University in 1995. They used to argue on everything that they are discussing. The strong personalities always clashed. But eventually, they have found a common ground. The retrieving of various yet important information from massive set data has been the big challenge that they were up to at that time. So, on January 0f 1996, they began the collaboration of BackRub, the name they have formulated because of the unique approach to back links to a given website. Larry procured the use of low-end PCs instead of the big yet very expensive machines. After a year, the news about the newest search engine spread around the campus. Then, they began to search for the perfection of their technology. They were encouraged to put up their service of a search engine company by themselves.

They talked to Andy Bechtolsheim, one of the founders of the Sun Microsystems, after the demo, he thought that Google has a lot of potential so he decided to lend them $100,000.… Read the rest

Case Study of Zara : Application of Business Intelligence in Retail Industry

ZARA is a Spanish clothing and accessories retailer based in Arteixo, Galicia.  Founded in 24 May ,1975 by Amancio Ortega and Rosalía Mera, the brand is renowned for it’s ability to deliver new clothes to stores quickly and in small batches. Zara needs just two weeks to develop a new product and get it to stores, compared to the six-month industry average, and launches around 10,000 new designs each year. Zara was described by Louis Vuitton Fashion Director Daniel Piette as “possibly the most innovative and devastating retailer in the world. The company produces about 450 million items a year for its 1,770 stores in 86 countries.

The Zara has made of use of Information Systems (IS) and to advance in many areas. This has resulted in huge success for the company. This included application of Business intelligence (BI) involves technologies, practices for collection, integration and applications to analyze and present business information. The main aim of business intelligence is to promote better business decision making.

BI describes a group of information on concepts and methods to better decision making in business. This is achieved by employing a fact based support systems. The intelligence systems are data-driven and sometimes used in executive information systems. Predictive views on business operations can be provided by use of BI systems. predictive views on business operations can be provided by use of BI systems since historical and current data has been gathered into a data bank performance management benchmarking is done whereby information on other companies in the same industry is gathered.… Read the rest

Comparison Between Proprietary Software and Open Source Software

Proprietary software can be defined as closed software that is distributed under a license agreement that limits any modifications to the software. Its just opposite to the concept of Open source software. Open source software can be defined as software that is distributed freely under a license agreement with no limitations on changes made to the source code.

Many proprietary corporations make software freely available to users. For example, Adobe provides users with the Adobe Acrobat Reader. The Adobe Acrobat Reader is an application that users to view documents that have been saved in the portable document format (PDF). The PDF format is developed by Adobe and has become a standard in saving files as electronic documents. ‘Standardization’ and ‘compatibility’ are the two main drivers for the success of proprietary software. Any user that opens a PDF formatted document with Adobe Acrobat Reader is confident that the document will be accessible and readable. The standardization of the PDF format for document files is what made almost every document processing application incorporate it into their processes. In turn, that made the PDF format compatible within document processing software. However, software corporations that incorporate a process to save files as PDF formatted documents must pay Adobe a licensing fee in order to have access the code that will convert files into PDF in conformity with the Adobe Acrobat Reader application. The Adobe Acrobat Reader creates user dependency. Users that create documents desire software that understands the PDF format and the software vendor must pay Adobe for licensing, in order to meet the requirements of its users.… Read the rest

Different Types of Electronic Authentication

Nowadays as we know, technology is improving and businesses corporations, consumers, marketers and governments are moving forward to using it and depend on it. While all these kinds of users have been moved forward to using this technology, so all their transactions work go through it and specially through E-mails to communicate with each other. Even though not only the E-mail that used to communicate, there are so many ways to transfer information or some other things need to be done through this huge technology. But with this huge moved, it’s still not safe to use it without any kind of protection and security such as authentication to recognize if those massages or transfers or requests coming from the right and trusted sides. So they have come out with electronic authentication as the best way to make sure it’s the legible and trusted sides in this process.

An authentication is a piece of information used to authenticate and verify and identify a person’s identity on appearance or in a procedure for security and safety purposes and with respect to individually granted access rights. It’s like to create or prove something (or/and someone) as authentic and stated that made by or about the subject is true. This method involve proving the distinctiveness of a person, tracking the source of a work of art, making sure that packaging and tagging is belong to a product, ensure that a computer program can be trusted.

It is the method of determine whether someone or something is, in fact, who or what it is stated to be.… Read the rest