Disaster Recovery Plan (DRP) in Business

Fire, flood, earthquake and accidental deletion of data are all acts that can cause disastrous consequences on data. Such disasters can prevent the network from operating normally, which in turn can hamper the organisation’s business. These disasters can be classified into man-made disasters and environmental disasters. Man-made disasters are intentionally or unintentionally caused by humans. For example, a user accidentally deletes the data, virus and malicious programs can damage data and various other events can cause data loss and downtime. Environmental disasters are non-preventive but can be reduced if appropriate precautions are taken. Environmental disasters include fire, flood, earthquake, tornado and hurricane.

Disaster recovery deals with recovery of data that is damaged due to destructive activities. The time required to recover from a disaster depends on the disaster recovery plan implemented by the organisation. A good disaster recovery plan can prevent an organisation from any type of disruption.

Disaster Recovery Plan/Business Continuity Plan

A Disaster Recovery Plan (DRP) helps to identify threats to an existing business such as terrorism, fire, earthquake and flood. It also provides guidance on how to deal with occurrence of such events. Disasters are unpredictable; hence, planning for the worst is important for any business. A DRP is also called a Business Continuity Plan (BCP). The only difference between Disaster Recovery Plan and Business Continuity Plan is the focus. The focus of Business Continuity Plan is to provide continuity of operations in the organisation. Whereas, Disaster Recovery Plan focuses on recovery and rebuilding of the organisation after a disaster has occurred.

Read the rest

Case Study of Zara : Application of Business Intelligence in Retail Industry

ZARA is a Spanish clothing and accessories retailer based in Arteixo, Galicia.  Founded in 24 May ,1975 by Amancio Ortega and Rosalía Mera, the brand is renowned for it’s ability to deliver new clothes to stores quickly and in small batches. Zara needs just two weeks to develop a new product and get it to stores, compared to the six-month industry average, and launches around 10,000 new designs each year. Zara was described by Louis Vuitton Fashion Director Daniel Piette as “possibly the most innovative and devastating retailer in the world. The company produces about 450 million items a year for its 1,770 stores in 86 countries.

The Zara has made of use of Information Systems (IS) and to advance in many areas. This has resulted in huge success for the company. This included application of Business intelligence (BI) involves technologies, practices for collection, integration and applications to analyze and present business information. The main aim of business intelligence is to promote better business decision making.

BI describes a group of information on concepts and methods to better decision making in business. This is achieved by employing a fact based support systems. The intelligence systems are data-driven and sometimes used in executive information systems. Predictive views on business operations can be provided by use of BI systems. predictive views on business operations can be provided by use of BI systems since historical and current data has been gathered into a data bank performance management benchmarking is done whereby information on other companies in the same industry is gathered.… Read the rest

Comparison Between Proprietary Software and Open Source Software

Proprietary software can be defined as closed software that is distributed under a license agreement that limits any modifications to the software. Its just opposite to the concept of Open source software. Open source software can be defined as software that is distributed freely under a license agreement with no limitations on changes made to the source code.

Many proprietary corporations make software freely available to users. For example, Adobe provides users with the Adobe Acrobat Reader. The Adobe Acrobat Reader is an application that users to view documents that have been saved in the portable document format (PDF). The PDF format is developed by Adobe and has become a standard in saving files as electronic documents. ‘Standardization’ and ‘compatibility’ are the two main drivers for the success of proprietary software. Any user that opens a PDF formatted document with Adobe Acrobat Reader is confident that the document will be accessible and readable. The standardization of the PDF format for document files is what made almost every document processing application incorporate it into their processes. In turn, that made the PDF format compatible within document processing software. However, software corporations that incorporate a process to save files as PDF formatted documents must pay Adobe a licensing fee in order to have access the code that will convert files into PDF in conformity with the Adobe Acrobat Reader application. The Adobe Acrobat Reader creates user dependency. Users that create documents desire software that understands the PDF format and the software vendor must pay Adobe for licensing, in order to meet the requirements of its users.… Read the rest

Barriers To Information And Knowledge Sharing

Information and knowledge sharing has become increasingly relevant in an organization since the transfer from an industrial economy based on a hierarchical control to a global, information-driven financial system and decentralized. Information and knowledge management from human is new and very tangible as well as technological side. The problems associated with sharing information and knowledge is to be briefly informed as one of the basic activities of information and knowledge management. Changes both in community culture and in deployed technological solutions and work procedures are required by the knowledge management. This serves as an essential of interaction between technological and social subsystems which demonstrates the information that searching, storing, manipulation and sharing of enormous volume of information are enabled by IT. Moreover, the conversion of data into information with minimum time and space constraints are enabled.

The crucial consequence is the fact that in information and knowledge sharing IT plays an important role but not an essential one. The goal is to turn over the existence of some barriers to information and knowledge sharing in an organization. In this article, the main purpose is described to the types of barriers, conflict of motives as a special individual difficulty arising partially from other barriers and how to overcome these barriers in an organization.

Types of Barriers

There are many types of barriers to information and knowledge sharing in organization such as culture barriers, legal barriers, technology barriers and social barriers, etc. Two different approaches can be identified to support information and knowledge sharing in organization.

Read the rest

Data Transmission Modes in Computer Networks

Data communication circuits can be configured in a huge number of arrangements depending on the specifics of the circuit, such as how many stations are on the circuit, type of transmission facility, distance between the stations, how many users at each station and so on. Data communication circuits can however be classified as either two point or multipoint. A two-point configuration involves only two stations, whereas a multipoint configuration involves more than two stations. Regardless of configuration, each station can have one or more computers, computer terminals or workstations. A two point circuit involves the transfer of digital information from a mainframe computer and a personal computer, two mainframe computers, two personal computers or two data communication networks. A multipoint network is generally used to interconnect a single mainframe computer to many personal computers or to interconnect many personal computers. Coming to transmission modes, there are three modes of transmission for data communication circuits namely;

  1. Simplex: In a simplex mode, the transmission of data is always unidirectional. Information will be sent always only in one direction Simplex lines are also called receive-only, transmit-only, or one-way-only lines. A best example of simplex mode is Radio and Television broadcasts.
  2. Half-Duplex: In the half-duplex mode, data transmission is possible in both the directions but not at the same time. When one device is sending, the other can only receive, and vice-versa. These communication lines are also called two-way-alternate or either-way lines.
  3. Full Duplex: In the full-duplex mode, the transmissions are possible in both directions simultaneous, but they must be between the same two stations.

Read the rest

Factors Affecting the Performance of Computer Networks

Networking is very important in the world of computer. Networking is the activity of connecting the computers to each other to make-up the computer network. In other word is the purpose of sharing data through linking of two or more computing devices together. Networks are built with a mix of computer hardware and computer software. A computer network is a collection of computers and devices connected together via communications devices and transmission media.

There are few factors that affect the performance of computer networks. Those factors will reduce the quality of service of the network. The major factors are Latency, Packet loss, Retransmission, Throughput and Queuing delay.

1. Latency

Latency is the kinds of delays typically incurred in processing of network data. A low latency network connection is one that generally experiences small delay times, while a high latency connection generally suffers from long delays.

Although the peak bandwidth of a network connection is fixed according to the technology used, but the actual bandwidth which is obtained change over time and is affected by high latencies. Excessive latency creates bottlenecks that prevent data from filling the network pipe, thus decreasing effective bandwidth. The result of latency on network bandwidth can be temporary which may lasts for a few seconds or constantly depends on the source of the delays.

To measure the Network Latency tools like ping tests and trace-route are used. The measuring is done by determining the time it takes a given network packet to travel from source to destination and back, and this the so-called round-trip time.… Read the rest