Tuesday, May 5, 2020
Compute Security Generation Computer Systems-Myassignmenthelp.Com
Question: Discuss About The Compute Security Generation Computer Systems? Answer: Introduction The product that has been focused in this assignment is the cloud-computing that will be their main focus to attract the customers. This cloud computing is provided to the customers over the internet. This is why the main importance should always be given to the need of the customers. The service automation should be done properly so that the customers can be supplied with the proper infrastructure in the IT services. The service strategy should be aligned with the needs of the customers (Zissis Lekkas, 2012). This is because the customer satisfaction is always of the first priority. All the leaders in the organization should look to increase the multi-cloud strategy. The organization has potentially identified the risks of using only one cloud provider (Dhar, 2012). If IBM puts in practice two or more cloud computing service providers, they will be able to confront the risks of data theft and data loss. The company should apply the technique that the design approach network engineers have used so far. Some of the major things that IBM could start is the policy of governance, applications and data, platforms and infrastructure. They should strengthen the vulnerabilities in the software (Zissis Lekkas, 2012). They have to make their cloud computing infrastructure very independent so that they can satisfy the needs of their customers. The cloud computing service providers must have a proper knowledge about the IT industry. IBM must make sure that if any single component of their hardware and software gets damaged, they will obviously be able to replace that with the alternative option. Customer service need Customer service need for IBM has been their first priority always. They want to provide their customers with the best services in the sphere of cloud computing. The IT experts always suggest that the customers should be able to keep a strong hold on their data since this entire service of the cloud computing is provided over computers. There should always be transparency between the customers and the service providers. IBM should plan to provide their services in a way that they can attain the best customer satisfaction (Best, 2012). IBM will need the full visibility of the location and governance of the information that will be provided to the customers through the IT channels. They should ensure the customers that whatever data should be provided to them and given back should be secure, resilient and flexible (Dhar, 2012). E-commerce has risen to the fullest in the modern period since the use of technology has been developed immensely in the last few years (Laudon Traver, 2013). The customers needs must be fulfilled by IBM. The customers prefer to be their visitors and engage in online transactions and peak trading. Thus, they can win the confidence of the customers. The customers always expect a clear service from IBM. This is why IBM should recruit the best IT personnel in their organizations. They also want innovative activities so IBM should be able to provide it as well (Laudon Traver, 2013). They should look to improve their system availability by at least 20% so they can gain a better market share and the trust of the customers. References Best, R. (2012).Market-based management. Pearson Higher Ed. Dhar, S. (2012). From outsourcing to Cloud computing: evolution of IT services.Management Research Review,35(8), 664-675. Laudon, K. C., Traver, C. G. (2013).E-commerce. Pearson. Zissis, D., Lekkas, D. (2012). Addressing cloud computing security issues.Future Generation computer systems,28(3), 583-592.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.