Premium Essay

Service Request Sr-Rm-022 Part2

In:

Submitted By atlas0029
Words 676
Pages 3
Service Request SR-rm-022, Part 2
BSA/375

Service Request SR-rm-022, Part 2

The application architecture and design determines the possible technologies used by information systems as well as the information, data, process, interface, and network components. This is the framework for the over-all design of a system. Riordan’s team will now need to decide which hardware and software Riordan will be need for their system based on the requirements needed for the new HR system. This part is crucial in order to build a reliable application through System Development Life Cycle phases (SDLC) (Valacich, 2012). Riordan needs portability, therefore a thin client/server architecture can be used. This should allow for the system to conduct transactions via the internet thru employee’s mobile and desktop browsers. Incorporation of the updated HR system with the current software is a requisite. To meet system requirements for integration with employee desktop computers Riordan should use a client /server architecture. This a high tech system will allow better integration of hardware, and will handle the payload. This is because of the client/server architecture dependability, scalability, Efficiency, and readiness. The client/server architecture is only as good and secure as its operating system, this is why the upgrade to Windows Server 2012 operating system will happen. Windows Server 2012 capabilities range from (Microsoft, 2014): * Server Virtualization * Storage * Networking * Virtual Desktop Infrastructure * Access and information protection * Web and application platform
With Windows Server 2012, Riordan HR system can scale to run most important workloads with strong recovery options. Riordan will attain value quickly with a wide range of cost effective, high performance storage possibilities and simplified delivery of multi-tenant IT

Similar Documents

Premium Essay

Service Request Sr-Rm-022-Part2

...Michael Turner BSA/375 Karen Knox 10/31/15 Riordan Manufacturing Part 2 of the SR-22 Security protocols are of paramount importance within a company and should be maintained by all levels from development to end user operation of any software. “Security is the primary responsibility of the operations group, which consists of staff responsible for operating security controls such as firewalls, intrusion detection systems and routine backup and recovery operations” (Dennis, Wilcox and Roth, 2012) However, it is essential for security concerns to be held at high importance at each step, especially during the development stage as developers have the responsibility of incorporating and even building the initial security protocols within a new system or application. Outside of the software exists the human condition in which company policy and procedure is expected to hold some precedence. Anyone having access to company data, such as employment information, client records, customer inquiry notations, company information and communications; must be kept secure to maintain the integrity and trust of the company, its clients and stakeholders. To assist in insuring this, software encryption systems must be established along with standard procedures for accessing data. Depending on the sensitivity of data being stored, their exist a wide variety of security protocols that can be implemented, some of which far exceed the standardized limitations of username/password lock out’s...

Words: 953 - Pages: 4

Premium Essay

Intro to Linux

...A Practical Guide to Linux Commands, Editors, and Shell Programming SECOND EDITION ® Mark G. Sobell Upper Saddle River, NJ • Boston • Indianapolis • San Francisco New York • Toronto • Montreal • London • Munich • Paris • Madrid Capetown • Sydney • Tokyo • Singapore • Mexico City Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and the publisher was aware of a trademark claim, the designations have been printed with initial capital letters or in all capitals. The author and publisher have taken care in the preparation of this book, but make no expressed or implied warranty of any kind and assume no responsibility for errors or omissions. No liability is assumed for incidental or consequential damages in connection with or arising out of the use of the information or programs contained herein. The publisher offers excellent discounts on this book when ordered in quantity for bulk purchases or special sales, which may include electronic versions and/or custom covers and content particular to your business, training goals, marketing focus, and branding interests. For more information, please contact: U.S. Corporate and Government Sales (800) 382-3419 corpsales@pearsontechgroup.com For sales outside the United States, please contact: International Sales international@pearson.com Visit us on the Web: informit.com/ph Library of Congress Cataloging-in-Publication...

Words: 228961 - Pages: 916