Free Essay

Planning and Developing an It Hardware Strategy Utilizing Virtualized Hardware.

In:

Submitted By bobbucci
Words 2968
Pages 12
Planning and Developing an IT Hardware Strategy utilizing virtualized hardware.

MIS535 Management Applications of Information Technology

Table of Contents

Abstract 3
Brief Company Background 4
Discussion of Business Problem 5
High Level Solution 6
Benefits 8
Conclusions and Overall Recommendations 11
Summary 13

Abstract
Corporate users of technology use a variety of technologies to get their work done. Over the last three decades, companies that create and manage data have implemented a wide variety of disparate computers systems, each slightly different. This makes maintaining these environments expensive and troublesome to expand and maintain. A potential solution to this multi-platform server sprawl is to consolidate from many to a few computing platforms. Once the application software is ported to these new platforms, we can begin to virtualize hardware. These are the prerequisites for cloud computing. This plan addresses these concerns in my current place of employment which has been experiencing this problem for over a decade. Based on industry publications and communications with my peers, it appears that many companies are experiencing these types of issues. The recession of 2007-2008 has been very difficult for IT firms. We’re doing more with less and it appears that the budgets won’t be significantly increasing for some time.

Company Background
The name of the firm in this project is the Depository Bank and Trust Corporation of New York. This firm is an FDIC member and a clearing house for Wall Street firms. The bank is in the process of expanding internationally and has gone from a single US datacenter, to maintaining offices in the Netherlands, Singapore, Shanghai, Chennai and Tokyo. Rapid expansion has created a fragmented Information Systems infrastructure, which has made the environment difficult to manage. Costs have also escalated to the point where they need to be contained. In today’s extremely competitive environment, we need to plan and execute cost effective, reliable solutions to support our international expansions. We need to use local partners to host our datacenters and conform to very stringent multi-country regulations. We need to be the best cost, most reliable solutions provider to the industry.

Business Problem Statement
In the 1970’s, there was no computer interoperability, you went to your vendor, typically a monolithic computer vendor like IBM and you purchased a turnkey solution to your computing needs. You may have needed to change your business processes to adopt to your new computing environment. The overhead required to computerize a medium to large sized firm was staggering. You were partnered with your vendor, with little way out of relationship. In the 1980’s competition crept up on the large vendors. The advent of the personal computer changed everything. Companies who had large investments in hardware and software were now in competition with personal computers running Lotus 123. These isolated computers posed no threat to the large computing environments until mid-decade when the Local Area Network became available for small computer system. Two decades ago, as computers became more connected, interoperation between vendors was the driving factor for hardware vendors. Standardization of protocols like TCP/IP made it possible for servers from different vendors to communicate. Companies like Sun Microsystems and IBM were big winners with their Solaris and AIX operating systems. Santa Cruz Operations (SCO) also had a UNIX flavor that ran on X86 based hardware. A few years later, companies like Microsoft and Novell made great strides in both the desktop and enterprise environments. When we fast forward into the present, we find that we have a majority of legacy systems, running on various proprietary platforms. We have decided to reduce our Operating System palate to just two. Windows and Linux! Windows2008 Enterprise R2 or Red Hat Enterprise Linux 6 will be the only two choices. This greatly reduces our hardware and software support costs and allows virtualization of all future servers, creating many future synergies. Today in 2013, many of the lower tiered servers have already been consolidated and/or virtualized. However, virtualizing business-critical applications—databases, ERP systems, email servers, and industry-specific solutions—feels like a completely different ballgame, and there are questions whether the risk vs. return ratio is still worth it. In addition, these applications often have application owners and database administrators that may not be familiar with virtualization. (VMware, 2012). These issues need to be addresses before we can proceed with the implementation.

Proposed Solution
We will first need to get an accurate inventory of all of the company server assets. Once we understand our inventory, we can see what needs attending to. We need to communicate what virtualization means to all of the stakeholders at the firm. As Kenneth Lauden, (2012) mentions, Virtualization is the process of presenting a set of computing resources so that they all can be accessed in ways that are not restricted by physical configuration or geographic location. Virtualization enables a single physical resource such as a server or storage array, to appear to the end user as multiple logical resources. David Marshall (2011) mentions that stakeholder buy-in should be straightforward once the top benefits of virtualization are communicated. Among the top benefits are faster server provisioning, which reduces our time to market and gives us a strategic advantage. We’ll all take advantage of better disaster recovery scenarios with virtualization. Presently, each application has an individual disaster recovery scenario. With many different systems, dependencies and different priorities make DR a difficult, if not impossible task. Virtualization solves this. Virtualization also gives our stakeholders an added benefit. They can, if they choose to, extend the life of older applications. Some parts of our organization may be locked in to an old solution currently running on obsolete hardware. Without a budget to replace these legacy apps, virtualization may be the only option to keep them alive. Once the hardware dependency is removed, the virtualized application may run on modern, backed up systems indefinitely. Once virtualized, these apps also have the ability to move into the cloud, which gives the firm a new set of capabilities. These applications can be in the cloud, yet isolated from other systems. Once the virtualization effort is completed, uptime for these applications will be increased. As an example, our mail center uses an old Palm based application for internal mail deliveries. This PC based system is over a decade old and the vendor has been absorbed into a larger firm. Once these servers are virtualized, the life of the system is extended to the life of the Palm pilot devices, of which we own over five hundred. Some of the other benefits are of interest more to IT infrastructure than the stakeholders. Among the benefits , a large reduction in the datacenter footprints. With many new international data centers coming on-line, the firm will be able to reduce the company’s energy footprint, This means far fewer physical servers, less networking gear, a smaller number of racks needed. In addition, data center cooling and facilities management is greatly reduced. IT will also benefit from server consolidation and virtualization with easier QA and development environments, each on its own isolated network. These efforts also reduce vendor lock-in. As mentioned previously in the abstract, in the early days, companies were completely locked-in to vendor’s specific solution. Being tied down to a particular vendor can be quite frustrating, since negotiating power may not be effective. Since server virtualization abstracts away the underlying hardware (Marshall 2011) and replaces it with virtual hardware, data center managers and owners gain a lot more flexibility when it comes to the server equipment they can choose from. This can also be a handy negotiating tool with the hardware vendors when the time comes to renew or purchase more equipment. These powerful benefits make it easier for stakeholder adoption. Once the buy-in in complete, we’ll need to select the vendors and partners that will provide our virtual infrastructure. We’ll need to make it highly available, spread it out internationally, and be able monitor and operate it in an efficient manner. Once we have a list of candidates we’ll prioritize which virtualization candidates will be transitioned to virtualization. Application development will need to make code changes to software to make it run on RHEL or Windows 2008. Since we’re already running java for most of our infrastructure, the transition shouldn’t be too painful. We’ll need to closely manage the virtual environment for capacity, and create a shadow QA environment for software and hardware testing.

General Benefits
We currently have multiple hardware vendors’ servers, running a large variety of Operating Systems, with application code written in languages from assembler to COBOL. Standardization to RHEL and Windows2008 with C++ and Java will give us the ability write portable code that will run anywhere in the infrastructure. If we look at server utilization in the datacenter, we see low utilization across many servers. With Virtualization, we’ll have fewer servers, better utilized, with a smaller datacenter footprint and higher availability and supportability. We’ll also be faster to market and much more dependable Data Security issues will be improved in our new virtualized environment. All of the top benefits mentioned in the solution will be leveraged upon. There are also a number of other concerns that need to be addressed, security being the most urgent. A critical requirement of datacenters in todays cloud-based computing and services environment is that they provide a common infrastructure serving multiple groups or customers (Microsoft 2012) all the while keeping each group’s data private and secure by enforcing full isolation of each workload from all other groups’ workloads. Multitenancy, as it is known, provided a good level of workload isolation between virtual machines in server virtualization, but recently the network layer of the virtualized datacenter was still not fully isolated. The need for multitenant security and isolation is key. This provides the flexibility to restrict any customer’s access to a virtual machine on any node while still maintaining network and storage traffic isolation. The firm needs the controls to isolate important “keep the lights on” mission critical traffic from other day-to-day network traffic. Access controls must also be comprehensive and manageable. One of the other new concerns in this virtual, cloud ready environment is server sprawl. Since the servers are easy, fast and cheap to provision, a large quantity will be ordered. As Techtarget.com (2009) mentions, virtual servers have the same needs as physical servers when it comes to security, storage and management. If you can't control VM sprawl, there can be serious ramifications on the safety and reliability of not just your virtual server infrastructure, but of your physical infrastructure too. When the number of virtual machines (VMs) on the network reaches the point where an administrator can't manage them effectively -- or where the VMs start demanding excessive host resources, that means there is virtual sprawl. There needs to be a formal request system, based on our architecture office, to determine if the servers requested are actually necessary, or if their functions can be consolidated into existing resources. Although this will slow down provisioning speed, it is critical if we want to plan for growth. As companies have adopted virtualization, it has become easier and easier to create virtual servers. What used to take weeks can be done in minutes. But now the bill is coming due and companies are dealing with virtual server sprawl. Virtual sprawl is really a class of problems related to the uncontrolled creation and ongoing lifecycle of virtual machines. Virtualization by its nature is extremely dynamic and flexible, and with anything that is extremely dynamic, and even disruptive, there are always new concerns and new considerations.

With virtualization you can create, copy, change and move things very quickly. But what has not kept pace is the ability to track and manage these virtual assets. There are massive blind spots in the virtual world, areas where virtual assets are used and can grow, and then fall into disuse without being monitored by virtualization technologies like VMware, or by traditional data center management systems. Everybody is overspending as a result of all of these new dynamics.
Many customers complain that virtualization does not save money, but actually costs more that keeping physical servers. Forbes Magazine’s Dan Woods (2009) did an expose on what he found. The most critical take away to virtualizing our firm is again mentioned by Forbes, Most overspending is related to the hard cost of storage for machines that aren’t being used at all. The number is actually much larger when software licensing, support costs and fractions of head count are factored in. In fact, the majority of adopters overspend on server sprawl. The company will need to take a close look at controls and processes in the datacenter. It will need to use COBIT, ITIL or whatever processes is in place to insure that best practices for virtualization and cloud computing are in place. Growth and capacity are to be closely monitored to insure that the computing resources are healthy and will have a long, productive lifecycle.

Conclusions and Overall Recommendations.
Our firm has been thrown into an environment where globalization is our only method for growth. In order to survive, we need to quickly abandon our old business center based IT provisioning to a unified manageable, scalable solution. We need to abandon legacy platforms and focus on virtualization on industry standard platforms with an eye on cloud computing. Our infrastructure has to be able to support 24/7 operations on a global scale with no down time.
We have standardized our server platforms to Red Hat Enterprise Linux (RHEL) and Windows 2012. These platforms have the largest ecosystems around them and application developers are plentiful. We have also standardized on Hewlett Packard Proliant Hardware as our Server vendor. HP has a huge global footprint and an entire support division for mission critical systems. For our Networking hardware, Cisco System’s Nexxus line of switches and routers give us world class speed and reliability. Like HP, Cisco has a huge global footprint and can support us 24/7. For our storage EMC gives us many storage options for the new environment. Everything from NFS based storage for our non-critical systems to the fastest Fiber-channel devices for our most critical data. We chose VMware for our virtual server Hypervisor. In addition to being the reliable and robust system, VMware’s vSphere offering gives us the tools needed to manage our environment.
With these vendors in place, we’ll need to change our internal processes to best leverage out new environment. We’ll need to adopt new best practices to insure we don’t fall prey to any of the major problems that have manifested themselves in the industry. Well firstly need to take a cold hard look at security, and come up with plans that meet our needs. We’ll need to develop best practices around access controls, along with isolating data and traffic based on importance. Secondly, we’ll need to do all we can to minimize server sprawl. Again business processes need to be changed and best practices will need to be implemented to insure we don’t overspend on needless resources that will raise costs. We’ll need to be “stingy” with the average server. Our internal customers will need to justify larger, or more numerous servers with processes that prioritize who gets additional resources. Thirdly, we’ll need to control and closely manage growth of our new global IT infrastructure. We’ll need to install tools to monitor capacity and faults. VMware provides a package called Capacity IQ which monitors usage trends and anomalies in the compute infrastructure. EMC also provides tools for storage use. We’ll need to insure that we are involved in the budget process and we will need to forecast what our usage is one to three years out. We’ll need to keep abreast of trends both in computing and banking so that we’re not blindsided by an industry event. Fourthly, we’ll need to protect our new infrastructure from both hardware failure and disaster. As the events of 9-11 have shown our firm, you cannot be prepared for everything. Before 9-11, we had two datacenter in downtown Manhattan. Both were on the same power grid as the World Trade Center. It took three days to install emergency power and bring up a minimal group of computers. In our new global, infrastructure, we should be able to move “applications” anywhere we have a presence. We can bypass disasters as they happen with minimal impact to our firm and customers.

Summary

Reduce number of computing platforms to two.
Develop roll-out plan.
Select Vendors. Partner with best-of-breed.
Get stakeholder buy in.
Virtualize “low hanging fruit” servers.
Monitor results and change accordingly.
Develop Enterprise Infrastructure best practices and procedures.
Virtualize “tier 1” servers.
Minimize Server Sprawl.
Test Backup.
Test DR.
Monitor and address faults.
Monitor Capacity.
Forecast growth intelligently.
Ensure proper budget to enable growth.
Keep a close eye on security.
Enjoy the benefits of a secure, stable, global infrastructure.

References

Laudon, K.C., Laudon, J.P. (2012) Management Information Systems. Custom Edition for Devry University. IT infrastructure and emerging technologies P 182

Marshall, David, (2011) Infowold, Top 10 benefits of server virtualization http://www.infoworld.com/d/virtualization/top-10-benefits-server-virtualization-177828 Microsoft Corporation (2012) Server Virtualization with Windows Server 2012 Hyper-V http://download.microsoft.com/download Tech Target (2009) Controlling VM Sprawl in your infrastructure http://searchservervirtualization.techtarget.com/Control-VM-sprawl-in-your-virtual-server-infrastructure VMware, (2012) Virtualizing Business-Critical Applications on vSphere White paper 2012 http://www.vmware.com/files/pdf/solutions/VMware-Virtualizing-Business-Critical-Apps-on-VMware_en-wp.pdf Woods, Dan (2009) The costs of Sever Sprawl, Forbes Magazine, Web edition
http://www.forbes.com/2009/12/01/embotics-computers-enterprise-technology-cio-network-virtualization.html

Similar Documents

Premium Essay

Seabreeze

...the state in an effort to close a large budget deficit in the state budget. As a result of these financial reverses a wholesale effort to cut costs over all of the areas of city management is being pursued. One of the ways to significantly reduce the costs of the Information Technology Department is to virtualize the server hardware that the city currently utilizes. This will have a secondary benefit of reducing the city’s costs associated with owning server equipment such as cooling and power. The IT Department should also move to leasing the end-user computers to allow the city to amortize the costs over a replacement lifecycle instead of purchasing the equipment outright and having the costs of upgrading and keeping spare systems on hand to accommodate replacements. Proposed Plan The city of Seabreeze would benefit by converting to a completely hosted virtual solution to eliminate the cost of ownership of physical servers and storage area networks. This will also allow Seabreeze to utilize the hosting company’s services to manage backups and disaster recovery planning. Seabreeze will also be able to eliminate a large amount of software costs by utilizing Google Apps for Work. This will also allow the city to utilize software as a service reducing their software licensing costs and the costs of having staff to support it. Seabreeze would also be a good candidate to lease the end-user computers. This will allow them to...

Words: 2607 - Pages: 11

Premium Essay

Next Generation Firewall

...Final Project Next Generation Firewall By: Edward Caudill Submitted as partial fulfillment of the requirements for the Bachelors of Computer Science Independence University April, 2015 Copyright ( 2015 Edward Caudill This document is copyrighted material. Under copyright law, no parts of this document may be reproduced without the expressed permission of the author. Approval Page INDEPENDENCE UNIVERSITY As members of the Final Project Committee, we certify that we have read the document prepared by __________________ entitled ________________________________________ and recommend that it be accepted as fulfilling the Capstone requirement for the Degree of ________________________________________ ____________________________________________________________Date: _________ Name of Course Instructor ____________________________________________________________Date: _________ Associate Dean Signature ____________________________________________________________Date: _________ Senior Associate Dean Signature I hereby certify that I have read this document prepared under my direction and recommend that it be accepted as fulfilling the dissertation requirement. ____________________________________________________________Date: __________ Course Instructor Abstract Taking advantage of a vulnerability (i.e., an identified weakness), in a...

Words: 3381 - Pages: 14

Premium Essay

Test Paper

...g Easier! Making Everythin ™ mputing Cloud Co Learn to: • Recognize the benefits and risks of cloud services • Understand the business impact and the economics of the cloud • Govern and manage your cloud environment • Develop your cloud services strategy Judith Hurwitz Robin Bloor Marcia Kaufman Fern Halper Get More and Do More at Dummies.com ® Start with FREE Cheat Sheets Cheat Sheets include • Checklists • Charts • Common Instructions • And Other Good Stuff! To access the Cheat Sheet created specifically for this book, go to www.dummies.com/cheatsheet/cloudcomputing Get Smart at Dummies.com Dummies.com makes your life easier with 1,000s of answers on everything from removing wallpaper to using the latest version of Windows. Check out our • Videos • Illustrated Articles • Step-by-Step Instructions Plus, each month you can win valuable prizes by entering our Dummies.com sweepstakes. * Want a weekly dose of Dummies? Sign up for Newsletters on • Digital Photography • Microsoft Windows & Office • Personal Finance & Investing • Health & Wellness • Computing, iPods & Cell Phones • eBay • Internet • Food, Home & Garden Find out “HOW” at Dummies.com *Sweepstakes not currently available in all countries; visit Dummies.com for official rules. Cloud Computing FOR DUMmIES ‰ Cloud Computing FOR DUMmIES ‰ by Judith Hurwitz, Robin Bloor, Marcia Kaufman, and Dr. Fern Halper Cloud Computing For Dummies® Published by Wiley Publishing...

Words: 96278 - Pages: 386

Premium Essay

Cloud Computin

...Cloud Computing: A Taxonomy of Platform and Infrastructure-level Offerings David Hilley College of Computing Georgia Institute of Technology April 2009 Cloud Computing: A Taxonomy of Platform and Infrastructure-level Offerings David Hilley 1 Introduction Cloud computing is a buzzword and umbrella term applied to several nascent trends in the turbulent landscape of information technology. Computing in the “cloud” alludes to ubiquitous and inexhaustible on-demand IT resources accessible through the Internet. Practically every new Internet-based service from Gmail [1] to Amazon Web Services [2] to Microsoft Online Services [3] to even Facebook [4] have been labeled “cloud” offerings, either officially or externally. Although cloud computing has garnered significant interest, factors such as unclear terminology, non-existent product “paper launches”, and opportunistic marketing have led to a significant lack of clarity surrounding discussions of cloud computing technology and products. The need for clarity is well-recognized within the industry [5] and by industry observers [6]. Perhaps more importantly, due to the relative infancy of the industry, currently-available product offerings are not standardized. Neither providers nor potential consumers really know what a “good” cloud computing product offering should look like and what classes of products are appropriate. Consequently, products are not easily comparable. The scope of various product offerings differ and overlap...

Words: 19454 - Pages: 78

Free Essay

Green Computing and Green It Best Practices - Jason Harris

...GREEN COMPUTING AND GREEN IT BEST PRACTICES On Regulations and Industry Initiatives, Virtualization, Power Management, Materials Recycling and Telecommuting Notice of Rights: Copyright © Jason Harris. All rights reserved. No part of this book may be reproduced or transmitted in any form by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publisher. Notice of Liability: The information in this book is distributed on an “As Is” basis without warranty. While every precaution has been taken in the preparation of the book, neither the author nor the publisher shall have any liability to any person or entity with respect to any loss or damage caused or alleged to be caused directly or indirectly by the instructions contained in this book or by the products described in it. Trademarks: Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and the publisher was aware of a trademark claim, the designations appear as requested by the owner of the trademark. All other product names and services identified throughout this book are used in editorial fashion only and for the benefit of such companies with no intention of infringement of the trademark. No such use, or the use of any trade name, is intended to convey endorsement or other affiliation with this book. 1 WRITE A REVIEW & RECEIVE A BONUS EMEREO EBOOK...

Words: 31633 - Pages: 127

Free Essay

Green Computing and Green It Best Practices - Jason Harris

...GREEN COMPUTING AND GREEN IT BEST PRACTICES On Regulations and Industry Initiatives, Virtualization, Power Management, Materials Recycling and Telecommuting Notice of Rights: Copyright © Jason Harris. All rights reserved. No part of this book may be reproduced or transmitted in any form by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publisher. Notice of Liability: The information in this book is distributed on an “As Is” basis without warranty. While every precaution has been taken in the preparation of the book, neither the author nor the publisher shall have any liability to any person or entity with respect to any loss or damage caused or alleged to be caused directly or indirectly by the instructions contained in this book or by the products described in it. Trademarks: Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and the publisher was aware of a trademark claim, the designations appear as requested by the owner of the trademark. All other product names and services identified throughout this book are used in editorial fashion only and for the benefit of such companies with no intention of infringement of the trademark. No such use, or the use of any trade name, is intended to convey endorsement or other affiliation with this book. 1 WRITE A REVIEW & RECEIVE A BONUS EMEREO EBOOK...

Words: 31633 - Pages: 127

Premium Essay

Green Cloud

...attribute material which is obtained from another source may be considered as plagiarism. (Signature of student) Abstract Cloud computing is a breakthrough innovation in information technology industry. It brings new efficiencies and advantages to business. There is much hype about environmental impacts of cloud computing on green issues. Some favour of cloud computing as solution to green issues while others blame cloud computing as burden to environmental problems. Cloud computing, nevertheless, like other technology, is neutral. It can be either cause or solution to environmental issues. There is growing pressure on cloud computing industry to reduce the environmental impacts of their data centres. The current trend focuses on developing green cloud computing. However, the evaluation of solutions to green cloud computing bases on certain standards, metrics and benchmarks, which assess only parts of the environmental issues with cloud computing. This report will concentrate on green issues with cloud computing. Significant positive and negative impacts of cloud computing on the environment issues will be investigated. Next, a classification of green issues with cloud computing also is offered with aims at better understanding of such issues. This report also pays attention to green cloud computing, especially assessing solutions to green cloud computing. It begins with the concept and requirements of green cloud computing. A framework for assessing solutions to green cloud...

Words: 25393 - Pages: 102

Premium Essay

Test

...Week 1: Information Systems in the Digital Firm - Lecture | | | Information Systems in the Digital Firm Evolution | Current State | Trends | Tutorial The Evolution, Current State, and Trends of Information Systems In addition to the material currently described, an introduction to cloud computing and user involvement in IT projects also will be included in this lecture. This is required as foundational knowledge for the chapters to come. We will explore it at a business level and a minimal technical level. | | Evolution | | The business landscape has changed over the past seventy years in every significant way. Without information systems, these changes would not have occurred. To gain a perspective on the evolution of information systems, we can review the significant computer inventions from the first computer through to cloud computing. As computer technology progressed, new skills had to be learned, and new methods of management evolved to replace old hierarchical styles with new team based methods. Increased productivity resulting in new information technology caused the downsizing of employees that began in the late 1980s and has continued. Information systems consultants identified productivity gains, so large that they cut the numbers in half and still weren't believed. Many of the products and services we use every day had not been invented just five or ten years ago. The ability to communicate electronically with anyone anywhere in the world...

Words: 5656 - Pages: 23

Premium Essay

Member

...assessment of U.S.-China economic relations and their implications for U.S. security, as mandated by Public Law 106-398 and Public Law 108-7. However, it does not necessarily imply an endorsement by the Commission or any individual Commissioner of the views or conclusions expressed in this commissioned research report. i About Defense Group Incorporated Defense Group Inc. (DGI) performs work in the national interest, advancing public safety and national security through innovative research, analysis and applied technology. The DGI enterprise conducts research and analysis in defense and intelligence problem areas, provides high-level systems engineering services to selected national and homeland security organizations, and produces hardware and software products for government and commercial consumers. About CIRA This project was conducted within DGI’s Center...

Words: 25160 - Pages: 101

Free Essay

Fi504 Project 2

...Morningstar Document Research FORM 10-K ORACLE CORP - ORCL Filed: June 28, 2011 (period: May 31, 2011) Annual report with a comprehensive overview of the company ® ℠ Table of Contents UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 FORM 10-K ⌧ ANNUAL REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the fiscal year ended May 31, 2011 OR � TRANSITION REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the transition period from to Commission file number: 000-51788 Oracle Corporation (Exact name of registrant as specified in its charter) Delaware (State or other jurisdiction of incorporation or organization) 54-2185193 (I.R.S. Employer Identification No.) 500 Oracle Parkway Redwood City, California (Address of principal executive offices) 94065 (Zip Code) (650) 506-7000 (Registrant’s telephone number, including area code) Securities registered pursuant to Section 12(b) of the Act: Title of each class Name of each exchange on which registered Common Stock, par value $0.01 per share The NASDAQ Stock Market LLC Securities registered pursuant to Section 12(g) of the Act: None Indicate by check mark if the registrant is a well-known seasoned issuer, as defined in Rule 405 of the Securities Act. YES ⌧ Indicate by check mark if the registrant is not required to file reports pursuant to Section 13 or Section 15(d) of the Act. YES � NO...

Words: 129673 - Pages: 519

Premium Essay

Beacuse I Have to

...CHAPTER 2 – CONTROLLING ACCESS TO INFORMATION AND SYSTEMS. 7 CHAPTER 3 – PROCESSING INFORMATION AND DOCUMENTS ................. 32 CHAPTER 4 – PURCHASING AND MAINTAINING COMMERCIAL SOFTWARE ..................................................................................................... 107 CHAPTER 5 – SECURING HARDWARE, PERIPHERALS AND OTHER EQUIPMENT .................................................................................................... 122 CHAPTER 6 – COMBATING CYBER CRIME ................................................. 146 CHAPTER 7 – CONTROLLING E-COMMERCE INFORMATION SECURITY 153 CHAPTER 9 – DEALING WITH PREMISES RELATED CONSIDERATIONS . 173 CHAPTER 10 – ADDRESSING PERSONNEL ISSUES RELATING TO SECURITY ........................................................................................................ 185 CHAPTER 11 – DELIVERING TRAINING AND STAFF AWARENESS .......... 192 CHAPTER 12 – COMPLYING WITH LEGAL AND POLICY REQUIREMENTS .......................................................................................................................... 197 CHAPTER 13 – DETECTING AND RESPONDING TO IS INCIDENTS........... 206 CHAPTER 14 – PLANNING FOR BUSINESS CONTINUITY .......................... 217 CHAPTER 15 – INFORMATION TECHNOLOGY RISK MANAGEMENT ........ 222 Introduction for Statewide Information Security Manual The Statewide Information Security Manual is the foundation for information technology security in North Carolina....

Words: 65255 - Pages: 262

Premium Essay

Title

...Information Systems Today, 5e (Valacich/Schneider) Chapter 1: Managing in the Digital World 1) Knowledge workers are professionals who ________. A) use knowledge to perform their jobs, but do not create knowledge B) create, modify, and/or synthesize knowledge as a fundamental part of their jobs C) use their skills to help others gain knowledge D) modify knowledge created by others, but do not create knowledge themselves E) work in the education industry Answer: B Page Ref: 5 AACSB: Use of IT Difficulty: Easy Objective: LO 1-1 Classification: Conceptual 2) Which of the following predictions made by Peter Drucker is true? A) Knowledge workers have lesser bargaining power than workers in other industries. B) Knowledge workers do not possess valuable real-world skills. C) Knowledge workers are not reliant on formal education. D) Knowledge workers are continually learning how to do their jobs better. E) Knowledge workers are not paid as well as their prior industrial counterparts. Answer: D Page Ref: 5 AACSB: Use of IT Difficulty: Moderate Objective: LO 1-1 Classification: Conceptual 3) During the time of the industrial revolution, some individuals who felt threatened by the changes brought about by technology resorted to protesting against the technology. Identify these individuals. A) Luddites B) Utopists C) Millenarists D) Utilitarians E) Preterists Answer: A Page Ref: 7 AACSB: Use of IT Difficulty: Easy Objective: LO 1-1 ...

Words: 31154 - Pages: 125

Premium Essay

E-Book Supply Chain Management

...Introduction to Supply Chain Management Technologies Second Edition Introduction to Supply Chain Management Technologies Second Edition David Frederick Ross CRC Press Taylor & Francis Group 6000 Broken Sound Parkway NW, Suite 300 Boca Raton, FL 33487-2742 © 2011 by Taylor and Francis Group, LLC CRC Press is an imprint of Taylor & Francis Group, an Informa business No claim to original U.S. Government works Printed in the United States of America on acid-free paper 10 9 8 7 6 5 4 3 2 1 International Standard Book Number-13: 978-1-4398-3753-5 (Ebook-PDF) This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint. Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming, and recording, or in any information storage or retrieval...

Words: 158845 - Pages: 636

Premium Essay

Managing Information Technology (7th Edition)

...Health Fund of New York City CASE STUDY I-5 Data Governance at InsuraCorp CASE STUDY I-6 H.H. Gregg’s Appliances, Inc.: Deciding on a New Information Technology Platform CASE STUDY I-7 Midsouth Chamber of Commerce (B): Cleaning Up an Information Systems Debacle CASE STUDY II-1 Vendor-Managed Inventory at NIBCO CASE STUDY II-2 Real-Time Business Intelligence at Continental Airlines CASE STUDY II-3 Norfolk Southern Railway: The Business Intelligence Journey CASE STUDY II-4 Mining Data to Increase State Tax Revenues in California CASE STUDY II-5 The Cliptomania™ Web Store: An E-Tailing Start-up Survival Story CASE STUDY II-6 Rock Island Chocolate Company, Inc.: Building a Social Networking Strategy CASE STUDY III-1 Managing a Systems Development Project at Consumer and Industrial Products, Inc. CASE STUDY III-2 A Make-or-Buy Decision at Baxter Manufacturing Company CASE STUDY III-3 ERP Purchase Decision at Benton Manufacturing Company, Inc. CASE STUDY III-4 The Kuali Financial System: An Open-Source Project CASE STUDY III-5 NIBCO’s “Big Bang”: An SAP Implementation CASE STUDY III-6 BAT Taiwan: Implementing SAP for a Strategic Transition CASE STUDY III-7 A Troubled Project at Modern Materials, Inc. CASE STUDY III-8 Purchasing and Implementing a Student Management System at Jefferson County School System CASE STUDY IV-1...

Words: 239887 - Pages: 960

Premium Essay

Jkhghjjhgjhjhjggh

...Solution Architecture IRDA Business Analytics Project Nov 2010 Solution Architecture Document - IRDA Business Analytics Project Table of Contents List of Abbreviations Used with Their Definition .......................................................................................... 5 List of Terms Used with Their Definition ...................................................................................................... 9 1. 1.1 1.2 2. 3. 4. 5. 5.1 5.2 6. 7. 7.1 7.2 7.3 7.4 7.5 8. 9. 9.1 9.2 10. 10.1 Executive Summary ......................................................................................................................... 14 Introduction ................................................................................................................................ 14 Solution Architecture .................................................................................................................. 14 Objectives of the Business Analytics Solution ................................................................................ 17 Key Business Drivers ....................................................................................................................... 17 Solution Themes ............................................................................................................................. 18 Present IT Infrastructure at IRDA ..............................................................................................

Words: 50163 - Pages: 201