Tuesday, May 5, 2020

Information System Management

Question: Describe about the Article for Information System Management. Answer: Introduction This report is aimed to perform an analysis to assess the impact of business intelligence and analytical tools for the improved decision making and knowledge management and to assess the challenges and the opportunities of non-relational and cloud database for an organization. Thus, the purpose of this report is to evaluate critically the role that has been played by the database systems and on how it is utilized as the source for the analytical tools as well as the business intelligence for the improved knowledge management system as well as improve decision making process. This report has also aimed to analyze the requirements of a company for storing data and data gathering. Background Information of the Company Hence, AVST has been considered to continue this report. Applied Voice and Speech Technologies is a trusted software-based Unified Communications (UC) solutions developer (Mysql 2016). This organization is capable of offering the best of breed solutions for its unmatched ability of interoperation with the broader range of the UC components from several leading vendors. The headquarter of the organization is situated in the Orange County, California. The specialization of AVST is creating business communication solutions for the government, small and large enterprises, hospitality market, healthcare and many more. CX-E or speech-enabledunified communicationsplatform is the main product of the organization. The organization now feels to increase the data handling capacity so that the organization can manage all its business properly. Capabilities of Database Management System Query Ability The process of making Query is the information to request attribute process from several combinations of parameters as well as various perspectives (Clifford et al., 2012). Replication and Backup The copies of the attributes require to be implemented in a regular basis in case the primary disks as well as the other equipment fails. The attributes periodic copy can also be implemented for a distant company that cant access readily the original. Database Management System generally gives the utilities for facilitating the process of disseminating and extracting the sets of attribute (Watanabe et al., 2013). Rule Enforcement One often wants for applying the rules to the attributes so that the attributes are reliable and clean. Security It is often desirable to the limit that can change or see which groups of attributes or the attributes itself. It can also directly be managed by individual or by the individuals assignment as well as the privileges to the groups or through the assignment of the groups to roles those are then granted entitlements (Selinger et al., 2012). Computation Some common computations are there which are requested on the attributes like cross-referencing, grouping, sorting, averaging, summing, counting and others (Chen, Chiang and Storey 2012). They can rely on the Database Management System for supplying such calculations rather than have every computer application implement these from scratch. Challenges and Benefits of Database Management System and AVST DBMS has several potential benefits. These are as follows: Legacy Call Processing: It is capable of replacing a legacy voice mail system. AVST was on the market at the time of purchasing the legacy system. It has the capacity of duplicating the functionality of the older legacy systems. IT Flexibility and Economics: It produces one of the most LAN-friendly products. It is because, the IT flexibility they provide is through the selection of process and configuration deployment management. Controlling Redundancy Every application has its own private files in the file system that cannot be shared among multiple applications. Often it can result in the considerable redundancy in the stored data that results in the storage places wastage (Luhn 2015). Most of these redundancies can be ignored by having a centralised database. Inconsistency Avoidance While the similar data is duplicated as well as the changes are implemented at the single site that is not broadcasted to the other end, thus, it can form an irrelevance as well as the two entities about the similar data would not agree (Han, Song and Song 2012). Data sharing the general data can be shared by various applications in the centralized Database Management System in comparison to the file system. Therefore, nowadays, applications can be implemented for operating against the similar data which are stored in the database. Enforcement of the Standard Standard can easily be enforced may be at the company level, International level, National Level and Departmental level as the DBMS is a central system. The standardized data is useful during interchanging or the migration of data. The challenges of DBMS are as follows: Complexity The functionality provision that is expected from a good DBMS makes the DBMS an extremely complicated piece of software. End-users, database administrators, developers as well as database designers must understand this functionality for taking complete benefit of it (Pakhira 2012). Failure for understanding the system can result in the bad decisions regarding design that can have serious issues for a company. The complexity with the system of AVST is manageable but it needs proper support of the stakeholders. Size The breadth and complexity of the functionality makes the Database Management System a huge piece of software, obtaining several megabytes of disk space as well as requiring the considerable amounts of memory for efficiently running. Performance A File Based System typically is a written for a particular application like invoicing. Performance is usually very good as a result. The access to the system is very quick and accurate but AVST can be creating issue. Nevertheless, the DBMS is written to be more general for catering for several applications rather than just one. Cost of DBMS The DBMS cost significantly varies based on the environment as well as provided functionality. The recurrent annual cost for maintenance is also there (Krishnamurthy et al., 2014). Extra Hardware costs The requirements for the disk storage in the DBMS as well as the database can necessitate the additional storage spaces purchase. Additionally, it may be necessary for purchasing a larger machine for achieving the required performance, perhaps even a machine dedicated to run the Database Management System. Conversion Cost The extra hardware and the cost of DBMS may be insightful in comparison to the cost to convert the existing applications for running on the new hardware as well as DBMS. Technical, Ethical and Legal Challenges Database Presents for an Information Systems Manager There can be several technical, ethical as well as legal challenges presented by the database faced by the Information System Manager. These are as follows: Privacy is a very serious concern for the Information Security Managers while using a particular database. The privacy issues can be taken place as per the legal as well as the ethical aspects (Reddy et al., 2014). The two major issues with the privacy of database are the proper security of the database itself as well as the ethical and legal implications of what should be stored on the databases in the first place. Information can often be leaked by the database due to some significant faults such as the SQL Injection. Another major ethical issue of the database is deciding which classifications of private as well as personal information; the information professional is entitled for gathering. The information accuracy can be another significant issue as per the ethical and legal viewpoint. This particular consequence is regarding the particular importance in cases where a particular information system manager is working with the personal data that can also have a direct impact on the professional like of that person. Security is another crucial challenge for the information security manager in an organization. While the data regarding some operation from a particular company database are leaked, thus it would result in a huge loss for that company (Pakhira 2012). This kind of issues can be occurred due to the unethical as well as illegal access within the company database and some technical difficulties as well. Thus, the ethical norms and values should be properly maintained and in order to do that specific effective and strict rules and regulations must be implemented within the organization. With the help of these rules and regulations, the unauthorized access in the database would be minimized. However, in order to mitigate the technical difficulties, people should be technologically sound to manage all the processes of managing, retrieving information in database. Taken as an example, the attacks such as DDoS can be a critical factor in terms of security. If a DDoS attacks starts it is very hard to overcame from it so AVST tries to avoid the attack as much as possible. It is done through bandwidth oversubscription. It suggests the organization to lease more bandwidth than needed so that the attacker cannot start the volumetric attack. Not only will this but the organization workers also be responsible for not accessing the sites that can contain spas and malware. Process of Using Database as the Source of Business Intelligence and Analytics Tools Business Intelligence and Analytics Tools are a kind of application software which is designed for retrieving, transforming, reporting as well as analyzing data for the business intelligence. The Business Intelligence Analytics tools leverage data as well as convert it to an actionable data that can be proved beneficial for the company. Hence, in case of AVST or Applied Voice and Speech Technologies, this company has utilized the database as the source for the business intelligence and analytical tools in order make improved decisions as well as knowledge management (Rivera 2014). Decision making as well as the knowledge management processes are the most crucial processes in the business operation of an organization. In case of decision, the act of selecting two or courses of action is very important. On the other hand, in knowledge management system, the process of sharing, using, developing as well as capturing organizational knowledge is important (Ferretti, Colajanni and Marchett i 2012). AVST is awash in data regarding their competitors, partners, suppliers, internal business processes, prospects as well as consumers and clients. However, with the help of the technology of the Business Intelligence tools, AVST enables the employees for transforming data into the information, client, staff, business pattern and many more, that would help their business in terms of building proper knowledge management system as well as making proper decisions regarding the information management through Database Management System. Non-relational databases and cloud databases Opportunities The cloud databases as well as non-relational databases have given AVST several opportunities in comparison to the utilization of the traditional database systems. In case of the non-relational databases can provide The opportunity of storing arrays in the JSON objects. It will assist in storing images, predictable relationships, audios, flat hierarchies. On the other hand, storing records in the similar collection that have several attributes or fields can be the other opportunity. In case of the cloud database, the usage of the cloud database has been advancing in recent days (Han, Song and Song 2012). There are several opportunities of using the cloud database. These are as follows: It can also increase the number of several opportunities like cost savings, as well as elasticity and scalability to the organization, AVST. The organization can allocate the saved capital in enhancing the core parts of the organization. Through increased scalability it can adjust itself as per the need of the market. On the other hand, it can also provide the opportunities of cost savings, disaster recovery, accessibility, bandwidth as well as usability. Challenges The non-relational databases as well as cloud database can result in several challenges to AVST as compared to the other traditional database systems (Bakalash et al., 2012). The cloud database can create several significant challenges for the company in terms of the usability of data, the access and modification of the data can be a critical task some times. bandwidth of data transmission, accessibility of data, security of the data as well as the software tools. On the other hand, in case of non-relational database, it does not treat operations automatically as transactions the way a relational database does. Therefore, the non-relational database has been proven time consuming for the organization. Conclusion The entire discussion made in this particular study has successfully covered all the capabilities as well as challenges of the database management in the context of a particular business scenario in AVST. The business intelligence will be responsible for examining the data in the database and producing the understandable information. From the gathered information from the business intelligence the analytical tools will be used so that a conclusion can be accomplished on the basis of the gathered information. This study has mainly established successfully the advantages of business intelligence and the analytical tools over the database management system that mainly helps in improving the knowledge management system and the process of decision making. On the other hand, this study has also successfully enlightened the opportunities and the challenges to AVST those are associated with the non-relational databases and the cloud databases. Thus, after analyzing all the issues, this study has also provided the feasible and significant resolving method to the company to overcome the problems raised in terms of database management system. Recommendations In order to rectify all the challenges associated with the Database Management System as well as non-relational and cloud database, AVST has to follow the possible and the most effective and useful techniques. These recommendations can be as follows: AVST first has to introduce the extraordinary data monitoring tools as well as to improvise the functionality of the remote DBA. In the current situation in AVST, the potential replication for the high availability is mandatory to be adopted in the organization in order maintains the Database Management System. With the help of the replication, high performance can be ensured from the database management side for the organization. The AVST is recommended to use more power sources. It also suggested to use a data recovery system and store the hardwire below the ground level as it is in a place where environmental disaster is common. This organization should also address the new cloud market. On the other hand, in order to prohibit the unethical access to the database, the organization should make their privacy norms and policy stricter. Reference List Bakalash, R., Shaked, G. and Caspi, J., Hyperroll and Israel Limited, 2012.Relational database management system having integrated non-relational multi-dimensional data store of aggregated data elements. U.S. Patent 6,385,604. Chen, H., Chiang, R.H. and Storey, V.C., 2012. Business Intelligence and Analytics: From Big Data to Big Impact.MIS quarterly,36(4), pp.1165-1188. Clifford, P. and Bhandari, R., Clifford Paul Ian and Bhandari Rory Anthony, 2012.Database management system. U.S. Patent Application 10/488,592. Ferretti, L., Colajanni, M. and Marchetti, M., 2012. Supporting security and consistency for cloud database. InCyberspace Safety and Security(pp. 179-193). Springer Berlin Heidelberg. Han, J., Song, M. and Song, J., 2012, May. A novel solution of distributed memory nosql database for cloud computing. InComputer and Information Science (ICIS), 2011 IEEE/ACIS 10th International Conference on(pp. 351-355). IEEE. Krishnamurthy, S., Thombre, N., Conway, N., Li, W.H. and Hoyer, M., Cisco Technology, Inc, 2014.Addition and processing of continuous SQL queries in a streaming relational database management system. U.S. Patent 8,745,070. Luhn, H.P., 2015. A business intelligence system.IBM Journal of Research and Development,2(4), pp.314-319. Mysql.com. (2016).MySQL :: AVST UC Solutions Provide High Availability, Real-Time Performance and Lower Costs with MySQL. [online] Available at: https://www.mysql.com/why-mysql/case-studies/avst-uc-solutions-provide-high-availability-mysql.html [Accessed 2 Jul. 2016]. Pakhira, M.K., 2012.Database Management System. PHI Learning Pvt. Ltd.. Peltier, T.R., 2013.Information security fundamentals. CRC Press. Reddy, T.B.K., Thomas, A.D., Stamatis, D., Bertsch, J., Isbandi, M., Jansson, J., Mallajosyula, J., Pagani, I., Lobos, E.A. and Kyrpides, N.C., 2014. The Genomes OnLine Database (GOLD) v. 5: a metadata management system based on a four level (meta) genome project classification.Nucleic acids research, p.gku950. Rivera, J., 2014. Gartner s 2014 Hype Cycle for Emerging Technologies Maps the Journey to Digital Business. Gartner Newsroom, pp.20142016. Available at: https://www.gartner.com/newsroom/id/2819918. Selinger, P.G., Astrahan, M.M., Chamberlin, D.D., Lorie, R.A. and Price, T.G., 2012, May. Access path selection in a relational database management system. InProceedings of the 1979 ACM SIGMOD international conference on Management of data(pp. 23-34). ACM. Watanabe, Y., Tanaka, K. and Hayata, H., Fuji Xerox Co., Ltd., 2013.Database management system. U.S. Patent 6,016,490.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.