Tuesday, May 5, 2020
Integration of Distributed Enterprise â⬠Free Samples to Samples
Question: Discuss about the Integration of Distributed Enterprise. Answer: Introduction: The company AE Kalina Cycle (AKC) is the company whose main function is to produce the electricity from the waste heat. According to the case study, the main material required by the company for its production are the waste materials heat which is produces by burning them and also from the chemicals in the chemical industries. The software and hardware behind the company production are: The hardware is an inverter which is specially designed to convert the waste water which when mixed with the chemical ammonia, it generates the AC current. The software part of the company is a monitoring system whose function is to track the performance and efficiency of the inverter and other machines continuously. Therefore the inverter and the software control tools used by the enterprise have made itself one of the successful companies of the Australia, and with such reputation, it is a huge challenge for the company to protect its data from misuse. According to the case study, one of the other r easons for the success of the company is its enterprise system (ES) known as the enter AKC. The enter AKC software has enabled a stable and uninterrupted revenue model for the company. All the company transactional and the accounting records are held by the software enter AKC. Though all the records are kept by the software, it is still placing a significant burden on the administrative department of the system. The company which has developed the enterprise software for the company has been closed down. As the result the software is unable to update. It is now facing a huge challenge to adapt the customer need the company has developed which has lead to the workarounds, patches and extensions to keep using the software. The other asset of the company is the AKC Data Warehouse. The company in their initial days avoided the original customer data management and built its data warehouse which has served as the platform for the new services. The company has researched for over five yea rs in the field of domestic battery storage for the alternate energy which it has successfully launched in the year of 2016 in the name of the power AC which uses the application of the lithium battery technology, an another asset of the company. The company is unable to run its enterprise system as the result it is depending on the cloud technology especially the SaaS to support the human resource section of the enterprise. For the cloud purpose, the company is relying on the enterprise called workday a US based SaaS provider. The company is highly concerned about its data therefore for the role data backup, it has enrolled a small company in norwa which has taken the responsibility to provide the data backup service for the company. Analyzing System Threats Analyzing the assets of the company following threats can be imposed on the company using the technology Firstly the company is depending on the wastes of the chemical industries and the plastic materials to produce the electricity (Bi Da and Wang 2014). These wastes can be radioactive so it can be a threat for the company and the worker can get affected by these radioactive elements and can get the deadly disease like skin cancer. Therefore, the employees should work with great care to avoid any such diseases. Secondly according to the case study the company is successful in its field therefore its data are on high demand. It has been using the older enterprises system which cannot be updated as the company which has made that software has been closed down therefore another threat to the company is that if the company do not use a proper enterprise system its data can be hacked (Han et al. 2012) Thirdly the company has to comply with the relevant Australian standards in its all product and simultaneously keeping up with the innovation to remain at the top in the market so it is a possible threat that the company product may not match the possible standards for taking up the innovation. Fourthly the company is moving towards the cloud based application thus it is possible threat that the company data may be hacked if the cloud company do not have a strong firewall. According to the case study, the enterprise system of the company has been the problem of the company as the company who was making the software has been closed down. Now the company is looking for another option like cloud, VPN or data warehouse for its business purpose. The Rapid development in the company implies that there will be a detailed documentation the changes made in the system is dependent on the dedicated Database to keep the system operating. Enter AKC is slowly becoming a burden for its business transaction. The Accounts reconciliation officer who is responsible for the banking transaction has been exporting and converting data of the company on a regular basis, in the CSV format. To reconcile accounts and other transactions on its desktop but the busy schedule of the employee has demanded the employee to work from home on the laptop which is not possible. Moreover, it is also not possible to share the customer transaction records between entering AKC software and the data centre in real?time. Lastly, the main vulnerability is the cloud computing is the data breaching. The news of the data breaching has increased significantly around the world the data would be more vulnerable to the beach in the cloud applications. References Bi, Z., Da Xu, L. and Wang, C., 2014. Internet of things for enterprise systems of modern manufacturing.IEEE Transactions on industrial informatics,10(2), pp.1537-1546. Han, R., Guo, L., Ghanem, M.M. and Guo, Y., 2012, May. Lightweight resource scaling for cloud applications. InCluster, Cloud and Grid Computing (CCGrid), 2012 12th IEEE/ACM International Symposium on(pp. 644-651). IEEE. He, W. and Da Xu, L., 2014. Integration of distributed enterprise applications: A survey.IEEE Transactions on Industrial Informatics,10(1), pp.35-42. McDermott, C.M. and Prajogo, D.I., 2012. Service innovation and performance in SMEs.International Journal of Operations Production Management,32(2), pp.216-237. Zannetti, P. ed., 2013.Air pollution modeling: theories, computational methods and available software. Springer Science Business Media. Zissis, D. and Lekkas, D., 2012. Addressing cloud computing security issues.Future Generation computer systems,28(3), pp.583-592.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.