Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

can someone please help me answering this? thank you Enter and surf the terms “C

ID: 3736665 • Letter: C

Question

can someone please help me answering this? thank you

Enter and surf the terms “Cloud computing” in search and find 3 companies that provide those services/tools, then answer/evaluate

(A) what are some of the tools/services being offered and

(B) what are the benefits of using these outside services versus in-house, how effectively can they be and

(C) after reviewing this template, (SearchSMB Storage business continuity plan template) what are the key components, what’s it’s value, usefulness for the organization?

Explanation / Answer

There are several principal ways to acquire an information system from outside the organization. Many firms have resorted to outsourcing their information systems. Outsourcing entails transferring the major components of the firm’s systems and operations—such as data centres, telecommunications, and software development and maintenance—to a specialized company that provides its services under long-term contracts specifying the service levels (that is, the scope and the quality of service to be provided). In some cases the outsourcing entails moving the services abroad—i.e., offshoring in pursuit of the cost or expertise advantages. Responsibility for the acquisition of new applications then falls to the outside company. In other cases the company may outsource just the development or maintenance of their information systems, with the outside company being a systems developer.

Cloud computing is increasingly being adopted as a source of information services. It offers on-demand access via the Internet to services furnished by a provider that runs data centres with the necessary software and other resources. The services can be provided at one of three levels: as the infrastructure for running existing applications, as the platform for developing new applications, or as software-as-a-service (SaaS) to be used by the firm over the network. In particular, SaaS has become a cost-effective way to use enterprise systems. Generally, cloud computing is provided by external vendors, although some firms implement their own private clouds in order to share resources that employees can access over the network from a variety of devices, often including smartphones. Scalability and avoidance of capital expenditures are notable advantages of public clouds; the partial loss of control is a drawback.

Companies may choose to acquire an application by leasing a proprietary package from a vendor under a license and having the software customized internally or externally by the vendor or another outside contractor. Enterprise systems are generally leased in this way. An alternative is to deploy an open-source application, whose program code is free and open for all to modify under a different type of license that enforces the openness of the application in perpetuity. Generally, the costs of the use of open-source software include the technical support from specialized vendors.

Internal information systems development

When an information system is developed internally by an organization, one of two broad methods is used: life-cycle development or rapid application development (RAD).

The same methods are used by software vendors, which need to provide more general, customizable systems. Large organizational systems, such as enterprise systems, are generally developed and maintained through a systematic process, known as a system life cycle, which consists of six stages: feasibility study, system analysis, system design, programming and testing, installation, and operation and maintenance. The first five stages are system development proper, and the last stage is the long-term exploitation.

Life-cycle development is frequently faulted for its long development times and voluminous documentation requirements—and, in some instances, for its failure to fulfill the user’s requirements at the end of the long development road.

Increasingly, life-cycle development is being replaced by RAD. In various RAD methodologies a prototype—a preliminary working version of an application—is built quickly and inexpensively, albeit imperfectly. This prototype is turned over to the users, their reactions are collected, suggested modifications are incorporated, and successive prototype versions eventually evolve into the complete system. Formal processes for the collaboration between system developers and users, such as joint applications development (JAD), have been introduced by some firms. Sometimes RAD and life-cycle development are combined: a prototype is produced to determine user requirements during the initial system analysis stage, after which life-cycle development takes over. A version of RAD known as agile development aims to dispense with the notion of a prototype: an initial version of the system is built, released to users, and then subject to frequent modifications as needs arise.

Industrial methods of software production and reuse have been implemented in systems development. Thus, reusable software components are developed, tested, and catalogued to be deployed as parts of future information systems. A particularly important method of component-based development is the use of Web services, which are software objects that deliver a specific function (such as looking up a customer’s order in a database) and can be stitched together into interorganizational information systems enabling business partners to cooperate.

After an installed system is handed over to its users and operations personnel, it will almost invariably be modified extensively over its useful life in a process known as system maintenance. A large system will typically be used and maintained for some 5 to 10 years or even longer. Most maintenance is to adjust the system to the organization’s changing needs and to new equipment and other software, but inevitably some maintenance involves correcting design errors and exterminating software “bugs” as they are discovered.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote