SlideShare a Scribd company logo
1 of 19
Running head: THE NETWORK INFASTRUCTURE OF JETS
INC 1
THE NETWORK INFASTRUCTURE OF JETS INC 13
The Network Infrastructure of Jets Inc.
Name: sunil patel
Institution Affiliation:Iglobal university
MIT 681 : MSIT capston final project
Executive Summary
According to estimates, there will be ten billion devices in the
next half a decade, which is equivalent to 1.5 for every human
being. As mobile devices increasingly become integrated with
all sectors of our personal lives, companies realize that
employees progressively want to utilize their own mobile
devices along with company-issued devices to perform work-
related roles; many employees are urging the IT department to
facilitate this. Companies have come to the conclusion that it is
impossible to stop the utilization of mobile device for both
work and private purposes, but they need to have the framework
to regulate it. In the present economic climate, firms require
employees that are highly efficient; having a secure mobile
framework that permits personal devices to be utilized safely to
perform work roles can increase worker productivity and be a
substantial competitive edge. It can even facilitate a higher
acceptance rate in the process of recruitment. On that account,
the following study will examine the network infrastructure of
data analytic firm Jest Inc. In particular, will evaluate the
systems and factors that will enable the project to be a success
The Network Infrastructure of Jets Inc.
Jets Inc. is a data analytics firm that helps manufacturing
companies to improve companies improve the process to gain
better efficiency. A key part of Jets’ operations is its network
infrastructure. The infrastructure consists of cloud computing,
big data systems, and the accompanying information security
and DR protocols. To that end, it is important that Jets’ invests
in suitable and efficient network infrastructure to enable it to
offer optimal services to its clients. The following paper will
illustrate the network infrastructure of Jets Inc. It will begin by
exploring its cloud computing services, followed by the
information security and DR security, and then the big data and
data warehouse.
CLOUD SERVICES
Since Jets Inc’s data analytic services are tailored for
manufacturing firms, the company will opt for a Cloud ERP
System from Microsoft. Some of the advantages that the cloud-
based ERP solution provides to companies include lower cost as
the deployment of the ERP will need very few hardware
investments and the traditional internal system maintenance
won’t be required during an occasional upgrade. In the cloud,
computing time is saved as organizations won't physically be
required internal computing resources as the services will be
virtually outsourced to third parties via the web who have
advanced technological IT hosting resources. Cloud computing
will enhance mobility as the organization can access ERP cloud
applications anywhere through web browsers using other
handheld mobile devices such as tablets, laptops smartphones
without necessarily having to use traditional PCs.
Key strategies for successful Cloud-Based ERP adoption
The top management should entirely support the implementation
of Cloud-based ERP for its adoption and upgrade to be
successful. The organization should also use other IS
applications in case of larger organizations specific functions
and not entirely rely on cloud computing in cross-functional
cooperation. For data security, the companies implementing
Cloud ERP should be very careful when selecting the cloud ERP
service providers and the signing of contracts and other legal
entities should be strictly taken care of.
Cloud-based ERP provides a set of new features to helps
organizations to solve technical barriers that result from the
traditional in-house ERP implementation. The time and the cost
that organizations incur during the in-house ERP system
upgrade is hugely reduced with the advent of cloud ERP. A
location restriction for ERP user is a factor that makes it
impossible for the organization to access the system whenever
they are outside the boundaries of the organization premises.
The cloud ERP computation provides solutions that do not make
it necessary for users to be within the physical environment of
the ERP machinery but can simply access it virtually through
the web. For a company that is very big with several
international branches, the adoption of Cloud computing makes
it simple to upgrade the system without the difficulty of
physically accessing the companies’ PCs in every branch. The
communication via the web is such efficient that cloud
computing services provider will just have to primarily upgrade
the system at the headquarters and integrate the same features to
all branches virtually.
Effect of Cloud ERP on Performance
The use of cloud ERP system considerably increases the speed
in which data is processed. The cloud system provides
organizations with an effective way of upgrading their systems
as it’s virtually done. Considerably reduction in the cost of
implementing ERP as human resources, time and investments to
manage it is reduced. The ERP mobility is highly enhanced as
users can actually access ERP services using mobile
technologies such as smartphones, tablets or laptops.
Jets Inc. Cloud Policy for Users
Jets will grant its workers the joy of using tablets and
smartphones that they prefer at the workplace for the
convenience. It maintains the right to remove the program if
users do not follow the procedures and policies that are stated
in the next section. Regulations are meant to guard the integrity
and security of the Jets’ technological infrastructure and data.
Restricted allowances to the regulation may happen because of
the differences in platforms and devices. The employees must
consent to the rules and guidelines established in the regulation
to be facilitated with access to the company’s network through
their mobile devices...
Suitable Usage
· Jets’ describes the suitable application as actions that directly
or indirectly reinforce its operations.
· Jets’ describes suitable usage of personal devices on work
hours as rational and restricted individual interaction or
relaxing, such as playing a game or reading.
· Certain sites are restricted from employee access on company
time or while linked to the firm’s infrastructure with the
knowledge of the enterprise. These sites include limited to
social media sites, video sharing sites, entertainment blogs, and
pornographic sites.
· The camera of devices and video capabilities should be
disabled when one is the company’s premises.
· At no time, should devices be used to store or distribute
explicit materials, store or distribute proprietary data that
belongs to another firm, harassment, engage in activities that
are not related to Jets’, among others?
· Social media sites are only allowed when engaging in
company business.
· Applications that are not downloaded through Windows Store,
Google Play, or iTunes are not allowed.
· Personal mobile devices have access to some resources
belonging to the frim like documents, emails, calendars, and
contacts, among others.
· Jets’ apply a zero-tolerance for emailing or texting by a
driver. Hands-free communication is allowed.
Gadgets and Support
· Various platforms including Windows phones, iPhones,
Blackberry, and Android are permitted. The IT department
usually releases a list of the required operating system versions
and models.
· Tablets such as Android and iPad are permitted. The IT
department releases a list of the required operating system
versions and models.
· The IT department supports issues regarding connectivity:
workers should contact the manufacturer of the device or
network carrier in the case that IT fails to address the issue.
· Devices must be introduced to the IT department for
comprehensive provisioning of job and installation of
conventional software like office efficiency programs, web
browsers, and safety application prior to being handed
permission to the network.
Reimbursement
· Jets’ does not compensate workers for the part of the total cost
of the mobile gadget. Instead, the company facilitates workers
with an allowance that will cover the data plan.
· The company does not compensate employees for the
following charges; plan overcharges, roaming, among others.
Security
· To restrict unsanctioned entree, gadgets must feature PIN
protection using the inbuilt applications of the gadget and a
secure password is needed to facilitate admission to the firm’s
network.
· Jets’ robust password guideline is: Passwords should have an
of a minimum of eight letterings and a mix of lower and upper-
case letters, symbols, and numbers. Passwords are changed after
three months, and the novel password cannot be any of the user
passwords.
· The gadget should lock itself with a PIN or password if it
stays unused for three minutes.
· In the event of failed attempts to log in, the device will self-
lock. Employees usually contact IT to gain back access to the
network.
· JailbrokeniOS devices or rooted Android devices are strictly
restricted from gaining access to the firm’s infrastructure.
· Workers are restricted from downloading, configuring, and
utilizing any program that that is not approved by the firm.
· Tablets and smartphones that are on the list of devices that are
supported by the company are not permitted to connect to the
network.
· Tablets and smartphones that are owned by employees for the
sole reason of personal use are not permitted access to the
network.
· Access to company data by employees is restricted on the
basis of user-profiles described by the It department, and are
enforced automatically.
· The device of an employee may be wiped remotely if 1) the
device gets lost 2) the employment of a worker is terminated 3)
IT department detects a breach of policy or data, a virus or a
similar type of security risk to the company’s technological
infrastructure and data.
Risk/Liabilities/Disclaimers
· Whereas the IT department takes a comprehensive precaution
to prevent the loss of employee’s personal data if a remote wipe
must be performed, it is the duty of a worker to use extra
defenses like storing contacts and email.
· The company maintains the right to disable services or
disconnect devices without prior notice.
· Stolen or lost devices must be stated to the IT department
within 24 hours. It is the responsibility of employees to notify
their mobile carries once a device is lost.
· The employee is anticipated to use his/her device in a manner
that is ethical at all times and comply with the user policy that
is accepted by the company as illustrated above.
· It is a personal liability of employees for all costs that are
related to his/her gadget.
· Workers should take entire responsibility for risks like
complete or partial damage of personal and company data as a
result of bugs, failure of the operating system, malware,
viruses, and other failures related to the software or hardware,
or errors related to programming that make the device to
become unusable.
· Jets’ maintains the right to take the necessary disciplinary
steps including termination of employment for failure to comply
with this policy.
Network Diagram
Image 1: The Design of Jets’ Network
SECURITY AND DR
Governance of Privacy
Enhancing legislation concerning privacy is an occurrence that
will be more profound in the near future. As Jets’ designs
security controls for BYOD, these may affect with individual
anticipation of privacy. To address this issue, the company uses
the BYOD policy to address privacy concerns. The BYOD
policy is well-formed and includes clear and defined
expectations on procedures that impact privacy. In some
geographical regions, the company is forced to facilitate
employees with an alternative to BYOD thus potentially
reducing the savings that are to be realized by the entire
program. For example, in Europe, it is more common for the
employer to facilitate the hardware that enables work to be
performed, induced mainly by the inability to force workers to
have their own smartphones (French, Aaron, Chengqi, & Shim,
2013). Consequently, this may either bring about a BYOD
program that is hybrid, that is, where there are both
organization-owned and private programs and devices that are
inclusive of provisions for the purchase of these devices. On the
other hand, US regulations hand companies the right to observe
and wipe the device of a user (French, Aaron, Chengqi, &Shim,
2013). It is key that the company examines the risk that
surrounds this practice, creates a policy and communicates to
users about the implications of privacy of using their personal
device.
Protection of Data
In the implementation of a BYOD program, protection of data is
not only relevant to company data. Federal and state regulations
that guide the dispensation of personal information in a BYOD
setting apply, and if the firm is gathering personal information
from the device of an employer, security, expiration, the
purpose, among others, of the accumulated data must be clearly
defined in the BYOD policy (Zhang, Kunjithapatha.,Jeong, &
Gibbs, 2011). Jets will perform an assessment of the risks that
are related to the dispensation. If a third party is used to
process data, that is, if the firm uses a provider of cloud
service, it is crucial that that data is protected through an
agreement of data processing with the third party (Thomson,
2012). With the transfer of data, the duty of protecting the data
should be shifted and the compliance should be verified.
The Right to Erasure and Be Forgotten
It is gradually more widespread for regulation involving privacy
to include provisions for the right to be forgotten for the
employees, and to have an individual’s personal data deleted
when he/she leaves the company (Hunt, 2012). Therefore, since
Jetsoperates in regions where such regulations are in place, it
assesses the effect to the company and develops support
procedures that are formalized to handle these requests. The
company takes advantage of these processes to include
employees that are enrolled in BYOD.
Monitoring Privacy at the Work Place
There is a broad range of requirements and laws centered on
monitoring, data protection, and wiping. For example, privacy
regulations in the EU state that surveillance should be restricted
to the use of the device at the workplace only. Company-wide
and worldwide monitoring may also be limited, as EU limits
transfer of data to countries that are not-EAA (French, Aaron,
Chengqi, &Shim, 2013). Labor laws depend on the state and
limit the company for monitoring the personal information of
employees. This may restrict the firm’s ability to control and
monitor sent to mobile devices for the purpose of security.
These needs are complicated further when, for example, an
employee gives a child the device to play a game. To avoid
these pitfalls involving measures that monitor privacy, Jets’
uses a product that enables the monitoring ability to occur
entirely around activities that are work-related.
Breach Investigation and Report
Due to breaches, digital investigations on personal devices may
seem like an invasion of privacy. As such, it is important for the
company to reserve the right to analyze the devices of
employees when in the event of such an incidence (Gatewood,
2012). If such a right is not reserved on the BYOD policy that is
agreed upon, the company may encounter legal difficulties and
delays when examination of information on personal devices is
required. The present trend for future and novel laws are
starting to address notification of data breaches, with exclusions
around notice if certain criteria surrounding data protection are
met (Thomson, 2012). The company prepares for these statutes
by keeping a dynamic record of the devices, the data that they
possess, and the security measures used to protect the
information.
Encryption Systems
Bit locker and The Kerberos authentication system
Bit locker is a program created by Microsoft to enhance
the security of its operating systems. The software is easy-to-
use and can encrypt an entire hard drive and can assist to defend
an O.S against malware. BitLocker is available to any user who
has Windows Vista and above.
The Kerberos authentication system is developed above tickets
or credentials. The main idea underlying the system is that one
does not submit his/her password for each service that he/she
requires. Instead, one keeps tracks of his/her tickets on the local
system and only displays each service a ticket particularly for
that service and cannot be applied for anything else (Araki,
Barak, Furukawa, Lindell, Nof, &Ohara, 2016). When one
begins to use his/her system, he she uses a password to acquire
a master ticket termed as the ticket-granting ticket (TGT);
regardless whether one is using Kerberos for Windows, Linux,
or Macintosh. The ticket master has a validity of 25 hours and
should be renewed with the password after this period (Araki et
al, 2016). Whenever one goes through a service that applies
Kerberos, he/she displays the ticket master to the service’s
server and acquires a custom ticket for that service. After this
step, one displays the ticket for that particular service to the
service to confirm his/her identity. The tickets are preserved in
a ticket cache in one’s local system.
The conventional password is similar to one’s birth certificate,
national identification card or passport since it proves his/her
identity. It is not well reinforced against forgery, its bothersome
to type, and has all the data required to acquire one’s identity
(Araki et al, 2016). Indeed, one does not want to display such
documents whenever they want to get an official document from
the government. On that account, the Kerberos TGT is like
one’s national I.D. It is a powerful means of identification but
workers more effectively with anti-forgery reinforcement. One
can use the identification to prove his/her identity and acquire
secondary identities for particular situations (Araki et al, 2016).
In other words, the Kerberos service tickets are similar to other
single-purpose identifiers like match tickets.
The apparent benefit of this system is that a service receives a
custom ticket. One does not need to submit his/her I.D, thus, the
service does not have the opportunity to acquire one’s I.D and
apply it for personification (Khurana, Saggar, &Kaur, 2016). If
applied for its original purpose, Kerberos is a multifaced
protection tool. It protects a user’s personal files and defends
against a person personating an email server to acquire an
identity to use somewhere else.
Unfortunately, there are some clients and services that do not
have direct support for Kerberos. For instance, several mail
clients do not comprehend Kerberos and can only interpret
passwords. When utilizing such clients or services, one may
have to insert their password, so that it is relayed to the server.
The server utilizes the password to acquire the master ticket for
a user and validate that the master ticket is the right one
(Khurana, Saggar, &Kaur, 2016). Even though this method is
applicable, it is not convenient. It is like a person handing over
his/her social security number and birth certificate to each
service that he/she wants to use, instead of simply displaying a
ticket customized for that service. Even though most services
can be trusted, such a method creates additional risk. In that
regard, one should try to reduce the number of services that
need password and attempt to utilize actual Kerberos tickets in
every situation possible.
Additionally, a user should validate every application that
requests a password. Nonetheless, requesting a password is not
the most effective or safe way to utilize Kerberos. The ideal
situation is where one has to insert his/her password into his/her
computer once a day. As such, one should seek for a software
that is compatible with Kerberos to evade the hassle of typing
the password each time and reinforce the security of the
account. Overall, even though the Kerberos system has its
vulnerabilities, it provides adequate security for one’s data.
BIG DATA AND DATA CENTER
The components that will make up Jet’s Big Data system
include software, hardware, the connections and its users and
storage place of the system. The most common types of Big
Data systems include management information systems,
operation support systems, Executive information systems, and
decision support systems. Many manufacturing firms are
currently seeking for ways of managing their big data while at
the same time increasing their production efficiency using well-
established information architecture. As such, the
manufacturing firms have to collect information from various
data sources to improve the outcome of the process. Doing this
often improve both productive and analytical capabilities of a
company. This section highlights the big data systems that Jets
will use, benefits of big data, key business challenges, the issue
associated with the handling of big data, and how to overcome
these issues.
Jets’ Big Data Systems
The big data systems that have been recommended for use in
Jets’ operations include relational database management
systems, and they are ideal for managing structured data. Other
are MOLAP databases, NoSQL, distributed file system, and big
table inspired databases.
Benefits of Big Data to Jets
Big data are quite beneficial to the Jets. They help in optimizing
production and plant operations, thus, maximizing quality and
productivity while at the same keeping costs to a minimum
level. These systems are also helpful in minimizing threats in
the supply such. Besides, they are useful tools for planning as
well as support services that ensure good quality of the outcome
(Marcus, 2013). Furthermore, they ensure improved forecasting
of services, prevention of loss and revenue protection, and
enhanced efficiency in IT operations.
Challenges
The key business challenges that these systems aim at
addressing include quality of manufacturing and support
services, customer experience and intimacy, and improvement
of operational efficiency.
Issues Associated with Handling of Big Data in Manufacturing
Firms
Generally, the issues that manufacturers face while handling big
data include data variety, volume, value, and velocity. These
have been discussed thoroughly in the paper.
Overcoming these Issues
To overcome these issues, it is prudent that the company should
consider its current and existing gaps to achieve its future
objectives. In this case, the company has to adjust its
technology architecture to accommodate the change made.
Further, the firm has to match the existing capabilities with
appropriate tools (Marcus, 2013). The company should also
consider security and data governance. Finally, for a project to
be successful, the firm should use data models, reference
architecture, and simulations to improve reliability.
Dimensions of Jets’ Big Data System
Organizational
Today, organizations are highly dependent on information
systems to execute and keep track of their operations, interact
with suppliers and clients and to give them a competitive edge
in the market. Firms use Big Data for crucial operations such as
finance and human resource and to get customer feedback while
governments utilize it to provide timely and cheap services to
citizens.
People
Human beings rely mostly on internet-based information
systems to run their daily lives. From entertainment to shopping
to socializing and even banking, individuals use information
systems to run their personal lives
Technology
The technology dimension includes all software, hardware and
telecommunication devices which are integrated to make up an
information system.
Data and Literacy
Data is a term used to represent raw, random facts which are
unclassified since they are not processed while information
represents data that has already processed, i.e., it is classified
and structured in a way that it has meaning and use to the
specific user. Information system literacy entails possessing a
framework for searching, understanding, evaluating and
utilizing information technology in order to obtain relevant
information through critical thinking and analysis (Lin, 2012).
On the other hand, computer literacy refers to having fluency
with various computer hardware and software.
Best Practices for Jets’ Data Centers
Measurement of PUE
PUE stands for Power Usage Effectiveness; it is a measurement
of how efficiently a data center utilizes energy. It is the ratio of
the overall amount of energy used by a data center to the
amount delivered to IT equipment (Lin, 2012). The value of
PUE that firms should strive for is 1.2 which means that the
data center is running very efficiently. Through measurement of
PUE, the energy that a data center uses can be tracked and thus
improvements can be made. Measurements should be done
regularly and over the entire year.
Management of Airflow
Sufficient airflow management is important if any data center is
to be run effectively. The flow of cold and hot air should be
controlled using various methods such as the use of blanket
plates.
Constant adjustment of the Thermostat
Google recommends the use of an economizer so that the
thermostat of devices can be adjusted to allow more “free
cooling” intervals and thus save on energy.
Utilization of Free Cooling
Free cooling is a technique that removes heat from a data center
without the use of an electronic chiller. It reduces the cost of
chillers which are the biggest energy users in a data center.
Power Distribution Optimization
Optimization involves the reduction of steps involved in power
conversion by using highly efficient models such as Power
Distribution Units (PDUs).
Factors that retard or accelerate the power consumption of a
data center
The following factors affect the power consumed by a data
center:
· Location- Energy costs are highly dependent on a location
since different areas have diverse techniques of power
generation and varying tax regimes
· Design- Data centers that are designed to allow more of free
cooling consume less power than those that utilize chillers.
· Size- Generally, the bigger the data center and the more
equipment it has, the more power it consumes.
· Maintenance- Constant maintenance of a data center is
important if it is to consume power efficiently.
· Power Density- It is an indication of how much IT equipment
can be placed in individual racks. A data center with many
racks will have less power density and thus consume less power.
Overall, Big Data will be critical Jets. This is because they are
capable of exposing certain problems associated with the
company’s operations. Otherwise, big data is very helpful in
improving processes to achieve sustainable growth.
Conclusion
The adoption of cloud computing will be intertwined with the
use of big data systems. Cloud computing is a service that is
transforming how organizations store and use their data. The
technology will enable the access and utilization of numerous
server-based computational resources through a digital network
(WAN) or internet connection, which can be accessed using
several devices. In cloud computing, the users do not install or
download applications on their personal computer or device;
rather it is a third-party service provider that handles all an
organization’s data. Its usage at Jets will enable the adoption of
autonomic and utility computing, service-oriented architecture,
and virtualization.
References
Araki, T., Barak, A., Furukawa, J., Lindell, Y., Nof, A.,
&Ohara, K. (2016, October).High-Throughput Secure Three-
Party Computation of Kerberos Ticket
Generation.In Proceedings of the 2016 ACM SIGSAC
Conference on Computer and Communications Security (pp.
1841-1843).ACM.
Caldwell, C., Zeltmann, S, and Griffin K. (2012). BYOD (Bring
Your Own Device). Competitive Forum.
French A.M., Guo, C and Shim J.P (2014). Current Status,
Issues, and Future of Bring Your Own Device (Bring Your Own
Device). Communications of the Associations of Information
Systems.191-197.
Gaff, B.M. (2015).BYOD?OMG.Computer.10-11.
Gatewood B. (2012). The Nuts and Bolts of Making BYOD
Work.Information Management Journal.
Hunt, J. (2012). BYOD Policy. What Businesses Need to
Consider. Credit Control, no. 5.
Kahlke, R. M. (2014). “Generic qualitative approaches: Pitfalls
and benefits of methodological mixology.” International Journal
of Qualitative Methods, 13(1), 37-52.
http://journals.sagepub.com/doi/full/10.1177/160940691401300
119
Khurana, N., Saggar, S., &Kaur, B. (2016). Data security during
cloud storage in public cloud using “Kerberos: An
authentication protocol”. JIMS8I-International Journal of
Information Communication and Computing Technology, 4(2),
226-231
Liu, B. (2012). "Sentiment analysis and opinion
mining."Synthesis lectures on human language technologies,
5(1), 1-167.
Marcus, S. (2013). Automating knowledge acquisition for expert
systems (Vol. 57). New York: Springer Science & Business
Media.
Singh, N. (2012). BYOD is out of the Bottle- Devil or Angel.
Journal of Business Management and Social Science
Research.1-12.
Thomson, G. (2012). BYOD: Enabling the Chaos. Network
Security. 5-8
Zhang, X., Kunjithapatham, A., Jeong, S., & Gibbs, S. (2011).
Towards an elastic application model for augmenting the
computing capabilities of mobile devices with cloud
computing. Mobile Networks and Applications, 16(3), 270-2
N 90° 0' 0" E 10.600
N 90° 0' 0" E 10.700
Router
Wireless Access
Point
Printer 1
Laptop and Computer
Connection Points
Boardroom 1 projector and
TV
Printer 2
Boardroom 2 Projector and TV
Printer 3
Boardroom 3 Projector and TV
Wireless Access
Point
Wireless Access
Point
Laptop and Computer
Connection Points
Laptop and Computer
Connection Points
Internet
Firewall
VPN
Router
Main Server
Backup Server
Switcher
�
�
�
�
�
�
�
�
�
�
�
�
�
�
�
�
�
�
�
�
�
° ' " 
�

More Related Content

Similar to Running head THE NETWORK INFASTRUCTURE OF JETS INC1THE NETWORK.docx

Enhancing competitive-advantage-through-connected-equipment-1 (1)
Enhancing competitive-advantage-through-connected-equipment-1 (1)Enhancing competitive-advantage-through-connected-equipment-1 (1)
Enhancing competitive-advantage-through-connected-equipment-1 (1)Percy-Mitchell
 
Good for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityGood for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityRobert Kleinschmidt
 
Integrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERIntegrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERMobiloitte
 
Field Data Gathering Services — A Cloud-Based Approach
Field Data Gathering Services — A Cloud-Based ApproachField Data Gathering Services — A Cloud-Based Approach
Field Data Gathering Services — A Cloud-Based ApproachSchneider Electric
 
NFRASTRUCTURE MODERNIZATION REVIEW Analyz.docx
NFRASTRUCTURE MODERNIZATION REVIEW                      Analyz.docxNFRASTRUCTURE MODERNIZATION REVIEW                      Analyz.docx
NFRASTRUCTURE MODERNIZATION REVIEW Analyz.docxcurwenmichaela
 
Mobile Device Policy Template
Mobile Device Policy Template Mobile Device Policy Template
Mobile Device Policy Template Demand Metric
 
Cepoke Product eng
Cepoke Product engCepoke Product eng
Cepoke Product engincubusen
 
AN INTRODUCTION TO DIGITAL TRANSFORMATION TECHNOLOGIES
AN INTRODUCTION TO DIGITAL TRANSFORMATION TECHNOLOGIESAN INTRODUCTION TO DIGITAL TRANSFORMATION TECHNOLOGIES
AN INTRODUCTION TO DIGITAL TRANSFORMATION TECHNOLOGIESIAEME Publication
 
CMGT 400 Grading Rubric Learning Team – CMGT 400 Week 4 Learning Tea.docx
CMGT 400 Grading Rubric Learning Team – CMGT 400 Week 4 Learning Tea.docxCMGT 400 Grading Rubric Learning Team – CMGT 400 Week 4 Learning Tea.docx
CMGT 400 Grading Rubric Learning Team – CMGT 400 Week 4 Learning Tea.docxmccormicknadine86
 
Manufacturing erp and industry 4.0 pdf
Manufacturing erp and industry 4.0 pdfManufacturing erp and industry 4.0 pdf
Manufacturing erp and industry 4.0 pdfMRPeasy
 
Time & Attendance System Purchasing Guide - Purchasing.com
Time & Attendance System Purchasing Guide - Purchasing.comTime & Attendance System Purchasing Guide - Purchasing.com
Time & Attendance System Purchasing Guide - Purchasing.comPurchasing.com
 
Technology integrationTECHNOLOGY INTEGRATION Student’s name.docx
Technology integrationTECHNOLOGY INTEGRATION Student’s name.docxTechnology integrationTECHNOLOGY INTEGRATION Student’s name.docx
Technology integrationTECHNOLOGY INTEGRATION Student’s name.docxmattinsonjanel
 
Cloud computing in iot seminar report
Cloud computing in iot seminar reportCloud computing in iot seminar report
Cloud computing in iot seminar reportSKS
 
What Is an IT Infrastructure_ Types and Components.pdf
What Is an IT Infrastructure_ Types and Components.pdfWhat Is an IT Infrastructure_ Types and Components.pdf
What Is an IT Infrastructure_ Types and Components.pdfNukala Gopala Krishna Murthy
 
Rise of Low-code and Digital Ecosystem | Digital Transformation
Rise of Low-code and Digital Ecosystem | Digital TransformationRise of Low-code and Digital Ecosystem | Digital Transformation
Rise of Low-code and Digital Ecosystem | Digital TransformationIntense Technologies Limited
 
Employee Monitoring And Management System Using GPS And Android
Employee Monitoring And Management System Using GPS And AndroidEmployee Monitoring And Management System Using GPS And Android
Employee Monitoring And Management System Using GPS And AndroidIRJET Journal
 
Maa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangaloreMaa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangaloreIBM Software India
 
Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]IBM Software India
 

Similar to Running head THE NETWORK INFASTRUCTURE OF JETS INC1THE NETWORK.docx (20)

Enhancing competitive-advantage-through-connected-equipment-1 (1)
Enhancing competitive-advantage-through-connected-equipment-1 (1)Enhancing competitive-advantage-through-connected-equipment-1 (1)
Enhancing competitive-advantage-through-connected-equipment-1 (1)
 
Good for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityGood for Enterprise by GMS Mobility
Good for Enterprise by GMS Mobility
 
Integrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERIntegrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPER
 
Field Data Gathering Services — A Cloud-Based Approach
Field Data Gathering Services — A Cloud-Based ApproachField Data Gathering Services — A Cloud-Based Approach
Field Data Gathering Services — A Cloud-Based Approach
 
NFRASTRUCTURE MODERNIZATION REVIEW Analyz.docx
NFRASTRUCTURE MODERNIZATION REVIEW                      Analyz.docxNFRASTRUCTURE MODERNIZATION REVIEW                      Analyz.docx
NFRASTRUCTURE MODERNIZATION REVIEW Analyz.docx
 
Mobile Device Policy Template
Mobile Device Policy Template Mobile Device Policy Template
Mobile Device Policy Template
 
Cepoke Product eng
Cepoke Product engCepoke Product eng
Cepoke Product eng
 
AN INTRODUCTION TO DIGITAL TRANSFORMATION TECHNOLOGIES
AN INTRODUCTION TO DIGITAL TRANSFORMATION TECHNOLOGIESAN INTRODUCTION TO DIGITAL TRANSFORMATION TECHNOLOGIES
AN INTRODUCTION TO DIGITAL TRANSFORMATION TECHNOLOGIES
 
CMGT 400 Grading Rubric Learning Team – CMGT 400 Week 4 Learning Tea.docx
CMGT 400 Grading Rubric Learning Team – CMGT 400 Week 4 Learning Tea.docxCMGT 400 Grading Rubric Learning Team – CMGT 400 Week 4 Learning Tea.docx
CMGT 400 Grading Rubric Learning Team – CMGT 400 Week 4 Learning Tea.docx
 
IT ppt.pptx
IT ppt.pptxIT ppt.pptx
IT ppt.pptx
 
Manufacturing erp and industry 4.0 pdf
Manufacturing erp and industry 4.0 pdfManufacturing erp and industry 4.0 pdf
Manufacturing erp and industry 4.0 pdf
 
Time & Attendance System Purchasing Guide - Purchasing.com
Time & Attendance System Purchasing Guide - Purchasing.comTime & Attendance System Purchasing Guide - Purchasing.com
Time & Attendance System Purchasing Guide - Purchasing.com
 
Technology integrationTECHNOLOGY INTEGRATION Student’s name.docx
Technology integrationTECHNOLOGY INTEGRATION Student’s name.docxTechnology integrationTECHNOLOGY INTEGRATION Student’s name.docx
Technology integrationTECHNOLOGY INTEGRATION Student’s name.docx
 
Cloud computing in iot seminar report
Cloud computing in iot seminar reportCloud computing in iot seminar report
Cloud computing in iot seminar report
 
What Is an IT Infrastructure_ Types and Components.pdf
What Is an IT Infrastructure_ Types and Components.pdfWhat Is an IT Infrastructure_ Types and Components.pdf
What Is an IT Infrastructure_ Types and Components.pdf
 
Rise of Low-code and Digital Ecosystem | Digital Transformation
Rise of Low-code and Digital Ecosystem | Digital TransformationRise of Low-code and Digital Ecosystem | Digital Transformation
Rise of Low-code and Digital Ecosystem | Digital Transformation
 
MIS.pptx
MIS.pptxMIS.pptx
MIS.pptx
 
Employee Monitoring And Management System Using GPS And Android
Employee Monitoring And Management System Using GPS And AndroidEmployee Monitoring And Management System Using GPS And Android
Employee Monitoring And Management System Using GPS And Android
 
Maa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangaloreMaa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangalore
 
Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]
 

More from jeanettehully

250-500  words APA format cite references  Check this scenario out.docx
250-500  words APA format cite references  Check this scenario out.docx250-500  words APA format cite references  Check this scenario out.docx
250-500  words APA format cite references  Check this scenario out.docxjeanettehully
 
2 DQ’s need to be answers with Zero plagiarism and 250 word count fo.docx
2 DQ’s need to be answers with Zero plagiarism and 250 word count fo.docx2 DQ’s need to be answers with Zero plagiarism and 250 word count fo.docx
2 DQ’s need to be answers with Zero plagiarism and 250 word count fo.docxjeanettehully
 
270w3Respond to the followingStress can be the root cause of ps.docx
270w3Respond to the followingStress can be the root cause of ps.docx270w3Respond to the followingStress can be the root cause of ps.docx
270w3Respond to the followingStress can be the root cause of ps.docxjeanettehully
 
250 word response. Chicago Style citingAccording to Kluver, what.docx
250 word response. Chicago Style citingAccording to Kluver, what.docx250 word response. Chicago Style citingAccording to Kluver, what.docx
250 word response. Chicago Style citingAccording to Kluver, what.docxjeanettehully
 
250+ Words – Strategic Intelligence CollectionChoose one of th.docx
250+ Words – Strategic Intelligence CollectionChoose one of th.docx250+ Words – Strategic Intelligence CollectionChoose one of th.docx
250+ Words – Strategic Intelligence CollectionChoose one of th.docxjeanettehully
 
2–3 pages; APA formatDetailsThere are several steps to take w.docx
2–3 pages; APA formatDetailsThere are several steps to take w.docx2–3 pages; APA formatDetailsThere are several steps to take w.docx
2–3 pages; APA formatDetailsThere are several steps to take w.docxjeanettehully
 
2LeadershipEighth Edition3To Madison.docx
2LeadershipEighth Edition3To Madison.docx2LeadershipEighth Edition3To Madison.docx
2LeadershipEighth Edition3To Madison.docxjeanettehully
 
250 Word Resoponse. Chicago Style Citing.According to Kluver, .docx
250 Word Resoponse. Chicago Style Citing.According to Kluver, .docx250 Word Resoponse. Chicago Style Citing.According to Kluver, .docx
250 Word Resoponse. Chicago Style Citing.According to Kluver, .docxjeanettehully
 
250 word mini essay question.Textbook is Getlein, Mark. Living wi.docx
250 word mini essay question.Textbook is Getlein, Mark. Living wi.docx250 word mini essay question.Textbook is Getlein, Mark. Living wi.docx
250 word mini essay question.Textbook is Getlein, Mark. Living wi.docxjeanettehully
 
250 word discussion post--today please. Make sure you put in the dq .docx
250 word discussion post--today please. Make sure you put in the dq .docx250 word discussion post--today please. Make sure you put in the dq .docx
250 word discussion post--today please. Make sure you put in the dq .docxjeanettehully
 
2By 2015, projections indicate that the largest category of househ.docx
2By 2015, projections indicate that the largest category of househ.docx2By 2015, projections indicate that the largest category of househ.docx
2By 2015, projections indicate that the largest category of househ.docxjeanettehully
 
29Answer[removed] That is the house whe.docx
29Answer[removed]                    That is the house whe.docx29Answer[removed]                    That is the house whe.docx
29Answer[removed] That is the house whe.docxjeanettehully
 
250 words discussion not an assignementThe purpose of this discuss.docx
250 words discussion not an assignementThe purpose of this discuss.docx250 words discussion not an assignementThe purpose of this discuss.docx
250 words discussion not an assignementThe purpose of this discuss.docxjeanettehully
 
25. For each of the transactions listed below, indicate whether it.docx
25.   For each of the transactions listed below, indicate whether it.docx25.   For each of the transactions listed below, indicate whether it.docx
25. For each of the transactions listed below, indicate whether it.docxjeanettehully
 
250-word minimum. Must use textbook Jandt, Fred E. (editor) Intercu.docx
250-word minimum. Must use textbook Jandt, Fred E. (editor) Intercu.docx250-word minimum. Must use textbook Jandt, Fred E. (editor) Intercu.docx
250-word minimum. Must use textbook Jandt, Fred E. (editor) Intercu.docxjeanettehully
 
250-500  words APA format cite references  Check this scenario o.docx
250-500  words APA format cite references  Check this scenario o.docx250-500  words APA format cite references  Check this scenario o.docx
250-500  words APA format cite references  Check this scenario o.docxjeanettehully
 
250+ Words – Insider Threat Analysis Penetration AnalysisCho.docx
250+ Words – Insider Threat Analysis  Penetration AnalysisCho.docx250+ Words – Insider Threat Analysis  Penetration AnalysisCho.docx
250+ Words – Insider Threat Analysis Penetration AnalysisCho.docxjeanettehully
 
250 wordsUsing the same company (Bank of America) that you have .docx
250 wordsUsing the same company (Bank of America) that you have .docx250 wordsUsing the same company (Bank of America) that you have .docx
250 wordsUsing the same company (Bank of America) that you have .docxjeanettehully
 
250 mini essay questiontextbook Getlein, Mark. Living with Art, 9.docx
250 mini essay questiontextbook Getlein, Mark. Living with Art, 9.docx250 mini essay questiontextbook Getlein, Mark. Living with Art, 9.docx
250 mini essay questiontextbook Getlein, Mark. Living with Art, 9.docxjeanettehully
 
22.¿Saber o conocer…   With a partner, tell what thes.docx
22.¿Saber o conocer…   With a partner, tell what thes.docx22.¿Saber o conocer…   With a partner, tell what thes.docx
22.¿Saber o conocer…   With a partner, tell what thes.docxjeanettehully
 

More from jeanettehully (20)

250-500  words APA format cite references  Check this scenario out.docx
250-500  words APA format cite references  Check this scenario out.docx250-500  words APA format cite references  Check this scenario out.docx
250-500  words APA format cite references  Check this scenario out.docx
 
2 DQ’s need to be answers with Zero plagiarism and 250 word count fo.docx
2 DQ’s need to be answers with Zero plagiarism and 250 word count fo.docx2 DQ’s need to be answers with Zero plagiarism and 250 word count fo.docx
2 DQ’s need to be answers with Zero plagiarism and 250 word count fo.docx
 
270w3Respond to the followingStress can be the root cause of ps.docx
270w3Respond to the followingStress can be the root cause of ps.docx270w3Respond to the followingStress can be the root cause of ps.docx
270w3Respond to the followingStress can be the root cause of ps.docx
 
250 word response. Chicago Style citingAccording to Kluver, what.docx
250 word response. Chicago Style citingAccording to Kluver, what.docx250 word response. Chicago Style citingAccording to Kluver, what.docx
250 word response. Chicago Style citingAccording to Kluver, what.docx
 
250+ Words – Strategic Intelligence CollectionChoose one of th.docx
250+ Words – Strategic Intelligence CollectionChoose one of th.docx250+ Words – Strategic Intelligence CollectionChoose one of th.docx
250+ Words – Strategic Intelligence CollectionChoose one of th.docx
 
2–3 pages; APA formatDetailsThere are several steps to take w.docx
2–3 pages; APA formatDetailsThere are several steps to take w.docx2–3 pages; APA formatDetailsThere are several steps to take w.docx
2–3 pages; APA formatDetailsThere are several steps to take w.docx
 
2LeadershipEighth Edition3To Madison.docx
2LeadershipEighth Edition3To Madison.docx2LeadershipEighth Edition3To Madison.docx
2LeadershipEighth Edition3To Madison.docx
 
250 Word Resoponse. Chicago Style Citing.According to Kluver, .docx
250 Word Resoponse. Chicago Style Citing.According to Kluver, .docx250 Word Resoponse. Chicago Style Citing.According to Kluver, .docx
250 Word Resoponse. Chicago Style Citing.According to Kluver, .docx
 
250 word mini essay question.Textbook is Getlein, Mark. Living wi.docx
250 word mini essay question.Textbook is Getlein, Mark. Living wi.docx250 word mini essay question.Textbook is Getlein, Mark. Living wi.docx
250 word mini essay question.Textbook is Getlein, Mark. Living wi.docx
 
250 word discussion post--today please. Make sure you put in the dq .docx
250 word discussion post--today please. Make sure you put in the dq .docx250 word discussion post--today please. Make sure you put in the dq .docx
250 word discussion post--today please. Make sure you put in the dq .docx
 
2By 2015, projections indicate that the largest category of househ.docx
2By 2015, projections indicate that the largest category of househ.docx2By 2015, projections indicate that the largest category of househ.docx
2By 2015, projections indicate that the largest category of househ.docx
 
29Answer[removed] That is the house whe.docx
29Answer[removed]                    That is the house whe.docx29Answer[removed]                    That is the house whe.docx
29Answer[removed] That is the house whe.docx
 
250 words discussion not an assignementThe purpose of this discuss.docx
250 words discussion not an assignementThe purpose of this discuss.docx250 words discussion not an assignementThe purpose of this discuss.docx
250 words discussion not an assignementThe purpose of this discuss.docx
 
25. For each of the transactions listed below, indicate whether it.docx
25.   For each of the transactions listed below, indicate whether it.docx25.   For each of the transactions listed below, indicate whether it.docx
25. For each of the transactions listed below, indicate whether it.docx
 
250-word minimum. Must use textbook Jandt, Fred E. (editor) Intercu.docx
250-word minimum. Must use textbook Jandt, Fred E. (editor) Intercu.docx250-word minimum. Must use textbook Jandt, Fred E. (editor) Intercu.docx
250-word minimum. Must use textbook Jandt, Fred E. (editor) Intercu.docx
 
250-500  words APA format cite references  Check this scenario o.docx
250-500  words APA format cite references  Check this scenario o.docx250-500  words APA format cite references  Check this scenario o.docx
250-500  words APA format cite references  Check this scenario o.docx
 
250+ Words – Insider Threat Analysis Penetration AnalysisCho.docx
250+ Words – Insider Threat Analysis  Penetration AnalysisCho.docx250+ Words – Insider Threat Analysis  Penetration AnalysisCho.docx
250+ Words – Insider Threat Analysis Penetration AnalysisCho.docx
 
250 wordsUsing the same company (Bank of America) that you have .docx
250 wordsUsing the same company (Bank of America) that you have .docx250 wordsUsing the same company (Bank of America) that you have .docx
250 wordsUsing the same company (Bank of America) that you have .docx
 
250 mini essay questiontextbook Getlein, Mark. Living with Art, 9.docx
250 mini essay questiontextbook Getlein, Mark. Living with Art, 9.docx250 mini essay questiontextbook Getlein, Mark. Living with Art, 9.docx
250 mini essay questiontextbook Getlein, Mark. Living with Art, 9.docx
 
22.¿Saber o conocer…   With a partner, tell what thes.docx
22.¿Saber o conocer…   With a partner, tell what thes.docx22.¿Saber o conocer…   With a partner, tell what thes.docx
22.¿Saber o conocer…   With a partner, tell what thes.docx
 

Recently uploaded

Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 

Recently uploaded (20)

Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 

Running head THE NETWORK INFASTRUCTURE OF JETS INC1THE NETWORK.docx

  • 1. Running head: THE NETWORK INFASTRUCTURE OF JETS INC 1 THE NETWORK INFASTRUCTURE OF JETS INC 13 The Network Infrastructure of Jets Inc. Name: sunil patel Institution Affiliation:Iglobal university MIT 681 : MSIT capston final project Executive Summary According to estimates, there will be ten billion devices in the next half a decade, which is equivalent to 1.5 for every human being. As mobile devices increasingly become integrated with all sectors of our personal lives, companies realize that employees progressively want to utilize their own mobile devices along with company-issued devices to perform work- related roles; many employees are urging the IT department to facilitate this. Companies have come to the conclusion that it is impossible to stop the utilization of mobile device for both work and private purposes, but they need to have the framework to regulate it. In the present economic climate, firms require employees that are highly efficient; having a secure mobile framework that permits personal devices to be utilized safely to perform work roles can increase worker productivity and be a substantial competitive edge. It can even facilitate a higher
  • 2. acceptance rate in the process of recruitment. On that account, the following study will examine the network infrastructure of data analytic firm Jest Inc. In particular, will evaluate the systems and factors that will enable the project to be a success The Network Infrastructure of Jets Inc. Jets Inc. is a data analytics firm that helps manufacturing companies to improve companies improve the process to gain better efficiency. A key part of Jets’ operations is its network infrastructure. The infrastructure consists of cloud computing, big data systems, and the accompanying information security and DR protocols. To that end, it is important that Jets’ invests in suitable and efficient network infrastructure to enable it to offer optimal services to its clients. The following paper will illustrate the network infrastructure of Jets Inc. It will begin by exploring its cloud computing services, followed by the information security and DR security, and then the big data and data warehouse. CLOUD SERVICES Since Jets Inc’s data analytic services are tailored for manufacturing firms, the company will opt for a Cloud ERP System from Microsoft. Some of the advantages that the cloud- based ERP solution provides to companies include lower cost as the deployment of the ERP will need very few hardware investments and the traditional internal system maintenance won’t be required during an occasional upgrade. In the cloud, computing time is saved as organizations won't physically be
  • 3. required internal computing resources as the services will be virtually outsourced to third parties via the web who have advanced technological IT hosting resources. Cloud computing will enhance mobility as the organization can access ERP cloud applications anywhere through web browsers using other handheld mobile devices such as tablets, laptops smartphones without necessarily having to use traditional PCs. Key strategies for successful Cloud-Based ERP adoption The top management should entirely support the implementation of Cloud-based ERP for its adoption and upgrade to be successful. The organization should also use other IS applications in case of larger organizations specific functions and not entirely rely on cloud computing in cross-functional cooperation. For data security, the companies implementing Cloud ERP should be very careful when selecting the cloud ERP service providers and the signing of contracts and other legal entities should be strictly taken care of. Cloud-based ERP provides a set of new features to helps organizations to solve technical barriers that result from the traditional in-house ERP implementation. The time and the cost that organizations incur during the in-house ERP system upgrade is hugely reduced with the advent of cloud ERP. A location restriction for ERP user is a factor that makes it impossible for the organization to access the system whenever they are outside the boundaries of the organization premises. The cloud ERP computation provides solutions that do not make it necessary for users to be within the physical environment of the ERP machinery but can simply access it virtually through the web. For a company that is very big with several international branches, the adoption of Cloud computing makes it simple to upgrade the system without the difficulty of physically accessing the companies’ PCs in every branch. The communication via the web is such efficient that cloud computing services provider will just have to primarily upgrade the system at the headquarters and integrate the same features to all branches virtually.
  • 4. Effect of Cloud ERP on Performance The use of cloud ERP system considerably increases the speed in which data is processed. The cloud system provides organizations with an effective way of upgrading their systems as it’s virtually done. Considerably reduction in the cost of implementing ERP as human resources, time and investments to manage it is reduced. The ERP mobility is highly enhanced as users can actually access ERP services using mobile technologies such as smartphones, tablets or laptops. Jets Inc. Cloud Policy for Users Jets will grant its workers the joy of using tablets and smartphones that they prefer at the workplace for the convenience. It maintains the right to remove the program if users do not follow the procedures and policies that are stated in the next section. Regulations are meant to guard the integrity and security of the Jets’ technological infrastructure and data. Restricted allowances to the regulation may happen because of the differences in platforms and devices. The employees must consent to the rules and guidelines established in the regulation to be facilitated with access to the company’s network through their mobile devices... Suitable Usage · Jets’ describes the suitable application as actions that directly or indirectly reinforce its operations. · Jets’ describes suitable usage of personal devices on work hours as rational and restricted individual interaction or relaxing, such as playing a game or reading. · Certain sites are restricted from employee access on company time or while linked to the firm’s infrastructure with the knowledge of the enterprise. These sites include limited to social media sites, video sharing sites, entertainment blogs, and pornographic sites. · The camera of devices and video capabilities should be disabled when one is the company’s premises. · At no time, should devices be used to store or distribute explicit materials, store or distribute proprietary data that
  • 5. belongs to another firm, harassment, engage in activities that are not related to Jets’, among others? · Social media sites are only allowed when engaging in company business. · Applications that are not downloaded through Windows Store, Google Play, or iTunes are not allowed. · Personal mobile devices have access to some resources belonging to the frim like documents, emails, calendars, and contacts, among others. · Jets’ apply a zero-tolerance for emailing or texting by a driver. Hands-free communication is allowed. Gadgets and Support · Various platforms including Windows phones, iPhones, Blackberry, and Android are permitted. The IT department usually releases a list of the required operating system versions and models. · Tablets such as Android and iPad are permitted. The IT department releases a list of the required operating system versions and models. · The IT department supports issues regarding connectivity: workers should contact the manufacturer of the device or network carrier in the case that IT fails to address the issue. · Devices must be introduced to the IT department for comprehensive provisioning of job and installation of conventional software like office efficiency programs, web browsers, and safety application prior to being handed permission to the network. Reimbursement · Jets’ does not compensate workers for the part of the total cost of the mobile gadget. Instead, the company facilitates workers with an allowance that will cover the data plan. · The company does not compensate employees for the following charges; plan overcharges, roaming, among others. Security · To restrict unsanctioned entree, gadgets must feature PIN
  • 6. protection using the inbuilt applications of the gadget and a secure password is needed to facilitate admission to the firm’s network. · Jets’ robust password guideline is: Passwords should have an of a minimum of eight letterings and a mix of lower and upper- case letters, symbols, and numbers. Passwords are changed after three months, and the novel password cannot be any of the user passwords. · The gadget should lock itself with a PIN or password if it stays unused for three minutes. · In the event of failed attempts to log in, the device will self- lock. Employees usually contact IT to gain back access to the network. · JailbrokeniOS devices or rooted Android devices are strictly restricted from gaining access to the firm’s infrastructure. · Workers are restricted from downloading, configuring, and utilizing any program that that is not approved by the firm. · Tablets and smartphones that are on the list of devices that are supported by the company are not permitted to connect to the network. · Tablets and smartphones that are owned by employees for the sole reason of personal use are not permitted access to the network. · Access to company data by employees is restricted on the basis of user-profiles described by the It department, and are enforced automatically. · The device of an employee may be wiped remotely if 1) the device gets lost 2) the employment of a worker is terminated 3) IT department detects a breach of policy or data, a virus or a similar type of security risk to the company’s technological infrastructure and data. Risk/Liabilities/Disclaimers · Whereas the IT department takes a comprehensive precaution to prevent the loss of employee’s personal data if a remote wipe must be performed, it is the duty of a worker to use extra defenses like storing contacts and email.
  • 7. · The company maintains the right to disable services or disconnect devices without prior notice. · Stolen or lost devices must be stated to the IT department within 24 hours. It is the responsibility of employees to notify their mobile carries once a device is lost. · The employee is anticipated to use his/her device in a manner that is ethical at all times and comply with the user policy that is accepted by the company as illustrated above. · It is a personal liability of employees for all costs that are related to his/her gadget. · Workers should take entire responsibility for risks like complete or partial damage of personal and company data as a result of bugs, failure of the operating system, malware, viruses, and other failures related to the software or hardware, or errors related to programming that make the device to become unusable. · Jets’ maintains the right to take the necessary disciplinary steps including termination of employment for failure to comply with this policy. Network Diagram Image 1: The Design of Jets’ Network
  • 8. SECURITY AND DR Governance of Privacy Enhancing legislation concerning privacy is an occurrence that will be more profound in the near future. As Jets’ designs security controls for BYOD, these may affect with individual anticipation of privacy. To address this issue, the company uses the BYOD policy to address privacy concerns. The BYOD policy is well-formed and includes clear and defined expectations on procedures that impact privacy. In some geographical regions, the company is forced to facilitate employees with an alternative to BYOD thus potentially reducing the savings that are to be realized by the entire program. For example, in Europe, it is more common for the employer to facilitate the hardware that enables work to be performed, induced mainly by the inability to force workers to have their own smartphones (French, Aaron, Chengqi, & Shim, 2013). Consequently, this may either bring about a BYOD program that is hybrid, that is, where there are both organization-owned and private programs and devices that are inclusive of provisions for the purchase of these devices. On the other hand, US regulations hand companies the right to observe and wipe the device of a user (French, Aaron, Chengqi, &Shim, 2013). It is key that the company examines the risk that surrounds this practice, creates a policy and communicates to users about the implications of privacy of using their personal device. Protection of Data In the implementation of a BYOD program, protection of data is not only relevant to company data. Federal and state regulations that guide the dispensation of personal information in a BYOD setting apply, and if the firm is gathering personal information from the device of an employer, security, expiration, the purpose, among others, of the accumulated data must be clearly defined in the BYOD policy (Zhang, Kunjithapatha.,Jeong, & Gibbs, 2011). Jets will perform an assessment of the risks that
  • 9. are related to the dispensation. If a third party is used to process data, that is, if the firm uses a provider of cloud service, it is crucial that that data is protected through an agreement of data processing with the third party (Thomson, 2012). With the transfer of data, the duty of protecting the data should be shifted and the compliance should be verified. The Right to Erasure and Be Forgotten It is gradually more widespread for regulation involving privacy to include provisions for the right to be forgotten for the employees, and to have an individual’s personal data deleted when he/she leaves the company (Hunt, 2012). Therefore, since Jetsoperates in regions where such regulations are in place, it assesses the effect to the company and develops support procedures that are formalized to handle these requests. The company takes advantage of these processes to include employees that are enrolled in BYOD. Monitoring Privacy at the Work Place There is a broad range of requirements and laws centered on monitoring, data protection, and wiping. For example, privacy regulations in the EU state that surveillance should be restricted to the use of the device at the workplace only. Company-wide and worldwide monitoring may also be limited, as EU limits transfer of data to countries that are not-EAA (French, Aaron, Chengqi, &Shim, 2013). Labor laws depend on the state and limit the company for monitoring the personal information of employees. This may restrict the firm’s ability to control and monitor sent to mobile devices for the purpose of security. These needs are complicated further when, for example, an employee gives a child the device to play a game. To avoid these pitfalls involving measures that monitor privacy, Jets’ uses a product that enables the monitoring ability to occur entirely around activities that are work-related. Breach Investigation and Report Due to breaches, digital investigations on personal devices may seem like an invasion of privacy. As such, it is important for the company to reserve the right to analyze the devices of
  • 10. employees when in the event of such an incidence (Gatewood, 2012). If such a right is not reserved on the BYOD policy that is agreed upon, the company may encounter legal difficulties and delays when examination of information on personal devices is required. The present trend for future and novel laws are starting to address notification of data breaches, with exclusions around notice if certain criteria surrounding data protection are met (Thomson, 2012). The company prepares for these statutes by keeping a dynamic record of the devices, the data that they possess, and the security measures used to protect the information. Encryption Systems Bit locker and The Kerberos authentication system Bit locker is a program created by Microsoft to enhance the security of its operating systems. The software is easy-to- use and can encrypt an entire hard drive and can assist to defend an O.S against malware. BitLocker is available to any user who has Windows Vista and above. The Kerberos authentication system is developed above tickets or credentials. The main idea underlying the system is that one does not submit his/her password for each service that he/she requires. Instead, one keeps tracks of his/her tickets on the local system and only displays each service a ticket particularly for that service and cannot be applied for anything else (Araki, Barak, Furukawa, Lindell, Nof, &Ohara, 2016). When one begins to use his/her system, he she uses a password to acquire a master ticket termed as the ticket-granting ticket (TGT); regardless whether one is using Kerberos for Windows, Linux, or Macintosh. The ticket master has a validity of 25 hours and should be renewed with the password after this period (Araki et al, 2016). Whenever one goes through a service that applies Kerberos, he/she displays the ticket master to the service’s server and acquires a custom ticket for that service. After this step, one displays the ticket for that particular service to the service to confirm his/her identity. The tickets are preserved in a ticket cache in one’s local system.
  • 11. The conventional password is similar to one’s birth certificate, national identification card or passport since it proves his/her identity. It is not well reinforced against forgery, its bothersome to type, and has all the data required to acquire one’s identity (Araki et al, 2016). Indeed, one does not want to display such documents whenever they want to get an official document from the government. On that account, the Kerberos TGT is like one’s national I.D. It is a powerful means of identification but workers more effectively with anti-forgery reinforcement. One can use the identification to prove his/her identity and acquire secondary identities for particular situations (Araki et al, 2016). In other words, the Kerberos service tickets are similar to other single-purpose identifiers like match tickets. The apparent benefit of this system is that a service receives a custom ticket. One does not need to submit his/her I.D, thus, the service does not have the opportunity to acquire one’s I.D and apply it for personification (Khurana, Saggar, &Kaur, 2016). If applied for its original purpose, Kerberos is a multifaced protection tool. It protects a user’s personal files and defends against a person personating an email server to acquire an identity to use somewhere else. Unfortunately, there are some clients and services that do not have direct support for Kerberos. For instance, several mail clients do not comprehend Kerberos and can only interpret passwords. When utilizing such clients or services, one may have to insert their password, so that it is relayed to the server. The server utilizes the password to acquire the master ticket for a user and validate that the master ticket is the right one (Khurana, Saggar, &Kaur, 2016). Even though this method is applicable, it is not convenient. It is like a person handing over his/her social security number and birth certificate to each service that he/she wants to use, instead of simply displaying a ticket customized for that service. Even though most services can be trusted, such a method creates additional risk. In that regard, one should try to reduce the number of services that need password and attempt to utilize actual Kerberos tickets in
  • 12. every situation possible. Additionally, a user should validate every application that requests a password. Nonetheless, requesting a password is not the most effective or safe way to utilize Kerberos. The ideal situation is where one has to insert his/her password into his/her computer once a day. As such, one should seek for a software that is compatible with Kerberos to evade the hassle of typing the password each time and reinforce the security of the account. Overall, even though the Kerberos system has its vulnerabilities, it provides adequate security for one’s data. BIG DATA AND DATA CENTER The components that will make up Jet’s Big Data system include software, hardware, the connections and its users and storage place of the system. The most common types of Big Data systems include management information systems, operation support systems, Executive information systems, and decision support systems. Many manufacturing firms are currently seeking for ways of managing their big data while at the same time increasing their production efficiency using well- established information architecture. As such, the manufacturing firms have to collect information from various data sources to improve the outcome of the process. Doing this often improve both productive and analytical capabilities of a company. This section highlights the big data systems that Jets will use, benefits of big data, key business challenges, the issue associated with the handling of big data, and how to overcome these issues.
  • 13. Jets’ Big Data Systems The big data systems that have been recommended for use in Jets’ operations include relational database management systems, and they are ideal for managing structured data. Other are MOLAP databases, NoSQL, distributed file system, and big table inspired databases. Benefits of Big Data to Jets Big data are quite beneficial to the Jets. They help in optimizing production and plant operations, thus, maximizing quality and productivity while at the same keeping costs to a minimum level. These systems are also helpful in minimizing threats in the supply such. Besides, they are useful tools for planning as well as support services that ensure good quality of the outcome (Marcus, 2013). Furthermore, they ensure improved forecasting of services, prevention of loss and revenue protection, and enhanced efficiency in IT operations. Challenges The key business challenges that these systems aim at addressing include quality of manufacturing and support services, customer experience and intimacy, and improvement of operational efficiency. Issues Associated with Handling of Big Data in Manufacturing Firms Generally, the issues that manufacturers face while handling big data include data variety, volume, value, and velocity. These have been discussed thoroughly in the paper. Overcoming these Issues To overcome these issues, it is prudent that the company should consider its current and existing gaps to achieve its future objectives. In this case, the company has to adjust its technology architecture to accommodate the change made. Further, the firm has to match the existing capabilities with appropriate tools (Marcus, 2013). The company should also consider security and data governance. Finally, for a project to be successful, the firm should use data models, reference
  • 14. architecture, and simulations to improve reliability. Dimensions of Jets’ Big Data System Organizational Today, organizations are highly dependent on information systems to execute and keep track of their operations, interact with suppliers and clients and to give them a competitive edge in the market. Firms use Big Data for crucial operations such as finance and human resource and to get customer feedback while governments utilize it to provide timely and cheap services to citizens. People Human beings rely mostly on internet-based information systems to run their daily lives. From entertainment to shopping to socializing and even banking, individuals use information systems to run their personal lives Technology The technology dimension includes all software, hardware and telecommunication devices which are integrated to make up an information system. Data and Literacy Data is a term used to represent raw, random facts which are unclassified since they are not processed while information represents data that has already processed, i.e., it is classified and structured in a way that it has meaning and use to the specific user. Information system literacy entails possessing a framework for searching, understanding, evaluating and utilizing information technology in order to obtain relevant information through critical thinking and analysis (Lin, 2012). On the other hand, computer literacy refers to having fluency with various computer hardware and software. Best Practices for Jets’ Data Centers Measurement of PUE PUE stands for Power Usage Effectiveness; it is a measurement
  • 15. of how efficiently a data center utilizes energy. It is the ratio of the overall amount of energy used by a data center to the amount delivered to IT equipment (Lin, 2012). The value of PUE that firms should strive for is 1.2 which means that the data center is running very efficiently. Through measurement of PUE, the energy that a data center uses can be tracked and thus improvements can be made. Measurements should be done regularly and over the entire year. Management of Airflow Sufficient airflow management is important if any data center is to be run effectively. The flow of cold and hot air should be controlled using various methods such as the use of blanket plates. Constant adjustment of the Thermostat Google recommends the use of an economizer so that the thermostat of devices can be adjusted to allow more “free cooling” intervals and thus save on energy. Utilization of Free Cooling Free cooling is a technique that removes heat from a data center without the use of an electronic chiller. It reduces the cost of chillers which are the biggest energy users in a data center. Power Distribution Optimization Optimization involves the reduction of steps involved in power conversion by using highly efficient models such as Power Distribution Units (PDUs). Factors that retard or accelerate the power consumption of a data center The following factors affect the power consumed by a data center: · Location- Energy costs are highly dependent on a location since different areas have diverse techniques of power generation and varying tax regimes · Design- Data centers that are designed to allow more of free cooling consume less power than those that utilize chillers. · Size- Generally, the bigger the data center and the more
  • 16. equipment it has, the more power it consumes. · Maintenance- Constant maintenance of a data center is important if it is to consume power efficiently. · Power Density- It is an indication of how much IT equipment can be placed in individual racks. A data center with many racks will have less power density and thus consume less power. Overall, Big Data will be critical Jets. This is because they are capable of exposing certain problems associated with the company’s operations. Otherwise, big data is very helpful in improving processes to achieve sustainable growth. Conclusion The adoption of cloud computing will be intertwined with the use of big data systems. Cloud computing is a service that is transforming how organizations store and use their data. The technology will enable the access and utilization of numerous server-based computational resources through a digital network (WAN) or internet connection, which can be accessed using several devices. In cloud computing, the users do not install or download applications on their personal computer or device; rather it is a third-party service provider that handles all an organization’s data. Its usage at Jets will enable the adoption of autonomic and utility computing, service-oriented architecture, and virtualization. References Araki, T., Barak, A., Furukawa, J., Lindell, Y., Nof, A., &Ohara, K. (2016, October).High-Throughput Secure Three- Party Computation of Kerberos Ticket
  • 17. Generation.In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (pp. 1841-1843).ACM. Caldwell, C., Zeltmann, S, and Griffin K. (2012). BYOD (Bring Your Own Device). Competitive Forum. French A.M., Guo, C and Shim J.P (2014). Current Status, Issues, and Future of Bring Your Own Device (Bring Your Own Device). Communications of the Associations of Information Systems.191-197. Gaff, B.M. (2015).BYOD?OMG.Computer.10-11. Gatewood B. (2012). The Nuts and Bolts of Making BYOD Work.Information Management Journal. Hunt, J. (2012). BYOD Policy. What Businesses Need to Consider. Credit Control, no. 5. Kahlke, R. M. (2014). “Generic qualitative approaches: Pitfalls and benefits of methodological mixology.” International Journal of Qualitative Methods, 13(1), 37-52. http://journals.sagepub.com/doi/full/10.1177/160940691401300 119 Khurana, N., Saggar, S., &Kaur, B. (2016). Data security during cloud storage in public cloud using “Kerberos: An authentication protocol”. JIMS8I-International Journal of Information Communication and Computing Technology, 4(2), 226-231 Liu, B. (2012). "Sentiment analysis and opinion mining."Synthesis lectures on human language technologies, 5(1), 1-167. Marcus, S. (2013). Automating knowledge acquisition for expert systems (Vol. 57). New York: Springer Science & Business Media. Singh, N. (2012). BYOD is out of the Bottle- Devil or Angel. Journal of Business Management and Social Science Research.1-12. Thomson, G. (2012). BYOD: Enabling the Chaos. Network Security. 5-8 Zhang, X., Kunjithapatham, A., Jeong, S., & Gibbs, S. (2011).
  • 18. Towards an elastic application model for augmenting the computing capabilities of mobile devices with cloud computing. Mobile Networks and Applications, 16(3), 270-2 N 90° 0' 0" E 10.600 N 90° 0' 0" E 10.700 Router Wireless Access Point Printer 1 Laptop and Computer Connection Points Boardroom 1 projector and TV Printer 2 Boardroom 2 Projector and TV Printer 3 Boardroom 3 Projector and TV Wireless Access Point Wireless Access Point Laptop and Computer Connection Points Laptop and Computer Connection Points Internet