Human Factors of XR: Using Human Factors to Design XR Systems
6 aproaches
1. INFRASTRUCTURE AND SECURITY ESSENTIALS
OF AN ENTERPRISE
Introduction:
The title of this project covers two main aspects of information technology, the
infrastructure and security essentials.
I will give you a short introduction in this topic. The infrastructure refers to
composite software, hardware, network resources and services (outboard IT support), however
security essentials are physical hardware protection or may be security software. Security on data
may also refer to secure data from unauthorized person access that can disclosure, disruption,
manipulate, alteration and destruction.
This project recommend IT to be outsource to professional who provides actually
information Technology services/ solutions to their client because they provide a large platform
to their clients need, they have highly certified IT professional, best IT products and they
upgraded time by time which make a lot of cost to a single enterprise however these IT solution
provider can share these resources among their clients according to their requirement.
In this matter we take a look of 6 managerial approaches in which 5 W’s and 1 H
which helps us to understand that why this project is necessary? How we choose that
infrastructure which is suitable to an organization? And what are the security essentials that
should be taken for data security?
WHAT
What is the scope of this project?
The enterprises may distract their attention from business which is required more
and more focus.
Cost Cutting Analysis: which means they can save a large amount of capital from
I.T department in terms of hardware software and staff salaries.
Technology change or better to called updates day by day and which required a
large amount of capital.
Risk = Threats * Vulnerability
2. WHERE
Where this project is to be executed?
System Integration
IT personnel outsourcing
SaaS, IaaS, PaaS
SLA: Service Level Agreement (complete infrastructure, solution and personnel)
will be provided 24/7 7 days a week on virtual basis because their team has
highest industry certifications e.g., MICROSOFT, CISCO, ORACLE and ITIL.
They are highly trained and equipped to answer and rectify a company’s issue.
WHY
Why this SLA is much more effective in this project?
The process is faster and its cost on IT is low
The risk and productivity losses of business
are lower.
Product services and reliability is guaranteed.
Quality Speed Efficiency Cost
WHO
Who will provide services on SLA?
IT solution companies are hired highly qualified professionals in their respective
fields of job and equipped with state of the art technology. They provide solutions
to their clients according their requirement.
They maintain Hardware, software, devices and operating systems according to
the SLA.
3. WHEN
When security is essential? Is the SLA still works and more reliable for data security?
In working conditions like data center, government national database, banks and
other organization that are very strict in data security the SLA and outsourcing is
failed because data may be manipulated, shared, hacked, altered and disclosed.
HOW
How business will run on virtual platform?
PaaS Platform as a service: Many applications that runs terabytes of Ram or they
required more space to save data but a physical system provide limited of RAM
however in virtual machines the administrator may increase it RAM virtually
according to the requirement.