The administration process in any organization depends mainly on effective decision making. The Management Information Systems (MIS) appeared with the aim to facilitate the planning and decision making process and therefore the administration process by incorporating the processes of collecting, processing, storing, retrieving and communicating information towards a more efficient management and planning in businesses. Therefore; MIS can be defined as a system that transforms data to information that is communicated with management in a proper form (Al-Mamary, Shamsuddin et al. 2013). It is designed for a better communication among management and employees and for serving as an information recording system that support the organization's strategic …show more content…
Such advancements at the technological level provide businesses with a variety of systems to adopt for an efficient decision making. However, businesses should study the MIS options available, their needs, and their internal IT structure since it is the backbone for the entire operation to decide what is appropriate for them.
This report will highlight two technological trends that are currently being widely discussed. These are Virtualization and Cloud computing. The report will define these terms, specify their characteristics, clarify the advantages and disadvantages for each and will discuss what better suits the banking sector by taking the Bank of Jordan as a case.
2. LITRETURE
…show more content…
Application Virtualization: means to abstract the application layer from the operating system, and run it in a compressed form without depending on the operating system.
2.1.1 Virtualization characteristics
In reference to an article presented at ("5 Characteristics Of Virtualization", 2010), describes five characteristics of virtualization as follows:
Flexible: business can configure and reconfigure to meet the changing environment and the company and customer needs.
Scalable: business can scale up or down to facilitate its growth and expansion depending on its needs.
Efficient: virtualization saves money on the business.
Secure: virtualization provide high security on company’s data.
Accessible: it is accessible to anyone needs it at any time.
2.1.2 Advantages and Disadvantages of Virtualization
Virtualization has recently spread widely among businesses as an IT solution; and became one of the most used products regardless of the business size due to its benefits (Occupytheory 2015). However; before adopting virtualization companies should know in addition to the advantages of virtualization the disadvantages associated with its adoption and then to decide whether to adopt it or not. Main advantages and disadvantages of virtualization of virtualization are illustrated in table
Virtual Machine Security - Full Virtualization and Para Virtualization are two kinds of virtualization in a cloud computing paradigm. In full virtualization, entire hardware architecture is replicated virtually. However, in para virtualization, an operating system is modified so that it can be run concurrently with other operating systems. VMM Instance Isolation ensures that different instances running on the same physical machine are isolated from each other. However, current VMMs do not offer perfect isolation. Many bugs have been found in all popular VMMs that allow escaping from VM (Virtual machine). Vulnerabilities have been found in all virtualization software, which can be exploited by malicious users to bypass certain security restrictions or/and gain escalated privileges. ation software running on or being developed for cloud computing platforms presents different security challenges. It is depending on the delivery model of that particular platform. Flexibility, openness and public availability of cloud infrastructure are threats for application security. The existing vulnerabilities like Presence of trap doors, overflow problems, poor quality code etc. are threats for various attacks. Multi-tenant environment of cloud platforms, the lack of direct control over the environment, and access to data by the cloud platform vendor; are the key issues for using a cloud application. Preserving integrity of applications being executed in remote machines is an open
Virtualization’s rate of adoption is completely characterized by the five characteristics described in the framework for the concepts of innovation (Luftman & Bullen, 2004, p. 189). It is perceived to be better than physical servers in its ability to host multiple operating systems and share the host’s resource. Its encapsulation of resources allows it to operate as if it was a physical machine yet it is totally virtual giving it a relative advantage. It is compatible with all baseline operating systems on the market. Complexity in implementation is minimal making it more attractive to adopt. The vendors allows for free downloads and trials. Its visibility in competition with Microsoft’s Hyper-V has shown multiple advantages. (Luftman & Bullen, 2004, p. 190)
To determine the effectiveness of the chosen information system, SUC will use the collective information gathered by people, procedures, databases, and devices within the organization, which is known as using the Management Information System (MIS). This process begins with decision making. There are three stages in decision making: intelligence, design, and choice. Problems are discovered and information of what has caused the problem or what is needed
Virtualization is a combination of software and hardware engineering that creates Virtual Machines (VMs) - an abstraction of the computer hardware that allows a single machine to act as if it were many machines, or a computer that does not physically exist as a piece of hardware. The hardware that is seen by the operating system is emulated in an effort to separate the physical hardware from operating system. This allows the virtual machine to be moved and hosted on any machine independent of hardware. Virtualization technology is possibly the single most important issue in IT and has started a top to bottom overhaul of the computing industry which is why many companies around the world have are using its softwares to enhance their business opportunities.
As we all know virtualization is the requirement of future. We have evolved from the age of traditional environment to virtual environment.We have grown accustomed to almost all things virtual from virtual memory to virtual networks to virtual storage.The most widely leveraged benefit of virtualization technology is server consolidation, enabling one server to take on the workloads of multiple servers. For example, by consolidating a branch office’s print server, fax server, exchange server, and web server on a single windows server, businesses reduce the costs of hardware, maintenance, and staffing.
This virtualization service will reduce cost and the company will have reduction in server related capital investment by 70% and a reduction in operational cost by 30% to 40% compared to the physical server.( Accenture_Client_Success_Telstra_Virtualization)
Virtualization is being able to give a physical device the power, through the use of software, to do more than that physical device was technically designed and able to do (Santana, 2014, p. 12). For example, a server can only run one operating system at a time. However, when a hypervisor is used in a server, the hypervisor is a layer of software that acts like the server itself so that many operating systems can be run from that one server. The hardware, in this case a server, has been virtualized. The goal is to use all of the computer’s resources all of the time, and the only way to do that is to have enough things running that the resources are being used consistently and efficiently. An analogy for this could be online classes. If each teacher only had one student, the teacher’s resources of time and expertise would not be utilized efficiently because that one student will not need help all day, every day. If the teacher is assigned to fifteen students, the students can still get help when needed from the teacher, and they would not even be aware that they are not alone in the class. Because it is an online class, the teacher does not need any more physical resources to teach an entire class than was needed for one student. The students are receiving the benefits of being taught by that teacher without needing to be with him or her physically.
In today’s world you will find that the concept of virtualization seems to be the all new fad that everyone is jumping on the bandwagon to start using. Were in fact the concepts of virtualization started way back in the 1960 with main frame and Unix systems.
Flexible: allows for various servers and frameworks organization outlines when stood out from a hardwired physical establishment, which requires more capital and push to change.
The primary focus of this literature review will be physical hosts, which are VMMs and hypervisors managing a virtualization environment. The Important Ideas section will
Cloud computing is steadily increasing as a viable enterprise technology solution. Information technology literature reports an expected boost in enterprise adoption of cloud computing in the next few years. Business plans to transition operations to cloud computing are also commonly reported. Despite these trends, there are many businesses that remain skeptical of the benefits of cloud computing and continue to support information systems in an on-site location. Careful planning and due diligence is essential to ensure that the most beneficial cloud computing model is utilized to meet business needs. This use case explores cloud computing methods, reviews security concerns regarding virtualization, and considers mechanisms to better
This business case investigation discusses in depth about the process of virtualization of servers in an organization and the various benefits of doing so. Giving a brief introduction to the concept of virtualization, it was introduced in the late 1960s when the resources of mainframe computers were divided between several applications. [1] The term virtualization has since then been expanded in terms of practical application. The conversion of the physical server into a pool containing several virtual machines which act individually as one computer is known is hardware virtualization.
The security aspects of virtualization are of vital importance.The cost benefits of virtualization allows enterprises to significantly reduce the space and electrical power required to run data centers and streamline the management of an ever-growing number of servers. Virtualization also provides means for expedient scalability. Given today 's economic climate and cost-cutting mandates, it is not surprising that a firm analyst Gartner recently predicted that 50 percent of workloads will run inside virtual machines by 2012. According to reports from Odyssey, “beyond the benefits of economic savings and enhanced flexibility in capacity planning, virtualization also introduces a number of threats and challenges to the security of organizational information. Among such threats and challenges is the increased network complexity and diminished visibility of the network traffic flowing within the virtual environment, which makes it difficult to detect Malicious “insider” Activity and Attacks. In the event that an internal malicious user or an attacker manages to compromise the virtualization layer, or hypervisor, this could lead to a compromise of all servers hosted on this virtual environment and as a result all applications and data residing in it.”
With technology expanding itself into businesses, virtualization is the new piece of software that will help any IT employee worldwide. Virtualization is the most effective way to reduce IT expenses while boosting efficiency and agility for not only large enterprises, but for small and midsize businesses as well. VMware virtualization lets you run multiple operating systems and applications on a single server. The three types of virtualization are server, client (or desktop), storage virtualization.
Management information systems is an integrated computer based application used to access useful, timely and accurate information to allow the user to make appropriate decisions, and to manage information effectively and efficiently. The amount of data collected is increasingly larger every day when it comes to management information systems. For employees the information includes such things as name, address, gender, social security number, work habits, likes and dislikes. For the customer, data collected include name, address, gender, credit card number, likes and dislikes. The question is how do we handle