Administering a highly effective information system can be a laborious process as well as monotonous task for administrators. Thereby a manager must realize that the business' information management goals will vary eventually and particular steps or practices may have to be used or repeated in future. Managers should be aware of several ways in which information technology can affect other companies and how the system can work. They should also be responsive to the fact that these consequences can be equally positive or negative. It all must rely on the manager's competency.
It therefore becomes necessary for managers to determine the information need of the organization and established goals for what is to be achieved with the proposed information system. It is imperative for the manager to ensure that his proposed information system has the full support of the management and adequate or required finances are appropriated for the project. If not the project might fail.
This is done remotely so even when the office is closed things can be repaired, slow servers can be noticed and repaired, and when the office reopens in the morning everyone will find that their systems work exactly the way they should, and they are none the wiser of any problems that existed or were repaired the night before.
The organization has to assemble its database for the project and once this is done, it is important for the organization to determine its hardware needs and acquire the appropriate equipment.The global technological revolution has made it easy for organizations or individual employee to own personal computer system instead of the outdated mainframe computers.
Security: System management has a huge impact on IT security. The same security settings are implemented on all stations, and any new policies are remotely implemented instantaneously on all the stations. Users can access any station and get the same settings and data, made possible by settings that apply to specific usernames and job or department levels. This makes the network more capable of withstanding external attacks. Security patches and critical updates can be done instantaneously on all stations without any extra effort or manpower, which reduces the window that attackers can use to take advantage of bugs. The network gets centralized enterprise anti virus and malware protection. Even the data is more secure as regards hardware failure or data corruption, since everything is stored on servers with a backup system.
Regardless of how well planned an information system is, there will almost certainly be hitches. For example the system may be unable to generate a report that needs to be made available to certain managers or the report may not be in appropriate format or certain employees may be unable to access data that they need. To put these problems under control, the installed system must be tested while appropriate modification is made.
Systems management is a continual process. Even if an effective information system can be created and put into use there is still a good chance that it will need to be modified occasionally to fit the changing environment
الاثنين، 14 مارس 2011
الاشتراك في:
تعليقات الرسالة (Atom)
ليست هناك تعليقات:
إرسال تعليق