Verified Document

Networking Solution A Reliable And White Paper

However, an accurate (or at least as accurate as is reasonably possible) assessment of all of the costs that are embedded in outsourced networks leads me to make a very strong recommendation towards an in-house it department (Banks & Card, 2008, p.49). This shift would substantially increase the reliability of the network along with being far more flexible and (related to the former) far more scalable. Thus the system could grow to meet the company's needs in sync with those needs, neither falling behind nor wasting money by buying new hardware and software in advance of need. An important advantage of waiting of this last is that software and hardware purchased just at the time of need will be the most recently updated and therefore will provide benefits for longer. Adding technical capacity to a network at the moment when it is needed increases both the reliability and the accuracy of a network, thus providing a remedy for two of the most serious problems that the company had been experiencing with the current network provider (Resilience, n.d.).

One of the obvious drawbacks of using an outsourced network provider is that the provider will use hardware and software (as well as making staffing decisions) that are geared toward satisfying the provider's largest customers. This has been, as noted, one of the primary problems that Metric Machine...

An in-house staff would not do this; moreover, employees of the company would be directly responsible to the corporate management, which would make them much more receptive to requests and dicta for work.
Another very important advantage of moving to in-house it is that it will substantially increase the security of the network. There is, of course, no completely secure network (if for no other reason than the ever-so-common practice of writing passwords on post-its and then sticking these to the screen). However, in general the fewer number of people who know a password, the more secure the system is. Given that the networking needs of the company, while growing, remain relatively simple, the size of the it staff can be quite small, thereby substantially reducing potential security problems.

References

Banks, M. & Card, O.S. (2008). On the Way to the Web: The Secret History of the Internet and Its Founders. New York: Apress.

Christian, G.C. (2011). It Support: Outsourcing vs. In House it Department. Retrieved from http://www.gguild.com/blog/it-support-outsourcing-vs.-in-house-it-department/

Resilience. (n.d.) Retrieved from https://wiki.ittc.ku.edu/resilinets_wiki/index.php/Definitions

Sources used in this document:
References

Banks, M. & Card, O.S. (2008). On the Way to the Web: The Secret History of the Internet and Its Founders. New York: Apress.

Christian, G.C. (2011). It Support: Outsourcing vs. In House it Department. Retrieved from http://www.gguild.com/blog/it-support-outsourcing-vs.-in-house-it-department/

Resilience. (n.d.) Retrieved from https://wiki.ittc.ku.edu/resilinets_wiki/index.php/Definitions
Cite this Document:
Copy Bibliography Citation

Related Documents

Networking Practical Networking in the Modern Business
Words: 3298 Length: 9 Document Type: Essay

Networking Practical Networking in the Modern Business Environment Networking architecture is vital in the organisation of any business firm in today's globalised world. RFID, Cloud Computing, Intranet Network Architecture and Digital Rights Management (DRM) are major fields of endeavour that require the resources of companies. Increasingly, all aspects of an organisation are linked via the Internet and various other technologies in ways of connectivity that we did not even imagine before. Radio Frequency

Networking Past, Present, and Future
Words: 1419 Length: 5 Document Type: Research Paper

The transformation of networking from the past to our current day, as well as the trends for our future Websites (or digital channels as they were then called), were initially meant for connecting organizations with their clients. This was followed by the emergence of digital processes for supporting client interactions. Bigger digital ambitions implied establishing committed digital teams for managing their mobile and social channels (Atzori et.al 2010). For better utilizing vast

Management of Enterprise-Wide Networking the
Words: 3545 Length: 10 Document Type: Term Paper

These are contained in the Enterprise Operations Center framework. The center has reach to the group of specialized telecommunication commercial and federally concentrated focused professionals within the CSC. These groups of individuals have thousands of certifications for operating Cisco, Microsoft, Sun, Nortel, Ayaya and many other types of equipment that assists any networking or telecommunication requirements of clients who are working with the Center. (Enterprise Network Managed Services Center

Arby Fields: Computing, Networking, and Information Technology
Words: 4378 Length: 12 Document Type: Essay

Arby Fields: Computing, Networking, And Information Technology Hardware and Software Recommendations Fields Comprehensive Youth Services Inc. (FCYS) is a small nonprofit company based in southern California that serves adolescent male who are dependent and delinquent minors. FCYS has thirty employees. This study addresses the computing needs of the organization including hardware and software requirements as well as requirements for information technology security in the organization. The purpose of this study is to

Information Technology: Telemedicine Solutions Offered
Words: 9778 Length: 36 Document Type: Research Proposal

" (Doukas, Maglogiannis and Kormentzas, 2006) The following illustration shows the evaluation Platform Architecture. Figure 3 The Evaluation Platform Architecture Doukas, Maglogiannis and Kormentzas (2006) state that the patient state vital signs are monitored through a PDA device attached to the patient and transmitted to a computer for evaluation through wireless access or Bluetooth. Additionally the patient site is monitored through use of a camera. The software that has been developed is used

Wireless Networking Technology and Security:
Words: 7497 Length: 22 Document Type: Research Proposal

Bluetooth devices use encryption security and this makes the requirement of a "unique key session key to derive per-packet keys thus avoiding frequent key reuse." (Kennedy and Hunt, 2008, p.4) Kennedy and Hunt report that ZigBee is a reasonably priced low energy consumption two-way CDMA/BA-based wireless communications standard which is based on IEEE 802.15.4 which is referred to commonly as a 'Low Rate Wireless Personal Area Networks (LR-WPANs) and which

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now