Tuesday, December 31, 2019
Introduction of Sleep - Free Essay Example
Sample details Pages: 4 Words: 1143 Downloads: 1 Date added: 2019/08/07 Category Health Essay Level High school Tags: Sleep Deprivation Essay Did you like this example? One-third of a persons life is spent on sleeping. Since the beginning of a persons life sleep becomes vital. A newborn sleeps 16 to 18 hours a day, according to Colten (2006). Donââ¬â¢t waste time! Our writers will create an original "Introduction of Sleep" essay for you Create order This is essential in life, not only does a person need sleep to perform daily tasks, but it is important for a person to get energy. Many people find it okay to get only a few good hours of sleep. However, little do they know that death can strike upon a person within a month without sleep. No one is certain why human beings need sleep but one thing that is important to notice is how essential it is for a person to survive. Sleep doesnt only help people stay alive, but it also benefits a persons daily cognitive function. If a person maintains a habit of losing sleep, it can take a toll on a persons health. Sleep is one of the greatest unsolved mysteries of biology. However, it is an important physiological process responsible for the physical, mental and emotional health of a living being. A good sleep is one of the most satisfying human experiences with a role to play in maintaining a good mood and cognitive acuity as well as in promoting physiologic balance and resilience ( Chittora et al., 2015). Throughout this paper, I will explain how sleep works and the effects college students cause towards there body when its sleep deprived. Sleep is regularly a time of unwinding and repair, assuming a focal part in support of physiological homeostasis and mental adjust. For the support of good wellbeing, nature of rest is an imperative physiological process. Rest is expected to recover certain parts of the body, for the most part, the mind, with the goal that it might keep on functioning ideally. A few investigations demonstrate that rest encourages memory union ( Chittora et al., 2015). So how does sleep work? There are two primary sorts of rest in a persons life, one is non-rapid eye development and the other is rapid eye development. Through the process of rest the NREM an d REM rest alternate frequently. Rapid eye development rest comprises of an envisioning state in which there is an initiation of the cortical and hippocampal electroencephalogram, quick eye developments, and loss of muscle tone. Despite the fact that REM rest was discovered over 50 years prior, the neuronal circuits in charge of exchanging amongst REM and non-REM rest remain a great mystery to neurologists. Scientists, however, have an idea. They proposed a brainstem flipââ¬Å"tumble switch, composed of an inhibitory REM-off and REM-on territories in the mesopontine tegmentum. The commonly inhibitory associations of the REM-on and REM-off territories may frame a flipââ¬Å"tumble switch that hones state changes and makes them powerless against sudden, undesirable advancesâ⬠for instance, in narcolepsy (Lu, Sherman, Devor, Saper, 2006). Conterversial? Scientist still doesnt have an idea why we sleep but that is important to a person health. The topic of sleep is an issue because of the weights put upon adolescents from primary school through the college yearsâ⬠particularly, that juggling school, extracurriculars, and guardians professions have compacted unstructured time at home and constrained family time. For some kids, the outcome is asleep deprivation. Sleep deprivation is a serious issue and the damage is serious for a student whether it is in middle school or in college. As a college student, I have seen multiple students pull an all-nighter to study for an exam. The person doesnt see it is doing more damage than good. From personal experience, I can attest that pulling an all-nighter does not help you Aces a test or help a person crammed varies of chapters last minute. These are the issues college student face and doesnt know there effects or damages it can cause to the body. Sleep Deprivation Lack of sleep is the state of deficient rest and it can either be unending or intense. It is a typical element of contemporary society, with an expanding extent of people encountering 6 or fewer hours of rest, every day. In spite of the fact that rest issues are a primary reason for lack of sleep, upwards of 10% of the populace has a constant rest issue. These rest deprivations are perhaps caused by a life or work-related variable, such as work, stress, caffeine, and liquor utilize and even medicinal conditions (Almondes, Junior, Alves, 2015). These elements prompt diminished rest length and influence up to thirty to forty percent of people in the overall public. An interminable rest confined state can caus e weariness, daytime sluggishness, ungainliness and weight reduction or weight gain. Lack of sleep unfavorably influences subjective and enthusiastic capacities. A solitary night of aggregate lack of sleep can disable subjective execution with outcomes that add to work and social settings. For instance, mechanical, transportation mischances and in addition therapeutic mistakes. This is the reason that rest and sleep are essential for an ordinary intellectual working. In the managed consideration, memory, learning and official capacities (Almondes et al., 2015). Health consequence of Sleep deprivation Lack of sleep causes different behavioral influences including engine movement, tension level, memory and metabolic capacities identified with anabolic hormones, body weight, etc. Sleep hardship likewise causes a diminishing of body weight in spite of an expansion in sustenance consumption, hypothermia and lessening in locomotor action, touchiness and poor performance. It is confirmed that lack of sleep additionally improves torment affectability and furthermore stifles safe framework, which prompts irresistible maladies, growths, and different respiratory and depressive disorders. Chronic rest unsettling influences seem to cause wellbeing dangers, for example, gloominess nervousness, disposition issue, and psychosis. A few organs, for example, muscles, can rec over not withstand when a person isnt dozing in as much as they are resting. This could include lying wakeful however casual inside a tranquil domain ( Chittora et al., 2015). There is not enough evidence of sleep being not important. But a study demonstrates that sleep doesnt affect general skills. This was explained by having done an experiment where a control group, sleep, and experimental group, no sleep, establish that sleep isnt a factor in general skill learning. (Nemeth et al., 2010) But sleep deprivation effects a person more than the performance. Lack of sleep constricts the elements of various mind structures. seventy-two hours of attentiveness causes around six to eight percent to diminish in the cerebrum metabolic rate, according to Chittora. Exhibited that lack of sleep brings about an expansion in plasma glucocorticoids level. Furthermore, lack of sleep additionally prompts expansion of the maturing procedure in view of expanded cerebrum levels of cortisol, which make a steady harm mind cell. Physical symptoms from a lack of sleep may bring about throbbing, sadness, expanded anxiety hormone levels, expanded danger of diabetes, and so much more. (Chittora et al., 2015). In conclusion, the importance of sleep throughout a persons lifespan is important for survival. Whether it be for health benefits, cognitive awareness or physical appearances.
Monday, December 23, 2019
Autism Spectrum Disorder ( Asd ) Essay - 1651 Words
Autism Spectrum Disorder (ASD), sometimes referred to as ââ¬Å"autismâ⬠, is ââ¬Å"a chronic disorder whose symptoms include failure to develop normal social relations with other people, impaired development of communicative ability, lack of imaginative ability, and repetitive, stereotyped movementsâ⬠. Individuals with autism disorder have markedly different social and emotional actions and reactions than non-autistic individuals. For example, many autistic children do not seem to care whether or not they get attention from their parents. ASD also has an effect on IQ. While 30% of individuals with autism have an average or gifted IQ, 70% are considered mentally retarded. The term ââ¬Å"autismâ⬠is derived from the Greek word ââ¬Å"autosâ⬠, which means ââ¬Å"selfâ⬠. In the 1940s, Leo Kanner, a doctor at Johns Hopkins University, began using the term to describe children whose behavior was socially and emotionally withdrawn. From then until the 1960s, many researchers and therapists believed that autism and schizophrenia were linked disorders. Initial treatments for autism included the use of LSD, electric shock, and behavior change techniques, which regularly relied on punishment and pain to change behaviors. In order for an individual to be diagnosed with ASD, he or she must be several qualifications as stated in the Diagnostic and Statistical Manual of Mental Disorders (DSM-IV). These include a qualitative impairment in social interaction and communication, restricted repetitive and stereotypedShow MoreRelatedAutism Spectrum Disorder ( Asd )1722 Words à |à 7 Pagesin every sixty-eight births are diagnosed with the Autism spectru m disorder in other words (ASD), which is about one percent of the worldââ¬â¢s population. And that more than three point five million people in America live with a person who has the Autism spectrum disorder. We all know that Autism is a spectrum disorder in which an abnormality is developed in the brain. It is a long life condition that has no cure for itself. People who have Autism face many difficulties in their communication and theirRead MoreAutism Spectrum Disorder ( Asd )1441 Words à |à 6 PagesIntroduction Autism spectrum disorder (ASD) is a hereditary neurodevelopmental disorder. Like many other psychological disorders, it is commonly misunderstood in popular culture. Many allude to it casually, often equating it with crippling social awkwardness and disability when it is in fact a spectrum disorder with many degrees of severity. It is somewhat of an enigma within the scientific community as well; there are many things we do not know about ASD and there is ongoing research to learn moreRead MoreAutism Spectrum Disorder ( Asd )1535 Words à |à 7 PagesHow Autism Influences the Interactions with Others There is a little boy that gets up every morning and goes to school. He goes home to his parents after school each day. He eats, sleeps, and plays just like any other child. There is one difference. He sees the world in a unique way than most other children not affected by Autism Spectrum Disorder. The boyââ¬â¢s life and actions are a bit different and can be challenging for him. He needs understanding parents, family members, and teachers. Autism SpectrumRead MoreAutism Spectrum Disorder ( Asd )1444 Words à |à 6 PagesAutism Spectrum Disorder Dustin S. Staats University of Central Oklahoma ââ¬Å"Autism Spectrum Disorder (ASD) formerly known as just Autism, is a disorder that affects about 1 in 68 children here in the United States.â⬠(Facts about ASD) This is a pretty high prevalence and the number is continuing to rise. ââ¬Å"Autism is a developmental disability that can cause significant impairments in behavioral, communication, and social aspects of everyday life.â⬠(Facts about ASD). The intellectual functioning ofRead MoreAutism Spectrum Disorder ( Asd )1569 Words à |à 7 Pagesdiagnoses for autism spectrum disorder (ASD) occur has seen a dramatic growth in numbers. With diagnoses for ASD increasing, more siblings are also being found to have grown up with a sister or brother with autism spectrum disorder. Previous studies have shown no consensus on whether or not siblings of persons with ASD are at risk for negative effects. However, patterns of anxiety among these siblings are being examined to see if characteristics of a child with autism spectrum disorder and their parentsRead MoreAutism Spectrum Disorder ( Asd )1369 Words à |à 6 PagesAutism Spectrum Disorder (ASD) Introduction I don t think people understand how unique children with Autism are or the demands of caring for a child with Autism is. In order to grasp the effect of this disability has on a child or their family it is important to understand the characteristics of a child living with Autism. So for you to understand I will be talking about Autism Spectrum Disorder (ASD) or Autism in a childs life. I will be talking about what autism is, the history and descriptionRead MoreAutism Spectrum Disorder ( Asd )1587 Words à |à 7 Pages Topic: Autism Spectrum Disorderà (ASD) Purpose: My audience will learn the importance of recognizing early signs of Autism Spectrum Disorder in children. Thesis: It is important to understand the early signs of Autism Spectrum Disorder, and why early intervention is the best treatment. Introduction: Gain/maintain attention There is a television show I like to watch called ââ¬Å"The Big Bang Theory, maybe some of you have seen it. This show focuses on the relationships between a group of friends, someRead MoreAutism Spectrum Disorder ( Asd ) Essay1168 Words à |à 5 PagesAutism Spectrum Disorder, as defined by the National Institute of Neurological Disorders, refers to a group of complex neurodevelopment disorders characterized by repetitive and characteristic patterns of behavior and difficulties with social communication and interaction (ninds.nih.gov). Autism Spectrum Disorder (ASD) is a very complex developmental disorder and the term ââ¬Ëspectrumââ¬â¢ was added to the original term simply known as ââ¬ËAutismââ¬â¢ due to the wide range of symptoms associated with the disorderRead MoreAutism Spectrum Disorder ( Asd )1852 Words à |à 8 PagesThe following paper is going to cover the topic of Autism Spectrum Disorder (ASD). Using research and data collected from various authors and journalists the paper will describe the different variations of autism and discuss the impact autism has on a person- in society, at home, in the classroom, and in their careers. Beginning at infancy, autism has a major impact on not just the child but their familyââ¬â¢s life as well. The childââ¬â¢s lack of ability to interpret social cues, gestures, and expressionsRead MoreAutism Spectrum Disorder ( Asd ) Essay1240 Words à |à 5 PagesAutism Spectrum Disorder Autism Spectrum Disorder (ASD) is a range of conditions grouped under the neurodevelopmental disorders in the Diagnostic and Statistical Manual of Mental Disorders (DSM-5) published in 2013 (Kress Paylo, 2015). Those who are diagnosed with autism spectrum disorder must present two types of symptoms: 1) Deficits in social communication and social interaction and 2) Restricted, repetitive patterns of behavior, interests or activities (APA, 2013). The DSM-5 merged all autism
Saturday, December 14, 2019
The Case of the Omniscient Organization Free Essays
Case Analysis: The Case of the Omniscient Organization Introduction In this case study, Dominion-Swann (DS) has implemented a ââ¬Å"radical restructuring of the work environmentâ⬠in order to regain control of its employees. By 1990, DS had been suffering from a number of business woes. It was not keeping pace with its competition, employee turnover had increased substantially, health costs and work-related accidents were rising, and employee theft was at an all-time high. We will write a custom essay sample on The Case of the Omniscient Organization or any similar topic only for you Order Now Instead of identifying and addressing the underlying business and management problems, DS decided to treat the symptoms by turning to SciexPlan Inc. o help radically restructure the work environment through the use of employee monitoring technology. Background DS has justified its work environment restructuring based on past failures rather than future goals for success. The company has created a system to compile a comprehensive database of information on every employee. DS also monitors its employees in all aspects of their job, subjecting them to constant evaluation and productivity tests. The massive amount of information collected on each employee is supposed to allow DS to objectively manage personnel and make job assignments that provide the greatest efficiency. Instead, DS has created an impersonal monitoring, surveillance, and detection system designed to lay traps for employees and shape their behavior without any managerial effort. Problem Statement Has DS become so consumed with its ââ¬Å"radical restructuring of the work environmentâ⬠that it has prioritized technology and control over the welfare, creativity, and productivity of its people? Analysis and Issues Digital technology has made an undeniably profound impact, both positive and negative, on the workplace. When implemented properly, the benefits of this impact can include increased productivity, improved safety, better working onditions, and enhanced communications between employees, management, and customers. However, an exceedingly obsessive employee monitoring system will create tedious and stressful working conditions, loss of employee privacy, and fear which will result in reduced levels of creativity and productivity. By implementing an overly zealous system for emp loyee monitoring, DS is significantly aggravating the tension that exists between surveillance technology and employee privacy concerns. DS wants to monitor employees in order to reward effort, knowledge, productivity, and success while eliminating idleness, ignorance, theft, and failure. Instead, it is treating its workers like pieces of equipment rather than unique and valuable individuals. DS has basically transformed the workplace into an all-encompassing electronic prison where nearly every aspect of an employeeââ¬â¢s behavior is monitored. The DS managers who monitor every move that employees make are accomplishing efficiency objectives at a sizeable cost. Monitoring and surveillance can create a high stress environment for employees that can lead to physiological and psychological stress-related illnesses. Covert surveillance at DS will do nothing but increase fears, anxieties, and distrust among employees. The impersonal aspect of technological surveillance diminishes employeesââ¬â¢ concepts of their value, contribution, and self-worth. The all-encompassing surveillance implemented by DS will destroy any hope for employees to make decisions and act autonomously. Autonomy is a critical component to on-the-job independence that maximizes worker morale. Although DS has justification for some amount of employee monitoring in order to successfully evaluate employee performance, it has taken employee surveillance to the point where it will adversely affect productivity. When employees do not feel that they are trusted, their desire to perform well is lessened. The employee screening process DS has implemented brings up additional privacy concerns. Any investigation of employee activities and history outside of the workplace is an extremely sensitive and potentially litigious issue. DS is only justified in intruding into its employeesââ¬â¢ personal lives when it involves misconduct or illegal activity. Off-duty conduct may be relevant to employment if the misconduct negatively impacts the employeeââ¬â¢s work performance or the companyââ¬â¢s mission. However, the systematic monitoring employed by DS raises serious privacy concerns. Monitoring all employeesââ¬â¢ activities, rather than just the activities of employees under suspicion of specific misconduct, constitutes a blanket search that brings enormous privacy concerns. Recommendations DS would be better off with no employee monitoring rather than scrutinizing its employeesââ¬â¢ every move. Once the employee monitoring creates a morale problem, all of the value it has created will be diminished. If DS is to continue with employee monitoring systems, it must create and clearly communicate a monitoring policy for employees. DS needs to start with human-oriented policies, then use technology to enforce them. As it stands right now, DS is exerting too much power in its invasion of employee privacy in the workplace. DS is exploiting the lack of regulation in this area in order to implement extremely invasive methods of employee surveillance. Until employees are protected by regulation to protect their rights to privacy in the workplace, DS should assume responsibility to self regulate by limiting the amount of surveillance, implementing it only when it achieves specific goals for success. Monitoring should be conducted only for business purposes, and this must be communicated to the employees. In order to throttle back its employee monitoring system to a reasonable level, DS should review and apply the suggested rights given by the American Civil Liberties Union (ACLU). To establish a reasonable approach and prevent abuses, DS should adopt a human-oriented policy that includes the following features:à * notice to employees of the companyââ¬â¢s electronic monitoring practices;à à à à à à à * use of a signal to let an employee know when he or she is being monitored;à à à à à à à * employee access to all personal electronic data collected through monitoring;à à à à à à à * no monitoring of areas designed for the health or comfort of employees;à à à à à à à * the right to dispute and delete inaccurate data; a ban on the collection of data unrelated to work performance; * restrictions on the disclosure of personal data to others without the employeeââ¬â¢s consent (American Civil Liberties Union, 1997). DS should also consider whether or not monitoring is truly necessary for performance evaluations. DS does not need to watch an employeeââ¬â¢s every move to be able to judge the quality of his or her work. Performance monitoring should be far less of a concern than an employeeââ¬â¢s ability to complete tasks and consistently meet deadlines. DS should involve its employees on the decisions regarding when, how and why electronic monitoring needs to takes place. Most importantly of all, DS must allow employees to inspect, challenge, and, when necessary, correct the data gathered about them or their performance. Conclusion/Summary DS must strike a balance between its business interests and its employeesââ¬â¢ privacy interests. This balance should allow for surveillance under certain limited conditions, and utilize less intrusive approaches. Although it is unlikely that DS would completely discontinue its monitoring practice, at a minimum DS should continue to fully inform its employees about all surveillance tools being used in their workplace and provided them with clear information as to what management does with the data. References Pedeliski, Theodore B. (1997). Privacy and the workplace: Technology and public employment. Public Personnel Management. December 22, 1997. Shoppes, Mia. (2003). Employee monitoring: Is big brother a bad idea. Information Security Magazine. Dec. 9, 2003. American Civil Liberties Union. (1997). Privacy in America: Electronic monitoring. Retrieved from http://www. aclu. org/technology-and-liberty/privacy-america-electronic-monitoring How to cite The Case of the Omniscient Organization, Papers
Friday, December 6, 2019
Learning Model of Information Technology â⬠MyAssignmenthelp.com
Question: Discuss about the Learning Model of Information Technology. Answer: Introduction Information technology has dominated todays world and every organization is looking forward to incorporate technology in its operations (Kyriazis et al 2018, p. 10). Technology incorporation in organizations business has been an up-hill task that requires specialized organizations to help in setting up the services. Despite setting up IT infrastructure, maintenance remains a key part that has been disguising many organizations that require IT services (Kyriazis et al 2018, p. 18). This project will focus on the following sections; application and use of information technology in Tata Consultancy Services (TCS), uses of IT infrastructure to address and achieve its business organizational business processes, available technological equipment used in various departments to support business processes and operating systems and other application software that TCS uses in both client and servers systems (Oshri, Kotlarsky Willcocks 2008, p. 289). Similarly, the project would address movemen t of email messages on the Internet Protocol (IP), the type of organizational networks in use and application architecture proposal in Human resources department. In this regard, the main objective of the report would be to access use information technology in the organization. To achieve this, the following aspect would be analyzed; the context of services offered by TCS, services offered by at the TCS, ease of accessing TCS services by both staff and clients and organizational ability to sustain its business as well as support other organizations run on scalable IT infrastructure. Tata Consultancy Services (TCS) has a range of services that it offers to other organizations in their bid to incorporate IT services in the business operations. First, TCS offer support to major telecom companies to set up cloud-based services that are both scalable and robust in order to help them boost IT productivity (Oshri, Kotlarsky Willcocks 2008, p. 300). In order to offer efficient system development services, TCS has put in place centralized management system lifecycle and documentation that is used to develop customers system. In its API platform that offers system, TCS uses three based approach in developing its applications; API lifecycles, developing and testing application pipeline and developing systems advanced features such as API analytics and integrating system monitoring with external tools. To prove TCS services worth and scalable, organizations such as Telia were able to steer their business by improving its productivity, it also improved its market time and m ade its services cost efficiency. Secondly, TCS has put in place measures to help other organizations to secure their data. Increase in cyber security threats have made it challenging for organizations to secure their data and business operations. To solve cyber security challenges, TCS has come up with a DPL cyber security solution which is SDLC compliant (Oshri, Kotlarsky Willcocks 2008, p. 306). The security program offered was able to save organization from all vicious activities that seemed threat to organizational operations. To authenticate its security measures on cyber threat, TCS has helped a European bank to automate its services by helping it to restructure its management incident processes, lowered its manual operational efforts and boost data security as well as minimize data leaks and false positivity. Additionally, TCS through its technology application has made many organizations data driven-enterprises. It has made data accessible and secure by making organization s access big data. Generally, big data is believed to open door and other avenues for organizational success by making organizations access and secure their data. Data structures and usage of IT infrastructure TCS is an organization that has a leverage of capabilities and can handle data in many forms. In order to capture a diverse market, TCS has employed various methodologies to store and retrieve required data. The methodology chosen depends with subject client need as well as TCS capability to offer similar service efficiently. To offer convenient services, TCS has to store and maintain some information about its clients. To make this practical, it has created information system that helps it store clients information and services they provide to them (Breitgand et al 2018, p. 95). The subject information system is meant for TCS only. It offers both storage and retrieval capabilities. First, it has implemented database which I capable to store all forms of data such as images inform of blobs, raw integers and strings. Its database is segmented in relation to services offered to the subject organization. In an example, if subject organization requires services from the TCS, it is catego rized as service client under consultation department. To makes its services secure, it does not require a third party to manage its database. It has developed internally hosted server which is capable to handle this data in a more convenient way and without delay. To make its services more robust, it has implemented organizational ERP which helps its client to generate requests for services. This has made it possible for the company to attract more clients because its services are accessible worldwide. In case client organizations to transform its services, TCS makes use of remote connection software to access clients data. Clients services within TCS are subdivided according to the needs of the customers. In this regard, IT infrastructure differs from department to the other. An example from development department includes both Linux and windows applications to help organization to access robust services as required. There is a close collaboration between hosting and development d epartment because some of the application developed by TCS for clients are hosted from within the organization in order to facilitate easy maintenance. Finally, TCS has implemented strong firewalls software to secure organizational data from unauthorized access by hackers. Network equipment and their functions To make organizational business process successful, several devices are required. These devices are used in various TCS departments such as networking department. This is the department where organizational network is developed and maintained. It is the same department where clients networks are setup and run from. Since network is very sensitive in any organization, its security is of paramount and should be taken with required weight (Ross, McEvilley Ore 2018,p. 845). The first equipment involves routers which are used to segment and share organizational network. TCS network is divided into administrative and general network. To divide this network, organization has used router to categorize departments into either administrative or general (Tate et al 2018, p. 56). Since all departments have administrative sections, they must be provided with all capabilities. To make organizational management easy, all departments administrative sections are housed under administration building in order to share common network without restrictions. Without routers, network segmentation and maintenance would not be possible. Next, firewalls are very significant in the networking. They are used to filter all signals entering and leaving the organization (Siegal et al 2018, p. 146). It is only through firewall that security of the organization is set and no unauthorized user would penetrate to organizational network. Additionally, all departments would require computers which would be used to access organizational data and communicate to other organizations. It is only through computers that all information system capabilities achieved. Further, hosting department would require servers to host range of applications so that they are available to customers as cloud services (Anglin et al 2018, 904). In the same hosting department, radio transmitters would be of great use since they would be used to receive and sent network signals to all customers destinations. Consequently, sw itches would be used to in almost all departments but mainly would be in technical support where all signals would be distributed to the required sections. Switch functionality in this case is very crucial when it comes to data sharing and nodes communication (Breitgand et al 2018, p. 85). It is able to analyze data destination and originality address to determine which computer is to have sent and would receive a given piece of data. Operating system and application software specifications To access and get services from TCS Company, all staffs and clients are requested to meet some software requirements for security measures. To all window operating system users, they are to run on windows 7 or higher version (Oshri, Kotlarsky Willcocks 2008, p. 290). This helps organization to set all required features for users because most of the windows7 or later versions have no compatibility issues. This makes possible to establish remote desktop connection when need be. On the same note, those running on Linux should be able to make required connection secure without compromising systems security (Cha,Pingry Thatcher 2008, p. 283). Since Linux is very powerful and can be used to sabotage organizational data, those using Linux are requested to register with TCS security department so that they can be provided with authentication procedures. Apart from operating systems, applications software is restricted to some specification in order to connect to TCS data or systems (Jain Shanbhag 2012, p. 29). All browsers are required to be up to date. This is meant to prevent dubious activities from taking place. Some browsers are known to be vulnerable to hackers and malwares and can easily transmit viruses to organizational system. Consequently, all database and API development are to be done with SQL 2012 versions or later (Davne et al 2014, p. 278). This improves security parameters because all latest application software is believed to be integrated with up to date security parameters. Internet communication protocols are segmented into layers. These layers are structured to facilitate efficient communication over the internet. In this case, since communication is over the internet, TCP model would be discussed. TCP model is made up of five layers which correspond to OSI model 7 layers (Li et al 2018, p. 296). Each layer is made to communicate with its adjacent layer, either below or above it. The physical layer is used to encode and decode data bits that are found in the frame and contains transceiver that is used to sends and receives all signals in the network. The second layer is data link layer which creates required data frames as they move across the network model. The data frames are used to encapsulate all data bits and make use of available MAC addresses in the data frames to identify both destination and source address of the data (Oshri, Fenema Kotlarsky 2008, p. 612). The next layer is network, which tasked with creating data packets as messages moves across the network. In this layer, IP addresses are used to identify data packets both destination and source addresses. Further, the transport layer in the network is used to establish any required applications running on the other different hosts (Shaashua, Shaashua Neura Inc 2018, p. 865). Its main function is to monitor all applications above it by facilitating them with port numbers as well as use network layer to communicate with TCP/IP network. Finally, application layer is where all applications that need network communication reside. Some of the applications that are found in application layer are; browsers and email clients. There are several types of network that TCS have implemented. In this case, two types of network would be discussed because they dominate many departments in the organization. First, LAN is common in many of TCS departments because it is simple to implement across buildings (Noe et al, 2003, p. 89). The main reason of using LAN in TCS Company is because of its flexibility to be expanded into Wide area network (WAN). LAN facilitates communication of terminals across the organization while WAN facilitates communication with other organizations over a long distance (Laudon Laudon 2016, p. 46). TCS uses LAN for internal communication purpose between departments. On the same note, WAN is used to offer communication service to clients. Human resource department makes use of information system to capture organizational employees data and clients that get their services from TCS. To make its information flow accordingly, its system interact with various sections of the organizations in orde r to make service delivery efficient (Green et al 2018, p. 414). Human resource application interfaces with; clients ordering, administration protocol. Conclusion IT services are on demand by almost all organizations. This have created need to come up with specialized organization such as TCS to fill this gap. TCS offers services such as supporting major telecom companies, providing cyber security services and offering big data solutions to various organizations. TCS makes use of almost all available major data structures in order to fulfill all clients needs. Due to clients demand, it would be inappropriate to limit its data storage in a certain type of data structure. Organizations are moving from relational database to OOP due to growing demand to store images as data. To secure organizational and client data, TCS makes use of equipment such as routers to segment network, switches, bridges, network firewalls and radio transceivers. The OS and application software are very important aspect when it comes to specifications required to access services from TCS Company. Its a requirement that all software be up to data as required. To implement its network, TCS has made use of LAN and WAN because they are highly correlated. The project should continue to help organizations realize technological use. It should focus on big data access and cyber security threats to big data in order to make IT implementation more reliable. Bibliography Anglin, M.J., Cannon, D.M., Dawson, C.S., Fruchtman, B., Haye, M.A. and Martin, H.N., International Business Machines Corp, 2018.Replication of data objects from a source server to a target server. U.S. Patent 9,910,904. Breitgand, D., Da Silva, D.M., Epstein, A., Glikson, A., Hines, M.R., Ryu, K.D. and Silva, M.A., International Business Machines Corp, 2018.Dynamic virtual machine resizing in a cloud computing infrastructure. U.S. Patent 9,858,095. Cha, H.S., Pingry, D.E. and Thatcher, M.E., 2008. Managing the knowledge supply chain: an organizational learning model of information technology offshore outsourcing.Mis Quarterly, pp.281-306. Davne, J., Volkov, A., Yankelevich, M. and Malamud, M., Cloudnexa, 2014.Managing services in a cloud computing environment. U.S. Patent 8,910,278. Green, J.P., Chandnani, A.D. and Christensen, S.D., Microsoft Technology Licensing LLC, 2018.Detecting script-based malware using emulation and heuristics. U.S. Patent 9,858,414. Jain, A.K. and Shanbhag, D., 2012. Addressing security and privacy risks in mobile applications.IT Professional,14(5), pp.28-33. Kyriazis, D., Menychtas, A., Kousiouris, G., Boniface, M., Cucinotta, T., Oberle, K., Voith, T., Oliveros, E. and Berger, S., 2018. A real-time service oriented infrastructure.GSTF Journal on Computing (JoC),1(2). Laudon, K.C. and Laudon, J.P., 2016.Management information system. Pearson Education India. Noe, R.A., Hollenbeck, J.R., Gerhart, B. and Wright, P.M., 2003.Gaining a competitive advantage. Irwin: McGraw-Hill. Oshri, I., Kotlarsky, J. and Willcocks, L., 2008. Managing dispersed expertise in IT offshore outsourcing: lessons from Tata Consultancy Services. InOutsourcing Global Services (pp. 288-310). Palgrave Macmillan, London. Oshri, I., Van Fenema, P. and Kotlarsky, J., 2008. Knowledge transfer in globally distributed teams: the role of transactive memory.Information Systems Journal,18(6), pp.593-616. Ross, R.S., McEvilley, M. and Oren, J.C., 2018.Systems Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems [including updates as of 1-03-2018](No. Special Publication (NIST SP)-800-860). Shaashua, T.M. and Shaashua, O., Neura Inc, 2018.Physical environment profiling through internet of things integration platform. U.S. Patent 9,871,865. Siegal, J., Rowell, S. and Hintz, T., Open Invention Network LLC, 2018.Method and system for providing online authentication utilizing biometric data. U.S. Patent 9,911,146. Tate, J., Beck, P., Ibarra, H.H., Kumaravel, S. and Miklas, L., 2018.Introduction to storage area networks. IBM Redbooks. Li, P., Chen, Z., Yang, L.T., Zhang, Q. and Deen, M.J., 2018. Deep convolutional computation model for feature learning on big data in Internet of Things.IEEE Transactions on Industrial Informatics,14(2), pp.790-798.
Subscribe to:
Posts (Atom)