Monday, February 24, 2020

Strategic Situation Analysis for Developing Critical Thinking Skills - Essay - 8

Strategic Situation Analysis for Developing Critical Thinking Skills - Matching Dell - Essay Example The approach towards analyzing a situation is based on productive and critical mindset and involves several steps in its execution. One of the most important steps in SSAS is to investigate the underlying strategy of a situation and find out how that strategy influences the outcomes, productivity, and results of the study at hand. This constitutes the third step in the SSAS approach. The pertinent case study is dealing with the functioning of the Dell computer company, and its comparison with its rival companies. This involves examining the management and strategies of the Dell Corporation and matching it with its rival corporations. Towards the mid-‘90s, the advent of personalized computers had taken over the market, and more and more customers were finding new reasons to obtain their own computers. This meant that computers were no longer limited to big corporations and businesses, but were becoming a household commodity. This gave companies like IBM and Apple, which were previously manufacturing mainframe machines, to produce PCs and tap the huge profits in this sector. Initially, IBM, the leading company in computer hardware, took over the market by manufacturing PCs and loading them with software developed mainly by Microsoft. Their contract with Microsoft proved fruitful and they were soon the leaders in the market. Other companies like Compaq, HP (Hewlett-Packard) and Gateway followed suit. They all focused on developing the hardware and contracting with software companies like Microsoft or Apple to provide them with the operational programs, and their main customers were big and medium-sized corpor ate organizations. Dell was another such company dealing with the manufacturing of PCs.However,  their method of working was radically different  from the other companies,  and it was so successful  that it gave  them a huge edge of advantage that  soon earned them  the leading position in the market.

Saturday, February 8, 2020

Security and Privacy in the Network Context Essay

Security and Privacy in the Network Context - Essay Example This Virtual Private Database feature controls access to individual row in the database. It works by dividing the database for use by diverse type of users and keep it secure from illicit access. The other technique is to recognize potential vulnerabilities and suggest remedial actions to secure a database system. ISS Database Scanner Software, a product available with Oracle, Microsoft SQL Server and Sysbase databases automatically scrutinize the system for insubstantial passwords and viruses. A more intricate database security device is presented by Guardent through its Security Management Appliance. It works behind a firewall and remotely detects vulnerabilities. It covers operating systems, applications and network infrastructures, and remote online databases. Experiences and experts analysis dictates that more a responsive social and organizational actions should be taken. Accounting for the losses in businesses and the effects in economy, protecting databases from hackers is now a serious business. Our society and organization should be vigilant in protecting our vital and key information against criminal elements using the technology to spy, steal and destroy our investments. We must first ensure that our network security is reliable and constantly updated. Let us remember that nowadays, spending a little more in security software even for personal use is fundamental. Invest on reliable and tested database application; buy only those programs with robust security design. For companies, ensure those personnel in the system administration are strictly following security guidelines. Apply more restrictions to database access especially on internet-based databases that are more vulnerable to attacks. Configure your server to allow only those trusted IP addresses and employ Table Access Control security on your databases. Long-Term Network and Data Security, and Privacy Rights There are many ways to secure access of vital information's in a Network, Database and Individual Private files. At present, Operating Systems and Database Systems come with security features that can considerably prevent unauthorized access. Long-term methods are available from various reputable computer security companies such as Servers employing Trusted IP Address methods. This is done by configuring the server access to a list of "trusted" users only. Next is Server Account Disabling that suspends the server ID after three unsuccessful attempts. This is done to prevent attackers from generating random passwords to get the right combination. Monitor the system; get a product that would send alert when someone wants to break-in into the system. Secure the system with authentication methods such Kerberos Security, a "ticket" based authentication systems from Oracle (Weidman, n,d.). Restrict access to selected rows of databases by employing VPD (Virtual Private Database) Technology (Wiedman,