PART 1
The Newark, New Jersey Company, Everlast Corp, has been developing for the last five years and just any other chief executive office thus CEO in whatever business, the CEO of this firm is still projecting further developments. The key concern raised by this CEO in his development plan is the technological development. When a firm upgrades its technology then it is more likely to develop, this is normally so as development in Information and communication technology, ICT, enhances communication and thus cuts on costs that would have otherwise been incurred in travelling. Furthermore ICT allows for easer ways of data management which incorporates: retrieval, manipulation and storage with key concern in storage being the safety and integrity of the data (Chou, Timothy.2001).
When formulating a network for this firm, one would thus put all these in mind and give deliberate attention to the security of the data stored in the databases. The network should be complex enough to discourage unauthorized access yet simple enough to be comfortably used by all the members of staff.
Depending on the sensitivity of the data stored, one has to look into the specifications of the work stations in the firm. The computers, scanners and printers in the firm should high speed. More specifically, the network that would not compromise the integrity of the data accessed must be constituted of computers with sped of not less than 2.0 GHz and a RAM of 500Mb. In this way one is assured of speedy data handling. The firm is initially headquartered Newark in a single building, in this case it would be wise to have a simplified Local Area Network with all the data stored at a central point. This is done in such a way that all the computers within the organizations share a hard disk save for the one with the operating system. This centralized storage of data is more secure than the one in which every computer saves its on data on its own hard drive. It reduces instances of viral attack thus assures the user of integrity.
On its development plan is the envisioned operations center in California. This new center is to offer assistance to all the company clients in the West Coast. This expansion will most definitely reflect positively in the firm’s books of account but it comes with a further technological requirement which if not handled appropriately would reflect loses. With such expansion plans, the company is better off acquiring the cloud computing technology. The cloud computing is a more secure business management technology that is more suitable for firms that have expanded in more than one town. If the two branches were to be located in one city then it would have been prudent to develop a wide area network (WAN) that would connect both. But these branches are over four hundred kilometers a part, digging trenches to lay cables so as to connect the two would prove redundant ( Bernstein, D, Ludvigson, E. et al. 2009).
Cloud computing thus comes in handy and it works in such a manner that the firm contracts a service provider that in turn has a server that is placed well without the organization and in the cyber space. It offers real time access and makes monitoring a lot easier as a manger can through his or her smart phone access the company statements of account. It also comes with a complimentary video conferencing application for the firm, this is accustomed to the uniqueness of the organizations and would be accessed wirelessly through mobile phones, tablets laptops among other communicative devices (Chou, Timothy.2001). What makes cloud computing more cost effective is that the management can entice the staff to purchase their own smart phones and convert the same to office use. The service provider offers ledgers that would be manipulated by major mobile phones in the market. It thus rules out the necessity of a work station and makes the work station a lot more mobile than was earlier when desktop computers were the order of the day.
PART2
The network design that is therefore assimilated by Everlast Corp that would enhance their development plan is the cloud computing and this done through contracting a service provider. All the data of the firm are exported from the firm and placed in the virtual space and this would then be made accessible to every member of the organization. It is then an online network (Hooke, B. September 2000),
The design is the most appropriate for the firm especially owing to its expansion prospects. The limitlessness of the cyber space provides for more space that would encourage proper filing system, ease of retrieval, and security among others. The security of the database is enhanced in two ways first the interface is made unique to the firm. This makes it hard to be accessed by any other person out of the firm and the second one is through the use of password (ibid). In addition it permits an all time surveillance system by the management, every alteration reflects to the entire database. The only disadvantage that this technology has is that it favors capitalists; some workers of the firm would be laid off on the basis of redundancy as their job shall have been taken over by the network.
In a nut shell, cloud computing is the future of database management. The industry today puts so much attention on the security and uniqueness of their firm as much as possible and this is what cloud computing promises. Accessibility is real time, communication is enhanced and when further scrutinized, it does a way with the necessity of a physical office. A marketing manager can easily meet clients online, through the video conferencing facility, they would hold meetings and e mail the client the invoice payment would then be done online and this down plays the need of an office, one has the office all the time in the car, plane or at home. It also does a way with the need of the client to physically meet the managers, and this makes it the more interesting!!
References
Bernstein, D, Ludvigson, E. et al. (2009). Blueprint for the Inter cloud – Protocols and
Formats for Cloud Computing Interoperability. New York:
McGrawHill print
Chou, Timothy.2001. Introduction to Cloud Computing: Business & Technology. New York:
McGrawHill .print
Hooke, B. (September 2000), Interplanetary Internet, Oxford: OUP print
Ryan K. L. Ko; Kirchberg, Markus; Lee, Bu Sung (2011). "From System-Centric Logging to
Data-Centric Logging - Accountability, Trust and Security in Cloud Computing".
Proceedings of the 1st Defense, Science and Research Conference 2011 – Symposium
on Cyber Terrorism, IEEE Computer Society, 3-4 August 2011, Singapore. online
Simmonds, A; Sandilands, P; van Ekert, L (2004). "An Ontology for Network Security
Attacks". Lecture Notes in Computer Science. Lecture Notes in Computer Science
3285: ISBN 978-3-540-23659-7. online