Verified Document

Networking Solution A Reliable And White Paper

However, an accurate (or at least as accurate as is reasonably possible) assessment of all of the costs that are embedded in outsourced networks leads me to make a very strong recommendation towards an in-house it department (Banks & Card, 2008, p.49). This shift would substantially increase the reliability of the network along with being far more flexible and (related to the former) far more scalable. Thus the system could grow to meet the company's needs in sync with those needs, neither falling behind nor wasting money by buying new hardware and software in advance of need. An important advantage of waiting of this last is that software and hardware purchased just at the time of need will be the most recently updated and therefore will provide benefits for longer. Adding technical capacity to a network at the moment when it is needed increases both the reliability and the accuracy of a network, thus providing a remedy for two of the most serious problems that the company had been experiencing with the current network provider (Resilience, n.d.).

One of the obvious drawbacks of using an outsourced network provider is that the provider will use hardware and software (as well as making staffing decisions) that are geared toward satisfying the provider's largest customers. This has been, as noted, one of the primary problems that Metric Machine...

An in-house staff would not do this; moreover, employees of the company would be directly responsible to the corporate management, which would make them much more receptive to requests and dicta for work.
Another very important advantage of moving to in-house it is that it will substantially increase the security of the network. There is, of course, no completely secure network (if for no other reason than the ever-so-common practice of writing passwords on post-its and then sticking these to the screen). However, in general the fewer number of people who know a password, the more secure the system is. Given that the networking needs of the company, while growing, remain relatively simple, the size of the it staff can be quite small, thereby substantially reducing potential security problems.

References

Banks, M. & Card, O.S. (2008). On the Way to the Web: The Secret History of the Internet and Its Founders. New York: Apress.

Christian, G.C. (2011). It Support: Outsourcing vs. In House it Department. Retrieved from http://www.gguild.com/blog/it-support-outsourcing-vs.-in-house-it-department/

Resilience. (n.d.) Retrieved from https://wiki.ittc.ku.edu/resilinets_wiki/index.php/Definitions

Sources used in this document:
References

Banks, M. & Card, O.S. (2008). On the Way to the Web: The Secret History of the Internet and Its Founders. New York: Apress.

Christian, G.C. (2011). It Support: Outsourcing vs. In House it Department. Retrieved from http://www.gguild.com/blog/it-support-outsourcing-vs.-in-house-it-department/

Resilience. (n.d.) Retrieved from https://wiki.ittc.ku.edu/resilinets_wiki/index.php/Definitions
Cite this Document:
Copy Bibliography Citation

Related Documents

Management of Enterprise-Wide Networking the
Words: 3545 Length: 10 Document Type: Term Paper

These are contained in the Enterprise Operations Center framework. The center has reach to the group of specialized telecommunication commercial and federally concentrated focused professionals within the CSC. These groups of individuals have thousands of certifications for operating Cisco, Microsoft, Sun, Nortel, Ayaya and many other types of equipment that assists any networking or telecommunication requirements of clients who are working with the Center. (Enterprise Network Managed Services Center

Arby Fields: Computing, Networking, and Information Technology
Words: 4378 Length: 12 Document Type: Essay

Arby Fields: Computing, Networking, And Information Technology Hardware and Software Recommendations Fields Comprehensive Youth Services Inc. (FCYS) is a small nonprofit company based in southern California that serves adolescent male who are dependent and delinquent minors. FCYS has thirty employees. This study addresses the computing needs of the organization including hardware and software requirements as well as requirements for information technology security in the organization. The purpose of this study is to

Wireless Networking Technology and Security:
Words: 7497 Length: 22 Document Type: Research Proposal

Bluetooth devices use encryption security and this makes the requirement of a "unique key session key to derive per-packet keys thus avoiding frequent key reuse." (Kennedy and Hunt, 2008, p.4) Kennedy and Hunt report that ZigBee is a reasonably priced low energy consumption two-way CDMA/BA-based wireless communications standard which is based on IEEE 802.15.4 which is referred to commonly as a 'Low Rate Wireless Personal Area Networks (LR-WPANs) and which

Wireless Networking
Words: 12201 Length: 44 Document Type: Term Paper

Wireless Networking Phenomenon Today's world is faced with a myriad of challenging and complex issues that require advanced technological solutions. As technology becomes increasingly user-friendly and focused on the consumer, it is evident that users have become more dependent on wireless technological devices as mechanisms that promote convenience, survival, and economic prosperity. Devices such as cellular phones, laptop computers, and personal digital assistants have become absolute essential components for many consumers

Enterprise Saas ERP System for
Words: 2948 Length: 11 Document Type: Business Proposal

This is because it can provide and de-provide its resources dynamically, lead to a reduction of the unused capacity as well as maximize the available resources for improved efficiency. Efficient: The SaaS ERP system makes businesses to benefit from the shared hardware, familiar technologies as well as automated processes. This means that that system is able to effectively increase its peak-load capacity, provide access to organizational resources from almost everywhere

Cambium PTP
Words: 2185 Length: 8 Document Type: Term Paper

Cambium Point-to-Point Network Cambium PTP White paper The benefits of a point-to-point bridge To connect sites that are geographically distance, you can use a wireless point-to-point bridge without spending a fortune on wired networking cables. This point-to-point bridge will enable you to connect two or more remote sites and make them appear like one central site and allows users to share resources including domain services and file sharing. Cambium PTP will help to install

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now