Description
Build or Buy and Service-Level Agreements (SLAs)
Suppose, as a Chief Information Officer (CIO), you were asked to provide the organization with time-entry system for the employees. Examine the options to
Suppose an organization that has entered into an SLA with another organization goes out of business. Determine whether the SLA still applies or becomes invalid. Propose what the organization should do to maintain the service delivery.
"Cloud Computing"
From this week's video (http://www.youtube.com/watch?v=slBtTh5DTIY
Rate the importance of establishing standards that govern the cloud infrastructure, format for data storage, interoperability standards between vendors, and security requirements. Support your rationale.
Must follow these formatting requirements:
- Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format.
Explanation & Answer
Let me know where you need further help.
INFORMATION SYSTEMS
1|Page
Q1.
As a Chief Information Officer, the responsibility of making critical business decisions that will
lead the organization towards achieving the set business goals lies with me. In determining
whether to outsource or insource the time-entry system depends on a variety of factors,
(Schniederjans, M). I believe that outsourcing the system would be more beneficial to the
organization compared to insourcing.
Firstly, outsourcing ensures the organization`s staff concentrates on core processes rather than
supporting roles. When the responsibility of developing the time-entry system assigned to an
external agency, my IT team can then focus on critical processes such as maintaining network
integrity, monitoring the enterprise and preventing any network threats. Outsourcing the system
guarantees expertise and swiftness because the role of developing the system assigned to vendors
who specialize in the field. Besides, outsourcing guarantees risk sharing since it ensures the
company shifts particular vulnerabilities to the outsourced vendor, (Schniederjans, M).
The organization also benef...