Wednesday, September 11, 2019

Reviewing The Adventures of an IT Leader Assignment

Reviewing The Adventures of an IT Leader - Assignment Example In businesses, management of relationships with competitors, rivals, suppliers, and customers can only be achieved when the business is going on the right track and emerging technologies are being scanned and analyzed. Updating systems and being up-to-date with the new technologies must be the first priority of every IT manager. Sometimes, other business managers fail to understand these meetings and problems as they fail to understand the technical terms and their importance. Whether the IT department receives any attention or not, they must spend a reasonable time to scan the emerging technologies and analyze them for their systems. Sometimes systems are automatically updated and sometimes they need to be updated to utilize certain features. These emerging technologies must be scanned and applied before the business goes into deeper challenges. The first question that Rubens asks regarding the blog entry about the June outage is what has to be done about it. The blog entry is made by a blogger who described the day when all systems in IVK went down for a while. This was bad for the business and managers were looking to the IT manager for answers of how this happened. Such blog entries are made on the internet and they were accessible to everyone. Removing it wasn’t an option as it has already been posted and someone must have the copy (Austin, Nolan & O’Donnell, 2009). Blogs are not even undoable. Thus, for this blog, it was better to leave it as it is and be careful for future blogs. The blog entry hadn’t caused harm to anyone in this firm but such blogs may cause negative consequences to other firms. Every business must have policies to protect the inside information of the company from being publicized. Viruses and hacking are two major problems within the IT field that make it difficult for businesses to maintain their policies. Ruben asks his team about the general policies that should be implemented to prevent such inside

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.