Benefits of Office Automation
The two approach, which can be used for the concept of office automation, which can be used by the regional garden, can be a central database system and an office portal approach.
- Automation system: The system can be considered as one of the approach, which can be placed over the concept of existing infrastructure of the organization, which already exist in the framework of their operation. It can be implemented for achieving benefit in the sector of messaging which can make the concept of communication very much easy. It can directly reduce the amount of work and emphasis can be given to the sectors, which are more important to work within the organization.
- Portal Approach: Another approach, which can be used for the purpose of home automation, is the concept of office portal. In this approach, every staff would be given a separate user name and password, which can be used for the purpose of logging into the portal and doing the work. This concept can be very much beneficial in a way that it keeps the data of an individual very much secured.
Automation system
Benefit
The main benefit, which can be achieved from the concept, is that it would lessen the task pressure due to automation of the overall system. The employee can easily handle the work pressure and can directly involve into the concept of multitasking.
Issue
The main issue, which can be stated about the automation system, is the cost related factor. The cost of the system is higher as compared to other system due to the factor that it involves a larger area of operation and involves different working sectors.
Portal Approach
Benefit
The main benefit, which can be achieved from the concept, is that it would be directly incorporating individual identity of every employee. This means is achieved by giving the individual users a separate username and password. The authorization concept of access data of an individual can also be achieved from the concept. Information by this means can be kept very much secured.
Issue
The approach can be considered a single point access for every user. Each of the employee being given a specific password and username, if the employee somehow misplace the password and username the access of the user would be denied. In most of the cases, it is seen that the data of the user can being accessed by authorized person due to the concept of knowing the individual password and username.
The recommendation of the system would be the automation system. The system is taken into consideration due to the factor that it does not alter the existing infrastructure and the new system can be placed over the existing system. This would be incorporating very less change in the infrastructure (Rajakumari, S. B & Nalini, 2014).
In the concept of the cloud, the Infrastructure as a cloud can be considered to be one of the lowest level. Within the model, there is provision of pre-configured hardware, which is provided by means of hypervisor or interface. There is no high level of infrastructure, which is provided such as the operating system, the buyer embedded with the aspect of his or her own application, which is virtual, must provide this aspect. On the other hand, the platform as a service can be stated as a step ahead, which are committed to providing development environment for a given application. Some other person rather than the user or the developer maintains the development platform. The concept of the Software as a service provides on demand functional application to provide specific service for example email management, ERP, CRM and other range of wide applications (Hu et al., 2015). The SaaS taking into consideration the IaaS offers complete solution relating to the design, testing, creation and deployment of the applications of the client combined with the team member’s connectivity, version control, software configuration management, integrated database and customer web service. Taking the approach little bit higher, the Apprenda offers all the type of elements in an environment of high security of the data relating to the organization who would be implementing the process (Bera, Misra& Rodrigues, 2015).
Features |
SaaS |
PaaS |
IaaS |
Importance |
It can be considered as a complete set of package, which would be offered. |
Top of IaaS |
It can be considered to be a basic layer of computing |
What do the user get |
Here the user do not have to worry about anything. It is pre-installed pre-configured package, which is delivered according to the need of the user. |
Here the user gets what they actually demand. It can range from hardware, software, OS as well as web environment. |
The user gets the infrastructure and they have to pay accordingly. |
Technical difficulty |
There is no worry about the technicalities. The SaaS provider companies handles all the aspects. |
The basic set up is given but the need of some sort of knowledge in the field would be required. |
Knowledge related to technical aspect is very much required. |
The model, which would be recommended for the SharePoint service, is the software as a service model. The model is recommended due to the following factor:
- Time reduction: The SaaS model is already configured and installed which can be stated to be ready for use model.
- Reduced cost: The SaaS model is implemented in the concept of shared environment or multitenant due to this factor the cost that is related to the hardware and the software are reduced significantly.
- Integration and scalability: The solution relating to the SaaS are directly placed in the cloud environment, which are integrated and very much scalable. When an organization move towards the concept of the SaaS model they do not have to buy any sort of software or any type of server for its operation (Rittinghouse & Ransome, 2016).
- User friendly: The SaaS model is very much user friendly in a way that any person would be able to use the concept. There is no need of training and the concerned people in the organization can easily implement the system and use them. It can be stated as a ready to use model.
Problem 1: Data storage
In this concept, the user does not have any sort of idea were the data is being stored and who is actually accessing the data. In most of the cases, it is seen that the data is outside the server of the user so that when the user would be trying to access the data it would not be available for access.
Problem 2: Virtual Machine
Although the concept of the Virtual machine adaptation is a phenomenon the risk which is associated with the concept are very much increasing rapidly. The hypervisor and the virtual machine can have different types of problem included in its working.
- In order to overcome the problem frequent update should be done which would be keeping the system updated.
- Area segregation should be done which would be directly minimizing the overall impact of the system
- Encryption of the algorithm would be directly beneficial in a way of securing the system and its performance (Almorsy, Grundy & Müller, 2016).
References
Ali, M., Khan, S. U., & Vasilakos, A. V. (2015). Security in cloud computing: Opportunities and challenges. Information sciences, 305, 357-383.
Almorsy, M., Grundy, J., & Müller, I. (2016). An analysis of the cloud computing security problem. arXiv preprint arXiv:1609.01107.
Bera, S., Misra, S., & Rodrigues, J. J. (2015). Cloud computing applications for smart grid: A survey. IEEE Transactions on Parallel and Distributed Systems, 26(5), 1477-1494.
Chang, V., Kuo, Y. H., & Ramachandran, M. (2016). Cloud computing adoption framework: A security framework for business clouds. Future Generation Computer Systems, 57, 24-41.
Hu, Y. C., Patel, M., Sabella, D., Sprecher, N., & Young, V. (2015). Mobile edge computing—A key technology towards 5G. ETSI white paper, 11(11), 1-16.
Mastelic, T., Oleksiak, A., Claussen, H., Brandic, I., Pierson, J. M., & Vasilakos, A. V. (2015). Cloud computing: Survey on energy efficiency. Acm computing surveys (csur), 47(2), 33.
Rajakumari, S. B., & Nalini, C. (2014). An efficient cost model for data storage with horizontal layout in the cloud. Indian Journal of Science and Technology, 7(3S), 45-46.
Rittinghouse, J. W., & Ransome, J. F. (2016). Cloud computing: implementation, management, and security. CRC press.
Sanaei, Z., Abolfazli, S., Gani, A., & Buyya, R. (2014). Heterogeneity in mobile cloud computing: taxonomy and open challenges. IEEE Communications Surveys & Tutorials, 16(1), 369-392.
Whaiduzzaman, M., Sookhak, M., Gani, A., & Buyya, R. (2014). A survey on vehicular cloud computing. Journal of Network and Computer Applications, 40, 325-344.