Information Use CIS/207
Information Use CIS/207
In today’s world, most businesses rely heavily on the use of information technology ad information systems. Corporate communication is usually dependent upon wired as well as wired networks within the company. With these networks being set up in businesses, there has been a major shift in data storage to using computers to store and transfer data instead of the traditional ways of using paperwork and hard copies. Companies can securely share information with other companies through the use of virtual private networks, called VPNs. My current occupation is very technologically driven.
My current occupation is based completely around technology and it’s use and innovation. The company contains a large area of production and workers that produces and delivers several different innovative pieces of machinery. They are involved in the production of items such as ATM machines, video rental kiosks, self-checkout registers, vending machines and other products of a similar nature. We also have a large information technology department that I am a part of to assist with servicing our products as well as providing third party support for other products from other vendors.
In our area of business, networks are extremely important to our everyday work processes. I work in the smaller of two locations, but we are all connected to the same network and have the same job duties. We have multiple computer software programs that we use to accomplish our daily tasks and also have software to connect us to the same telephone queues and networks in order to assist clients. The computer network gives us access to all of the same information and data that is used to assist us with providing support to clients and also access to internal documents that are needed. We communicate with our other team members through instant messages and email networks that are used everyday all day. Without these networks, there are times that we would not be able to even communicate with members of our leadership that are in the other location.
Our phone calls are routed though queues that all of our team members are assigned to in both call centers. Some of the software and information we use are shared with clients and they also have access. In order to keep this information secure, we use a virtual private network, or VPN. We sign into this network to access the tools that are used daily. After signing in with individual passwords, we are able to access a complete set of software programs that we need to complete our job each day.
Each location of ours, also contain local networks that are for business and personal use. There are employee and guest wireless (wifi) networks that are available for leadership and clients that need to access the Internet on their wireless devices and laptops. There is also an additional wifi network that is set-up for other employees to use on personal laptops, ipads, tablets, etc.
As with everything computer related, there are times when the information systems have issues or fail. One of the reasons that we have two call centers is to have our call center serve as a backup for the main location. There are times when the main call center’s network goes down due to server issues while our area is still operable, and there are other times when our center goes down and they are still in operation. Unfortunately, at times there are still issues that shut down both locations simultaneously.
With the use of computers and networks, there is also a large focus on security. Whenever there is sensitive data being stored and transferred through computer networks, there is the risk of unauthorized individuals gaining access to this information. To lower these chances, we have several different pieces of software and also require multiple passwords that are unique to each authorized individual and a requirement to change the passwords often.
Today’s home and business processes rely more and more on the use of technology and information systems each day. Computers and networks have increased productivity greatly by speeding up the way information is transferred. Information can now be transferred across the world almost instantly, which is very useful in business endeavors. Large amounts of data can also be stored in computers to save the amount of physical paper used, which is good for the environment also. Research and communication are also more effective and efficient through information technology. There is always a downside with the threat of hackers and unauthorized use, but with the proper network security and software, this can be reduced.
Turban, E., Volonino, L., & Wood, G. (2013). Information technology for management: Advancing sustainable, profitable business growth (9th ed.). Retrieved from The University of Phoenix eBook Collection database.