Tuesday, April 2, 2019

Analysis of Barclays Hardware Systems

Analysis of Barclays hardware SystemsReason for choosing presidential termA couple of argumentationes were considered for the report. Both had a suitable IT system that was an inbuilt part of their day to day operations and was suitable to investigate. Ultimately, Barclays IS team was chosen beca enforce they were far more accessible.Data collection is a planned ascend to acquire information from a source or sources to form a clear understanding of a grumpy area of interest (Davies, 2007). various(a) methods can be employed to collect info such as questionnaires, interviews, observation, and group discussion (Denscombe, 2013).The primary method of entropy collection was finished a face to face interview. A questionnaire was developed to find break about the architecture and infrastructure of the companys computer systems. The responses were then written go through and through as they were given (Appendix).Hardware and Operating SystemsEveryone in the office has a ThinkPa d t410 or a similar spec laptop. These leave alone either crusade Windows 7 or Windows 10 depending on what the person needs. Its worth noting that post uses hot desks with employees plugging in their laptop at any addressable browsestation.several(prenominal) Windows servers of various specs are apply. These are built to the specification demand of the application/function to be hosted on them.Mainframes using z/OS (MVS Multiple Virtual Storage)VMs with RHEL5/6/7 (Red Hat Enterprise Linux)Hpnsk, by hp (tandem)Legacy servers with AIXSoftwareThe employees laptops all have Microsoft software program management, Microsoft Exchange for email, Atlassian Jira, and Cisco Jabber for VoIP. Both laptops also use NAS (Network-attached storage) for intimately their storage. A lot of the other software depends on the OS that the laptop runs. Windows 7 laptops use Microsoft Office 2010 and have the ability to install betrothed software with local admin access (special permissions have to be given for this). By contrast, the Windows 10 laptops use Office 365, a software package accessed through Microsofts cloud run, and are only allowed to use thin knobs, a client that relies on the cloud for its computational processes.Network facilitiessplit into several domains, depending on security requirements. DMZ (Demilitarized Zone) for connecting to third parties. Mqipt, certification.Security Measures in that location are a wide range of security measures in place at Barclays. In cost of physical security, all access on site requires surcharge cards with access only being given when necessary. In summing up to this, tailgating someone is a dismissible offence for both parties involved.For virtual security, the country has several measures in place. They have an external and an internal firewall (the DMZ is amongst these two firewalls). Any admin rights need Identity and Verification checks to be allowed. redevelopment accounts (non-login accounts with personal a ccess controlled via PowerBroker) allows for the user to perform certain admin tasks without needing root access, fundamentally reducing abuse of privilege.In terms of redundancy, Barclays has a few assorted levels of this depending on how critical it is to the business. For the lowest tier, they use offsite backup servers to ensure that data is not lost in the event of a disaster (i.e. flood, fire, theft). For principal(prenominal) services that need to be kept online, they can use active-active. This hosts the service in two distinct geographical locations with load balancing in the midst of them. If one of the hosts were to close for any reason, the load would pass onto the 2nd host.not all software is capable of this active load balancing, for these instances active-passive is used. This is similar to active-active yet without the load balancing instead, if the active instance closes, the passive instance takes over.Hardware and software implementationBarclays thoroughly rev iews and tests any new hardware or software before it is implemented to try and find out what tack together it will have on the estate. This extends to new versions and patches of software already in use. Every new resource mustiness(prenominal) be suitable for the task, and it must be compliant with the businesses regulations. The disruption is causes should be within business expectations, for good example, a critical patch would be implemented regardless of how disruptive it is by contrast, a less important patch would be scheduled to take in a minimal impact.Some software (particularly open-source) have features of the program special or removed before it is introduced into the business. After this, it is packaged and distributed according to the businesses join schedule.Legal and Ethical requirementsAs a bank, Barclays handles incredibly sensitive data and must adhere to the law regarding it.According to the Data Protection dally (1998), anyone using data must follow da ta bulwark principles.They must make sure the information isused fairly and lawfullyused for limited, specifically stated purposesused in a way that is adequate, applicable and not excessiveaccuratekept for no longer than is abruptly necessaryhandled according to peoples data protection rightskept safe and respectablenot transferred outside the European Economic Area without adequate protectionThere is the legal obligation of duty of care that must be adhered to when dealing with customers data, therefore its of extreme importance that the rules and regulations are followed with absolute compliance. This is because if the business is found to be not following them, it can result in up to 5 years in prison. In addition to this, it will hurt the businesses reputation lowering trust that customers place in them. As for ethical requirements, theres no specific drawn up rules however there were specific areas within the businesses where ethics do come into play for example keeping c ustomers information up-to-date and accurate, respecting their privacy and finally of course ensuring its protected. There are also ethics for the workers for example using the systems in a responsible way, making sure computers and software is kept to a particular standard and finally keeping system procedures etc. documented so workers can know how to use them to full potential.Finally, where software is beared and used on a fair usage policythis is something always kept too. matter of emerging technologiesBarclays IS team has very much embraced cloud technology and merged it into a great deal of their systems. All the employees laptops use NAS and many use the cloud for other applications. This has the effect of reducing costs in terms of processing power and memory. It has also allowed for many employees to work from home, something which they do regularly. forthright source software is software with its source code made available to the public, in most cases people can study and modify the software. The word meaning of open source is something many large businesses are currently vent through. The key effect of open source, from a business perspective, is that it is far cheaper than traditional proprietary software, but it does have other effects. It is much easier and quicker to obtain and implement OSS than proprietary.Some older applications are currently unable to work with open source and cloud technology. These applications will likely have to be rewritten to be used in the future.Lenovo ThinkPad T410 SpecificationScreen 14.1-inch WXGA+ (1440 x 900) guide Backlit (Matte finish)Operating System Windows 7 Professional (64bit)Processor Intel Core i5-540M (2.53GHz, 3MB Cache) stock 4GB DDR3 RAM (2GB + 2GB)Storage 320GB Seagate 7400.4 HDD (7200rpm)Optical Drive DVD+/-RWWireless Intel 6200 802.11AGN, Bluetooth, Gobi 2000 WWAN artistic production NVIDIA NVS 3100M with 256MB DDR3Power 94Wh 9-cell, 90W 20V AC adapterDimensions 13.13 x 9.41 x 1.09-1.26?We ight 5lbs 9.3oz

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.