STUDY ON THE USE OF PUBLIC DATA CENTERS FOR IT INFRASTRUCTURE OUTSOURCING IN SRI LANKA
|
|
- Spencer Booker
- 5 years ago
- Views:
Transcription
1 'LIBRARY SlIJVfcRSlTY Of MORATUWA. SRI IAMIU UORATUWA jlhl»o»{!9cko t l STUDY ON THE USE OF PUBLIC DATA CENTERS FOR IT INFRASTRUCTURE OUTSOURCING IN SRI LANKA THE CASE OFSUNTEL LTD By G.A.A.D. KARAUNARATNE Supervised by Eng. Kithsiri Samarasinghe The Dissertation was submitted to the Department of Management of Technology of the University of Moratuwa in partial fulfillment of the requirement for the Degree of Master of Business Administration Department of Management of Technology University of Moratuwa December 2010 foob3f
2 DECLARATION "I hereby certify that this dissertation does not incorporate, without acknowledgement, any material previously submitted for a Degree or Diploma in any University and to the best of my knowledge and belief, it does not contain any material previously published or written by another person or myself except where due reference is made in the text. I also hereby give consent for my dissertation, if accepted, to be made available for photocopying and for interlibrary loans, and for the title and summary to be made available to outside organizations." Date To the best of my knowledge, the above particulars are correct. Signature of the Supervisor Date ii
3 ABSTRACT In many developed countries public Data Centers are considered as a successful way of IT facility outsourcing, especially when managing IT infrastructure is not the core business of that firm. IT facility outsourcing or hosting service can be considered as the main product in Data Center service portfolio. Even though the Data Center is a much discussed topic in many forums and conferences, no study has been carried out for the last five years to investigate the actual situation in the industry in line with the Sri Lankan context. Sri Lankan corporate firms are using IT extensively to achieve the current competitive level in the market. So the amount of electronic data involving the corporate industry is deemed enormous. But these firms' tendency to subscribe for Data Center services is very low. Main objective of this research study is to analyze the factors which affect the demand for Data Center IT facility out sourcing among the corporate firms. To find out Suntel internal factors, an exploratory study was carried out by interviewing officials of Suntel ltd. These officials represent Sales, Finance, Technology, IT (Information Technology), Strategy and HR (Human Resources) departments. To find out external factors, first literature survey was done and then the industry experts were interviewed to identify the common external factors that affect the demand for Data Centers. Then actual situation of the corporate firms was captured using a questionnaire targeting the fifty main customers of Suntel. IT professionals who can influence the decision to subscribe for Data Center services who are working for the corporate sector in Sri Lanka were considered as the target population. Thus both quantitative and qualitative methodology.has been employed for this study. Research findings revealed that there are internal factors causing the current situation. Those are high cost of operation, slowness in company learning curve and unavailability of proper 'financial business case'. Among the external factors, it is concluded that sufficient awareness prevails about the existence and benefits that can be obtained through Data Centers. Further it revealed that the IT professional see information security as a main factor which is evaluated carefully when considering the Data Centers for their firms. Research findings shows that level of convenience can be added by Data Centers is very high. Cost and service quality also is seen as important factors which can affect the demand. There is a concern of changing of job function
4 is also observed. This study concludes with a derived frame work with factors those affect the demand and necessary recommendations for Data Center service providers to address those identified factors to improve the business. iv
5 ACKNOWLEDGEMENT Firstly I like to express my sincere gratitude to my supervisor Eng. Kithsiri Samarasinghe, Department of Electronic and Telecommunication Engineering, University of Moratuwa, for his continuous support and guidance throughout the research. Further, I would like to thank the members of the Department of MOT, University of Moratuwa for supporting me in every possible way. At the stage of the exploratory study my view of the subject area was greatly influenced by the industry experts who extended their fullest support by offering me interviews amid their busy schedules. My research would not be complete if they did not shower me with their experience and knowledge on the subject. My two good friends, Wajira and Harsha deserve a special mentioning here. If not for their assistance & motivation, I could have been one of those hundreds of 'drop outs' of the MBA by just ending up as diploma holders due to toughness of the nature of the research project itself. I take this opportunity to convey my honest gratitude to my family, colleagues and friends for bearing with me the hardships that I encountered during the past two years, for their patience, kindness and encouragement, which kept me going till I see the end of the course. Finally I would like to thank the IT professionals of the corporate firms in Sri Lanka who participated in my survey for sparing their valuable time to provide information to make this research a success.
6 TABLE OF CONTENTS PAGE DECLARATION ABSTRACT ACKNOWLEDGEMENT LIST OF TABLES LIST OF FIGURES ABBREVIATIONS 11 iii v ix xi xii 1 CHAPTER: INTRODUCTION 1.1 Background 1.2 Problem Statement 1.3 Research Objectives 1.4 Importance/Benefits of the Study 1.5 Research Design 1.6 Expected Results 1.7 Thesis Organization CHAPTER : LITERATURE SURVEY 2.1 Introduction 2.2 Outsourcing Defined 2.3 Business Value of IT Outsourcing 2.4 Information Security and IOS 2.5 Business Continuity Management Business Continuity Planning (BCP) 2.6 Data Centers Internet Data Centers Achieving Business continuity using Data Centers Data Center Classification VI
7 0 2.7 Internet Data Centers and IT Infrastructure Outsourcing Sri Lankan Apparel Firms and Data Centers 24 s 3 DATA CENTER INDUSTRY IN SRI LANKA 3.1 Introduction History of Data Center Industry in Sri Lanka The Case of Suntel Ltd History of Suntel Ltd Market Segments in Suntel Data Center Business 28 4 CHAPTER: RESEARCH DESIGN AND METHODOLOGY 4.1 Introduction Conceptual Frame Work for External Factors Definition of Variables Sample Design Target Population Sampling Method Sample Size Operational Measures Scale of Measurements Reliability Analysis 38 # 4.8 Statistical Analysis Research Design for Internal Factors 39 * 4.10 Summary 39 5 CHAPTER: DATA COLLECTION AND ANALYSIS 5.1 Introduction Data Collection Interviews 41 4 vii
8 Interviews for Studying Internal Factors Interviews for Studying External Factors Research Questionnaire 5.3 Data Analysis Reliability Analysis 5.4 Descriptive Analysis Frequency Analysis 5.5 Measures of Central Tendency and Dispersion 5.6 Summary 6 CHAPTER: DATA INTERPRETATION AND CONCLUSION 6.1 Introduction 6.2 Data Interpretation Interpretation of Descriptive Analysis 6.3 Recommendations 6.4 Future Studies 6.5 Limitations of the Study 6.6 Conclusion 6.7 Summary REFFERENCES APPENDIX A APPENDIX B APPENDIX C
9 LIST OF TABLES Table 2.1 ISO and Table 2.2 Tiers of Data Centers Table 2.3 Types of Data Centers Table 3.1 Differentiation of Customer Types Table 4.1 Number of Subjects per Category Table 4.2 Number of Subjects for the Sample Table 4.3 Operationalization of Variables Table 4.4 Scale of Measurements Table 4.5 Likert Scale Table 4.6 Cronbach's Alpha values Table 4.7 Statistical Analysis Techniques Table 5.1 Survey Statistics Table 5.2 Cronbach's Alpha Table 5.3 Frequency of Respondents Table 5.4 Measures of Central Tendency Table 5.5 Means per sector per factor Table 6.1 Means for Awareness Questions Table 6.2 Means of Security Concerns Table 6.3 Means for Convenience Questions Table 6.4 Means of Service Quality Expectations Table 6.5 Means to Response for Cost
10 Table 6.6 Means of Cultural Questions
11 LIST OF FIGURES Figure 2.1 Key Drivers of IT Outsourcing Figure 2.2 PDCA Cycle Figure 2.2 Frame Work for Operational Elements Figure 2.3 Model Define by Gunasekara Figure 4.1 Conceptual Frame Work for the Research Figure 5.1 Frequency Analysis Figure 5.2 Means of Factors as Graph Figure 5.3 Means of factors as Web Figure 5.4 Each Sector against Deferent Factors Figure 6.1 Derived Model from the Research
12 ABBREVIATIONS BS CA CFO CIO idc IS ISO IS Policy ISP IT SLT TRCSL WWW : British Standards : Chief Accountants : Chief Finance Officer : Chief Information Officer : Internet Data Center : Information Security : International Organization of Standardization : Information Security Policy : Internet Service Provider : Information Technology : Sri Lanka Telecom Limited. : Telecommunication Regulatory Commission of Sri Lanka : World Wide Web xii 4
STUDY ON MATURITY OF BUSINESS CONTINUITY MANAGEMENT AND ICT RELIANCE IN SRI LANKA MASTER OF BUSINESS ADMINISTRATION IN INFORMATION TECHNOLOGY
STUDY ON MATURITY OF BUSINESS CONTINUITY MANAGEMENT AND ICT RELIANCE IN SRI LANKA MASTER OF BUSINESS ADMINISTRATION IN INFORMATION TECHNOLOGY LIBRARY UNIVERSITY OF MORATUWA, SRI LANKA MORATUWA K.C. Usgoda
More informationGEO BASED ROUTING FOR BORDER GATEWAY PROTOCOL IN ISP MULTI-HOMING ENVIRONMENT
GEO BASED ROUTING FOR BORDER GATEWAY PROTOCOL IN ISP MULTI-HOMING ENVIRONMENT Duleep Thilakarathne (118473A) Degree of Master of Science Department of Electronic and Telecommunication Engineering University
More informationAsymmetric Digital Subscriber Line As Internet Superhighway for Sri Lanka
if ct Asymmetric Digital Subscriber Line As Internet Superhighway for Sri Lanka By Sanath I. Wanniarachchi This dissertation was submitted to the Department of Management of Technology of the University
More informationSTUDY ON THE EFFECT OF ORIENTATION ON PHTOTOVOLTAIC ARRAY OUTPUT IN SELECTED LOCATIONS OF SRI LANKA
STUDY ON THE EFFECT OF ORIENTATION ON PHTOTOVOLTAIC ARRAY OUTPUT IN SELECTED LOCATIONS OF SRI LANKA Amila Sandaruwan (08/8610) Degree of Master of Engineering Department of Mechanical Engineering University
More informationADAPTIVE VIDEO STREAMING FOR BANDWIDTH VARIATION WITH OPTIMUM QUALITY
ADAPTIVE VIDEO STREAMING FOR BANDWIDTH VARIATION WITH OPTIMUM QUALITY Joseph Michael Wijayantha Medagama (08/8015) Thesis Submitted in Partial Fulfillment of the Requirements for the Degree Master of Science
More informationLocation Based Selling Platform for Mobile Buyers
Location Based Selling Platform for Mobile Buyers M. M. Buddhika Mawella 149219M Faculty of Information Technology University of Moratuwa April 2017 Location Based Selling Platform for Mobile Buyers M.
More informationUniversity of Moratuwa
University of Moratuwa Guidelines on Documentation and Submission of Theses and Dissertations 1. INTRODUCTION A dissertation is an essay advancing a new point of view resulting from research as a requirement
More informationSCALABLE IN-MEMORY DATA MANAGEMENT MODEL FOR ENTERPRISE APPLICATIONS
SCALABLE IN-MEMORY DATA MANAGEMENT MODEL FOR ENTERPRISE APPLICATIONS Anupama Piyumali Pathirage (138223D) Degree of Master of Science Department of Computer Science and Engineering University of Moratuwa
More informationAdvanced Migration of Schema and Data across Multiple Databases
Advanced Migration of Schema and Data across Multiple Databases D.M.W.E. Dissanayake 139163B Faculty of Information Technology University of Moratuwa May 2017 Advanced Migration of Schema and Data across
More informationSTANDARD REST API FOR
STANDARD REST API FOR EMAIL Kalana Guniyangoda (118209x) Dissertation submitted in partial fulfillment of the requirements for the degree Master of Science Department of Computer Science & Engineering
More informationAUTOMATED STUDENT S ATTENDANCE ENTERING SYSTEM BY ELIMINATING FORGE SIGNATURES
AUTOMATED STUDENT S ATTENDANCE ENTERING SYSTEM BY ELIMINATING FORGE SIGNATURES K. P. M. L. P. Weerasinghe 149235H Faculty of Information Technology University of Moratuwa June 2017 AUTOMATED STUDENT S
More informationOpenFOAM on GPUs. Thilina Rathnayake R. Department of Computer Science & Engineering. University of Moratuwa Sri Lanka
OpenFOAM on GPUs Thilina Rathnayake 158034R Thesis/Dissertation submitted in partial fulfillment of the requirements for the degree Master of Science in Computer Science and Engineering Department of Computer
More informationA ROLE MANAGEMENT MODEL FOR USER AUTHORIZATION QUERIES IN ROLE BASED ACCESS CONTROL SYSTEMS A THESIS CH.SASI DHAR RAO
A ROLE MANAGEMENT MODEL FOR USER AUTHORIZATION QUERIES IN ROLE BASED ACCESS CONTROL SYSTEMS A THESIS Submitted by CH.SASI DHAR RAO in partial fulfillment for the award of the degree of MASTER OF PHILOSOPHY
More informationACCELERATED COMPLEX EVENT PROCESSING WITH GRAPHICS PROCESSING UNITS
ACCELERATED COMPLEX EVENT PROCESSING WITH GRAPHICS PROCESSING UNITS Prabodha Srimal Rodrigo Registration No. : 138230V Degree of Master of Science Department of Computer Science & Engineering University
More informationDETERMINING EFFECT OF WEBSITE USABILITY AND SATISFACTION ON LOYALTY AND POSITIVE WORD-OF-MOUTH: MALAYSIA INTERNET BANKING
DETERMINING EFFECT OF WEBSITE USABILITY AND SATISFACTION ON LOYALTY AND POSITIVE WORD-OF-MOUTH: MALAYSIA INTERNET BANKING TAN HUI LEE Bachelor of Information System Oxford Brookes University, United Kingdom
More informationMigrate and Transfer Schema and Data across Multiple Databases
/ 2 3 LIBRARY UNIVERSITY OF,Y DRATITvYA, SR! UNKA MORATUWA Migrate and Transfer Schema and Data across Multiple Databases I. Milinda Wijewardana 139179 E Dissertation submitted to the Faculty of Information
More informationTOMRAS: A Task Oriented Mobile Remote Access System for Desktop Applications
DOCTORAL DISSERTATION TOMRAS: A Task Oriented Mobile Remote Access System for Desktop Applications Khaled Khankan kkhankan@it. uts. edu. au Supervised by: Prof. Robert Steele robert.steele@usyd.edu.au
More informationThe Discovery and Retrieval of Temporal Rules in Interval Sequence Data
The Discovery and Retrieval of Temporal Rules in Interval Sequence Data by Edi Winarko, B.Sc., M.Sc. School of Informatics and Engineering, Faculty of Science and Engineering March 19, 2007 A thesis presented
More informationStudent retention in distance education using on-line communication.
Doctor of Philosophy (Education) Student retention in distance education using on-line communication. Kylie Twyford AAPI BBus BEd (Hons) 2007 Certificate of Originality I certify that the work in this
More informationIJESRT. (I2OR), Publication Impact Factor: (ISRA), Impact Factor: 2.114
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY EVALUATING ISO STANDARDS APPLICATION OF SECURITY REQUIREMENTS OF E- BANKING IN SUDAN Inshirah M. O. Elmaghrabi*, Hoida A. Abdelgadir,
More informationAn Ontological Framework for Contextualising Information in Hypermedia Systems.
An Ontological Framework for Contextualising Information in Hypermedia Systems. by Andrew James Bucknell Thesis submitted for the degree of Doctor of Philosophy University of Technology, Sydney 2008 CERTIFICATE
More informationPredictive Insight, Automation and Expertise Drive Added Value for Managed Services
Sponsored by: Cisco Services Author: Leslie Rosenberg December 2017 Predictive Insight, Automation and Expertise Drive Added Value for Managed Services IDC OPINION Competitive business leaders are challenging
More informationBuilding and Reusing Of Requirements Repository
Arab Academy for Science and Technology and Maritime Transport Faculty of Engineering Dept. of Computer Engineering Building and Reusing Of Requirements Repository A thesis submitted as partial fulfillment
More informationJIIT NOIDA. FORMAT FOR SUBMISSION OF Ph.D. THESIS
JIIT NOIDA 31 August 2009 FORMAT FOR SUBMISSION OF Ph.D. THESIS 1. The thesis must comply with the following format : (a) Size of paper : A4 (b) Margins : Top : 3 cm, Left : 2.5 cm, Right : 2.5 cm and
More informationA Project Report on MULTIPLE ROUTING CONFIGURATIONS FOR FAST IP NETWORK RECOVERY
A Project Report on MULTIPLE ROUTING CONFIGURATIONS FOR FAST IP NETWORK RECOVERY Submitted partial fulfillment of the requirements for the award Of the degree of MASTER OF COMPUTER APPLICATIONS IN COMPUTER
More informationC106: DEMO OF THE INFORMATION SECURITY MANAGEMENT SYSTEM - ISO: 27001:2005 AWARENESS TRAINING PRESENTATION KIT
C106: DEMO OF THE INFORMATION SECURITY MANAGEMENT SYSTEM - ISO: 27001:2005 AWARENESS TRAINING PRESENTATION KIT Buy: http://www.globalmanagergroup.com/iso27001training.htm Chapter-1.0 CONTENTS OF ISO 27001-2005
More informationDriving Global Resilience
Driving Global Resilience Steve Mellish FBCI Chairman, The Business Continuity Institute Monday December 2nd, 2013 Business & IT Resilience Summit New Delhi, India Chairman of the Business Continuity Institute
More informationONLINE CONSUMER CHARACTERISTICS AND BEHAVIOR: INDONESIA TOURIST IN USING INTERNET FOR SEARCHING ONLINE ROOM RESERVATIONS
THESIS ONLINE CONSUMER CHARACTERISTICS AND BEHAVIOR: INDONESIA TOURIST IN USING INTERNET FOR SEARCHING ONLINE ROOM RESERVATIONS Compiled METHAWAT PHUTORNPUKDEE No. Mhs.: 10500419/PS/MM MASTER STUDY PROGRAM
More informationEnhanced Web Log Based Recommendation by Personalized Retrieval
Enhanced Web Log Based Recommendation by Personalized Retrieval Xueping Peng FACULTY OF ENGINEERING AND INFORMATION TECHNOLOGY UNIVERSITY OF TECHNOLOGY, SYDNEY A thesis submitted for the degree of Doctor
More informationHiking Gears Comparing System (HGCS) Using Web Scraping Technique
Universiti Teknologi MARA Hiking Gears Comparing System (HGCS) Using Web Scraping Technique Azrul Nazrin Bin Hamdan Thesis submitted in fulfilment of the requirements for Bachelor of Information Technology
More informationUSING A CONTINGENT HEURISTIC APPROACH
USING A CONTINGENT HEURISTIC APPROACH AND EYE GAZE TRACKING FOR THE USABILITY EVALUATION OF WEB SITES Pilun Piyasirivej MSc, Claremont Graduate University BEng (1 st Class Hons), Chulalongkorn University
More informationPROJECT MANAGEMENT PROFESSIONAL (PMP)
PROJECT MANAGEMENT PROFESSIONAL (PMP) EXAM PREPARATION TRAINING WHAT IS PMP? Government, commercial and other organizations employ PMP certified project managers in an attempt to improve the success rate
More informationBINUS INTERNATIONAL UNIVERSITAS BINA NUSANTARA. BiNus MOBILE SERVICE SYSTEM WITH HIGH PERFORMANCE and STRUCTURED DATABASE DESIGN
BINUS INTERNATIONAL UNIVERSITAS BINA NUSANTARA Major Information System Sarjana Komputer Thesis EVEN Semester year 2007 BiNus MOBILE SERVICE SYSTEM WITH HIGH PERFORMANCE and STRUCTURED DATABASE DESIGN
More information(Cover Page) TITLE OF THE THESIS TITLE OF THE THESIS TITLE OF THE THESIS (Not more than 3 lines. CAPS Times New Roman Font size 20)
(Cover Page) (Not more than 3 lines. CAPS Times New Roman Font size 20) A Thesis submitted by Dr./ Mr. / Ms [Full Name with Initials (if any)] (US No..) to NITTE (DEEMED TO BE UNIVERSITY) (Estd under Section
More informationUNIVERSITI TEKNOLOGI MARA A PROCEDURAL FRAMEWORK FOR EXTENSION OF TIME (EOT) CLAIM SETTLEMENT IN THE MALAYSIAN CONSTRUCTION INDUSTRY
UNIVERSITI TEKNOLOGI MARA A PROCEDURAL FRAMEWORK FOR EXTENSION OF TIME (EOT) CLAIM SETTLEMENT IN THE MALAYSIAN CONSTRUCTION INDUSTRY NORAZIAN MOHAMAD YUSUWAN Thesis submitted in fulfilment of the requirement
More informationA reputation system for BitTorrent peer-to-peer filesharing
University of Wollongong Research Online University of Wollongong Thesis Collection 1954-2016 University of Wollongong Thesis Collections 2006 A reputation system for BitTorrent peer-to-peer filesharing
More informationParticle Swarm Optimization Methods for Pattern. Recognition and Image Processing
Particle Swarm Optimization Methods for Pattern Recognition and Image Processing by Mahamed G. H. Omran Submitted in partial fulfillment of the requirements for the degree Philosophiae Doctor in the Faculty
More informationRef: NU/REG/E1/ / Date: CIRCULAR
Nitte University (Deemed University under Section 3 of UGC Act, 1956) University Enclave, 6 th Floor, Medical Sciences Complex, Deralakatte, Mangalore 575 018 Prof. Dr. M.S. Moodithaya,, Ph.D Registrar
More informationPrivacy Notice. General Information Protection Regulation ( GDPR )
Privacy Notice General Information Protection Regulation ( GDPR ) Please read the following information carefully. This privacy notice contains information about the information collected, stored and otherwise
More informationSenior Manager Information Technology (India) Duration of job
Role Profile Job Title Senior Manager Information Technology (India) Directorate or Region South Asia Department/Country Business Support Services, India Location of post Gurgaon Pay Band 6 / Grade G Assistant
More informationTABLE OF CONTENTS CHAPTER TITLE PAGE NO NO.
vi TABLE OF CONTENTS CHAPTER TITLE PAGE NO NO. ABSTRACT iii LIST OF TABLES xiii LIST OF FIGURES xiv LIST OF SYMBOLS AND ABBREVIATIONS xix 1 INTRODUCTION 1 1.1 CLOUD COMPUTING 1 1.1.1 Introduction to Cloud
More informationApplication for Certification
Application for Certification Requirements to Become a Certified Information Security Manager To become a Certified Information Security Manager (CISM), an applicant must: 1. Score a passing grade on the
More informationWorkshop Item 1 - ISO 9001: 2008 migration
Workshop Item 1 - ISO 9001: 2008 migration Joint IAF-ISO Communiqué on migration to ISO 9001: 2008 ISO 9001: 2008 does not contain any new requirements Accredited Certification to ISO 9001:2008 shall not
More informationKENYA SCHOOL OF GOVERNMENT EMPLOYMENT OPORTUNITY (EXTERNAL ADVERTISEMENT)
KENYA SCHOOL OF GOVERNMENT EMPLOYMENT OPORTUNITY (EXTERNAL ADVERTISEMENT) 1. DIRECTOR, LEARNING & DEVELOPMENT - LOWER KABETE Reporting to the Director General, Campus Directors will be responsible for
More informationReference Framework for the FERMA Certification Programme
Brussels, 23/07/2015 Dear Sir/Madam, Subject: Invitation to Tender Reference Framework for the FERMA Certification Programme Background The Federation of European Risk Management Associations (FERMA) brings
More informationDEVELOPING ACHUSI SYSTEM AS A BUSINESS SYSTEM SOLUTION FOR C.V. X: HUMAN RESOURCE, COST, BONUS, AND UTILITY SUBSYSTEM
DEVELOPING ACHUSI SYSTEM AS A BUSINESS SYSTEM SOLUTION FOR C.V. X: HUMAN RESOURCE, COST, BONUS, AND UTILITY SUBSYSTEM THESIS Prepared by: Willy Suryadi 0700722642 Approved by: Supervisor Erwien Nurwihatman,
More informationUniversiti Teknologi MARA. An Analysis on The Uses of Data Modeling in Database Application Development
CAJ (yo&ao 3 ĕr^?^ Universiti Teknologi MARA An Analysis on The Uses of Data Modeling in Database Application Development Hafiza Binti Ahmad Thesis submitted in fulfillment of the requirements for Bachelor
More informationPredstavenie štandardu ISO/IEC 27005
PERFORMANCE & TECHNOLOGY - IT ADVISORY Predstavenie štandardu ISO/IEC 27005 ISMS Risk Management 16.02.2011 ADVISORY KPMG details KPMG is a global network of professional services firms providing audit,
More informationData centre trends 2016
CONNECT IDG and DigiPlex survey Data centre trends 2016 1 Contents Introduction Key findings Current data centre solution and challenges Advantages and challenges with an outsourced data centre solution
More informationSurface Shape Regions as Manifestations of a Socio-economic Phenomenon
Surface Shape Regions as Manifestations of a Socio-economic Phenomenon a solution to the choropleth mapping problem by John (Jack) Sirles Massey a thesis submitted for the degree of Master of Science in
More informationJournal of Advance Management Research, ISSN: Peeyush Shrivastava, Research Scholar, Faculty of Management
Subscriber Churning of Madhya Pradesh and Chhattisgarh Telecom Service Providers: An Age Based Study Peeyush Shrivastava, Research Scholar, Faculty of Management Pacific Academy of Higher Education and
More informationThis document is a preview generated by EVS
INTERNATIONAL STANDARD ISO/IEC 29151 First edition 2017-08 Information technology Security techniques Code of practice for personally identifiable information protection Technologies de l'information Techniques
More informationNishantha Palihawadana. Telecommunications Regulatory Commission of Sri Lanka
Nishantha Palihawadana Telecommunications Regulatory Commission of Sri Lanka Content Country Profile Technological Development of Broadband Stagers of Competition Regulatory Intervention Price Regulation
More informationWhat is ISO/IEC 20000?
An Introduction to the International Service Management Standard By President INTERPROM July 2015 Copyright 2015 by InterProm USA. All Rights Reserved www.interpromusa.com Contents INTRODUCTION... 3 SERVICE
More information7 The Protection of Certification Marks under the Trademark Act (*)
7 The Protection of Certification Marks under the Trademark Act (*) In this research, I examined the certification and verification business practices of certification bodies, the use of certification
More informationInformation technology Security techniques Code of practice for personally identifiable information protection
INTERNATIONAL STANDARD ISO/IEC 29151 First edition 2017-08 Information technology Security techniques Code of practice for personally identifiable information protection Technologies de l'information Techniques
More informationSALARY $ $72.54 Hourly $3, $5, Biweekly $8, $12, Monthly $103, $150, Annually
SALARY $49.72 - $72.54 Hourly $3,977.88 - $5,803.27 Biweekly $8,618.75 - $12,573.75 Monthly $103,425.00 - $150,885.00 Annually ISSUE DATE: 03/21/18 THE POSITION DIRECTOR OF CYBER SECURITY OPEN TO THE PUBLIC
More informationReal Time Multi-Sensor Data Acquisition and Processing for a Road Mapping System
Real Time Multi-Sensor Data Acquisition and Processing for a Road Mapping System by Xiang Luo A thesis submitted for the degree of Master of Engineering (Research) Faculty of Engineering and Information
More informationUsability Evaluation of Web Office Applications in Collaborative Student Writing
Master Thesis Computer Science Thesis no: MSC-2009:21 May 2009 Usability Evaluation of Web Office Applications in Collaborative Student Writing Muhammad Afsar Khan, Sher Hassan Department of School of
More informationThe adaptive serializable snapshot isolation protocol for managing database transactions
University of Wollongong Research Online University of Wollongong Thesis Collection 1954-2016 University of Wollongong Thesis Collections 2007 The adaptive serializable snapshot isolation protocol for
More informationITIL implementation: The role of ITIL software and project quality
ITIL implementation: The role of ITIL software and project quality Tom Roar Eikebrokk Department of Information Systems University of Agder Kristiansand, Norway tom.eikebrokk@uia.no Abstract: This research
More informationROLE DESCRIPTION IT SPECIALIST
ROLE DESCRIPTION IT SPECIALIST JOB IDENTIFICATION Job Title: Job Grade: Department: Location Reporting Line (This structure reports to?) Full-time/Part-time/Contract: IT Specialist D1 Finance INSETA Head
More informationEuropean Risk Management Certification. Candidate Information Guide
European Risk Management Certification Candidate Information Guide Presentation of FERMA Certification 3 Benefits 4 Eligibility criteria 5 Application and fees Examination details Syllabus: FERMA rimap
More informationCopyright is owned by the Author of the thesis. Permission is given for a copy to be downloaded by an individual for the purpose of research and
Copyright is owned by the Author of the thesis. Permission is given for a copy to be downloaded by an individual for the purpose of research and private study only. The thesis may not be reproduced elsewhere
More informationSPECIFIC PROCUREMENT NOTICE IT SERVICES
SPECIFIC PROCUREMENT NOTICE IT SERVICES Funding source: Sector: Asian Infrastructure Investment Bank (AIIB) Information Technology Project Name: On-site IT Security Service Project No. AIIB CP - 00043
More informationSafety Perception Survey s: Interviewing & Sampling Method Considerations
Safety Perception Survey s: Interviewing & Sampling Interviewing Methods Each method has advantages and disadvantages. Personal Interviews An interview is called personal when the interviewer asks the
More informationEnterprise Business. Solution Partner Program Guideline
[ 键入文字 ] Huawei Enterprise Solution Partner Program Guidelines Enterprise Business Solution Partner Program Guideline Huawei Technologies Co., Ltd. Huawei Technologies Co., Ltd. i Contents 1 Program Overview...
More informationICT30310 Certificate III in Telecommunications Cabling Qualification Notes
ICT30310 Qualification Notes Certificate III in Telecommunications Cabling Descriptor This qualification reflects the role of an operator in the telecommunications industry who can apply a broad range
More informationProcedures for nomination and involvement of EQUASS auditors
Procedures for nomination and involvement of EQUASS auditors Table of Contents I. Background and rationale... 2 II. Main principles... 3 III. Auditor profile... 4 IV. Training process to become EQUASS
More informationTamil Localisation Process A case study
Tamil Localisation Process A case study Kengatharaiyer Sarveswaran sarvesk@uom.lk Gihan Dias gihan@uom.lk Department of Computer Science and Engineering, Faculty of Engineering, University of Moratuwa,
More informationPROGRAMME SUMMARY You are required to take eight core modules in terms one and two as outlined in the module list.
PROGRAMME SPECIFICATION MSc Real Estate Investment KEY FACTS Programme name Real Estate Investment Award MSc School Cass Business School Department or equivalent Specialist Masters Programme Programme
More informationICT30110 Certificate III in Broadband and Wireless Networks Technology
ICT30110 Qualification Notes Certificate III in Broadband and Wireless Networks Technology Descriptor This qualification reflects the role of a tradesperson with a range of telecommunications skills who
More informationCHAPTER - 7 MARKETING IMPLICATIONS, LIMITATIONS AND SCOPE FOR FUTURE RESEARCH
CHAPTER - 7 MARKETING IMPLICATIONS, LIMITATIONS AND My powers are ordinary. Only my application brings me success. - Isaac Newton In the previous chapter, there was the discussion regarding major findings
More informationICT30610 Certificate III in Broadband and Wireless Networks Qualification Notes
ICT30610 Qualification Notes Certificate III in Broadband and Wireless Networks Descriptor This qualification reflects the role of a tradesperson with a range of telecommunications skills who can: install
More informationUsability Test Plan for Blogger Mobile Application
Usability Test Plan for Blogger Mobile Application Prepared For: Kevin McGowan, Project Sponsor Luke Bjerring, Software Engineer Completed By: Alanna Lewis B l o g g e r. c o m 7 / 2 0 / 2 0 1 5 Table
More informationEvaluation and Design Issues of Nordic DC Metadata Creation Tool
Evaluation and Design Issues of Nordic DC Metadata Creation Tool Preben Hansen SICS Swedish Institute of computer Science Box 1264, SE-164 29 Kista, Sweden preben@sics.se Abstract This paper presents results
More informationPrivacy Preserving Data Sharing in Data Mining Environment
Privacy Preserving Data Sharing in Data Mining Environment PH.D DISSERTATION BY SUN, XIAOXUN A DISSERTATION SUBMITTED TO THE UNIVERSITY OF SOUTHERN QUEENSLAND IN FULLFILLMENT OF THE REQUIREMENTS FOR THE
More informationBCS Advanced International Diploma in Business Analysis
RETURN FORM TO: BCS The Chartered Institute for IT Professional Certifications First Floor, Block D North Star House North Star Avenue Swindon SN2 1FA United Kingdom T +44 (0) 1793 417 655 E certifications@hq.bcs.org.uk
More informationALGORITHMIC ASPECTS OF DOMINATION AND ITS VARIATIONS ARTI PANDEY
ALGORITHMIC ASPECTS OF DOMINATION AND ITS VARIATIONS ARTI PANDEY DEPARTMENT OF MATHEMATICS INDIAN INSTITUTE OF TECHNOLOGY DELHI JUNE 2016 c Indian Institute of Technology Delhi (IITD), New Delhi, 2016.
More informationPrivacy Notice - General Data Protection Regulation ( GDPR )
THIS PRIVACY NOTICE APPLIES TO ANY PERSON WHO INSTRUCTS AN INDIVIDUAL BARRISTER AT 12 OLD SQUARE CHAMBERS EITHER DIRECTLY OR THROUGH A SOLICITOR OR WHO ASKS THE INDIVIDUAL BARRISTER FOR A REFERENCE Privacy
More informationABSTRACT. Keywords: User Satisfaction, User Participation, User Understanding
ABSTRACT User satisfaction plays an important role in the development and implementation system in every organization. Organization should be able to indicate the factors could influence it. Satya Wacana
More informationAPPENDIX A. Sample of a report front cover TITLE OF PROJECT IN CAPITAL LETTERS. (Centered within prescribed margin) STUDENT S FULL NAME
APPENDIX A Sample of a report front cover TITLE OF PROJECT IN CAPITAL LETTERS (Centered within prescribed margin) X STUDENT S FULL NAME X UNIVERSITI KUALA LUMPUR MONTH and YEAR APPENDIX B Sample of report
More informationInternational Journal of Current Research and Modern Education (IJCRME) Impact Factor: 6.725, ISSN (Online): (
CUSTOMER SATISFACTION TOWARDS BANKING SERVICES A STUDY OF REWARI DISTRICT Sunita Yadav* & Dr. Ravindra** Assistant Professor, Department of Commerce, Indira Gandhi University, Meerpur, Rewari, Haryana
More informationGovernment Resolution No of February 15, Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security
Government Resolution No. 2443 of February 15, 2015 33 rd Government of Israel Benjamin Netanyahu Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security It is hereby resolved:
More informationINTELLIGENT NON-DESTRUCTIVE CLASSIFICATION OF JOSAPINE PINEAPPLE MATURITY USING ARTIFICIAL NEURAL NETWORK
INTELLIGENT NON-DESTRUCTIVE CLASSIFICATION OF JOSAPINE PINEAPPLE MATURITY USING ARTIFICIAL NEURAL NETWORK NAZRIYAH BINTI HAJI CHE ZAN @ CHE ZAIN MASTER OF ENGINEERING (ELECTRONICS) UNIVERSITI MALAYSIA
More informationFACULTY OF INFORMATION TECHNOLOGY
UNIVERSITY OF MORATUWA FACULTY OF INFORMATION TECHNOLOGY Application Form for Master of Science/ Post Graduate Diploma in Information Technology - 2017 For Office Use Only Application No: MSCIT / 17 /
More informationAuthorized Training Provider Application Process
Authorized Training Provider Application QuEST Forum Training Sub-Team 10 August 2015 This document describes the process and provides guidance to organizations that wish to become Authorized Training
More informationASSEMBLY, No STATE OF NEW JERSEY. 217th LEGISLATURE INTRODUCED FEBRUARY 4, 2016
ASSEMBLY, No. STATE OF NEW JERSEY th LEGISLATURE INTRODUCED FEBRUARY, 0 Sponsored by: Assemblywoman VALERIE VAINIERI HUTTLE District (Bergen) Assemblyman DANIEL R. BENSON District (Mercer and Middlesex)
More informationPMSA CONTINUOUS PROFESSIONAL DEVELOPMENT FRAMEWORK
PMSA CONTINUOUS PROFESSIONAL DEVELOPMENT FRAMEWORK 1 CONTENTS 1 Background Pg. 3 2 CPD Programme Goals Pg. 4 3 Guiding Principles Pg. 4 4 CPD Point Acquisition Requirements Pg. 6 5 The Mechanics of CPD
More informationCourse Information
Course Information 2018-2020 Master of Information Systems: Management and Innovation Institutt for teknologi / Department of Technology Index Index... i 1... 1 1.1 Content... 1 1.2 Name... 1 1.3 Programme
More informationSecurity Survey Executive Summary October 2008
A government technology Executive Survey Summary: HP Security Survey Executive Summary October 2008 Produced by: In Partnership With: Introduction Information is paramount to the survival of government
More informationPlease the completed POL to the following address:
Hello [Customer], Symantec is unable to verify the order details you have provided in our currently available public resources. To continue processing your code signing certificate for [Organization],
More informationThe Institute of Chartered Accountants of Sri Lanka
The Institute of Chartered Accountants of Sri Lanka 30A, Malalasekera Mw, Colombo 07. SPECIAL NOTICE STRATEGIC LEVEL EXAMINATION JUNE 2012 TO ALL STRATEGIC LEVEL CANDIDATES (1 st Attempt) Please draw the
More informationThe Evolution of IT Service Management
The Evolution of IT Service Management IT Service Management And Convergence of ITIL, ASL, ISO, and COBIT BCS Rideau Presentation March 21 st 2007 Phil Mustaphi Discussion Topics Introduction ITIL why,
More informationInformation Security Management System (ISMS) ISO/IEC 27001:2013
Information Security Management System (ISMS) ISO/IEC 27001:2013 Course No. 110B Attendees will learn how to help your organization manage the security of assets such as financial information, intellectual
More informationFINGER VEIN RECOGNITION USING LOCAL MEAN BASED K-NEAREST CENTROID NEIGHBOR AS CLASSIFIER
FINGER VEIN RECOGNITION USING LOCAL MEAN BASED K-NEAREST CENTROID NEIGHBOR AS CLASSIFIER By Saba nazari Thesis submitted in fulfillment of the requirements for the degree of bachelor of Science 2012 ACKNOWLEDGEMENT
More informationDocument Control Information
Document Control Information Document Details Document Name Purpose of Document Document Version Number 4.2 Document Status Document Owner Prepared By To outline the syllabus for the ITIL v3 Foundation
More informationWhat is ISO/IEC 27001?
An Introduction to the International Information Security Management Standard By President INTERPROM July 2017 Copyright 2017 by InterProm USA. All Rights Reserved www.interpromusa.com Contents INTRODUCTION...
More informationArticle II - Standards Section V - Continuing Education Requirements
Article II - Standards Section V - Continuing Education Requirements 2.5.1 CONTINUING PROFESSIONAL EDUCATION Internal auditors are responsible for maintaining their knowledge and skills. They should update
More informationUSER CORPORATE RULES. These User Corporate Rules are available to Users at any time via a link accessible in the applicable Service Privacy Policy.
These User Corporate Rules are available to Users at any time via a link accessible in the applicable Service Privacy Policy. I. OBJECTIVE ebay s goal is to apply uniform, adequate and global data protection
More information