Docstoc

Green IT

Document Sample
Green IT Powered By Docstoc
					qwertyuiopasdfghjklzxcvbnmqwertyuiopa
sdfghjklzxcvbnmqwertyuiopasdfghjklzxcv
bnmqwertyuiopasdfghjklzxcvbnmqwertyui
opasdfghjklzxcvbnmqwertyuiopasdfghjklz
                Individual Project
xcvbnmqwertyuiopasdfghjklzxcvbnmqwert
                      Green IT


yuiopasdfghjklzxcvbnmqwertyuiopasdfghj
                 11/22/2010

                     Saba Islam

klzxcvbnmqwertyuiopasdfghjklzxcvbnmq
wertyuiopasdfghjklzxcvbnmqwertyuiopas
dfghjklzxcvbnmqwertyuiopasdfghjklzxcvb
nmqwertyuiopasdfghjklzxcvbnmqwertyuio
pasdfghjklzxcvbnmqwertyuiopasdfghjklzx
cvbnmqwertyuiopasdfghjklzxcvbnmqwerty
Contents
Green IT .......................................................................................................................................................................................................................... 3
Task 1- Overview and sketch identifying and implementing e-business innovation..................................................................................................... 3
   Compare the business with e-businesses .................................................................................................................................................................. 4
   Identify e-business opportunities for innovation and reform ................................................................................................................................... 5
   Implement e-business innovation ............................................................................................................................................................................. 6
   Task 2- Project feasibility report ................................................................................................................................................................................ 8
       1)      Business Problem: .......................................................................................................................................................................................... 8
       2)      Current Situation: ........................................................................................................................................................................................... 8
       3)      Approach Overview: ....................................................................................................................................................................................... 8
       5)      Description of the solution: ............................................................................................................................................................................ 9
       6)      Resources for solution: ................................................................................................................................................................................... 9
       7)      Benefit/Cost of solution: ................................................................................................................................................................................ 9
       8)      Payback/Return on Investment of solution:................................................................................................................................................... 9
       9)      Schedule of solution: .................................................................................................................................................................................... 10
       10)         Reason to abandon this solution:............................................................................................................................................................. 10
       11)         Preliminary Recommendations ................................................................................................................................................................ 10
       12)         Recommended solution:........................................................................................................................................................................... 10
       13)         Recommendation justification: ................................................................................................................................................................ 10
       Task 3-Identify Hardware, software and labour components ............................................................................................................................. 11
       Name .................................................................................................................................................................................................................... 11
       Cost ...................................................................................................................................................................................................................... 11
       Name .................................................................................................................................................................................................................... 11
       Cost ...................................................................................................................................................................................................................... 11
   4. Identify threats and harms................................................................................................................................................................................... 11
5. Quantify threat and harm ........................................................................................................................................................................................ 12
6. Estimate risk ............................................................................................................................................................................................................. 12
7. Identify and assess treatment options .................................................................................................................................................................... 12
Task 7- Prepare a security risk management plan ....................................................................................................................................................... 12
PRSSM414A –               Identify and assess assets ................................................................................................................................................................ 13
   Activity for Task 2 - The risk register ........................................................................................................................................................................ 13
   Strength ................................................................................................................................................................................................................... 17
   Weakness ................................................................................................................................................................................................................. 17
   Opportunities ........................................................................................................................................................................................................... 17
   Threats ..................................................................................................................................................................................................................... 17
   Presentation ............................................................................................................................................................................................................. 17
                                                            Green IT




Task 1- Overview and sketch identifying and implementing e-business innovation
  One of the most fundamental steps we should take when trying to green your IT environment is to perform an energy consumption
  analysis. First of all we have to create a baseline in order to estimate annual energy use by our company or school. This is easy to do by
  taking an inventory of the energy consumption of your current IT hardware such as

         Desktop PCs
         Monitors
         laptops,
  Servers’ equipment and other networked peripherals such as printers and scanners.
Compare the business with e-businesses –

The term electronic business was first introduced by IBM in 1997 However, many experts agree to use the word ‘e-business’ as an
definition to a set of automated business processes that is constructed on certain electronic networking technologies such as
internet. List of business process

        materials to production/ product development
        production to stock holding
        delivery of products
        Distribution and logistics/delivery of core services
        sales and marketing/ market development
         After sales, invoicing/debt collection and customer service

Convenience:

        Internet offers the convenience of '24 hours × 7 days a week × 365 days' a year business that allowed A and B to go for
         shopping well after midnight. Such flexibility is available even to the organizational personnel whereby they can do work
         from wherever they are, and whenever they may want to do it.

Movement towards a paperless society:

        Use of internet has considerably reduced dependence on paperwork and the attendant 'red tape. Most Government
         departments and regulatory authorities are increasingly moving in this direction whereby they allow electronic filing of
         returns and reports. In fact, e-commerce tools are effecting the administrative reforms aimed at speeding up the process of
         granting permissions, approvals and licences.

Speed:

        As we all know buying or selling involves exchange of information that internet allows at the click of a mouse. This benefit
         becomes all the more attractive in the case of information-intensive products such as software’s, movies, music, e-books and
         journals that can even be delivered online. You know that in the digital era, money is defined as electronic pulses at the
         speed of light, thanks to the electronic funds transfer technology of e-commerce.
Global reach/access:

      Internet is truly without boundaries. On the one hand, it allows the seller an access to the global market; on the other hand,
       it affords to the buyer a freedom to choose products from almost any part of the world.


The Green IT business market currently providing support to enterprise companies but with e-business, support can be provided to
individuals

Identify e-business opportunities for innovation and reform

Information and content provider:

      This is where the writer and publishers comes out. The World Wide Web has turned publishing fiasco. By giving writers and
       publishers to create a publication without investing on printing press, ink or paper which will be good for the environment.

Telecommunications / Distance learning:

      Distance learning and telecommunication had made life easier for employee as they don’t have to travel offsite to get skill
       hand which help companies to reduce the cost of the employee accommodation an expenses d travel .

– Allows business to implement Power management system to reduce energy costs by 80% in the data centre.


pay per view shows, broadcast TV shows through the internet. Browse and search the web through your TV, play and pause
streaming video on your television, which can give client high satisfaction since they can watch their favorite shows on a bigger
screen than their computers.
Implement e-business innovation –

       The business may set-up a website of a face front shop for customer support and product recommendation.
       It consists of combining existing technology by implementing Green IT with Power management System.

       YouTube is another good way to implement your e-business, there are million viewers of YouTube all over the world
        everyday by uploading the view we have on the website to YouTube, YouTube users can see what are the benefits of
        implementing Green IT.

       Portable 4D technology will be developed for home/consumer use whereas previously only implemented in entertainment
        places such as Universal Studios.
       Green IT technology will be developed for home, School, collages and other enterprise consumer use
       Whereas previously it was only implemented incorporate companies’ places such as government education departments.

       In order to implement this E-business innovation, the E-business owner has to invest on hosting a website to establish the
        new technology in Green IT to give information to the whole world about the green technology. The website will include the
        preview video of the new Green technology, the video will include about what is the new technology about, what it does,
        what benefit it will do to you, what experiences you gain when you purchase or rent the product. Also the video will have the
        compatibility information so that customers and client will know if this particular product is compatible to their existing
        entertainment setup.


The following are the initiatives for implementation e-business under planning strategy.

i) Planning for infrastructure change management

ii) Planning for availability

iii) Providing accelerated successful implementation

iv) Developing IT management systems
v) Providing organization capacity planning and design.

vi) Planning and designing e-business infrastructure strategy and architecture

The following are the initiatives for implementing e-business under integrating strategy.

i) Integrating strategic enterprise wide applications

ii) Providing knowledge management and joint services to influence corporate and external data.

iii) Providing solutions to deliver end-user self-service

iv) Providing application services for industry oriented business applications.

The following are the initiatives for implementing e-business under Managing and

Operating IT business units for optimize performance of e-business.

i) Coordinating the activities of IT and business teams

ii) Designing and optimizing Web infrastructure to improve business performance

iii) Providing the service delivery infrastructure to support production and making decision about outsourcing.
Task 2- Project feasibility report

1) Business Problem:
Problem that we are facings today is how we can make our IT environment Greener! The word Green IT refers to environmentally sustainable
computing or IT

    set of processes and approaches designed to make data centre’s more efficient

    This means reducing the power and cooling required.

    Reduce energy costs by 80%.

    Power down servers without affecting applications or users

    Green your data centre while decreasing costs and improving service levels

 There are lots of software packages /products out there in the market for power management system, as well as for reducing data center
(virtualization) to make our school and enterprise IT environment Greener.

2) Current Situation:
Currently the school does not have any software or any kind of hardware to control it power used by computers

3) Approach Overview:
The proposed solution is to install GPO (Group policy object) power management software in the school computer to reduce the power cost

      One easy way to green your school or your IT Department is to implement PC power management software.
      Power management software simplifies the process of implementing power management policies across a large network of
       PCs.
      Power management software will decrease your energy costs while also decreasing the amount of CO2 released into the
       atmosphere.

4) Potential Solutions:
The school could buy virtual software to keep all of the data on it or buy new hard ware with less power consumption.
5) Description of the solution:
The school would implement Group polices:

        The power management policies are located in Power Management, under Computer Configuration | Administrative Templates |
        System | Power Management. Note that there are no power management policies under User Configuration in Windows Vista.



6) Resources for solution:
For power management system the system admin of the school would implement the power management policies that are located in Power
Management, under Computer Configuration | Administrative Templates | System | Power Management

For the virtual application all the school needs is to install the application on their servers and install the additions software that the school uses
into the virtual application desktop. Or another solution that school could use is to buy all of the hardware with less power consumption

7) Benefit/Cost of solution:
For the Virtual Application solution it would cost the school $133,500.00 for 500 clients with 1 years 12/5 support they would also save money
by not having to upgrade their desktop computers ever. For the second option the school would have to buy all the new hardware that would
cost them easily over $ 300,000 just for a school.

Second t solution is the cheapest solution of all would be is to install GPO and keep all the hardware that are currently in use by the school this
would be the best solution for all the developing country Power management software simplifies the process of implementing power
management policies across a large network of PCs. It enables the company to take control over the entire network, monitoring how long PCs
are allowed to stay on while inactive, at what time PCs will be shut down at the end of a shift, and at what time PCs need to power up in order to
install updates. This enables companies to implement power-saving strategies for little cost and with little effort and maintenance from the IT
Department.

8) Payback/Return on Investment of solution:
The ROI on the first solution would be depending on the amount of software that the school has would be one year
9) Schedule of solution:
Second solution would take about 1-2 days no more than that if this is only for one branch otherwise it would be depended on how many groups
you are creating for each department of the school.

For the first solution it would take about 1 week to install the virtual application on the server and deploy it on every computer in the school the

10)     Reason to abandon this solution:
While this solution is good there is a concern because it will cost over $100000 and so is very expensive also that cost is for one year only and if
the school doesn’t have that much software then they are going to lose money and the second solution would be more appropriate.

11)     Preliminary Recommendations
The first & third solution would be more suited for the cooperate companies provided that they have the money and they have a lot of software
to licence, the second solution would be better if they only have a few software and they don’t have the resources to go ahead with the first
solution, the third solution is not recommended because it is costly for developing country schools.



12)     Recommended solution:
I would recommend the second solution to install the GPO (group policy object) on the server and distribute it across the network to the desktop
computers



13)     Recommendation justification:
The second solution is not expensive at all it just some click away to call your school green IT .power management software can reduce a PC’s
power consumption by as much as 80 percent, saving companies from $25-$75 per desktop PC
Task 3-Identify Hardware, software and labour components

Hardware


                    Name
                                                                     Cost
  Netgear Universal Wi-Fi Internet Adapter                   From $66.50 to $99.99
Dell Professional P1911
                                                                     $189
19"W Monitor

Vostro 430 Mini Tower Desktop                                From $1,099 to $2,099
Including monitor
              Wireless Router                                Varies, client decision


Software


                    Name
                                                                     Cost
               Installation Guide                                     Free


4. Identify threats and harms
              Failure of Internet access
              Failure of IT Hardware
              Loss of a significant customer.
              Failure of suppliers to meet quality requirements.
              Price rises from suppliers.
              Low signal strength
              poor customer service
5. Quantify threat and harm
        Failure of Internet access – Very High
        Failure of IT Hardware – Very High
        Web presence -high
        Terrible customer service – Low
        Power -high


6. Estimate risk
        Failure of Internet access – High
        Failure of IT Hardware – High
        Web Presence – very high
        Terrible customer service – High
        Power - medium


7. Identify and assess treatment options
        Failure of Internet access
               i. Secure cabling
              ii. Backup ISP using wireless with secure encryption
        Failure of IT Hardware (products such as Netgear Internet Adapter)
               i. Give free 12 or 24 months warranty
              ii. Test products before distribution
        Terrible customer service
               i. Well trained staff




Task 7- Prepare a security risk management plan
                            PRSSM414A –          Identify and assess assets
                            Activity for Task 2 - The risk register


                                                                                                     Desire    Expectance    Intent
              Assets                        Types of threat
                                                                                                      (a)         (b)          (c)
                                                                                                                               How
                                                                                         Adequacy      How                    likely
                                                                           Type of           of       likely   How likely       are
No                                            How can
                                 What can                  Who would        Harm          existing      are    are they to   they to
     Description       Status                    it                                                                            try?
                                 happen?                    want to?                      controls   they to        be
                                              happen?
                                                                                                      want     confident?    (c) =
                                                                                                        it?                  (a) x
                                                                                                                              (b)
                                              Accident     Disgruntled
       Internet    Owned by                                                Loss of E-
1                                 Failure     or H/W       or Untrained                     NO       Medium     Medium       Medium
       Access       other                                                   Business
                                               Failure         Staff

                    Owned by
                    education                              Act of God,
                                                Power                       Loss of
                   department/                              Natural
2    IT Hardware                  Failure     related or                   Business,        NO       Medium     Medium       Medium
                                                            Disaster,
                                              Accident                    Loss of Data
                   enterprise                               Ageing
                   Company

                                  Hacked,   Deliberate,
                                                            Hackers,
        Web                       Hijacked,  Insecure,                                    Needs
3                   “Owned”                                 Thieves,       Financial                  High        High        High
      Presence                     Traffic    Out of                                     Updating
                                               Date         Criminals
                                 Congestion
                                             Security,
                                                Weak
                                               Password

                                                                              Loss of;
                                                                            Skilled Staff,
                                                                              Business
                                                Lack of
                   Competent        Staff                                    Continuity,
     Personnel                                  Training,                                     Staff
                   in Existing     Leave,                                    Robustness, Satisfaction
4    Skills and                                   Not       Competitor                                  High    Low     Medium
                    Business      Skills are                                Supportability and Morale
    Competencies                               Adaptable
                   Procedures    out of date                                     and
                                               to Change
                                                                             Knowledge.



                   Owned by                                 Disgruntled,
                                Software is
      Licensed      other/                     Laziness,    Dishonest or      Loss of
                                 stolen or
5     Software                                 Deliberate    Untrained       Business,        NO        High    Low     Medium
                                 license is
     (Existing)    department                    Theft         Staff,       Loss of Data.
                   of education out of date                 Competitor

                                                             Staff forgot
                                                             to pay bill,
                                                             Electricity
                                                              Company
                                               Accident,
                   Owned by                                     Staff         Loss of
6      Power                      Failure      Laziness,                                      NO        Low     Low      Low
                    other                                   Incompetent,      Business
                                               Deliberate
                                                             Bad wiring
                                                             in school /
                                                              enterprise
                                                              company

7                  Citizens in     Mass         Poor        Disgruntled,       Loss of        NO        Low    Medium    Low
     Established
                   the Local     Exodus of     Services     Dishonest or      Business,
     Clientele    Community Customers, Provided,            Untrained      Harm to
                      and        Local   Poor Staff        Staff, Poor    Reputation
                  Surrounding Customers Training,            Website
                     Areas     refuse to Customers           Design,
                                use the     Not            Customers
                                website  Adaptable         that dislike
                                         to Change        e-commerce

                                               Poor
                  Good, High                  Services
                                                          Disgruntled,
                  Turnover of                Provided,
                                                          Dishonest or
     Business      Customers                 Poor Staff
                                                           Untrained
    Reputation/   in the Local Loss of       Training,                    Loss of
8                                                            Staff,                    NO   High    High     High
                  Community Reputation        Lack of                     Business
                                                            Natural
     Integrity         and                    Services
                                                           Disaster,
                  Surrounding                Provided,
                                                          Competitor
                      Areas                  Deliberate
                                             Sabotage

                                               Poor
                                 Staff        Services
                                Leave,       Provided,    Disgruntled,
                               Skills are    Poor Staff   Dishonest or
                              out of date,   Training,     Untrained       Loss of
                  Owned by
     Business                  Business       Lack of        Staff,       Business,
9                  school /                                                            NO   High   Medium   Medium
     Practices                 Premises       Services    Competitor,      Harm to
                  company
                                   or        Provided,    Act of God,     Reputation
                              Equipment      Deliberate     Natural
                                   is        Sabotage,      Disaster
                               destroyed      Natural
                                              Disaster
       Resources          Knowledge           Capability      Threat Rating                            Level of risk      Risk
                                                                                  Harm Rating (h)
           (d)                (e)                  (f)             (g)                                      (I)          Priority
No How likely are they   How likely are    How likely are                       What level of damage
      to have the        they to know     they to be able?    (g) = (c) x (f)    to the organization   (i) = (g) x (h)
        means?              how?            (f) = (d) x (e)                         would occur?
1        Medium              High             Medium            Medium               Very High             High          Medium

2        Medium              High             Medium            Medium               Very High             High            High

3          High              High               High              High               Very High          Very High          High

4          High               Low             Medium            Medium               Very High             High            High

5        Medium               Low             Medium            Medium                 High              Medium            High

6          High            Medium             Medium              High                 High             Very High        Very High

7        Medium              High             Medium            Medium               Very High             High            High

8          High            Medium               High              High               Very High             High          Very High

9        Medium               Low               Low             Medium               Very High             High          Very High
                           Strength                                                     Weakness




     Accessibility                                                    High Initial Investment
     Movement towards a paperless society                             Security
     Convenience                                                      Internet dependant
     Flexibility                                                      Requires technical skills
     Reduce power consumption                                         Piracy
     A strong balance sheet.                                          Requires wireless Router
     Spare production capacity.
     Effective purchasing and good relationships with suppliers.


                        Opportunities                                                    Threats


     Increasing market                                                Physical (theft, accidental damage)
     Research capability                                              Hardware failure
     OHS                                                              Loss of a significant customer.
     Increasing application demand                                    Failure of suppliers to meet quality requirements.
     Wireless expendability                                           Price rises from suppliers.




Presentation
Develop a power point presentation for the class 10 marks




                                                    GREEN IT

				
DOCUMENT INFO
Categories:
Tags:
Stats:
views:4
posted:12/7/2011
language:
pages:24