TCP/IP refers to two distinct protocols, TCP and IP. The two protocols have mostly been used together, which has seen many people refer to them as similar. However, when used together, TCP/IP refers to the network communication in which the TCP is used for transporting data to IP networks. Today, many people across the whole world use the internet daily for many purposes especially communication. TCP/IPs protocols make communication between different networks possible. Such communication would otherwise not be possible over such distances. Additionally, TCP/IP is free and works with any software and hardware. This made it quite popular worldwide.
An IP address over TCP/IP is a numerical label used for identifying a device such as a computer within a computer network. Without the IP, it would be impossible to send data to a specific user since it would be hard to identify devices. The IP serves two main functions; identifying both the host or network interface and the location’s address. As such, the significance of an IP address over TCP/IP protocol is the identification of every device. The communication media that I would use if I were building a network would be social media. This is because they are inexpensive to use. Additionally, they offer users flexibility of time, as well as convenience. They are popular and probably the most visited sites.
Active Directory Installation
One of the new features in the Windows 2008 is the Read-Only Domain Controller, RODC. It has several functionalities such as deploying of the domain controller within locations where physical security is not guaranteed. It can also be used for administrative purposes. However, their main purpose is providing security where an organization does not have physical security. For instance, when a small organization does not have a physical office in a certain location, the RODC serves such a firm by offering remote security for its IT database. In order to stop people from logging into their system illegally, the RODC can be used. This way, it provides security to small organizations in areas where they lack physical security.
During the removal and installation of the AD DS, several issues are encountered. One of these issues is related to disk space and requirements for upgrading to the new windows server 2008. Some of the problems occurring within this issues include disk space requirements for upgrading to windows server 2008 and 2008 R2, SYSVOL location on an RODC. AD DS installation might fail in case SYSVOL is within the root in a drive among other errors. Some of these problems such as disk space for upgrading to the new server happen because of limited space within the disk. The new server requires free disk space to save the new operating system image. Without such free space, it would not be possible to initialize the setup process, as well as any installed server roles. Assuming that the problem occurred because there was not enough space in the disc for the new servers, the solution would only be to increase the disk size, which is a hard thing to do.
The other error that could occur within this issue is SYSVOL location on an RODC. In an RODC, utilizing distributed file systems (DFS) replication for the SYSVOL, the SYSVOL shared folder needs to be placed in a separate volume from the windows folder. Storing it in the two files within the same volume reduces the performance of volume after installation. The solution for such an error could be to ensure that the two files are stored in different volumes, or other minifilter drivers such as antiviruses are installed. Such errors occur when these little but critical issues are not considered. The only solution would be ensuring to review all the requirements of the new server before installation, as well as reviewing the status of the current disk to access whether it meets the requirements. This will help organizations to find out the changes they need to make.
IT Diffusion Models
Several IT Diffusion Models that a firm can use are available. Some of them include Government supported or Private Supported models, National-champion driven, Asian private sector driven, Planned-economy driven, Industry driven and Corporate driven. All these are examples of IT Diffusion models that influence firms in different ways. In the industry driven model, the industry is the main factor determining how players behave. This model is characterized by private vendors in IT who create the market demand. These vendors are responsible for developing the systems, which they sell to clients as well as support. The government has little influence over such models. Its role is only investing in the higher risk research and designs. On the other hand, planned-economy driven market presents a different case. In this model, development and manufacturing of IT is centralized. There is centralized ownership of the manufacturing. The Planned-economy driven model is largely considered a soviet form.
Each of these models affects how a company can do business in different countries. An example is a company that develops IT programs, as well as software for sale. In a country where the industry-driven model is used, such a company would be well fitted to compete with other companies. It would be able to develop its programs and software as well as distribute it to clients using the strategy it deems most suitable. On the other hand, in a planned-economy driven model, the company would not be in a good position to develop and market its programs because of tight control. Such a model limits diversity where developments are influenced by the central power. Unlike this model, the industry driven model allows diversity and stiffer competition, which is quite healthy for business as well as development and innovation of new ideas.
A non-IT manager can arrive at a decision to utilize one model using several factors such as through weighing the disadvantages over advantages, how well the model serves the nation, cost benefits, trade-offs and other factors. Among the aforementioned models, I would choose the industry-driven model that allows individual companies to act on their own and perform their operations without much external control. Moreover, this allows competition, and no competitor has an edge over the others.
Several approaches for aligning a business to strategy are available. The first one is to understand the business first hand. Knowledge is the most essential factor to aligning a business to strategy. Without knowledge, one would not be familiar with what to align. Hiring from the business ensures that talent is retained as well as the already developed expertise and understanding. Internally hired employees understand the business better than externally hired ones. However, this is only successful when there is continuous development of employees. Ensuring good relations with stakeholders is important since they are crucial to the existence of a business. This helps in gaining support in making decisions as well as achieving goals. Measures of all actions are crucial in companies. This enables the firm to define the position of the company in terms of achieving its goals and objectives. Without measure, it would not be possible to know when a goal is achieved.
Among the approaches that are left out is involving the top management within a company. The top management needs to be involved in order to set the example as well as provide the needed help when it comes to making decision. Without top management support, it becomes hard to pass projects and decisions since they could be rejected. Another strategy is ensuring that the vision and mission statements of the company are in congruent with the company goals and objectives. This will provide a vision to the employees as well as help in understanding the need for having certain goals and strategies.