Managing the I.T. Infrastructure of Neosphere Outsourcing, Inc.

The technological revolution of the mid 90’s particularly on information technology has played a great impact on almost every aspect of our daily lives. After two decades I. T. have become an everyday necessity that one may find it difficult to cope up with his daily routines without it. Technologies become a necessity which in turn leads to new ideas on how to further harness its powers which then leads to another technological innovation. This pattern opened up not only new frontiers in business opportunities but also opened up a new battleground for business to compete in terms of advancement.

Today, information drives businesses into success, and speed is the gauge. Neosphere Sourcing, Inc. makes sure that information is readily available round the clock to its clienteles. Established in 1996, Neosphere is one of the inventors of Business Process Outsourcing (BPO) in the world. With our main headquarter in Cupertino and satellite offices in Sunnyvale, Santa Clara, San Jose and Mountain View in Silicon Valley, clienteles are assured of round the clock and prompt response from our online and field responders on demand.

Presently, we have more than 500 employees, more than a third of which directly deals with customer concerns in ensuring that their business’ technical needs are met. OPERATION End Users Systems The backbone of Neosphere’s operation is technology. Our daily operation relies heavily on information exchange provided by a simple interconnected network of hardware and software resources. These include mobile and land phone devices and switches, data centers, network servers, a radio tower and repeaters, radio communication devices and various specialized software.

Remote technical service representatives service calls from customers requiring technical assistance. Each call is logged and given its respective ticket ID using our own proprietary software called Fineex. If the problem cannot be resolved through phone, a request ticket will then be routed to the satellite office nearest to the client for dispatch. Fineex selects from the pool of technical respondents based on schedule and specialization and assign them with a service vehicle appropriate to the type of service defined by the call agent. Technical respondents are provided with handheld radios and mobile phones upon deployment.

Alternatively, customers can log on to Fineex to post service requests and communicate with online technical agents. Management and Workforce Development and maintenance of the system used by Neosphere is directly under the management and supervision of the Chief Information Officer (CIO) who also functions as the I. T. Department Head. At the present, the I. T. Department is composed of 10 highly specialized technical crew as follows: Electronics and Communications Engineers (2), Network Engineers (3), Software Developers (2) and; Technical Support Crew (3).

The Electronics and Communications Engineers are responsible in creating and executing plans for phone hubs and automated digital switches used by Fineex in distributing phone traffic to CSR terminals. Additionally, ECE’s are responsible in supervising the maintenance and reliability of all communication devices related resources of the company which include possible requisitions of additional resources as the need arises. Network Engineers perform almost identical responsibilities with ECE’s on the computer network side. The ECE’s and Network Engineers work in collaboration in ensuring that both technologies meet at both ends.

On the other hand, software developers create, maintain and enhance various computer software and websites of Neosphere. Lastly, technical support staffs assists the ECE’s and Network engineers in performing their duties. These include cable installations, setting up devices, installing software to the terminals and occasional maintenance tasks. The CIO leads the overall direction of the I. T. Department and makes sure that the team works toward the specific goals of the company on the technical end. ENTERPRISE SYSTEMS Neosphere’s enterprise system is a mixture of telecommunication, internet and software technologies.

Telecommunication related technologies are the primary link between the company and its clienteles, receiving hundreds of service requests on a daily basis, 24 hours a day. In addition, telecommunication enables intra-communication within the company to inform, relay instructions, to keep in touch with satellite office personnel and dispatch personnel including other minor tasks such as everyday fax transmissions. Telecommunication technologies the company utilizes include radio communication, land lines, mobile devices, fax machines and other communication related technologies.

Internet technologies ensure fast, flexible and affordable means of data communication inside and outside the company. Several systems used by Neosphere is internet dependent especially software systems used in managing service requests from customers, vehicle tracking through Global Positioning System (GPS), customer billing and payment, marketing and resource management. Enterprise System Requirements Neosphere’s system handling customer calls is composed of a system typically found in any call center offices.

This is composed of public switched telephone network (PSTN), long distance carrier (LDC), contact center server, Ethernet switch, routers and modem. Recently, the company is considering a system of utilizing Voice over Internet Protocol (VoIP) technology as a cheaper alternative to the existing system. In addition to this, the company also uses a typical local area network (LAN) connecting terminals and servers, automatic call distribution capable of distributing incoming calls to designated call agent terminals, interactive voice response, voice logging and such.

Neosphere has its own customer relations management software (CRM) as an integral part of the Fineex system. As mentioned earlier, Fineex handles customer service requests, work assignment, dispatch requests, and vehicle and personnel tracking. Together, these technologies comprise the technological infrastructure of Neosphere enabling the company to carry out its services to the customers and make the short and long-term goals of the company possible. SECURITY AND ASSURANCE DESIGN Survivability No earthly system is perfect and eternal and all are bound to fail.

Neosphere designed its system to be prepared in any case the system encountered difficulty that may hinder it to render its service to its clients. Failsafe measure such as data backups located in safe and independent location, auto-switching devices, redundant hardware and software, power generators and uninterrupted power supplies capable of running for hours in case of power failures and rollback routines. Personnel are also made aware to expect these problems to occur anytime and trained on how to deal with them on a regular basis.

Server hardware are now also equipped with cases capable of withstanding tremendous amount of heat in case of fire. Virus attacks are not considered to be of a big threat as the company uses Linux based systems which is believed to be designed to make infection impossible. Privacy and Confidentiality Neosphere pays great attention in treating the privacy and confidentiality of its clients’ personal and corporate information. Hard copies of contracts and correspondences between the company and clients are kept securely in document repositories located inside an isolated area together with other sensitive items in the Central Headquarter.

These repositories are accessible only by a few selected individuals and protected by digital locks equipped with standard biometric technology capable of acquiring fingerprint input and compares it with the fingerprints stored in 401 data files in the database server. Virtual Private Network (VPN) plays an integral part in protecting all information travelling in and out of the company’s network. Routines that requiring data to travel outside the company’s private network are protected by a 1024-bit secure socket layer (SSL) encryption that may only be deciphered on one side of the transacting agent.

This principle also applies to emails sent and received by users. Integrity The integrity of information obtained and kept by the system is also of great concern. Several measures are taken in order to ensure data integrity. Starting from the software development stage, codes are reviewed by independent groups not directly associated with the developers. This is to prevent developers from accidentally or malicious injecting codes that may allow unwarranted modification of information either programmatically or by manual means.

All software systems are built based on industry standards in terms of security and are protected by a login system that grants users certain privileges based on their access levels. Server rooms are restricted to authorized personnel which are also protected by biometric equipped locks. Availability Neosphere offers its services on a 24 hour basis, 7 days a week. This necessitates a system that is available at all times. Servers and all related peripherals and devices are required uninterrupted service.

All systems as redundant including server computers and storage devices that automatically switches to its backup system in case of failure and prevent denial of service. Additional failsafe measure include a power generator, uninterrupted power supply, RAID disks, disk images and software utilities that automatically create backups of stored information. Accountability The company makes all due effort to ensure that all transactions are safe from both sides. It is a responsibility of Neosphere to protect all information received and transmitted through their system.

It is also a responsibility of the Neosphere personnel particularly the responding technician to ensure that works rendered are performed within the acceptable range in terms of quality. On the other hand, customers have their fair of responsibilities that is no longer covered by the service warranty. These conditions include defective hardware, software or services not directly supplied by Neosphere, incorrect or incomplete service requests and unauthorized use of the system due to stolen login information.

It is a responsibility of the customer to make a complete description of the service required before finalizing the service request. Technical respondents are not allowed to render services beyond what is indicated in the service request. Lastly, it is a responsibility of the customer to pay the amount of the service on or before the due date indicated in the service invoice issued with respect to the service rendered. Reliability All systems are subject for routine checkup in order to ensure that they are running under normal condition. Routine checkup are done on an 8 hour basis 10 minutes before each shifts.

CSR’s are provided with a checklist of simple test routines to check if all required software and hardware are running while technical support staffs performs a quick physical checkup of hardware and runs a simple utility to check for any anomalies in the system. In case of anomalies, support technicians are allowed to correct the problems and file an incident report for later review. Non-repudiation In order to ensure the authenticity of incoming service requests, customers are allowed to supply several phone numbers and email addresses authorized to place service orders in behalf of their company.

In case of service request via phone, caller ID is sufficient to verify the source of incoming calls while the login system built into the Fineex system protects against unwarranted orders. In addition, a confirmation email is sent to the customer’s registered email address for confirmation before any service request is approved for servicing and possible deployment of respondents to the site. Servers are setup with digital server certificates and all emails are digitally signed for authenticity. REFERENCES 1. Tutorial Reports. 25 March 2009.

Call Center Infrastructure. 2 May 2009. http://www. tutorial-reports. com/business/outsourcing/cso/infrastructure. php 2. eJobDescrition. 19 December 2008. Chief Information Officer. 2 May 2009. http://www. ejobdescription. com/JobCIO. htm 3. Wikipedia. 1 May 2009. Information Security. http://en. wikipedia. org/wiki/Information_security 4. Amrit Williams Blog. 18 October 2007. Information Survivability vs. Information Security. 3 May 2009. http://techbuddha. wordpress. com/2007/10/18/information-survivability-vs-information-security/

Calculate the price
Make an order in advance and get the best price
Pages (550 words)
$0.00
*Price with a welcome 15% discount applied.
Pro tip: If you want to save more money and pay the lowest price, you need to set a more extended deadline.
We know how difficult it is to be a student these days. That's why our prices are one of the most affordable on the market, and there are no hidden fees.

Instead, we offer bonuses, discounts, and free services to make your experience outstanding.
How it works
Receive a 100% original paper that will pass Turnitin from a top essay writing service
step 1
Upload your instructions
Fill out the order form and provide paper details. You can even attach screenshots or add additional instructions later. If something is not clear or missing, the writer will contact you for clarification.
Pro service tips
How to get the most out of your experience with MyStudyWriters
One writer throughout the entire course
If you like the writer, you can hire them again. Just copy & paste their ID on the order form ("Preferred Writer's ID" field). This way, your vocabulary will be uniform, and the writer will be aware of your needs.
The same paper from different writers
You can order essay or any other work from two different writers to choose the best one or give another version to a friend. This can be done through the add-on "Same paper from another writer."
Copy of sources used by the writer
Our college essay writers work with ScienceDirect and other databases. They can send you articles or materials used in PDF or through screenshots. Just tick the "Copy of sources" field on the order form.
Testimonials
See why 20k+ students have chosen us as their sole writing assistance provider
Check out the latest reviews and opinions submitted by real customers worldwide and make an informed decision.
ACC543MANAGERIALACCOUNTINGANDLEGALASPECTS
excellent
Customer 452773, January 25th, 2024
Business and administrative studies
excellent, got a 100
Customer 452773, May 17th, 2023
Business and administrative studies
excellent job
Customer 452773, March 12th, 2023
Human Resources Management (HRM)
excellent
Customer 452773, June 25th, 2023
Management
Love this writer!!! Great work
Customer 452597, April 5th, 2021
FIN571
excellent work
Customer 452773, March 1st, 2024
Business and administrative studies
Excellent job
Customer 452773, March 9th, 2023
DATA565
The support team was late responding , my paper was late because the support team didn't respond in a timely manner. The writer of the paper finally got it right but seems there was a problem getting the revisioin to me.
Customer 452773, April 7th, 2024
Leadership Studies
excellent job
Customer 452773, August 26th, 2023
Leadership Studies
excellent job
Customer 452773, August 3rd, 2023
Human Resources Management (HRM)
excellent, great job
Customer 452773, June 19th, 2023
LEADERSHIP
excellent job
Customer 452773, August 12th, 2023
11,595
Customer reviews in total
96%
Current satisfaction rate
3 pages
Average paper length
37%
Customers referred by a friend
OUR GIFT TO YOU
15% OFF your first order
Use a coupon FIRST15 and enjoy expert help with any task at the most affordable price.
Claim my 15% OFF Order in Chat
Close

Sometimes it is hard to do all the work on your own

Let us help you get a good grade on your paper. Get professional help and free up your time for more important courses. Let us handle your;

  • Dissertations and Thesis
  • Essays
  • All Assignments

  • Research papers
  • Terms Papers
  • Online Classes
Live ChatWhatsApp