Barcroft Media Acknowledgement Content Barcroft Media ........................................................................................................................ 1 Acknowledgement ................................................................................................................... 2 Content .................................................................................................................................... 3 Section 01 ................................................................................................................................ 4 1.1 Barcroft Media............................................................................................................... 4 1.2 Current situation of the IT and need of the IT enablement ........................................... 4 1.3 IT Enablement ............................................................................................................... 4 Section 02 ................................................................................................................................ 5 2.1 Safety and Security ........................................................................................................ 5 2.2 Establishing/Maintaining a Domain. ............................................................................. 5 2.3 A Proxy.......................................................................................................................... 5 2.4 Communication with clients .......................................................................................... 5 2.5 Disaster Recovering....................................................................................................... 6 Section 03 ................................................................................................................................ 6 3.1 Establishing a strong IT department .............................................................................. 6 3.2 Identifying workflows/business processes. ................................................................... 7 3.3 Developing software modules and apply new technologies .......................................... 8 3.4 Improvements to be done in the Infrastructure............................................................ 10 3.5 advancing the communication ..................................................................................... 11 3.6 Changing file formats to minimize the file size for transferring. ................................ 11 3.7 Effort of IT department on trouble shooting ............................................................... 11 Reference ............................................................................................................................... 12 Section 4 - Appendix ............................................................................................................. 13 4.1 Designing and Implementing a Disaster Recovery system. ........................................ 13 Section 01 1.1 Barcroft Media Barcroft Media is a United Kingdom based company which sells Digital assets mainly for the purpose of news reporting. The organization has been running for 6 years alone with two branch offices located in Delhi and New York. The company works all over 24 hours a day and seven days a week with the help of around 40 staff members. The mission of the company is unique from other similar organizations by following the angle they take on a story that is important and that sells. The company has been holding clients globally while having most sales to the Sun Telegraph and Mirror newspapers in UK. The success of the company can be seen by the turnover, which goes up to £5 to 10 Millions per annum over the last few years. The competition for the market also high due to same kind of service providers exists. 1.2 Current situation of the IT and need of the IT enablement Even though the company sells Digital media, usage of the IT is not in a satisfactory level. It does not have even any permanent IT person or does not maintain an IT department, but the satisfactory is having an IT literate staff that can be used to get the true benefits of emerging technologies if applied. It is essential to make company IT enabled with the help of new and emerging technologies to improve the business which could finally increase the turnover while making the high satisfactory of the staff and being a remarkable competitor. It’s also crucial that the new technologies should be applied to cover all business processes and areas to advance the benefits got currently, by usage of the correct/ most suitable methodologies which should also help reduce the costs. 1.3 IT Enablement 01. Making the company IT enabled, most important challenges involved redesigning of the business processes or workflows to engage with new technologies. But the ultimate result should not disturb or jumble the business requirements. It should help reduce the man hours consumed while improving the staff satisfactory and reduce the expenditure on services get from outside. 02. Then development of software modules taken place for redesigned workflows as applicable. A component based endeavor is most suitable to for redesigning of business processes but all should be integrated so correct usage of network architecture is remarkable. 03. The establishment of domains is required with the help of existing LANs. New additional devices like servers should be used. The storage media should have to be upgraded with new technologies. 04. Another attempt involved the establishing a strong IT department who can maintain the new technologies applied and also are able to involve the redesigning of workflows and making IT enabled, selecting the members to IT department from among existing IT literate staff is suitable. At the beginning a few consultants could be used further to transfer technical knowledge to established IT department. For the successful achievement regular knowledge transferring/Training programs to staff are key requirements 05. To improve the communication of among the staff members and even with clients and hired consultants advantages of the TCP/IP protocol can be used by designing appropriate chatting software. Also establishing/hosting a separate email server is suitable since the security is achievable and is also cost effective. 06. More importantly some of the formats followed to save/transfer digital media (files) as of now should have to be changed appropriately for the purpose of reducing the traffic in the transferring channels, which could direct to reduce bandwidth required. 07. Use the strengths of the IT department for repairs, services of servers when required. Section 02 2.1 Safety and Security Since the company’s business is mainly involved with digital media and also communicates globally with a number of outside people, security is a crucial point to be considered. Safety should also be considered in a highly acceptable level. Both the security and safety can be archived and improved by the help of emerging technologies while existing infrastructure also used. 2.2 Establishing/Maintaining a Domain. Making the server password protected will not solve all the security issues. A domain should be established for each and every office branch separately which will lead for centralized solutions for many instances like file sharing, communication, authorizations and authentications. In each office, a domain server (domain controller) should first be installed with a suitable Server Operating system like Linux and an already existing PC can be used as the domain server which will not lead for any additional cost. Then an Active Directory and DNS (Domain Name Service) should be configured for maintaining domain users and connecting terminal to the domain. All staff member should be given authentication IDs in the domain and authorizations would be given appropriately with knowledge of higher management. All the files related to the business should be allowed to access based on the authorization level configured in the domain. 2.3 A Proxy Existing usage of the Firewall will also not be enough to secure assets. Establishment of a proxy server for communication with outside the LAN is highly necessary. An existing PC can easily be upgraded as a proxy server which will lead for a zero additional cost. The access of the internet and communication with outside would be then controlled and monitored with the help of it, where all the user machines are connected with proxy. Proxy should be configured to allow communicating only with identified outside sites by IT department, based on domain authentications appropriately. 2.4 Communication with clients All necessary areas in web site should be password protected. Passwords and related crucial data should be kept/transfer by encrypting. Full content of the stories should not be given to the people until they pay in fully. 2.5 Disaster Recovering It’s mandatory that implementing a Disaster Recovery system/mechanism (Please refer Appendix) Section 03 3.1 Establishing a strong IT department The most important and first task to be followed in the IT enablement of the company is to establish a talented IT department who would then lead to cover the remaining task of the IT enablement. Since, currently there is no even a permanent IT person, at the beginning two consultants should be contracted for the purpose of establishment, and further one person among them has to be recruited permanently as the Head of the IT department. The main responsibilities of the consultants would be to select the suitable staff for the IT department among existing IT literate staff and train them as needed. Three Systems Administrators and two software developers should be nominated as the members. Systems administrators should work simultaneously as IT members while they work for their current responsibilities. For the satisfactory of nominated IT members, they should be paid a monthly allowance in addition to their current salary (1/10 of their salary), this would profitable than recruiting new persons and pay them a monthly salary. Suppose, the current salary of a selected IT literate staff member And salary for an IT member if recruited from outside =£X 1 =£X 2 If three IT members recruited from outside, 2 Total additional pay for five members = £ 5X A = 5 * £X Since the IT members nominated among existing IT staff, 1 The allowance for one person = £ X * 1/10 = £ X/10 Total additional pay for three members = 5 * £ X/10 = £ 5X/10 B Therefore, nominating IT members from among existing staff means, A savings (Benefit) to the company for a month = A - B = £ (5X – 5X/10) = £ 4.5X Illustration 1 – cost benefit analysis on selecting members for IT department among IT literate staff Beginning, Systems Administrators should help the task of redesigning business processes. Then they could take the responsibilities of systems administrative included training to staff, maintaining network, configuration activities in the domain, installations, repairing hardware, monitoring digital media access, troubleshooting infrastructure, monitoring backup and restore data etc. Two Software Developers first should concentrate of the task of identifying business processes and redesigning the workflows that direct for a component based solution, finally developing of software for business processes. The major effort for software development would be given only at the initial stage, then the two software developers would have to work for it occasionally, thus they can work as IT department members simultaneously while they do their traditional works. 3.2 Identifying workflows/business processes. The most affordable task involved is identifying business processes in a modular based approach which would help design/develop software modules as required to engage with new technologies. The main stakeholders should be the members in the IT department. Importantly this could not be achievable without help of the all staff members. The production based business processes like captioning of images and editing etc should be identified and separated into a module. Selling based processes next to be identified. Account related transactions like costing, paying etc should and isolated from active business transactions. Human resource transactions like payroll, shift based working monitoring, attendance should also be modularized. Other transactions like purchasing, inventory management are the next transaction group to be identified. Finally it should also be identified that where the integration between identified modules and among business transactions involved. For an example if an asset is sold a Pay In Voucher should be generated automatically in the Accounts software going to be developed at the point of raising a receipt. Above process would be helpful to design and developing the required software to help performing business transactions with the help of new technologies. This task also helps improving the staff satisfactory. The transparency is increased; cost for a transaction will be reduced by reduction of time consumed per transaction. Redesign of account processes is crucial since this is currently costly. Major reason for the high cost for accounting would be at the end of performing any other transaction related accounts should be updated or a related accounting transaction would be performed by manually. Such situations to be identified and then we should use and applied as the integrations with other modules. Integration among modules Production Processes Transactions: Photography Review pictures Captioning Stories Featuring Selling processes Purchasing and Inventory Processes Transactions: Publish in the web site Selling of assets Transactions: Purchase cameras Broadband Accounting Processes Figure 1 – main business process categories Human Resource Management 3.3 Developing software modules and apply new technologies After redesigning of workflows, designing of software components for each category should be initiated. This would be the pinnacle of applying new technologies. Software developers and Head of IT are the major responsible persons. A common database should be used for keeping the data in all modules, since integration between modules involved. MySQL is referable as DBMS and Java should be used as the programming language since both are open source and are free. Using of Java, MySQL and developing the software by own IT department lead for a high saving. Estimated time for software development is four months. Basically five software modules should be developed as for handling production processes, handling Inventory and purchasing processes, handling selling processes, accounting and Human resource management. Cost benefit analysis on developing five software modules in four months rather than purchasing from outside. If five software modules purchased, Software cost per each module = £ 50,000 = £ 250,000 C Total software cost for five modules When software modules are developed by own IT department, Cost for programming for four months = (monthly allowance for each developer * 2 + Monthly pay for consultant) * 4 From illustration 1, Monthly allowance for a developer £ X = £ X/10 Assuming monthly salary for a staff member is £ 50,000, Monthly allowance for a developer = £ 5,000 Assuming monthly pay for a consultant (IT head) is £ 10,000, Total cost for programming for four months = £ (5,000 * 2 + 10,000) * 4 = £ 80,000 1 Cost for programming language (Java) Cost for DBMS £ 0 2 = = £ 0 3 Total cost the development of five software modules in four months = 1 +2 + 3 = £ (80,000 + 0 + 0) = £ 80,000 D Therefore, developing five software modules by own department, A savings (Benefit) to the company = C - D = £ 250,000 - £ 80,000 = £ 170,000 Illustration 2 – cost benefit analysis on developing Software in IT department Domain server could used to host the database too by installing MySQL server edition; this will further lead for a cost deduction. This will allow for a client-server architecture design on the software. Minimum cost for an additional server to install database, if purchased = £ 25,000 Since database is kept in the same domain controller server cost to spend = £0 So the saving (benefit) for the company = £ 25,000 Illustration 3 – cost benefit analysis on using the domain controller server as a database server too. Development of Production Module. Considerably a high priority should be given for production module since it is the heart of the core business. One of the major transactions that would be redesigned is the captioning. When sending the pictures to India, there is a need to compress them so that bandwidth needed could be reduced. The required automated functionality of compression should be programmed in. Using this mechanism costing for the captioning can be reduced. Typical workflow for captioning Capture pictures Send for review Send for Captioning Captioning Review (File size is large) High bandwidth needed Proposed workflow for captioning Capture pictures Send for review Send for Captioning Review Compression Captioning (File size is small) Lower bandwidth needed Figure 2 – comparison between traditional workflow for captioning and proposed solution An automated functionality should be implemented for checking the material for appropriate formats, which performed when pictures are sent by photographers; best way to achieve is providing an interface for uploading pictures via FTP and keeps the function alone with that interface. A suitable functionality should be implemented for handling media monitoring transactions, thus checking to see that images have not been used without payment will be cost effective. Providing interfaces for all the transactions involved by staff is more important, but functional requirements such as usability, portability, error freeness, user friendliness etc should be achievable in high passion sine users are the own staff and they should never be irritated with the solutions developed. A centralized profile based authentication and authorization mechanism should be developed. This would also lead for a satisfactory of staff, since they could show that where the transactions they have involved. Who could work in solution It’s a great advantage that most staff members are mid to 20s, as they are used to work in software environments. First all staff should be informed that all of them use the developed software modules for transactions done by manually before. The transaction should be done online. IT members should make staff that the provided solution is helpful and effective rather than work manually. IT department should train them to use the solution and should also provide help when required. Integration in a centralized environment As any other transaction is finally related with finance it might be not effectively done manually and costly since duplication of work involved. With the solution provided, for an example there is no need of sending back order lists for billing, which will be automatically done by module integration. 3.4 Improvements to be done in the Infrastructure Since the software modules are developed for client-server architecture the database server should be plugged in a suitable node where all client PCs can access it. It’s important to install MySQL server client edition in client PCs to allow crossing points to communicate with centralized server. In the database server a considerable amount of storage should be allocated for storing data of transactions. Generally 100 GB of space for text type data is required for a year, and this would not be costly since as of now cost per storage unit has greatly reduced in the heard discs. Database server should have 4GB of RAM. The main issue faced in video clips production is time consumed for recording. Rather than purchasing new equipments like high technical video cameras, it is suitable to purchase good video editing software applications like Adobe Premiere help provide various tools for editing videos and improving the quality. The existing policy for use network should further be maintained to keep the staff satisfactory well, but greater functionality of domain controller should be used for the purpose of security (refer section 2). Profile based developed software should be able tracking the job details performed by staff. Improvement on storage Since digital media are the main assets it’s not suitable to change the asset because high quality should further be maintained. Purchasing of high capacity hard discs would not be costly when compared to the past. The existing tape backup of 1.5TB should be upgraded at least to 2 numbers of tape backups since the average usage of storage is 3TB for a year. Keeping additional hard disc of totally (2TB each) 4TB for backing up is also preferable since the cost is comparably low. It is important to implement a suitable backup method for the data base in centralized software developed. Automated daily backup, weekly backup and monthly backup procedures should be implemented. Two hard discs in existing two separated PCs with allocated 500GB each will be enough to hold the backup of database of centralized software. Gigabyte Ethernet It’s a good solution to upgrade the LANs to work in Gigabyte Ethernet for improving the easy access of assets. Relevant network switch and network interfaces of the PCs should be upgraded to Gigabyte Interfaces if they do not already have. 3.5 advancing the communication When the current mechanisms used for communication is deeply considered with cost, security and staff satisfaction, there become a need of a standardized solution for it. TCP/IP protocol is suitable for communication and widely used, but the way of using it would be tailored. For using iChatting using Skype thru mobile phones, an additional cost by each user for GPRS/3G. This is not a 100% secured mechanism; hacking mechanisms have been widely spread for mobile media. The best solution is to develop an own chatting application in an authentication environment using Java on TCP/IP protocol and facilitate staff to use it, then no addition payment required for data transfers in LAN. Chatting software should be further extended to facilitate chatting between geographically different three offices. In this case only the difference rises is data passing is performed using broadband thru TCP/IP, but no need to pay additionally since company already pays for broadband and only a few data is transferred when chatting. It’s a secured solution since TCP/IP protocol is originally secured. This could be further used for communication with clients and field staff by developing an appropriate web based interface. An email service should be designed for sending and receiving emails for every staff member, this could lead for a standard, professional and secured mechanism for communicating. The standpoint is Email server should be configured under the same domain of web site or which emphasize the company name. All staff member should be given an email id for their own; it allows improving the staff satisfaction too. Another attempt is to provide a web based interface for email service so that field staff can easily use. 3.6 Changing file formats to minimize the file size for transferring. Images should be kept with a high resolution. Using of a suitable format is taken place with considering both quality attributes and efficiency. They should allow keeps the required quality like high resolution, but with a minimum file size is required. JPEG file format is suitable for images while AVI standard is better for Videos. 3.7 Effort of IT department on trouble shooting If the servers, PCs or any device is given to a different party to repair, the cost is high. But if the own IT department is able to provide such works cost become reduced. So it’s required to train IT members to make troubleshooting in Computers, and members should attend trouble shooting. Reference Barcroft Media, 2011, Viewed 02 Feb 2011, http://www.barcroftmedia.com/index.pgi DisasterRecovery.org, 2011, DisasterRecovery.org, Viewed 01 Feb 2011, www.disasterrecovery.org/plan_steps.html Diana Roberts, 2011, Creating and Maintaining a Business Website, Viewed 01 Feb 2011, http://ezinearticles.com/?Creating-and-Maintaining-a-BusinessWebsite&id=1546902 R. Kayne, 2011, what is a Proxy Server, Viewed 01 Feb 2011, http://www.wisegeek.com/what-is-a-proxy-server.htm Data Capture Solution, 2011, Workflow and Business Process Management, Viewed 01 Feb 2011, www.dcs.co.uk/business.../business-process-management.html JNS InfoTech Pvt. Ltd, 2011, Web Development application, Complex Website Development, Viewed 03 Feb 2011, http://www.jnsinfotech.com/ Section 4 - Appendix 4.1 Designing and Implementing a Disaster Recovery system. It’s mandatory that implementing a Disaster Recovery system/mechanism for the servers which hold company data and assets even though currently having separated the main server from web server and maintain a duplication of assets. The server used to keep backups should further be configured as a Disaster Recovery Server and highly recommended to keep the backup server geographically separated and but always connected to the Network. Designing Disaster Recovery System for the Developed centralized software solution Since the centralized solution is structured on client-sever architecture there will only be a single database and all client PCs are connected to that using MySQL on the help of TCP/IP protocol. Since the application is developed as windows based, each and every PC would have the executable piece of application. All client PCs store/edit/delete or perform any kind of data transferring only to the Database server, thus continues connectivity with it is mandatory. But the problem rose in a situation of disaster to the original database especially. To face such a situation, disaster recovery server (improved Database backup sever) should be kept in a geographically separated (but connected to the original database and client PCs) and a copy of same data base used to store data of centralized software solution should be installed in that. A mechanism should be implemented to always synchronize data in original database to the duplicate database installed in disaster recovery server. This could be achieved using inbuilt facilities of MySQL for synchronization. Data source of the application in all client PCs should be the original database sever. But a piece of functions should be written in the application to check continues connectivity with the original database server, and to automatically redirect the database connectivity to Disaster recovery server in the case of an unavailability of original database.