The particular trend known as exponential growth was first documented in 1965 utilizing a proposed pattern based on proven statistics and mathematics by a man named Gordon E. Moore, a co-founder of Intel Corporation. The law, now known as Moore’s Law, states that “transistors on a dense integrated circuit shrink by 50% approximately every 18 months” (Intel, n.d.); a mathematical proof that average computer processing power doubles in the same time. Persisting to this very day, the law is evidence of how wonders such as the Human Genome Project were able to be completed in 7 years rather than the originally proposed 700 (given the technology at the start of the project).

Order Now
Use code: HELLO100 at checkout

The various types of hardware found in modern CIS infrastructure include supercomputers (primary for scientific research), mainframes (transaction processing, enterprise applications), servers (provision of access to databases, applications, files, web site hosting), workstations (engineering, medical purposes, graphic design), to finally personal computers for individual productivity. (Valacich, Schneider, 2014). Systems software is responsible for controlling the hardware operations of the computers; typically in the form of operating systems such as Windows, OS X, and Ubuntu Linux. (Valacich, Schneider, 2014). Three different types of storage are maintained in the form of operational, backup, and archival. Operational storage works to process transactions and data analysis, backup storage creates short-term copies of organizational data for emergency recovery purposes, and archival storage creates long-term versions of backup storage typically for compliance and reporting purposes. (Valacich, Schneider, 2014). While servers work to host data, files, applications, etc. various clients work to access and manipulate the data whilst communicating with similar computers known as peers. (Valacich, Schneider, 2014). Furthermore, an array of network types exist with CIS infrastructure; such as private branch exchange (telephone systems), personal area networks (wireless communication between devices), local area networks (sharing of data between local users), campus area networks (multiple local area networks used by a singular organization), metropolitan area networks (similar to campus, though larger), and wide area networks (similar to metropolitan, with multiple organizations) (Valacich, Schneider, 2014).

Unfortunately, internal CIS infrastructure is becoming a rapidly outdated solution to managing data for corporations given the aforementioned trend described by Moore’s Law. Consumption, storage, diminishing space, and fluctuating demands are all issues that proves too difficult for modern internal CIS to handle. The currently accepted solution exists within cloud computing; a strategy that has only recently been possible thanks to the birth of the Internet after the Cold War (Kurzweil, 2001). Cloud computing works by allocating resources in the Internet (the “cloud”) so that the resources are consumed on demand and only when needed. In addition, customers only pay for what they consume, resources can be rapidly allocated and reallocated, and consumption simply becomes an operating expense (Valacich, Schneider, 2014). As a result, the percent ratio of utilization and efficiency improves on a dramatic scale. Without the cost of internal maintenance and problems that are associated with such, the data becomes incredibly elastic and easier to access. Cloud computing has thus been classified into two different types: public and private. A private cloud is owned by the client, high availability, centralized, controlled, and has privacy and security (Valacich, Schneider, 2014). Conversely, a public cloud is owned by a service provider, flexible, pay per use, and standardized (Valacich, Schneider, 2014). Finally, as a result of virtualization, cloud computing works to reduce energy costs and environmental damage caused by obsolete hardware.

On a global scale, the Internet and the World Wide Web are incredibly well suited for conducting business electronically (Valacich, Schneider, 2014). For example, products and services are able to be marketed over continental distances, websites can be connected to company databases for real-time access to information, and mass customization allows for firms to tailor their products and services to meet the needs of their customers. Moreover, communications and transactions are simplified and instantaneous, improving response time between clients and businesses. Finally, marketing is improve significantly by a reaching a limitless audience through search engine keywords, email marketing, social media, etc.

    References
  • Intel. (n.d.). 50 Years of Moore’s Law. Retrieved June 23, 2016 from http://www.intel.com/content/www/us/en/silicon-innovations/moores-law-technology.html
  • Kurzweil, R. (7 March 2001). The Law of Accelerating Returns. Retrieved June 23, 2016 from http://www.kurzweilai.net/the-law-of-accelerating-returns
  • Valacich, J., & Schneider, C. (2014). Information Systems Today: Managing the Digital World. Upper Saddle River, NJ: Pearson Education, Inc.