According to the script, The Top Secret, Inc. Operating System (TSI OS) provides high-quality services to a large number of customers from a variety of industries. However, problems identified at the company’s back office might reduce the efficiency of the company. The main issues of the work of headquarters are the reason for the business-related challenges including technological lag, the urgent need to switch to modern hardware, and security vulnerabilities.
Several business-related challenges can be located for the organization because TSI OS support for the general-purpose operating system (GPOS) is not modern. According to the provided matrix, TSI faces severe difficulties in optimizing its labor, which manifests itself in the inability to run more than one program at the same moment, software incompatibility, and the need to regularly reboot operating systems as a result of errors associated with insufficient memory. Moreover, TSI software developers are forced to work in limited conditions related to creating custom device drivers and storing information on primitive media. Sadowski et al. (2018) provide an example of work processes in Google, in which a lot of attention is paid to multitasking and the ability to respond to changes quickly. Lack of technologies will not allow TSI to react rapidly to changes in the market and meet new needs of customers, which is essential to maintain competitiveness in IT technologies.
Timely updating of the working equipment is one of the critical factors in a large company’s success. In the conditions under which TSI needs to use old single-core processors, several difficulties arise at once. First, each new hardware generation is more productive than the previous one (Serre and Püschel, 2019). Second, the use of outdated technologies leads to a decrease in the company’s efficiency: over time, an increasing part of the workflow will have to be spent on fixing and replacing old processors. In conditions of using inadequate quality working equipment, depreciation costs will continuously grow, and labor efficiency will fall, which eventually will lead to the loss in the quality of the final product and systemic processing of company employees.
Besides, TSI’s main product is the operating system, which is the subject of the company’s intellectual property and is associated with industrial and commercial secrets. The security system’s significant issues can lead not only to the theft of technologies by competing companies but also to the leakage of information about the TSI customers (Stergiou et al., 2018). Given the high status of most of the company’s clients, this kind of vulnerability can cause irreparable damage to the company’s reputation.
The aforementioned shortcomings of the TSI production process would negatively affect the personal level of productivity. The inability to work on modern equipment would lead to the fact that instead of performing work or educational tasks, a person spends the vast majority of his time correcting errors. The use of the latest technologies, especially in the IT field, is a prerequisite for sufficient work.
A lack of technological features of modern operating systems leads Top Secret, Inc. to face some problems associated with managing a business. Features such as working on old equipment, the inability to optimize the workflow, and security vulnerabilities can severely negatively impact the company. In a high-tech business environment, the latest advances in hardware and software development should first of all be implemented by manufacturing companies. Otherwise, the competitiveness of such firms will rapidly decline.
References
Sadowski, C., Söderberg, E., Church, L., Sipko, M., & Bacchelli, A. (2018). Modern code review: A case study at Google. In Proceedings of the 40th International Conference on Software Engineering: Software Engineering in Practice (pp. 181-190). Web.
Serre, F., & Püschel, M. (2019). DSL-based hardware generation with Scala: example fast fourier transforms and sorting networks. ACM Transactions on Reconfigurable Technology and Systems (TRETS), 13(1), 1-23. Web.
Stergiou, C., Psannis, K. E., Gupta, B. B., & Ishibashi, Y. (2018). Security, privacy & efficiency of sustainable cloud computing for big data & IoT. Sustainable Computing: Informatics and Systems, 19, 174-184. Web.