Introduction
Software as a Service (SaaS) has the potential to transform the way information-technology (IT) departments relate to and even think about their role as providers of computing services to the rest of the enterprise. The emergence of SaaS as an effective software-delivery mechanism creates an opportunity for IT departments to change their focus from deploying and supporting applications to managing the services that those applications provide. A successful service-centric IT, in turn, directly produces more value for the business by providing services that draw from both internal and external sources and align closely with business goals.
This is the third article in our series about SaaS. The first two articles, which can be found by clicking here, focused on the details of developing SaaS applications and providing them to customers. This time, we'd like to turn the question around and look at SaaS from the perspective of the enterprise consumer: How can IT departments benefit from adding SaaS applications to their portfolio of services? What are the implications of adding externally hosted applications to an enterprise-computing environment? What will one have to do to get ready for SaaS? This article will address all these points and examine a few special cases in which it might make sense for your department to become a SaaS provider, as well as a consumer.
Understanding SaaS
Simply put, SaaS can be defined as "software deployed as a hosted service and accessed over the Internet."
SaaS as a concept is often associated with the application service providers (ASPs) of the 1990s, which provided "shrink-wrap" applications to business users over the Internet. These early attempts at Internet-delivered software had more in common with traditional on-premise applications than with modern SaaS applications in some ways, such as licensing and architecture. Because these applications were originally built as single-tenant applications, their ability to share data and processes with other applications was limited, and they tended to offer few economic benefits over their locally installed counterparts.
Today, SaaS applications are expected to take advantage of the benefits of centralization through a single-instance, multi-tenant architecture, and to provide a feature-rich experience competitive with comparable on-premise applications. A typical SaaS application is offered either directly by the vendor or by an intermediary party called an aggregator, which bundles SaaS offerings from different vendors and offers them as part of a unified application platform.
In contrast to the one-time licensing model commonly used for on-premise software, SaaS application access is frequently sold using a subscription model, with customers paying an ongoing fee to use the application. Fee structures vary from application to application; some providers charge a flat rate for unlimited access to some or all of the application's features, while others charge varying rates that are based on usage.
On the technical side, the SaaS provider hosts the application and data centrally—deploying patches and upgrades to the application transparently, and delivering access to end users over the Internet through a browser or smart-client application. Many vendors provide application programming interfaces (API) that expose the applications data and functionality to developers for use in creating composite applications. A variety of security mechanisms can be used to keep sensitive data safe in transmission and storage. Applications providers might provide tools that allow customers to modify the data schema, workflow, and other aspects of the application's operation for their use.
Benefits of Consuming SaaS
Of course, just because you can add SaaS to your IT infrastructure is not by itself a reason to do it; there has to be a viable business reason, too. SaaS offers substantial opportunities for organizations of all sizes to shift the
Correctional Health Care Increasing Staff Motivation and Satisfaction MGMT 591: Leadership and Organizational Behavior Professor Brett Gordon December 17, 2012 The organization that will be the topic of discussion in my final project paper is Georgia Health Sciences Universities (GHSU), Georgia Correctional Healthcare (GCHC) division. GHSU is both a hospital and teaching institution based in Augusta, Georgia. GHSU was founded in 1828. Georgia Health Sciences University is home to…
companies use shady accounting practices to enflate revenue or hide losses, the public can’t get an accurate picture of what they are investing in. The public demanded that something be done, so in 2002 the U.S. govt passed the Sabex-Oxly act. For my term paper I will examine some the corporate scandals that led to the creation of the act. Deragulation was lobbied for hard on wall street during the Bush Presidency. The public was lead to believe that loosing the rules on corporate practices would lead…
Learning activity Term Paper Test for Hidden Bias The Implicit Association Test, tests for unconscious biases. I chose this learning activity to see if I have any hidden biases. I have always believed that I was a straight shooter never putting on a facade or giving a false presentation of myself. To prepare for taking this activity, I made sure that I was in a quiet room, away from any distractions. I concentrated on each activity as they appeared on my computer screen. I chose six categories to…
who understand these concepts grow as well. These talented individuals can be looked at from several different viewpoints and depending on who that person may be could in fact determine whether it is a positive viewpoint or a negative one. In this paper I will prove why it is necessary to have Ethical Hackers in today’s security models and how they have come a long way to improve how our information systems operate in a more secure manner. Hacker’s for years have been able to do things that the…
issues that occur there are many that people may not be aware of, but the ones that will be discussed to explore ethical situations are Unauthorized Access related to software, hardware, network, internet web mining, IT freedom and hacking. This paper examines how each unauthorized access should be handled and provides examples of each related area of security. Security – Unauthorized Access Unauthorized access is known as the act of gaining access to a network, system,…
The Emancipation Proclamation and the Death of an American Hero. Students Name Professor’s Name History 150 Online 10 March 2014 There were many different events that happened during the time of President Abraham Lincoln and the Civil War. President Abraham Lincoln came up with the Emancipation Proclamation which was an effort to help end slavery, eventually leading to the thirteenth amendment to abolish slavery altogether. Sadly his life was cut short. John Wilkes Booth assassinated him…
Progressive Roots - In the beginning of the 1900s, America had 76 million people, mostly in good condition. Then before the first decade of the 20th century, the U.S. would be influenced by a “Progressive movement’ that fought against monopolies, corruption, inefficiency, and social injustice. 1. The purpose of the Progressives was to use the government as an agency of human welfare. - The Progressives had their roots in the Greenback Labor Party of the 1870s and 1880s and the Populist Party…
Community Organization September 16 2013 Compare and Contrast Community Organizations The two community organizations that I choose to compare and contrast is Do-All,Inc and United Way. I have worked with both of these organizations in the past, and they are both really good organizations, and do a lot of improve the overall community. Do-All, Inc. evolved from a dream for a better life for people with disabilities. Do-All, Inc was formed in 1952 by the Bay County Association of Retarded Citizens…
Pediatric Oncology Nursing Did you know that one in one hundred new nurses will become a pediatric oncology nurse? Pediatric oncology nursing is a very demanding and heartwarming career. To be a pediatric oncology nurse means to be a primary care coordinator for the management of patients with cancer. A pediatric oncology nurse will assess patient needs, implementing a plan with appropriate tasks for the patient to gain progress. Not only will the pediatric oncology nurse help with the patient…
he Glass Menagerie is a very character oriented poem. Tom, Amanda, and Laura are all very well developed characters. They all have significant and unique characteristics that are shown well throughout the poem. Tom is the most interesting to me though because of his qualities and even his flaws. Tom has a few different and contradicting characteristics such as he is easily persuaded, his determination and his strong sense of guilt. Tom Wingfield seems to be easily entrapped and persuaded into…