The document considers the key concepts of virtual data rooms and their use in the business environment and everyday life. Virtual data rooms can be used as a corporate document storage, a communication board, a secure document exchange, a mergers or acquisitions, a fundraising, an initial public offering, a strategic partnership, an audits, an increase in venture capital and an intellectual property management.Next main competitors are considered for analyses: iDeals Virtual Data Room, Citrix ShareFile, Merrill DataSite, Box Virtual Data Room, CapLinked, Intralinks Dealspace, Brainloop Secure Dataroom, Ansadara.A comparative analysis has been conducted to identify the key advantages and disadvantages of virtual data rooms. Based on the analysis of competitors, the key requirements for the architectural solution have been identified, which should take into account the basic needs of the existing business. This is scalability, failure stability and peak system load.Scalability is considered in terms of the possibility of spreading the system in the future to different countries and regions. With regard to fault tolerance, the ability of the computer system to cope with errors during execution or to continue work, despite deviations during operation or at peak load of the system, is taken into account.The result is a general virtual data room architecture that meets the above software needs. The architecture is presented in terms of logical, process and physical representation, which allows to cover the needs of the system from several sides and provide an opportunity to get acquainted with it from different points of view. The logical representation reflects the functionality provided to the end user by the system.The presentation of the process concerns the dynamic aspects of the system, explains the system processes and ways of their communication, and focuses on the behavior of the system in the execution process. In terms of physical representation, it illustrates the system from the programmer’s point of view and relates to software management.Manuscript received 12.06.2020
Read full abstract