Enterprise Architecture

Slides:



Advertisements
Similar presentations
CHAPTER 5: LEARNING OUTCOMES
Advertisements

IT ARCHITECTURES CHAPTER 5
Enterprise Architectures
BUSINESS PLUG-IN 4 IT ARCHITECTURES CIS 429: Business Information Systems.
Business Plug-In B4 MIS Infrastructures.
McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved BUSINESS DRIVEN TECHNOLOGY Chapter Twenty: Developing a 21 st Century.
McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved. 8-1 BUSINESS DRIVEN TECHNOLOGY Chapter Eight: Viewing and Protecting Organizational.
Discovering Computers Fundamentals, 2011 Edition Living in a Digital World.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering.
1 Chapter 7 IT Infrastructures Business-Driven Technology
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Business Plug-In B4 Enterprise Architecture.
Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin CHAPTER FIVE INFRASTRUCTURES: SUSTAINABLE TECHNOLOGIES CHAPTER.
CHAPTER FIVE INFRASTRUCTURES SUSTAINABLE TECHNOLOGIES CHAPTER FIVE INFRASTRUCTURES SUSTAINABLE TECHNOLOGIES Copyright © 2015 McGraw-Hill Education. All.
CIS 310 Management Information Systems Infrastructure.
CHAPTER OVERVIEW SECTION 5.1 – MIS INFRASTRUCTURE
McGraw-Hill/Irwin ©2005 The McGraw-Hill Companies, All rights reserved ©2005 The McGraw-Hill Companies, All rights reserved McGraw-Hill/Irwin.
IT ARCHITECTURES Systems Infrastructure IT ARCHITECTURES Systems Infrastructure Ref. IS Today (Valacich & Schneider) Copyright © 2010 Pearson Education,
CHAPTER FIVE Enterprise Architectures. Enterprise Architecture (Introduction) An enterprise-wide plan for managing and implementing corporate data assets.
Chapter CHAPTER FIVE OVERVIEW SECTION MANAGING ENTERPRISE ARCHITECTURES  Enterprise Architectures  Information Architecture  Infrastructure.
CHAPTER FIVE INFRASTRUCTURES SUSTAINABLE TECHNOLOGIES
CHAPTER FIVE INFRASTRUCTURES: SUSTAINABLE TECHNOLOGIES
IT infrastructure Introduction Tehran university Mahdi Faghihi 2012 In The Name of God.
David N. Wozei Systems Administrator, IT Auditor.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
McGraw-Hill/Irwin © The McGraw-Hill Companies, All Rights Reserved BUSINESS PLUG-IN B17 Organizational Architecture Trends.
©2006 Merge eMed. All Rights Reserved. Energize Your Workflow 2006 User Group Meeting May 7-9, 2006 Disaster Recovery Michael Leonard.
Chapter © 2006 The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/ Irwin Chapter 7 IT INFRASTRUCTURES Business-Driven Technologies 7.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B4 Enterprise Architectures (on OLC)
IT Disaster Recovery CAUBO 2008 Information Systems and Technology.
7-1 Management Information Systems for the Information Age Chapter 7 IT Infrastructures Business-Driven Technology.
1 Nassau Community CollegeProf. Vincent Costa Session 7 Infrastructures Sustainable Technologies CMP 117 Business Computing: Concepts &Applications.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Business Plug-In B17 Organizational Architecture Trends.
Chapter 7 Enterprise Infrastructure, Metrics, and Business Continuity Planning: Building and Sustaining the Dynamic Enterprise Copyright © 2010 by the.
7-1 Management Information Systems for the Information Age Copyright 2004 The McGraw-Hill Companies, Inc. All rights reserved Chapter 7 IT Infrastructures.
Opening Case: Cloud Computing in Canada
PPTTEST 10/24/ :07 1 IT Ron Williams Business Innovation Through Information Technology IS Organization.
Chapter 5 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Enterprise Architectures.
Chapter 5 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
BUSINESS DRIVEN TECHNOLOGY Developing a 21st Century Organization
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 5 ENTERPRISE ARCHITECTURES CHAPTER 5 ENTERPRISE ARCHITECTURES Business Driven.
Chap 8: Administering Security.  Security is a combination Technical – covered in chap 1 Administrative Physical controls SE571 Security in Computing.
Slide 1 Security Engineering. Slide 2 Objectives l To introduce issues that must be considered in the specification and design of secure software l To.
What Is Enterprise Computing?
Enterprise Architectures
Providing Application High Availability
Adam Backman Chief Cat Wrangler – White Star Software
Network Attached Storage Overview
BEST CLOUD COMPUTING PLATFORM Skype : mukesh.k.bansal.
Discovering Computers 2010: Living in a Digital World Chapter 14
Data and database administration
IT ARCHITECTURES CHAPTER 5 McGraw-Hill/Irwin
Building a Virtual Infrastructure
SmartHOTEL Planner Add-In for Outlook: Office 365 Integration Enhances Room Planning, Booking, and Guest Management for Small Hotels and B&Bs OFFICE 365.
in All Office 365 Apps for Enterprise Companies
Security Engineering.
CHAPTER OVERVIEW SECTION 5.1 – MIS INFRASTRUCTURE
IBM Start Now Host Integration Solutions
+Vonus: An Intuitive, Cloud-Based Point-of-Sale Solution That’s Powered by Microsoft Office 365 with Tools to Increase Sales Using Social Media OFFICE.
File Manager for Microsoft Office 365, SharePoint, and OneDrive: Extensible Via Custom Connectors in Enterprise Deployments, Ideal for End Users OFFICE.
IT INFRASTRUCTURES Business-Driven Technologies
BluVault Provides Secure and Cost-Effective Cloud Endpoint Backup and Recovery Using Power of Microsoft OneDrive Business and Microsoft Azure OFFICE 365.
Business Continuity Planning
SAMANVITHA RAMAYANAM 18TH FEBRUARY 2010 CPE 691
Emerging technologies-
Information Technology Services Strategic Directions
Nero Blanco Service Offering – Disaster Recovery as a Service
Information Technology Services Strategic Directions
Disaster Recovery at UNC
DATS International Portfolio.
Presentation transcript:

Enterprise Architecture Business Plug-In B4 Enterprise Architecture

LEARNING OUTCOMES Explain the three components of an enterprise architecture Describe how an organization can implement a solid information architecture List and describe the five qualities of an infrastructure architecture Compare Web services and open systems

Enterprise Architectures Enterprise architecture - includes the plans for how an organization will build, deploy, use, and share its data, processes, and IT assets Enterprise architect (EA) - a person grounded in technology, fluent in business, a patient diplomat, and provides the important bridge between IT and the business

Enterprise Architectures Primary goals of enterprise architectures

Enterprise Architectures

Information Architecture

Backup and Recovery Backup - an exact copy of a system’s information Recovery - the ability to get a system up and running in the event of a system crash or failure and includes restoring the information backup Fault tolerance Failover

Disaster Recovery Disaster recovery best practices include: Mind the enterprise architectures Monitor the quality of computer networks that provide data on power suppliers and demand Make sure the networks can be restored quickly in the case of downtime Set up disaster recovery plans Provide adequate staff training, including verbal communication protocols “so that operators are aware of any IT-related problems

Disaster Recovery Financial institutions Worldwide Spending on Disaster Recovery

Disaster Recovery Disaster recovery plan - a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood Disaster recovery cost curve - charts (1) the cost to the organization of the unavailability of information and technology and (2) the cost to the organization of recovering from a disaster over time Hot site Cold site

Disaster Recovery

Information Security A good information architecture includes: A strong information security plan Managing user access Up-to-date antivirus software and patches

Infrastructure Architecture

Infrastructure Architecture Five primary characteristics of a solid infrastructure architecture: Flexibility Scalability Reliability Availability Performance

Application Architecture Application architecture - determines how applications integrate and relate to each other

Web Services Web service - contains a repertoire of Web-based data and procedural resources that use shared protocols and standards permitting different applications to share data and services Interoperability - the capability of two or more computer systems to share data and resources, even though they are made by different manufacturers

Web Services Event - detect threats and opportunities and alert those who can act on the information Service - more like software products than they are coding projects, and must appeal to a broad audience, and they need to be reusable if they are going to have an impact on productivity

Open Systems Open system - a broad, general term that describes nonproprietary IT hardware and software made available by the standards and procedures by which their products work, making it easier to integrate them Allow systems to seamlessly share information Capitalize on enterprise architectures Eliminate proprietary systems and promote competitive pricing

Closing Case One Chicago Tribune’s Server Consolidation a Success The Chicago Tribune is the seventh-largest newspaper in the country Overhauling its data center and consolidating servers was a difficult task; however, the payoff was tremendous

Closing Case One Questions Review the five characteristics of infrastructure architecture and rank them in order of their potential impact on the Tribune Co.’s business What is the disaster recovery cost curve? Where should the Tribune Co. operate on the curve? Define backups and recovery. What are the risks to the Tribune’s business if it fails to implement an adequate backup plan?

Closing Case One Questions Why is a scalable and highly available enterprise architecture critical to the Tribune Co.’s current operations and future growth? Identify the need for information security at the Tribune Co. How could the Tribune Co. use a classified ad Web service across its different businesses?

Closing Case Two Fear the Penguin Linus Torvalds, who wrote the kernel (the core) of the Linux operating system at age 21, posted the operating system on the Internet and invited other programmers to improve his code and users to download his operating system for free Since then, tens of thousands of people have, making Linux perhaps the single largest collaborative project in the planet’s history

Closing Case Two Fear the Penguin How does Linux differ from traditional software? Should Microsoft consider Linux a threat? Why or why not? How is open source software a potential trend shaping organizations?

Closing Case Two Fear the Penguin How can you use Linux as an emerging technology to gain a competitive advantage? Research the Internet and discover potential ways that Linux might revolutionize business in the future