Note: Sample below may appear distorted but all corresponding word document files contain proper formattingExcerpt from Essay:
The architecture of IT has to be created through the development of models, guidelines, and specifications (Allen & Morton, 1994). The kinds of processes that are generally used have been created in recent decades in order to meet the needs of those who are focused on the quality of IT. With that in mind, IT architecture is the structure that is designed to actually operate and use IT properly. Without it, the IT department of any company would not be nearly as successful, and that could cause the entire company to struggle. Any good IT system has to be built around the specifications that are needed in order to allow it to work the way it is intended and provide what is needed for the company (Allen & Morton, 1994). An IT department has to be ready for nearly everything, because companies rely so much on technology that they would be lost without it.
The operation of the IT department is essential to the operation of the company, and if the architecture behind the IT department is not designed to handle the company's needs, that can be reflected in the quality of service given to customers (Allen & Morton, 1994). At that point, the company may lose those customers because it will not be able to provide them with what they need. Employees at the company can have a similar feeling about the business if there are issues with technology, because it does not inspire confidence or encourage a person to want to continue to work for that company (Allen & Morton, 1994). When IT architecture is set up properly, though, employees and customers both get great benefits from that, as it provides a great deal of value to everyone involved.
Allen, T., Morton, M.S. (eds.). (1994). Information technology and the corporation of the 1990s. New York: Oxford University Press.
2. Explain the three-tier software architecture design.
Three-tier software architecture design is a type of client-server architecture. There are separate platforms and independent modules that are developed and maintained, including data access, functional process logic, user interface, and computer data storage (Fowler, 2002). By having these in independent modules and on separate platforms, it can protect one module or platform if something is to happen to any or all of the others. The tiers can also be replaced independently, and they can be upgraded, as well (Fowler, 2002). A desktop PC can handle the standard user interface, and various modules can easily run on the application server (Fowler, 2002). The middle tiers are multitiered, and the database server contains the computer data storage logic (Fowler, 2002). The three separate tiers are the presentation tier, application tier, and the data tier (Fowler, 2002). Each one has a very specific function, and they all work together to provide success from start to finish.
The presentation tier is on the top level, and displays all the information that is related to the website's available services. It is able to communicate with the other tiers by sending results to the other network tiers and the browser (Fowler, 2002). The second tier is the application tier, which is also called the logic tier or business logic. It is attached to the presentation tier, and performs highly detailed processing, which allows it to control the overall functionality of the application itself (Fowler, 2002). The third tier is the data tier. It houses the servers where all of the information is located and retrieved from (Fowler, 2002). The information that is stored on this tier is independent of business logic or the application servers, so it is directly protected from problems that could occur on one of the other tiers (Fowler, 2002). Having a multitiered approach is excellent protection for any architecture design.
Fowler, M. (2002). Patterns of enterprise application architecture. NY: Addison Wesley.
3. Define triple constraint. What is the critical path?
Triple constraint is a triangle that is made up of time, scope, and cost (Lewis, 2005). When something is done to one of the constraints, it affects what happens to the other two constraints (Lewis, 2005). When a person has to change a project, he or she needs to be aware that any change can become a big change depending on how that change affects each one of the legs of the triangle. It is very important that a project is managed with each of the constraints in mind, all the time (Lewis, 2005). By doing that, there is less of a chance that the project will become something with which the client is not happy, or that it will take too long to complete or be over budget. These kinds of things can still happen, but it is easier to avoid them if a person is very clear on what he or she needs to address regarding the constraints themselves. The quality of the service or product will also be affected when one or more constraints are adjusted, and that is something about which a company must definitely be aware (Lewis, 2005).
The critical path is an important part of addressing a triple constraint. It defines the total length of the overall project (Lewis, 2005). Any task along the critical path that is changed or that slips, even by a day, can drastically affect the entire length of the project itself (Lewis, 2005). If that takes place, a company could be in serious trouble based on promised deadlines, which could lead the company to take shortcuts that would cause problems with the quality of the good or service it had agreed to provide (Lewis, 2005). That can generally be avoided by providing some leeway in the critical path, because that allows for small difficulties and minor changes that will not completely derail the entire timeline for the project. The more careful the company is with the triple constraint triangle and the critical path, the more likely it is that the company will be successful in its project endeavor.
Lewis, J.P. (2005). Project planning, scheduling & control. (4th ed.). NY: McGraw Hill.
4. Define the eight stages of the SDLC.
The eight stages of the Systems Development Life Cycle (SDLC) are system investigation, system analysis, design, environments, testing, training and transition, operations and maintenance, and evaluation (Blanchard & Fabrycky, 2006). The system investigation stage is focused on determining an opportunity or a need within the current system. The system analysis narrows the focus even more, to determine exactly where the opportunity or problem lies (Blanchard & Fabrycky, 2006). That is needed before an attempt to actually fix the system can be made. By breaking the system down into components, the area where the problem is being seen can be more easily discovered. Then design takes place, in order to clearly see how the problem is going to be fixed within the system, and what kinds of benefits will be achieved (Blanchard & Fabrycky, 2006).
Environments are controlled areas, so developers can build, install, and test things before they "go live" in the system itself. The creation of these environments is a valuable and protective step in the process (Blanchard & Fabrycky, 2006). Testing comes next, and it needs to be thorough, clear, and extensive in order to make sure every possible scenario has been considered. Overlooking things can cause serious problems down the line. Adequate testing of a system logically moves into training and transition, so everyone who needs to know how to work the system is able to do so during and after the transition (Blanchard & Fabrycky, 2006). Then the system will continue to operate, and it will be maintained and monitored in order to make sure it does not develop further problems (Blanchard & Fabrycky, 2006). Evaluation is the final step, used to measure how effective the…[continue]
"Information Technology IT And Architecture" (2014, April 30) Retrieved December 8, 2016, from http://www.paperdue.com/essay/information-technology-it-and-architecture-188694
"Information Technology IT And Architecture" 30 April 2014. Web.8 December. 2016. <http://www.paperdue.com/essay/information-technology-it-and-architecture-188694>
"Information Technology IT And Architecture", 30 April 2014, Accessed.8 December. 2016, http://www.paperdue.com/essay/information-technology-it-and-architecture-188694
IT Acquisition Management for a new Video Shop Individual Project Activities Identification of a problem Organization: Component: Showtime Video Store Business Capture Group The problem is that there is no real information technology security measure employed in the video shop. There is very little awareness of the necessary IT security measures amongst the current management heads which is why they need an effective IT security plan and structure to implement to ensure there is no copyright infringement
Implementing a private Cloud-based ILS will give each department real-time availability of data from both the ECM and EKM systems, tailored to the specific roles through the use of customizable ILS-based interfaces. One of the most critical success factors of implementing any new enterprise system is to plan for making everything form the workflows to individual screens as permeable and customizable as possible (Lampert, Vaughan, 2009). This is essential
information technology skills I acquired through the military are transferable to civilian situations. The 20 years I gave to the military have placed me in a wide variety of situations quite different from what others might encounter in civilian life. My experience in the U.S. Navy has allowed me to learn new skills in the information technology field and I have been able to apply them in new situations. The
Economics in the IT Industry -- Additional Four Pages for Your Essay Making Information Technologies a Competitive Strength The pace and depth of innovation continues to accelerate in all sectors of IT. Across all sectors, enterprise and organizations that choose to automate their core business processes using IT systems and platforms are gaining the greatest impact of all however. Manufacturing and services companies are adopting Enterprise Resource Planning (ERP) systems to streamline
Information Technology -- Annotated Bibliography Information Technology Baker, N. (2011). The Borderless Enterprise. Internal Auditor, August, 28 -- 33. This article endeavors to explain the various trends in digital media. The author contends the use of digital technology is evidence of a deeper trend and shift in global culture. The article is as philosophical as it is technical. This article could be considered a technical article or a philosophy of technology article. Durkee, D.
Information Technology Customization and Standardization: A View of Cloud and Grid Computing Sequencing a genome, storing vast video libraries, or utilizing a non-essential application for occasional use are all functions performed within the realm of information technology. Meeting a particular task need was once the challenge of the end user or organization to ascertain their current and future use to guide their technology purchases. In the not so distant past, limitations of
Linux Kernel Analysis Much has been written in praise of the Linux (Crandall, Wu, Chong, 359), (Parnas, 112), (Baliga, Iftode, Chen, 323), and its use of preemptive multitasking memory architectures to manage process control, file management, device management, information maintenance and communications subsystems securely and effectively. The Linux modular design, lack of reliance on Remote Procedure Calls (RPC), and use of UNIX-based system administration all are often cited as factors in how