Information Technology IT and Architecture Essay
- Length: 5 pages
- Subject: Business
- Type: Essay
- Paper: #31347033
Excerpt from Essay :
The architecture of IT has to be created through the development of models, guidelines, and specifications (Allen & Morton, 1994). The kinds of processes that are generally used have been created in recent decades in order to meet the needs of those who are focused on the quality of IT. With that in mind, IT architecture is the structure that is designed to actually operate and use IT properly. Without it, the IT department of any company would not be nearly as successful, and that could cause the entire company to struggle. Any good IT system has to be built around the specifications that are needed in order to allow it to work the way it is intended and provide what is needed for the company (Allen & Morton, 1994). An IT department has to be ready for nearly everything, because companies rely so much on technology that they would be lost without it.
The operation of the IT department is essential to the operation of the company, and if the architecture behind the IT department is not designed to handle the company's needs, that can be reflected in the quality of service given to customers (Allen & Morton, 1994). At that point, the company may lose those customers because it will not be able to provide them with what they need. Employees at the company can have a similar feeling about the business if there are issues with technology, because it does not inspire confidence or encourage a person to want to continue to work for that company (Allen & Morton, 1994). When IT architecture is set up properly, though, employees and customers both get great benefits from that, as it provides a great deal of value to everyone involved.
Allen, T., Morton, M.S. (eds.). (1994). Information technology and the corporation of the 1990s. New York: Oxford University Press.
2. Explain the three-tier software architecture design.
Three-tier software architecture design is a type of client-server architecture. There are separate platforms and independent modules that are developed and maintained, including data access, functional process logic, user interface, and computer data storage (Fowler, 2002). By having these in independent modules and on separate platforms, it can protect one module or platform if something is to happen to any or all of the others. The tiers can also be replaced independently, and they can be upgraded, as well (Fowler, 2002). A desktop PC can handle the standard user interface, and various modules can easily run on the application server (Fowler, 2002). The middle tiers are multitiered, and the database server contains the computer data storage logic (Fowler, 2002). The three separate tiers are the presentation tier, application tier, and the data tier (Fowler, 2002). Each one has a very specific function, and they all work together to provide success from start to finish.
The presentation tier is on the top level, and displays all the information that is related to the website's available services. It is able to communicate with the other tiers by sending results to the other network tiers and the browser (Fowler, 2002). The second tier is the application tier, which is also called the logic tier or business logic. It is attached to the presentation tier, and performs highly detailed processing, which allows it to control the overall functionality of the application itself (Fowler, 2002). The third tier is the data tier. It houses the servers where all of the information is located and retrieved from (Fowler, 2002). The information that is stored on this tier is independent of business logic or the application servers, so it is directly protected from problems that could occur on one of the other tiers (Fowler, 2002). Having a multitiered approach is excellent protection for any architecture design.
Fowler, M. (2002). Patterns of enterprise application architecture. NY: Addison Wesley.
3. Define triple constraint. What is the critical path?
Triple constraint is a triangle that is made up of time, scope, and cost (Lewis, 2005). When something is done to one of the constraints, it affects what happens to the other two constraints (Lewis, 2005). When a person has to change a project, he or she needs to be aware that any change can become a big change depending on how that change affects each one of the legs of the triangle. It is very important that a project is managed with each of the constraints in mind, all the time (Lewis, 2005). By doing that, there is less of a chance that the project will become something with which the client is not happy, or that it will take too long to complete or be over budget. These kinds of things can still happen, but it is easier to avoid them if a person is very clear on what he or she needs to address regarding the constraints themselves. The quality of the service or product will also be affected when one or more constraints are adjusted, and that is something about which a company must definitely be aware (Lewis, 2005).
The critical path is an important part of addressing a triple constraint. It defines the total length of the overall project (Lewis, 2005). Any task along the critical path that is changed or that slips, even by a day, can drastically affect the entire length of the project itself (Lewis, 2005). If that takes place, a company could be in serious trouble based on promised deadlines, which could lead the company to take shortcuts that would cause problems with the quality of the good or service it had agreed to provide (Lewis, 2005). That can generally be avoided by providing some leeway in the critical path, because that allows for small difficulties and minor changes that will not completely derail the entire timeline for the project. The more careful the company is with the triple constraint triangle and the critical path, the more likely it is that the company will be successful in its project endeavor.
Lewis, J.P. (2005). Project planning, scheduling & control. (4th ed.). NY: McGraw Hill.
4. Define the eight stages of the SDLC.
The eight stages of the Systems Development Life Cycle (SDLC) are system investigation, system analysis, design, environments, testing, training and transition, operations and maintenance, and evaluation (Blanchard & Fabrycky, 2006). The system investigation stage is focused on determining an opportunity or a need within the current system. The system analysis narrows the focus even more, to determine exactly where the opportunity or problem lies (Blanchard & Fabrycky, 2006). That is needed before an attempt to actually fix the system can be made. By breaking the system down into components, the area where the problem is being seen can be more easily discovered. Then design takes place, in order to clearly see how the problem is going to be fixed within the system, and what kinds of benefits will be achieved (Blanchard & Fabrycky, 2006).
Environments are controlled areas, so developers can build, install, and test things before they "go live" in the system itself. The creation of these environments is a valuable and protective step in the process (Blanchard & Fabrycky, 2006). Testing comes next, and it needs to be thorough, clear, and extensive in order to make sure every possible scenario has been considered. Overlooking things can cause serious problems down the line. Adequate testing of a system logically moves into training and transition, so everyone who needs to know how to work the system is able to do so during and after the transition (Blanchard & Fabrycky, 2006). Then the system will continue to operate, and it will be maintained and monitored in order to make sure it does not develop further problems (Blanchard & Fabrycky, 2006). Evaluation is the final step, used to measure how effective the…