BUSINESS PLUG-IN 4 IT ARCHITECTURES CIS 429: Business Information Systems.

Slides:



Advertisements
Similar presentations
CHAPTER 5: LEARNING OUTCOMES
Advertisements

Pros and Cons of Cloud Computing Professor Kam-Fai Wong Faculty of Engineering The Chinese University of Hong Kong.
Enterprise Architectures
Business Plug-In B4 MIS Infrastructures.
Recovery Planning A Holistic View Adam Backman, President White Star Software
Building an Operational Enterprise Architecture and Service Oriented Architecture Best Practices Presented by: Ajay Budhraja Copyright 2006 Ajay Budhraja,
High Availability 24 hours a day, 7 days a week, 365 days a year… Vik Nagjee Product Manager, Core Technologies InterSystems Corporation.
9 - 1 Computer-Based Information Systems Control.
McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved. 8-1 BUSINESS DRIVEN TECHNOLOGY Chapter Eight: Viewing and Protecting Organizational.
Iron Mountain’s Continuity Service ©2006 Iron Mountain Incorporated. All rights reserved. Iron Mountain and the design of the mountain are registered.
Distributed components
Discovering Computers Fundamentals, 2011 Edition Living in a Digital World.
VMware Update 2009 Daniel Griggs Solutions Architect, Virtualization Servers & Storage Solutions Practice Dayton OH.
1 Chapter 7 IT Infrastructures Business-Driven Technology
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Business Plug-In B4 Enterprise Architecture.
Managing Information Systems Information Systems Security and Control Part 2 Dr. Stephania Loizidou Himona ACSC 345.
Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin CHAPTER FIVE INFRASTRUCTURES: SUSTAINABLE TECHNOLOGIES CHAPTER.
CHAPTER FIVE INFRASTRUCTURES SUSTAINABLE TECHNOLOGIES CHAPTER FIVE INFRASTRUCTURES SUSTAINABLE TECHNOLOGIES Copyright © 2015 McGraw-Hill Education. All.
CIS 310 Management Information Systems Infrastructure.
1 Disaster Recovery Planning & Cross-Border Backup of Data among AMEDA Members Vipin Mahabirsingh Managing Director, CDS Mauritius For Workgroup on Cross-Border.
Chapter 8: Disaster Management
Securing and Auditing Cloud Computing Jason Alexander Chief Information Security Officer.
CHAPTER OVERVIEW SECTION 5.1 – MIS INFRASTRUCTURE
Chapter 10 Information Systems Controls for System Reliability—Part 3: Processing Integrity and Availability Copyright © 2012 Pearson Education, Inc.
Disaster Recovery as a Cloud Service Chao Liu SUNY Buffalo Computer Science.
McGraw-Hill/Irwin ©2005 The McGraw-Hill Companies, All rights reserved ©2005 The McGraw-Hill Companies, All rights reserved McGraw-Hill/Irwin.
ATIF MEHMOOD MALIK KASHIF SIDDIQUE Improving dependability of Cloud Computing with Fault Tolerance and High Availability.
3 Cloud Computing.
IT ARCHITECTURES Systems Infrastructure IT ARCHITECTURES Systems Infrastructure Ref. IS Today (Valacich & Schneider) Copyright © 2010 Pearson Education,
CHAPTER FIVE Enterprise Architectures. Enterprise Architecture (Introduction) An enterprise-wide plan for managing and implementing corporate data assets.
Chapter CHAPTER FIVE OVERVIEW SECTION MANAGING ENTERPRISE ARCHITECTURES  Enterprise Architectures  Information Architecture  Infrastructure.
Security Operations. 2 Domain Objectives Protection and Control of Data Processing Resources Media Management Backups and Recovery Change Control Privileged.
CHAPTER FIVE INFRASTRUCTURES SUSTAINABLE TECHNOLOGIES
CHAPTER FIVE INFRASTRUCTURES: SUSTAINABLE TECHNOLOGIES
IT infrastructure Introduction Tehran university Mahdi Faghihi 2012 In The Name of God.
David N. Wozei Systems Administrator, IT Auditor.
McGraw-Hill/Irwin © The McGraw-Hill Companies, All Rights Reserved BUSINESS PLUG-IN B17 Organizational Architecture Trends.
Co-location Sites for Business Continuity and Disaster Recovery Peter Lesser (212) Peter Lesser (212) Kraft.
©2006 Merge eMed. All Rights Reserved. Energize Your Workflow 2006 User Group Meeting May 7-9, 2006 Disaster Recovery Michael Leonard.
Chapter © 2006 The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/ Irwin Chapter 7 IT INFRASTRUCTURES Business-Driven Technologies 7.
7-1 Chapter 7 IT Infrastructures Business-Driven Technology.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B4 Enterprise Architectures (on OLC)
7-1 Management Information Systems for the Information Age Chapter 7 IT Infrastructures Business-Driven Technology.
1 Nassau Community CollegeProf. Vincent Costa Session 7 Infrastructures Sustainable Technologies CMP 117 Business Computing: Concepts &Applications.
7-1 Management Information Systems for the Information Age Copyright 2004 The McGraw-Hill Companies, Inc. All rights reserved Chapter 7 IT Infrastructures.
7-1 Management Information Systems for the Information Age Copyright 2004 The McGraw-Hill Companies, Inc. All rights reserved Chapter 7 IT Infrastructures.
Appendix C: Designing an Operations Framework to Manage Security.
7-1 Management Information Systems for the Information Age Copyright 2004 The McGraw-Hill Companies, Inc. All rights reserved Chapter 7 IT Infrastructures.
Chapter 5 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Enterprise Architectures.
Chapter 5 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
OSIsoft High Availability PI Replication
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 5 ENTERPRISE ARCHITECTURES CHAPTER 5 ENTERPRISE ARCHITECTURES Business Driven.
The Importance of Proper Controls. 5 Network Controls Developing a secure network means developing mechanisms that reduce or eliminate the threats.
Slide 1 Security Engineering. Slide 2 Objectives l To introduce issues that must be considered in the specification and design of secure software l To.
Ed Tech Audit Case Study Pete Reilly. Process Meetings with the Superintendent Extended meetings with the technology coordinator Meeting with each administrator.
Cloud Computing 3. TECHNOLOGY GUIDE 3: Cloud Computing 2 Copyright John Wiley & Sons Canada.
OSIsoft High Availability PI Replication Colin Breck, PI Server Team Dave Oda, PI SDK Team.
Enterprise Architectures
Chapter 19: Network Management
High Availability 24 hours a day, 7 days a week, 365 days a year…
IT ARCHITECTURES CHAPTER 5 McGraw-Hill/Irwin
Maximum Availability Architecture Enterprise Technology Centre.
Enterprise Architecture
CHAPTER OVERVIEW SECTION 5.1 – MIS INFRASTRUCTURE
IT INFRASTRUCTURES Business-Driven Technologies
3 Cloud Computing.
Increase and Improve your PC management with Windows Intune
Disaster Recovery at UNC
Final exam question format
Final exam question format
Presentation transcript:

BUSINESS PLUG-IN 4 IT ARCHITECTURES CIS 429: Business Information Systems

ENTERPRISE ARCHITECTURES Enterprise architecture  The plans for how an organization will build, deploy, use, and share its data, processes, and IT assets Enterprise architect (EA) - a person who is…  grounded in ____________  fluent in business  a patient diplomat  an important bridge between IT and the business

ENTERPRISE ARCHITECTURES

INFORMATION ARCHITECTURE: Backup and Recovery Backup  An exact ________ of a system’s information Recovery  The ability to get a system up and running Techniques used for backup and recovery  Fault _________: The ability to respond gracefully to an unexpected hardware or software failure.  Failover: A backup operation that automatically switches to a standby if the primary system fails.

INFORMATION ARCHITECTURE: Disaster Recovery Disaster recovery best practices:  Mind the enterprise architectures  Monitor the quality of computer _________  Make sure the networks can be restored quickly in the case of downtime  Set up disaster recovery plans  Provide adequate staff _________ so that operators are aware of any IT-related problems

INFORMATION ARCHITECTURE: Disaster Recovery Disaster recovery plan  A detailed process for recovering information or an IT system in the event of a disaster such as a fire or flood  Hot site—a separate fully-equipped facility  Cold site—a separate facility without computer equipment Disaster recovery cost _______  Charts the cost to the organization of the unavailability of information and technology  Charts the cost to the organization of recovering from a disaster over time

Disaster Recovery Cost Curve

INFORMATION ARCHITECTURE: Information Security A good information architecture includes a strong information security plan..  Managing user access  Up-to-date _________ software and patches

INFRASTRUCTURE ARCHITECTURE Infrastructure architecture  The hardware, software, and _________________ equipment that support the organization’s goals Five primary characteristics of a solid infrastructure architecture: 1. Flexibility—can handle all types of business changes 2. Scalability—adapting to increasing demands 3. Reliability—functioning properly 4. Availability—high degree of _________ 5. Performance—________ at performing processes

APPLICATION ARCHITECTURE Application architecture  Determines how applications integrate and relate to each other Recent techniques:

Web Services Web service  A standardized way of integrating Web-based applications using the XML, SOAP, WSDL and UDDI open standards over an Internet protocol backboneXMLSOAPWSDLUDDIopenstandardsInternetprotocolbackbone  Events—Conditions that signal threats and opportunities, and alert those who can act on the information  Service--_________ software products that appeal to a broad audience Interoperability  The ability of software and hardware on different machines from different vendors to share data.

Open Systems Nonproprietary IT hardware and software made available by standards and procedures that  Allow systems to seamlessly share information  Capitalize on enterprise architectures  Eliminate ___________ systems and promote competitive pricing For example  Linux  A freely-distributable open source operating system that runs on a number of hardware platforms.  Open Office Open Office