Presentation is loading. Please wait.

Presentation is loading. Please wait.

BUSINESS PLUG-IN 4 IT ARCHITECTURES CIS 429: Business Information Systems.

Similar presentations


Presentation on theme: "BUSINESS PLUG-IN 4 IT ARCHITECTURES CIS 429: Business Information Systems."— Presentation transcript:

1 BUSINESS PLUG-IN 4 IT ARCHITECTURES CIS 429: Business Information Systems

2 ENTERPRISE ARCHITECTURES Enterprise architecture  The plans for how an organization will build, deploy, use, and share its data, processes, and IT assets Enterprise architect (EA) - a person who is…  grounded in ____________  fluent in business  a patient diplomat  an important bridge between IT and the business

3 ENTERPRISE ARCHITECTURES

4 INFORMATION ARCHITECTURE: Backup and Recovery Backup  An exact ________ of a system’s information Recovery  The ability to get a system up and running Techniques used for backup and recovery  Fault _________: The ability to respond gracefully to an unexpected hardware or software failure.  Failover: A backup operation that automatically switches to a standby if the primary system fails.

5 INFORMATION ARCHITECTURE: Disaster Recovery Disaster recovery best practices:  Mind the enterprise architectures  Monitor the quality of computer _________  Make sure the networks can be restored quickly in the case of downtime  Set up disaster recovery plans  Provide adequate staff _________ so that operators are aware of any IT-related problems

6 INFORMATION ARCHITECTURE: Disaster Recovery Disaster recovery plan  A detailed process for recovering information or an IT system in the event of a disaster such as a fire or flood  Hot site—a separate fully-equipped facility  Cold site—a separate facility without computer equipment Disaster recovery cost _______  Charts the cost to the organization of the unavailability of information and technology  Charts the cost to the organization of recovering from a disaster over time

7 Disaster Recovery Cost Curve

8 INFORMATION ARCHITECTURE: Information Security A good information architecture includes a strong information security plan..  Managing user access  Up-to-date _________ software and patches

9 INFRASTRUCTURE ARCHITECTURE Infrastructure architecture  The hardware, software, and _________________ equipment that support the organization’s goals Five primary characteristics of a solid infrastructure architecture: 1. Flexibility—can handle all types of business changes 2. Scalability—adapting to increasing demands 3. Reliability—functioning properly 4. Availability—high degree of _________ 5. Performance—________ at performing processes

10 APPLICATION ARCHITECTURE Application architecture  Determines how applications integrate and relate to each other Recent techniques:

11 Web Services Web service  A standardized way of integrating Web-based applications using the XML, SOAP, WSDL and UDDI open standards over an Internet protocol backboneXMLSOAPWSDLUDDIopenstandardsInternetprotocolbackbone  Events—Conditions that signal threats and opportunities, and alert those who can act on the information  Service--_________ software products that appeal to a broad audience Interoperability  The ability of software and hardware on different machines from different vendors to share data.

12 Open Systems Nonproprietary IT hardware and software made available by standards and procedures that  Allow systems to seamlessly share information  Capitalize on enterprise architectures  Eliminate ___________ systems and promote competitive pricing For example  Linux  A freely-distributable open source operating system that runs on a number of hardware platforms.  Open Office Open Office


Download ppt "BUSINESS PLUG-IN 4 IT ARCHITECTURES CIS 429: Business Information Systems."

Similar presentations


Ads by Google