1. What is information architecture and what is information infrastructure and how do they differ and how do they relate to each other?
Information architecture identifies where and how important information is maintained and secured. Information Architecture is responsible for planning the backup and recovery, disaster recovery and information security systems.Information Infrastructure is the equipment that enables goals in backup and recovery, disaster recovery and information security systems to be achieved. Information infrastructure supports and achieves the goals that are outlined in the information architecture through the equipment.
Information architecture identifies where and how important information is maintained and secured. Information Architecture is responsible for planning the backup and recovery, disaster recovery and information security systems.Information Infrastructure is the equipment that enables goals in backup and recovery, disaster recovery and information security systems to be achieved. Information infrastructure supports and achieves the goals that are outlined in the information architecture through the equipment.
2. Describe how an organisation can implement a solid information architecture. 1.Backup and recovery
Creating an exact copy of system information so that in the event of an emergency a system may recover from failure. Backup and recovery media range from cd and dvds to servers. The most appropriate method suits the business goals and objectives. A small business will not find it necessary, fro example, to have information backed up hourly on an off site server.
2. Disaster Recovery
Implementing a disaster recovery plan to the business operations, a detailed process for recovering information in the case of a catastrophic disaster. This also includes a business continuity plan which details how a business will restore its lost information in a time frame.
3. Information Security
Protecting classified and personal information to avoid information misuse and manipulation. This is achieved by managing user access and ensuring up to date antivirus and software updates are installed.
3. List and describe the five requirement characteristics of infrastructure architecture.
1)Flexibility – systems must be able to meet all business challenges. The infrastructure architecture must be able to adapt to new situations.
2)Scalability – the system must be able to adapt to increased demand. Growth can be driven by a number of unpredictable factors. The infrastructure architecture must be able to cope with anticipated and unanticipated growth. This can be achieved through capacity planning which determines the future IT infrastructure requirement such as new equipment and additional network capacity.
3) Reliability – ensures that all systems are functionally correctly and providing accurate information. Incorrect information places a business at risk of making poor decisions.
4) Availability – when a system can be accessed by users. High availability is the goal of all IT systems. Many websites provide services which are available 24/7. Systems do require maintenance, upgrades and repairs which is a competing demand that must be minimised to maintain a high level of availability.
5) Performance – how quickly a system performs a process or transaction. It is necessary to have high performance IT systems or risk customers moving to a competitor.
4. Describe the business value in deploying a service oriented architecture.
A service orientated architecture is a business approach which uses systems to link resources on demand. Resources are made available to other participants in the network as independent services that are accessed in a standardized way. SOA is based upon loose coupling which joins services on demand to create composite services but can easily disassemble functional components. This enables businesses to remain flexible and adapt quickly to changing business needs.
http://www.sybase.com/detail?id=1054411

http://blogs.cofc.edu/gradschool/files/2009/07/soacorecomponentsdiagram.jpg
5. What is an event?
An event is an electronic message indicating that something has happened. It detects threats and opportunities and alerts those who can act on the information. User-generated events include keystrokes and mouse clicks, among a wide variety of other possibilities.
6. What is a service?
A service is a business task. For example, checking a customer's credit rating.
7. What emerging technologies can companies use to increase performance and utilise their infrastructure more effectively?
Companies can use virtualisation and grid computing to utilise their infrastructure more effectively:
Virtualisation: A framework that divides computers into multiple execution environments. This increases physical resources and consequently maximises a business' investment in hardware. For example, you may run multiple operating systems on one computer.
http://pcwin.com/media/images/screen/66219-parallels_workstation_for_windows.jpg
Grid computing:
Grid Computing is an aggregation of geographically scattered computing, storage and network resources, corresponding to distribute superior performance, higher quality of service, better deployment and easier access to data. Grid computing is beneficial as it improves the efficiency and collaboration of virtual organizations and respective computing and data resources, and Allows broadly isolated departments and businesses to generate virtual organizations.
http://www.adarshpatil.com/newsite/images/gridcomputing.gif
Creating an exact copy of system information so that in the event of an emergency a system may recover from failure. Backup and recovery media range from cd and dvds to servers. The most appropriate method suits the business goals and objectives. A small business will not find it necessary, fro example, to have information backed up hourly on an off site server.
2. Disaster Recovery
Implementing a disaster recovery plan to the business operations, a detailed process for recovering information in the case of a catastrophic disaster. This also includes a business continuity plan which details how a business will restore its lost information in a time frame.
3. Information Security
Protecting classified and personal information to avoid information misuse and manipulation. This is achieved by managing user access and ensuring up to date antivirus and software updates are installed.
3. List and describe the five requirement characteristics of infrastructure architecture.
1)Flexibility – systems must be able to meet all business challenges. The infrastructure architecture must be able to adapt to new situations.
2)Scalability – the system must be able to adapt to increased demand. Growth can be driven by a number of unpredictable factors. The infrastructure architecture must be able to cope with anticipated and unanticipated growth. This can be achieved through capacity planning which determines the future IT infrastructure requirement such as new equipment and additional network capacity.
3) Reliability – ensures that all systems are functionally correctly and providing accurate information. Incorrect information places a business at risk of making poor decisions.
4) Availability – when a system can be accessed by users. High availability is the goal of all IT systems. Many websites provide services which are available 24/7. Systems do require maintenance, upgrades and repairs which is a competing demand that must be minimised to maintain a high level of availability.
5) Performance – how quickly a system performs a process or transaction. It is necessary to have high performance IT systems or risk customers moving to a competitor.
4. Describe the business value in deploying a service oriented architecture.
A service orientated architecture is a business approach which uses systems to link resources on demand. Resources are made available to other participants in the network as independent services that are accessed in a standardized way. SOA is based upon loose coupling which joins services on demand to create composite services but can easily disassemble functional components. This enables businesses to remain flexible and adapt quickly to changing business needs.
http://www.sybase.com/detail?id=1054411
http://blogs.cofc.edu/gradschool/files/2009/07/soacorecomponentsdiagram.jpg
5. What is an event?
An event is an electronic message indicating that something has happened. It detects threats and opportunities and alerts those who can act on the information. User-generated events include keystrokes and mouse clicks, among a wide variety of other possibilities.
6. What is a service?
A service is a business task. For example, checking a customer's credit rating.
7. What emerging technologies can companies use to increase performance and utilise their infrastructure more effectively?
Companies can use virtualisation and grid computing to utilise their infrastructure more effectively:
Virtualisation: A framework that divides computers into multiple execution environments. This increases physical resources and consequently maximises a business' investment in hardware. For example, you may run multiple operating systems on one computer.
http://pcwin.com/media/images/screen/66219-parallels_workstation_for_windows.jpg
Grid computing:
Grid Computing is an aggregation of geographically scattered computing, storage and network resources, corresponding to distribute superior performance, higher quality of service, better deployment and easier access to data. Grid computing is beneficial as it improves the efficiency and collaboration of virtual organizations and respective computing and data resources, and Allows broadly isolated departments and businesses to generate virtual organizations.
http://www.adarshpatil.com/newsite/images/gridcomputing.gif
No comments:
Post a Comment