Analyze and explain the current mis architecture

Assignment Help Management Information Sys
Reference no: EM132200646

Competency

Create a plan to deploy technology solutions in alignment with strategic business needs.

Scenario

North American Transport (NAT) is a fast growing long-haul trucking company that specializes in the delivery of fresh foods to many of the leading fresh-food retail chains across the United States.

NAT is based out of Kansas City, Kansas and employees 75 drivers, loaders, mechanics, communications technicians, business developers and managers. NAT's business plan includes 20% growth per year or 225 employees within 5 years.

NAT is also planning on adding additional Fleet Resource Centers in California and Virginia. Fleet Resource Centers are NAT owned service facilities used to maintain the fleet of trucks, vans, trailers, refrigeration etc. Fleet Resource Centers also offer growth and will require resources.

Business Goals for the MIS Architecture:

An architecture that is flexible and scalable; Company growth is projected to be 20% per year

An architecture that can rapidly deploy/employ new systems and technology; Agile system development

An architecture that meets the demands of evolving business processes; Information Technology cannot "hold up" any business process, IT must be adaptable

An architecture that is easily understood and easy to manage; Minimize IT department footprint. Take advantage of cloud services

An architecture that is secure; Deploy state-of-the-art security software/hardware

MIS Architecture

Current MIS Architecture Capabilities:

One 12 port 10 Mb/s switch

Laptop computers used to support administration with various operating systems

1 shared printer

MS Office 2007

Exchange Server 2007

MS SQL on a stand-alone computer

ADSL broadband Internet 8 Mb/s

Instructions

Create an MIS Architecture Plan

You will use Microsoft Word to develop a MIS architecture plan that analyzes the current capabilities, lists available resources, aligns capabilities with business objectives in order to identify gaps and recommends IT solutions.

Your plan must include a Table of Contents and Headers.

Analyze and explain the current MIS architecture: Discuss bandwidth, speed of service, reliability, scalability, mobility and security.

Create a list that identifies and outlines existing resources being utilized in the company.

Discuss the operational objectives of the company using assumptions gained from the scenario.

Develop a recommendation plan for an improved MIS architecture. Your plan should examine whether or not the current architecture meets the business needs and if not, identify those gaps. Be sure to consider the businesses' goals and objectives.

Using software of your choosing (Ex. Power Point or Visio), construct a revamped architecture diagram that meets the needs of the company.

Reference no: EM132200646

Questions Cloud

Pertain to human systems : What are "relational systems" as they pertain to human systems. Why are they important in crisis management planning?
Organizations with single users of software : Corporate planners have replaced large staff organizations with single users of software. Just thinking about purchasing alone, how was purchasing
Describe the types of information technology mechanisms : Understanding supply chain and how the consumer can play a critical role in the supply chain is an important part of developing and implementing a strategy.
Enterprise it strategies include outsourced cloud-based : Enterprise IT strategies include outsourced cloud-based solutions. Provide some examples of why companies choose to outsource and utilize cloud-based systems
Analyze and explain the current mis architecture : Analyze and explain the current MIS architecture: Discuss bandwidth, speed of service, reliability, scalability, mobility and security.
What is the problem that you are addressing : What previous efforts (scholarly and/or real world) have been made to address the problem, and why are they insufficient?
Database-data mart-data warehouse : Briefly, define and compare the terms "database," "data mart," "data warehouse" and "DBMS."
Customer relation management : Customer Relation Management (CRM) is an essential part of any successful Information System. Discuss what CRM is, what it's used for, its technical structure
Memorandum to the ceo about organization update : How would a senior vice president start a memorandum to the CEO about organization update?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Ways that you believe encryption could assist

From the e-Activity and your own research, give your opinion of the two (2) most important ways that you believe encryption could assist in addressing some of the current challenges facing organizations today

  What are the advantages of easily obtainable information

What are advantages and disadvantages of social media? How might knowing these advantages and disadvantages alter how a person might use social media? What are the advantages and disadvantages of easily obtainable information?

  Is the theoretical framework related to previous research

Does the research deal with significant and meaningful problem that lends itself to a substantial research effort? Is there a justification that demonstrates why the problem is worth studying? Is it clear who or what will be aided by research finding..

  Important information about too much informationresponse

important information about too much informationresponse for both these questions relative to the role of a

  How are authentication and authorization alike

How are authentication and authorization alike and how are they different? What is the relationship, if any, between the two?

  Consider the security systems life cycle

Write a evaluation (not including the title and reference pages) of the security systems life cycle.Evaluate the key phases that comprise the security life cycle.Analyze the specific steps that occur in each phase,Classify both management and non-man..

  The technology s-curvedescribe a technology s-curve explain

the technology s-curvedescribe a technology s-curve explain why it is important describe what leads to a shift in the

  Describe security architecture

Which CISSP domain according to your session materials highlights intrusion detection and prevention systems?

  The solution to information securityto some the employee is

the solution to information securityto some the employee is considered as the biggest threat to information security at

  Create a powerpoint for training purposes

Create a PowerPoint for training purposes that outlines the potential threats involved in e-mail and social networking.

  Prepare a list of specific steps that customers can take

Prepare a list of specific steps that customers can take to protect their data when surfing on publicly accessible networks.

  Benefits and disadvantages of the rfid system

A description of administrative procedures - human and process changes; any Changes in Organization policies or enhancements to include training requirements.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd