Description and understanding of a newict service

Assignment Help Computer Network Security
Reference no: EM13342973

The final blog entry is titled The Future of enterprise architecture and requires answers to the following question (Max 300 words). The main aim of this part is for you to reflect critically on the role of an enterprise architect in an organisation.

"(a) What is the difference between enterprise architecture and IT architecture? (b) Should enterprise architecture really be called "IT" architecture?"

When doing the above task, you should also:

Continue to store the same postings made to the blog each week, as defined in Assessment Item 1 previously.

Continue to engage in forum discussions with others and reply to other posts from your peers.

Many leading organizations and managers have raised concerns about Enterprise Architecture as an effective practice, you are required to do some research and reflect critically on the role of an enterprise architect in an organisation by doing a SWOT Analysis of a new ICT service in an organization.

Follow the same procedure as described in Assessment Item 1 and the use the same SWOT Analysis Template to analyse and evaluate a new ICT product or service.

Compare the SWOT Analysis results of the current ICT service (from Assessment Item 1) with the SWOT Analysis results of the new ICT service.

In your role as Enterprise Architect, write a report listing and evaluating the findings from your analysis and include your recommendations as per the SWOT template

Rationale

Assessment Item 2 is aligned with objectives 2, 3, 5 and 6 and measures your ability to undertake a role-play as an Enterprise Architect, who is able to investigate, analyse and evaluate the impact of new and current ICT services. In addition the EA must acquire an understanding of the importance of aligning strategic planning from both the IT and management perspectives.

Blogging is a good way to build a knowledge base, assist in developing business intelligence, project management and knowledge management and succession planning as well as discussing the issues of Enterprise Architect that may arise during the integration of new technology into a firm''s ICT infrastructure.

Good IT manager''s and EA's can reflect critically on their role and know how to analyse technology trends and synthesise the theory with the technical and management issues in ICT service delivery.

Learning Outcomes covered by Task 2B = 2,3

Criteria
HD => 85%
DI 75-84%
CR 65-74%
PS 50-64%

Description of the new ICT service under investigation

Provides a thorough and detailed description and understanding of a newICT service in the workplace, worthy of analysis.

Provides a comprehensive description and understanding of a new ICT service in the workplace, worthy of analysis.

Provides a good description and basic understanding of a current ICT service in the workplace, chosen for analysis.

Provides only a brief description or unclear understanding of a new ICT service in the workplace, as chosen for analysis.

Identifications of Strengths, Weaknesses, Opportunities and Threat (maximum of 5 each)

SWOT table items identified demonstrate a thorough and insightful understanding of the key concepts, principles and theories of SWOT analysis.

SWOT table items identified demonstrate considerable understanding of the key concepts, principles and theories of SWOT analysis.

SWOT table items identified demonstrate good understanding of the key concepts, principles and theories of SWOT analysis.

SWOT table items identified demonstrate limited understanding of the key concepts, principles and theories of SWOT analysis.

Summary of SWOT results, Critical Thinking & Recommendations

Summary and Recommendations demonstrates a high degree of critical thinking and ability to use specific strategies to gather information and generate recommendations for the ICT service under SWOT analysis.

Summary and Recommendations demonstrates considerable critical thinking ability to use specific strategies to gather information and generate recommendations for the ICT service under SWOT analysis.

Summary and Recommendations demonstrates some critical thinking ability to use specific strategies to gather information and generate recommendations for the ICT service under SWOT analysis.

Summary and Recommendations demonstrates limited critical thinking ability to use specific strategies to gather information and generate recommendations for the ICT service under SWOT analysis.

Stated review of goals and objectives in short, mid and long term plans

Review of goals and objectives demonstrates a high degree of ability as an EA to use an organizational pattern of results to structure ideas for planning and development.

Review of goals and objectives demonstrates considerable ability as an EA to use an organizational pattern to structure ideas for planning and development.

Review of goals and objectives demonstrates some ability as an EA to use an organizational pattern to structure ideas for planning and development.

Review of goals and objectives demonstrates limited ability as an EA to use an organizational pattern to structure ideas for planning and development.

Reference no: EM13342973

Questions Cloud

Compute earnings per share data : EPS (Earnings Per Share) Problem (Earnings Per Share) The stockholders' equity section of Sosa Corporation appears below as of December 31, 2010. 6% preferred stock.
Evaluate the mole fraction of helium in the container : You have a sealed 8.10 L container with a mixture of nitrogen and helium gas at 25.85 oC. The gas mixture contains 0.204 atm of nitrogen and 1.54 g of helium. Calculate the mole fraction of helium in the container.
Depict an energy-level diagram for the valence molecular : Draw an energy-level diagram for the valence molecular orbitals of CO. Include the relevant atomic orbitals in your diagram. Clearly label each molecular orbitals and fill in the appropriate number of electrons
What is the overall magnification of the microscope : The distance between the eyepiece and the objective lens in a certain compound microscope is 21.5 cm. What is the overall magnification of the microscope
Description and understanding of a newict service : Provides a thorough and detailed description and understanding of a newICT service in the workplace, worthy of analysis and provides a comprehensive description and understanding of a new ICT service in the workplace, worthy of analysis.
Find the distance of final image relative to converging lens : A diverging lens (f = -12 cm) is located 20.0 cm to the left of a converging lens (f = 35.0 cm). find the distance of the final image relative to the converging lens
Determine whether you agree with lois conclusion : For each identified obligation, determine whether you agree with LOI's conclusion and discuss the basis for your determination.
Explain the collisions become more elastic : When the external pressure on a balloon is decreased at constant temperature, what happens to the gas inside. A) The collisions become more elastic. B) the gas undergoes no changes.
Explain the specific heat of liquid ethanol c2h5oh(l) : The specific heat of liquid ethanol, C2H5OH(l), is 2.46 J/g·°C and the heat of vaporization is 39.3 kJ/mol. The boiling point of ethanol is 78.3 °C. The molecular weight of ethanol 46 g/mol.

Reviews

Write a Review

Computer Network Security Questions & Answers

  How rtsp vary from http in keeping client state information

How does RTSP differ from HTTP (a) in maintaining client state information; (b) in terms of in-band, out-of-band traffic?

  Prepare a security checklist for new century

You decide to prepare a security checklist for New Century. Prepare a list of security issues that the firm should evaluate and monitor. Be sure to organize the items into categories that match the five security levels.

  Encrypt plaintext using vigenere cipher

Another variation of Additive cipher uses a keyword instead of a single key. This cipher is called Vigenere cipher. Both variations work exactly the same.

  Denial of service and distributed denial of service attacks

US cryptography export restrictions: past, present, and future and biometrics for authentication: security and privacy implications.

  How to set up or improve their cybersecurity

How should government justify telling private industry how to set up or improve their cybersecurity?

  Determine with justification the equation of the curve

Determine with justification the equation of the curve and determine with justification all values oft for which there is no point (x, y) on the curve.

  Design an algorithm to achieve the byzantine agreement

Design an algorithm to achieve the Byzantine Agreement for the case that there are four processes, amongst which one is corrupted. You should not use public key cryptography for your algorithm (200 words)

  Plan a high-level backup and disaster recovery plan

Plan a high-level backup and disaster recovery plan for a business. Discuss the security of the network and suggest best practices for securing the business network.

  Creating a switchboard design with control buttons

Construct a detail report that will display all courses in alphabetical order, with course name and instructor name in a group header; the Social Security number, name, and telephone number

  What is computer security

Computer security is integral part of any organization, if any organization hasstarted working in, immediately it should start Computer security for its systemif they want to protect their system for future.

  Analyze the fundamentals of pki

Analyze the fundamentals of PKI, and determine the primary ways in which its features and functions could benefit your organization and its information security department.

  How much information is available to potential hackers

Maintaining a proactive approach on security requires that an organization perform its own hacking footprinting to see how much information is available to potential hackers

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd