Define the computing and network platforms

Assignment Help Computer Networking
Reference no: EM131028377

Question: As before, the Case for this module asks you to prepare an essay using the writing style, format and referencing methods described in the course Graded Activities and Writing Guides.

This Case is about how organizations can promote operational success while assimilating emerging technologies and e-commerce. The design of effective IT infrastructure has enabled organizations to accomplish their goals and strategies but remains a challenging task for IT management. The ability to execute IT operations requires a set of policies, procedures, and regulations that are critical for survival. While the IT infrastructure deals with technical aspects, IT architecture focuses on IT governance.

As an IT manager, you must continually question the process to understand what parts of IT operations are well-managed or, conversely, lacking effective control. Some of the main issues include:

IT Infrastructure: Define the computing and network platforms. Has the organization adopted industry standards? Is the necessary technical expertise and talent residing internally? Is there a formal system to acquire technology and track project development? Who leads the IT function and what is the reporting structure?

IT Architecture: What role does IT play within the organization? Are IT performance matrices in place? Is data properly stored and secured? Are IT platforms designed to enable the evolution of products and services and new development? Is there an information policy? Is information available for timely management reporting?

IT Governance: Does the CIO attend the technology governance board meetings? What are the accountabilities and system controls in place for internal auditing and regulation compliance? Are IT and organizational strategy properly aligned? In general, what are the security mechanisms in place to guard company information and assets

These concerns run through the required readings for this Case. They are:

Cantor, M., & Sanders, J. D. (2007, May 15). Operational IT governance. Retrieved from https://www.ibm.com/developerworks/rational/library/may07/cantor_sanders/

Zurich Help Point. (2010). The liability of technology companies for data breaches. Retrieved from https://www.advisen.com/downloads/Emerging_Cyber_Tech.pdf

Huhta, S. (2011). IT architecture for small & mid-sized organizations. Business Forum Journal. Retrieved from https://www.bizforum.org/Journal/www_journalSH002.htm

SlideShare. (2009). IT infrastructure (Part I). [Power Point slides]. Retrieved from https://www.slideshare.net/soetam/1-mis-it-infrastructure-part-i

Schwartz, K. D. (2007, May 22). IT governance definitions and solutions. CIO. Retrieved February 15, 2011, from https://www.cio.com/article/111700/IT_Governance_Definition_and_Solutions

Musthaler, L., & Musthaler, B. (2008, March 26). IT governance best practices are critical for business success. NetworkWorld. Retrieved from https://www.networkworld.com/newsletters/2008/052608techexec1.html?page=1

Kadivar, S. (2011, February 15). Green memories accelerate ROI for data centers. CIO. Retrieved from https://www.cio.com/article/665167/Green_Memories_Accelerate_ROI_for_Data_Centers?taxonomyId=3028

In addition, the optional readings expand on many of the central points; you may also want to do some independent research to clarify any issues.

Case Assignment

Once you have read through the articles and related material, compose a 4- to 6-page critical analysis on the following topic:

What dynamic role do IT managers play in IT governance? Why is IT governance necessary? What is the exposure if a company ignores IT governance? Illustrate the Case with the Sarbanes-Oxley (SOX) Act and the Bank Secrecy Act (BSA) federal regulations for compliance. What is the connection between regulations and IT?

Carefully explain and justify your conclusions.

Assignment Expectations

Length: Minimum 4 pages excluding cover page and references (since a page is about 300 words, this is approximately 1,200 or more words).

Your assignment will be evaluated based on the Rubric.

General Case and SLP Paper Writing Guidelines

Note: Do not use any government/military classified or corporate-sensitive information in the development of any TUI papers or in any Threaded Discussions.

Verified Expert

Reference no: EM131028377

Questions Cloud

State table of the set-dominant Flip-Flop : A set-dominant master-slave Flip-Flop has set and reset inputs. It differs from a conventional master-slave SR Flip-Flop in that, when both S and R are equal to 1, the Flip-Flop is set. (a) Obtain the state table of the set-dominant Flip-Flop.
What is the maximum number of six-letter words : The tribe has a taboo against using the same letter twice in the same word, it's never done. If each different sequence of letters constitutes a different word in the language, what is the maximum number of six-letter words that the language can e..
Identify the aacn bsn essential that you have selected : Identify the AACN BSN Essential that you have selected by name and number. Clearly and thoroughly explain why you selected this Essential
Write single straight arrow from element with smallest first : Make a simple sketch of the shape of the main part of the periodic table, as shown. Ignoring H and He, write a single straight arrow from the element with the smallest bonding atomic radius to the element with the largest.
Define the computing and network platforms : IT Infrastructure: Define the computing and network platforms. Has the organization adopted industry standards? Is the necessary technical expertise and talent residing internally?
Why does teen pregnancy and sexually transmitted diseases : Why does teen pregnancy and sexually transmitted diseases remain high in the U.S. What can healthcare providers do that decrease the rate of teen pregnancy and STD's in the US
How many license plates are possible : Car license plates in California take the form of 1RTY345. If zero cannot be used in the first position and repeats are allowed in the other 6 positions, how many license plates are possible?
Build an application based upon array processing application : Build an application based upon the Array Processing application demonstrated in this week's Presentation. Extend this application to have a total of 10 text boxes that will accept an integer only.
How many ways are there to choose 5 items from 7 : how many bit strings of length 10 contain either five consecutive 0s or five consecutive 1s.

Reviews

Write a Review

Computer Networking Questions & Answers

  Relational set operators-advanced sql and pl-sql

A relational Database Model allows database users to analyze data thoroughly. To accomplish this, advanced commands such as UNION and INTERSECT may be used. Describe a business scenario where a UNION relational set operator may be used to merge t..

  Explain why these vulnerabilities could be exploited

This section should include areas where network security could pose security problems. Explain why these vulnerabilities could be exploited and what the implications are if they are not addressed. In this section, you do not need to provide specif..

  Thesis statement pertaining to social networking

Develop a thesis statement pertaining to social networking. Identify writing strategies (mind mapping, brainstorming, and free writing)for developing the thesis and summarize experiences.

  Design requirements of lan, voip and wireless

You are required to submit business need and Design Requirements of Entire WWTC Project. The requirements include but are not limited to- Design Requirements of LAN, VOIP and Wireless and Design Requirements of Security.

  Which of the five dysfunctions of a team

Which of the five dysfunctions of a team (presented in Figure 12.2) would be thegreatest barriers to virtual team productivity? Defend your answer.2. What can be done to avoid information overload when the virtual team is made upof 25 to 30 members? ..

  Question 1one of the criticisms of measurement of the work

question 1one of the criticisms of measurement of the work of software engineers is that they will probably change how

  Benefits of using a layered model for computer networks

What are the benefits of using a layered model for computer networks? The three network topologies shown below are all valid Ethernet networks. How many collision domains and broadcast domains are there in each topology

  Compile a list of products names and capabilities

Using your favorite browser, open the search engine of your choice Search the Web to locate some useful resources related to active Web page development.

  Explain differences between viruses and worms

the differences between viruses and worms in their behavior, characteristics, and attack vectors. Their exploitation has been devastating in the past. Provide some examples of those malware outbreaks we have seen in the past.

  Contrast the standard network topologies

Compare and contrast 2 of the 5 standard network topologies and the different variations of these topologies. What factors would you consider when implementing a particular topology

  Design ip addressing scheme for five departments

You are hired to design an IP addressing scheme for five departments that will give security and access to Internet. Each department requires between 1,500 - 2,000 IP addresses.

  Integrate the nursing school network

Your network solution should address the need to integrate the nursing school network into your newly designed campus network. The nursing school network needs to be redesigned with the following devices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd