It infrastructure management pg assessment item 2enterprise

Assignment Help Computer Network Security
Reference no: EM13573229

Assessment item 2 <br/>Enterprise Architect''s Bog & SWOT Analysis II <br/>Value: 35% <br/>Due date: 04-Oct-2014 <br/>Return date: 25-Oct-2014 <br/>Submission method options <br/>Alternative submission method <br/>Task <br/> WHAT TO DO FOR Task 2A (15%) <br/> <br/>Submit your Enterprise Architect blog as a single page with the Web address of your blog via EASTS for marking by the Due Date in the Study Schedule. <br/>The final blog entry is titled The Future of enterprise architecture and requires answers to the following question (Max 300 words). The main aim of this part is for you to reflect critically on the role of an enterprise architect in an organisation. <br/> <br/>"(a) What is the difference between enterprise architecture and IT architecture? (b) Should enterprise architecture really be called “IT” architecture?" <br/>When doing the above task, you should also: <br/> <br/>Continue to store the same postings made to the blog each week, as defined in Assessment Item 1 previously. <br/>Continue to engage in forum discussions with others and reply to other posts from your peers. <br/>WHAT TO DO FOR Task 2B (15%) <br/> <br/>Many leading organizations and managers have raised concerns about Enterprise Architecture as an effective practice, you are required to do some research and reflect critically on the role of an enterprise architect in an organisation by doing a SWOT Analysis of a new ICT service in an organization. <br/> <br/> <br/>Follow the same procedure as described in Assessment Item 1 and the use the same SWOT Analysis Template to analyse and evaluate a new ICT product or service. <br/>Compare the SWOT Analysis results of the current ICT service (from Assessment Item 1) with the SWOT Analysis results of the new ICT service. <br/>In your role as Enterprise Architect, write a report listing and evaluating the findings from your analysis and include your recommendations as per the SWOT template. <br/>WHAT TO DO FOR Task 2C (5%) <br/> <br/>Create a short video or audio recording (2-minutes maximum length) titled ''Subject Reflection'' and embed or link to it to your blog entry fro this task. Here are six (6) questions to guide your report <br/>What was learnt in this subject? <br/>What advantages were there in using the Blogs and Forums <br/>What parts are still unclear? (this part could include any comments on new or future technology that is still emerging; ex., security/ethical issues, benefits, etc.) <br/>What potential technology and innovation trends are/were evident through this research? <br/>What other topics were read or accessed to help learning more about technology? <br/>How would learning/researching about these topics enhance an IT manager’s knowledge of Enterprise Architect? <br/>Rationale <br/>Assessment Item 2 is aligned with objectives 2, 3, 5 and 6 and measures your ability to undertake a role-play as an Enterprise Architect, who is able to investigate, analyse and evaluate the impact of new and current ICT services. In addition the EA must acquire an understanding of the importance of aligning strategic planning from both the IT and management perspectives. <br/> <br/>Blogging is a good way to build a knowledge base, assist in developing business intelligence, project management and knowledge management and succession planning as well as discussing the issues of Enterprise Architect that may arise during the integration of new technology into a firm''s ICT infrastructure. <br/> <br/>Good IT manager''s and EA’s can reflect critically on their role and know how to analyse technology <br/>trends and synthesise the theory with the technical and management issues in ICT service delivery. <br/> <br/>Marking criteria <br/> <br/> <br/> Learning Outcomes <br/> <br/> <br/>1. be able to describe the business value and processes of ICT services in an organisation and understand the knowledge and skills of an enterprise architect in the workplace; <br/>2. be able to investigate, analyse and evaluate the impact of new and current ICT services to an organisation; <br/>3. be able to understand that effective IT Infrastructure Management requires strategic planning with alignment from both the IT and business perspectives in an organisation; <br/>4. be able to demonstrate the technical and communications skills that contribute to ICT governance in an organisation; <br/>5. be able to reflect critically on the role of an enterprise architect in an organisation; <br/>6. be able to synthesise the key theoretical concepts with the technical and management issues in delivering ICT services to an organisation. <br/> <br/> <br/>Marking criteria & standards of performance <br/> <br/>Task 2A be able to reflect critically on the role of an enterprise architect in an organisation <br/>Value 15% <br/>Learning Outcomes covered by Task 2A = 1,4,5,6 <br/> <br/>Criteria <br/>HD => 85% <br/>DI 75-84% <br/>CR 65-74% <br/>PS 50-64% <br/> <br/>Enterprise Architect (EA) role and initial <br/>Posting as introduction <br/>2.00% <br/>Posts are conceptually <br/>advanced, engaged in a substantive way with the material. <br/>1.70 to 2.00% <br/>Comprehensive introduction and purpose of the blog as an EA. Blog posts are well developed and engaged with the material; lacks conceptual clarity. <br/>1.50 to 1.69% <br/>Good introduction and understanding of the EA role. Blog posts are adequate, but reflect superficial engagement with the material. <br/>1.30 to 1.49% <br/>Brief introduction and unclear about the EA role; very few <br/>Blog postings in early weeks, but a start has been made that can be improved in future. <br/>1.00 to 1.29% <br/>Frequency of Blog entries <br/>1.00% <br/>Participates frequently and consistently. <br/>0.85 to 1.00% <br/>Participates 1-2 a week, but <br/>Blog postings are not distributed. <br/>0.75 to 0.84% <br/>Participates once a week. <br/>0.65 to 0.74% <br/>Infrequent participation or all done in batch near the due date. <br/>0.50 to 0.64% <br/>Weekly content contribution via Blog and Forums <br/>2.00% <br/>Sophisticated and confident understanding of topics and both Blog and Forum posts draw directly upon the Module activities and Chapter assessment material to <br/>make a creative and <br/>substantive point that <br/>extends beyond the <br/>material. <br/>1.70 to 2.00% <br/>Content is factually accurate and adds to the forum discussion but does not include much conceptual understanding or development at times. <br/>1.50 to 1.69% <br/>Content follows the Module activities but does not add <br/>substantively to the discussion via forums. <br/>1.30 to 1.49% <br/>Posts just the basic information, may be working tangential to discussion on the Forum. <br/>1.00 to 1.29% <br/> <br/>Task 2B SWOT Analysis of a new ICT service <br/>Value 15% <br/>Learning Outcomes covered by Task 2B = 2,3 <br/> <br/>Criteria <br/>HD => 85% <br/>DI 75-84% <br/>CR 65-74% <br/>PS 50-64% <br/> <br/>Description of the new ICT service under investigation <br/>1.00% <br/>Provides a thorough and detailed description and understanding of a newICT service in the workplace, worthy of analysis. <br/>0.85 to 1.00% <br/>Provides a comprehensive description and understanding of a new ICT service in the workplace, worthy of analysis. <br/>0.75 to 0.84% <br/>Provides a good description and basic understanding of a current ICT service in the workplace, chosen for analysis. <br/>0.65 to 0.74% <br/>Provides only a brief description or unclear understanding of a new ICT service in the workplace, as chosen for analysis. <br/>0.50 to 0.64% <br/>Identifications of Strengths, Weaknesses, Opportunities and Threat (maximum of 5 each) <br/>5.00% <br/>SWOT table items identified demonstrate a thorough and insightful understanding of the key concepts, principles and theories of SWOT analysis. 4.25 to 5.00% <br/>SWOT table items identified demonstrate considerable understanding of the key concepts, principles and theories of SWOT analysis. 3.75 to 4.24% <br/>SWOT table items identified demonstrate good understanding of the key concepts, principles and theories of SWOT analysis.3.25 to 3.74% <br/>SWOT table items identified demonstrate limited understanding of the key concepts, principles and theories of SWOT analysis. 2.50 to 3.24% <br/>Summary of SWOT results, Critical Thinking & Recommendations <br/>2.00% <br/>Summary and Recommendations demonstrates a high degree of critical thinking and ability to use specific strategies to gather information and generate recommendations for the ICT service under SWOT analysis. <br/>1.70 to 2.00% <br/>Summary and Recommendations demonstrates considerable critical thinking ability to use specific strategies to gather information and generate recommendations for the ICT service under SWOT analysis. <br/>1.50 to 1.69% <br/>Summary and Recommendations demonstrates some critical thinking ability to use specific strategies to gather information and generate recommendations for the ICT service under SWOT analysis. <br/>1.50 to 1.69% <br/>Summary and Recommendations demonstrates limited critical thinking ability to use specific strategies to gather information and generate recommendations for the ICT service under SWOT analysis. <br/>1.00 to 1.29% <br/>Stated review of goals and objectives in short, mid and long term plans <br/>2.00% <br/>Review of goals and objectives demonstrates a high degree of ability as an EA to use an organizational pattern of results to structure ideas for planning and development. <br/>1.70 to 2.00% <br/>Review of goals and objectives demonstrates considerable ability as an EA to use an organizational pattern to structure ideas for planning and development. <br/>1.50 to 1.69% <br/>Review of goals and objectives demonstrates some ability as an EA to use an organizational pattern to structure ideas for planning and development. <br/>1.50 to 1.69% <br/>Review of goals and objectives demonstrates limited ability as an EA to use an organizational pattern to structure ideas for planning and development. <br/>1.00 to 1.29% <br/> <br/>Task 2C Subject Reflection <br/>Value 5% <br/>Learning Outcomes covered by Task 2C = 1,2,3,4,5 <br/> <br/>Criteria <br/>HD => 85% <br/>DI 75-84% <br/>CR 65-74% <br/>PS 50-64% <br/> <br/>Subjection Reflection Objective <br/>1.00% <br/>The video expressed clearly at the beginning the goal or objective of the report. <br/>0.85 to 1.00% <br/>The video expressed clearly the goal or objective of the report, but it was not apparent in the beginning segments. <br/>0.75 to 0.84% <br/>The video expressed the goal or objective of the report, but it was not clearly stated but inferred. <br/>0.65 to 0.74% <br/>The video failed to express the goal or objective of the report and seemed to lack a specific focus. <br/>0.50 to 0.64% <br/>Technology used: audio, video, focus quality <br/>1.00% <br/>The video, audio, focus was sufficiently loud and clear at all times. and special effects used. <br/>0.85 to 1.00% <br/>The video, audio, focus was sometimes not clear part of the time. <br/>0.75 to 0.84% <br/>The video, audio, focus was poor and not clear at all times. <br/>0.65 to 0.74% <br/>The video, audio, focus was insufficient and difficult to make out. <br/>0.50 to 0.64% <br/>Facts and personal opinions expressed <br/>1.00% <br/>All facts and information presented was accurate & opinions informative. <br/>1.70 to 2.00% <br/>Most facts and information presented was accurate & opinions informative. <br/>1.50 to 1.69% <br/>Some facts and information presented was accurate & some opinions were useful to consider. <br/>1.50 to 1.69% <br/>Few facts and information presented was accurate & very little or no opinions were expressed. <br/>1.00 to 1.29% <br/>Critical Thinking & Reflection on own thought processes. <br/> <br/>2.00% <br/> <br/> <br/>Identifies strengths and weaknesses in own thinking: recognizes personal assumptions, values and perspectives, compares to others’, and evaluates them in the context of alternate points of view. <br/>1.70 to 2.00% <br/>Identifies strengths and weaknesses in own thinking: recognizes personal assumptions, values and perspectives, compares to others’, with some comparisons of alternate points of view. <br/>1.50 to 1.69% <br/>Identifies some personal assumptions, values, and perspectives; <br/>recognizes some assumptions, values and perspectives of others; shallow comparisons of alternate points of view. <br/>1.50 to 1.69% <br/>Identifies some personal assumptions, values, and perspectives; <br/>does not consider alternate points of view. <br/>1.00 to 1.29% <br/> <br/> <br/> <br/>Presentation <br/>Collate all your Blog entries in Tasks 2A, 2B and 2C <br/>Submit URL Web address of your blog via Turnitin on or before the due date for this assessment item.

Reference no: EM13573229

Questions Cloud

If you had the opportunity to have your own or your familys : if you had the opportunity to have your own or your familys portrait painted by either monet or renoir which artist
Explain whether you think manets olympia was meant to shock : explain whether you think manets olympia was meant to shock the viewers of his time and why. explain whether the
Consider that while chinese and indian immigrants were : consider that while chinese and indian immigrants were arriving in the u.s. the british were arriving in china and
Why is it important for kids to be a challenged and fail : 2 pages in length double spaced. the font should be times new roman 12. we live in a culture that gives kids praise for
It infrastructure management pg assessment item 2enterprise : assessment item 2 ltbrgtenterprise architect3939s bog amp swot analysis ii ltbrgtvalue 35 ltbrgtdue date 04-oct-2014
Inflation what is : what is
It infrastructure management assessment item 2enterprise : assessment item 2 ltbrgtenterprise architect3939s bog amp swot analysis ii ltbrgtvalue 35 ltbrgtdue date 04-oct-2014
Assignment help would you be able to provide me with : would you be able to provide me with answers to my assignment homework in the next few hours? it3939s due at
Ireland and spain have been experiencing ireland and spain : ireland and spain have been experiencing deep economic crises. the crises were the results of the preceding booms with

Reviews

Write a Review

Computer Network Security Questions & Answers

  Des operating on a general plaintext input

DES operating on a general plaintext input 1st with key K1 and then with key K2 manufactures the same output as if K2 were first used and then K1.

  Public key encryption

If you have access to public keys n and e, it is possible to reverse the public keys from them. One method is to factor the value of n to discover p and q,

  What is the discrepancy rate of closure

If you collected these metrics, would they provide you with answers to the questions? Why or why not? What other information, if any, would you need?

  Explain the difference between the client and the server

What is the difference between the client and the server. What is the difference between server-side and client-side scritping? Why are they separate

  What is the decryption function

a). What is the decryption function, b). What is the decrypted plaintext? c). What are some weaknesses of this cipher?

  Security risks associated with social networking sites

Discusses the security risks associated with social networking sites

  Describe malicious things over a computer network

Suppose Ali and Jim are sending packets to each other over a computer network. Suppose Thomas positions himself in the network so he can capture all packets sent by Ali and send whatever he wants to Jim; he can also capture all the packets sent by..

  Discuss the steps necessary to make electronic evidence

Identify and discuss the steps necessary to make electronic evidence admissible in court and identify various crimes and incidents that are involved in electronic forensic investigations.

  Explain the purpose of using cvss scores

Select a recent vulnerability from that Database and analyse it from the what problems they can cause (malicious activities an attacker may use them for, including attack types)

  Dos and ddos attack

Denial of Service attack (DoS) and Distributed Denial of service (DDoS) attack, two-factor authentication system, password ageing, biometric devic,  cryptographic attack made Double DES (2DES), Demilitarized Zone (DMZ), SSL protocols

  Importance of presentation and content in presentation

There has been a discussion for years on which is more important, content or presentation. This is very important when thinking about creating a PowerPoint slideshow.

  Recognize all the potential security threats on a personal

computer security is not an issue for organizations alone. anyone whose personal computer is connected to a network or

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd