Description and understanding of a newict service

Assignment Help Computer Network Security
Reference no: EM13342973

The final blog entry is titled The Future of enterprise architecture and requires answers to the following question (Max 300 words). The main aim of this part is for you to reflect critically on the role of an enterprise architect in an organisation.

"(a) What is the difference between enterprise architecture and IT architecture? (b) Should enterprise architecture really be called "IT" architecture?"

When doing the above task, you should also:

Continue to store the same postings made to the blog each week, as defined in Assessment Item 1 previously.

Continue to engage in forum discussions with others and reply to other posts from your peers.

Many leading organizations and managers have raised concerns about Enterprise Architecture as an effective practice, you are required to do some research and reflect critically on the role of an enterprise architect in an organisation by doing a SWOT Analysis of a new ICT service in an organization.

Follow the same procedure as described in Assessment Item 1 and the use the same SWOT Analysis Template to analyse and evaluate a new ICT product or service.

Compare the SWOT Analysis results of the current ICT service (from Assessment Item 1) with the SWOT Analysis results of the new ICT service.

In your role as Enterprise Architect, write a report listing and evaluating the findings from your analysis and include your recommendations as per the SWOT template

Rationale

Assessment Item 2 is aligned with objectives 2, 3, 5 and 6 and measures your ability to undertake a role-play as an Enterprise Architect, who is able to investigate, analyse and evaluate the impact of new and current ICT services. In addition the EA must acquire an understanding of the importance of aligning strategic planning from both the IT and management perspectives.

Blogging is a good way to build a knowledge base, assist in developing business intelligence, project management and knowledge management and succession planning as well as discussing the issues of Enterprise Architect that may arise during the integration of new technology into a firm''s ICT infrastructure.

Good IT manager''s and EA's can reflect critically on their role and know how to analyse technology trends and synthesise the theory with the technical and management issues in ICT service delivery.

Learning Outcomes covered by Task 2B = 2,3

Criteria
HD => 85%
DI 75-84%
CR 65-74%
PS 50-64%

Description of the new ICT service under investigation

Provides a thorough and detailed description and understanding of a newICT service in the workplace, worthy of analysis.

Provides a comprehensive description and understanding of a new ICT service in the workplace, worthy of analysis.

Provides a good description and basic understanding of a current ICT service in the workplace, chosen for analysis.

Provides only a brief description or unclear understanding of a new ICT service in the workplace, as chosen for analysis.

Identifications of Strengths, Weaknesses, Opportunities and Threat (maximum of 5 each)

SWOT table items identified demonstrate a thorough and insightful understanding of the key concepts, principles and theories of SWOT analysis.

SWOT table items identified demonstrate considerable understanding of the key concepts, principles and theories of SWOT analysis.

SWOT table items identified demonstrate good understanding of the key concepts, principles and theories of SWOT analysis.

SWOT table items identified demonstrate limited understanding of the key concepts, principles and theories of SWOT analysis.

Summary of SWOT results, Critical Thinking & Recommendations

Summary and Recommendations demonstrates a high degree of critical thinking and ability to use specific strategies to gather information and generate recommendations for the ICT service under SWOT analysis.

Summary and Recommendations demonstrates considerable critical thinking ability to use specific strategies to gather information and generate recommendations for the ICT service under SWOT analysis.

Summary and Recommendations demonstrates some critical thinking ability to use specific strategies to gather information and generate recommendations for the ICT service under SWOT analysis.

Summary and Recommendations demonstrates limited critical thinking ability to use specific strategies to gather information and generate recommendations for the ICT service under SWOT analysis.

Stated review of goals and objectives in short, mid and long term plans

Review of goals and objectives demonstrates a high degree of ability as an EA to use an organizational pattern of results to structure ideas for planning and development.

Review of goals and objectives demonstrates considerable ability as an EA to use an organizational pattern to structure ideas for planning and development.

Review of goals and objectives demonstrates some ability as an EA to use an organizational pattern to structure ideas for planning and development.

Review of goals and objectives demonstrates limited ability as an EA to use an organizational pattern to structure ideas for planning and development.

Reference no: EM13342973

Questions Cloud

Compute earnings per share data : EPS (Earnings Per Share) Problem (Earnings Per Share) The stockholders' equity section of Sosa Corporation appears below as of December 31, 2010. 6% preferred stock.
Evaluate the mole fraction of helium in the container : You have a sealed 8.10 L container with a mixture of nitrogen and helium gas at 25.85 oC. The gas mixture contains 0.204 atm of nitrogen and 1.54 g of helium. Calculate the mole fraction of helium in the container.
Depict an energy-level diagram for the valence molecular : Draw an energy-level diagram for the valence molecular orbitals of CO. Include the relevant atomic orbitals in your diagram. Clearly label each molecular orbitals and fill in the appropriate number of electrons
What is the overall magnification of the microscope : The distance between the eyepiece and the objective lens in a certain compound microscope is 21.5 cm. What is the overall magnification of the microscope
Description and understanding of a newict service : Provides a thorough and detailed description and understanding of a newICT service in the workplace, worthy of analysis and provides a comprehensive description and understanding of a new ICT service in the workplace, worthy of analysis.
Find the distance of final image relative to converging lens : A diverging lens (f = -12 cm) is located 20.0 cm to the left of a converging lens (f = 35.0 cm). find the distance of the final image relative to the converging lens
Determine whether you agree with lois conclusion : For each identified obligation, determine whether you agree with LOI's conclusion and discuss the basis for your determination.
Explain the collisions become more elastic : When the external pressure on a balloon is decreased at constant temperature, what happens to the gas inside. A) The collisions become more elastic. B) the gas undergoes no changes.
Explain the specific heat of liquid ethanol c2h5oh(l) : The specific heat of liquid ethanol, C2H5OH(l), is 2.46 J/g·°C and the heat of vaporization is 39.3 kJ/mol. The boiling point of ethanol is 78.3 °C. The molecular weight of ethanol 46 g/mol.

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd