It infrastructure management assessment item 2enterprise

Assignment Help Computer Network Security
Reference no: EM13573227

Assessment item 2 <br/>Enterprise Architect''s Bog & SWOT Analysis II <br/>Value: 35% <br/>Due date: 04-Oct-2014 <br/>Return date: 25-Oct-2014 <br/>Submission method options <br/>Alternative submission method <br/>Task <br/> WHAT TO DO FOR Task 2A (15%) <br/> <br/>Submit your Enterprise Architect blog as a single page with the Web address of your blog via EASTS for marking by the Due Date in the Study Schedule. <br/>The final blog entry is titled The Future of enterprise architecture and requires answers to the following question (Max 300 words). The main aim of this part is for you to reflect critically on the role of an enterprise architect in an organisation. <br/> <br/>"(a) What is the difference between enterprise architecture and IT architecture? (b) Should enterprise architecture really be called “IT” architecture?" <br/>When doing the above task, you should also: <br/> <br/>Continue to store the same postings made to the blog each week, as defined in Assessment Item 1 previously. <br/>Continue to engage in forum discussions with others and reply to other posts from your peers. <br/>WHAT TO DO FOR Task 2B (15%) <br/> <br/>Many leading organizations and managers have raised concerns about Enterprise Architecture as an effective practice, you are required to do some research and reflect critically on the role of an enterprise architect in an organisation by doing a SWOT Analysis of a new ICT service in an organization. <br/> <br/> <br/>Follow the same procedure as described in Assessment Item 1 and the use the same SWOT Analysis Template to analyse and evaluate a new ICT product or service. <br/>Compare the SWOT Analysis results of the current ICT service (from Assessment Item 1) with the SWOT Analysis results of the new ICT service. <br/>In your role as Enterprise Architect, write a report listing and evaluating the findings from your analysis and include your recommendations as per the SWOT template <br/> <br/>Rationale <br/>Assessment Item 2 is aligned with objectives 2, 3, 5 and 6 and measures your ability to undertake a role-play as an Enterprise Architect, who is able to investigate, analyse and evaluate the impact of new and current ICT services. In addition the EA must acquire an understanding of the importance of aligning strategic planning from both the IT and management perspectives. <br/> <br/>Blogging is a good way to build a knowledge base, assist in developing business intelligence, project management and knowledge management and succession planning as well as discussing the issues of Enterprise Architect that may arise during the integration of new technology into a firm''s ICT infrastructure. <br/> <br/>Good IT manager''s and EA’s can reflect critically on their role and know how to analyse technology <br/>trends and synthesise the theory with the technical and management issues in ICT service delivery. <br/> <br/>Marking criteria <br/> <br/> <br/> Learning Outcomes <br/> <br/> <br/>1. be able to describe the business value and processes of ICT services in an organisation and understand the knowledge and skills of an enterprise architect in the workplace; <br/>2. be able to investigate, analyse and evaluate the impact of new and current ICT services to an organisation; <br/>3. be able to understand that effective IT Infrastructure Management requires strategic planning with alignment from both the IT and business perspectives in an organisation; <br/>4. be able to demonstrate the technical and communications skills that contribute to ICT governance in an organisation; <br/>5. be able to reflect critically on the role of an enterprise architect in an organisation; <br/>6. be able to synthesise the key theoretical concepts with the technical and management issues in delivering ICT services to an organisation. <br/> <br/> <br/>Marking criteria & standards of performance <br/> <br/>Task 2A be able to reflect critically on the role of an enterprise architect in an organisation <br/>Value 15% <br/>Learning Outcomes covered by Task 2A = 1,4,5,6 <br/> <br/>Criteria <br/>HD => 85% <br/>DI 75-84% <br/>CR 65-74% <br/>PS 50-64% <br/> <br/>Enterprise Architect (EA) role and initial <br/>Posting as introduction <br/>2.00% <br/>Posts are conceptually <br/>advanced, engaged in a substantive way with the material. <br/>1.70 to 2.00% <br/>Comprehensive introduction and purpose of the blog as an EA. Blog posts are well developed and engaged with the material; lacks conceptual clarity. <br/>1.50 to 1.69% <br/>Good introduction and understanding of the EA role. Blog posts are adequate, but reflect superficial engagement with the material. <br/>1.30 to 1.49% <br/>Brief introduction and unclear about the EA role; very few <br/>Blog postings in early weeks, but a start has been made that can be improved in future. <br/>1.00 to 1.29% <br/>Frequency of Blog entries <br/>1.00% <br/>Participates frequently and consistently. <br/>0.85 to 1.00% <br/>Participates 1-2 a week, but <br/>Blog postings are not distributed. <br/>0.75 to 0.84% <br/>Participates once a week. <br/>0.65 to 0.74% <br/>Infrequent participation or all done in batch near the due date. <br/>0.50 to 0.64% <br/>Weekly content contribution via Blog and Forums <br/>2.00% <br/>Sophisticated and confident understanding of topics and both Blog and Forum posts draw directly upon the Module activities and Chapter assessment material to <br/>make a creative and <br/>substantive point that <br/>extends beyond the <br/>material. <br/>1.70 to 2.00% <br/>Content is factually accurate and adds to the forum discussion but does not include much conceptual understanding or development at times. <br/>1.50 to 1.69% <br/>Content follows the Module activities but does not add <br/>substantively to the discussion via forums. <br/>1.30 to 1.49% <br/>Posts just the basic information, may be working tangential to discussion on the Forum. <br/>1.00 to 1.29% <br/> <br/>Task 2B SWOT Analysis of a new ICT service <br/>Value 15% <br/>Learning Outcomes covered by Task 2B = 2,3 <br/> <br/>Criteria <br/>HD => 85% <br/>DI 75-84% <br/>CR 65-74% <br/>PS 50-64% <br/> <br/>Description of the new ICT service under investigation <br/>1.00% <br/>Provides a thorough and detailed description and understanding of a newICT service in the workplace, worthy of analysis. <br/>0.85 to 1.00% <br/>Provides a comprehensive description and understanding of a new ICT service in the workplace, worthy of analysis. <br/>0.75 to 0.84% <br/>Provides a good description and basic understanding of a current ICT service in the workplace, chosen for analysis. <br/>0.65 to 0.74% <br/>Provides only a brief description or unclear understanding of a new ICT service in the workplace, as chosen for analysis. <br/>0.50 to 0.64% <br/>Identifications of Strengths, Weaknesses, Opportunities and Threat (maximum of 5 each) <br/>5.00% <br/>SWOT table items identified demonstrate a thorough and insightful understanding of the key concepts, principles and theories of SWOT analysis. 4.25 to 5.00% <br/>SWOT table items identified demonstrate considerable understanding of the key concepts, principles and theories of SWOT analysis. 3.75 to 4.24% <br/>SWOT table items identified demonstrate good understanding of the key concepts, principles and theories of SWOT analysis.3.25 to 3.74% <br/>SWOT table items identified demonstrate limited understanding of the key concepts, principles and theories of SWOT analysis. 2.50 to 3.24% <br/>Summary of SWOT results, Critical Thinking & Recommendations <br/>2.00% <br/>Summary and Recommendations demonstrates a high degree of critical thinking and ability to use specific strategies to gather information and generate recommendations for the ICT service under SWOT analysis. <br/>1.70 to 2.00% <br/>Summary and Recommendations demonstrates considerable critical thinking ability to use specific strategies to gather information and generate recommendations for the ICT service under SWOT analysis. <br/>1.50 to 1.69% <br/>Summary and Recommendations demonstrates some critical thinking ability to use specific strategies to gather information and generate recommendations for the ICT service under SWOT analysis. <br/>1.50 to 1.69% <br/>Summary and Recommendations demonstrates limited critical thinking ability to use specific strategies to gather information and generate recommendations for the ICT service under SWOT analysis. <br/>1.00 to 1.29% <br/>Stated review of goals and objectives in short, mid and long term plans <br/>2.00% <br/>Review of goals and objectives demonstrates a high degree of ability as an EA to use an organizational pattern of results to structure ideas for planning and development. <br/>1.70 to 2.00% <br/>Review of goals and objectives demonstrates considerable ability as an EA to use an organizational pattern to structure ideas for planning and development. <br/>1.50 to 1.69% <br/>Review of goals and objectives demonstrates some ability as an EA to use an organizational pattern to structure ideas for planning and development. <br/>1.50 to 1.69% <br/>Review of goals and objectives demonstrates limited ability as an EA to use an organizational pattern to structure ideas for planning and development. <br/>1.00 to 1.29% <br/>

Reference no: EM13573227

Questions Cloud

Consider that while chinese and indian immigrants were : consider that while chinese and indian immigrants were arriving in the u.s. the british were arriving in china and
Why is it important for kids to be a challenged and fail : 2 pages in length double spaced. the font should be times new roman 12. we live in a culture that gives kids praise for
It infrastructure management pg assessment item 2enterprise : assessment item 2 ltbrgtenterprise architect3939s bog amp swot analysis ii ltbrgtvalue 35 ltbrgtdue date 04-oct-2014
Inflation what is : what is
It infrastructure management assessment item 2enterprise : assessment item 2 ltbrgtenterprise architect3939s bog amp swot analysis ii ltbrgtvalue 35 ltbrgtdue date 04-oct-2014
Assignment help would you be able to provide me with : would you be able to provide me with answers to my assignment homework in the next few hours? it3939s due at
Ireland and spain have been experiencing ireland and spain : ireland and spain have been experiencing deep economic crises. the crises were the results of the preceding booms with
Ireland and spain have been experiencing ireland and spain : ltbrgtireland and spain have been experiencing deep economic crises. the crises were the results of the preceding booms
Discreet mathemathics complete assignment to be completed : complete assignment. to be completed on pdf or .doc or .dox ltbrgt

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd