Metrics to assess information technology planning

Assignment Help Basic Computer Science
Reference no: EM132803505

Respond to these advantages of using metrics by giving a "Disadvantages" response about using metrics to assess Information Technology Planning:

1. Advantages of using metrics to assess information technology planning.

Metrics are quantifiable measurements that can aid IT leaders in efficiently managing the business. IT metrics can make sure the IT investments align to the business strategy. Metrics can help the business to understand where it has been, where it is heading, whether something is going wrong, and when the business reaches its goals (The Importance of Implementing Effective Metrics, 2019). Successful businesses solve issues before they become a problem, metrics can aid a business in being proactive to address issues before they become real problems.

Relevant metrics can:

Aid and improve decision making

Provide focus for the organization and employees

Drive performance

IT metrics can also help businesses understand how their IT initiatives performed. Most of us want to see proof whether something actually was a benefit or not. When I go to Target and use my circle rewards I want proof that I saved money.

2. Lord Kelvin once said: "When you can measure what you are speaking about, and express it in numbers, you know something about it; but when you cannot measure it, when you cannot express it in numbers, your knowledge is of a meagre and unsatisfactory kind" (Saxon, 2018). Metrics provide objective information from which to make decisions from.

An example where metrics would be valuable would be a cloud PaaS (Platform as a service) provider. They could enter into service level agreements (SLAs) where commit to providing 99.9% availability. The SLA may event provide for some additional maintenance window work such as in the lesson example. Metrics should be a requirement to both ensure compliance with SLAs, and to prove compliance with SLAs. Without those metrics, a customer could have a network issue and attribute it to your cloud service, Failure to meet an SLA can have financial consequences.

From a planning perspective, the data from metrics such as availability can be useful to an organization when evaluating how to specify services or identify where improvements can be made. Other metrics such as CPU/memory utilization, storage availability, and other hardware metrics can drive hardware upgrades.

Metrics need to be useful and actionable. Just because it can be measured, doesn't mean it should be measured. There is almost a CRAAP test or "so what?" test that needs to be used when establishing metrics. If used correctly, metrics clearly add value to IT planning.

Reference no: EM132803505

Questions Cloud

How is data mining different from database : How is a data mining different from a database? Present an example where data mining is crucial to the success of a business.
Professional ethics : Explain how the code of ethics relates to the Christian worldview. Many of the codes of ethics were founded with Biblical principles; explain this relationship.
How is data mining different from database : How is a data mining different from a database? Present an example where data mining is crucial to the success of a business.
About web forensics : Write about Web Forensics, what you have learned, how it is useful at your workplace (working as a Quality Analyst),
Metrics to assess information technology planning : Respond to these advantages of using metrics by giving a "Disadvantages" response about using metrics to assess Information Technology Planning.
Program error or system failure : the book where insufficient testing was a factor in a program error or system failure. What was one cause in the delay in the completing of the Denver Airport.
Control of serialization of memory management : The control of the serialization of memory management is difficult in a "Virtual Memory" and especially when "Virtual Machines" are included.
Practical manner to your current work environment : Describing how the knowledge, skills, or theories of this course have been applied or could be applied, in a practical manner to your current work environment.
Blockchain implementation : Discussing how a blockchain implementation would improve data security in a military, education, or other context.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Describe the model''s strengths and weaknesses

Describe the model's strengths and weaknesses

  Discuss about different storage devices

Discuss about different storage devices, how they are accessed (what protocols) and how to apply them to a storage design.

  Flyer and newsletter

You will be designing and preparing a one-page flyer and a one-page club newsletter. You should design the flyer from a "Blank" document.

  Hardware-software and network requirements

Explain at least two possible approaches to managing the data for easy access and security.

  What filesystems are currently mounted on your system

Answer the following questions regarding your system by using the commands listed in this chapter. For each question, write the command you used to obtain the answer.

  Talk about why a database needs to be secured.

Talk about why a database needs to be secured. Identify three actions that can be applied to a database environment to manage user access.

  Growth rate of nominal gdp

a. According to the quantity theory of money, what will be the growth rate of nominal GDP= PxY?

  About radical changes across industries

Describe how technology has helped bring about radical changes across industries and throughout societies.

  Effective technique for discovering errors in a program

1. Explain why program inspections are an effective technique for discovering errors in a program. What types of error are unlikely to be discovered through inspections?

  Working with windows group policy objects

Understanding the design and application of group policies will not only aid you in user management, it will also help you to provide a more secure network.

  Write the rest of the program using assignment statements

Two variables named largest and smallest are declared for you. Use these variables to store the largest and smallest of the three integer values. You must decide what other variables you will need and initialize them if appropriate.

  Section on IT leader in digital transformation era

Review the section on the IT leader in the digital transformation era. What are some methods or resources leaders can utilize to enhance their change attitude?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd