ITC540 IT Infrastructure Management

ITC540 IT Infrastructure Management

Free Samples

ITC540 IT Infrastructure Management

.cms-body-content table{width:100%!important;} #subhidecontent{ position: relative;
overflow-x: auto;
width: 100%;}

ITC540 IT Infrastructure Management

0 Download8 Pages / 1,882 Words

Course Code: ITC540
University: Charles Sturt University

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: Australia

Question

1. Define and explain the concept of the following terminologies:
 
Electronic Records Management;Business intelligence (BI) and Analytics;Data and text mining;Big data analytics and data discovery;Enterprise architecture;Management information systems;Data life cycle and data principles;Cloud computing.
2. How does “data and text mining” create business value?
 
3. What are the problems associated with cloud computing? Give two examples and provide some solutions.. Explain your answers.
 
4. Study “Data Quality Determines Systems Success and Failure” in your text book [Chapter 2, IT at Work 2.1] and answer the following questions:
 
Why was an EIS designed and implemented?
What problems did executives have with the EIS?
What were the two reasons for those EIS problems?
How did the CIO improve the EIS?
What are the benefits of the new IT architecture?
What are the benefits of data governance?
 
5. Study “Opening Case 3.1: Coca-Cola Manages at the Point That Makes a Difference” in your text book [Chapter 3] and answer the following questions:
Why is it important for Coca-Cola to be able to process POS data in near real time??
How does Coca-Cola attempt to create favorable customer experiences?
What is the importance of having a trusted view of the data?
What is the Black Book model?
Explain the strategic benefit of the Black Book model.
Rationale
This assessment task will assess the following learning outcome/s:
be able to describe the business value and processes of ICT services in an organisation and apply that knowledge and skill with initiative to a workplace scenario.be able to investigate, critically analyse and evaluate the impact of new and current ICT services to an organisation.be able to describe how effective IT Infrastructure Management requires strategic planning with alignment from both the IT and business perspectives in an organisation.be able to reflect critically on the role of an enterprise architect in an organisation.be able to synthesise the theoretical, technical and management issues that deliver ICT services to an organisation.

Answer

IT Infrastructure Management

i) Electronic Records Management (ERM): This entire system of the enterprise records management could be eventually defined as the proper collection of several computerized programs that are properly designed for the purpose of tracking as well as storing numerous types of records (Dahlstrom, Walker & Dziuban, 2013). This ERM software thus could be promptly utilized for creating and even maintaining the sensitive and personal records. The ERM is quite popular for record management in several companies.
 
ii) Business Intelligence (BI) and Business Analytics (BA): Business intelligence or BI consists of some of the most significant strategies, tools or technologies, which are then utilized by the client organizations for the sole purpose of analyzing their business related data and bring more profit (Dahlstrom & Bichsel, 2014).
Business analytics or BA majorly refers to the several types of skills, practices, tools and technologies for continuously investigating or even exploring the pre existing business performance. Thus, the proper insights and the correctly driven business plan are obtained by these skills and technologies (Eason, 2014).
iii) Data and Text Mining: The significant procedure of data mining could be easily defined as the major practice that helps in testing the existing database, irrespective of its size and then generating most relevant and important data.
The significant procedure of the text mining could be easily defined as the major practice that helps in obtaining data of good quality form any provided text and then this generated data is derived by statistical pattern learning means (Marchewka, 2014).
iv) Big Data Analytics and Data Recovery: The typical process that is used for the purpose of testing varied as well as huge set of datum or big data for substantially uncovering each and every concealed pattern, customer preferences, correlations that are not known and all other types of sensitive data can be eventually defined as big data analytics.
The specific methodology that helps in repossessing all types of corrupted, formatted, erased, inaccessible and even lost data either from some of the secondary storages or from any type of removable medium is termed as data recovery (Webster, 2014). Data recovery is extremely vital for all types of information systems, since the user does not face any issue regarding data loss or data corruption.
v) Enterprise Architecture (EA): This enterprise architecture or EA could be easily defined as one of the most popular practice for perfectly conducting the designing, planning, proper implementation and then analysis of the respective enterprise for developing and executing the specified strategies (Holtshouse, 2013). However, this type of enterprise architecture is quite expensive and thus could not be afforded by everyone.
vi) Management Information Systems (MIS): Management information system or MIS is defined as the basic kind of the information system within an organization, which helps in the processing of information or data by involving digitalized devices, systems or computers for managing as well as supporting the various decisions of the management of that particular organization (Bloom et al., 2014).
vii) Data Life Cycles as well as Data Principle: This data life cycle can be substantially defined as a major policy based approach that is utilized for the purpose of managing the flow of data in the information system.
Data principles can be defined as eight principles that are utilized by various organizations for the purpose of governing as well as protecting confidential data (Dahlstrom & Bichsel, 2014). This type of sensitive data should be relevant and sufficient for helping the users to protect the data properly.
viii) Cloud Computing: The technology that helps to use various types of networks and servers for properly hosting over the connectivity of Internet and then storing and managing any sensitive data is termed as cloud computing (Botta et al., 2014). This is the safest means of data transfer on the Internet connection.
2. The text mining and the data mining helps to perfectly create the respective values in any typical business or organization (Eason, 2014). There are several important methodologies for this text mining and data mining processes and these are as follows:
i) Engagement of the Customers: The first and the foremost methodology of the text mining as well as data mining process is the proper customers’ engagement. The customer relationship management or CRM is considered as one of the most important or significant requirement that makes any business quite popular for the customers and hence various other technologies and techniques are also applied here (Holtshouse, 2013).
ii) Better Decisions of Business: The processes of text mining and data mining are majorly responsible for the helping out of the organization by providing proper insights in the huge range of sources and documents.
iii) Risks, Compliances as well as Threat Detection: There is perfect analysis of risks required in all the sectors of a company and if this is not done, it could be highly threatening for the organization (Marchewka, 2014). Within the financial organizations, text mining is being utilized for the purpose of detecting several issues of the compliances and thus warning is provided to them to stop such actions.
These previously mentioned methods of text and data mining depict that these processes can easily create business value in all organizations.
3. Cloud computing technology is considered as the safest as well as the secured methodology for transferring any amount or size of sensitive data or information to the desired location with the help of Internet connectivity (Suo et al., 2013). In spite of having such popular and significant advantages and features, there are some of the most significant problems, present in this technology and these problems are as follows:
i) Cloud computing does not provide high security to its data.
ii) The second problem is that cloud is extremely costly and hence could not be afforded by all.
iii) The breaching of data is extremely common in this particular technology (Carlin & Curran, 2013).
iv) Another important problem of cloud computing is the presence of insider threats.
v) Migration of data is extremely difficult here.
Within the five above mentioned problems of this technology of cloud computing, the most significant and vital problems could be presence of insider threats and data breaching.
i) Presence of Insider Threats: This is the most important and significant problem for any organization, which could eventually bring major security problems within the information system and the confidential data (Pearson, 2013). This type of threat is possible for the deliberate or accidental attacks of the employees and staffs of that specific company. The employees could lose or destroy the data and thus the organization would be in trouble.
This type of security problem could be solved by providing proper training to the employees and staffs of the company and this is to be done by trained IT people.
ii) Data Breaching: Data breaching is the next important security threat in cloud computing. There is always a distinct chance that the data would be breached by the attackers, since the firewalls of the cloud computing technology are not so strong (Hwang, Dongarra & Fox, 2013). Moreover, these types of attacks are responsible for losing the integrity and confidentiality of data. Since, data recovery is not very easy in cloud, once breached; data could not be restored easily.
The data breaching within cloud computing could be eventually stooped by securing the physical space of the information system and this action could be taken by implementing the safety measures.
4. i) Reason for Designing and Implementing EIS: EIS was designed and then implemented for providing internal as well as external data to the senior manager within the company. The other reason was to identify the key performance indicators or KPIs for this company.
 
ii) Issues with EIS: Some of the major issues were present with the designing and implementation of EIS. The most important issue with EIS was that about half of the total information was not available or accessible by this system. The second issue with EIS was that the confidential data were not being accessed by the users at any cost. This was mainly because of the location complexities. The different time frames were another issue for sales revenue collection by this system.
iii) Causes for the EIS problems: The most important cause of EIS failure was that architecture was not designed perfectly for any customized report. The user interfaces were extremely complicated and thus the executives could not review KPIs.
iv) CIO Improved EIS: The CIO then designed and implemented a new EIS with the employees and hence new procedures and policies were implemented for standardizing data formats.
 
v) Advantages of new IT Architecture: The first benefit was that report modification was easily done and the second benefit was that time consumption is extremely less and thus expensive ad-hoc analysis is eliminated.
 
vi) Benefits of Data Governance: Management of the data was easier and the second benefit was that accuracy was checked as per rules and standards.
 
5. i) Significance of Processing the POS Data: This organization should develop the POS data in real-time for supporting the supply chain forecasting, replenishment processing an planning.
 
ii) Creating Favourable Customer Experience: Some of the strategies were taken by Coca-Cola Company like taking customers’ feedback, using quality framework, creating customers’ experience vision and understanding their target customer.
iii) Importance of Trusted View of Data: The trusted data viewing is  present here as it makes the data properly manageable and even cost effective in the Coca-Cola Company.
iv) Black Book Model: This model was being developed for reducing all complexities of orange juice decision model. A proper relation within the variables is quantified by this model.
 
v) Strategic Advantages of the Black Book Model: The model combines the data more than six-hundred flavours, which includes preference of customer, making of orange, regional consumers’ preference, cost pressures, weather change, rate of sweetness and expected crop yields.
References
Bloom, N., Garicano, L., Sadun, R., & Van Reenen, J. (2014). The distinct effects of information technology and communication technology on firm organization. Management Science, 60(12), 2859-2885.
Botta, A., De Donato, W., Persico, V., & Pescapé, A. (2014, August). On the integration of cloud computing and internet of things. In Future internet of things and cloud (FiCloud), 2014 international conference on (pp. 23-30). IEEE.
Carlin, S., & Curran, K. (2013). Cloud computing security. In Pervasive and Ubiquitous Technology Innovations for Ambient Intelligence Environments (pp. 12-17). IGI Global.
Dahlstrom, E., & Bichsel, J. (2014). ECAR Study of Undergraduate Students and Information Technology, 2014. Educause.
Dahlstrom, E., Walker, J. D., & Dziuban, C. (2013). ECAR study of undergraduate students and information technology(p. 2013). 2013.
Eason, K. D. (2014). Information technology and organisational change. CRC Press.
Holtshouse, D. K. (2013). Information technology for knowledge management. Springer Science & Business Media.
Hwang, K., Dongarra, J., & Fox, G. C. (2013). Distributed and cloud computing: from parallel processing to the internet of things. Morgan Kaufmann.
Marchewka, J. T. (2014). Information technology project management. John Wiley & Sons.
Pearson, S. (2013). Privacy, security and trust in cloud computing. In Privacy and Security for Cloud Computing (pp. 3-42). Springer, London.
Suo, H., Liu, Z., Wan, J., & Zhou, K. (2013, July). Security and privacy in mobile cloud computing. In Wireless Communications and Mobile Computing Conference (IWCMC), 2013 9th International (pp. 655-659). IEEE.
Webster, J. (2014). Shaping women’s work: Gender, employment and information technology. Routledge.

Free Membership to World’s Largest Sample Bank

To View this & another 50000+ free samples. Please put
your valid email id.

E-mail

Yes, alert me for offers and important updates

Submit 

Download Sample Now

Earn back the money you have spent on the downloaded sample by uploading a unique assignment/study material/research material you have. After we assess the authenticity of the uploaded content, you will get 100% money back in your wallet within 7 days.

UploadUnique Document

DocumentUnder Evaluation

Get Moneyinto Your Wallet

Total 8 pages

PAY 5 USD TO DOWNLOAD

*The content must not be available online or in our existing Database to qualify as
unique.

Cite This Work
To export a reference to this article please select a referencing stye below:

APA
MLA
Harvard
OSCOLA
Vancouver

My Assignment Help. (2021). IT Infrastructure Management. Retrieved from https://myassignmenthelp.com/free-samples/itc540-it-infrastructure-management/enterprise-architecture.html.

“IT Infrastructure Management.” My Assignment Help, 2021, https://myassignmenthelp.com/free-samples/itc540-it-infrastructure-management/enterprise-architecture.html.

My Assignment Help (2021) IT Infrastructure Management [Online]. Available from: https://myassignmenthelp.com/free-samples/itc540-it-infrastructure-management/enterprise-architecture.html[Accessed 18 December 2021].

My Assignment Help. ‘IT Infrastructure Management’ (My Assignment Help, 2021) accessed 18 December 2021.

My Assignment Help. IT Infrastructure Management [Internet]. My Assignment Help. 2021 [cited 18 December 2021]. Available from: https://myassignmenthelp.com/free-samples/itc540-it-infrastructure-management/enterprise-architecture.html.

×
.close{position: absolute;right: 5px;z-index: 999;opacity: 1;color: #ff8b00;}

×

Thank you for your interest
The respective sample has been mail to your register email id

×

CONGRATS!
$20 Credited
successfully in your wallet.
* $5 to be used on order value more than $50. Valid for
only 1
month.

Account created successfully!
We have sent login details on your registered email.

User:

Password:

With time, MyAssignmenthelp.com has become one of the best college essay writing services. We have helped may students get admitted in reputed Universities with our Excellent College Admission Essays.Not only that many students have gained on the score of eligibility for scholarship with our scholarhsip essays. Be it essays of high schools or college on any topic and specialization, we deliver the best. Our turnaround time is fast. We provide help on all kinds of college essays be it expository, narrative, descriptive. We also provide literature review essay help alongwith others. With perfect essay outline and college essay format, the visual component of our essays are much better.

Latest Management Samples

div#loaddata .card img {max-width: 100%;
}

MPM755 Building Success In Commerce
Download :
0 | Pages :
9

Course Code: MPM755
University: Deakin University

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: Australia

Answers:
Introduction
The process of developing a successful business entity requires a multidimensional analysis of several factors that relate to the internal and external environment in commerce. The areas covered in this current unit are essential in transforming the business perspective regarding the key commerce factors such as ethics, technology, culture, entrepreneurship, leadership, culture, and globalization (Nzelibe, 1996; Barza, 2…
Read
More

SNM660 Evidence Based Practice
Download :
0 | Pages :
8

Course Code: SNM660
University: The University Of Sheffield

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: United Kingdom

Answers:
Critical reflection on the objective, design, methodology and outcome of the research undertaken Assessment-I
Smoking and tobacco addiction is one of the few among the most basic general restorative issues, particularly to developed nations such as the UK. It has been represented that among all risk segments smoking is the fourth driving purpose behind infections and other several ailments like asthma, breathing and problems in the l…
Read
More
Tags:
Australia Maidstone Management Business management with marketing University of New South Wales Masters in Business Administration 

BSBHRM513 Manage Workforce Planning
Download :
0 | Pages :
20

Course Code: BSBHRM513
University: Tafe NSW

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: Australia

Answer:
Task 1
1.0 Data on staff turnover and demographics
That includes the staffing information of JKL industries for the fiscal year of 2014-15, it can be said that the company is having problems related to employee turnover. For the role of Senior Manager in Sydney, the organization needs 4 managers; however, one manager is exiting. It will make one empty position which might hurt the decision making process. On the other hand, In Brisba…
Read
More

MKT2031 Issues In Small Business And Entrepreneurship
Download :
0 | Pages :
5

Course Code: MKT2031
University: University Of Northampton

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: United Kingdom

Answer:
Entrepreneurial ventures
Entrepreneurship is the capacity and willingness to develop, manage, and put in order operations of any business venture with an intention to make profits despite the risks that may be involved in such venture. Small and large businesses have a vital role to play in the overall performance of the economy. It is, therefore, necessary to consider the difference between entrepreneurial ventures, individual, and c…
Read
More
Tags:
Turkey Istanbul Management University of Employee Masters in Business Administration 

MN506 System Management
Download :
0 | Pages :
7

Course Code: MN506
University: Melbourne Institute Of Technology

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: Australia

Answer:
Introduction
An operating system (OS) is defined as a system software that is installed in the systems for the management of the hardware along with the other software resources. Every computer system and mobile device requires an operating system for functioning and execution of operations. There is a great use of mobile devices such as tablets and Smartphones that has increased. One of the widely used and implemented operating syste…
Read
More
Tags:
Australia Cheltenham Computer Science Litigation and Dispute Management University of New South Wales Information Technology 

Next

Our Essay Writing Service Features

Qualified Writers
Looming deadline? Get your paper done in 6 hours or less. Message via chat and we'll get onto it.
Anonymity
We care about the privacy of our clients and will never share your personal information with any third parties or persons.
Free Turnitin Report
A plagiarism report from Turnitin can be attached to your order to ensure your paper's originality.
Safe Payments
The further the deadline or the more pages you order, the lower the price! Affordability is in our DNA.
No Hidden Charges
We offer the lowest prices per page in the industry, with an average of $7 per page
24/7/365 Support
You can contact us any time of day and night with any questions; we'll always be happy to help you out.
$15.99 Plagiarism report
$15.99 Plagiarism report
$15.99 Plagiarism report
$15.99 Plagiarism report
$3.99 Outline
$21.99 Unlimited Revisions
Get all these features for $65.77 FREE
Do My Paper

Frequently Asked Questions About Our Essay Writing Service

Academic Paper Writing Service

Our essay writers will gladly help you with:

Essay
Business Plan
Presentation or Speech
Admission Essay
Case Study
Reflective Writing
Annotated Bibliography
Creative Writing
Report
Term Paper
Article Review
Critical Thinking / Review
Research Paper
Thesis / Dissertation
Book / Movie Review
Book Reviews
Literature Review
Research Proposal
Editing and proofreading
Other
Find Your Writer

Latest Feedback From Our Customers

Customer ID:  # 678224
Research Paper
Highly knowledgeable expert, reasonable price. Great at explaining hard concerts!
Writer: Raymond B.
08/10/2021
Customer ID: # 619634
Essay (any type)
Helped me with bear and bull markets right before my exam! Fast teacher. Would work with Grace again.
Writer: Lilian G.
08/10/2021
Customer ID: # 519731
Research Paper
If you are scanning reviews trying to find a great tutoring service, then scan no more. This service elite!
Writer: Grace P.
08/10/2021
Customer ID: #499222
Essay (any type)
This writer is great, finished very fast and the essay was perfect. Writer goes out of her way to meet your assignment needs!
Writer: Amanda B.
08/10/2021
Place an Order

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00
×

Powered by essayworldwide.com

× WhatsApp Us