Business Plug-In B4 Enterprise Architecture
LEARNING OUTCOMES <ul><ul><li>Explain the three components of an enterprise architecture </li></ul></ul><ul><ul><li>Descri...
Enterprise Architectures <ul><li>Enterprise architecture  -  includes the plans for how an organization will build, deploy...
Enterprise Architectures <ul><li>Primary goals of enterprise architectures </li></ul>
Enterprise Architectures
Information Architecture
Backup and Recovery <ul><li>Backup  -   an exact copy of a system’s information </li></ul><ul><li>Recovery  -  the ability...
Disaster Recovery <ul><li>Disaster recovery best practices include: </li></ul><ul><ul><li>Mind the enterprise architecture...
Disaster Recovery <ul><li>Financial institutions Worldwide Spending on Disaster Recovery </li></ul>
Disaster Recovery <ul><li>Disaster recovery plan  -   a detailed process for recovering information or an IT system in the...
Disaster Recovery
Information Security <ul><li>A good information architecture includes: </li></ul><ul><ul><li>A strong information security...
Infrastructure Architecture
Infrastructure Architecture <ul><li>Five primary characteristics of a solid infrastructure architecture: </li></ul><ul><ul...
Application Architecture <ul><li>Application architecture -  determines how applications integrate and relate to each othe...
Web Services <ul><li>Web service  -   contains a repertoire of Web-based data and procedural resources that use shared pro...
Web Services <ul><li>Event  -   detect threats and opportunities and alert those who can act on the information </li></ul>...
Open Systems <ul><li>Open system  -   a broad, general term that describes nonproprietary IT hardware and software made av...
Closing Case One Chicago Tribune’s Server Consolidation a Success <ul><li>The Chicago Tribune is the seventh-largest newsp...
Closing Case One Questions <ul><li>Review the five characteristics of infrastructure architecture and rank them in order o...
Closing Case One Questions <ul><li>Why is a scalable and highly available enterprise architecture critical to the Tribune ...
Closing Case Two Fear the Penguin <ul><li>Linus Torvalds, who wrote the kernel (the core) of the Linux operating system at...
Closing Case Two Fear the Penguin <ul><li>How does Linux differ from traditional software? </li></ul><ul><li>Should Micros...
Closing Case Two Fear the Penguin <ul><li>How can you use Linux as an emerging technology to gain a competitive advantage?...
Upcoming SlideShare
Loading in …5
×

Business_PlugIn_B4_Student_PPT.ppt (1412.0K)

694 views

Published on

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
694
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
7
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Business_PlugIn_B4_Student_PPT.ppt (1412.0K)

  1. 1. Business Plug-In B4 Enterprise Architecture
  2. 2. LEARNING OUTCOMES <ul><ul><li>Explain the three components of an enterprise architecture </li></ul></ul><ul><ul><li>Describe how an organization can implement a solid information architecture </li></ul></ul><ul><ul><li>List and describe the five qualities of an infrastructure architecture </li></ul></ul><ul><ul><li>Compare Web services and open systems </li></ul></ul>
  3. 3. Enterprise Architectures <ul><li>Enterprise architecture - includes the plans for how an organization will build, deploy, use, and share its data, processes, and IT assets </li></ul><ul><li>Enterprise architect (EA) - a person grounded in technology, fluent in business, a patient diplomat, and provides the important bridge between IT and the business </li></ul>
  4. 4. Enterprise Architectures <ul><li>Primary goals of enterprise architectures </li></ul>
  5. 5. Enterprise Architectures
  6. 6. Information Architecture
  7. 7. Backup and Recovery <ul><li>Backup - an exact copy of a system’s information </li></ul><ul><li>Recovery - the ability to get a system up and running in the event of a system crash or failure and includes restoring the information backup </li></ul><ul><ul><li>Fault tolerance </li></ul></ul><ul><ul><li>Failover </li></ul></ul>
  8. 8. Disaster Recovery <ul><li>Disaster recovery best practices include: </li></ul><ul><ul><li>Mind the enterprise architectures </li></ul></ul><ul><ul><li>Monitor the quality of computer networks that provide data on power suppliers and demand </li></ul></ul><ul><ul><li>Make sure the networks can be restored quickly in the case of downtime </li></ul></ul><ul><ul><li>Set up disaster recovery plans </li></ul></ul><ul><ul><li>Provide adequate staff training, including verbal communication protocols “so that operators are aware of any IT-related problems </li></ul></ul>
  9. 9. Disaster Recovery <ul><li>Financial institutions Worldwide Spending on Disaster Recovery </li></ul>
  10. 10. Disaster Recovery <ul><li>Disaster recovery plan - a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood </li></ul><ul><li>Disaster recovery cost curve - charts (1) the cost to the organization of the unavailability of information and technology and (2) the cost to the organization of recovering from a disaster over time </li></ul><ul><ul><li>Hot site </li></ul></ul><ul><ul><li>Cold site </li></ul></ul>
  11. 11. Disaster Recovery
  12. 12. Information Security <ul><li>A good information architecture includes: </li></ul><ul><ul><li>A strong information security plan </li></ul></ul><ul><ul><li>Managing user access </li></ul></ul><ul><ul><li>Up-to-date antivirus software and patches </li></ul></ul>
  13. 13. Infrastructure Architecture
  14. 14. Infrastructure Architecture <ul><li>Five primary characteristics of a solid infrastructure architecture: </li></ul><ul><ul><li>Flexibility </li></ul></ul><ul><ul><li>Scalability </li></ul></ul><ul><ul><li>Reliability </li></ul></ul><ul><ul><li>Availability </li></ul></ul><ul><ul><li>Performance </li></ul></ul>
  15. 15. Application Architecture <ul><li>Application architecture - determines how applications integrate and relate to each other </li></ul>
  16. 16. Web Services <ul><li>Web service - contains a repertoire of Web-based data and procedural resources that use shared protocols and standards permitting different applications to share data and services </li></ul><ul><li>Interoperability - the capability of two or more computer systems to share data and resources, even though they are made by different manufacturers </li></ul>
  17. 17. Web Services <ul><li>Event - detect threats and opportunities and alert those who can act on the information </li></ul><ul><li>Service - more like software products than they are coding projects, and must appeal to a broad audience, and they need to be reusable if they are going to have an impact on productivity </li></ul>
  18. 18. Open Systems <ul><li>Open system - a broad, general term that describes nonproprietary IT hardware and software made available by the standards and procedures by which their products work, making it easier to integrate them </li></ul><ul><ul><li>Allow systems to seamlessly share information </li></ul></ul><ul><ul><li>Capitalize on enterprise architectures </li></ul></ul><ul><ul><li>Eliminate proprietary systems and promote competitive pricing </li></ul></ul>
  19. 19. Closing Case One Chicago Tribune’s Server Consolidation a Success <ul><li>The Chicago Tribune is the seventh-largest newspaper in the country </li></ul><ul><li>Overhauling its data center and consolidating servers was a difficult task; however, the payoff was tremendous </li></ul>
  20. 20. Closing Case One Questions <ul><li>Review the five characteristics of infrastructure architecture and rank them in order of their potential impact on the Tribune Co.’s business </li></ul><ul><li>What is the disaster recovery cost curve? Where should the Tribune Co. operate on the curve? </li></ul><ul><li>Define backups and recovery. What are the risks to the Tribune’s business if it fails to implement an adequate backup plan? </li></ul>
  21. 21. Closing Case One Questions <ul><li>Why is a scalable and highly available enterprise architecture critical to the Tribune Co.’s current operations and future growth? </li></ul><ul><li>Identify the need for information security at the Tribune Co. </li></ul><ul><li>How could the Tribune Co. use a classified ad Web service across its different businesses? </li></ul>
  22. 22. Closing Case Two Fear the Penguin <ul><li>Linus Torvalds, who wrote the kernel (the core) of the Linux operating system at age 21, posted the operating system on the Internet and invited other programmers to improve his code and users to download his operating system for free </li></ul><ul><li>Since then, tens of thousands of people have, making Linux perhaps the single largest collaborative project in the planet’s history </li></ul>
  23. 23. Closing Case Two Fear the Penguin <ul><li>How does Linux differ from traditional software? </li></ul><ul><li>Should Microsoft consider Linux a threat? Why or why not? </li></ul><ul><li>How is open source software a potential trend shaping organizations? </li></ul>
  24. 24. Closing Case Two Fear the Penguin <ul><li>How can you use Linux as an emerging technology to gain a competitive advantage? </li></ul><ul><li>Research the Internet and discover potential ways that Linux might revolutionize business in the future </li></ul>

×