Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
49 Cards in this Set
- Front
- Back
Global Enterprise |
Internet creates a borderless global environment with enormous opportunity for low cost communication and exchange with all parties involved in international business
Managing a global EA includes not only technology issues but political and cultural considerations. |
|
Enterprise Architect |
Is a person grounded in technology, fluent in business, a patient diplomat and provides the important bridge between IT and the business. |
|
Enterprise Architecture |
Includes the plans for how an organization will build, deploy, use and share its data processes and IT assets |
|
Top International Telecommunication Issues |
1) Network - improving the operational efficiency of networks Dealing with different networks Controlling data communication security 2) Regulatory Issues - transborder data flow - International telecomminications regulations - politics 3) Technology and Country-Oriented Issues - managing network infrastructure across countries - international integration of technologies - reconciling national differences - dealing with international tariff structures
|
|
Three Basic Enterprise Architectures |
Data Architecture - back up, disaster recovery, security
Infrastructure Architecture - flexibility, scalability, reliability, availability, performance
Application Architecture - web services, open systems |
|
Data Architecture |
Identifies where and how important data, like customer records are maintained and secured |
|
Infrastructure Architecture |
Includes the hardware, software, and telecommunications equipment that when combined provide the underlying foundation to support the organizations goals. |
|
Application Architecture |
determines how applications integrate and relate to each other |
|
Data Architecture -Back up |
an exact copy of a system's information |
|
Data Architecture: Disaster Recovery |
the ability to get a system up and running in the event of a system crash or failure and includes restoring the information backup - mind the EA - monitor the quality of computer networks that provide data on power suppliers and demand - make sure the networks can be restored quickly in the case of downtime - set up disaster recovery plans - provide adequate staff training, including verbal communication protocols so that opearators are aware of any IT related problems |
|
Disaster Recovery plan |
a detailed process for recovering information or an IT system in case of a disaster such as fire or flood |
|
Disaster Recovery cost curve |
charts the cost of the unavailablity of informaion and technology, and the cost of recovering from a disaster over time
opitmal disaster plan is where the 2 lines intersect |
|
Hot Site |
a separate, fully equiped facility that the company moves into after a disaster |
|
Cold Site |
a separate facility lacking computer equipment where employees can move after a disaster |
|
Business Continuity Planning |
Is a plan for how an organization will recover and restore partially or completely interrupted critical functions within a predetermined time after a disaster or extended disruption.` |
|
5 key pieces to the BCP - 1 Governance |
establishes a governance structure in the form of committees that make sure control is established during a diaster |
|
5 key pieces to the BCP - 2 Impact Analysis |
that identifies an organizations goals and critical services of products; ranks the order of priority of services or products for continuous delivery or rapid recovery; and identifies internal and external impacts of disruptions |
|
5 key pieces to the BCP - 3 Plans |
Plans, measures and arrangements required for business continuity |
|
5 key pieces to the BCP - 4 Procedures |
Readiness procedures that allow for the training of staff about the BCP and also outlines the exercises staff undertake during training |
|
5 key pieces to the BCP - 5 Quality Assurance |
Quality Assurance techniques that assess the plan's accuracy, relevance and effectiveness and uncover which parts of the plan require improvement |
|
Key Elements when incident occurs |
the response itself -communications management, operations managment followed by crictical services as identified by the BCP. then restoration and recovery of normal business operations. |
|
Security |
preventing unauthorized access, copying, deletion and modification of data ensuring continuity of operations and managing of user access |
|
Managing User access |
preventing unauthorized access to the information system and it's data. Weakest link in securing IS |
|
Anti-virus software and patches |
applications that prevent hackers, spammers and other malcontents from entering the network. Constantly updated and changed. |
|
Infrastructure Architecture - components |
Flexibility Scalability Reliability Availability Performance |
|
Flexibility |
systems must be flexible enough to meet all types of change |
|
Scalability |
refers to how well a system can adapt to increased demands |
|
Capacity Planning |
determines the future IT infrastructure requirements for new equipment and additional network capacity. - ensures the IT infrastructure is scalable |
|
Reliability |
ensures that all systems are functioning correctly and providing accurate information. Another term for accuracy |
|
Availability |
(an efficiency IT metric) addresses when systems can be accessed by users. |
|
High Availability |
Refers to a system or component that is continuously operational for a desirable length of time |
|
Performance |
measures how quickly a system performs a certain process or transaction ( in effiency IT metrics of both speed and throughput) |
|
Application Architecture - components |
WebServices Open Systems |
|
Web Services |
Contain a repertoire of Web based data and procedural resources that use shared protocols and standards permitting different applications to share data and services
|
|
Interoperability |
the capability of two or more computer systems to share data and resources, even though they are made by different manufacturers. |
|
Events |
The ears and eyes of the business expressed in technology. They detect threats and opportunities and alert those who can act on the information monitor information systems |
|
Services |
Software products more than coding projects. Must appeal to a broad audience, and they need to be able to be reusable if they are going to have an impact on productivity
ex credit check - valuable to business processes |
|
Open Systems |
Is a broad, general term that describes non-proprietary IT hardware and software made available by the standards and procedures by which their products work, making it easier to integrate them.
Allows for data sharing |
|
Open source |
Refers to any programs whose source code is made available for use or modification as users or other developers see fit.
|
|
Architecture Trends |
Service-oriented architecture (SOA) Virtualization Grid Computing Cloud computing
|
|
Service-Oriented Architecture |
Is a business driven IT architectural approach that supports integrating a business as linked,repeatable tasks or services.
assures IT systems can adapt quickly, easily, and economically to support rapidly changing business needs
cannot be purchased - an approach. |
|
SOA business benefits |
Services interoperability loose coupling |
|
SOA services |
Begins with a service such as a simple business task for example checking a potential customer's credit rating when opening a new account.
Business tasks simplified by SOA services which provide technology |
|
Extensible Markup Language |
Most web services are based on this language. It it a markup language for documents containing structured information. |
|
Loose Coupling |
Is the capability of services to be joined on demand to create composite services or disassembled just as easily into their functional components. |
|
Virtualization |
Is a framework of dividing the resources of computer into mulitple execution environments. a way of increasing physical resources to maximize the investment in hardware. |
|
System virtualization |
is the ability to present the resources of a single computer as if it is a collection of separate computers (virtual machine) each with it's own virtual CPUs network interfaces, storage and operating system |
|
Grid Computing |
is an aggregation of geographically dispersed computing storage, and network resources, coordinated to deliver improved performance, higher quality of service , better usage and easier access to data. enables the virtualization of distributed computing and data resources such as processing |
|
Cloud Computing |
is a form of client/server computing operating over the internet where the term "cloud" is used as a metaphor for the term internet. Clients are "thin" consisting of just interface software, such as a web browser and servers house the actual applications and data. |