Itc540 It Infrastructure Management Answers Assessment Answers
Business intelligence (BI) and Analytics;
Data and text mining;
Big data analytics and data discovery;
Enterprise architecture;
Management information systems;
Data life cycle and data principles;
Cloud computing.
Why is it important for Coca-Cola to be able to process POS data in near real time??
Rationale
This assessment task will assess the following learning outcome/s:
be able to investigate, critically analyse and evaluate the impact of new and current ICT services to an organisation.
be able to describe how effective IT Infrastructure Management requires strategic planning with alignment from both the IT and business perspectives in an organisation.
be able to reflect critically on the role of an enterprise architect in an organisation.
be able to synthesise the theoretical, technical and management issues that deliver ICT services to an organisation.
Answer
IT Infrastructure Management
Business analytics or BA majorly refers to the several types of skills, practices, tools and technologies for continuously investigating or even exploring the pre existing business performance. Thus, the proper insights and the correctly driven business plan are obtained by these skills and technologies (Eason, 2014).
iii) Data and Text Mining: The significant procedure of data mining could be easily defined as the major practice that helps in testing the existing database, irrespective of its size and then generating most relevant and important data.
The significant procedure of the text mining could be easily defined as the major practice that helps in obtaining data of good quality form any provided text and then this generated data is derived by statistical pattern learning means (Marchewka, 2014).
iv) Big Data Analytics and Data Recovery: The typical process that is used for the purpose of testing varied as well as huge set of datum or big data for substantially uncovering each and every concealed pattern, customer preferences, correlations that are not known and all other types of sensitive data can be eventually defined as big data analytics.
The specific methodology that helps in repossessing all types of corrupted, formatted, erased, inaccessible and even lost data either from some of the secondary storages or from any type of removable medium is termed as data recovery (Webster, 2014). Data recovery is extremely vital for all types of information systems, since the user does not face any issue regarding data loss or data corruption.
v) Enterprise Architecture (EA): This enterprise architecture or EA could be easily defined as one of the most popular practice for perfectly conducting the designing, planning, proper implementation and then analysis of the respective enterprise for developing and executing the specified strategies (Holtshouse, 2013). However, this type of enterprise architecture is quite expensive and thus could not be afforded by everyone.
vi) Management Information Systems (MIS): Management information system or MIS is defined as the basic kind of the information system within an organization, which helps in the processing of information or data by involving digitalized devices, systems or computers for managing as well as supporting the various decisions of the management of that particular organization (Bloom et al., 2014).
vii) Data Life Cycles as well as Data Principle: This data life cycle can be substantially defined as a major policy based approach that is utilized for the purpose of managing the flow of data in the information system.
Data principles can be defined as eight principles that are utilized by various organizations for the purpose of governing as well as protecting confidential data (Dahlstrom & Bichsel, 2014). This type of sensitive data should be relevant and sufficient for helping the users to protect the data properly.
viii) Cloud Computing: The technology that helps to use various types of networks and servers for properly hosting over the connectivity of Internet and then storing and managing any sensitive data is termed as cloud computing (Botta et al., 2014). This is the safest means of data transfer on the Internet connection.
2. The text mining and the data mining helps to perfectly create the respective values in any typical business or organization (Eason, 2014). There are several important methodologies for this text mining and data mining processes and these are as follows:
i) Engagement of the Customers: The first and the foremost methodology of the text mining as well as data mining process is the proper customers’ engagement. The customer relationship management or CRM is considered as one of the most important or significant requirement that makes any business quite popular for the customers and hence various other technologies and techniques are also applied here (Holtshouse, 2013).
iii) Risks, Compliances as well as Threat Detection: There is perfect analysis of risks required in all the sectors of a company and if this is not done, it could be highly threatening for the organization (Marchewka, 2014). Within the financial organizations, text mining is being utilized for the purpose of detecting several issues of the compliances and thus warning is provided to them to stop such actions.
These previously mentioned methods of text and data mining depict that these processes can easily create business value in all organizations.
3. Cloud computing technology is considered as the safest as well as the secured methodology for transferring any amount or size of sensitive data or information to the desired location with the help of Internet connectivity (Suo et al., 2013). In spite of having such popular and significant advantages and features, there are some of the most significant problems, present in this technology and these problems are as follows:
i) Cloud computing does not provide high security to its data.
iii) The breaching of data is extremely common in this particular technology (Carlin & Curran, 2013).
iv) Another important problem of cloud computing is the presence of insider threats.
v) Migration of data is extremely difficult here.
Within the five above mentioned problems of this technology of cloud computing, the most significant and vital problems could be presence of insider threats and data breaching.
i) Presence of Insider Threats: This is the most important and significant problem for any organization, which could eventually bring major security problems within the information system and the confidential data (Pearson, 2013). This type of threat is possible for the deliberate or accidental attacks of the employees and staffs of that specific company. The employees could lose or destroy the data and thus the organization would be in trouble.
This type of security problem could be solved by providing proper training to the employees and staffs of the company and this is to be done by trained IT people.
The data breaching within cloud computing could be eventually stooped by securing the physical space of the information system and this action could be taken by implementing the safety measures.
iii) Causes for the EIS problems: The most important cause of EIS failure was that architecture was not designed perfectly for any customized report. The user interfaces were extremely complicated and thus the executives could not review KPIs.
iii) Importance of Trusted View of Data: The trusted data viewing is present here as it makes the data properly manageable and even cost effective in the Coca-Cola Company.
References
Bloom, N., Garicano, L., Sadun, R., & Van Reenen, J. (2014). The distinct effects of information technology and communication technology on firm organization. Management Science, 60(12), 2859-2885.
Botta, A., De Donato, W., Persico, V., & Pescapé, A. (2014, August). On the integration of cloud computing and internet of things. In Future internet of things and cloud (FiCloud), 2014 international conference on (pp. 23-30). IEEE.
Carlin, S., & Curran, K. (2013). Cloud computing security. In Pervasive and Ubiquitous Technology Innovations for Ambient Intelligence Environments (pp. 12-17). IGI Global.
Dahlstrom, E., & Bichsel, J. (2014). ECAR Study of Undergraduate Students and Information Technology, 2014. Educause.
Dahlstrom, E., Walker, J. D., & Dziuban, C. (2013). ECAR study of undergraduate students and information technology(p. 2013). 2013.
Eason, K. D. (2014). Information technology and organisational change. CRC Press.
Holtshouse, D. K. (2013). Information technology for knowledge management. Springer Science & Business Media.
Hwang, K., Dongarra, J., & Fox, G. C. (2013). Distributed and cloud computing: from parallel processing to the internet of things. Morgan Kaufmann.
Marchewka, J. T. (2014). Information technology project management. John Wiley & Sons.
Pearson, S. (2013). Privacy, security and trust in cloud computing. In Privacy and Security for Cloud Computing (pp. 3-42). Springer, London.
Suo, H., Liu, Z., Wan, J., & Zhou, K. (2013, July). Security and privacy in mobile cloud computing. In Wireless Communications and Mobile Computing Conference (IWCMC), 2013 9th International (pp. 655-659). IEEE.
Webster, J. (2014). Shaping women's work: Gender, employment and information technology. Routledge.
Buy Itc540 It Infrastructure Management Answers Assessment Answers Online
Talk to our expert to get the help with Itc540 It Infrastructure Management Answers Assessment Answers to complete your assessment on time and boost your grades now
The main aim/motive of the management assignment help services is to get connect with a greater number of students, and effectively help, and support them in getting completing their assignments the students also get find this a wonderful opportunity where they could effectively learn more about their topics, as the experts also have the best team members with them in which all the members effectively support each other to get complete their diploma assignments. They complete the assessments of the students in an appropriate manner and deliver them back to the students before the due date of the assignment so that the students could timely submit this, and can score higher marks. The experts of the assignment help services at urgenthomework.com are so much skilled, capable, talented, and experienced in their field of programming homework help writing assignments, so, for this, they can effectively write the best economics assignment help services.