Академический Документы
Профессиональный Документы
Культура Документы
BUSINESS PLUG-IN B4
Enterprise Architectures
LEARNING OUTCOMES
1. Explain the three components of an enterprise architecture.
Basic enterprise architectures contain three components
Information architecture identifies where and how important information, like customer
records, is maintained and secured.
Infrastructure architecture includes the hardware, software, and telecommunications
equipment that, when combined, provide the underlying foundation to support the
organization’s goals.
Application architecture determines how applications integrate and relate to each other.
CLASSROOM OPENER
Top Ten Data Failure Stories
10. PhD Almost an F -- A PhD candidate lost his entire dissertation when a bad power supply
suddenly zapped his computer and damaged the USB Flash drive that stored the document. Had
the data not been recovered, the student would not have graduated.
9. Suffering from Art -- While rearranging her home office, a woman accidentally dropped a five
pound piece of clay pottery on her laptop, directly onto the hard drive area that contained a book
she'd been working on for five years and 150 year-old genealogy pictures that had not yet been
printed.
8. Domestic Dilemma -- A husband deleted all of his child's baby pictures when he accidentally hit
the wrong button on his computer. His wife hinted at divorce if he did not get the pictures back.
7. Bite Worse than Bark -- A customer left his memory stick lying out and his dog mistook it for a
chew toy.
6. Don't Try this at Home -- A man attempting to recover data from his computer on his own found
the job too challenging mid-way through and ended up sending Ontrack his completely
disassembled drive -- with each of its parts in a separate baggie.
5. Out of Time -- A clockmaker suffered a system meltdown, losing the digital designs for all of its
clocks. Ontrack literally beat the clock recovering all their data just in time for an important
international tradeshow.
4. Drilling for Data -- During a multi-drive RAID recovery, engineers discovered one drive belonging
in the set was missing. The customer found the missing drive in a dumpster, but in compliance with
company policy for disposing of old drives, it had a hole drilled through it.
3. Safe at Home -- After one of their executives experienced a laptop crash, the Minnesota Twins
professional baseball team called on Ontrack to rescue crucial scouting information about their
latest prospects. The team now relies on Ontrack for all data recoveries within its scouting and
coaching ranks.
2. Hardware Problems -- A frustrated writer attacked her computer with a hammer. When the
engineers received the computer, the hammer imprint was clearly visible on the top cover.
1. La Cucaracha -- In hopes of rescuing valuable company information, a customer pulled an old
laptop out of a warehouse where it had been sitting unused for 10 years. When engineers opened
the computer, it contained hundreds of husks of dead and decaying cockroaches.
CLASSROOM EXERCISE
Backup and Recovery
Ask your students to answer the following questions:
Do you have a backup strategy for your computer?
How often do you backup?
What do you backup?
What type of format do you use for your backup?
Where do you save the backup?
How long do you save the backup?
Now ask your students that if you stole their computer or spilled a hot cup of coffee on their
computer right now how much information would they lose?
CLASSROOM EXERCISE
Open Source on a Large Scale
Initially, open source was used deep within IT departments. These groups have the technical
prowess to manage and evaluate such technologies, understanding where they should be widely
deployed, and where they should have limited use. The use of open source is not limited to a few
companies that want to be on the edge. Companies that are using open source, such as Linux, for
commercial applications include Winnebago Industries, Merrill Lynch and Co, and L. L. Bean.
Legal risks
The legal risks of adopting open source software may not be confined to intellectual property
problems. "Open source" describes a belief that software is best written in an open
collaborative process in which the resulting product is freely available to others to use,
improve, and distribute. Early proponents of open source based it on moral principles of free
access, while later supporters have promoted it as a viable business model for commercial
developers and users.
Licensing issues
Open source comes with unusual license restrictions that may impact a company's strategies,
particularly the risk that its own proprietary software may be "tainted" by a duty to open its
source code to others. This risk is different from the infringement risk. Open source is not in the
public domain but instead is available for use only under one of a variety of licenses that
impose restrictions on users. These licenses differ, and it is important to know and observe
their terms.
Linux has been distributed under the General Public License (GPL). One risk under the
GPL stands out: the possibility that a user's proprietary code will be "tainted" by a duty to make
its source code open. If a user of GPL code decides to distribute or publish a work that in
whole or in part contains or is derived from the open source or any part thereof, it must make
the source code available and license the work as a whole at no charge to third parties under
the terms of the GPL (thereby allowing further modification and redistribution). In other words,
this can be a trap for the unwary: a company can unwittingly lose valuable rights to its
proprietary code.
Areas (departments, companies, industries, etc.) where open source makes most sense
Open source is most useful in areas of technology that are well understood. Proprietary
companies have the advantage in new technology realms due to better information regarding
real-world customer needs and their ability to experiment in parallel regarding the satisfaction
of those needs.
Open source also makes most sense in "infrastructure." Most contributors to open source
do so free of charge. This means that their work will tend to be oriented towards areas of
interest to themselves. Infrastructure is of necessity oriented towards technical personnel, and
thus the interests of the open-source contributors and end users (technical personnel) align
closely. Open source is being used successfully in government, industry, and education.
Security issues
The reason viruses are written for Microsoft is because most people use it. Therefore, if 90
percent of software was open source there would be just as many attacks, only worse. Imagine
smart hackers with access to source code.
Those in favor of open source say that because everyone has access to the code, bugs
and vulnerabilities are found more quickly and thus are fixed more quickly, closing up security
holes faster. They also point out that any and everyone is free to create a better, more secure
version of the software.
Those on the other side maintain that a closed system in which only trusted insiders debug
the code makes it less likely that discovered vulnerabilities will be exploited before they can be
patched.
They also point out that there are many reasons (in addition to market share) that are
unrelated to the technical security of the software but that can account for a larger number of
attacks against proprietary software. One is the nature of the “OS wars” – because open
source software has traditionally been more difficult to use, those who gravitate toward it tend
to be more technically savvy. The larger number of self-proclaimed hackers who are pro-open
source and anti-Microsoft means there are more people out there with the motive and the
means to write malicious code targeting Windows systems.
2. What is the disaster recovery cost curve? Where should the Tribune Co. operate on the curve?
A disaster recovery cost curve charts (1) the cost to the organization of the unavailability of
information and technology and (2) the cost to the organization of recovering from a disaster
over time. Figure B4.4 displays a disaster recovery cost curve and shows that where the two
lines intersect is the best recovery plan in terms of cost and time. Creating an organization’s
disaster recovery cost curve is no small task. It must consider the cost of losing information
and technology within each department or functional area, and the cost of losing information
and technology across the whole enterprise. During the first few hours of a disaster, those
costs will be low but become increasingly higher over time. With those costs in hand, an
organization must then determine the costs of recovery. Cost of recovery during the first few
hours of a disaster is exceedingly high and diminishes over time.
3. Define backups and recovery. What are the risks to the Tribune’s business if it fails to
implement an adequate backup plan?
A backup is an exact copy of a system’s information. Recovery is the ability to get a system up
and running in the event of a system crash or failure and includes restoring the information
backup. If the Tribune failed to backup and it lost all of its servers it would be devastating for its
business.
4. Why is a scalable and highly available enterprise architecture critical to the Tribune Co.’s
current operations and future growth?
Scalability refers to how well a system can adapt to increased demands. Availability (an
efficiency IT metric) addresses when systems can be accessed by employees, customers, and
partners. High availability refers to a system or component that is continuously operational for
a desirably long length of time.
6. How could the Tribune Co. use a classified ad Web service across its different businesses?
The Tribune could write a Web service ad that it could then use across all of its different
businesses. That is the advantage of Web services, you write the code once and can reuse it
as many times as you need.
help from professionals 24x7. Other students will argue that Linux is a threat since it is an
operating system and Microsoft’s main business in operating systems.
4. How can you use Linux as an emerging technology to gain a competitive advantage?
Answers to this question will vary. One of the biggest advantages of Linux is cost. Any
organization that deploys Linux will save money by not having to pay for operating systems
and applications. Linux offers a competitor to Microsoft Office that is compatible with Microsoft
Office and free. The biggest competitive advantage for Linux is currently cost.
5. Research the Internet and discover potential ways that Linux might revolutionize business in
the future.
Answers to this question will vary. The important part of your students’ answers will be their
justification for how and why Linux might revolutionize business in the 21 st century.
The students backup and recovery plan should include how the company is going to
backup its information, how frequently the backups will occur, where the backups will be
stored, how long the backups will be saved, etc.