Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Icloud erp mriu

01/01/2021 Client: saad24vbs Deadline: 24 Hours

assignment-1.txt

Class, This week, you have read about server virtualization and cloud computing in chapter 6 of your textbook. For your written assignment this week, complete a case study of the organization you work for (use a hypothetical or “other” organization if more applicable) that will address the following prompts: • Describe the organization’s environment, and evaluate its preparedness for virtualization. • Explain Microsoft (or another product) licensing for virtualized environments. • Recommend a configuration for shared storage; make sure to discuss the need for high availability and redundancy for virtualization for the organization. • Explain Windows Azure capabilities for virtual machines and managing a hybrid cloud, including Windows Azure’s Internet as a Service (IaaS) and storage capabilities Make a recommendation for cloud computer use in the organization, including a justification for your recommendations. Submit your midterm research paper as a single document. Your paper should meet the following requirements: • Be approximately four to six pages in length (1200-1800 words), not including the required cover page and reference page. • Follow APA6 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion. • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources. • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing. Regards,


assignment-2.txt

Class Discuss the benefits of virtualization software, as described in the text. Do you agree/disagree with these benefits, or can you think of additional benefits not already presented? Also discuss the security concerns highlighted by server sprawl and how you would propose to solve those in your (real or hypothetical) organization. Provide extensive additional information on the topic Explain, define, or analyze the topic in detail Share an applicable personal experience Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA) Make an argument concerning the topic. At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post. Regards, Write 1 Page , APA format


prof-reading/A Detailed Study of Azure Platform.pdf

2019 International Conference on Machine Learning, Big Data, Cloud and Parallel Computing (Com-IT-Con), India, 14th -16th Feb 2019


978-1-7281-0211-5/19/$31.00 2019 ©IEEE 129


A Detailed Study of Azure Platform & Its Cognitive Services


Ankita Verma, Dhutima Malla, Amrit Kaur Choudhary, Vasudha Arora Department of Computer Science & Engineering


Manav Rachna International Institute of Research and Studies


Faridabad, India ankitav061@gmail.com, dhutima.malla98@gmail.com, kauramrit1997@gmail.com,


vasudha.fet@mriu.edu.in


Abstract—Windows Azure is the Microsoft's conveyed registering contraption. In this paper, we will learn about the prelude to the Azure framework. The scattered enlisting stage outfits clients with assets and associations for an affiliation. We would in like way talk about azure associations: Register, structuring, Stockpile, Fabric Controller Mesh, Cellphone, Holder, Index, Problem-Solving, A.I + M.L, I.O.T, Combination, Identity, Safety, DevOps, Migrate and The executive's aids. Microsoft’s Azure is the standard circled figuring stage which draws in the client to send and work assets with speed of adaptability. Our basic work in this paper is to go up against recognizing confirmation and face attestation utilizing "Face API" where we will use our own one of a kind codes, for example, to perceive and see the powers of the all-inclusive community.


Keywords— Windows Azure, Resources, Services, Deployment, Cloud Computing, Face Detection, Face API


I. INTRODUCTION Conveyed registering is an unused headway. It is the update of parallel figuring, dispersed enrolling system arranging, and is the blend and advancement of Virtualization, Utility dealing with, Software-as-a-Service (SaaS), Infrastructure-as- a-Service (IaaS) and Platform-as-a-Service (PaaS). In the method for the most current couple of years, apportioned enlisting viewpoint has seen a to an incredible degree extraordinary pass closer to its social occasion and it has changed into a precedent in the quantifiable improvement district as it ensures fundamental cost decreases and new fitting undertaking reachable to its purchasers and providers.[10] Scattered enlisting is a creation manual for dessert on and continue programming and is being gotten by the business, for instance, Google, IBM, Microsoft, and Amazon. A couple of mannequin purposes and stages, for instance, the IBM ―Azure Cloud structure, the Google App Engine, the Amazon Cloud, and the Elastic Computing Platform. Dissipated making prepared is viewed as the running with an upgrade that will influence distinctive leveled affiliations and how they manage their IT establishments. The progress and organization that cloud connection and association models offer are a key territory of research. Appropriated processing uses Azure as a phase for its distinctive organizations, for instance, Analytics, AI, Machine Learning, IOT, Face API, etc. and engages customers to send and work resources with the speed of versatility.


Azure is a foundation for fleeing data in the cloud. Instead of giving programming that Microsoft customers can present and run themselves in solitude PCs. Nowadays, Azure is an association: Customers utilize it to sprint apps and stockpile facts & figures on web-accessible devices rued by Microsoft Corporation. Associations are being offered to the relationships, customers or both by these applications, Azure Platform is a web-based distributed technology. Extremely systematic, changeable and compatible capacity can be utilized to amass unused apps to remain constant for the cloud or revive live apps with cloud-based cutoff administrations. Azure is a Distributed framework that gives progress, for empowering the Microsoft’s Azure Platform. Azure proceeds running in Microsoft on machine server farms. The target of Windows to equip engineers with on-ask for figure & restrain arrange to have, scale, and regulate web or cloud applications. The arrange itself surrenders and keeps it exceptionally possess a duplicate of Windows. Designers based exclusively on making applications that proceed running on Windows. Windows backings a solid headway episode by compromising with its IDE. Windows is an open organize that underpins both Microsoft and non-Microsoft tongues and conditions. [2] Azure invites outcast disobedient and vernaculars, for an occasion, Obscure, python, ruby, and php. Azure gives a Windows-based figuring and constraint condition within the distributor. Escaping information within the distributor is a proper choice for some conditions. The differing bit of Azure collaborates to form this conceivable. Microsoft’s Azure Tables provide adaptable, accessible, and firmly collected as collecting tables. A clear interface to fixing the tables are granted by Microsoft’s Azure. The tables are versatile to many of the pieces of stuff and terabytes of realities may separate transversely named records adjacent metadata. Solid constrain and development of messages for an application and are the foremost for the most part seen clarification behind Web and Laborer portion correspondence are granted by Microsoft’s Azure [3]. In this paper, we are going conversation around the Azure Components, Cloud Benefit Suppliers, Cloud Architecture, Azure Cloud Storage Model and Demystifying the Use of Face API in Windows Azure. By overcoming with the ideas of Azure Cognitive Services in this paper, we will build up software in our next paper in which we will put together our model to identify n number of appearances precisely.


130


II. WINDOWS AZURE COMPONENTS [3]


i. Computer: Windows procedure can run a gathering of vocations. Whatever an application does, regardless, it needs to be done as no short of what one occupation. Azure at that factor typically runs a variety of examples of each movement, utilizing worked in load changing as per spread needs crosswise over them. ii. Storage: The 2nd stage in Azure is a limit. We have three journalists perfect here – Blobs, that take after records, Tables, which are entered and well-shaped limit, and lines, which let Web Parts and Specialist Parts, provide for one another. iii. Fabric Controller: The 3rd sort out in Azure is the connect controller or App connect. It handles articulations and association – between Microsoft Windows Azure applications, and in development from the servers. Ready to express that we got the opportunity to have that expansive SQL Server or Database structure and enabling access to an Azure app, & we will not permit customers of an app in our framework.


CLOUD ARCHITECTURE:


Dispersed considering can be separated along with two regions, the client and the distributor. By and huge, the client is associated with the distributor by the methodology for the net It is additionally productive for a relationship to own an individual conveyance where a client associates with an intranet. Regardless, the two conditions are dim other than the usage of an individual and unbolted framework or distribution. The customer sends asking the distributor and the distributor gives the association. Inside the distributor, a focal server oversees administering the composition and from


different perspectives fills in as the working redirection organize of the specific distribution orchestrate.


III.TOOLS AVAILABLE EVERY COMPANY BASED ON CLOUD:


Distributing merchants are passing on the plague of unused instruments to help adventure IT produce, buy, supervise, screen, change and track cloud organizations. These gadgets are proposed to help IT officials free up their budgetary plans and their staff so both can be used towards progressively key, a rule of business adventures. 1. Cloud ability: Cloud ability is a money related administration device for checking and dissecting all cloud costs over an association. 2. Cloudyn: These instruments are intended to help corporate IT from over-purchasing Amazon cloud assets. 3. AtomSphere: AtomSphere is a cloud-based programming Platform as a Service utilized by clients that need to incorporate their different cloud-based applications with one another and with on-commence applications. 4. Enstratius: Enstratius gives cross-stage cloud framework administration for open, private and crossover mists that can be firmly lined up with an endeavor’s administration and security prerequisites. 5. Cloud Hub: Conveyed as a bundled incorporation experience, Cloud Hub and Mule ESB are based on open source innovation to give brisk, dependable application joining without seller secure.


AZURE CLOUD STORAGE MODEL:


Azure ability "gives chose, monotonous limit inside the distributor". Microsoft will likely make amassing that is solid and secure, flexible and helpful. Azure ability awards us to keep facts for whenever assignment and to save any level of bits of awareness. [4] Data can be saved in Windows Azure in 4 unique ways i.e.: Queues, SQL Azure Database, Tables, Blobs. Blobs: These are handed-down for coordinated estimations and take after records on our troublesome drive. Tables: To draw in support to work with a fact in a much increasingly basic fine-grained method, Azure storing offers tables. A table has no described graph or perhaps, properties can have forms. Queues: This amassing is used to trade messages between squares of code.


Figure 1: Windows Azure components [1]


Fig 2. Cloud Architecture [10]


131


SQL Azure Database: We are capable make utilization of SQL Azure Databases when we require social storing and use the negotiate-SQL code we are starting at by and by have. SQL Azure offers a basic subset of SQL Server's


accommodation, which fuses counting, as an administered cloud advantage.


CLOUD DEPLOYMENT MODEL: Inside the distributing association show up, sorting out, orchestrate, storing, and programming foundation is given as associations that go up or down surprising upon the captivated. The distributing demonstrate has four guideline sending models which are:


i. Private Cloud: Private cloud is another term that a few dealers have begun late used to portray duties that emulate passed on enrolling on private structures. It is set up inside an alliance's inward parts wind datacenter. [12] For E.g. Eucalyptus Frameworks.


ii. Public Cloud: Open cloud depicts dissipated enlisting inside the customary standard sense, whereby resources are continuously provisioned on a fine-grained, self-advantage present over the Web, by construes of web applications/web relationship, from an off-site page removed provider who offers resources and bills on a fine-grained utility dealing with the introduction. [13] For E.g. Microsoft Azure & Google App Motor


iii. Crossover Cloud: Crossover cloud other than known as Crossbreed cloud could be an individual merchant identified with at scarcest one outside circulating affiliations, for the most part coordinated, provisioned as a specific unit, and included by a tied down a structure. [14] It gives virtual IT strategies through a blend of both open and private veils of mist.


CLOUD COMPUTING SERVICES:


Platform As A service: Platform as a service [4] (PaaS) is a sending & advancement condition inside the cloud that conveys straightforward cloud-based applications to complex, cloud-empowered applications. PaaS is intended to help the total web application lifecycle of the building, testing, conveying, overseeing, and refreshing. PaaS incorporates a total foundation of servers, stockpiles, organizing, and middleware improvement apparatuses like business knowledge administrations (BI), database administration frameworks, and so forth [4].


i. Software As A Service: Software as a service [4] (SaaS) allows clients to associate with and make use of cloud-based applications over the Internet. Basic models are email, calendaring and office instruments, (for example, Microsoft Office 365). SaaS gives a whole programming association which you buy on a compensation as-you-go premise from a cloud specialist co-op.


ii. Infrastructure As A Service: Infrastructure as a service [4] (IaaS), a moment figuring foundation, provisioned and oversaw over the Internet. Rapidly scale here and there with the request and pay simply for what you utilize. IaaS reasons you to preserve away from the fee and multifaceted nature of buying and dealing with your personal bodily servers and another data center framework [4].


iii. DEMYSTIFYING THE USE OF FACE API IN


WINDOWS AZURE:


The Face API Service, a cloud-based organization that gives the most dynamic face computations. It is a biometric programming application arranged to do especially perceiving or checking a man by differentiating and examining structures subject to the person's facial structures.


Fig3. Windows Azure Cloud Storage Model [3]


Fig 4. Cloud Deployment Model [4]


Fig 5. Microsoft Cloud Computing Architecture (Source


Microsoft) [4]


Fig 6. Face API in Azure [7]


132


FACE DETECTION: It perceives some places around one human faces in a photograph and get returned go up against rectangular shapes for where inside the photograph the appearances are, close-by defy characteristics which join M.L-ground needs for gesture highlights. The defy property features accessible are Age, Feeling, Sexual introduction, Posture, Grin and Facial Hair adjacent 27 markers for each stands up to inside the image. [7] The Face API sees up to 64 personal appearances with higher accuracy oppose an area in a picture. In like manner, the picture can be appeared by the record in bytes or huge URL. Face square shape (left, best, width, and stature) exhibiting the face district in the picture is returned adjacent each perceived face. On the other hand, defy area expels a movement of face-related properties, for instance, present, sex, age, head present, facial hair, and glasses. For Example:


Detection result [16]: JSON: [ { "faceId": "2090b697-46a0-497b-95d0-4a965f6dfffd", "Rectangleface": { "top": 184, "left": 358, "width": 157, "height": 157 }, "Attributeface": { "hair": { "bald": 0.06, "invisible": false, "hairColor": [ { "color": "brown", "confidence": 1.0 }, { "color": "black", "confidence": 0.86 }, { "color": "red", "confidence": 0.51 }, { "color": "other", "confidence": 0.07 }, { "color": "gray", "confidence": 0.05 }, {


"color": "blond", "confidence": 0.04 } ] }, "smile": 1.0, "headPose": { "yaw": 3.2, "pitch": 0.0, "roll": 12.1, }, "age": 28.0, "gender": “female”, "facialHair": { "moustache": 0.0, "beard": 0.0, "sideburns": 0.0 }, "glasses": "No Glasses", "makeup": { "eyeMakeup": true, "lipMakeup": true }, "emotion": { "anger": 0.0, "contempt": 0.0, "disgust": 0.0, "fear": 0.0, "happiness": 1.0, "neutral": 0.0, "sadness": 0.0, "surprise": 0.0 }, "occlusion": { "foreheadOccluded": false, "eyeOccluded": false, "mouthOccluded": false }, "accessories": [], "blur": { "blurLevel": "low", "value": 0.08 }, "exposure": { "exposureLevel": "goodExposure", "value": 0.57 }, "noise": { "noiseLevel": "low", "value": 0.29 } }, "faceLandmarks": { "pupilLeft": { "x": 405.7, "y": 220.9 }, "pupilRight": { "x": 477.4, "y": 237.3 }, "noseTip": { "x": 439.9, "y": 271.3 }, "mouthLeft": { "x": 394.1, "y": 287.8 }, "mouthRight": { "x": 463.9, "y": 304.6


Fig 7. Example of Face Detection [16]


133


}, "eyebrowLeftOuter": { "x": 378.2, "y": 198.9 }, "eyebrowLeftInner": { "x": 432.8, "y": 210.6 }, "eyeLeftOuter": { "x": 392.7, "y": 219.4 }, "eyeLeftTop": { "x": 408.0, "y": 217.8 }, "eyeLeftBottom": { "x": 404.0, "y": 227.2 }, "eyeLeftInner": { "x": 418.9, "y": 226.2 }, "eyebrowRightInner": { "x": 467.8, "y": 219.6 }, "eyebrowRightOuter": { "x": 509.9, "y": 227.0 }, "eyeRightInner": { "x": 467.0, "y": 237.6 }, "eyeRightTop": { "x": 483.1, "y": 234.0 }, "eyeRightBottom": { "x": 479.8, "y": 245.1 }, "noseLeftAlarOutTip": { "x": 413.7, "y": 265.0 }, "noseRightAlarOutTip": { "x": 465.0, "y": 277.2 }, "upperLipTop": { "x": 433.8, "y": 291.3 }, "upperLipBottom": { "x": 432.0, "y": 297.4 }, "underLipTop": { "x": 426.4, "y": 309.5 }, "underLipBottom": { "x": 423.2, "y": 321.7 } } } ]


FACE/EMOTION RECOGNITION:


Face affirmation is extensively used in various circumstances including security, regular UI, picture content examination and organization, convenient applications, and apply self-rule. Four face affirmation limits are given: defy affirmation, finding equivalent appearances, stand up to the social event, and individual recognizing proof [7] . The Face API as of now additionally organizes feeling affirmation, reestablishing the sureness over a relationship of affections for each face in the image, for instance, shock, disdain, irritate, fear, euphoria, neutral, pain and surprise. These feelings are grasped to be differently and all around talked with exact outward appearances. For Example:


Detection result [16]: 1 face detected JSON: [ {


"faceRectangle": { "top": 56, "left": 123, "width": 59, "height": 59 }, "scores": { "anger": 6.932031E-08, "contempt": 1.34474765E-09, "disgust": 9.843048E-08, "fear": 1.65876812E-10, "happiness": 0.9999997, "neutral": 4.23310347E-08, "sadness": 2.851677E-10, "surprise": 1.01985542E-07 } } ]


1. Face Verification: Face API affirmation plays out a check against two distinguished appearances or approval from one perceived face to one individual question [7].


2. Finding Similar Faces: Given a goal recognized face and a game plan of cheerful appearances to look for with, the organization finds a little course of action of countenances that look most like the objective face [7].


3. Face Grouping: Given one course of action of cloud faces, defy gathering API normally parcels them into a couple of social affairs considering closeness. [7] Each get-together is a mixed-up suitable subset of the main darken confront set and contains relative faces. Also, all


Fig 8. Example of Face Recognition [16]


134


the appearances in a comparable get-together can be considered to have a place with a comparative individual inquiry [7].


4. Face Identification: Face API can be used to perceive people in perspective of a recognized face and a people database (portrayed as a Large Person Group/Person Group). Make this database early, which can be adjusted after [7].


IV. CONCLUSION Scattered figuring a massive change to web age; it felt the invigorating impact from the upstream of the industry to clients. Windows Azure gives an Aperture figuring and control condition inside the cloud. In this paper, we find that how they go up against request/perceiving insistence get into the universe of current advancement. By and large the upsides of the usage of going up against API inside the Microsoft Azure that how it makes things present day. Microsoft's Windows Azure make with its foundation and stages affiliations will help & steer the improvement culture move from on-begin application makers to cloud engineers. Azure gives an orchestrating and constraint condition inside the distributor. SQL Azure gives a social DBMS inside the cloud, adjoining sorting out and information synchronization. The Windows Azure programming show can be obliging for anyone who should make less unpredictable to immediate, increasingly accessible, and progressively flexible applications. As Microsoft Azure gives a phase to develop any of its organizations. Henceforth in the wake of inquisitive about on Azure, we will furthermore get significant into the emotional organizations i.e. Face Application Program Interface (API) Service. It is furthermore isolated into Face Detection with properties, Face Recognition and Face Storage. Face Detection attributes are Emotion Recognition, Face Identification, Similar Face Search and Face Grouping. We are intending to use these Face API's to develop an application in which the participation of the whole class can be taken by just clicking a social event picture.


ACKNOWLEGEMENT


We might want to truly convey our caring gratefulness to Dr. Prateek Jain, Accendere Information Administration organizations for having any kind of effect and guiding us in this paper course of action.


REFERENCES


[1] “Windows Azure Platform: An Era for Cloud Computing”,


Madhurima et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 2 (2), 2011, 621-623.


[2] Dong Xu, “Cloud Computing: An Emerging Technology”, International Conference on Computer Design and Applications (ICCDA 2010), Volume-1, Pgs (100-104).


[3] “Cloud Computing: Windows Azure Platform”, Volume 3, No. 1, January 2012, Journal of Global Research in Computer Science.


[4] “Windows Azure Paas Cloud: An Overview”, International Journal of Computer Application Issue2, Volume 1 (February 2012), Issn: 2250-1797.


[5] Rimal, B., Choi, E., and Lumb, I. (2009). A Taxonomy and Survey of Cloud Computing Systems. In Fifth International Joint Conference on INC, IMS and IDC, pages 44–51. IEEE.


[6] [6] Sujay. R, “Hybrid Cloud: A New Era”, International Journal of Computer Science and Technology, Vol. 2, Issue 2, June 2011.


[7] Windows Azure platform: http://www.microsoft.com/windowsazure/


[8] David Chappell, A white paper on “Introducing The Azure Services Platform: An Early Look at Windows Azure, .Net Services, Sql Services, And Live Services”, Oct 2008.


[9] Moother, J.; Bhatt, V. (2009): A cloud computing solution for universities: Virtual computing lab: case study of North Carolina state university, www.google search engine.


[10] “Cloud Computing: Overview & Current Research Challenges”, IOSR Journal of Computer Engineering (IOSR-JCE), ISSN: 2278- 0661, ISBN: 2278-8727Volume 8, Issue 1 (Nov. - Dec. 2012), PP 14-22,


[11] S. Zhang, S. F. Zhang, X. B. Chen, and X. Z. Huo, “The Comparison between Cloud Computing and Grid Computing,” 2010 International Conference on Computer Application and System Modelling (ICCASM), pp. V11-72 - V11-75, DOI= 22-24 Oct. 2010.


[12] B. R. Kandukuri, R. Paturi V, A. Rakshit, ―Cloud Security Issuesǁ, In Proceedings of IEEE International Conference on Services Computing, pp. 517-520, 2009.


[13] A Platform Computing Whitepaper. ―Enterprise Cloud Computing: Transforming IT.ǁ Platform Computing, pp6, 2010.


[14] Global Netoptex Incorporated. ―Demystifying the cloud. Important opportunities, crucial choices.ǁ pp4-14. Available: http://www.gni.com [Dec. 13, 2009].


[15] Vaquero, L.M.; Radero-Merino, L.; Linder, M. (2009): A break in clouds towards a cloud definition, SIGCOMM Comput. Communication Rev. 39, pp.50-55.


[16] Face Application Programming Interface: https://goo.gl/images/HDtBHJ/smiling_human_faces_image


[17] SQL Azure: http://www.microsoft.com/en- us/sqlazure/default.aspx


[18] T. Zou, R. Bras, M. Salles, A. Demers and J. Gehrke, “ClouDiA: a deployment advisor for public clouds”, Proceedings of the 39th International Conference on, Very Large Data Bases, pp. 121-132, 2012.


[19] P. Kalagiakos “Cloud Computing Learning,” 2011 5th International Conference on Application of Information and Communication Technologies (AICT), Baku pp. 1 - 4, DOI=12-14 Oct. 2011.


[20] B. Grobauer, T. Walloschek, and E. Stöcker, “Understanding Cloud Computing Vulnerabilities,” 2011 IEEE Security and Privacy, pp.50-57, DOI= March/April 2011.


prof-reading/ch06(1).pptx

Managing and Using Information Systems: A Strategic Approach – Sixth Edition


Keri Pearlson, Carol Saunders, and Dennis Galletta


© Copyright 2016 John Wiley & Sons, Inc.


Chapter 6 Architecture and Infrastructure


2


Mohawk Paper


What did Mohawk paper see as an opportunity?


What did they do?


What was the result?


© 2016 John Wiley & Sons, Inc.


3


Opportunity: Cloud, SOA, XML technology allowing them to make service the primary focus, collaborate with network of partners, incorporate flexibility into the process. Can shift quickly from outsourced to insourced for projects.


Results: 5 times the number of products sold to customers compared to before. Tripled earnings. More customers than before: now 100, previously 10-15 distributors. Automated transactions: saving $1 to $2 million


3


From Vision to Implementation


Architecture translates strategy into infrastructure


Home architect develops a blueprint of a proposed house—based on customer


Business architect develops a blueprint of a company’s proposed systems—based on strategy


This “blueprint” is used for translating business strategy into a plan for IS.


The IT infrastructure is everything that supports the flow and processing of information (hardware, software, data, and networks).


© 2016 John Wiley & Sons, Inc.


4


4


From abstract to concrete – building vs. IT


5


The Manager’s Role


Must understand what to expect from IT architecture and infrastructure.


Must clearly communicate business vision.


May need to modify the plans if IT cannot realistically support them.


Manager MUST be involved in the decision making process.


© 2016 John Wiley & Sons, Inc.


6


6


From Strategy to Architecture


Manager starts out with a strategy.


Strategy is used to develop more specific goals


Business requirements must be determined for each goal so the architect knows what IS must accomplish.


© 2016 John Wiley & Sons, Inc.


7


7


Example


Strategy: Be a customer-oriented company


Goal: 30-day money back guarantee


Business Requirement: ability to track purchases


Business Requirement: ability to track problems


Goal: Answer email questions within 6 hours


Business Requirement: Ability to handle the volume


© 2016 John Wiley & Sons, Inc.


8


From Business Requirements to Architecture


© 2016 John Wiley & Sons, Inc.


9


9


The Example Continues


Business Requirement: Ability to track purchases


Architectural Requirement:


Database that can handle all details of more than a 30-day history


© 2016 John Wiley & Sons, Inc.


10


From Architecture to Infrastructure


Adds more detail to the architectural plan.


actual hardware, software, data, and networking


Components need coherent combination


© 2016 John Wiley & Sons, Inc.


11


11


From Architecture to Infrastructure


© 2016 John Wiley & Sons, Inc.


12


12


The Example Continues


Architectural Requirement: Database that can handle all details of more than a 30-day history


Functional Specification: be able to hold 150,000 customer records, 30 fields; be able to insert 200 records per hour


Hardware specification: 3 gigaherz Core 2 Duo Server


Hardware specification: half terabyte RAID level 3 hard drive array


Software specification: Apache operating system


Software specification: My SQL database


Data protocol: IP (internet protocol)


© 2016 John Wiley & Sons, Inc.


13


A Framework for the Translation


Considerations for moving from strategy to architecture to infrastructure:


Hardware – physical components


Software – programs


Network – software and hardware


Data – utmost concern: data quantity & format


What-who-where is a useful framework


© 2016 John Wiley & Sons, Inc.


14


14


Component What Who Where

Hardware What hardware does the organization have? Who manages it? Who uses it? Who owns it? Where is it located? Where is it used?

Software What software does the organization have? Who manages it? Who uses it? Who owns it? Where is it located? Where is it used?

Network What networking does the organization have? Who manages it? Who uses it? Who owns it? Where is it located? Where is it used?

Data What data does the organization have? Who manages it? Who uses it? Who owns it? Where is it located? Where is it used?

Information systems analysis framework.


15


Figure 6.3 Infrastructure and architecture analysis framework with sample questions.


16


Common IT Architecture Configurations


Centralized architecture – All purchases, support, and management from data center


Decentralized architecture – uses multiple servers perhaps in different locations


Service-Oriented architecture – uses small chunks of functionality to build applications quickly.


Example: e-commerce shopping cart


Software-Defined architecture – instantly reconfigures under load or surplus


© 2016 John Wiley & Sons, Inc.


17


Software-Defined Architecture


Birdbath example: Thanks to the Oprah Winfrey show, sales went from 10 per month to 80,000.


Increased sales seen as an attack with static system


Adaptive system warns other parts of sales fluctuations, preventing lost sales


Famous Coffee Shop example:


WiFi shares lines with production systems; problems in one can be shunted to another


Also, coffee bean automatic reordering; spot market purchasing


High potential for decreasing costs


© 2016 John Wiley & Sons, Inc.


18


New Technologies


Peer to peer architecture: Allows networked computers to share resources without a central server


Wireless (mobile) infrastructure: allows communication without laying wires


Web-based architecture: places information on web servers connected to the Internet


Cloud-based architecture: places both data and processing methods on servers on the Internet, accessible anywhere


Capacity-on-demand: enables firms to make available more processing capacity or storage when needed


© 2016 John Wiley & Sons, Inc.


19


Architectural Principles


Fundamental beliefs about how the architecture should function


© 2016 John Wiley & Sons, Inc.


20


Enterprise Architecture (EA)


The “blueprint” for all IS and interrelationships in the firm


Four key elements:


Core business processes


Shared data


Linking and automation technologies


Customer groups


One example is TOGAF (The Open Group Architecture Foundation)


Methodology and set of resources for developing an EA


Specifications are public


Business and IT leaders develop EA together


© 2016 John Wiley & Sons, Inc.


21


Virtualization and Cloud Computing


Cloud computing refers to:


Resources that are available “on the Internet”


No software for the organization to develop or install (only web browser)


No data for the organization to store (it stays somewhere in the Internet “cloud”)


The provider keeps and safeguards programs and data


This is “infrastructure as a service” (IaaS)


Also available is SaaS (Software as a service)


And there is also PaaS (Platform as a service)


Utility Computing: Pay only for what you use (like power, lights)


Source: Computerworld Aug 4, 2008


© 2016 John Wiley & Sons, Inc.


22


Examples of Systems Provided in the “Cloud?”


Just some examples


Word processing; spreadsheeting; email (Google Docs: $50 per user annually)


Buying/selling Financial services (Salesforce.com)


Email (Gmail, Hotmail)


Social networking (Facebook)


Business networking (LinkedIn)


Music (iTunes)


Storage (Amazon’s Simple Storage Service—S3)


A server (Amazon’s Elastic Compute Cloud—EC2)


Source: Computerworld Aug 4, 2008 and CRN website


© 2016 John Wiley & Sons, Inc.


23


Assessing Strategic Timeframe


Varies from industry to industry


Level of commitment to fixed resources


Maturity of the industry


Cyclicality


Barriers to entry


Also varies from firm to firm


Management’s reliance on IT


Rate of advances affecting the IT management counts on


© 2016 John Wiley & Sons, Inc.


24


Assessing Adaptability


Guidelines for planning adaptable IT architecture and infrastructure


Plan for applications and systems that are independent and loosely coupled


Set clear boundaries between infrastructure components


When designing a network architecture, provide access to all users when it makes sense to do so


© 2016 John Wiley & Sons, Inc.


25


Assessing Scalability


Scalability refers to how well a component can adapt to increased or decreased demand


Needs are determined by:


Projections of growth


How architecture must support growth


What happens if growth is much higher than projected


What happens if there is no growth


© 2016 John Wiley & Sons, Inc.


26


Other Assessments


Standardization – Common, shared standards are easy to plug in


Maintainability – Can the infrastructure be maintained?


Security – Decentralized architecture is more difficult to secure


© 2016 John Wiley & Sons, Inc.


27


Assessing Financial Issues


Quantify expected return on investment


Can be difficult to quantify


Steps


Quantify costs


Determine life cycles of components


Quantify benefits


Quantify risks


Consider ongoing dollar costs and benefits


© 2016 John Wiley & Sons, Inc.


28


28


Managing and Using Information Systems: A Strategic Approach – Sixth Edition


Keri Pearlson, Carol Saunders, and Dennis Galletta


© Copyright 2016 John Wiley & Sons, Inc.


AbstractConcrete


Owner’s


Vision


Architect’s


Plans


Builder’s


Implementation


StrategyArchitectureInfrastructure


Information


Technology


Building


Abstract


Concrete


Owner’s Vision


Architect’s Plans


Builder’s Implementation


Strategy


Architecture


Infrastructure


Information Technology


Building

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Helping Hand
Top Essay Tutor
University Coursework Help
Best Coursework Help
Writer Writer Name Offer Chat
Helping Hand

ONLINE

Helping Hand

I am an Academic writer with 10 years of experience. As an Academic writer, my aim is to generate unique content without Plagiarism as per the client’s requirements.

$35 Chat With Writer
Top Essay Tutor

ONLINE

Top Essay Tutor

I have more than 12 years of experience in managing online classes, exams, and quizzes on different websites like; Connect, McGraw-Hill, and Blackboard. I always provide a guarantee to my clients for their grades.

$40 Chat With Writer
University Coursework Help

ONLINE

University Coursework Help

Hi dear, I am ready to do your homework in a reasonable price.

$37 Chat With Writer
Best Coursework Help

ONLINE

Best Coursework Help

I am an Academic writer with 10 years of experience. As an Academic writer, my aim is to generate unique content without Plagiarism as per the client’s requirements.

$35 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

ENG 1252 FINAL 1 - Define boiling point in chemistry - Managerial accounting 14th edition solutions chapter 2 - Market share simulation allround answers - Houghton v trafalgar insurance - Discussion - How to bid - Criminal justice - Temperature in c can be converted to k by - Communication Goals and and Smart Goal - Miller corporation has a premium bond making - Water curtain sprinkler requirements - University college dublin english courses - Who wrote the lion king broadway musical - Citing a job posting in apa - Carah and louw media and society - Mamas pawn fort payne al - There is another sky by Emily Dickinson - Integrity tests indirectly estimate employee honesty by measuring psychological traits. - Dell sc420 spec sheet - Disability matrix gcu spd 200 - Order to invoice process flow chart - Fifo page replacement algorithm program - One foul swoop clothing - Canyon h17 ergo al - Ancient roman technology and engineering - Against nature joyce carol oates - How early punishments have influences modern correctional philosophy - Indie lens pop up - Unplagiarize - 8.1 describing chemical reactions - Nursing - Epicardial pacing wires nursing - Case Study 4 - Filecoin - Chemistry: Temperature and Pressure - Dependents of Phase Equilibria Questions - Tesla strategic audit - Russell ackoff management misinformation systems - Analysis - Outcome/input ratio and comparison other are elements of: - Jordano food products case study - Waller & williams criminal law text & cases 14ed - Bertrand russell thought philosophy was important because - Dearly disconnected - A number decreased by four - Assignment - The copper pipe has an outer diameter of - J wilbur bloody mary flavoring - Dan ariely our buggy moral code - Electric field due to non conducting sheet - John's model of reflection - Noble gas electron configuration - What is a good beta for a stock - MYSQL & DATABASE - Skarp laser razor price in india - City of casey email - Oliver cromwell relationship with parliament - Criminological theory the essentials second edition pdf - Examples of sizzling starts - Linear loaded vertical antenna - Leadership Theory Analysis paper - The famous leaning tower of pisa was originally - General physics 1 module - All party parliamentary group on unconventional oil and gas - A healthful eating out strategy includes avoiding ________ appetizers - Essay - How many valence electrons does gold au have - Toyota business level strategy analysis - Reflection Question - Resolving forces in a truss - In most spanish speaking countries married women legally __ - 6th form college pay scale - Which of the following scenarios is most similar to desmosomes - Popular world music by andrew shahriari - Nursing research mcq with answers - Century national bank case study - Presbytery of middle tennessee - Sample npqsl final assessment - Maytow multi weigh jack - Keep australia beautiful week 2021 - What is a pragmatic research study - Engstrom auto mirror plant motivating in good times and bad - Thinking for yourself mayfield 9th edition - What was wang kon's greatest achievement - Corporate social responsibility: OD Pactitioner - Why does the afc curve continually decline - 4 Discussion Board - Offset diagonal bottom right shadow picture effect word 2016 - The baldwin company will increase its automation - Python - Thin lens equation problems - Thin film interference example problems - Which social insight does orwell develop in the passage - 3 day push pull legs workout routine pdf - Cyclohexanol to cyclohexene lab report - Time management hw - Acid base strength table - Diss cus - Health care delivery system nursing - Din en 10083 2 - Conversations