IT Infrastructure Management and Big Data Analytics

Verified

Added on  2021/04/24

|7
|1491
|230
AI Summary
This assignment covers various topics in IT infrastructure management, including electronic record management, business intelligence analytics, data mining, text mining, big data analytics, enterprise architecture, and cloud computing. It requires students to understand the concepts, challenges, and benefits of these technologies and apply them to real-world scenarios. The assignment includes detailed answers to questions on security measures for cloud computing, executive information systems, and data governance. It also touches upon topics like customer experience, trusted views of data, and consistent flavor creation in a Black Book model application.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: IT INFRASTRUCTURE MANAGEMENT PG
IT Infrastructure Management PG
Name of the Student
Name of the University
Author Note

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1
IT INFRASTRUCTURE MANAGEMENT PG
Table of Contents
Answer 1..............................................................................................................................2
Answer 2..............................................................................................................................3
Answer 3..............................................................................................................................4
Answer 4..............................................................................................................................4
Answer 5..............................................................................................................................5
References............................................................................................................................6
Document Page
2
IT INFRASTRUCTURE MANAGEMENT PG
Answer 1
Electronic record management can be defined as a process of managing and storing
records over internet. It can make use of a set of computer programs for managing storing
and maintenance of the records. It makes use of automated techniques in managing the
different types of records, regardless of its format. It considerably reduces the efforts of
data search and data processing and considerably saves time, money and physical storage
space.
Business intelligence analytics makes use of different strategies for analysing the
different business information. Business intelligence provides a historical, current and
predictive view of different business operations running within an organization. It refers
to the technology and application for integration and analysis of different business
information, which in turn support better decision-making (Chen, Chiang & Storey,
2012).
Data mining refers to the concept of sorting through a large number of data set in order to
identify the patterns to solve complex problems (Wu et al., 2014). Text mining on the
other hand refers to the process of sorting through the unstructured data for deriving a
high quality of information from text. Both data mining and text mining helps in
understanding the customer’s behaviour and recent trend in business.
The process of examining a large quantity of data called big data can be termed as big
data analytics. Big data discovery can further be referred to the next level of self service
analytics for leveraging and using the big data resources. Data discovery is a business
oriented process for detecting the patterns of advanced analytics. It is an iterative process
Document Page
3
IT INFRASTRUCTURE MANAGEMENT PG
and deals with data preparation, visual analysis and guided advanced analytics (Kambatla
et al., 2014).
Enterprise architecture is a process of creation of a unified IT environment that defines
the structure and operation of an organization (Lapalme, 2012).
Management information system provides a detailed idea of all the financial data
associated with an organization (Laudon & Laudon, 2016). It is a computerized database
that is programmed in such a way that it processes regular reports on the different
operations of an organization.
Data life cycle refers to the process of evaluating the life of a data from its creation phase
to the deletion phase. Data principles generally provide guidance on use of data within an
organization or enterprise.
Cloud computing refers to the process of storage of data in remote servers hosted of
internet (Jadeja & Modi, 2012,). It not only saves the physical space but also increases
the accessibility of the data.
Answer 2
Data mining and text mining refers to the process of examining a pre existing database
for generating new information. This information can create a great value to the organization as
the big data helps in analysing the customers’ behaviour and the current market trend. This in
turn helps in providing competitive advantages to the organization. Therefore, it can be said that
data mining and text mining helps in corporate decision-making. It can be used to improve the
different processes of an organization to increase the profit margin. In short proper data and text
mining can be very beneficial to a particular organization. Data mining and text mining are
process of knowledge discovery that analyses an enormous data set for identifying and accessing

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4
IT INFRASTRUCTURE MANAGEMENT PG
different crucial information, which helps in improvising the business processes and increases
the decision-making ability of an organization.
Answer 3
There are a number of problems associated with cloud computing; however, the major
two problems include Cyber attack and threat from an insider. The storage of data over a cloud
although improves the data accessibility, it is very much prone to cyber attackers leading to a
loss of confidential data or data modification (Chen & Zhao, 2012). Threat from an insider is
another major problem associated with cloud computing as the data the cloud computing vendor
generally has an access to the data and it is very easy for him to modify the data.
These two problems however can be solved by employing proper security measures. The
risk of cyber attack can be mitigated by data encryption, which will enable only the person who
has the decryption key to access the data (Arora, Parashar & Transforming, 2013). Threat from
an insider can be mitigated by employing proper authorization control. The authorization control
will determine who will be able to access a particular data. Coupled with data encryption, this
method can eliminate the risk of threat insider.
Answer 4
An executive information system was designed and implemented, so that the senior
executives of the company can access the key performance indicators that are relevant to
the specific needs.
The problems the executives faced with the EIS include the data unavailability as the data
was not present when needed.
Document Page
5
IT INFRASTRUCTURE MANAGEMENT PG
The main problems associated with the designed EIS were that the IT architecture was
not designed for customized reporting and the interface of the system was quite
complicated for use of the executives as they were not able to easily review the KPIs.
With an aim of improving the existing EIS, the CIO worked with a specific task force for
design and implementation of a completely new EA.
The main benefit of the new IT architecture was that, it followed a business-driven
approach instead of the financial reporting driven approach as followed by the previous
EIS. This architecture was easy to modify as well.
The main benefit of data governance is that it helps in eliminating the chances of data
inconsistency.
Answer 5
The large volume of the data of Coca Cola would generally take a large amount of time
to search and process. If the POS data can be accessed in real time, it will help in
bypassing this stage of intensive searching.
Coca Cola created a favourable customer experience by switching to centralized data
base for easier management of the data.
A trusted view of data is essential for responding quickly and accurately to the changes in
market conditions associated with sales, transactions and customers.
Black Book model is an application that combines the required 600+ flavours in creation
of orange juice and specifies the perfect blend required for creation of the juice.
The main benefit of Black Book Model is that, it helps in creation of orange juice of a
consistent flavour every time.
Document Page
6
IT INFRASTRUCTURE MANAGEMENT PG
References
Arora, R., Parashar, A., & Transforming, C. C. I. (2013). Secure user data in cloud computing
using encryption algorithms. International journal of engineering research and
applications, 3(4), 1922-1926.
Chen, D., & Zhao, H. (2012, March). Data security and privacy protection issues in cloud
computing. In Computer Science and Electronics Engineering (ICCSEE), 2012
International Conference on (Vol. 1, pp. 647-651). IEEE.
Chen, H., Chiang, R. H., & Storey, V. C. (2012). Business intelligence and analytics: from big
data to big impact. MIS quarterly, 1165-1188.
Jadeja, Y., & Modi, K. (2012, March). Cloud computing-concepts, architecture and challenges.
In Computing, Electronics and Electrical Technologies (ICCEET), 2012 International
Conference on (pp. 877-880). IEEE.
Kambatla, K., Kollias, G., Kumar, V., & Grama, A. (2014). Trends in big data analytics. Journal
of Parallel and Distributed Computing, 74(7), 2561-2573.
Lapalme, J. (2012). Three schools of thought on enterprise architecture. IT professional, 14(6),
37-43.
Laudon, K. C., & Laudon, J. P. (2016). Management information system. Pearson Education
India.
Wu, X., Zhu, X., Wu, G. Q., & Ding, W. (2014). Data mining with big data. IEEE transactions
on knowledge and data engineering, 26(1), 97-107.
1 out of 7
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]