ITC540 - IT Infrastructure Management: Cloud Computing & Data Mining

Verified

Added on  2023/06/14

|18
|5112
|342
Homework Assignment
AI Summary
This assignment solution delves into various aspects of IT infrastructure management, including data centers, cloud computing, electronic records management, business intelligence, data and text mining, big data analytics, enterprise architecture, management information systems, data lifecycle, and data principles. It addresses the main functions and operations of data centers, the increasing importance of data quality, and the problems associated with cloud computing, such as unauthorized access and security risks. Furthermore, the assignment discusses the design and implementation of Executive Information Systems (EIS), improvements to EIS architecture, and the benefits of data governance. It also explores Coca-Cola's use of POS data, customer experience strategies, the importance of trusted data views, and the strategic benefits of the Black Book model. Finally, it analyzes mistakes made by AstraZeneca and IBM in outsourcing contracts, highlighting the importance of detailed contracts and realistic assumptions.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: INFORMATION TECHNOLOGY 1
IT Infrastructure Management PG
Name:
Institution Affiliation:
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
INFORMATION TECHNOLOGY 2
Assessment 1
An introduction of yourself (your work, hobby, interests ...).
I am an IT student. I am a highly dedicated and ambitious person. My hobby is that I like
reading, and the knowledge which I gain from the content it strengthens on my presentation
skills and abilities. My major interest are playing football with friends, watching movies and
travelling.
Why IT is important to your career? What do you want to get by studying this subject?
What is your plan when you finish your study?
IT is significant in my career since it offer ways to solve clients’ solution. Through studying the
subject it equips me with the knowledge on various IT concepts that are useful on the practical
aspect of my career. When I finish I intend to join an IT firm as an intern where I will gain some
experience on the practical perspective of the concept learnt, then I would apply for a job based
on my career path and interest.
What are the main functions of data centres, how do they operate? Give three examples.
Monitoring: Data centers helps in the monitoring of the components within the network that are
critical.
Leverage the effectiveness of the staff: with the data centers the technicians can spend their time
on developing solution in the organization rather than manually performing the same
configuration (Borgman, 2010).
Patching: The data centers automatically download as well as deliver the updates and hot fixes to
the machines of the clients (Wu, Zhu, Wu & Ding, 2014).
Document Page
INFORMATION TECHNOLOGY 3
Data centers usually work like two computers that have been connected in the local network. The
internet server sends data to the web browsers via the connections in the network (Borgman,
2010). The data stored on the servers has been divided into packets for the purpose of the
transmission, and this is sent via special computers which are regarded as the routers which
determine on the appropriate path which the data should travel (Borgman, 2010). This is through
a series of wired as well as wireless networks.
Why data quality has become more important?
This is because we need accurate as well as timely information in order to manage services as
well as accountability (Larose, 2014). Good information help to manage the services
effectiveness and it helps to prioritize and ensure the best use of the resources.
What are the problems associated with cloud computing
There is unauthorized access to the customer as well as the business data.
There are security risks at the vendors (Wilson, 2014).
There could be risks related to the legal and compliance (Larose, 2014).
With cloud computing it could result to the lack of the control
Document Page
INFORMATION TECHNOLOGY 4
Assessment 2
Task
Question 1
Define and explain concept for the terminologies:
Electronic Records Management
It is thought to be the list of activities that is needed for the systematically controlling the
creation , distribution along with disposition of recorded data which are maintained as evidence
of the activities of the business and transactions (Sotomayor, Montero, Llorente & Foster, 2009).
Business Intelligence (BI) and Analytics
Business intelligence refers to the technology driven process for the purpose of analyzing data as
well as presenting an actionable data in order to help executives, managers as well as other
corporate end users to make decision that are informed for the business (Fukuda, Hisazumi,
Ishida, Mine, Nakanishi, Furusho Kong, 2016). On the other hand, business analytics refers to
practice of iterative, methodical exploration of the data of organization with emphasis to the
statistical analysis.
Data and text mining
Text mining refers to the set of the processes which are essential to turn text document that is
unstructured into valuable structured information (Fukuda, Hisazumi, Ishida, Mine, Nakanishi,
Furusho Kong, 2016). When it comes to data mining it regards to the process that is based on the
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
INFORMATION TECHNOLOGY 5
algorithms aimed at analyzing as well as extracting useful information from the data (Wixom,
Ariyachandra, Douglas, Goul, Gupta, Iyer & Turetken, 2014).
Big data analytic and data discovery
Big data discovery bring together the techniques of data discovery as well as the behavioral
analysis on the big data (Larson & Chang, 2016). On the hand, big data analytic refers to the
process of examining of large as well as the varied set of data to discover the unhidden patterns.
Enterprise architecture
It is the blueprint that shows the structure as well as the operation of an organization.
Management information systems
It refers to the computerized databases of the financial information that is organized as well as
programmed in order to produce regular reports to operations to each level of the management in
organization (Larson & Chang, 2016).
Data life cycle and data principles
Data life cycle refers to the policy based method to manage the flow of the information system
data throughout on its cycle (Larson & Chang, 2016). Data principles are the code of good
practice for processing of the personal data.
Cloud computing
The delivery of the on demand computing resources over the internet on the pay for the use basis
(Chu, Han & Shyr, 2016).
Document Page
INFORMATION TECHNOLOGY 6
Question 2: How does "data and text mining" create business value?
The businesses utilize them in analyzing the customer as well as the competitors’ data in order to
improve on the competitiveness (Chu, Han & Shyr, 2016).
Question 3: What are the problems associated with cloud computing? Give two examples
and provide some solutions. Explain your answers.
1. Cyber attacks: When the data is stored over the internet, one is at the risk of cyber
attack. An example of cyber attack is in Equifax which is credit rating agency where
attackers gained access to certain files (Paul, Kumar & Chatterjee, 2013).
2. Government intrusion; there was a recent NSA leaks as well as ensuing government
surveillance programs which took place (Luo, Zhao, Dong, Chen, Xu, Zhang & Wong,
2016).
Question 4:
Why was an EIS designed and implemented?
It was designed and implemented in order to offer the senior managers internal and external data
as well as the major performance indicators which are crucial to various needs (Redlich &
Nemzow, 2015).
What problems did executives have with the EIS?
They discovered that half of the data which was generated from their EIS that it was irrelevant to
the decision of the corporate in regards to their SBU which had crucial to the timely data.
What were the two reasons for those EIS problems?
Document Page
INFORMATION TECHNOLOGY 7
The architecture of the application was not designed for the purpose of customization to generate
reports. The user interface was complex to get required information, thus, analyst had to extract
on the KPL related data (Sook-Ling, Ismail & Yee-Yen, 2015).
How did the CIO improve the EIS?
There put in place a team that was dedicated in order to help design as well as develop the new
system. This was business driven architecture rather than the financial reporting driven
architecture (Business Intelligence, 2017).
What are the benefits of the new IT architecture?
The system offered a reliable KPI reports in regards to the inventory turns, profit margins and
cycle times of all the SBUs. There was reduction in the resources that were required to maintain
the system (Business Intelligence, 2017).
What are the benefits of data governance?
There is improved quality of the data which bring forth accurate sales forecasting, increase in the
growth of the sales, greater loyalty of the customers and better customer experience (Weick &
Sutcliffe, 2015).
Question 5:
Why is it important for Coca-Cola to be able to process POS data in near real time?
This is because they support the plans, replenishment process as well as the forecasts. Data
analysis is usually significant for supply chain because it supports vital decisions of the
production, products as well as marketing (Business Intelligence, 2017).
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
INFORMATION TECHNOLOGY 8
How does Coca-Cola attempt to create favorable customer experiences?
Coca-Cola organization usually creates a favorable client experience via usage of the big data,
data warehousing, data modeling as well as through the social media so as to respond on the
changes within the society as well as the market (Business Intelligence, 2017). They usually
utilize these aspects in order to adjust the preferences of the clients by formulating their products
in advance in order to respond to these changes.
What is the importance of having a trusted view of the data?
It is important for the aspect of accuracy. Data in most cases is utilized to provide insights. When
the business is armed with this they are able to improve every day decision they make. This is
not a management issue; it is applicable from the ground up. Additionally, it is important since it
provide integrity to the data (Business Intelligence, 2017). There is no getting fact that the data
comes from everywhere now days. There is need to have data governance which needs to be a
priority in order to prevent the disparity which are caused by set of unique issues and even makes
the data to be useless.
What is the Black Book model?
The black book model is regarded as the big data which stores the algorithm of the Coca cola
business success (Stelzner, 2014). This model helps the Coke managers as well as the workers to
be at the top their game plan particularly in decision making process as it is consists to over five
hundred flavors in their calculation which are much far more than the normal human brain could
process. Explain the strategic benefit of the Black Book model.
Document Page
INFORMATION TECHNOLOGY 9
The black book signifies the decision making process for the managers while at the same time
making it more powerful as a result of the amount of data that is used. Some of the data that are
included in the big data includes the weather pattern for supervising the growing season, yields
of the crop as well as other cost pressure. The Black Book model helps the managers to blend
batches of juices and also tweak recipes (Business Intelligence, 2017). Each year the evolution of
technology has been getting better and some technological achievement has gotten way beyond
the human capabilities.
Assessment 3
Task A
What mistakes did AstraZeneca make?
The organization did not consider their business could change drastically than the contract could
have accommodated (Getz & Page, 2016). The organization was dependent to their IT
capabilities, and they failed to cover on all the details related to the eventuality and critical aspect
part in the contract such as its termination.
What mistakes did IBM make?
The organization knew from the beginning that large term IT outsourcing contracts at times they
are difficult when it comes to change and how they could accrue the profit through making of the
major investment in first 2 years, since the services are usually set up and at the same time
customized and then making their profit margin in the last 2-3 years. They needed to have
covered all these details for in the termination of the contract (Witten, Frank, Hall & Pal, 2016).
Why are outsourcing contracts for five or more years?
Document Page
INFORMATION TECHNOLOGY 10
The reason is that the vendors usually make major investment in the initial 2 years as the services
are set up and the same time customized (Getz & Page, 2016). The vendor expects that they
would make profit margins in the last 2-3 years which is why large deals usually deal to five or
perhaps more years.
Why do you think two major corporations could make such mistakes?
The reason could have been due to poor assumptions; they could have also overlooked the
crucial details in rush to close the deal; there could have been lack of outsourcing knowledge as
well as preparation by the client (Getz & Page, 2016).
Do you think the 2007 SLA was doomed to fail? Explain your answer.
Yes, I think it was doomed to fail. Regardless to the termination of the contract, it was bound to
end eventually. The vague provision for the services as well as fees related to the contract end
could have arisen (Laudon & Laudon, 2015).
What provisions in the 2012 SLAs protect AstraZeneca and the vendors?
The contract covered on the standards provisions of the Information service deals which is the
SLAs and the pricing, along with the cooperation policy. This policy consisted of thirteen
principles which specified the terms of the collaboration (Laudon & Laudon, 2015). One such
principle is that of the fix, then pay later. This therefore means, in case of an urgent information
technology issue occurs, the vendors and AstraZeneca should cooperate in order to fix it as soon
as possible without asking any questions in regards to the cost (Moss & Marvin, 2016). In case
there was conflict in the contract, both of these parties had to deal with an independent arbiter
who oversees cooperation policy.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
INFORMATION TECHNOLOGY 11
Why would parties prefer to use an arbitrator instead of filing a lawsuit in court?
Through use of an arbitrator it is much less expensive as compared to filing of the lawsuit.
Moreover, with an arbitrator they consume less time, and they might confront less the parties
since they have agreed in advance arbitration process (Ibrahim, Hamlyn-Harris & Grundy,
2016).
Part B
Social media
Introduction
Over the past decade , the numerous the internet users have increased considerably replacing
bygone type of the media and entertainment with skyrocketing developments among all the ages
of the social media ( Fuchs , 2017 ). There has been social media websites that have numerous
end users allowing them to share videos, text messages as well as photos on a regular basis
(Gerbaudo, 2018). There have been numerous advantages as well as disadvantages of utilizing
these sites, which have left the researchers to wonder if we are much better without them (Fuchs,
2017). In this research, it will explore the advantage and disadvantage the social media to
determine if it has improved or perhaps damaged the way in which people connect.
One merit associated to the social media it has enabled people to correspond with one another in
their local neighborhood and speak to others in other countries concurrently (Gerbaudo, 2018).
There are situations that have been observed individuals forming online communities which have
enabled them to get support, learn about news what is happening across the globe and even get
education. In case one does not want to talk on the phone or lack time to meet someone, you
Document Page
INFORMATION TECHNOLOGY 12
could connect through the social media at any given time (Duggan, Ellison, Lampe, Lenhart &
Madden, 2015). It has also been possible to have a list of contacts that is maintained through the
social media platform.
Social media has made a positive effect on the society by offering a canvas to ravish a
masterpiece. Many people are discovering it much easier to express their self identities in
environment which desolate their anxiety in a real life circumstance (Gerbaudo, 2018). Social
media has offered society a unique opportunity when it comes to creation of our image through
the means of the digital museum (Duggan, Ellison, Lampe, Lenhart & Madden, 2015). There
have been many routes that are available in the social media. It is possible for one to mask their
identity via the social media simply because that the social media allows one more control,
especially when it comes to customizing the layout of one’s profile. As opposed to this a person
might reveal their personality without necessary having any anxiety from their peers.
Social media has made it possible for the businesses to promote their products to many
individuals across the globe (Gerbaudo, 2018). Whether one has an offline business or online, it
is possible to promote the enterprises to the largest audience around the world. The whole world
is available to you, and you have the opportunity to promote it. This would make the businesses
to be more profitable and less expensive, simply because that most of the expenses are created
over the business are for advertising as well as promotion (Duggan, Ellison, Lampe, Lenhart &
Madden, 2015). This might be reduced by constantly as well as regularly involving the social
media to interact with the right audience. It may also be observed that the social media help build
up on the reputation of the business (Duggan, Ellison, Lampe, Lenhart & Madden, 2015). Just as
it can ruin the reputation of the business reputation, it can develop on the sales and the
Document Page
INFORMATION TECHNOLOGY 13
reputation. In the social media individuals are free to share anything they want in the social
media, and this can have positive effect when good news is shared about the business.
On the upside, social media has some disadvantages. One of the disadvantages is that it can leads
to addiction. The addictive section of the social media is extremely bad and it might disturb a
person personal live (Duggan, Ellison, Lampe, Lenhart & Madden, 2015). The teenagers are the
most influenced by the habit of social media. They turn out to be extensively and consequently
these are cut off from the society. It may also waste ones time that could have been used in
undertaking more effective tasks .Another disadvantage of social media it leads to fraud and
scams. Each and every day individuals are getting scammed through social media. There are
numerous examples where people have scammed and committed fraud via social media.
Additionally, social media could be a security issues (Duggan, Ellison, Lampe, Lenhart &
Madden, 2015). There are many security agencies that have had access to individual’s personal
accounts. This makes their privacy to be compromised. One might not know when they are
visited by investigation officer in regards to an issue which they had mistakenly discussed over
the internet.
Social media has been found to cause health problems. The lack of the social interaction could
result in individual suffering from much more stress related to the disorders and the disease than
previously (Duggan, Ellison, Lampe, Lenhart & Madden, 2015). According to Dr. Aric Sigman
his research highlights there is a link which exist between the reduced human interaction time
and the problems which are related to blood pressure, dementia, stroke and the cognitive issues.
Social media has been found to cause lack of emotional connection (Duggan, Ellison, Lampe,
Lenhart & Madden, 2015). The quality of a conversation utilizing the social media is much awful
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
INFORMATION TECHNOLOGY 14
since one does not sense any kind of emotional or enthusiasm from the other individuals. It
might take one to wonder if they could actual mean what they say when one is conversing with
another. Moreover it could lead to diminishing understanding and thoughtfulness (Duggan,
Ellison, Lampe, Lenhart & Madden, 2015). Ever since the beginning of the social media, the
quality of the conversation has dropped significantly. Individuals are more often spending their
time online in the sense that they do not always understand the feeling, emotion as well as
character of individuals they are talking to (Duggan, Ellison, Lampe, Lenhart & Madden, 2015).
When one talks to a person through a message or even a voice, you could understand them fully.
The aspect of the social media has ruined thoughtfulness of the individuals’ even saying hello to
others.
Conclusion
Social media offered merits and also demerits. It has promising features which could make
individuals to think twice about how they use the platform. It is therefore important to think
twice on what you post or what you might say to someone because you could ruin their life or
relationship and the social media keeps a record that you cannot delete.
Document Page
INFORMATION TECHNOLOGY 15
Part C
1. Generate a Turnitin originality report and submit this report via Turnitin;
2. Submit an early draft to Turnitin for self-checking, then look carefully at all the matches
marked in bold font and various colours in the self-check/originality report.
3. Answer the following questions to interpret the Turnitin originality report
a) Are any of the bold, coloured text matches in my self-check report missing in-text
references? (We need to avoid plagiarism of ideas.)
In the document, there are no colored text which matches in the report that have checked.
b) Do any of the bold, coloured text matches in my self-check report include more than
three words in a row copied from the original source without quotation marks? (We need
to avoid plagiarism of language.)
There are no bold, colored text which matches in the self check report and no three words in the
row that are copied from the original sources.
c) Do direct quotations take up more than 10% of the essay? (We need to change some of
the direct quotations to summaries and paraphrases so that at least 90% of every essay is
written in our own words.)
No. in this essay they do not take up more than 10% of the essay parts.
d) Are any of the bold, coloured text matches in my originality report purely coincidental?
(Sometimes our words coincidentally match with words in other online sources that we
have never seen before and that are completely irrelevant to our research topic. If so, we do
not need to change anything at all.)
in the originality report there are none that are matching in my report.
e) Do any of the short strings of matching text indicate that my attempts at paraphrasing
were not completely successful? (We need to avoid sham paraphrasing, one type of
plagiarism, by using synonyms and changing the sentence structures completely.
Remember that we should not copy more than three words in a row from the original
without quotation marks.)
There were none in this report.
f) Have I synthesised all of the sources’ ideas into my essay by introducing each piece of
source information with a signal phrase and by adding my own comments or interpretation
to it in the following sentence? (We need to avoid dropped-in quotations and simply
reporting facts or other people’s ideas because that approach means that instead of
Document Page
INFORMATION TECHNOLOGY 16
building our own arguments and writing our own essays, we are merely stringing together
other people’s words and ideas.
In this report essay I have synthesized all the sources into my essay by introducing every source
of the information with single phrase as well as interpretation to it in the following sentence.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
INFORMATION TECHNOLOGY 17
References
Borgman, C. L. (2010). Scholarship in the digital age: Information, infrastructure, and the
Internet. MIT press.
Business Intelligence. (2017). Coca-Cola’s Juicy Approach To Big Data - BI Insight - Business
Intelligence. [ONLINE] Available at: http://businessintelligence.com/bi-insights/coca-
colas-juicy-approach-to-big-data/. [Accessed 18 March 2018].
Fuchs, C. (2017). Social media: A critical introduction. Sage.
Fukuda, A., Hisazumi, K., Ishida, S., Mine, T., Nakanishi, T., Furusho, H., ...& Kong, W. (2016,
July). Towards sustainable information infrastructure platform for smart mobility-project
overview. In Advanced Applied Informatics (IIAI-AAI), 2016 5th IIAI International
Congress on (pp. 211-214). IEEE.
Chu, Y. J., Han, S., & Shyr, J. Y. (2016). U.S. Patent Application No. 14/715,378.
Duggan, M., Ellison, N. B., Lampe, C., Lenhart, A., & Madden, M. (2015). Social media update
2014. Pew research center, 19.
Gerbaudo, P. (2018). Tweets and the streets: Social media and contemporary activism. Pluto
Press.
Getz, D., & Page, S. J. (2016). Event studies: Theory, research and policy for planned events.
Routledge.
Ibrahim, A. S., Hamlyn-Harris, J., & Grundy, J. (2016). Emerging security challenges of cloud
virtual infrastructure. arXiv preprint arXiv:1612.09059.
Larose, D. T. (2014). Discovering knowledge in data: an introduction to data mining. John
Wiley & Sons.
Larson, D., & Chang, V. (2016). A review and future direction of agile, business intelligence,
analytics and data science. International Journal of Information Management, 36(5),
700-710.
Laudon, K. C., & Laudon, J. P. (2015). Management Information Systems: Managing the Digital
Firm Plus MyMISLab with Pearson eText--Access Card Package. Prentice Hall Press.
Luo, F., Zhao, J., Dong, Z. Y., Chen, Y., Xu, Y., Zhang, X., & Wong, K. P. (2016). Cloud-based
information infrastructure for next-generation power grid: Conception, architecture, and
applications. IEEE Transactions on Smart Grid, 7(4), 1896-1912.
Moss, T., & Marvin, S. (2016). Urban infrastructure in transition: networks, buildings and
plans. Routledge.
Document Page
INFORMATION TECHNOLOGY 18
Paul, P. K., Kumar, K., & Chatterjee, D. (2013). Cloud computing emphasizing emerging
possibilities to the entire Information Infrastructure. Trends in Information Management,
9(2).
Redlich, R. M., &Nemzow, M. A. (2015). U.S. Patent Application No. 14/597,323.
Stelzner, M. (2014). 2014 Social Media Marketing Industry Report. Social media examiner, 1-
52.
Sook-Ling, L., Ismail, M. A., & Yee-Yen, Y. (2015). Information infrastructure capability and
organisational competitive advantage: framework. International Journal of Operations &
Production Management, 35(7), 1032-1055.
Sotomayor, B., Montero, R. S., Llorente, I. M., & Foster, I. (2009). Virtual infrastructure
management in private and hybrid clouds. IEEE Internet computing, 13(5).
Weick, K. E., & Sutcliffe, K. M. (2015). Managing the unexpected: Sustained performance in a
complex world. John Wiley & Sons.
Wilson, C. (2014). Cyber threats to critical information infrastructure. In Cyberterrorism (pp.
123-136). Springer New York.
Witten, I. H., Frank, E., Hall, M. A., & Pal, C. J. (2016). Data Mining: Practical machine
learning tools and techniques. Morgan Kaufmann.
Wixom, B., Ariyachandra, T., Douglas, D. E., Goul, M., Gupta, B., Iyer, L. S., ... & Turetken, O.
(2014). The current state of business intelligence in academia: The arrival of big data.
CAIS, 34, 1.
Wu, X., Zhu, X., Wu, G. Q., & Ding, W. (2014). Data mining with big data. IEEE transactions
on knowledge and data engineering, 26(1), 97-107.
chevron_up_icon
1 out of 18
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]