Friday, December 27, 2019

Enterprise Architecture Justification Free Essay Example, 1000 words

Identification and Selection, the identification of the project is done. In this initial stage, the feasibility of the system is done. The cost-benefit analysis is also conducted. These processes are essential at the beginning of a project, and they are achieved with the implementation of the Enterprise Architecture. The preparation of a strategic plan is a vital step in any organization, and it takes up considerable resources. The purpose of this phase is to establish and maintain an understanding of the projects requirements, between the system developer, the stakeholder, which is the US government in this case, and the customer. This communication is very essential in the development of the system. This ascertains that the interests of all the parties involved are met. It significantly reduces the chances of the system failure and bad design (Arison Torkzadet, 2008). The development of the Enterprise Architecture is also in line with the SDLC, but it covers more areas. The SDLC is generally designed to guide the development of individual systems that will make up a large system. In the development of the Enterprise Architecture, all these areas are covered and the organization s business aspects, as well. We will write a custom essay sample on Enterprise Architecture: Justification or any topic specifically for you Only $17.96 $11.86/pageorder now It provides a guideline for decision making, accountability, investment management and other management activities. In the design phase of the system, the Enterprise Architecture caters to the development of most of the components, essential in the system. In the given case study of the DMV, these components or subsystems are discussed below. Interfaces, these provide a platform for the users and clients to access the system and interact with it. Different users are given different privileges according to their purpose of interaction. Due to the sensitive nature of the information stored in the system, security is a major concern. This is addressed by placing sufficient measures to protect the data from unauthorized viewing and manipulation. The security of a system determines its integrity. The administration is another aspect that is handled by the system.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.