Free Essay

Case Study 2 - Application Architecture

In:

Submitted By mrgq09
Words 708
Pages 3
In designing and building a payroll program for a large organization with offices spread across the country, which possesses quite a few changelings to overcome and must be done in a particular manner. Thus having the right application architecture is important where the design is concerned. Because the company has one large data center that each office connects to via a wide area network (WAN), hence the appropriate architecture for this solution would have to consist of a WAN diagram to be used in management of this project, along with system documentation, and information technology architecture documents to provide a visual representation of the network. A wide area networks (WANs) usually covers a large, physical area. And many WANs cover entire buildings, cities, states, or regions, thus the primary purpose of the WAN is to link together all the local area networks, of these other offices spread across the country.
The Payroll program being used in this case study has been centered on having the proper application architecture that would be effective for the solution being deployed. It would take into consideration where each piece of equipment needs to be deployed and where its physical location should be sited and which is most effective for the organization. Thus an effective system would combine elements into an architecture, or design, that is flexible, cost-effective, technically sound, and able to support the information needs of the business. There would be a logical design of the payroll system into a physical structure, which would include hardware, software, network support, and processing methods. Therefore an Enterprise Resource Planning (ERP) would have to be established in order to determine the strategies for using IT resources in the new payroll application. There would also be a supply chain management (SCM) and initial Cost and TCO (Total Cost of Ownership), and this will come into effect when the final design stage is completed, and where certain decisions will be made that will have a major impact on the initial costs and TCO for the payroll system. Cost estimates should also not be overlooked when final decisions are being made. There would also be consideration for scalability in reference to the new system ability to expand, change or downsize easily to meet the changing need of a business enterprise, if the need arises in the future. Besides all of this it would be important in implementing systems that are volume-rated, such as transaction processing systems that would have more than what it was designed to handle.
Below is a global payroll core application which determines the organizational structure for payroll processing. This diagram shows the hierarchy of components in the organizational structure.

Some software applications will include procedures for web integration, which would require an information system with applications. Thus a Web-centric architecture would avoid many of the connectivity and compatibility problems that typically arise when it comes online and users/employees start accessing it through the web. With the new system being put into place other legacy systems may need to be integrated with the new applications. Thus the interfacing of both would have to be consistent with the requirements to analyze different types of data formats and compatibility. Those implementing the new payroll system should know if the new application eventually will replace the legacy system.
Potential ethical issues that could arise in connection with the new architecture are fundamentally associated with the emerging of the development of the new system. Where the concern would be the right away that the new payroll application has on the jobs that it may affect negatively and may replace the person/employees that use to do certain aspects of the legacy system. The idea that the new system would replace humans in many jobs, within the business may result in widespread job loss. To fully grasp the issues involved with computer ethics, it is important to consider the history of the organization being discussed for deployment of this solution.

References
Herold, R. (2010, June 22) Introduction to computer ethics. http://www.infosectoday.com/Articles/Intro_Computer_Ethics.htm
Oracle: PeopleSoft Enterprise Global Payroll (n.d) Introducing the Core Application Architecture. http://docs.oracle.com/cd/E20215_01/hr91pbr1/eng/psbooks/hgpy/chapter.htm?File=hgpy/htm/hgpy04.htm

Similar Documents

Free Essay

Enterprise Architecture

...Article Essential Layers, Artifacts, and Dependencies of Enterprise Architecture By Robert Winter and Ronny Fischer Abstract After a period where implementation speed was more important than integration, consistency and reduction of complexity, architectural considerations have become a key issue of information management in recent years again. Enterprise architecture is widely accepted as an essential mechanism for ensuring agility and consistency, compliance and efficiency. Although standards like TOGAF and FEAF have developed, however, there is no common agreement on which architecture layers, which artifact types and which dependencies constitute the essence of enterprise architecture. This paper contributes to the identification of essential elements of enterprise architecture by (1) specifying enterprise architecture as a hierarchical, multilevel system comprising aggregation hierarchies, architecture layers and views, (2) discussing enterprise architecture frameworks with regard to essential elements, (3) proposing interfacing requirements of enterprise architecture with other architecture models and (4) matching these findings with current enterprise architecture practice in several large companies. Keywords enterprise architecture, architectural components, architectural layers, architectural views, interfaces ENTERPRISE ARCHITECTURE: DEFINITION According to ANSI/IEEE Std 1471-2000, architecture is defined as the “ fundamental organization of a system, embodied in...

Words: 5469 - Pages: 22

Premium Essay

Hdgjdhfszgd

...eBay - eCommerce Platform A case study in Scalability by Mohammad Usman Ahmed mohammad.ahmed@mail.mcgill.ca Table of Contents: 1. 2. 3. 4. 5. 6. 7. 8. The Application and its overall architecture Component Model and its interactions Technological aspects of the eBay Architecture Strengths and relative weaknesses of the Architecture Component Model and variations Key Quality Attributes favoured by the eBay Architecture Evolution of the Application and its Architecture Conclusion The Application and its overall architecture EBay is a highly successful eCommerce platform. The larger category of eBay includes 19 different platforms (e.g. skype, payPal, rent) but we'll be focusing on the search and trade platform. The other sister platforms became part of eBay due to recent acquisitions and in some cases result in architectural mismatch which would be an interesting topic for a separate case study, therefore this case study focuses on the original platform's architecture and its evolution in recent years. EBay is an eCommerce system where a user can browse to the website eBay .com and search for anything they want to buy, in auction or right away from the buyer, or to post some item for sale which other users can search for as prospective buyers. The users then arrange for payments online (using eBay's payPal system which is a separate system designed solely for that purpose and recently integrated onto the eBay platform) and receive the...

Words: 4022 - Pages: 17

Free Essay

Linux/Intel Effectiveness for Running E-Business: a Case Study of Oracle E-Business Outsourcing

...Linux/Intel Effectiveness For Running E-Business: A Case Study of Oracle E-Business Outsourcing An Oracle White Paper January 2003 Linux/Intel Effectiveness For Running E-Business: A Case Study of Oracle E-Business Outsourcing Executive Overview ............................................................................................. 3 Introduction .......................................................................................................... 3 Why Linux? ........................................................................................................... 4 Price/Performance Measurement of Intel Architecture ................................. 4 UNBREAKABLE LINUX ................................................................................ 4 Architecture for E-Business outsourcing.......................................................... 5 Oracle E-Business Outsourcing Standard Infrastructure .............................. 5 effectiveness of Linux/Intel for outsourcing ................................................... 6 Reliability ............................................................................................................... 7 Reliability Advantages of Oracle E-Business Suite on Linux/Intel and RISC ........................................................................................................................7 Performance .....................................................................................................

Words: 3458 - Pages: 14

Free Essay

Soa Agility in Practice

...SOA Case Study: Agility in Practice As boundaries within and between enterprises become increasingly permeable, there is a greater need for information flow. This is inhibited by the "information silos" formed by traditional software applications. Service oriented architecture (SOA) replaces these silos with loosely-coupled services, enabling information to flow as needed, and delivering enterprise agility. This is a case study from ING Card, a division of the ING Group, member of the Jericho Forum of The Open Group. It describes the first phase of their SOA implementation, with services that are hard-wired rather than dynamically discoverable. It illustrates how even this stage of SOA can deliver real business agility, and contains some interesting lessons for SOA implementation. The case study was written by Alcedo Coenen. Alcedo has built his experience in IT since 1987, although he originally graduated in musicology in 1986. He has been working as programmer, information analyst, and since 1997 as (information) architect for ING and other companies in the Netherlands. Within ING Alcedo has been working on multi-channel architecture, a global SOA for ING Europe, a credit card system and on knowledge systems. Recently he has established a working group on the Business Rules Approach, producing articles and presentations for several architecture conferences and meetings. Open Group SOA Case Study http://www.opengroup.org Open Group SOA Case Study SOA Agility in...

Words: 3504 - Pages: 15

Free Essay

With the Development of Technology, More and More Robots Are Used in Various Fields,

...Technology Scheme of Instruction and Evaluation Third Year -Semester VI Scheme of Instructions Sr. Subjects Lect/ No 1 Information and Network Security Middleware and Enterprise Integration Technologies Software Engineering Data Base Technologies Programming for Mobile and Remote Computers Information Technology for Management of Enterprise TOTAL Week 4 Scheme of Examinations Theory T/W Practical Oral Total Hours Marks Marks Marks Marks Marks 3 100 25 -25 150 Pract/ Week 2 Tut/ Week -- 2 4 2 -- 3 100 25 -- 25 150 3 4 5 4 4 4 2 2 2 ---- 3 3 3 100 100 100 25 25 25 --25 25 25 -- 150 150 150 6 4 24 10 1 1 3 -- 100 600 25 150 -25 25 125 150 900 INFORMATION AND NETWORK SECURITY CLASS T.E. ( INFORMATION TECHNOLOGY) HOURS PER LECTURES : WEEK TUTORIALS : PRACTICALS EVALUATION SYSTEM: THEORY PRACTICAL ORAL TERM WORK : SEMESTER VI 04 -02 HOURS 3 ---- MARKS 100 25 25 1. Introduction What is Information Security? Security Goals. 2. Cryptography Crypto Basic, Classic Cryptography, Symmetric Key Cryptography: Stream Ciphers, A5/1, RC4, Block Ciphers, Feistel Cipher, DES, Triple DES, AES, Public Key Cryptography: Kanpsack, RSA, Defiie-Hellman, use of public key crypto- Signature and Non-repudiation, Confidentiality and Non-repudiation, Public Key Infrastructure, Hash Function: The Birthday Problem, MD5, SHA-1, Tiger Hash, Use of Hash Function. 3. Access control - Authentication and Authorization...

Words: 3868 - Pages: 16

Free Essay

Paper

...WEEK 6 ASSIGNMENT – CASE STUDY REPORT ABC Brokerage : there are two parts to this case study. 1. ABC is a small brokerage house that enables its clients to buy and sell stocks over the Internet. ABC has just decided to offer a set of stock analysis tools that will help its clients more easily pick winning stocks. ABC’s information systems department has two alternatives for developing the new tools. The first alternative will have a special tool developed in C++ that clients will download onto their computers to run. The tool will communicate with the ABC server to select data to analyze. The second alternative will have the C++ program running on the server, the client will use his or her browser to interact with the server. Classify the two alternative architecture in terms of what type of application architecture they use. Outline the pros and cons of the two alternatives. Consider Performance (Delay) and Ease of installing and operating the two alternatives Use the table below to answer the questions: Alternative 1 : Thick client | Alternative 2: Thin client | Brief Description: | Brief Description: | Type of application architecture: | Type of application architecture: | Pros: | Pros: | Cons: | Cons: | 2. ABC has just decided to install a new email package. The IT department offered two solutions. First, it could host the email in-house using Microsoft Exchange Mail Server. The second solution would be to use one of the cloud-based service...

Words: 315 - Pages: 2

Free Essay

Virtualization Implementation

...Server Virtualization and Consolidation - A case study Ravi G Singh Consulting IT Specialist – System p rsingh@us.ibm.com Special Notices This document discusses Server Virtualization and Consolidation designed and implemented by the author for an IBM Customer. This document is presented “As-Is” without any warranty, guarantee or assurances of any kind, either express or implied. IBM does not assume responsibility for the statements expressed herein and it reflects the opinions of the author. If you have questions about the contents of this document, please direct them to the author at rsingh@us.ibm.com. Author is not responsible for errors in this document that may result in any kind of inaccuracies. Acknowledgements Thanks to John R Hock, IBM Certified IT Specialist – System p - Advanced Technical Support Americas (ATS) for reviewing this White Paper. Thanks to the customer and IBM team for their contribution and support to this project. Trademarks The following terms are registered trademarks of International Business Machines Corporation in the United States and/or other countries: AIX, AS/400, DB2, IBM, Micro Channel, MQSeries, Netfinity, NUMAQ, OS/390, OS/400, Parallel Sysplex, PartnerLink, POWERparallel, RS/6000, S/390, Scalable POWERparallel Systems, Sequent, SP2, System/390, ThinkPad, WebSphere. The following terms are trademarks of International Business Machines Corporation in the United States and/or other countries: DB2 Universal Database, DEEP BLUE...

Words: 6610 - Pages: 27

Premium Essay

Data Warehousing in Universities

...interesting research problem. The data warehouse is concentrated on only few aspects. The discussion here is about the data warehouse design and usage in the case of the University of Nairobi Environment. Data warehouse can be built using a top-down approach, bottom – down approach or a combination of both. In this research paper we are discussing about the data warehouse design process. Data Warehouse (DWH) systems are used by decision makers for performance measurement and decision support. Currently the main focus of the DWH research field is not as much on the interaction of the DWH with the organization, its context and the way it supports the organization’s strategic goals, as on database issues. The aim of the study is to emphasize and describe the relationship between the DWH and the organization with conceptual models, and to use this knowledge to support data interpretation with business metadata. KEYWORDS Data Warehouse (DWH) Data Mart Extraction, Transformation and Loading (ETL); Software that is used to extract data from a data source like a operational system or data warehouse, modify the data and then load it into a data mart, data warehouse or multi-dimensional data cube. Legacy System: Older systems developed on platforms that tend to be one or more generations behind the current state-of-the-art applications. Meta Data: Information in a...

Words: 2816 - Pages: 12

Free Essay

Successful Product Line Development and Sustainment: a Dod Case Study

...Successful Product Line Development and Sustainment: A DoD Case Study Sholom Cohen, Software Engineering Institute Ed Dunn, Naval Undersea Warfare Center Albert Soule, Software Engineering Institute September 2002 Product Line Systems Unlimited distribution subject to the copyright. Technical Note. CMU/SEI-2002-TN-018. The Software Engineering Institute is a federally funded research and development center sponsored by the U.S. Department of Defense. Copyright 2002 by Carnegie Mellon University. NO WARRANTY THIS CARNEGIE MELLON UNIVERSITY AND SOFTWARE ENGINEERING INSTITUTE MATERIAL IS FURNISHED ON AN "AS-IS" BASIS. CARNEGIE MELLON UNIVERSITY MAKES NO WARRANTIES OF ANY KIND, EITHER EXPRESSED OR IMPLIED, AS TO ANY MATTER INCLUDING, BUT NOT LIMITED TO, WARRANTY OF FITNESS FOR PURPOSE OR MERCHANTABILITY, EXCLUSIVITY, OR RESULTS OBTAINED FROM USE OF THE MATERIAL. CARNEGIE MELLON UNIVERSITY DOES NOT MAKE ANY WARRANTY OF ANY KIND WITH RESPECT TO FREEDOM FROM PATENT, TRADEMARK, OR COPYRIGHT INFRINGEMENT. Use of any trademarks in this report is not intended in any way to infringe on the rights of the trademark holder. Internal use. Permission to reproduce this document and to prepare derivative works from this document for internal use is granted, provided the copyright and “No Warranty” statements are included with all reproductions and derivative works. External use. Requests for permission to reproduce this document or prepare derivative works of this document for external...

Words: 16988 - Pages: 68

Premium Essay

Paper Case Study Nantonia 

...Paper Case study Nantonia  ICT Strategy & Planning Master : ICT in Business Location : University, Leiden Course : ICT Strategy & Planning Assignment : Paper Case study Nantonia Date : 3 June 2011 Name : Suraj Soerdjbali Studentnr : Teacher : ------------------------------------------------- Part 1 The business model: 1. Partners: Natepco is a subsidiary of Natonia Energy Holdings. Which on their turn have a joint venture with Prime Energy Group and Government of Natonia 2. Key activities: The key activities of Natepco are exploration and production 3. Key resources: The key resources of Natepco are sell crude oil to commodity markets and gas (LHG) to power/electricity producers 4. Value Proposition: crude oil and gas (LHG) 5. Relationship: Their Brand, retaining customers 6. Distribution and acquisition channel: Traders, electricity producers 7. Customers: willing market in local industry 8. Cost structure: Manufacturing, exploration, maintenance 9. Revenue streams: The IT systems being used within the business model: * Partners: Prime Energy Group is in consideration of implementing SAP * Key activities: VAX/Compaq systems are used for drilling applications, HP systems are used for running applications for maintenance en procurement. Offshore platforms uses email application and application access * Key resource: IBM systems for finance The business maxims that I found in the case are: ...

Words: 3623 - Pages: 15

Premium Essay

Biography

...User satisfaction Information waste IS enabled Competitive advantage Orgl change Orgl learning TAM Easy to use Perceived personal usefulness Web-based Information System Banner – Assess the levels of Flexibility Stakeholders What is Systems Design? Input design Output Design Interface design Database Technology – Network architecture, Communications Technology Flexible Systems Design for Web-based IS? Examples: Banner, Amazon.com, Dell.com – Identify the systems design elements Flexible Systems Design for Web based Information Systems (Research) BOM changes affect MRP In the Banner system, what are the changes that could occur? How do we respond to these changes? Interviews them Users – Students, Registrar (Shannon), Dean, etc. Designers / Planners – Gary Administration - Explore the dimensions – Extent, Options, cost, easy, Range, etc. Gain more insight by getting more examples. • Application architecture Design • Interface design (User/ System) • Database • Network • Prototype • Systems controls Case Study: • What information systems we are talking about… • Stake holders for this system • Involvement of stakeholders in SDLC • Systems Design activities • Design decisions • What are the alternatives for H/W, O/S, Database, PL decisions • Outputs of each Design phase • Project Management activities in SDLC/ Systems...

Words: 1598 - Pages: 7

Premium Essay

Telecom Connections

...INTRODUCTION 1. INTRODUCTION Telecom Connections is a web based application through which user can effectively use the benefits of Telephone Provider. We have analyzed the needs of the users, and thus developed a web based application, for providing telephone connections and associated services online. Because now a days people became so busy with their work and they don’t want to waste their time by going and waiting for long time or waiting in a queue for applying for new connections or to get their bills or to give the complaints regarding the service. Also they are not sure whether waiting for that much time , they will get their turn or not. If so they will get out with frustration .By considering all this issues associated with the manual process we have developed a web application for the telecom users , where in the user can apply for new connections online , can view the bill status online , can send the feedback and do complaints regarding the service provided by the telecom company. 1. PURPOSE OF THE PROJECT: We are going to build an automated system where user can online apply for phone connections and they can view their telephone bills and they can also post the complaints details. EXISTING SYSTEM AND PROPOSED SYSTEM 2. EXISTING SYSTEM AND PROPOSED SYSTEM 2.1 PROBLEMS EXISTING IN SYSTEM: In existing system user has no option of online. He has to go to telecom office...

Words: 2792 - Pages: 12

Premium Essay

Managing Codified Knowledge

...can be stored and transferred to others. Business organizations have been the primary users of such codified knowledge, as huge amounts of information runs through the various divisions of an organization, which can be integrated and used for making more profitable, strategic and constructive business decisions. Thus, the need for knowledge management arose, wherein, chunks of codified knowledge has to be appropriately managed for ease of retrieval and use. The influential paper, “Managing Codified Knowledge” by Zack (1999) is reviewed here. The definition of knowledge and knowledge management, the benefits of knowledge management, the author’s rhetoric on the architecture of knowledge management and its importance in modern business organizations are discussed here. This paper also attempts to analyze two case studies presented by the author, and a brief summarization of the author’s key findings is also intended. The author discusses knowledge and knowledge management mainly in the context of business organizations. The key points are highlighted as follows: I. Knowledge and Knowledge...

Words: 1765 - Pages: 8

Premium Essay

Mid Term Paper

...use IT to make his company. 2. What are his ideal industry leaders? Ans. Staples is his main ideal industry leader and overall he wants be compared with Dell and Compaq. 3. Does he want to be a manufacturer? Ans. No, he doesn’t want to be a manufacturer, as he wants his partners to do manufacturing. 4. How can IT help him grow his business (give two main ideas). Ans. Information technology can help his business grow by leaps and bounds. * Using Open source software: Customer relationship management Content management system * Being active in social presence: Facebook, twitter etc By such IT approach he can grow his business and can reach to maximum number of people. 5. What are the main interesting features of this case study? Ans. The main interesting features of this case study are that, we get to know more about different IT approaches towards the empowerment of business and it makes us to think about how technology can make work easy and more efficient. 6. A general business strategy Ans. A good strategy will be to maintain good communications with the manufacturers and understand the demand of customers. Understanding IT and implementing it in the process of company will reduce time and will be more approachable. 7. An application plan that supports the business strategy Ans. Following are the application plans that will support business...

Words: 421 - Pages: 2

Free Essay

Applied Soa

...Applied SOA Service-Oriented Architecture and Design Strategies Mike Rosen Boris Lublinsky Kevin T. Smith Marc J. Balcer Wiley Publishing, Inc. Applied SOA Applied SOA Service-Oriented Architecture and Design Strategies Mike Rosen Boris Lublinsky Kevin T. Smith Marc J. Balcer Wiley Publishing, Inc. Applied SOA: Service-Oriented Architecture and Design Strategies Published by Wiley Publishing, Inc. 10475 Crosspoint Boulevard Indianapolis, IN 46256 www.wiley.com Copyright  2008 by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada ISBN: 978-0-470-22365-9 Manufactured in the United States of America 10 9 8 7 6 5 4 3 2 1 No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, or online at http://www.wiley.com/go/permissions. Limit of Liability/Disclaimer of Warranty: The publisher and...

Words: 218699 - Pages: 875