It System

Read Complete Research Material

IT SYSTEM

Strategic Direction to IT system



Strategic Direction to IT system

Introduction

When using information technology according to the short-term needs of the department of computer science or some business areas, regardless of the vision, mission and strategies that top management wants to implement in the business, these IT initiatives fail to deliver the benefits originally estimated, thus causing a break in the expectations of all stakeholders (senior management, business management, management of information technology.). Hence the importance of having a master plan, that is, a Strategic Plan for Information Technology (Anthony, 1965). For us, a Strategic Plan for Information Technology is a set of definitions technological and IT initiatives must support the vision, mission and strategies that the business has for a defined time horizon, we believe the reason for technology business information is the same and thus both perspectives (business and technology) should be aligned and have mechanisms to facilitate this alignment (Earl, 1989). The IT Strategic Plan should serve as a tool to accompany the senior management in the planning of investments in IT initiatives for each strategic step made in the business, understand the impact of technology initiatives in the business, have a clear idea tangible and intangible benefit to obtain and approximate costs and timelines for each initiative (Ciborra,Jelessi,1994).

Discussion

Strategic IT Assets

In my point of view, the three most basic and important strategic IT assets are as follows:

Virtual machine in Library

Printers in library

Computers in Library

I have selected the above mentioned three strategic IT assets. All of the above assets are widely used in different field. The above mentioned strategic IT assets are widely used in any library. All the above mentioned strategic IT assets are exposed to different kind of vulnerability and risk. For example: In computer there is always a vulnerability that someone can hack the library computer and delet the precious and vast data that has been stored on library computer (Sloman, 2002).

Library is a very sophisticated where everything is or should be in an organized form. Similarly, when we talk about Printers. The usage of printer in library is also exposed to different types of vulnerability. For Example: Printer can face problem at any point of time, again this might also result into the high risk that the precious data of library might be lost . Let's say power failure in the middle of printing can cause trouble to the library because it takes the data on risk.

Today, we often hear a name of vitual universities.They contain precious references and a wealth of books and manuscripts , references, and comprising many of the other libraries over the years and is one of the most important Arab libraries, and stopped a lot of Muslim students on their books, as she was in her first school.

A virtual machine is an illusion of a computing device created by a program of emulation . The emulation software simulates the presence of hardware and software resources such as memory , the processor , the hard drive , or even operating system anddrivers , for running programs as if they ran on the simulated ...
Related Ads