Information Technology Architecture Case Study

Exclusively available on Available only on IvyPanda®
This academic paper example has been carefully picked, checked and refined by our editorial team.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment

Information Technology (IT) Architecture refers to the “high-level” plan of an information system asset or software within an organization. The term also defines the specifications, guidelines, attributes, and models of an IT system or software. Developers and IT engineers construct these systems through a process known as “systems engineering.” Such systems have both non-functional and functional requirements. The functional attributes define the functions, structures, and behaviors of the IT systems (Wiegers, 2010). The non-functional requirements mainly examine the applicability or “operational” ability of the IT systems or software. Such requirements are critical because they determine the attributes, constraints, and qualities of each IT system.

Some examples of non-functional requirements include “extensibility,” maintainability, and portability. Extensibility is a critical concept because it plays a significant role in IT architecture. According to Wiegers (2010), “extensibility” refers to the ability to add or make new “changes” without necessarily altering the original program or system. This non-functional requirement is essential for any solid architecture so that it can successfully support different information systems. A solid IT architecture might not accommodate certain functions or changes if such “requirements” are unavailable. For instance, an organization might be required to widen its services without necessarily affecting its current performance. The attribute makes it easier to widen the services while using the same IT structure. As well, the end-users of the IT system might be required to create their own “scripts” or come up with “user-defined” fields.

Extensibility is an important concept because it can make an IT system useful. This quality of any IT architecture or system is critical because it can help an organization make new changes to its systems. As well, all IT architectures should have an “adjustable” database schema in order to accommodate any new changes. As well, the IT system should allow the user to do something known as “Inversion of Control” (IoC). The system should also allow third-party users and developers to “leverage” the system and use it in accordance with their needs and expectations (Withall, 2007).

Each non-functional attribute or requirement of an information system (IS) makes it easier for employees to use the software in an effective manner. For example, a good IT system should accommodate these “non-functional requirements such as maintainability, security, scalability, extensibility, portability, and portability” (Withall, 2007, p. 58). Software developers and companies can use their existing IT systems to make various changes. This is necessary for producing new software systems that can help companies realize their goals. This non-functional attribute helps companies use their IT systems effectively. According to Wiegers (2010), different companies in the communication industry can use their current IT systems to introduce new software for “monitoring” purposes. This will help the users locate callers and internet devices.

Many users might not need most of these non-functional attributes. However, such attributes are necessary because they make the software more effective and reliable. Some financial companies, such as banks, might purchase an IT system to record transactions and deposits. However, users can modify any software with the “extensibility” feature to record and display all the transactions in “real-time” (Wiegers, 2010). This example explains why companies should ensure their IT systems have these non-functional attributes. This discussion also encourages software and systems developers to consider such attributes in order to make them more reliable and effective.

Reference List

Wiegers, K. (2010). More About Software Requirements: Thorny Issues and Practical Advice. Washington DC: Microsoft Press. Web.

Withall, S. (2007). Software Requirement Patterns (Best Practices). Washington DC: Microsoft Press. Web.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2020, June 1). Information Technology Architecture. https://ivypanda.com/essays/information-technology-architecture/

Work Cited

"Information Technology Architecture." IvyPanda, 1 June 2020, ivypanda.com/essays/information-technology-architecture/.

References

IvyPanda. (2020) 'Information Technology Architecture'. 1 June.

References

IvyPanda. 2020. "Information Technology Architecture." June 1, 2020. https://ivypanda.com/essays/information-technology-architecture/.

1. IvyPanda. "Information Technology Architecture." June 1, 2020. https://ivypanda.com/essays/information-technology-architecture/.


Bibliography


IvyPanda. "Information Technology Architecture." June 1, 2020. https://ivypanda.com/essays/information-technology-architecture/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.

1 / 1