Information Technology Architecture Case Study

Exclusively available on IvyPanda Available only on IvyPanda

Information Technology (IT) Architecture refers to the “high-level” plan of an information system asset or software within an organization. The term also defines the specifications, guidelines, attributes, and models of an IT system or software. Developers and IT engineers construct these systems through a process known as “systems engineering.” Such systems have both non-functional and functional requirements. The functional attributes define the functions, structures, and behaviors of the IT systems (Wiegers, 2010). The non-functional requirements mainly examine the applicability or “operational” ability of the IT systems or software. Such requirements are critical because they determine the attributes, constraints, and qualities of each IT system.

We will write a custom essay on your topic a custom Case Study on Information Technology Architecture
808 writers online

Some examples of non-functional requirements include “extensibility,” maintainability, and portability. Extensibility is a critical concept because it plays a significant role in IT architecture. According to Wiegers (2010), “extensibility” refers to the ability to add or make new “changes” without necessarily altering the original program or system. This non-functional requirement is essential for any solid architecture so that it can successfully support different information systems. A solid IT architecture might not accommodate certain functions or changes if such “requirements” are unavailable. For instance, an organization might be required to widen its services without necessarily affecting its current performance. The attribute makes it easier to widen the services while using the same IT structure. As well, the end-users of the IT system might be required to create their own “scripts” or come up with “user-defined” fields.

Extensibility is an important concept because it can make an IT system useful. This quality of any IT architecture or system is critical because it can help an organization make new changes to its systems. As well, all IT architectures should have an “adjustable” database schema in order to accommodate any new changes. As well, the IT system should allow the user to do something known as “Inversion of Control” (IoC). The system should also allow third-party users and developers to “leverage” the system and use it in accordance with their needs and expectations (Withall, 2007).

Each non-functional attribute or requirement of an information system (IS) makes it easier for employees to use the software in an effective manner. For example, a good IT system should accommodate these “non-functional requirements such as maintainability, security, scalability, extensibility, portability, and portability” (Withall, 2007, p. 58). Software developers and companies can use their existing IT systems to make various changes. This is necessary for producing new software systems that can help companies realize their goals. This non-functional attribute helps companies use their IT systems effectively. According to Wiegers (2010), different companies in the communication industry can use their current IT systems to introduce new software for “monitoring” purposes. This will help the users locate callers and internet devices.

Many users might not need most of these non-functional attributes. However, such attributes are necessary because they make the software more effective and reliable. Some financial companies, such as banks, might purchase an IT system to record transactions and deposits. However, users can modify any software with the “extensibility” feature to record and display all the transactions in “real-time” (Wiegers, 2010). This example explains why companies should ensure their IT systems have these non-functional attributes. This discussion also encourages software and systems developers to consider such attributes in order to make them more reliable and effective.

Reference List

Wiegers, K. (2010). More About Software Requirements: Thorny Issues and Practical Advice. Washington DC: Microsoft Press. Web.

Withall, S. (2007). Software Requirement Patterns (Best Practices). Washington DC: Microsoft Press. Web.

1 hour!
The minimum time our certified writers need to deliver a 100% original paper
Print
Need an custom research paper on Information Technology Architecture written from scratch by a professional specifically for you?
808 writers online
Cite This paper
Select a referencing style:

Reference

IvyPanda. (2020, June 1). Information Technology Architecture. https://ivypanda.com/essays/information-technology-architecture/

Work Cited

"Information Technology Architecture." IvyPanda, 1 June 2020, ivypanda.com/essays/information-technology-architecture/.

References

IvyPanda. (2020) 'Information Technology Architecture'. 1 June.

References

IvyPanda. 2020. "Information Technology Architecture." June 1, 2020. https://ivypanda.com/essays/information-technology-architecture/.

1. IvyPanda. "Information Technology Architecture." June 1, 2020. https://ivypanda.com/essays/information-technology-architecture/.


Bibliography


IvyPanda. "Information Technology Architecture." June 1, 2020. https://ivypanda.com/essays/information-technology-architecture/.

Powered by CiteTotal, easy essay citation maker
If you are the copyright owner of this paper and no longer wish to have your work published on IvyPanda. Request the removal
More related papers
Cite
Print
1 / 1