Information Technology Reference
In-Depth Information
source community in order to protect the code from deep inspection that
could reveal vulnerabilities to potential attackers. Vulnerabilities can also
exist across the spectrum of available applications, such as the JavaScript
Key vulnerability that posed a threat to dozens of different Web browsing
clients on Windows, Linux, and Macintosh systems. New threats targeted
at virtualization hypervisors may be developed in the near future, as vir-
tualized data centers become more common.
It is not always possible to avoid or transfer risks completely and there
are many risks that simply cannot be accepted because of regulatory or legal
mandate. The CIO can add value to an architectural project by including
risk-mitigation considerations to benefit the future-state enterprise, and by
including contingencies and contingency reserves in project planning.
Beyond the End
Before beginning an architectural realignment project, the lead architect
must work through and decompose all aspects of the update process from
the high-level strategic vision down to the specifications necessary for
evaluation and implementation of each element. This planning does not
stop at a completed solution, however, because the end of a technology life
cycle does not always provide a clean terminus.
Planned Obsolescence
Decisions must be made regarding lease agreements versus outright pur-
chase before procurement can begin. Retirement strategies must be iden-
tified for solutions that are being phased out, while media and hardware
disposal strategies need to encompass many types of media and destruc-
tion mechanisms. Legacy equipment may be maintained because an
alternative does not exist or has been deemed too costly to acquire. The
worst-case scenario here is that a large segment of the enterprise might be
rendered obsolete as a result of changes in technology. One example of this
involves the evolution of video connectivity from older VGA standards to
DVI and HDMI standards, causing enterprises to extend tech refresh
to include existing monitors and extended video cabling replacements
due to the change in onboard workstation hardware standards. Effec-
tive long-term enterprise planning should include cyclic modernization of
Search WWH ::




Custom Search