Information Technology Reference
In-Depth Information
other business intelligence solutions can turn the portal into a robust win-
dow into an organization's entire operation. This requires careful plan-
ning, as well as capacity management and access control.
Beyond the Boundary
The many forms of electronic communication benefit an organization, but
without careful planning and control, they can also create impediments to
operational requirements. Remote access to documents may require specific
controls on content availability or encryption requirements for accessing
devices, while overly antagonistic discussions boards may require modera-
tion. Attempts to pour every possible element of data onto a user's portal
interface can rapidly obscure any value present in the data through sheer
volume overload. Planning for summarization using dashboards or other
controls is essential to making complex information available for rapid
review and assimilation. These technologies represent opportunities for
growth in new areas for some organizations, while others may find them-
selves relying on videoconferencing and remote access simply to sustain
operations in the event of a transportation halt or a widespread pandemic.
Summary
The very nature of communication technologies mandates that their plan-
ning and coordination be included in any form of enterprise architecture.
Although we may have put aside the drum and the gong, communication
is still necessary to keep everyone's eyes and ears focused on the same
goal. After considering authentication and access control, the architect
must consider all collaboration solutions before moving forward. Many
communication solutions will be used during the project planning and
implementation phases, so these must be established as early as possible
in the planning phase of an architectural project.
In this chapter, we have identified common communications mecha-
nisms that may be present in a modern enterprise environment, as well as
groupware aggregations of these communication streams. The enterprise
architect must consider not only the current systems in use, but also emerg-
ing solutions whose inclusion may alter resource requirements and access
control mechanisms in mid- to long-term enterprise strategic planning.
Search WWH ::




Custom Search