Help with essay
Synthesis Essay Topics
Tuesday, August 25, 2020
The True Dangers of the H5N1 Virus :: Bird Flu Avian Influenza Pandemic
The True Dangers of the Feared Pandemic Unique The H5N1 strain of the avian influenza is an infection. It can possibly be extremely risky particularly through its methods of transmission. The measurements of the present passings and potential passings additionally show the conceivable pandemic emerging sooner rather than later. In any case, this subject must be placed into point of view and the normal conviction that it will destroy our reality is fairly misrepresented. There is really a higher possibility that the avian influenza won't become a fatal executioner. In any case, there are numerous prospects and nobody can be totally certain about the result. The H5N1 Virus Avian influenza is likely one of the most dreaded potential flare-ups. The H5N1 strain is the specific strain being referred to. On the off chance that this strain transforms, taking into account simple human to human transmission, there is a tremendous possibility for an overall pandemic. This pandemic could leave the Earth infertile with the conceivable destruction of people except if there is a quality that permits a little percent of people to be safe (Siegel 33). The H5N1 infection has been the most dreaded infection as a result of its probability to change. The structure of the H5N1 infection is the fundamental explanation of its conceivable change. The envelope of the H5N1 infection is contained three proteins. Two of them are the hemagglutinin (H) and the neuraminidase (N). The hemagglutinin is the layer used to infiltrate the host cell. It has receptors that dilemma to cells, permitting it to open and invade the host cells. The receptors are quite certain to the receptors on the cells to which it ties. This is the explanation that infections with H5N1 Dangers 2 the H5 subtype have not had the option to transmit from human to human without any problem. Fowls have been its primary objective and so far, have been influenced to most. The neuraminidase fills in as a component used to cut the infection liberated from the bodily fluid and other restraining elements of the resistant framework, permitting the infection to move about uninhibitedly in the body (Tambyah, Leung 16). Since this infection once in a while taints people, the opposition it will look in the human invulnerable framework is anticipated to be insignificant. The harmfulness of H5N1 in its capacity to duplicate quickly, making it more probable for the infection to transform by some coincidence. The biggest dread is that the infection will transform such that licenses it to increase airborne transmission, permitting it to spread quickly from human to human.
Saturday, August 22, 2020
After the Census of 2000, how have reapportionment affected the State Research Paper
After the Census of 2000, how have reapportionment influenced the State of Nevada - Research Paper Example Nevada is one of the fifty conditions of the United States, arranged in the west piece of the United States Being one of the US states, Nevada partakes in the allotment in the United States, which includes a procedure of partitioning 435 seats in the House of Representatives among the fifty states in the United States. As indicated by the 2000 evaluation report, the Nevada state had a complete populace of 2,002,032 0f which 1,998,267 was inhabitant populace and 3,775 incorporated the US populace abroad for those whose old neighborhood was Nevada. The article further expresses that the primary point of allocation is to uniformly disperse the congress seats among the fifty states. As indicated by evaluation decides the quantity of agents that a state has in the United States House of Representatives. Those states with huge populaces are dispensed more delegates contrasted with the low populated states. How reapportionment has influenced the State of Nevada after the 2000 enumeration Re apportionment is the procedure of portion of seats among the fifty states in the United States dependent on the past evaluation. This portion of the seats is dictated by a stateââ¬â¢s populace. Reapportionment happens following a long time since the last evaluation; consequently, after the 2000 enumeration, reapportionment was done in 2003. . this allotment populace incorporates the grown-ups, youngsters, United States residents, and outsiders. Significantly, Nevada got extra one delegate for its state; be that as it may, every one of the fifty states is generally qualified for one agent relying upon the number of inhabitants in a state. An evaluation in the United States is directed after at regular intervals. ... At the point when the statistics is done, the outcomes are accounted for to the president before that year's over, in this manner the aftereffects of the registration are utilized to dispense the congress seats to all the states. There are four unique kinds of equations that are utilized when allotting seats to the states. One of the equations is the strategy for most noteworthy divisors; this technique partitions the complete populace by the quantity of seats alloted to each state, with the end goal that each state is given the specific number of seats that it merits. The subsequent equation is the strategy for significant divisions that was imagined by Daniel Webster. It was utilized in the 1840ââ¬â¢s, in which it considered adding a seat to an express that had a small amount of a half or more. Alexander proposed a third recipe in the 1850ââ¬â¢s that guaranteed that individuals were dispensed to each state contingent upon the stateââ¬â¢s populace, while the rest of the sea ts were designated to the exceptionally populated states. In 1930s, the equation of equivalent extent emerged in which it utilizes the stateââ¬â¢s populace and partitions it by the geometric mean of a stateââ¬â¢s present number of seats and the following seat. As per Rourke (1980, pp 7), reapportionment is seen as a converter from the country example to a urban predominance. He additionally expresses that reapportionment is regarded to deliver changes in states, regardless of whether the change is negligible. During reapportionment, each state is constantly expected to pick up in any event one seat; notwithstanding, allocation as a rule influences the appropriation of votes with the end goal that those states that free any seat lose a specific number of appointive votes. After a statistics, the populace development results help with redistributing, which affects the quantity of votes that a state collects in presidential decisions. As indicated by Salam (2010), a portion of th e states like Nevada may
Monday, July 27, 2020
Think Happy Thoughts
Think Happy Thoughts Im generating graphs, and have been since 8pm. They tend to start out looking messed up, like this: And eventually looking much more reasonable, like this: I stress eventually . I think that if anyone understands how I feel about being stuck in an Athena cluster generating graphs all night, it is this disgruntled bull. Although the 22 other students in the cluster with me may have some idea as well. On an almost completely unrelated note, I recently learned a great mnemonic for the stock market types: Bulls attack by thrusting their horns up in the air and bears attack by swiping down. So a bull market is one in which the market is moving up and a bear market is one in which its moving down! But back to the bull in the picture. He isnt just any bull; hes from Honduras. And so he brings back some amazing memories of the trip I got to take last January with D-Lab. There have already be several blogs about how awesome D-Lab is. This ones a nice overview. Im too sleepy to add much to them at this point, but maybe later I can tell you more about Honduras (There were all sorts of adventures, some of which involved crocodiles!). For now Ill just allow myself one more picture (of our rope pump!) and get back to work. :) Remembering Honduras makes me happy so does company. Let me know if youre out there working too! Post Tagged #D-Lab
Friday, May 22, 2020
Frank Lloyd Wrights Impact on Architecture and Civil...
One of the most influential and well-known architectural engineers in America during the twentieth century has got to be Frank Lloyd Wright. Heââ¬â¢s created and designed many creative and functional buildings for most of his career which spanned to about seventy years. His futuristic and modern designs were unique and creative, yet they were still functional for one to live in them. His eccentric thinking has brought about and greatly influenced the image of twentieth century architecture. His works have paved the way to the designs and structures of the civil engineers and architects that we have today in the twenty-first century. Frank Lloyd Wright was born in June 8, 1869 in Richland Center, Wisconsin. He was the eldest of theâ⬠¦show more contentâ⬠¦Architects from all around the world went to Chicago to help rebuild the city after it experienced a tragic fire. After learning the basics of architecture from Silsbee, Wright landed himself a job with the Dankmar Adler and Louis Sullivan firm, which was one of the progressive firms in the country at the time. Wright grew quite a friendship with Sullivan, and learned many things from him. Since the Adler and Sullivan firm was both an engineering and architectural firm, Wright was taught the ideology of ââ¬Å"form follows functionâ⬠, which helped him know that a building designââ¬â¢s functionality matter more than how it looks. By time he was around his early 20s, he has already worked on most of the best buildings in Chicago such as the Auditorium Building, which is now the Roosevelt University. In 1889, Wright married Catherine Lee Clark Tobin, in which they met at a social held at his uncleââ¬â¢s church. He and Catherine had six children, in which two became architectural engineers. To help support for his wife and family, Wright took on extra work designing houses. Wright took some designs from his firm and added some ideas into them, which eventually ended his relationship with Sulliv an and the firm. In 1893, Wright created his own architectural firm. In 1909, Wright abandoned his wife of 20 years as well as his children, and ran off to Europe with Mamah Borthwick Cheney, who was a wife of a formal client.Show MoreRelatedFrank Lloyd Wright s Life, Career, Influences And Impact On The Way We See American Architecture1500 Words à |à 6 PagesFrank Lloyd Wright is Americasââ¬â¢ best known and most influential architect and arguably the greatest architect of the 20th century from anywhere in the world. Wright is known and respected throughout the world for his innovative and modern designs. As an architect Wright developed an organic and what became known as a distinctively American style throughout his work. Many believe that Frank Lloyd Wright changed the way we build and and live in the modern world. This essay will examine and evaluateRead MoreAnalysis Of Frank Lloyd Wright And Zaha Hadid1979 Words à |à 8 Pagesunfortunate dying genre in the humanities; as a result of the contemporary economic tract housing, architecture has taken a backburner in the world of art over the last couple of decades. However, fragments of the beauty created many years ago still exists. Frank Lloyd Wright and Zaha Hadid, though different in their architectural visions both contributed and continue to contribute to the art of architecture today, surpassing their existence here on earth. While gender differences are evident, both renownedRead MoreTexas Rangers13480 Words à |à 54 Pagesa capacity crowd;his first lecture in Texas since his departure from Austin in the summer of 1957. I have arrived late, having driven the 350miles from San Antonio to the Dallas-Fort Worth area.Though there is a substantial contingent of young architecture students for whom the lecture is only one of a series,glancing around I reacquaint myself with the older faces;the balding,graying heads in the hall----Duane Landry and Jane Lorenz Landry,Bill Odum,Bill Booziotes,Rik Mc bride,and many,many others---all
Friday, May 8, 2020
Business Continuity Plan Essay - 650 Words
Introduction: DLIS has decided to develop a business continuity plan (BCP) with the full support of management. Instructions: DLIS business continuity plan will come into effect as soon as all elements meet specific guide lines and have been tested. Scope: DLIS will build and maintain a business continuity plan to insure operations will continue in the event of a single point of failure. Objective: DLIS has a warm site located 50 miles from the head quarter office ready to conduct business with a fully mirrored system and minimum staffing available in case of an unplanned interruption or disaster should occur. System Description and Architecture: The BCP for DLIS will identify critical business functionsâ⬠¦show more contentâ⬠¦Modifications to any part of the plan will be updated immediately and made aware to all personnel involved. * Test individual steps within each phase of the BCP * Changes to the IT infrastructure * Test all recovery plans * Locate and test alternative resources Outside Support: DLIS Telecommunication support will be available with a backup ISP provider at the head quarter facility and the offsite facility. Internet Service Providers (ISP) will insure communication to personnel and customers continuously in the event of a disruption or disaster. * ISP * WAN * VPN * WI-FI Backup Plans: DLIS has decided to upgrade the offsite facility with a five terabyte RAID 5 server that is capable of holding a copy of all data with live backups. In the event of a failure at headquarters operations will continue to proceed without any interruptions through an encrypted virtual private network. * Electronic Vaulting * Remote Journaling Recovery Procedures Valuable assets, including network connectivity, stored data, processes and procedures, and client information can survive centralized disruption or destruction and can be revived quickly through the agencyââ¬â¢sShow MoreRelatedBusiness Continuity Plan1973 Words à |à 8 PagesBusiness Continuity Plan Paula Munoz, University of Pheonix Course: SEC/330ââ¬â Industrial Security Craig Barnhart August 9, 2010 The Phoenix Chemical Company is a large industrial manufacturer for the chemical resins and plasticizers and employs more than 5,000 employees in three separate locations. Its headquarters is inRead MoreBusiness Continuity Plan For A Business1425 Words à |à 6 PagesIntroduction Business Continuity Plan (BCP) is made in order to continue business operation when the business site is adversely affected by some natural calamities like flood, storm, earthquake, fire, communication failure or by some terrorist attacks and crimes. This plan explains the measures taken by the organization to recover its business operation or operation transferred to another business site. Business continuity plans are made to recover from both short term and long term disasters. Plan Purpose:Read MoreQuestions On Business Continuity Plan1534 Words à |à 7 Pages1.1 Business Continuity Plan 1.1.1 Introduction EPCOR must be able to execute business recovery procedures in response to events that destroy or interrupt critical business functions / processes / services. This section governs the implementation of business continuity actions in the event of a disaster that results in the loss of the facility (and hence, any lesser disruption) or significant loss of personnel (e.g. Pandemic), and the corresponding interruption to normal business functions. ForRead MoreBusiness Continuity Plan For Motorsport Ltd1688 Words à |à 7 PagesBUSINESS CONTINUITY PLAN FOR MOTORSPORT LTD Version: 1 Produced by: Motorsport consulting team Date Produced: 11/12/2015 Approved by: Updated: Should be reviewed by the 10th June, 2016 The Business Continuity Management Team will review the Policy and Framework bi-annually; it will also be reviewed when significant changes occur within the Motorsport business operations. This document consists of â⬠¢ Policy Statement: outlining the approach of Motorsport to the Business Continuity Plan (BCP). â⬠¢Read MoreBusiness Continuity Plans And The Disaster Recovery Plan1580 Words à |à 7 Pages Business Continuity Plans (BCP) Paul D. Singleton Jr. March 11, 2015 ISSC481: IT Security: Planning and Policy Karen Paullet American Public University Business Continuity Plans (BCP) The Business Continuity Plan (BCP) and the Disaster Recovery Plan (DRP) are twin resources derived to preserve vital organization operations when facing an unsuspecting disaster. A disaster can be either natural or man-made. Natural disasters include floods, fires, earthquakes, and lightning strikesRead MoreThe Disaster Recovery Plan And A Business Continuity Plan928 Words à |à 4 Pagescontrasted business continuity plans with disaster recovery plans A disaster recovery plan and a business continuity plan, are very important to all business and their marketing plan. These plans provide detail strategies on how the business will continue to operate, before, doing and after a disaster. About 25% of business that do not have these plans and are hit by a disaster, fail to reopen. (Smith, n.d.). This is why a disaster and recovery and business continuity plan are important to a business ifRead MoreBusiness Continuity And Disaster Recovery Plan809 Words à |à 4 Pagesimplement business continuity and disaster recovery plan. Numerous individuals think that a disaster recovery plan is the same as a business continuity plan, however a DR plan concentrates on restoring IT framework and operations after an emergency. It s just one piece of a complete business continuity plan, whereas business continuity plan looks at the continuity of the whole organization. Table 1 Differences between key terms Risk management Emergency response Business continuity What couldRead MoreSample Business Continuity Plan Essay3103 Words à |à 13 Pagesï » ¿ MD Health Business Continuity Plan Table of Contents MD Health Business Continuity Plan The purpose of the Business Continuity Plan is to provide a series of defined procedures and protocols to protect MD-Health; to minimize or contain the extent of damage to University facilities and property; to allow communication systems to function in spite of suspension of normal operating conditions; and by and large, to enableRead MoreBusiness Continuity Plan For The Small Home Based Business1968 Words à |à 8 PagesEvery business, from well-established organizations such as Microsoft to the small home based business that operates out of a basement is bound to experience operational setbacks from time to time. These setbacks can be both positive and negative interruptions of normal business flow. For example, an organization might experience a demand for a product at a rate not originally anticipated, generating more revenue than expected, but leaving the organization struggling to avoid back order. OrganizationsRead MoreA Business Continuity Plan For Sunshine Machine Works 1495 Words à |à 6 PagesTranscript ââ¬â Sunshine Machine Works In this day and age, a business continuity plan is essential to an organizations risk management. A large organization like Sunshine Machine Works understand that time is critical when it comes to natural disasters or man made interruptions to their network systems. When a system is offline for excessive amounts of time, could mean a loss to the organization. Thatââ¬â¢s why having an effective business continuity plan is vital to keeping operations for being disturbed during
Wednesday, May 6, 2020
Effective Study Habits Worksheet Free Essays
University of Phoenix Material Effective Study Habits Worksheet Respond to the following in 50 to 100 words each: 1. Describe your ideal study environment. I would describe my ideal study environment up in my home office away from everyone. We will write a custom essay sample on Effective Study Habits Worksheet or any similar topic only for you Order Now A quiet place is where I can focus and concentrate on my assignement. I can brainstorm and jott my ideas freely when I am distraction free. I can usually complete my assignment in a timely manner when I am relaxed and comfortable. 2. List some of the distractions that might hinder your study progress or your performance in an online classroom. Some of the distractions that might hinder my study progress or performance from being in an online classroom are: watching television, listening to music, cooking dinner, eating dinner, children up and about, telephone ringing, visitors coming by home, and getting sleepy or not getting the proper rest will easily cause you to become distracted and unable to focus on your assignment. 3. What actions can you take to manage and eliminate distractions? The actions that I can to take to manage and eliminate distractions are: recording my favorite television shows for later playback, elimating distracting music, cooking/ eating dinner before beginning my homework, turning my telephone off and making sure that get the proper rest before sitting down to complete my assignments. 4. How will you apply your personal learning style? How does your personal Learning style affect your study habits? My personal learning style is somewhat complicated and complexed. I would say that my style is not structured because I really learn from doing. I am a very hands on learner so it is very challenging for me to understand just from reading/doing alone. I feel that my personal learning style can hinder my study habits because I am not in a classroom physically where I the instructor can demonstrate or teach in person. Whereas, I have to create ways for me to comprehend what I am learning myself. 5. List 5 effective study strategies from this week that you will use. Explain why you selected them and why they are effective strategies for online learning. The strategies that I will use are visual, musical, verbal, logic and interpersonal. Visually I can take notes and create charts and timelines that will assist me highlighting important points. Music- I will incorporate music with my learning by allowing myself to medicate on music that relax me before actually starting my assignments. Verbal- I plan to read and ask questions from others that will assist me in understaning the lesson as well as provide feedback to others. Logic- I fell that I use the logic strategy a lot. I always apply my assignments to my real-life situations in order to comprehend what I am learning better. Interpersonal- This is one I feel that I am not that good at but plan to do my best at. Studying in groups is very new to me. I feel that it really is a great way to learn from others on their thoughts and views on a given assignment. 6. Identify one change you can make immediately to increase the effectiveness of your study habits. Explain how this will help you become more effective. One change that I can make immediately will be to utilize the logic method more efficiently. I feel that if I ask others more and interact more, then I would be able to express my thoughts and views on each assignment more better. I always feel that I would be embarrassed if I asked certain questions to my peers, so I donââ¬â¢t ask at all, then feel bad because I donââ¬â¢t know or feel somewhat confused about an assignment. I know that if I start utilizing this method more, then it would really increase my study habits. How to cite Effective Study Habits Worksheet, Essay examples
Tuesday, April 28, 2020
COBIT vs. ITIL A Comparison of Two IS/IT Governance Frameworks
Introduction Information is a major aspect of all organizations and business firms (Brooks, 2006). This information is in terms of strategic plans, organisationââ¬â¢s financial outlines, consumer database, investorsââ¬â¢ information and returns on investments. Others include suppliersââ¬â¢ information, intelligence information collected from competitors and employeesââ¬â¢ information.Advertising We will write a custom report sample on COBIT vs. ITIL: A Comparison of Two IS/IT Governance Frameworks specifically for you for only $16.05 $11/page Learn More This information forms the core of any firm and its security greatly determines the survival of the organisation in the market. As a result of this, technological revolutions especially in information technology (IT) are vital to many organizations. Many organisations struggle to fit into the dynamic and changing market within which they operate. Breach of security as far as information is con cerned may greatly affect this adaptability. As a result of this, several information security and technological frameworks have been formulated to address the issue. These are frameworks such as ISO 38500 that allow managers to directly access and control this information. In this paper, the author is going to discuss two main information frameworks namely the Control Objective of Information and related Technologies (herein referred to as COBIT) and IT Information Library (herein referred to as ITIL). The two are IS/IT governance frameworks. In addition, the author will shed light on some technical aspects of the frame works and an analysis of companies that use these frameworks. Control Objective Information and related Technology (COBIT) Overview Control Objective Information and related Technology is an international framework for information technology (IT) governance that helps managers to address daily business challenges in terms of technical issues, regulatory compliance a nd business ideas. They are able to strategically address these challenges and in the process able to achieve the organizational goals (ISACA, n.d). The main objective of the framework is to control information and enhance security of sensitive data as well as IT governance. The first edition of COBIT was launched in the market in 1996 and the latest version dubbed COBIT 5 will be made available in 2012. This version is set to incorporate the features of earlier versions of COBIT and other products of ISACA. COBIT version 4.1 has 34 high level objectives that are streamlined from 215 control objectives of the management. The four major domains that COBIT deals with are planning and organizing, acquisition and implementation, delivering and support as well as monitoring and evaluation (ISACA, n.d).Advertising Looking for report on it? Let's see if we can help you! Get your first paper with 15% OFF Learn More These domains improve IS/IT governance in a business firm by e nhancing the security of information and analyzing the risks that the organizationââ¬â¢s information is exposed to. COBIT provides a common language through which managers and IT professionals can communicate. This is given the fact that it has an aspect of ââ¬Ësharing knowledgeââ¬â¢. The toolset operated by the framework supports IT by defining and aligning the goals of a business organization with those of information technology. Structural Aspects of COBIT According to ISACA (n.d), COBIT has 34 high level processes. Each of these processes has numerical maturity level ranging from 0 to 5 where 0 is non-existent and 5 is optimal maturity. The scale is normally used as a key to evaluate the level of maturity within an organization. This is together with the level of ââ¬Å"best practices consideredâ⬠(ISACA, n.d: p. 3) and the level achieved by competitors. In summary, COBIT version 4.1 domains are as follows: Planning and Organizing (PO) Domain This domain ranges f rom PO1 to PO10 and addresses the tactics and strategies to identify how IT can contribute to the achievement of organisational objectives. This domain also acknowledges the need to strategically manage, plan and communicate the vision of the business entity from different perspectives. This is together with the relevant parties responsible for its realisation. Key to this domain is proper organization of technological infrastructure. Acquiring and Implementing (AI) This domain runs from AI1 to AI17. It provides that in order to achieve the objectives of IT, possible solutions to its shortcomings should be identified or acquired. The solutions should also be implemented and integrated into the daily business processes. Moreover, change and maintenance of COBIT systems is important as it affects the functioning of the system and its ability to achieve the organisational goals. Monitoring and Evaluation (ME) Abbreviated as ME, the third domain is the shortest domain running from M E1 to ME4. It exclusively addresses improvements of any IT process by stating that it needs to be assessed on a regular basis. This is to ensure that it complies with the control requirements. ME addresses performance management, compliance to external regulations, monitoring and evaluation of internal control systems and governance. Delivering and Supporting (DC) This domain tackles the concerns of actual delivery of required services. This includes security management and continuity, operational facilities, support service for users and data management. The domain runs from DS1 to DS13Advertising We will write a custom report sample on COBIT vs. ITIL: A Comparison of Two IS/IT Governance Frameworks specifically for you for only $16.05 $11/page Learn More Other subsidiary domains include: Process Controls (PC) This is a generic control requirement found on each COBIT process. It is identified as PCn (Process Control number). This domain works in co njunction with process control objectives. It is runs from PC1 to PC6. Application Controls (AC) COBIT assumes that the role of IT is to design and implement automated applications informed by the needs and requirements of the business. This subsidiary domain covers general IT controls with the help of Acquire and Implement domain. Together they create applications control. Figure 1: A Model of COBIT Approach Domain, Arrangements and Key Functions Source: ISACA (n.d) IT Infrastructure Library (ITIL) Overview This is a strategically driven framework with a set of concepts that helps in managing, developing and operating information technology applications. ITIL serves as a platform for managers to align IT services with major business goals (ITIL, 2007). Therefore ITIL provides the linkage between operational guidelines and technical implementation of the same. It was developed by the Office of Government Commerce.Advertising Looking for report on it? Let's see if we can help you! Get your first paper with 15% OFF Learn More ITIL emphasises the importance of IT and how it can be customized to address the needs and requirements of a given organisation. This customization can be with respect to financial operations and strategic goals of the organisation. The aim is to ensure that IT is managed and governed effectively. ITIL is a registered trade mark in UK. The framework is provided as a set of eight (8) with topics on IT management (Brooks, 2006). The topics are as listed below: Service Delivery Service Input ICT Infrastructure Management Security Management The Business Perspective. Application Management. Software Asset Management. Planning to Implement Service Management It is a leading IT service management framework which is used by government agencies and other top notch institutions and organisations such as NASA, IBM and Disney. It is an indication of how IT can be used to address business expectations. It operates along five core guidelines. These include identifying consumersââ¬â¢ needs a nd IT requirements as well as designing and implementing the IT policies required. Other guidelines include monitoring and improving the IT services. Users of ITIL enjoy a wide range of benefits which includes: Reduction of costs associated with IT mishaps Improved service delivery to consumers Improved productivity Improved service delivery to third parties Improved use of IT skills and experience Reduction in operational costs due to improved resources and reduced rework. How Does ITIL Work? Lacy Macfarlane (2007) are of the view that ITIL has five main service- lifecycle stages. These are Service Strategy, Service Design, Service Transition, Service Operation and finally Continual Service Improvement. These are requirements that need to be incorporated into what is known as the four Pââ¬â¢s (perspective, position, plan and pattern). The first stage (service strategy), is made up of business outcomes that are identified and agreed on by the management. These outcomes are cri tical to the success of the entity. This leads to the next stage (service design) where a solution is provided. A service delivery package (SDP) proceeds to the next stage which contains necessary items and details that will be passed on to the rest of the stages. As such, a holistic approach has to be adopted to ensure that all IT processes are consistent and with the objectives of the organisation. In the third stage (service transition), the SDP is tested, evaluated and validated. If assumptions and requirements have changed, modifications are carried out at this stage. The SDP is turned into a Service Knowledge Management System (SKMS). This is taken through the IT environment and finally into the fourth stage (service operation). The purpose of this stage is to ensure that the services availed to consumers and end users are of high quality. It is also intended to manage applications and infrastructure thus enhancing service delivery. Weaknesses and possible failures at any of t he stages is identified and addressed through continued improvement of the services provided. The figure below vividly illustrates the five main stages that are involved in ITIL operation: Figure 2: Five Main Stages of ITIL Operation Adapted from: ITIL (2007) Walt Disney Company and ITIL Walt Disney Company has five divisions that are managed by different teams. One of its divisions (the Theme Park and Resorts) accounts for 30% of the companyââ¬â¢s revenue. The division was at the verge of collapse before adopting efficient IT governance frameworks provided by ITIL. According to APM Group [APM] (2010), there were various challenges facing the division especially in the IT department. One such challenge is the fact that the goals of the IT department were not aligned with the goals of the division and the company as a whole. It is the largest division in the company which is in direct contact with the clients on a daily basis. There were rampant cases of customer dissatisfaction especially when the customer care representatives were required to confirm information from the divisionââ¬â¢s database. This problem was brought about by slow connections and at times by network blackouts. The effects of these challenges included deterioration of services offered and reduced consumer confidence. The consumers were opting for the services provided by the competitors. Other problems included lack of security for the divisionââ¬â¢s information. The information could be easily accessed by hackers and such other third parties. There was also the difficulty in upgrading the system to reflect the changing demands of customers and the dynamic technology. These challenges affected employeesââ¬â¢ morale resulting to reduced productivity. Before the integration of ITIL services the Theme Park and Resorts Division was incurring losses. When ITIL was brought on board by the IT Service Management division in mid 2000, all this was set to change. To kick off the initiati ve, the division hired Mr. Glen Taylor, a former ITIL Chief Information Officer (CIO). He was tasked with the responsibility of integrating ITIL into the management system. He took three major steps to ensure that employees at Themes Park and Resort are conversant and able to work with the new system. The steps included: Sensitizing the employees on what ITIL entails. The justification behind this was the fact that the employees were used to bottom-up marketing tactics. It is noted that for ITIL to work properly, executive-down marketing tactics are required. This created the need for forums such as ââ¬Ëlunch and learnââ¬â¢ to be set up so that all employees were brought into terms with the new system. Instigating educational programs. This included the launch of the Foundation Training Programs on ITIL which were relevant to Walt Disney and specifically the division. The third step entailed the selection of ITIL experts with the ability to articulate the vision and mission o f the management. The experts could also understand what ITIL version 3 entails, persuading and influencing people to work together. By the time the division was taken through all the steps, it had fully adopted ITIL. This led to a tremendous growth in the number of customers and in gross profit. The earlier challenges were effectively tackled and as a result, Themes Restaurant and Resort acquired a competitive edge in the market. It was able to realize a huge return on investments due to adoption of relevant IS/IT management and governance framework that was customized and aligned to the goals and objectives of the organisation. Conclusion In conclusion, it is noted that IS/IT governance is vital to any business organisation that is willing to embrace technology. To come up with a relevant framework, the managers should first determine their IT goals and strategically integrate them with the business objectives. The major aim of COBIT is to ensure that risks brought about by IT mi smanagement have been analysed and fully addressed to enhance information security. Therefore it can be said that its main objective is proper governance of IT infrastructure and maintenance of a risk-free system. On the other hand, ITIL ensures quality and accountability of the IT framework. ITIL can be customized and aligned with the goals of both the IT department and the organization as a whole. ITIL is said to be superior to COBIT because of its high level of competence. The latter entails evaluation, testing, validation and improvement of the framework as required by the organization. This attribute explains its widespread use across the world considering that many reputable organizations are using it. References APM Group. (2010). Case study: Disney and ITIL. Web. Brooks, P. (2006). Metrics for IT service management. London: Van Haren Publishing. ISACA (n.d). Cobit 4.1 domains and collaboration. Web. ITIL. (2007). How does ITIL work? Retrieved from https://www.axelos.com/best -practice-solutions/itil. Lacy, S., Macfarlane, I. (2007). ITIL service transition. Chicago: The Stationary Office. This report on COBIT vs. ITIL: A Comparison of Two IS/IT Governance Frameworks was written and submitted by user GwenStacy to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.
Subscribe to:
Posts (Atom)