This document contains information about Information System Management (ISM) architecture and infrastructures. It covers the difference between architecture and infrastructures, ISA layers, concepts, representation, framework, elements, role in system development and components.
Decision Support System - Management Information SystemNijaz N
Refers to class of system which supports in the process of decision making and does not always give a decision itself.
Decision Support Systems supply computerized support for the decision making process.
Management Information System (MIS) is a planned system of collecting, storing, and disseminating data in the form of information needed to carry out the functions of management. A Management Information System is an information system that evaluates, analyzes, and processes an organization's data to produce meaningful and useful information based on which the management can take right decisions to ensure future growth of the organization.
Decision Support System - Management Information SystemNijaz N
Refers to class of system which supports in the process of decision making and does not always give a decision itself.
Decision Support Systems supply computerized support for the decision making process.
Management Information System (MIS) is a planned system of collecting, storing, and disseminating data in the form of information needed to carry out the functions of management. A Management Information System is an information system that evaluates, analyzes, and processes an organization's data to produce meaningful and useful information based on which the management can take right decisions to ensure future growth of the organization.
MIS 17 Cross-Functional Enterprise SystemsTushar B Kute
These presentations are created by Tushar B Kute to teach the subject 'Management Information System' subject of TEIT of University of Pune.
http://www.tusharkute.com
MIS 17 Cross-Functional Enterprise SystemsTushar B Kute
These presentations are created by Tushar B Kute to teach the subject 'Management Information System' subject of TEIT of University of Pune.
http://www.tusharkute.com
Accelerating the Digital Transformation – Building a 3D IoT Reference Archite...OPEN DEI
OPEN DEI Webinar “The role of the Reference Architectures in Data-oriented Digital Platforms”
28 May 2020
Ovidiu Vermesan (Chief Scientist – SINTEF, CREATE-IoT coordinator)
Lecture presentation to identify sets of principles, standards, or rules that guide the moral action of an individual; illustrate morality and code of conduct; apply the ten commandments of computer ethics; determine some ethical issues in computing; analyze the relevant laws in computing; criticize and argue legal issues of Data Privacy, Cybercrime and Intellectual Property.
Introduction to Computing lecture presentation to analyze the number systems handled by digital computing devices to process data, convert decimal to binary, solve Binary Arithmetic, and extend understanding of other number systems (Octal and Hexadecimal).
Digital computer deals with numbers; it is essential to know what kind of numbers can be handled most easily when using these machines. We accustomed to work primarily with the decimal number system for numerical calculations, but there is some number of systems that are far better suited to the capabilities of digital computers. And there is a number system used to represents numerical data when using the computer.
This lecture presentation recognizes the difference between IS and IT, reflection on its role in different disciplines and anticipate careers in IT or IS fields.
The presentation is about the career path in the field of Data Science. Data Science is a multi-disciplinary field that uses scientific methods, processes, algorithms, and systems to extract knowledge and insights from structured and unstructured data.
Week 02 to 03 Presentation
This course provides an overview of the computing industry, the computing profession, including research and applications in different fields of Computer Science, Information Technology, and Information System. The emphasis is to train students to gain knowledge of the fundamentals of the computing world and its application to the various disciplines using research as a method of understanding.
This course provides an overview of the computing industry, the computing profession, including research and applications in different fields of Computer Science, Information Technology, and Information System. The emphasis is to train students to gain knowledge of the fundamentals of the computing world and its application to the different disciplines using research as a method of understanding.
This piece of work entitled “Oasis of Sparkling and Refreshing Truisms” shall serve as a reference for those seeking to inspire and to provoke serious thinking and challenging people to live life to the max through nuggets.
These are ageless and enduring sayings from an executive whom everyone will admire most, especially if you have a personal conversation with him, the Honorable President of the Laguna State Polytechnic University DR. RICARDO A. WAGAN.
I invite the readers of this piece of work to ponder deeper thoughts as you read Dr. Wagan’s shining and uplifting truisms. . . not a boring moment will exist, or an idle word escape your lips if you make these words of wisdom a part of your life.
The software installation track is composed of 11 phases. It covers creating ISO File, creating bootable disc, configuring the boot sequence of computer or laptop, partitioning the hard disk or disk drive, installing Microsoft Windows Operating System, installing Microsoft Office applications, installing Anti-Virus, installing web browser, installing Adobe Acrobat Reader, installing data Compression tool and computer hardware drivers installation.
More from Laguna State Polytechnic University (20)
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
2. ISM ARCHITECTURE AND INFRASTRUCTURE
Outline
What’s the difference between architecture and an infrastructure?
Information System Architecture
Definition
Shared Terms for IS Architecture
Analogy of Architectural Concepts
Architectural Representation of an IS
Framework of IS Architecture
Elements of Zachman’s Framework for Information Systems Architecture
Why Information Architecture Matters
The Role of IS Architecture in System Development
Stakeholder Classifications
Information System Infrastructure
Definition
The Need for an IS Infrastructure
IS Infrastructure Components
Managing Hardware Infrastructure
Managing Software Infrastructure
Managing the Communication and Collaboration Infrastructure
Managing the Data and Knowledge Infrastructure
Managing the Facilities Infrastructure
Managing Human Resource Infrastructure
Managing the Service Infrastructure
Ensuring Reliable and Secure Infrastructure
3. What is the difference between architecture and infrastructure?
Architecture Infrastructure
conceptual model of the components
of some IT system
the business processes and rules,
systems structure, technical
framework, and product technologies
for a business or organizational
information system
hardware, software, networks, data,
facilities, human resources and
services components
Information System Architecture
- the structural design of shared information environments
- the art and science of organizing and labeling web sites, intranets, online
communities, and software to support findability and usability
- an emerging community of practice focused on bringing principles of design and
architecture to the digital landscape
- is a formal definition of the business processes and rules, systems structure,
technical framework, and product technologies for a business or organizational
information system
- ISA encompasses the hardware and software used to deliver the solution to the
final consumer of services
- architecture is a description of the design and contents of a computerized system
- the architecture may include information such as a detailed inventory of current
hardware, software and networking capabilities; a description of long-range plans
and priorities for future purchases, and a plan for upgrading and/or replacing
dated equipment and software
- usually consists of four layers: business process architecture, systems
architecture, technical architecture, and product delivery architecture
4. ISA Four Layers
1. Business Process Architecture
- a blueprint of the enterprise that
provides a common understanding
of the organization and is used to
align strategic objectives and
tactical demands
- the bridge between the
enterprise business model
and enterprise strategy on one side,
and the business functionality of the
enterprise on the other side
2. System Architecture
- the conceptual model that defines the structure, behavior, and more views of
a system
- a formal description and representation of a system, organized in a way that
supports reasoning about the structures and behaviors of the system
- comprise system components, the externally visible properties of those
components, the relationships
- provide a plan from which products can be procured, and systems developed,
that will work together to implement the overall system
- several types of system architecture such (1) Hardware architecture, (2) Software
architecture, (3) Enterprise architecture, Collaborative systems architectures
(such as the Internet, intelligent transportation systems, and joint air defense
systems), (4) Manufacturing systems architectures and (5) Strategic systems
architecture[
3. Technical Architecture
- computer system architecture 'layer' which defines and specifies
the interfaces, parameters, and protocols used by product architecture and
system architecture layers
4. Product Delivery Architecture
- the scheme by which the functional elements of the product are arranged into
physical chunks and by which the chunks interact
5. - links architecture to system-level design and the principles of system engineering
- has profound implications for how the product is designed, made, sold, used,
repaired
Shared Terms for IS Architecture
- What “client owners” intend might differ from what “programmers” intend
They might use the same term “data”, but they refer to different things
depending on their perspective
- What things look like differs from how things work
The same term, but they refer to different things depending on what you
describe, e.g. process
- Necessary to define the term based on participants’ view and component
description
Participant view: client owner, designer, builder
Component description: data, process, network
Analogy of Architectural Concepts
1. Architect’s bubble chart schematic (all view)
• Mutual understanding among all involved, and particularly between client and
architect (designer)
• A bubble chart is used to visualize a data set with two to four dimensions. The
first two dimensions are visualized as coordinates, the third as color and the
fourth as size.
• Bubble charts can facilitate the understanding of social, economical, medical,
and other scientific relationships
6. • Bubble charts can be considered a variation of the scatter plot, in which the data
points are replaced with bubbles.
The bubble chart can be use instead of a scatter chart if your data has three data
series that each contain a set of values. The sizes of the bubbles are determined
by the values in the third data series.
2. Architect’s drawings (client’s view)
A transcription of the client’s perceptual requirements
Tasks to be accomplished given resources (time, budget)
3. Architect’s plans (designer’s view)
A translation of the client’s perceptions/requirements into a product
Tasks translated into a physical product
4. Contractor’s plans (builder’s view)
The plans representing builder’s perspective
How tasks are accomplished given technology constraints
Architectural Representation of an IS
Each of the
architectural
representations
(artifacts)
differs from the
other in
essence, not
merely in level
of detail
7. Framework of IS Architecture
Two axes of the framework for information systems architecture are important
1) Architectural Representations
– It represents different perspectives of the different participants
– Client, designer, builder’s view (person centric)
– Business, information system, technology model
2) Types of Component Descriptions
– The same product can be described, for different purposes, in different ways
– Structure, transform, flow
– Data, process, network (connectivity) centric views
– The same product can be described differently in terms of:
• Data model: What things are made of, entity-relationship-entity
(Description I)
• Process model: How things work, input-process-output (Description II)
• Network model: Where the flow occurs, Node-line-node (Description III)
• Each element on an axis of the matrix (A, B, C an 1, 2, 3) is explicitly
different from all other elements on that one axis
• Different in content, meaning, motivation, and use.
• For example, in the data column, entity is seen as business entity from
client’s point of view, data entity from designer’s point of view, and data
row from builder’s point of view (data-centric views)
• Different types of descriptions of the same product
8. Elements of Zachman’s Framework for Information Systems Architecture
A. Architectural representations for describing the data
• Business scope (all perspective)
– A list of all the things that are important to the business (e.g. product, part,
supplies, employee, promotion, customer order, shipment)
– It supports strategy/resource investment decisions
• Business model (client perspective)
– Entity means “business” entity (e.g. DEPT, PROJ)
– Relationship means the relationship between business entity (m:n
relationship is allowed)
• Information systems model (designer perspective)
– Concepts independent of specific technology
– Entity means “data” entity (e.g. DEPT, DEPTPRJ, PROJ)
– Relationship means the relationship between data entity (m:n relationship
is not allowed)
• Technology model (builder perspective)
– Technology constraints are being applied
– Entity means technology-constrained equivalent (e.g. row, segment)
– Relationship means technology-constrained (e.g. key, pointer
2. Architectural representations for describing the process
• Business scope (all perspective)
– A list of business process; not definitive about I/O
• Business model (client’s perspective)
– Process means “business” process
– I/O involves business resources
9. – e.g. Functional flow diagram
• Information systems model (designer’s perspective)
– Process means “application” process
– I/O involves user views (i.e. some aggregation of data elements that flow
into and out of the application processes)
– e.g. Data flow diagram
• Technology model (builder’s perspective)
– Process means computer function
– I/O involves device formats
– e.g. Structure chart
3. Architectural representations for describing the network
• Business scope (all perspective)
– A list of locations in which the business operates
– Support strategy/resource investment decision for selecting the subset of
locations in which to actually locate technology
• Business model (client perspective)
– Node involves business units at some geographic locations
– Link involves logistics connections of product or information
• Information system model (designer perspective)
– Node involves information system function
– Link involves special characteristics of communication line
• Technology model (builder perspective)
– Node involves physical hardware and software
– Link involves complete specification of communications line
Why Information Architecture Matters
When you calculate the importance of information architecture to your organization, you
should consider the following costs and value propositions:
1. The cost of finding information
What does it cost if every employee in your company spends an extra five
minutes per day struggling to find answers on your intranet? What is the cost of
frustrating your customers with a poorly organized web site?
2. The cost of not finding information
How many bad decisions are made every day in your organization because
employees didn’t find the information they needed? How much duplication of effort
results from this disconnect? How many customers do you lose because they couldn’t
find the product they want on your web site? How much do you spend every day
10. providing telephone support to existing customers because theyhate navigating your
online technical support database?
3. The value of education
What is the value of educating your customers about new products and services
related to the ones they’re actively seeking on your web site?
4. The cost of construction
What does it cost to design and build a web site? How much does it cost to do it
again six months later because it doesn’t support findability or doesn’t scale?
5. The cost of maintenance
Similarly, what does it cost to ensure that good designs don’t crumble over time?
Will the people who maintain your site know where to put new content and when to
remove outdated content?
6. The cost of training
For internal, mission-critical information systems that support call centers, for
example, what does it cost to train employees to use that system? How much could you
save if it wasn’t so complicated to use?
7. The value of brand
No matter how beautiful your web site, if customers can’t find what they need,
your brand loses value in the
The Role of IS Architecture in System Development
1. Ensure purpose before architecting.
2. Ensure that stakeholders have an opportunity to vet architectural trade-offs as they
occur.
3. Evaluate the architecture throughout system development. Although an architecture
is intended to be a persistent framework during the life cycle (and life) of a system,
unforeseen changes (e.g., new missions) can influence the best of "first version"
architectures.
4. Construct the architecture to help understand technology readiness and evolution,
and avoid getting locked in to proprietary or potentially obsolete technologies or
captured by a specific vendor.
11. Stakeholder Classifications
Definition. A stakeholder in the architecture of a system is an individual, team,
organization, or classes thereof, having an interest in the realization of the system.
Principle. The architect must ensure that there is adequate stakeholder representation
across the board, including nontechnology stakeholders (such as acquirers and users)
and technology-focused ones (such as developers, system administrators, and
maintainers).
Stakeholders according to their roles and concerns
Acquirers Oversee the procurement of the system or product
Assessors Oversee the system’s conformance to standards and legal regulation
Communicators Explain the system to other stakeholders via its documentation and
training materials
Developers Construct and deploy the system from specifications (or lead the
teams that do this)
Maintainers Manage the evolution of the system once it is operational
Production
Engineers
Design, deploy, and manage the hardware and software
environments in which the system will be built, tested, and run
Suppliers Build and/or supply the hardware, software, or infrastructure on
which the system will run
Support Staff Provide support to users for the product or system when it is running
System
Administrators
Run the system once it has been deployed
Testers Test the system to ensure that it is suitable for use
Users Define the system’s functionality and ultimately make use of it
12. Information System Infrastructure
Interconnection of basic facilities
and services enabling the area to
function properly
the people, processes, procedures,
tools, facilities, and technology
which supports the creation, use,
transport, storage, and destruction
of information
The Need for an IS Infrastructure
Businesses rely on IS infrastructure to support business processes, decision
making and competitive strategy
Business processes perform activities that organizations to perform to achieve
business goals
Business Processes Activities
1. Core processes make up the
primary activities in the value
chain; these are all the
processes that are needed to
manufacture goods, sell the
products, and provide service.
2. Supporting processes are all the
processes that are needed to
perform the value chain’s
supporting activities, such as
accounting and human
resources management.
IS Infrastructure Components
1. Hardware
2. Software
3. Communication & Collaboration
4. Data and Knowledge
5. Facilities
6. Human Resources
A generic value chain showing an organization’s core and
supporting activities.
13. 7. Services
Managing Hardware Infrastructure
Integral part of the infrastructure:
Computers
Networking hardware
Issues:
What technologies to choose?
When to replace equipment?
How to secure infrastructure?
How to assure reliability?
Fluctuating computing demand (On-demand Computing)
o Available resources allocated based on user needs
o Utility computing
On-demand computing rented from external provider
Paid on as-needed basis
Large-scale problems
o Grid Computing
Combines computing power of a large number of smaller,
independent, networked computers
o Tasks broken down into smaller chunks
Dedicated vs. heterogeneous grids
o Acquisition vs. management costs
Edge computing
o Save bandwidth
o Improved Response time
System complexity
Autonomic computing
o Self-managing systems requiring minimal human
intervention to operate
Managing Software Infrastructure
Software enables companies to utilize their IS hardware
Issues:
Cost of Software
Integration
Managing bugs and licenses
Fluctuating computing needs
14.
15. Open-Source Software
Open-source movement aided by the advent of the Internet
Source code is freely available for use and/or modification
o Open-source operating system such Linux (used in everything from
fridges to personal computers to supercomputers)
Open-Source Application Software
Open-source application software such Apache Web server, Firefox Web
browser, Open Office
Drawback:
o Finding customer support may be difficult
Web Services
Web-based software systems allowing for an interaction of different
programs and databases over a network
Service-oriented architecture
Managing software bugs
Increased complexity of applications prevents error- free development
Patch management system
Managing software licensing
Hot topic due to problems with piracy
Shrink-wrap license
Enterprise license
Software asset management
Application Service Providers
ASPs provide on-demand software access over the Web
o Specific software located on the ASP’s server
o Accessed using Web-enabled interfaces
Benefits:
o Reduced need to maintain or upgrade software
o Fixed monthly fee for services
o Reliability
Example: Google Calendar
Types of ASPs: Specialist or functional ASP
o Vertical market ASP
o Enterprise ASP
o Local ASP
Managing the Communication and Collaboration Infrastructure
Help organizations to become powerful
16. Diverse communication needs
Enabled by networking hardware and software
Email servers
Communication software
Key issue
What types of communication technologies support the organization’s
goals?
Solution
Convergence
Increasing mobility
Convergence of Computing and Telecommunication
Convergence of functionality of devices such Cell phone and PDA
Convergence within underlying infrastructures such IP convergence
IP Convergence: VoIP
Use of Internet technologies for placing telephone calls
High quality of transmission possible
Ability to call from any place with Internet connection
IP Convergence: Videoconferencing over IP
IP used to transmit video data
Desktop video conferencing
HP Halo meeting room
Increasing Mobility
Knowledge workers require access to information from anywhere
o Communication devices
o Wireless devices capable of connecting to organization’s internal
network
Wireless security concerns
Managing Data and Knowledge Infrastructure
Organizations need to find new ways to manage:
Data from different sources such Data mining
Internal knowledge such Knowledge management tools
Data Mining
Online transaction processing (OLTP)
o Immediate response to user requests
17. Online analytical processing (OLAP)
o Quickly conducting complex analyses on data stored in a database
Enhancing business intelligence by combining data from various sources
Operational Systems vs Informational System
Data Warehouses and Data Marts
Data Warehouse
o Integration of multiple large databases and other information
sources into a single repository
o Pull together, integrate, and share critical corporate data throughout
the firm
Data Mart
o Data warehouse that is limited in scope
o Customized for the decision support applications of a particular
end-user group
Increasing Business Intelligence with Knowledge Management
Knowledge management
o The process used to get the greatest value from knowledge assets
Knowledge management system
o Collection of tools to generate, store, share, and manage tacit
knowledge assets
Knowledge Assets
Knowledge assets: skills, routines, practices, principles, formulas,
methods, heuristics, and intuitions
o Explicit knowledge assets
o Tacit knowledge assets
18. Managing Facilities Infrastructure
Need for specialized facilities including electricity, cooling, water
Key issues:
Where to house data centers, etc.
Threats to IS facilities
o Outside intruders
o Environmental elements
Ensuring availability
High availability facilities
Collocation facilities
Securing the facilities
Physical safeguards
Managing Human Resource Infrastructure
Need for trained workforce may be managed by facility location, educational
grants, human resources policies and outsourcing of human resource services
Locating facilities in areas with high concentration of people with a certain skill
Providing education opportunities for existing employees
Human resource policies such flexitime and telecommunicating
Outsourcing of human resource services
Managing Service Infrastructure
Processes which are not core competencies are often delegated to companies
with more experience
Increased complexity of IS
Outsourcing
Services providers address infrastructure needs
Outsourcing
Partial or entire responsibility for IS development and/or management
given to an outside organization
Enables focus on core competencies
19. o Outsourced functions
Non-core functions e.g., accounting, human resources
o Some business functions traditionally kept within the organization
Information systems security
Service providers addressing infrastructure needs
Ensuring Reliable and Secure Infrastructure
Variety of threats to IS infrastructure
Infrastructure reliability may be the most important concern
Disaster planning
o Disaster recovery plan
Detailed list of procedures to follow when recovering from a
systems-related disaster
o Backup Sites
Cold backup site – an empty warehouse with all necessary
connections for power and communication
Hot backup site – a fully equipped backup facility
Choosing a backup site location different geographic location
to minimize the risk of a disaster happening to both systems
Designing the recovery plan
o Recovery time objectives
Specify the maximum time allowed to recover from a
catastrophic event
o Recovery point objectives
Specify how current the backup data should be
20. IS controls
o Specific IT processes designed to ensure reliability of information
o Controls should be a combination of three types of controls:
Preventive controls
Detective controls
Corrective controls
o Hierarchy of IS Controls
IS Auditing
o IS audit
Performed by external auditors to help organizations assess the
state of their IS controls
To determine necessary changes
To assure the IS availability, confidentiality, and integrity
o Risk assessment
Determine what type of risks the IS infrastructure faces
o Computer Assisted Auditing Tools (CAAT)
Specific software to test applications and data, test data, or
simulations.