BICS263 Introduction to Computer Information Systems

Download Report

Transcript BICS263 Introduction to Computer Information Systems

BUS 782
Information Systems for
Management
David Chao
Technology continues to advance
• Samsung Galaxy S III smartphone:
– http://www.youtube.com/watch?v=q1GhUmYvzss
• Two devices are able to communicate by
touching, a feature called S Beam.
– Share photos, videos by touching another phone
– Now you don’t have to give your number or
email just to share files. A must need.
• A service enabled by NFC.
What is near field communication (NFC)
technology?
• NFC is a new wireless technology that enables data
transmission between two objects when they are
brought within a few inches of each other.
• Smartphones enabled with NFC technology can
exchange data with other NFC enabled devices or
read information from smart tags embedded in
posters, stickers and other products.
An important commercial use of NFC:
NFC mobile payment technology
• Samsung and Visa launched PayWave NFC
app for London Olympics which used
Visa’s PayWave system and Samsung’s
NFC mobile technology to enable
contactless payments in and around the
Olympic venues this summer.
Google Wallet
http://www.google.com/wallet/index.html
• Google Wallet is a free Android app on
Google Play that turns your mobile phone
into your virtual wallet, so you can tap, pay,
and save in-store.
• NFC enabled devices
• NFC logo:
Information Technology
• Support day-to-day business operations
• Create new way of doing business
– Example:
• Making reservations
– United Airlines- http://www.united.com/
– Select your seats
– Web check-In
• Mobile check-in with web-enabled mobile phones :
– http://www.cathaypacific.com/cpa/en_INTL/manageyourtrip/m
obileservices/mobilecheckin
– Save your check-in confirmation with the barcode on your
mobile device
Technology Life Cycle
• Problem:
– Creates demand for solution
– Innovation may create demand
• Search and identify problems
– New application may create new problems
• Solution
• Service
• Competition:
• Yahoo Maps vs Google Maps
• Google Maps vs Apple Maps
– http://9to5mac.com/2012/05/11/ios-6-apple-drops-google-maps-debuts-inhouse-maps-with-incredible-3d-mode/
• Apple iPhone vs Samsung Galaxy:
– http://online.wsj.com/article/SB1000087239639044435840457760981065808
2898.html#project%3DSAMAPPLEWEB%26articleTabs%3Dinteractive
• Obsolete
Why study information systems?
• An end-user perspective
– Enhance personal productivity, and the
productivity of their work groups and
department.
– Increase your opportunities for success:
• be aware of the management problems and
opportunities presented by the information
technology.
Why study information systems?
• An enterprise perspective: Information
systems play a vital role in the success of
an enterprise.
– Efficient operations
– Effective management
– Competitive advantage
The Role of Information Systems in Business Today
Information Technology Capital Investment
Information technology investment, defined as hardware,
software, and communications equipment, grew from 34% to 50%
between 1980 and 2004.
Source: Based on data in U.S. Department of Commerce, Bureau of Economic
Analysis, National Income and Product Accounts, 2006.
Techies might finally be able to
move into top management
• More Chief Information Officers (CIOs)
are reporting directly to CEOs.
• More CIOs are being included on
management committees.
• In a recent survey of executives at capital
market firms, 89% believed that
technology managers would assume
greater responsibilities.
Geek-Suit
http://www.nri.co.jp/english/opinion/papers/2009/pdf/np2009143.pdf
Course Introduction
• IT – Introduction to information technology
– Computer hardware, software, network
– IT management
• IS – Introduction to information systems
– Information system components
– Types of information systems
• PC – personal computing
– Advanced spreadsheet techniques in decision support.
– Introduction to database and database application
development
– Internet techniques
What is Information Technology?
• A term used to refer to a wide variety of items and
abilities used in the creation, storage, and dispersal
of data, information and knowledge.
– Data: Raw facts, figures, and details.
• Numerical, text, multimedia
– Information: An organized, meaningful, and useful
interpretation of data.
• Summarized information from database
– Knowledge: Insight of a subject matter.
• Knowledge base
• Data mining
Data and Information
Raw data from a supermarket checkout counter can be processed and
organized to produce meaningful information, such as the total unit
sales of dish detergent or the total sales revenue from dish detergent for
a specific store or sales territory.
Hardware
• Input devices
• CPU and primary storage
– RAM - temporary storage
– Processor
• Control Unit - decoder
• Arithmetic & Logic Unit (ALU)
• Output devices
• Secondary storage devices
• Communication devices
Computer System Concept
Types of Computer Systems
• Micro/Minicomputers
– Personal computing, workstation,network server.
– Departmental and workgroup systems, network server, workstation.
• Mainframes
– Speed: MIPS million instructions per second
• 26 MIPS to about 17,801 MIPS
– Enterprisewide systems
– for organizations have to deal with huge amounts of data. Giga-record
or tera-record files are not unusual.
– Data mining and warehousing
• Supercomputers
– Speed: Floating-point operations per second
• 20 peta flops
– Supercomputers are often purpose-built for one or a very few specific
institutional tasks (E.g. Simulation and Modeling).
– Scientific calculations
• Networked computer systems
– WAN, LAN, PAN
Personal Area Network
• A personal area network (PAN) is a computer
network used for communication among computer
devices (including telephones and personal digital
assistants) close to one person. The devices may or
may not belong to the person in question. The reach
of a PAN is typically a few meters.
• BlueTooth: It is an industrial specification for
wireless PANs. Bluetooth provides a way to connect
and exchange information between devices such as
mobile phones, laptops, PCs, printers, digital
cameras and video game consoles via a short-range
radio frequency.
Bluetooth Applications
• Business applications:
– http://www.bluetooth.com/Pages/SmartLogos.aspx
Storage Device
• Terabytes of storage
• RAID (Redundant Arrays of Inexpensive Disks):
– Arrays of disk drives that provides a fault tolerant capability by
storing multiple copies of data on several disks.
• Mirroring
Storage Network
• Storage Area Network, SAN:
– A storage area network is an architecture to
attach remote computer storage devices to
servers in such a way that the devices appear as
locally attached to the operating system.
Data Center
• A data center is a facility used to house
computer systems and associated
components, such as telecommunications and
storage systems.
• Modular Data Center
– Data Center Containers:
• Microsoft: http://www.youtube.com/watch?v=PPnoKb9fTkA
• Google: http://www.youtube.com/watch?v=zRwPSFpLX8I
Where to put data center?
• The cost of electric power, labor, taxes,
natural disasters and land are key factors
when choosing a data center location.
– http://www.computerworld.com/s/article/300809/Low_Cost_Locati
ons?taxonomyId=155&intsrc=kc_feat&taxonomyName=servers
– http://news.idg.no/cw/art.cfm?id=6ECF9E56-17A40F78-31EAB0750688E73E#
– http://www.informit.com/articles/article.aspx?p=417091
• Arctic chill brings Facebook data center to Sweden:
– http://news.yahoo.com/arctic-chill-brings-facebook-data-centersweden-110538804.html
Radio Frequency Identification
• RFID is a system for tagging and identifying objects.
– Antenna to send and receive signals.
– RFID reader
• Applications:
– An alternative to bar code
• Supermarket
– Tracking objects
• http://www.youtube.com/watch?v=MAA9Jp
GraoU&feature=related
RFID
AN RFID tag is small compared to current bar-code labels.
Passive & Active RFID
• A passive RFID tag does not contain a battery; the power
is supplied by the reader. When radio waves from the
reader are encountered by a passive rfid tag, the coiled
antenna within the tag forms a magnetic field. The tag
draws power from it, energizing the circuits in the tag. The
tag then sends the information encoded in the tag's
memory.
• An active RFID tag is equipped with a battery that can be
used as a partial or complete source of power for the tag's
circuitry and antenna. Active RFID always broadcasts or
beacons its signal.
A few interesting RFID applications
– RFID tags help you to choose clothes
• http://blogs.zdnet.com/emergingtech/?p=719
– Digital watermark to prevent counterfeit:
• http://www.industryweek.com/articles/new_rfid_device_hel
ps_fight_counterfeiting_15439.aspx
Software
• System software
– Operating system
• Application software
– University’s registration system
• Application development software
Operating system functions
– User interface
– Resource management (managing
hardware)
– Task management (managing the
accomplishment of tasks)
– File management (managing data and
program files)
– Utilities (providing a variety of supporting
services)
Current Operating Systems
Today’s Operating Systems
• Personal computers:
– IBM PC compatible:
• Microsoft windows, Unix-like systems such as Linux.
– Apple Macintosh:
• Mac OS X, Linux
• Workgroup computers:
– MS Windows Server, Mac OS X Server, Linux.
Solaris
• Mainframe computers:
– IBM z/OS, Linux
Linux and Open Source
• Linux has been more widely ported to different
computing platforms than any other operating
system.
• Linux is the most prominent example of free
software and of open source development. Its
underlying source code is available for anyone to
use, modify, and redistribute freely, and in some
instances the entire operating system consists of
free/open source software.
Free Software: http://www.gnu.org/
• “Free software” is a matter of liberty, not price. To understand
the concept, you should think of “free” as in “free speech”, not
as in “free beer”.
• Free software is a matter of the users' freedom to run, copy,
distribute, study, change and improve the software. More
precisely, it refers to four kinds of freedom, for the users of the
software:
• The freedom to run the program, for any purpose (freedom 0).
• The freedom to study how the program works, and adapt it to
your needs (freedom 1). Access to the source code is a
precondition for this.
• The freedom to redistribute copies so you can help your
neighbor (freedom 2).
• The freedom to improve the program, and release your
improvements to the public, so that the whole community
benefits (freedom 3). Access to the source code is a precondition
for this.
Operating Systems for Mobile Devices
• Mobile devices:
– Pocket PC/PDA
– Smartphones
– Tablet computer
• Smartphone Operating systems, the most
important software in any smartphone:
http://communication.howstuffworks.com/smartphone2.htm
– Windows Mobile, Windows Phone
– iOS for iPhone/iPad
– Android for Google phone
Virtualization
• Virtualization is a technology that makes it possible to run
multiple operating systems and multiple applications on the
same computer at the same time, increasing the utilization
and flexibility of hardware.
– Average server utilization rate – 10%
• Reduce costs
• Green computing
• A virtual machine is a software container that can run its
own operating systems and applications as if it were a
physical computer. A virtual machine behaves exactly like
a physical computer and contains its own virtual (ie,
software-based) CPU, RAM hard disk and network
interface card (NIC). An operating system can’t tell the
difference between a virtual machine and a physical
machine, nor can applications or other computers on a
network.
• Vendors: VMware, Parallels, etc.
Application development software
• Low level language
• High level language
– third generation
– fourth generation
• Word processing, desktop publishing,
spreadsheet, database management, graphic
presentation, etc.
– MS Office
– OpenOffice.Org
» http://www.openoffice.org/
A compiler translates a complete program into a set of
binary instructions that the CPU can execute
Object-oriented development tools
–
–
–
–
Graphical user interface
Component programming
Event-driven programming
Code generator/Wizard
• Object example:
– Excel’s cell, chart
• Object-oriented tool examples:
• MicroSoft .Net: VB.Net, C#
• Java, C++, etc.
Portability
Java: Write Once Run Anywhere
Java Byte Code
Java Source Code
Java Virtual Machine
(JVM)
Java Byte Code
(Intermediate Code)
Executable Code
Microsoft’s .Net
• Language must compliance with Common
Language Specification, CLS.
• Compile the language into Microsoft Intermediate
Language (MSIL) code.
• The MSIL code is then executed in the
Common Language Runtime (CLR), which
conceptually is same as the JVM, where it is
translated into machine code by a compiler.
• Microsoft .Net is a server-side technology. It runs
on any servers that implement the .Net system.
Software as a Service, SaaS
• SaaS is a model of software deployment
where an application is hosted as a service
provided to customers across the Internet.
– SaaS alleviates the customer's burden of software
maintenance, ongoing operation, and support.
• no upfront investment in software development
– Conversely, customers relinquish control over
software versions or changing requirements;
– Costs to use the service become a continuous
expense, rather than a single expense at time of
purchase.
Companies Offer SaaS
• SalesForce.com:
– http://www.salesforce.com/
• Workday:
– http://www.workday.com/index.php
• Google Docs:
– Demo:
http://www.google.com/apps/intl/en/business/collaboratio
n.html#docs
– Login: docs.google.com
• Microsoft WindowsLive
– https://login.live.com/
– SkyDrive
What is cloud computing?
• Cloud computing is a style of computing in
which computing resources are provided as a
service over the Internet. Users need not have
knowledge of, expertise in, or control over
the technology infrastructure in the "cloud"
that supports them.
• Video:
http://www.youtube.com/watch?v=ae_DKNwK_ms&eurl=http%3A%2F
%2Fpardalis.squarespace.com%2F&feature=player_embedded
Examples of Cloud Computing
• SaaS
• Utility computing
Companies such as Amazon.com, Sun, and IBM, now offer
storage and virtual servers that others can access on
demand.
• Platform as a service, PaaS
This form of cloud computing delivers development
environments as a service. You build your own
applications that run on the provider's infrastructure and are
delivered to your users via the Internet from the provider's
servers.
– Mainframe, Linux, Windows Server, etc.
Who owns the data?
• Privacy: http://venturebeat.com/2009/02/17/is-facebook-reallyusing-its-new-terms-of-service-to-own-your-data/
• Facebook introduced a new terms of service agreement in
Feb. 09:
– You hereby grant Facebook an irrevocable, perpetual, non-exclusive,
transferable, fully paid, worldwide license (with the right to
sublicense) to (a) use, copy, publish, stream, store, retain, publicly
perform or display, transmit, scan, reformat, modify, edit, …..
• Security: http://www.ecommercetimes.com/story/Pinning-DownEnterprise-Data-Security-in-the-Cloud-67093.html?wlc=1252360837
• Top reasons why big businesses are reluctant to adopt
SaaS : http://www.executivebrief.com/blogs/the-pros-andcons-of-saas-part-2/
IT and New Business Model
• New products, services, and business
models:
– Business model: describes how company
produces, delivers, and sells product or
service to create wealth
– Information systems and technology a major
enabling tool for new products, services,
business models
• E.g. Netflix’s Internet-based DVD rentals