Week 6.2 ISA 235 Dr. Zelalem Bachore 1 SECTION 5.2 BUILDING SUSTAINABLE MIS INFRASTRUCTURES 2 CHAPTER OVERVIEW SECTION 5.1 – MIS INFRASTRUCTURE The Business Benefits of a Solid MIS Infrastructure Supporting Operations: Information MIS Infrastructure Supporting Change: Agile MIS Infrastructure SECTION 5.2 – BUILDING SUSTAINABLE MIS INFRASTRUCTURES MIS and the Environment Supporting the Environment: Sustainable MIS Infrastructure MIS AND THE ENVIRONMENT The general trend in MIS is toward smaller, faster, and cheaper devices. Gordon Moore: that continued advances in technological innovation made it possible to reduce the size of a computer chip (the brains of a computer, or even a cell phone now) while doubling its capacity every two years Three Primary Side Effects Of Businesses’ Expanded Use Of Technology E-waste: Refers to discarded, obsolete or broken electronic devices E-waste includes CDs, DVDs, thumb drives, printer cartridges, cell phones, iPods, external hard drives, TVs, VCRs, DVD players, microwaves, and so on Three Primary Side Effects Of Businesses’ Expanded Use Of Technology The energy consumed by a computer is estimated to produce as much as 10 percent of the amount of carbon dioxide produced by an automobile Three primary areas where enterprise architects focus while maintaining a firm’s MIS Infrastructure. SUPPORTING THE ENVIRONMENT: SUSTAINABLE MIS INFRASTRUCTURE The components of a sustainable MIS infrastructure include 1) Grow in computing power 2) Become less dependent on hardware and energy consumption. Grid Computing Grid computing - A collection of computers, often geographically dispersed, that are coordinated to solve a common problem Computers typically use less than 25 percent of their processing power, leaving more than 75 percent available for other tasks. Innovatively, grid computing takes advantage of this unused processing power by linking thousands of individual computers around the world to create a “virtual supercomputer” that can process intensive tasks Video #7: IBM Grid Computing Virtualized Computing Video #8: Virtualization Virtualization - Creates multiple “virtual” machines on a single computing device Through the use of virtualization, computers can run multiple operating systems along with multiple software applications—all at the same time. By increasing energy efficiency by requiring less hardware to run multiple systems or applications. By increasing hardware usability by running multiple operating systems on a single computer. Cloud Computing Stores, manages, and processes data and applications over the Internet rather than on a personal computer or server. To these individual users, the cloud appears as their personal application, device, or document It is like storing all of your software and documents “in the cloud,” and all you need is a device to access the cloud. No more hard drives, software, or The best part is that even if your processing power—that is all located in the cloud, transparent to the users. machine crashes, is lost, or is stolen, the information hosted in the cloud is safe and always available. Cloud Computing With cloud computing, an individual or business pays only for the services they need, when they need them and where, much as we use and pay for electricity. In the past, a company would have to pay millions of dollars for the hardware, software, and networking equipment required to implement a large system such as payroll or sales management. A cloud computing user can simply access the cloud and request a single license to a payroll application. The user does not have to incur any hardware, software, or networking expenses. As the business grows and the user requires more pay-per-use revenue employees to have access to the system, the model similar to a business simply purchases additional licenses. metered service such as gas or electricity. Video #9: Cloud Computing Benefits of Cloud Computing Cloud Computing Reading Assignment! 1.Software as a Service (SaaS) 2.Platform as a Service (PaaS) 3.Infrastructure as a Service (IaaS) 4.Serviceability 5.Disaster recovery 6.Emergency preparedness 7.Clean computing 8.Vulnerability 9.Web Accessibility Read Chapter 05! 15