BUS 782 Information Systems for Management David Chao Information Technologies continue to advance • Examples: – Near Field Communication, NFC • Share photos, videos by touching another phone • NFC mobile payment technology – Cell phone wireless charging – Wearable devices • Google glasses, Apple Watch – 3-D printing Near Field Communication, NFC • NFC is a wireless technology that enables data transmission between two objects when they are brought within a few inches of each other. • Smartphones enabled with NFC technology can exchange data with other NFC enabled devices or read information from smart tags embedded in posters, stickers and other products. • NFC Contactless logo: An important commercial use of NFC: NFC mobile payment technology • Google Wallet is a mobile app that uses NFC to make secure payments by tapping the phone on any NFC enabled devices – http://www.google.com/wallet/index.html – http://en.wikipedia.org/wiki/Google_Wallet • iPhone 6: pay with Touch ID – http://www.apple.com/iphone-6/apple-pay/ Wireless Remote Charging https://www.youtube.com/watch?v=qr63Kl0SuFo • Electromagnetic induction: magnetic fields could drive electric currents and makes it possible to transfer energy. • Qi wireless charging standard – Wireless Power Consortium standard for inductive electrical power transfer over distances of up to 4 cm. The Qi system comprises a power transmission pad and a compatible receiver in a portable device. – http://en.wikipedia.org/wiki/Qi_(inductive_power_stand ard) Wireless Charging Videos • iPhone: – http://www.youtube.com/watch?v=A9yzXYA1TDI • Bus: – https://www.youtube.com/watch?v=lrnpvGyAX8oLogo : Wearable Devices • Google Contact Lenses – http://money.cnn.com/2014/01/17/technology/i nnovation/google-contacts/index.html • Apple Watch – http://www.apple.com/watch/ • Focus on healthcare field 3D Printing(Additive manufacturing) http://en.wikipedia.org/wiki/3D_printing#Rapid_prototyping • It is a process of making a three-dimensional solid object of virtually any shape from a digital model. 3D printing is achieved using an additive process, where successive layers of material are laid down in different shapes. • Video: – http://www.youtube.com/watch?v=X5AZzOw7F wA – NASA 3D Pizza Printer – http://www.youtube.com/watch?v=55NvbBJzDpU 3D Printing Applications • • • • • • Rapid prototyping Rapid manufacturing Mass customization Mass production 3D printing services Domestic and hobbyist uses Social Issues Concerning Technology • Privacy/Legal/Security Issues • Example: What's the Deal with Copyright and 3D Printing? – https://www.publicknowledge.org/files/What's %20the%20Deal%20with%20Copyright_%20F inal%20version2.pdf Digital Millennium Copyright Act: Host website/Copyright holders/File Uploaders takedown flow chart Information Systems • An information system is a computerized system enabled by information technologies to solve business problems. • Operational problems: – Reducing costs, improving efficiency • Managerial problems: – Improving management by providing better information • Strategic problems – Gain competitive advantage by providing better services Airline Systems • United Airlines- http://www.united.com – Search for flights – Select your seats – Web check-In • Mobile check-in with smart phones: – http://www.cathaypacific.com/cx/en_US/manag e-booking/check-in/mobile-check-in.html – Save your check-in confirmation with the barcode on your mobile device Customer Service: PG&E Smart Meter • Energy Alerts – let you know when you’re moving into higher-priced electric tiers so you can manage your energy use and save. • Understanding your electric charges – http://www.pge.com/en/myhome/saveenergymoney/ plans/tiers/index.page • Track energy use online Hong Kong Starbucks: Enjoying 30 minutes free WiFi activated by password printed on receipt Techies might finally be able to move into top management • More Chief Information Officers (CIOs) are reporting directly to CEOs. • More CIOs are being included on management committees. • In a recent survey of executives at capital market firms, 89% believed that technology managers would assume greater responsibilities. Geek-Suit http://www.nri.co.jp/english/opinion/papers/2009/pdf/np2009143.pdf Course Introduction • IT – Introduction to information technology – Computer hardware, software, network – IT management • IS – Introduction to information systems – Information system components – Types of information systems • PC – personal computing – Advanced spreadsheet techniques in decision support. – Introduction to database and database application development – Internet techniques What is Information Technology? • A term used to refer to a wide variety of items and abilities used in the creation, storage, and dispersal of data, information and knowledge. – Data: Raw facts, figures, and details. • Numerical, text, multimedia – Information: An organized, meaningful, and useful interpretation of data. • Summarized information from database – Knowledge: Insight of a subject matter. • Knowledge base • Data mining Data and Information Raw data from a supermarket checkout counter can be processed and organized to produce meaningful information, such as the total unit sales of dish detergent or the total sales revenue from dish detergent for a specific store or sales territory. Digital Data • Bit: Binary Digit – 0, 1 • N-bits: – 2N • Example: Color depth – http://en.wikipedia.org/wiki/Color_depth – A 24-bit true color monitor can represent 224 colors. Hardware • Input devices • CPU and primary storage – RAM - temporary storage – Processor • Control Unit - decoder • Arithmetic & Logic Unit (ALU) • Output devices • Secondary storage devices – Magnetic disk – Flash memory • Communication devices Computer System Concept Moore’s Law • Moore’s Law is a computing term which originated around 1970; the simplified version of this law states that processor speeds, or overall processing power for computers will double every two years. • Common corollary of Moore’s Law… – Computing prices will be cut in half every 18 to 24 months – Applies to cost of storage as well Types of Computer Systems • Mobile/Micro/Minicomputers – Personal computing, workstation,network server. – Departmental and workgroup systems, network server, workstation. • Mainframes – Speed: MIPS million instructions per second • 26 MIPS to about 17,801 MIPS – Enterprisewide systems – for organizations have to deal with huge amounts of data. Giga-record or tera-record files are not unusual. – Data mining and warehousing • Supercomputers – Speed: Floating-point operations per second • 20 peta flops – Supercomputers are often purpose-built for one or a very few specific institutional tasks (E.g. Simulation and Modeling). – Scientific calculations • Networked computer systems – WAN, LAN, PAN Personal Area Network • A personal area network (PAN) is a computer network used for communication among computer devices (including telephones and personal digital assistants) close to one person. The devices may or may not belong to the person in question. The reach of a PAN is typically a few meters. • BlueTooth: It is a short range radio technology. It is an industrial specification for wireless PANs. Bluetooth provides a way to connect and exchange information between devices such as mobile phones, laptops, PCs, printers, digital cameras and video game consoles via a short-range radio frequency. Bluetooth Business Applications http://www.informit.com/articles/article.aspx?p=24243 • Retail and Mobile e-Commerce – A mobile device could be used to pay for goods and services using Bluetooth communication links with a cash register. • Medical – Remote patient monitoring – Wireless biometric data – Medicine dispensers • Travel: – Airline, hotel automatic check-in • Home Networking: Appliances Storage Device • Terabytes of storage • RAID (Redundant Arrays of Inexpensive Disks): – Arrays of disk drives that provides a fault tolerant capability by storing multiple copies of data on several disks. • Mirroring • Personal Cloud Storage – Network Attached Storage – Example: • http://www.wdc.com/en/products/network/networkst orage/ • Cloud storage – http://www.thetop10bestonlinebackup.com/clou d-storage Data Center • A data center is a facility used to house computer systems and associated components, such as telecommunications and storage systems. • Modular Data Center – Data Center Containers: • Microsoft: – http://www.youtube.com/watch?v=PPnoKb9fTkA – https://www.youtube.com/watch?v=zXsoygN_v7A • Google: – http://www.youtube.com/watch?v=zRwPSFpLX8I – https://www.youtube.com/watch?v=XZmGGAbHqa0 Where to put data center? • The cost of electric power, labor, taxes, natural disasters and land are key factors when choosing a data center location. – http://www.computerworld.com/s/article/300809/Low_Cost_Locati ons?taxonomyId=155&intsrc=kc_feat&taxonomyName=servers – http://news.idg.no/cw/art.cfm?id=6ECF9E56-17A40F78-31EAB0750688E73E# – http://www.informit.com/articles/article.aspx?p=417091 • Arctic chill brings Facebook data center to Sweden: – http://news.yahoo.com/arctic-chill-brings-facebook-data-centersweden-110538804.html Radio Frequency Identification • RFID is a system for tagging and identifying objects. – Antenna to send and receive signals. – RFID reader • Applications: – An alternative to bar code • Supermarket – Tracking objects – http://www.youtube.com/watch?v=MAA9JpGraoU&featu re=related RFID AN RFID tag is small compared to current bar-code labels. Passive & Active RFID • A passive RFID tag does not contain a battery; the power is supplied by the reader. When radio waves from the reader are encountered by a passive rfid tag, the coiled antenna within the tag forms a magnetic field. The tag draws power from it, energizing the circuits in the tag. The tag then sends the information encoded in the tag's memory. • An active RFID tag is equipped with a battery that can be used as a partial or complete source of power for the tag's circuitry and antenna. Active RFID always broadcasts or beacons its signal. A few interesting RFID applications – RFID tags help you to choose clothes • http://www.zdnet.com/blog/emergingtech/rfid-tags-help-youto-choose-clothes/719 – Digital watermark to prevent counterfeit: locking product authenticity in hardware • http://www.industryweek.com/articles/new_rfid_device_helps _fight_counterfeiting_15439.aspx Potential Risk of RFID • WiFi Symbol on your Credit Card – https://oneway2day.wordpress.com/2012/10/30/w ifi-symbol-on-your-credit-card/ Internet of Things, IoT (Everything, IoE) • The Internet of Things refers to uniquely identifiable objects and their virtual representations in an Internet-like structure. • Radio-frequency identification (RFID) was seen as a prerequisite for the Internet of Things in the early days. If all objects and people in daily life were equipped with identifiers, they could be managed and inventoried by computers • IoE counter: http://newsroom.cisco.com/featurecontent?type=webcontent&articleId=1208342 Software • System software – Operating system • Application software – University’s registration system • Application development software Operating system functions – User interface – Resource management (managing hardware) – Task management (managing the accomplishment of tasks) – File management (managing data and program files) – Utilities (providing a variety of supporting services) Current Operating Systems Today’s Operating Systems • Personal computers: – IBM PC compatible: • Microsoft windows, Unix-like systems such as Linux. – Apple Macintosh: • Mac OS X, Linux • Workgroup computers: – MS Windows Server, Mac OS X Server, Linux. Solaris • Mainframe computers: – IBM z/OS, Linux Open-Source Software • Open-source software (OSS) is computer software with its source code made available and licensed with an open-source license in which the copyright holder provides the rights to study, change and distribute the software for free to anyone and for any purpose. • Digital rights management (DRM) technologies attempt to give control to the seller of digital content or devices after it has been given to a consumer. Copyleft • Copyleft is a form of licensing and can be used to maintain copyright conditions for works such as computer software, documents, and art. • It uses copyright law to offer the right to distribute copies and modified versions of a work and requiring that the same rights be preserved in modified versions of the work. Linux and Open Source • Linux has been more widely ported to different computing platforms than any other operating system. • Linux is the most prominent example of free software and of open source development. Its underlying source code is available for anyone to use, modify, and redistribute freely, and in some instances the entire operating system consists of free/open source software. – lower vulnerability to security breaches and hack attacks GNU General Public License • The GNU General Public License is a free, copyleft license for software and other kinds of works. – http://www.gnu.org/copyleft/gpl.html Operating Systems for Mobile Devices • Mobile devices: – Pocket PC/PDA – Smartphones – Tablet computer • Smartphone Operating systems, the most important software in any smartphone: http://communication.howstuffworks.com/smartphone2.htm – Windows Mobile, Windows Phone – iOS for iPhone/iPad – Android for Google phone Virtualization • Virtualization is a technology that makes it possible to run multiple operating systems and multiple applications on the same computer at the same time, increasing the utilization and flexibility of hardware. – Average server utilization rate – 10% • Reduce costs • Green computing • A virtual machine is a software container that can run its own operating systems and applications as if it were a physical computer. A virtual machine behaves exactly like a physical computer and contains its own virtual (ie, software-based) CPU, RAM hard disk and network interface card (NIC). An operating system can’t tell the difference between a virtual machine and a physical machine, nor can applications or other computers on a network. • Vendors: VMware, Parallels, etc. Application development software • Low level language • High level language – third generation – fourth generation • Word processing, desktop publishing, spreadsheet, database management, graphic presentation, etc. – MS Office – OpenOffice.Org » http://www.openoffice.org/ A compiler translates a complete program into a set of binary instructions that the CPU can execute Object-oriented development tools – – – – Graphical user interface Component programming Event-driven programming Code generator/Wizard • Object example: – Excel’s cell, chart • Object-oriented tool examples: • MicroSoft .Net: VB.Net, C# • Java, C++, etc. Portability Java: Write Once Run Anywhere Java Byte Code Java Source Code Java Virtual Machine (JVM) Java Byte Code (Intermediate Code) Executable Code Microsoft’s .Net • Language must compliance with Common Language Specification, CLS. • Compile the language into Microsoft Intermediate Language (MSIL) code. • The MSIL code is then executed in the Common Language Runtime (CLR), which conceptually is same as the JVM, where it is translated into machine code by a compiler. • Microsoft .Net is a server-side technology. It runs on any servers that implement the .Net system. Software as a Service, SaaS • SaaS is a model of software deployment where an application is hosted as a service provided to customers across the Internet. – SaaS alleviates the customer's burden of software maintenance, ongoing operation, and support. • no upfront investment in software development – Conversely, customers relinquish control over software versions or changing requirements; – Costs to use the service become a continuous expense, rather than a single expense at time of purchase. Companies Offer SaaS • SalesForce.com: – http://www.salesforce.com/ • Workday: – http://www.workday.com/index.php • Google Docs: – https://www.google.com/intl/en/docs/about/ • Microsoft OneDrive • https://onedrive.live.com/about/en-us/ • Microsoft Office 365 – http://www.microsoft.com/en-gb/business/products/office-365/ What is cloud computing? • Cloud computing is a style of computing in which computing resources are provided as a service over the Internet. Users need not have knowledge of, expertise in, or control over the technology infrastructure in the "cloud" that supports them. • Video: http://www.youtube.com/watch?v=ae_DKNwK_ms&eurl=http%3A%2F %2Fpardalis.squarespace.com%2F&feature=player_embedded • https://www.youtube.com/watch?v=uYGQcmZUTaw Examples of Cloud Computing • SaaS • Platform as a service, PaaS This form of cloud computing delivers development environments as a service. You build your own applications that run on the provider's infrastructure and are delivered to your users via the Internet from the provider's servers. – Mainframe, Linux, Windows Server, etc. • Infrastructure as a service, IaaS – the computing resource provided is virtualized hardware, in other words, computing infrastructure. – Virtual machines Examples of Cloud Computing Platforms • Cloud computing platforms typically offer services such as website hosting, virtual machines, PaaS, and database management using a network of data centers. • Examples: – Microsoft Windows Azure • http://www.windowsazure.com/en-us/ – Amazon Web Services • http://aws.amazon.com/ – Google Cloud Platform • https://cloud.google.com/ Cloud Computing Pricing • Google Cloud example: – https://cloud.google.com/appengine/ Who owns the data? • Privacy: http://www.telegraph.co.uk/technology/socialmedia/9780565/Facebook-terms-and-conditions-why-youdont-own-your-online-life.html • Facebook introduced a new terms of service agreement in Feb. 09: – You hereby grant Facebook an irrevocable, perpetual, non-exclusive, transferable, fully paid, worldwide license (with the right to sublicense) to (a) use, copy, publish, stream, store, retain, publicly perform or display, transmit, scan, reformat, modify, edit, ….. • Security: http://www.ecommercetimes.com/story/Pinning-DownEnterprise-Data-Security-in-the-Cloud-67093.html?wlc=1252360837 • Top reasons why big businesses are reluctant to adopt SaaS : http://www.executivebrief.com/blogs/the-pros-andcons-of-saas-part-2/ Reasons to Adopt SaaS • 1. Cost Effective – available on a subscription basis rather than a large upfront expense • 2. Easy to Deploy and Get Started – just require an Internet connection and easily access the application through a browser. • 3. Minimal IT support – SaaS provider supplies IT support • 4. Upgrades: – always have the latest technology • 5. Collaboration – SaaS also facilitates more effective collaboration between team members, colleagues and customers Top reasons why businesses are reluctant to adopt SaaS • Business continuity: SaaS vendors could just shut their doors easily. • Data security • SaaS are typically fit-for-all, not much customization IT and New Business Model • New products, services, and business models: – Business model: describes how company produces, delivers, and sells product or service to create wealth – Information systems and technology a major enabling tool for new products, services, business models • E.g. Netflix’s Internet-based DVD rentals