BICS263 Introduction to Computer Information Systems

advertisement
BUS 782
Information Systems for
Management
David Chao
Information Technologies
continue to advance
• Examples:
– Near Field Communication, NFC
• Share photos, videos by touching another phone
• NFC mobile payment technology
– Cell phone wireless charging
– Wearable devices
• Google glasses, Apple Watch
– 3-D printing
Near Field Communication, NFC
• NFC is a wireless technology that enables data
transmission between two objects when they are
brought within a few inches of each other.
• Smartphones enabled with NFC technology can
exchange data with other NFC enabled devices or read
information from smart tags embedded in posters,
stickers and other products.
• NFC Contactless logo:
An important commercial use of NFC: NFC
mobile payment technology
• Google Wallet is a mobile app that uses NFC to
make secure payments by tapping the phone on
any NFC enabled devices
– http://www.google.com/wallet/index.html
– http://en.wikipedia.org/wiki/Google_Wallet
• iPhone 6: pay with Touch ID
– http://www.apple.com/iphone-6/apple-pay/
Wireless Remote Charging
https://www.youtube.com/watch?v=qr63Kl0SuFo
• Electromagnetic induction: magnetic fields could
drive electric currents and makes it possible to
transfer energy.
• Qi wireless charging standard
– Wireless Power Consortium standard for inductive
electrical power transfer over distances of up to 4 cm.
The Qi system comprises a power transmission pad and
a compatible receiver in a portable device.
– http://en.wikipedia.org/wiki/Qi_(inductive_power_stand
ard)
Wireless Charging Videos
• iPhone:
– http://www.youtube.com/watch?v=A9yzXYA1TDI
• Bus:
– https://www.youtube.com/watch?v=lrnpvGyAX8oLogo
:
Wearable Devices
• Google Contact Lenses
– http://money.cnn.com/2014/01/17/technology/i
nnovation/google-contacts/index.html
• Apple Watch
– http://www.apple.com/watch/
• Focus on healthcare field
3D Printing(Additive manufacturing)
http://en.wikipedia.org/wiki/3D_printing#Rapid_prototyping
• It is a process of making a three-dimensional
solid object of virtually any shape from a
digital model. 3D printing is achieved using
an additive process, where successive layers
of material are laid down in different shapes.
• Video:
– http://www.youtube.com/watch?v=X5AZzOw7F
wA
– NASA 3D Pizza Printer
– http://www.youtube.com/watch?v=55NvbBJzDpU
3D Printing Applications
•
•
•
•
•
•
Rapid prototyping
Rapid manufacturing
Mass customization
Mass production
3D printing services
Domestic and hobbyist uses
Social Issues Concerning Technology
• Privacy/Legal/Security Issues
• Example: What's the Deal with Copyright
and 3D Printing?
– https://www.publicknowledge.org/files/What's
%20the%20Deal%20with%20Copyright_%20F
inal%20version2.pdf
Digital Millennium Copyright Act: Host website/Copyright
holders/File Uploaders takedown flow chart
Information Systems
• An information system is a computerized
system enabled by information technologies
to solve business problems.
• Operational problems:
– Reducing costs, improving efficiency
• Managerial problems:
– Improving management by providing better
information
• Strategic problems
– Gain competitive advantage by providing better
services
Airline Systems
• United Airlines- http://www.united.com
– Search for flights
– Select your seats
– Web check-In
• Mobile check-in with smart phones:
– http://www.cathaypacific.com/cx/en_US/manag
e-booking/check-in/mobile-check-in.html
– Save your check-in confirmation with the
barcode on your mobile device
Customer Service: PG&E Smart Meter
• Energy Alerts
– let you know when you’re moving into higher-priced
electric tiers so you can manage your energy use and
save.
• Understanding your electric charges
– http://www.pge.com/en/myhome/saveenergymoney/
plans/tiers/index.page
• Track energy use online
Hong Kong Starbucks: Enjoying 30 minutes
free WiFi activated by password printed on receipt
Techies might finally be able to
move into top management
• More Chief Information Officers (CIOs)
are reporting directly to CEOs.
• More CIOs are being included on
management committees.
• In a recent survey of executives at capital
market firms, 89% believed that
technology managers would assume
greater responsibilities.
Geek-Suit
http://www.nri.co.jp/english/opinion/papers/2009/pdf/np2009143.pdf
Course Introduction
• IT – Introduction to information technology
– Computer hardware, software, network
– IT management
• IS – Introduction to information systems
– Information system components
– Types of information systems
• PC – personal computing
– Advanced spreadsheet techniques in decision support.
– Introduction to database and database application
development
– Internet techniques
What is Information Technology?
• A term used to refer to a wide variety of items and
abilities used in the creation, storage, and dispersal
of data, information and knowledge.
– Data: Raw facts, figures, and details.
• Numerical, text, multimedia
– Information: An organized, meaningful, and useful
interpretation of data.
• Summarized information from database
– Knowledge: Insight of a subject matter.
• Knowledge base
• Data mining
Data and Information
Raw data from a supermarket checkout counter can be processed and
organized to produce meaningful information, such as the total unit
sales of dish detergent or the total sales revenue from dish detergent for
a specific store or sales territory.
Digital Data
• Bit: Binary Digit
– 0, 1
• N-bits:
– 2N
• Example: Color depth
– http://en.wikipedia.org/wiki/Color_depth
– A 24-bit true color monitor can represent 224
colors.
Hardware
• Input devices
• CPU and primary storage
– RAM - temporary storage
– Processor
• Control Unit - decoder
• Arithmetic & Logic Unit (ALU)
• Output devices
• Secondary storage devices
– Magnetic disk
– Flash memory
• Communication devices
Computer System Concept
Moore’s Law
• Moore’s Law is a computing term which
originated around 1970; the simplified
version of this law states that processor
speeds, or overall processing power for
computers will double every two years.
• Common corollary of Moore’s Law…
– Computing prices will be cut in half every 18 to
24 months
– Applies to cost of storage as well
Types of Computer Systems
• Mobile/Micro/Minicomputers
– Personal computing, workstation,network server.
– Departmental and workgroup systems, network server, workstation.
• Mainframes
– Speed: MIPS million instructions per second
• 26 MIPS to about 17,801 MIPS
– Enterprisewide systems
– for organizations have to deal with huge amounts of data. Giga-record
or tera-record files are not unusual.
– Data mining and warehousing
• Supercomputers
– Speed: Floating-point operations per second
• 20 peta flops
– Supercomputers are often purpose-built for one or a very few specific
institutional tasks (E.g. Simulation and Modeling).
– Scientific calculations
• Networked computer systems
– WAN, LAN, PAN
Personal Area Network
• A personal area network (PAN) is a computer
network used for communication among computer
devices (including telephones and personal digital
assistants) close to one person. The devices may or
may not belong to the person in question. The reach
of a PAN is typically a few meters.
• BlueTooth: It is a short range radio technology. It is
an industrial specification for wireless PANs.
Bluetooth provides a way to connect and exchange
information between devices such as mobile phones,
laptops, PCs, printers, digital cameras and video
game consoles via a short-range radio frequency.
Bluetooth Business Applications
http://www.informit.com/articles/article.aspx?p=24243
• Retail and Mobile e-Commerce
– A mobile device could be used to pay for goods and
services using Bluetooth communication links with a cash
register.
• Medical
– Remote patient monitoring
– Wireless biometric data
– Medicine dispensers
• Travel:
– Airline, hotel automatic check-in
• Home Networking: Appliances
Storage Device
• Terabytes of storage
• RAID (Redundant Arrays of Inexpensive Disks):
– Arrays of disk drives that provides a fault tolerant capability by
storing multiple copies of data on several disks.
• Mirroring
• Personal Cloud Storage
– Network Attached Storage
– Example:
• http://www.wdc.com/en/products/network/networkst
orage/
• Cloud storage
– http://www.thetop10bestonlinebackup.com/clou
d-storage
Data Center
• A data center is a facility used to house
computer systems and associated components,
such as telecommunications and storage
systems.
• Modular Data Center
– Data Center Containers:
• Microsoft:
– http://www.youtube.com/watch?v=PPnoKb9fTkA
– https://www.youtube.com/watch?v=zXsoygN_v7A
• Google:
– http://www.youtube.com/watch?v=zRwPSFpLX8I
– https://www.youtube.com/watch?v=XZmGGAbHqa0
Where to put data center?
• The cost of electric power, labor, taxes,
natural disasters and land are key factors
when choosing a data center location.
– http://www.computerworld.com/s/article/300809/Low_Cost_Locati
ons?taxonomyId=155&intsrc=kc_feat&taxonomyName=servers
– http://news.idg.no/cw/art.cfm?id=6ECF9E56-17A40F78-31EAB0750688E73E#
– http://www.informit.com/articles/article.aspx?p=417091
• Arctic chill brings Facebook data center to Sweden:
– http://news.yahoo.com/arctic-chill-brings-facebook-data-centersweden-110538804.html
Radio Frequency Identification
• RFID is a system for tagging and identifying objects.
– Antenna to send and receive signals.
– RFID reader
• Applications:
– An alternative to bar code
• Supermarket
– Tracking objects
– http://www.youtube.com/watch?v=MAA9JpGraoU&featu
re=related
RFID
AN RFID tag is small compared to current bar-code labels.
Passive & Active RFID
• A passive RFID tag does not contain a battery; the power
is supplied by the reader. When radio waves from the
reader are encountered by a passive rfid tag, the coiled
antenna within the tag forms a magnetic field. The tag
draws power from it, energizing the circuits in the tag. The
tag then sends the information encoded in the tag's
memory.
• An active RFID tag is equipped with a battery that can be
used as a partial or complete source of power for the tag's
circuitry and antenna. Active RFID always broadcasts or
beacons its signal.
A few interesting RFID applications
– RFID tags help you to choose clothes
• http://www.zdnet.com/blog/emergingtech/rfid-tags-help-youto-choose-clothes/719
– Digital watermark to prevent counterfeit: locking
product authenticity in hardware
• http://www.industryweek.com/articles/new_rfid_device_helps
_fight_counterfeiting_15439.aspx
Potential Risk of RFID
• WiFi Symbol on your Credit Card
– https://oneway2day.wordpress.com/2012/10/30/w
ifi-symbol-on-your-credit-card/
Internet of Things, IoT (Everything, IoE)
• The Internet of Things refers to uniquely
identifiable objects and their virtual
representations in an Internet-like structure.
• Radio-frequency identification (RFID) was
seen as a prerequisite for the Internet of Things
in the early days. If all objects and people in
daily life were equipped with identifiers, they
could be managed and inventoried by
computers
• IoE counter: http://newsroom.cisco.com/featurecontent?type=webcontent&articleId=1208342
Software
• System software
– Operating system
• Application software
– University’s registration system
• Application development software
Operating system functions
– User interface
– Resource management (managing
hardware)
– Task management (managing the
accomplishment of tasks)
– File management (managing data and
program files)
– Utilities (providing a variety of supporting
services)
Current Operating Systems
Today’s Operating Systems
• Personal computers:
– IBM PC compatible:
• Microsoft windows, Unix-like systems such as Linux.
– Apple Macintosh:
• Mac OS X, Linux
• Workgroup computers:
– MS Windows Server, Mac OS X Server, Linux.
Solaris
• Mainframe computers:
– IBM z/OS, Linux
Open-Source Software
• Open-source software (OSS) is computer
software with its source code made available and
licensed with an open-source license in which the
copyright holder provides the rights to study,
change and distribute the software for free to
anyone and for any purpose.
• Digital rights management (DRM) technologies
attempt to give control to the seller of digital
content or devices after it has been given to a
consumer.
Copyleft
• Copyleft is a form of licensing and can be used
to maintain copyright conditions for works
such as computer software, documents, and
art.
• It uses copyright law to offer the right to
distribute copies and modified versions of a
work and requiring that the same rights be
preserved in modified versions of the work.
Linux and Open Source
• Linux has been more widely ported to different
computing platforms than any other operating
system.
• Linux is the most prominent example of free
software and of open source development. Its
underlying source code is available for anyone to
use, modify, and redistribute freely, and in some
instances the entire operating system consists of
free/open source software.
– lower vulnerability to security breaches and hack attacks
GNU General Public License
• The GNU General Public License is a free,
copyleft license for software and other
kinds of works.
– http://www.gnu.org/copyleft/gpl.html
Operating Systems for Mobile Devices
• Mobile devices:
– Pocket PC/PDA
– Smartphones
– Tablet computer
• Smartphone Operating systems, the most
important software in any smartphone:
http://communication.howstuffworks.com/smartphone2.htm
– Windows Mobile, Windows Phone
– iOS for iPhone/iPad
– Android for Google phone
Virtualization
• Virtualization is a technology that makes it possible to run
multiple operating systems and multiple applications on the
same computer at the same time, increasing the utilization
and flexibility of hardware.
– Average server utilization rate – 10%
• Reduce costs
• Green computing
• A virtual machine is a software container that can run its
own operating systems and applications as if it were a
physical computer. A virtual machine behaves exactly like
a physical computer and contains its own virtual (ie,
software-based) CPU, RAM hard disk and network
interface card (NIC). An operating system can’t tell the
difference between a virtual machine and a physical
machine, nor can applications or other computers on a
network.
• Vendors: VMware, Parallels, etc.
Application development software
• Low level language
• High level language
– third generation
– fourth generation
• Word processing, desktop publishing,
spreadsheet, database management, graphic
presentation, etc.
– MS Office
– OpenOffice.Org
» http://www.openoffice.org/
A compiler translates a complete program into a set of
binary instructions that the CPU can execute
Object-oriented development tools
–
–
–
–
Graphical user interface
Component programming
Event-driven programming
Code generator/Wizard
• Object example:
– Excel’s cell, chart
• Object-oriented tool examples:
• MicroSoft .Net: VB.Net, C#
• Java, C++, etc.
Portability
Java: Write Once Run Anywhere
Java Byte Code
Java Source Code
Java Virtual Machine
(JVM)
Java Byte Code
(Intermediate Code)
Executable Code
Microsoft’s .Net
• Language must compliance with Common
Language Specification, CLS.
• Compile the language into Microsoft Intermediate
Language (MSIL) code.
• The MSIL code is then executed in the
Common Language Runtime (CLR), which
conceptually is same as the JVM, where it is
translated into machine code by a compiler.
• Microsoft .Net is a server-side technology. It runs
on any servers that implement the .Net system.
Software as a Service, SaaS
• SaaS is a model of software deployment
where an application is hosted as a service
provided to customers across the Internet.
– SaaS alleviates the customer's burden of software
maintenance, ongoing operation, and support.
• no upfront investment in software development
– Conversely, customers relinquish control over
software versions or changing requirements;
– Costs to use the service become a continuous
expense, rather than a single expense at time of
purchase.
Companies Offer SaaS
• SalesForce.com:
– http://www.salesforce.com/
• Workday:
– http://www.workday.com/index.php
• Google Docs:
– https://www.google.com/intl/en/docs/about/
• Microsoft OneDrive
• https://onedrive.live.com/about/en-us/
• Microsoft Office 365
– http://www.microsoft.com/en-gb/business/products/office-365/
What is cloud computing?
• Cloud computing is a style of computing in
which computing resources are provided as a
service over the Internet. Users need not have
knowledge of, expertise in, or control over
the technology infrastructure in the "cloud"
that supports them.
• Video:
http://www.youtube.com/watch?v=ae_DKNwK_ms&eurl=http%3A%2F
%2Fpardalis.squarespace.com%2F&feature=player_embedded
• https://www.youtube.com/watch?v=uYGQcmZUTaw
Examples of Cloud Computing
• SaaS
• Platform as a service, PaaS
This form of cloud computing delivers development
environments as a service. You build your own applications
that run on the provider's infrastructure and are delivered to
your users via the Internet from the provider's servers.
– Mainframe, Linux, Windows Server, etc.
• Infrastructure as a service, IaaS
– the computing resource provided is virtualized hardware, in other
words, computing infrastructure.
– Virtual machines
Examples of Cloud Computing Platforms
• Cloud computing platforms typically offer
services such as website hosting, virtual
machines, PaaS, and database management
using a network of data centers.
• Examples:
– Microsoft Windows Azure
• http://www.windowsazure.com/en-us/
– Amazon Web Services
• http://aws.amazon.com/
– Google Cloud Platform
• https://cloud.google.com/
Cloud Computing Pricing
• Google Cloud example:
– https://cloud.google.com/appengine/
Who owns the data?
• Privacy: http://www.telegraph.co.uk/technology/socialmedia/9780565/Facebook-terms-and-conditions-why-youdont-own-your-online-life.html
• Facebook introduced a new terms of service agreement in
Feb. 09:
– You hereby grant Facebook an irrevocable, perpetual, non-exclusive,
transferable, fully paid, worldwide license (with the right to
sublicense) to (a) use, copy, publish, stream, store, retain, publicly
perform or display, transmit, scan, reformat, modify, edit, …..
• Security: http://www.ecommercetimes.com/story/Pinning-DownEnterprise-Data-Security-in-the-Cloud-67093.html?wlc=1252360837
• Top reasons why big businesses are reluctant to adopt
SaaS : http://www.executivebrief.com/blogs/the-pros-andcons-of-saas-part-2/
Reasons to Adopt SaaS
• 1. Cost Effective
– available on a subscription basis rather than a large upfront
expense
• 2. Easy to Deploy and Get Started
– just require an Internet connection and easily access the
application through a browser.
• 3. Minimal IT support
– SaaS provider supplies IT support
• 4. Upgrades:
– always have the latest technology
• 5. Collaboration
– SaaS also facilitates more effective collaboration between team
members, colleagues and customers
Top reasons why businesses are
reluctant to adopt SaaS
• Business continuity: SaaS vendors could
just shut their doors easily.
• Data security
• SaaS are typically fit-for-all, not much
customization
IT and New Business Model
• New products, services, and business
models:
– Business model: describes how company
produces, delivers, and sells product or
service to create wealth
– Information systems and technology a major
enabling tool for new products, services,
business models
• E.g. Netflix’s Internet-based DVD rentals
Download