CHAPTER THREE
Managing the Essential Technologies and Operations
1
Introduction
 An IT architecture is a blueprint.
 A blueprint shows how a system, house, vehicle, or product will
look and how the parts interrelate.
 An IT infrastructure is the implementation of an architecture.
 The IT infrastructure includes the processors, software,
databases, electronic links, and data center as well as the
standards that ensure the components work together, the skills
for managing the operation etc.
 Telecommunications is the flow of information among individuals,
work groups, departments, customer sites, regional offices,
between enterprises, and with the outside world.
2
3.2. Distributed systems: overall architecture
 Four Attributes of Distributed Systems
 Degree to which a system is distributed can be determined by
answering four questions:
 Where is the processing done?
 How are the processors and other devices interconnected?
 Where is the information stored?
 What rules or standards are used?
3
Where is the processing done?
 Distributed processing is the ability for more than one
interconnected processor to be operating at the same time,
typically for processing an application on more than one
computer at a time.
 Goal: move the appropriate processing as close to the user
as possible and to let other machines handle the work they
do best.
 Two forms of interoperability (capability for different
machines to work together on tasks):
 Communication between systems
 Two-way flow between user applications 4
How are the processors and other devices
interconnected?
 Connectivity among processors means that each
processor in a distributed system can send data and
messages to any other processor through electronic
communication links
 Desirable to have at least two independent paths
between two nodes to provide automatic alternate
routing (Planned Redundancy)
5
Where is the information stored?
Distributed databases either:
 Divide a database and distribute its portions throughout a
system without duplicating the data.
 Users do not need to know where a piece of data is located
to access it, because the system knows where all the data is
stored.
 Store the same data at several different locations, with one
site containing the master file
 Issue: synchronization of data is a significant problem.
6
What rules or standards are used?
 System wide rules mean that an operating discipline for
the distributed system has been developed and is
enforced at all times.
 These rules govern communication between nodes,
security, data accessibility, program and file transfers,
and common operating procedures.
7
Two Guiding Frameworks
1. An Organizational Framework
 A driving force behind distributed processing is to give
people more control over their work. This autonomy can
happen at any of seven levels:
8
9
 Business ecosystem or value chain (inter-enterprise)
 Enterprise
 Country or region
 Site (plants, warehouses, branch offices)
 Department or process
 Work group or team
 Individuals
10
 Locate processing power and DB at each level in the
organization
 Top level deals with organizations that work closely together
as buyer-seller, partner etc.
 Next three levels (Enterprise, Region and Site) are traditional
domain of IS, where computers resided in the past.
 Bottom three levels (Department, Team and Individual) are
where the bulk of employees.
 Intent: give autonomy and decision-making power to better
serve customers.
11
2. A Technical Framework
 Migration of computer power to end users will be driving
force for network-based information system. SUMURU -
single user, multiple user, remote utility.
1. Processors:
SU: single user, stand-alone and connected to LNs;
clients
MU: multiple user, serve local groups of users; server.
Also heavy duty computation for SUs, backups for MUs,
program libraries for SUs, and database management.
RU: remote utility, heavy-duty computing, corporate DB
management, corporation mainframes and value-added
network services
12
2. Networks:
LN: local networks, high-speed information transfer, LAN.
RN: remote networks, lower transfer speeds, WAN, MAN, Internet.
3. Services that this network architecture provides:
access
file transfer
e-mail
4. Standards needed in three areas:
OS
communication protocols: TCP/IP
DBMS: SQL
13
Components of SUMURU Distributed System
Architecture
14
3.3. Managing Telecommunications
 Telecommunications is the flow of information among individuals, work groups,
departments, customer sites, regional offices, between enterprises, and with the
outside world.
 The Internet has also opened up a “cyberspace” where people can be in a virtual
world, where organizations can conduct business, and in fact, a place where
organizational processes exist.
 This is providing the foundation for the e-business economy, as just about
everything about telecom is shifting.
15
 Telecommunications = electronically sending data in any form from one place to
another between
 People
 Machines, or
 Objects
 Generally, Information System departments have been responsible for
designing, building, and maintaining the information highway in the same way
that governments are responsible for building and maintaining streets, roads,
and freeways.
 Once built, the network, with its nodes and links, provides infrastructure for the
flow of information and messages.
 Telecom is the basis for the way people and companies work today.
 It provides the infrastructure for moving information and messages.
16
The Evolving Telecommunications Scene
 Even with the recent ‘downturn’ in some countries – the changes in Telecom
are coming fast and furiously. Here are some major changes taking place:
 A New Telecommunications Infrastructure is being built:
 The oldest part of the telecommunications infrastructure is the telephone
network.
 This global network was built on twisted-pair copper wires and was intended for
voice communications.
 It uses analog technology, which although appropriate for delivering high-quality
voice, is inefficient for data transmission.
 Dedicated circuit (switching).
 The basic traffic-handling mechanism had to change for data.
17
 Today, the new telecommunications infrastructure is being built
around the world aimed at transmitting data, and consists of:
 Wired - fiber optic links.
 Wireless – radio signals.
 Both use packet switching, where messages are divided into packets,
each with an address header, and each packet is sent separately.
 No circuit is created; each packet may take a different path through the
network.
 Packets from any number of senders and of any type, whether e-
mails, music downloads, voice conversations, or video clips, can be
intermixed on a network segment.
 Making these next generation networks able to handle much more traffic and a
great variety of traffic.
18
 This architecture allows new kinds of services to be
deployed much more rapidly.
 The Internet can handle all kinds of intelligent user
devices, including:
 Voice-over-IP (VoIP) phones
 Personal digital assistants (PDAs)
 Gaming consoles, and
 All manner of wireless devices
 The global telecom infrastructure is changing from a focus
on voice to a focus on data
19
3.4. Managing Information Resources
 Managing information resources initially meant managing data, first in
files, then in corporate databases. Next = expanded to include
“information” (data with meaning).
 Information in the form of documents (electronic or paper) and Web
content has exploded the size of databases organizations now manage.
 Knowledge management is becoming a key to exploiting “intellectual
assets”.
 Information resources need to be well managed as information
becomes an important strategic resource.
20
Managing Data
 Database management systems are the main tool for managing
computerized corporate data. They have been around since the
1960s and are based on two major principles:
 A three- level conceptual model and
 Several alternative ‘data models’ for organizing the data
21
The Three-Level Database Model
 Level 1 - The external, conceptual, or local level,
containing the various “user views” of the corporate
data that each application program uses.
 Level 2 - The logical or “enterprise data” level:
‘Technical’ (human) view of the database = under
control of the DBAs
 Level 3 - The physical or storage level, specifying the way
the data is physically stored. End user not concerned
with all these ‘pointers and flags’ (how the data is
physically organized).
22
Managing Data: Four Data Models
 The second major concept in database management is alternate ways
to define relationships among data.
 Hierarchical model: structures data so that each element is
subordinate to another in a strict hierarchical manner Parent, child
etc.
 Network model: allows each data item to have more than one parent,
relationships stated by pointers stored with the data
 Relational model: where the data is stored in tables. Eight relational
operations can be performed on this data. Select, Project, Join,
Product, Intersection, Difference, Union, Division e.g. Microsoft Access
 Object model: can be used to store any type of data
23
Managing Information
 Once enterprises get their data into shape, that data can
more easily be turned into information.
 “Information is power.” “We are in the Information Age.”
 These and similar statements would lead you to believe
that managing information is a key corporate activity.
Technology = infrastructure; asset = information that
runs on that infrastructure.
24
Four Types of Information
 Internal record-based information, such as those found
in databases
 Internal document-based information, such as reports,
opinions, e-mails and proposals. Pertains to concepts:
ideas, thoughts, etc.
 External/record-based information, such as acquisition
from external databases.
 External/document-based: WWW
25
Managing Information: Data Warehouses
 Data warehouse: Houses data used to make decisions. This data is
obtained periodically from transaction databases.
 The warehouse provides a snapshot of a situation at a specific
time.
 Data warehouses differ from operational databases in that they
do not house data used to process daily transactions.
 The most common data warehoused are customer data, used to
discover how to more effectively market to current customers as
well as non-customers with the same characteristics.
26
Key Concepts of Data Warehouse
 Metadata: is the part of the warehouse that defines the data.
Metadata means “data about data.” it explains the meaning of each
data element, how each element relates to each other, etc.
 Quality data: is the cleaning process to adhere to metadata
standards.
 Data marts: is a subset of data pulled off the warehouse for a
specific group of users.
27
Managing Information: Document Management
 Even in today’s Internet-rich world, paper still plays a major role in
most enterprises.
 There is also a need to move seamlessly between digital and printed
versions of documents; hence, the importance of document
management.
 The field of electronic document management (EDM) uses new
technologies to manage information resources that do not fit easily
into traditional databases.
 EDM addresses organizing and managing conceptual, descriptive, and
ambiguous multimedia content.
28
 It is hard to think of anything more pervasive and fundamental to an
organization than documents.
 The impact of applying emerging technologies to document management is
potentially significant.
 Numerous EDM applications generate value. The ‘Big 3’ are:
 To improve the publishing process
 To support organizational processes
 To support communications among people and groups
29
Managing Information: Content Management
 A major reason content has become important to CIOs (chief
Information Officers) is because it is a core management discipline
underlying online business.
 Without production-level Web content, management processes, and
technologies, large-scale e-business is not possible.
 Use of XML moves Web content from being in a human-only readable
format to being in a computer-readable format.
 Thus, the content can be passed to back-end transaction processing
systems and cause an action to take place.
30
 To create a content management strategy, companies need to
understand the three phases of the content management life cycle:
 Managing Content Creation and Acquisition
 Content Administration and Safeguarding
 Content Deployment and Presentation
31
3.5. Managing operations
 Due to mergers, the Internet, e-commerce, and the terrorist
attacks, the subject of computer operations has been receiving a
lot of attention.
 Systems operations are important because, if they are not
professionally run a company could suffer a computer or network
crash that could shut down their business for some period of
time.
32
Solving Operational Problems
 Operational problems are obvious to the entire company:
response times are slow, networks are down, data isn’t available
and data is wrong.
 Three strategies to improve operations:
 Buy more equipment
 Continuously fight fires and rearrange priorities, getting people to
solve the problems at hand.
 Continually document and measure what you are doing, to find out
the real problems, not just the apparent ones. Then set standards
and manage to them = the preferred solution.
33
Operational Measures
 External: What the customer sees: system uptime,
response time, turnaround time, program failures and
customer satisfaction.
 Internal: Of interest to systems people: computer usage
as % of capacity, disk storage used, job queue length etc.
 Problems reported by external measures can be
explained by deviations in internal measures.
34
Information Security
 Need to understand Internet-based threats and
countermeasures and continuously fund security work to
protect their businesses.
 Since 1996 the Computer Security Institute have
conducted an annual survey of US security managers.
Spring 2004 survey report – 2 key findings:
 The unauthorized use of computers is declining
 The most expensive cybercrime was denial of service
35
Information Security: The Threats
 Threats are numerous
 Websites are particularly vulnerable
 Political activism is one motivation for Website defacement
 Theft of proprietary information is a major concern
 Financial fraud is still a significant threat
36
Information Security: Security’s Five
Pillars
 Authentication: verifying the authenticity of users
 Identification: identifying users to grant them appropriate access
 Privacy: protecting information from being seen
 Integrity: keeping information in its original form
 Nonrepudiation: preventing parties from denying actions they
have taken
37
Information Security: Management
Countermeasures
 The major problem these days: enterprises cannot have both access to
information and airtight security at the same time. Companies must
make tradeoffs between: absolute information security and the
efficient flow of information. Five major findings from the Computer
Crime Survey:
 Most organizations evaluate the return on their security expenditures
 Over 80% conduct security audits
 The percentage reporting cybercrimes to law enforcement declined
 Most do not outsource cybersecurity
 Most respondents view security awareness training as important
38
Information Security: Technical Countermeasures
 The trend in computer security is toward defining security policies and
then centrally managing and enforcing those policies via security
products and services or policy-based management.
 E.g. a user authenticates to a network once, and then a “rights based system”
gives that user access only to the systems to which the user has been given
rights.
 Three techniques used by companies to protect themselves
1. Firewalls: Control access between networks. Used to separate
intranets and extranets from the Internet so that only employees and
authorized business partners can access implementation:
 Packet filtering to block “illegal” traffic, which is defined by the security policy…
or
 By using a proxy server, which acts as an intermediary
39
2. Encryption: to protect against sniffing, messages can be
encrypted before being sent e.g. over the Internet. Two
classes of encryption methods are used today:
 Secret Key encryption
 Public Key encryption
40
3. Virtual Private Networks (VPN): maintains data security
as it is transmitted by using:
Tunneling: creates a temporary connection between a
remote computer and the Internet Service Provider’s local
data center. Blocks access to anyone trying to intercept
messages sent over that link.
Encryption: scrambles the message before it is sent and
decodes it at the receiving end
41
 Three ways to use VPNs:
 Remote Access VPNs: give remote employees a way to access an
enterprise intranet by dialing a specific ISP
 Remote Office VPNs: give enterprises a way to create a secure
private network with remote offices. The ISP’s VPN equipment
encrypts all transactions
 Extranet VPNs: give enterprises a way to conduct e-business with
trading partners
42
THE END
43

More Related Content

PPTX
DistributedSystemModels - cloud computing and distributed system models
DOCX
Seminar report-networking
PPTX
10 New Web Application and Security.pptx
PDF
fundamentals & link layers jntuk material
DOCX
introduction of network
DOCX
DISTRIBUTED SYSTEM.docx
PPT
Grid and cluster_computing_chapter1
PPTX
Computer Communications
DistributedSystemModels - cloud computing and distributed system models
Seminar report-networking
10 New Web Application and Security.pptx
fundamentals & link layers jntuk material
introduction of network
DISTRIBUTED SYSTEM.docx
Grid and cluster_computing_chapter1
Computer Communications

Similar to CHAPTER THREE.pptx (20)

PDF
networking pdf gh fh dfgh ghs sh sfgh sddfhh
PDF
Lesson 1 introduction
PPT
1.intro. to distributed system
PPTX
Unit I Networking.pptx
PDF
Computer networks
PPTX
Introduction to computer network
PDF
Basic concept of Computer networks
PDF
Internet.pdf
PDF
Computer network
PPTX
Introduction of grid computing
PPT
Grid computing
PDF
Cloud Computing UNIT-1 for computer science and engineering students
PDF
Data processing in Cyber-Physical Systems
PDF
Computer networks
PDF
Computer networking 1
PPT
How to make data more usable on the Internet of Things
PDF
Computer Networking Theory Assignment 1
PPTX
Distributed Systems Distributed Systems - MSc..pptx
PPTX
Distributed Systems Distributed Systems - MSc..pptx
networking pdf gh fh dfgh ghs sh sfgh sddfhh
Lesson 1 introduction
1.intro. to distributed system
Unit I Networking.pptx
Computer networks
Introduction to computer network
Basic concept of Computer networks
Internet.pdf
Computer network
Introduction of grid computing
Grid computing
Cloud Computing UNIT-1 for computer science and engineering students
Data processing in Cyber-Physical Systems
Computer networks
Computer networking 1
How to make data more usable on the Internet of Things
Computer Networking Theory Assignment 1
Distributed Systems Distributed Systems - MSc..pptx
Distributed Systems Distributed Systems - MSc..pptx
Ad

Recently uploaded (20)

PDF
Consumable AI The What, Why & How for Small Teams.pdf
PDF
Enhancing plagiarism detection using data pre-processing and machine learning...
PDF
UiPath Agentic Automation session 1: RPA to Agents
PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
PDF
A proposed approach for plagiarism detection in Myanmar Unicode text
PDF
CloudStack 4.21: First Look Webinar slides
PPTX
Chapter 5: Probability Theory and Statistics
PPT
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
PPTX
2018-HIPAA-Renewal-Training for executives
PDF
How IoT Sensor Integration in 2025 is Transforming Industries Worldwide
PPTX
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
The influence of sentiment analysis in enhancing early warning system model f...
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PPTX
The various Industrial Revolutions .pptx
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
Improvisation in detection of pomegranate leaf disease using transfer learni...
DOCX
search engine optimization ppt fir known well about this
Consumable AI The What, Why & How for Small Teams.pdf
Enhancing plagiarism detection using data pre-processing and machine learning...
UiPath Agentic Automation session 1: RPA to Agents
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
A proposed approach for plagiarism detection in Myanmar Unicode text
CloudStack 4.21: First Look Webinar slides
Chapter 5: Probability Theory and Statistics
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
2018-HIPAA-Renewal-Training for executives
How IoT Sensor Integration in 2025 is Transforming Industries Worldwide
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
Getting started with AI Agents and Multi-Agent Systems
The influence of sentiment analysis in enhancing early warning system model f...
Developing a website for English-speaking practice to English as a foreign la...
A contest of sentiment analysis: k-nearest neighbor versus neural network
Convolutional neural network based encoder-decoder for efficient real-time ob...
The various Industrial Revolutions .pptx
Zenith AI: Advanced Artificial Intelligence
Improvisation in detection of pomegranate leaf disease using transfer learni...
search engine optimization ppt fir known well about this
Ad

CHAPTER THREE.pptx

  • 1. CHAPTER THREE Managing the Essential Technologies and Operations 1
  • 2. Introduction  An IT architecture is a blueprint.  A blueprint shows how a system, house, vehicle, or product will look and how the parts interrelate.  An IT infrastructure is the implementation of an architecture.  The IT infrastructure includes the processors, software, databases, electronic links, and data center as well as the standards that ensure the components work together, the skills for managing the operation etc.  Telecommunications is the flow of information among individuals, work groups, departments, customer sites, regional offices, between enterprises, and with the outside world. 2
  • 3. 3.2. Distributed systems: overall architecture  Four Attributes of Distributed Systems  Degree to which a system is distributed can be determined by answering four questions:  Where is the processing done?  How are the processors and other devices interconnected?  Where is the information stored?  What rules or standards are used? 3
  • 4. Where is the processing done?  Distributed processing is the ability for more than one interconnected processor to be operating at the same time, typically for processing an application on more than one computer at a time.  Goal: move the appropriate processing as close to the user as possible and to let other machines handle the work they do best.  Two forms of interoperability (capability for different machines to work together on tasks):  Communication between systems  Two-way flow between user applications 4
  • 5. How are the processors and other devices interconnected?  Connectivity among processors means that each processor in a distributed system can send data and messages to any other processor through electronic communication links  Desirable to have at least two independent paths between two nodes to provide automatic alternate routing (Planned Redundancy) 5
  • 6. Where is the information stored? Distributed databases either:  Divide a database and distribute its portions throughout a system without duplicating the data.  Users do not need to know where a piece of data is located to access it, because the system knows where all the data is stored.  Store the same data at several different locations, with one site containing the master file  Issue: synchronization of data is a significant problem. 6
  • 7. What rules or standards are used?  System wide rules mean that an operating discipline for the distributed system has been developed and is enforced at all times.  These rules govern communication between nodes, security, data accessibility, program and file transfers, and common operating procedures. 7
  • 8. Two Guiding Frameworks 1. An Organizational Framework  A driving force behind distributed processing is to give people more control over their work. This autonomy can happen at any of seven levels: 8
  • 9. 9
  • 10.  Business ecosystem or value chain (inter-enterprise)  Enterprise  Country or region  Site (plants, warehouses, branch offices)  Department or process  Work group or team  Individuals 10
  • 11.  Locate processing power and DB at each level in the organization  Top level deals with organizations that work closely together as buyer-seller, partner etc.  Next three levels (Enterprise, Region and Site) are traditional domain of IS, where computers resided in the past.  Bottom three levels (Department, Team and Individual) are where the bulk of employees.  Intent: give autonomy and decision-making power to better serve customers. 11
  • 12. 2. A Technical Framework  Migration of computer power to end users will be driving force for network-based information system. SUMURU - single user, multiple user, remote utility. 1. Processors: SU: single user, stand-alone and connected to LNs; clients MU: multiple user, serve local groups of users; server. Also heavy duty computation for SUs, backups for MUs, program libraries for SUs, and database management. RU: remote utility, heavy-duty computing, corporate DB management, corporation mainframes and value-added network services 12
  • 13. 2. Networks: LN: local networks, high-speed information transfer, LAN. RN: remote networks, lower transfer speeds, WAN, MAN, Internet. 3. Services that this network architecture provides: access file transfer e-mail 4. Standards needed in three areas: OS communication protocols: TCP/IP DBMS: SQL 13
  • 14. Components of SUMURU Distributed System Architecture 14
  • 15. 3.3. Managing Telecommunications  Telecommunications is the flow of information among individuals, work groups, departments, customer sites, regional offices, between enterprises, and with the outside world.  The Internet has also opened up a “cyberspace” where people can be in a virtual world, where organizations can conduct business, and in fact, a place where organizational processes exist.  This is providing the foundation for the e-business economy, as just about everything about telecom is shifting. 15
  • 16.  Telecommunications = electronically sending data in any form from one place to another between  People  Machines, or  Objects  Generally, Information System departments have been responsible for designing, building, and maintaining the information highway in the same way that governments are responsible for building and maintaining streets, roads, and freeways.  Once built, the network, with its nodes and links, provides infrastructure for the flow of information and messages.  Telecom is the basis for the way people and companies work today.  It provides the infrastructure for moving information and messages. 16
  • 17. The Evolving Telecommunications Scene  Even with the recent ‘downturn’ in some countries – the changes in Telecom are coming fast and furiously. Here are some major changes taking place:  A New Telecommunications Infrastructure is being built:  The oldest part of the telecommunications infrastructure is the telephone network.  This global network was built on twisted-pair copper wires and was intended for voice communications.  It uses analog technology, which although appropriate for delivering high-quality voice, is inefficient for data transmission.  Dedicated circuit (switching).  The basic traffic-handling mechanism had to change for data. 17
  • 18.  Today, the new telecommunications infrastructure is being built around the world aimed at transmitting data, and consists of:  Wired - fiber optic links.  Wireless – radio signals.  Both use packet switching, where messages are divided into packets, each with an address header, and each packet is sent separately.  No circuit is created; each packet may take a different path through the network.  Packets from any number of senders and of any type, whether e- mails, music downloads, voice conversations, or video clips, can be intermixed on a network segment.  Making these next generation networks able to handle much more traffic and a great variety of traffic. 18
  • 19.  This architecture allows new kinds of services to be deployed much more rapidly.  The Internet can handle all kinds of intelligent user devices, including:  Voice-over-IP (VoIP) phones  Personal digital assistants (PDAs)  Gaming consoles, and  All manner of wireless devices  The global telecom infrastructure is changing from a focus on voice to a focus on data 19
  • 20. 3.4. Managing Information Resources  Managing information resources initially meant managing data, first in files, then in corporate databases. Next = expanded to include “information” (data with meaning).  Information in the form of documents (electronic or paper) and Web content has exploded the size of databases organizations now manage.  Knowledge management is becoming a key to exploiting “intellectual assets”.  Information resources need to be well managed as information becomes an important strategic resource. 20
  • 21. Managing Data  Database management systems are the main tool for managing computerized corporate data. They have been around since the 1960s and are based on two major principles:  A three- level conceptual model and  Several alternative ‘data models’ for organizing the data 21
  • 22. The Three-Level Database Model  Level 1 - The external, conceptual, or local level, containing the various “user views” of the corporate data that each application program uses.  Level 2 - The logical or “enterprise data” level: ‘Technical’ (human) view of the database = under control of the DBAs  Level 3 - The physical or storage level, specifying the way the data is physically stored. End user not concerned with all these ‘pointers and flags’ (how the data is physically organized). 22
  • 23. Managing Data: Four Data Models  The second major concept in database management is alternate ways to define relationships among data.  Hierarchical model: structures data so that each element is subordinate to another in a strict hierarchical manner Parent, child etc.  Network model: allows each data item to have more than one parent, relationships stated by pointers stored with the data  Relational model: where the data is stored in tables. Eight relational operations can be performed on this data. Select, Project, Join, Product, Intersection, Difference, Union, Division e.g. Microsoft Access  Object model: can be used to store any type of data 23
  • 24. Managing Information  Once enterprises get their data into shape, that data can more easily be turned into information.  “Information is power.” “We are in the Information Age.”  These and similar statements would lead you to believe that managing information is a key corporate activity. Technology = infrastructure; asset = information that runs on that infrastructure. 24
  • 25. Four Types of Information  Internal record-based information, such as those found in databases  Internal document-based information, such as reports, opinions, e-mails and proposals. Pertains to concepts: ideas, thoughts, etc.  External/record-based information, such as acquisition from external databases.  External/document-based: WWW 25
  • 26. Managing Information: Data Warehouses  Data warehouse: Houses data used to make decisions. This data is obtained periodically from transaction databases.  The warehouse provides a snapshot of a situation at a specific time.  Data warehouses differ from operational databases in that they do not house data used to process daily transactions.  The most common data warehoused are customer data, used to discover how to more effectively market to current customers as well as non-customers with the same characteristics. 26
  • 27. Key Concepts of Data Warehouse  Metadata: is the part of the warehouse that defines the data. Metadata means “data about data.” it explains the meaning of each data element, how each element relates to each other, etc.  Quality data: is the cleaning process to adhere to metadata standards.  Data marts: is a subset of data pulled off the warehouse for a specific group of users. 27
  • 28. Managing Information: Document Management  Even in today’s Internet-rich world, paper still plays a major role in most enterprises.  There is also a need to move seamlessly between digital and printed versions of documents; hence, the importance of document management.  The field of electronic document management (EDM) uses new technologies to manage information resources that do not fit easily into traditional databases.  EDM addresses organizing and managing conceptual, descriptive, and ambiguous multimedia content. 28
  • 29.  It is hard to think of anything more pervasive and fundamental to an organization than documents.  The impact of applying emerging technologies to document management is potentially significant.  Numerous EDM applications generate value. The ‘Big 3’ are:  To improve the publishing process  To support organizational processes  To support communications among people and groups 29
  • 30. Managing Information: Content Management  A major reason content has become important to CIOs (chief Information Officers) is because it is a core management discipline underlying online business.  Without production-level Web content, management processes, and technologies, large-scale e-business is not possible.  Use of XML moves Web content from being in a human-only readable format to being in a computer-readable format.  Thus, the content can be passed to back-end transaction processing systems and cause an action to take place. 30
  • 31.  To create a content management strategy, companies need to understand the three phases of the content management life cycle:  Managing Content Creation and Acquisition  Content Administration and Safeguarding  Content Deployment and Presentation 31
  • 32. 3.5. Managing operations  Due to mergers, the Internet, e-commerce, and the terrorist attacks, the subject of computer operations has been receiving a lot of attention.  Systems operations are important because, if they are not professionally run a company could suffer a computer or network crash that could shut down their business for some period of time. 32
  • 33. Solving Operational Problems  Operational problems are obvious to the entire company: response times are slow, networks are down, data isn’t available and data is wrong.  Three strategies to improve operations:  Buy more equipment  Continuously fight fires and rearrange priorities, getting people to solve the problems at hand.  Continually document and measure what you are doing, to find out the real problems, not just the apparent ones. Then set standards and manage to them = the preferred solution. 33
  • 34. Operational Measures  External: What the customer sees: system uptime, response time, turnaround time, program failures and customer satisfaction.  Internal: Of interest to systems people: computer usage as % of capacity, disk storage used, job queue length etc.  Problems reported by external measures can be explained by deviations in internal measures. 34
  • 35. Information Security  Need to understand Internet-based threats and countermeasures and continuously fund security work to protect their businesses.  Since 1996 the Computer Security Institute have conducted an annual survey of US security managers. Spring 2004 survey report – 2 key findings:  The unauthorized use of computers is declining  The most expensive cybercrime was denial of service 35
  • 36. Information Security: The Threats  Threats are numerous  Websites are particularly vulnerable  Political activism is one motivation for Website defacement  Theft of proprietary information is a major concern  Financial fraud is still a significant threat 36
  • 37. Information Security: Security’s Five Pillars  Authentication: verifying the authenticity of users  Identification: identifying users to grant them appropriate access  Privacy: protecting information from being seen  Integrity: keeping information in its original form  Nonrepudiation: preventing parties from denying actions they have taken 37
  • 38. Information Security: Management Countermeasures  The major problem these days: enterprises cannot have both access to information and airtight security at the same time. Companies must make tradeoffs between: absolute information security and the efficient flow of information. Five major findings from the Computer Crime Survey:  Most organizations evaluate the return on their security expenditures  Over 80% conduct security audits  The percentage reporting cybercrimes to law enforcement declined  Most do not outsource cybersecurity  Most respondents view security awareness training as important 38
  • 39. Information Security: Technical Countermeasures  The trend in computer security is toward defining security policies and then centrally managing and enforcing those policies via security products and services or policy-based management.  E.g. a user authenticates to a network once, and then a “rights based system” gives that user access only to the systems to which the user has been given rights.  Three techniques used by companies to protect themselves 1. Firewalls: Control access between networks. Used to separate intranets and extranets from the Internet so that only employees and authorized business partners can access implementation:  Packet filtering to block “illegal” traffic, which is defined by the security policy… or  By using a proxy server, which acts as an intermediary 39
  • 40. 2. Encryption: to protect against sniffing, messages can be encrypted before being sent e.g. over the Internet. Two classes of encryption methods are used today:  Secret Key encryption  Public Key encryption 40
  • 41. 3. Virtual Private Networks (VPN): maintains data security as it is transmitted by using: Tunneling: creates a temporary connection between a remote computer and the Internet Service Provider’s local data center. Blocks access to anyone trying to intercept messages sent over that link. Encryption: scrambles the message before it is sent and decodes it at the receiving end 41
  • 42.  Three ways to use VPNs:  Remote Access VPNs: give remote employees a way to access an enterprise intranet by dialing a specific ISP  Remote Office VPNs: give enterprises a way to create a secure private network with remote offices. The ISP’s VPN equipment encrypts all transactions  Extranet VPNs: give enterprises a way to conduct e-business with trading partners 42