Chapter Five in textbook PDF

Title Chapter Five in textbook
Course Information Syst & Application
Institution Binghamton University
Pages 4
File Size 104.4 KB
File Type PDF
Total Downloads 46
Total Views 148

Summary

this is the comprehensive notes; whats important from both class and lecture combined in preparation for the tests...


Description

Chapter Five MIS Infrastructure: plans for how a firm will build, deploy, use, and share its data, processes and MIS assets -

Hardware: consists of the physical devices associated w/ a computer system Software: the set of instructions the hardware executes to carry out specific tasks Client: a computer designed to request info from a server (ex. Your laptop) Server: a computer dedicated to providing information in response to requests o Example: client uses web browser to access website which is the server Enterprise Architect: person grounded in technology, fluent in business, and able to provide important bridge between MIS and the business; they manage and dynamically update MIS infrastructure

Three Primary Areas that Enterprise Architects focus on: 1. Information MIS infrastructure (Supports Operations and MIS): where and how important information is maintained and structured a. Backup: an exact copy of a system’s information b. Recovery: ability to get a system up and running in the event of a system crash or failure that includes restoring the information backup c. Fault tolerance: the ability for a system to respond to unexpected failures or system crashes as the backup system immediately and automatically takes over without loss of service i. Failover: occurs when a redundant storage server offers an exact replica of the real-time data. If primary server crashes, users are automatically directed to secondary or backup server. High speed, high cost method. ii. Failback: occurs when primary machine recovers and resumes operations, taking over from the secondary server d. Disaster Recovery Plan: detailed process for recovering information or a system in the event of a catastrophic disaster i. Hot Site: separate and fully equipped facility where company can move immediately after a disaster and resume business ii. Warm Site: separate facility with computer equipment that requires installation and configuration iii. Cold Site: Separate facility without any computer equipment but is a place where employees can move after a disaster iv. Disaster Recovery Cost Curve: charts (1) cost to the company of the unavailability of info and tech and (2) cost to company of recovering from a disaster over time v. Focuses on systems and data e. Business Continuity Plan (BCP): details how a company recovers and restores critical business operations and systems after a disaster or extended disruption i. Business impact analysis: identifies all critical business functions and the effect a specific disaster may have on them

ii. Technology recovery strategies: focuses specifically on prioritizing the order for restoring hardware, software, and data across the organization that best meets recovery requirements 1. Companies create mass amounts of data vital to survival and operations 2. Technology failure: occurs when the ability of a company to operate is impaired because of hardware, software, or data outage 2. Agile MIS Infrastructure (Supports Change): includes hardware, software, and telecommunications equipment to which provides foundation to support a company’s goals a. Accessibility: refers to varying levels that define what a user can access, view, or perform when operating a system i. Administrator access: unrestricted access to entire system b. Availability: time frames when system is operational i. “Five 9’s” or 99.999% availability desired/ is high availability c. Maintainability: how quickly a system can transform to support environmental changes d. Portability: ability of applications to operate on different devices or software platforms, such as different operating systems e. Reliability (accuracy): ensures a system is functioning correctly and providing accurate information i. Vulnerability: system weakness that can be exploited by a threat f. Scalability: describes how well a system can scale up or adapt to increased demand of growth i. Capacity: maximum throughput a system can deliver 1. Example: capacity of a hard drive represents its size or volume 2. Capacity Planning: determines future environmental infrastructure requirements to ensure high-quality system performance g. Usability: degree to which a system is easy to learn, efficient, and satisfying to use i. Serviceability: how quickly a third party can change a system to ensure it meets user needs and terms of any contracts, including agreed levels of reliability, maintainability, or availability h. Moore’s Law: computer chip performance per dollar doubles every 18 months i. Sustainable MIS (green MIS): describes the production, management, use, and disposal of technology in a way that minimizes damage to the environment, a critical part of corporate social responsibility i. Clean computing: a subset of sustainable MIS, refers to environmentally responsible use, manufacture, and disposal of technology products and computer equipment ii. Green Personal Computer (green PC); built using environment-friendly materials and designed to save energy

3. Sustainable MIS Infrastructure (Supports the environment): identifies ways a company can grow in terms of computing resources while simultaneously becoming less dependent on hardware and energy consumption a. Grid Computing: a collection of computers, often geographically dispersed, that are coordinated to solve a common problem i. Smart Grids: delivers electricity using two-way digital technology b. Virtualization: creates multiple virtual machines on one single computing device i. Storage Virtualization: combines multiple network storage devices so they appear to be a single storage device ii. Network Virtualization: combines networks by splitting available bandwidth into independent channels that can be assigned in real time to a specific device iii. Server Virtualization: combines physical resources, such as servers, processors, and operating systems from the applications (most common form of virtualization) c. System virtualization: the ability to present the resources of a single computer as if it is a collection of separate computers (“virtual machines”) each with its own virtual CPU’s, network interfaces, storage and operating system d. Data Center or Server Farm: facility used to house management information systems and associated components, such as telecommunications and storage systems e. Cloud Computing: stores, manages, and processes data and applications over the internet rather than on a personal computer or server i. Multi v. Single Tenancy ii. Noisy Neighbor: a multi-tenancy co-tenant that monopolizes bandwidth, servers, CPU’s and other resources that cause network iii. Cloud fabric: software that makes possible the benefits of cloud computing, such as multi-tenancy 1. Cloud fabric controller: an individual who monitors and provisions cloud resources, similar to a server admin at an individual company iv. Private, Public, Community, and Hybrid Clouds* 1. Cloud security alliance, cloud audit, cloud bursting f. Utility Computing: offers a pay-per-use revenue model similar to a metered service such as gas or electricity i. Infrastructure as a Service (Iaas), Disaster Recovery as a Service (DRaas), Software as a Service (Saas), Data as a Service (Daas), Security as a Service (Saas), Unified Communications as a Service (UCaas), Platform as a Service (Paas), Big Data as a Service (BDaas) The Three Primary Side Effects of Business’ Expanded Use of Technology: -

Increased Electronic Waste (E-waste): discarded, obsolete, or broken electronic devices

-

o 1 human year is equivalent to 7 years of technology advancements o Upcycle: reuses or refurbishes e-waste and creates a new product o Sustainable MIS Disposal: refers to safe disposal of MIS assets at the end of lifecycle, ensuring e-waste doesn’t end up in landfills, causing environmental issues Increased Energy Consumption: amount of energy consumed by business processes and systems Increased Carbon Emissions: includes the carbon dioxide and carbon monoxide in the atmosphere produced by business processes and systems...


Similar Free PDFs