ISD
Summary of Readings
5 Commandments
1. Moore's law
Moore's law: No. of transistor chips x2 annually- 1965- no tech barriers to tech advancements, trend will continue- basis: cost per elec. component inversely proportional to no. of elec. component in simple circuits- implies econ limit to tech longevity- yield rate (ie. monetary returns to semiconductor producers from chips produced) will eventually reach a point of econ constraint- econ end but not tech end- no exponential trend lasts forever? arguable, i.e. postponement- semiconductors at least 15 years from now. might move on to nanotech- legal status: does law describe reality or create it?- hence, econ basis means law comes down to Rock's law of fabrication costs of semiconductors
Aurelio says
NEW hardware performance --> NEW faster applications and features --> for OLD activities, need to innovate,HENCE,Moore’s law exists because new transistors are required those who require /or produce faster transistors, by all industries.
2. Rock's law
Rock's Law: Cost of semiconductors x2 every 4 years- mid 1990s- actual: 1980s - fabs increased yield, 1990s - increasing throughput (rate of production) 2000s - increasing throughput- cost not impt, more impt is value of product- essentially rate of production has increased with economies of scale- resulting in changes in prices of PCs -> Machrone's law
3. Machrone's law
Machrone's law: the pc u wanna buy will always be $5k- 1984- statistics show approximate fixed price ranges per time period of approximately a decade- total pc sales revenue continue to increase despite falling unit costs due to factors such as usage for online services
4. Metcalfe's law
Metcalfe's law: network value grows proportionately to no. of users squared- 1993- eg. telephone value increases per user- not all "users" add value, some contaminate, eg. cold calling, spam emails- 4 probs of networks: saturation, cacophony, clustering & searchi) saturation: valuable information saturatedii) cacophony: too complex interplay btwn members eg. forumsiii) clustering: users only in parts of network, end up communication with each otheriv) search: riches of network remain inaccessible in practice- solutions to probs: recruit new members with valuable assets, combat clustering thru deliberate subdivision of units, filter to combat saturation- not as practically true as Metcalfe's law
5. Wirth's law
Wirth's law: Software is slowing faster than hardware is accelerating- 1995- accusation on microsoft: as speed of calculation increases, amount of calculation needed per function increases, resulting in less gains for user- "feature bloat": inflated software features unusable if not for hardware advances- tolerated bcoz i) embarassment of computer riches ii) consumers' inability to discern useful and uselessness despite influence on software design- root cause argued as caused by software companies- programmes don't require massive manuals, but if they do, keep clients in the long haul- competitive pressure prevents meticulous pruning of software design
8 Biz Tech Trends
Article precinct:Economic value is created when technology is combined with new ways of doing business.
A) Managing relationships
1. Distributing cocreation- outsourcing various functions to business networks- decentralized innovation good for software and editorial content- advantages: lower production costs- disadvantages: lost of creative control and intellectual property2. Using consumers as innovators- eg. Wiki- eg. Threadless- advantages: better insight into customer needs and behavior- disadvantages: might be influenced by vocal minority, focused on long-term rather than immediate needs of customers3. Tapping into a world of talent- decentralize work to specialists, free agents, talent networks- made less costly by internet etc.- new talent-development models emerge- new pricing models- might be popularised in segmentable industries- competitive advantage to companies able to breakdown and recompose tasks4. Extracting more value from interactions- advantage: efficiency increases- disadvantages: creating right incentives for employees
B) Managing capital and assets
5. Expanding the frontiers of automation- automate processes- many processes stil unautomated- advantages: lower costs and improve time-span of customers obtaining what they want- disadvantages: challenge of finding right balance between raising profit margins and keeping customers happy6. Unbundling production from delivery- breaking down of processes into smaller segments with accurate measuring and metering use of each to result in effective allocation and capacity planning
C) Leveraging info in new ways
7. Putting more science into management- exploit info explosion with diverse set of management techniques8. Making businesses from information- info-based biz opportunities- advantage: reduce problem of info assymetry, inability to obtain data
Internet
Aurelio says
Internet is a communication channel for thingsHardware:Pallet + RFID tag + microsensor--Router--Pallet + RFID tag + microsensoreg. RFID tag on carrot (certain temp wanted consistently), sensor takes temperature of carrothence, sensor takes information in a smart way on the environment about a target itemeg. accelerator-monitor - used in car airbags, robotsThings that can take decisions completely independently from the presence of human beingsStrat <--> strat partnership <--> strat (Co-opetition)Companies <--> co-laboration/co-operation <--> companies/clientsCompetition - either you increase market share, or increase market size and keep market share. So now many companies, some areas compete, some areas co-operate.Enablers - enable processes, whether wanna do the process or not is another thing. necessary conditions but not sufficient conditionsMarketing guerrila - strategy. using platforms like blogs or facebook that can provide information about products like covering damage by adding information
Cloud Computing
Assignment:Try to describe what cloud computing is, and what it is for.
Cloud computing
Cloud - metaphor used to represent the internet in a cloud drawing, with its networks in the "cloud""collection of computers and servers that are publicly accessible via the Internet."Wiki def: "a computing capability that provides an abstraction between the computing resource and its underlying technical architecture (e.g., servers, storage, networks), enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction."Other def: "a large group of interconnected computers that typically extends beyond a single company or enterprise. The applications and data served by the cloud are available to a broad group of users using different operating system platforms; access is via the Internet."5 characteristics: on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service.
SaaS
1. SaaSThis type of cloud computing delivers a single application through the browser to thousands of customers using a multitenant architecture. On the customer side, it means no upfront investment in servers or software licensing; on the provider side, with just one app to maintain, costs are low compared to conventional hosting. Salesforce.com is by far the best-known example among enterprise applications, but SaaS is also common for HR apps and has even worked its way up the food chain to ERP, with players such as Workday. And who could have predicted the sudden rise of SaaS "desktop" applications, such as Google Apps and Zoho Office?
Utility computing
Utility computingThe idea is not new, but this form of cloud computing is getting new life from Amazon.com, Sun, IBM, and others who now offer storage and virtual servers that IT can access on demand. Early enterprise adopters mainly use utility computing for supplemental, non-mission-critical needs, but one day, they may replace parts of the datacenter. Other providers offer solutions that help IT create virtual datacenters from commodity servers, such as 3Tera's AppLogic and Cohesive Flexible Technologies' Elastic Server on Demand. Liquid Computing's LiquidQ offers similar capabilities, enabling IT to stitch together memory, I/O, storage, and computational capacity as a virtualized resource pool available over the network.
Web services in the cloud
Web services in the cloudClosely related to SaaS, Web service providers offer APIs that enable developers to exploit functionality over the Internet, rather than delivering full-blown applications. They range from providers offering discrete business services -- such as Strike Iron and Xignite -- to the full range of APIs offered by Google Maps, ADP payroll processing, the U.S. Postal Service, Bloomberg, and even conventional credit card processing services.
Platform as a service
Platform as a serviceAnother SaaS variation, this form of cloud computing delivers development environments as a service. You build your own applications that run on the provider's infrastructure and are delivered to your users via the Internet from the provider's servers. Like Legos, these services are constrained by the vendor's design and capabilities, so you don't get complete freedom, but you do get predictability and pre-integration. Prime examples include Salesforce.com's Force.com, Coghead and the new Google App Engine. For extremely lightweight development, cloud-based mashup platforms abound, such as Yahoo Pipes or Dapper.net.
MSP
MSP (managed service providers)One of the oldest forms of cloud computing, a managed service is basically an application exposed to IT rather than to end-users, such as a virus scanning service for e-mail or an application monitoring service (which Mercury, among others, provides). Managed security services delivered by SecureWorks, IBM, and Verizon fall into this category, as do such cloud-based anti-spam services as Postini, recently acquired by Google. Other offerings include desktop management services, such as those offered by CenterBeam or Everdream.
Service commerce platforms
Service commerce platformsA hybrid of SaaS and MSP, this cloud computing service offers a service hub that users interact with. They're most common in trading environments, such as expense management systems that allow users to order travel or secretarial services from a common platform that then coordinates the service delivery and pricing within the specifications set by the user. Think of it as an automated service bureau. Well-known examples include Rearden Commerce and Ariba.
Internet integration
Internet integrationThe integration of cloud-based services is in its early days. OpSource, which mainly concerns itself with serving SaaS providers, recently introduced the OpSource Services Bus, which employs in-the-cloud integration technology from a little startup called Boomi. SaaS provider Workday recently acquired another player in this space, CapeClear, an ESB (enterprise service bus) provider that was edging toward b-to-b integration. Way ahead of its time, Grand Central -- which wanted to be a universal "bus in the cloud" to connect SaaS providers and provide integrated solutions to customers -- flamed out in 2005.Today, with such cloud-based interconnection seldom in evidence, cloud computing might be more accurately described as "sky computing," with many isolated clouds of services which IT customers must plug into individually. On the other hand, as virtualization and SOA permeate the enterprise, the idea of loosely coupled services running on an agile, scalable infrastructure should eventually make every enterprise a node in the cloud. It's a long-running trend with a far-out horizon. But among big metatrends, cloud computing is the hardest one to argue with in the long term.
Uses
Cloud storage
One of the primary uses of cloud computing is for offsite data storage. With cloud storage, data is stored on multiple third-party servers, rather than on the dedicated servers used in traditional networked data storage.When storing data, the user sees a virtual server—that is, it appears as if the data is stored in a particular place with a specific name. But that place doesn't exist in reality; it's just a pseudonym used to reference virtual space carved out of the cloud. In reality, the user's data could be stored on any one or more of the computers used to create the cloud. The actual storage location may differ from day to day or even minute to minute, as the cloud dynamically manages available storage space. But even though the location is virtual, the user sees a "static" location for his data—and can actually manage his storage space as if it were connected to his own PC.Cloud storage has both financial and security advantages over traditional storage models. Financially, the cloud's virtual resources are typically cheaper than dedicated physical resources connected to a personal computer or network. As for security, data stored in the cloud is secure from accidental erasure or hardware crashes, because it is duplicated across multiple physical machines; because multiple copies of the data are kept continually, the cloud continues to function as normal even if one or more machines go offline. If one machine crashes, the data is duplicated on other machines in the cloud.That said, the ultimate reliability and security of cloud storage is yet to be determined. While companies offering cloud services tout their security features, there are many stages in the process where security could be breached, just as with a traditional network. And access to your data could be compromised if the cloud storage provider has a service outage or goes out of business—both of which have happened in recent months. It may be too early in the adoption process to recommend that a company store its data exclusively in the cloud, without some sort of traditional physical backup.
Applications
Cloud services can include anything from calendar and contact applications to word processing and presentations. Almost all large computing companies today, including both Google and Microsoft, are developing various types of cloud services.With a cloud service, the application itself is hosted in the cloud. An individual user runs the application over the Internet, typically within a web browser. The browser accesses the cloud service and an instance of the application is opened within the browser window. Once launched, the web-based application operates and behaves like a standard desktop application. The only difference is that the application and the working documents remain on the host's cloud servers.What types of applications are available via cloud computing? Perhaps the best and most popular examples of cloud computing applications today are the Google family of applications—Google Docs, Google Calendar, Gmail, and the like. All of these applications are hosted on Google's servers, are accessible to any user with an Internet connection, and can be used for group collaboration from anywhere in the world. None of these apps require software to be downloaded and installed on a user's computer.Cloud services offer many advantages to users. If the user's PC crashes, it doesn't affect either the host application or the open document; both remain unaffected in the cloud. In addition, an individual user can access his applications and documents from any location on any PC or portable device, via an Internet connection. He doesn't have to a copy of every app and file with him when he moves from office to home to remote location. Finally, because documents are hosted in the cloud, multiple users can collaborate on the same document in real time, using any available Internet connection. Documents are no longer machine-centric; instead, they're always available to any authorized user.On the downside, web-based applications are typically less robust than their traditional software counterparts. For example, Google Docs offers far fewer formatting features than does Microsoft Word, which can be inhibiting to more sophisticated users. In addition, cloud services can only be accessed when a user has a live Internet connection; they're not suited for instances where no Internet connection is available.
Other uses
Features
Cloud computing features:- servers available over the internet- no physical infrastructure (no capex on hardware and software)- works as a service, pay per use, consumption billed per utility- servers not left idle- multi-tenancy allows sharing of resources, hence centralization of infrastructure (in places of lower cost), peak load capacity increased, and efficiency in utilization.- security of data might improve through centralization of data- easier to maintain
IS v IT
Aurelio says (about IS)
IS:Managing info (CxO)- store- process/analyze- exchangeWhen you talk about IS, definitions depend on background and type of work person is doing at the moment. So, there might be different defns when talking with someone else about IS in business.Square = specialized pplCircle = holistic pplProblem is to link both sets of ppl.Hexagon = more sides more edges, the more u do it it becomes a circle (analogy)Many projects fail because of the lack of/difficulty of this link.Fidelity card - loyalty card. why? first is to increase customer loyalty. More importantly, to gain customer knowledge on items they buy, sequence of choosing things, This helps companies to organize, change layout of the market, marketing campaigns such as specific offers for customers of different tastes, budgeting.Systems: CRMS (customer relationship management system) BI (business intelligence systems)Buying IT resources - approach: info has to be treated like ppl. like ppl, selection process, trading process, outplacement process (HR management).Buy IT vs manage ISINFO is a RESOURCEINFO needs to be MANAGED (proc, store, xchange)IS is the SYSTEM that manages INFOWe assume info is always present, so it is always managed to some extent. Hence, IS that is good to some extent always exists. Change info to people. People always present, so to some extent they are managed, so exists a people system which is good to some extent. This assertion is questionable, you don't want good to some extent, you want perfect. This is obvious for a people system, but much less obvious for an IS.Feedback - controlling, understanding
Aurelio says (about IS flow)
Flow:activity -> decision -> info requirements (t)Information requirements are not stable. This is not obvious in many companies. Change continuously. Hence, it is a system not a store. Changes because output does not remain the same.Info is a resource because of the relation to this logic.IS delivers info that satisfies info requirements internal and external of the company.USER of INFO vs END-USEReg.truck arrives- amount of material- type of material- time- cost
Assignment
choose a company not belonging to the IT industry and create a reasonable example of how its its information system works:1. idenitify an organizational role and describe it in terms of: - the activity it performs- the decision it is expected to take- the related information requirements2. identify an event (internal or external to the organization) that may bring raw information that can contribute to create an information item meeeting one or more of the information requirements identified in 1.and describe this event in terms of raw information3. briefly describe how this raw information should be transformed into useful information to meet the information requirements
Subtopic
1. Any medium-large accounting firm, eg Moore-Stephensa) Organizational role: Head of TaxationActivity: To approve all tax returns, manage tax department, evaluate employees performance, participate in budgeting process of companyDecisions: as described above.Information required: information on tax returns from employees, information on clientele expenses profit and financial situation, information from tax law of country, information on company's performance and budgetingb) Economic crisis in asiaHead of Tax must now re-evaluate all clients' financial situation to see profitability of clients, which will in turn affect profitability of moore-stephens. All clients' engagements must be reviewed by obtaining information on their financial statements, review of past performances to see continued profitability, and consequences of potential disengagements. c) These raw information will in turn be processed by the Head of Tax and/or with help by lower-level employees by analysing important financial ratios, making forecasts of future cash flows of client companies, and a final decision to be made on retaining/disengaging client. Processed information will then be reverted up to higher level management for final decision approval.
Wireless / Mobile
Company Structure
ORGANIZATIONMissionStrategyProcesses (eg. marketing, production)Information flowITSoftware applicationsHardware devices
Aurelio says
Communication between different areas of organizational structureBetween:i) Strat/Processes - Collaborationii) Information - Communicationiii) Software applications - Data transferiv) Hardware - Signal Transmission
Wireless Cocktail
WAN - wide area network (eg 3G)MAN - metropolitan area network (eg WIFI)LAN - local area network (eg router)PAN - personal area network (eg bluetooth)- this is just a question of range, and unprecise. Wireless cocktail- different technologies may increase in range and shift within the model
Mobile IT innovations
TO BE RESEARCHED
Apple
Nokia
Windows
Mobile Applications
Internet
Organizational structure
ProcessTo support supply chain management and mobile commerce.
How it works
GPS Navigation
Organizational structure
How it works
GPS has become a widely used aid to navigation worldwide, and a useful tool for map-making, land surveying, commerce, scientific uses, tracking and surveillance, and hobbies such as geocaching and waymarking. Also, the precise time reference is used in many applications including the scientific study of earthquakes and as a time synchronization source for cellular network protocols.
Shazan
Aurelio says
Mobile application for identifying music.Shazan -- Wireless - programme, process, requiring internetSoftwareHardware -- Internet -- Server- connects to internet then to server- needs to transmit signals fast to the server. to transmit signals, alternatives are WIFI, bluetooth, interconneccting devices (router), 3G (UMTS)- eg. WIFI (LIUC LAN), 3G (VODAFONE, TIM)Quality of internet connection determines quality of activity.All levels must be good for the best experience. One screwed up area means the whole process will be bad.Factors to be considered - speed, range of connection, cost
NFC
Who/What is involved
Eg. RFID tag in handphone to buy coffee.Who/what is involved:1. Users2. Merchants - must have NFC readers3. Government infrastructure will have to be extended, considering that this is probably to be used in many govt institutions with regards to public services4. Public awareness activities5. Banks or telecommunication companies (depending on decided system of who is gonna charge and how) must have a system in place for NFC for debit charging of items through NFC6. Hardware production, selling
RFID
Applications in Singapore
Electronic Road Pricing
Organizational structure
ITHardware is required for ERP, such as the ERP gantries' scanners, and every RFID card reader to be installed in all Singapore-registered cars.Mission/StrategyGovernment mission is to reduce congestion during peak hours on roads leading to and from commercial areas within Singapore.The strategy of implementing the system would be to designate the Land Transport Authority with rights to decide areas for implemention, outsourcing to technological companies to construct the system.ProcessGovernment implements this system by outsourcing the technology to Phillips Corporation in installation of hardware.
How it works + uses
RFID tags are located within the ERP hardwares.
EZ-Link cards
Organizational structure
ITEZ-Link card readers are the main form of hardware, other than the cards themselves. Most merchants and many other institutions are required to have the card readers for scanning.Information FlowA whole truckload of information is being transmitted, especially with regards to EZ-Link person identification. Information on number of books borrowed, systems within institutions that require personal identification, amount of cash within the EZ-Link card when checked online, etc etc all mean information is flowing all the time to the main EZ-Link system, with huge databases.
How it works + uses
RFID tags are located within EZ-Link cards and readers.EZ-Link cards work as a smart card for payments made in Singapore on a wide range of areas. They have also been hybrid-ized with NETS to form NETS EZ-Link which allows a greater range of payment methods.These areas include:Payments for ERP, all forms of public transport, Mcdonalds, food in foodcourts, 7-11, etc etc.EZ-Link cards with personal identification may be used for identification purposes too.These areas include:Enlisting for national service, borrowing books from the library, taking attendance at schools, concessionary rates for public transport for students, online shopping etc.
System structure
RFiD tag - innovation but not the main innovationMain innovation is in the RFiD system!Rotate RFID - structure of the system slide 90deg, and u get:ProcessApplicationsDatabaseServerReaderRFID tagswhich is the standard systemic structure. the system actually refers to the organization structure rather than the IT structure.eg. should i buy iphones or netbooks or blackberries etc for employees? have to look at whole structure! look at strategy, process, applications to be used, etc.
Standards
How to define standards in IT1. Institution defines the standards (ISO, UFI etc)- eg. if u wanna build new sockets, you must follow the specs etc.- more top-down, wanna codify info into RFID, top will impose2. Standard De Facto (typical for IT)- eg. standards that derive from facts- everyone company pushes their own product for their own standard. One company will prevail- this is bottom-up, market decided the standardNB:- if something does not become the standard fast enough, the S-curve will change and go downwards instead.