Minggu, 17 April 2016

Networks : Mobile Business Session 13

Computer networks are continuously operating all over the globe supporting our 24/7/365 always on and always connected lifestyles.
You are probably using several different networks right now without even realizing it.
You might be using a school’s network to communicate with teachers, a phone network to communicate with friends, and a cable network to watch TV or listen to the radio.
Networks enable telecommunications or the exchange of information (voice, text, data, audio, video).
The telecommunication industry has morphed from a government-regulated monopoly to a deregulated market where many suppliers ferociously compete.
Types of Networks
There are several different types of computer networks. Computer networks can be characterized by their size as well as their purpose.
The size of a network can be expressed by the geographic area they occupy and the number of computers that are part of the network. Networks can cover anything from a handful of devices within a single room to millions of devices spread across the entire globe.
Some of the different networks based on size are:
•             Personal area network, or PAN
•             Local area network, or LAN
•             Metropolitan area network, or MAN
•             Wide area network, or WAN
In terms of purpose, many networks can be considered general purpose, which means they are used for everything from sending files to a printer to accessing the Internet. Some types of networks, however, serve a very particular purpose. Some of the different networks based on their main purpose are:
•             Storage area network, or SAN
•             Enterprise private network, or EPN
•             Virtual private network, or VPN
•             A network service provider (NSP) is a business or organization that sells bandwidth or network access by providing direct Internet backbone access to the Internet and usually access to its network access points (NAPs)[citation needed]. For such a reason, network service providers are sometimes referred to as backbone providers or internet providers.
•             Network service providers may consist of telecommunicationscompanies, data carriers, wireless communications providers, Internet service providers, and cable television operators offering high-speed Internet access.
•             A few information technology companies are also emerging[when?] into the NSP market, notably IBM, EDS, CSC, Vanco and Atos Origin. This is due to the technological convergence of information and communications technology.
Network Access Technologies
Network access is a critical component of any organization’s network infrastructure. Administrators have to dynamically enable and control network access for employees, vendors, business partners, and entire branch offices that are in a variety of physical locations and that are using many different types of devices. Enabling network access, while maintaining security, is an enormous challenge for administrators. You can use the Microsoft Windows Server 2003 operating system to implement a comprehensive network access solution that can include the following variety of technologies:
•             Secure access to wireless local area networks (WLANs)
•             Secure remote access to intranets over the Internet
•             Services that provide centralized network connection authentication, authorization, and accounting
•             Tools and services that support the creation and distribution of components to manage secure client-side network access
Network Access Technologies Architecture
In Windows Server 2003, there are four network access technology components:
•             802.11 wireless
•             Virtual private networks (VPNs)
•             Internet Authentication Service (IAS)
•             Connection Manager
The following figure shows the components of a network access technology infrastructure. In this example, the Connection Manager service profile initiates remote access client connections to dial-up or VPN-based remote access servers. The remote access servers act as Remote Authentication Dial-In User Service (RADIUS) clients and send the access requests to an IAS server for authentication and authorization. Similarly, the 802.11 wireless client requests access from the wireless access point, which sends the access requests to an IAS server.
The IAS server receives and processes the access requests and queries a user account database to verify access client credentials.
Network Access Technologies Components
The following network access technologies provide a range of options for secure client access to an organization’s network.

802.11 Wireless
The WLAN protocol, 802.11, and associated technologies, such as the 802.1X protocol, are IEEE standards supported by Microsoft to provide secure wireless networking that allows you to extend your core network infrastructure to roaming wireless clients.

VPN
A VPN is the extension of a private network that encompasses secure links across shared or public networks, such as the Internet, so that remote clients can securely connect to an organization’s network resources.

IAS
IAS is the Microsoft implementation of the RADIUS standard defined by the Internet Engineering Task Force (IETF) in RFCs 2138 and 2139. IAS performs centralized authentication, authorization, auditing, and accounting of users who are connecting to a wireless or wired local area network (LAN), using a remote access connection to connect to a private intranet. A server running IAS can be configured to perform a RADIUS server role or a RADIUS proxy role.
What does Network Protocols mean?
Network protocols are formal standards and policies comprised of rules, procedures and formats that define communication between two or more devices over a network. Network protocols govern the end-to-end processes of timely, secure and managed data or network communication.

Network convergence refers to the provision of telephone, video and data communication services within a single network. In other words, one pipe is used to deliver all forms of communication services. The process of Network Convergence is primarily driven by development of technology and demand. One main goal of such integration is to deliver better services and lower prices to consumers. Users are able to access a wider range of services, choose among more service providers. On the other hand, convergence allows service providers to adopt new business models, offer innovative services, and enter new markets.
A LAN (local area network) is a group of computers and network devices connected together, usually within the same building. By definition, the connections must be high speed and relatively inexpensive (e.g., token ringor Ethernet). Most Indiana University Bloomington departments are on LANs.
A MAN (metropolitan area network) is a larger network that usually spans several buildings in the same city or town. The IUB network is an example of a MAN.
A WAN (wide area network), in comparison to a MAN, is not restricted to a geographical location, although it might be confined within the bounds of a state or country. A WAN connects several LANs, and may be limited to an enterprise (a corporation or an organization) or accessible to the public. The technology is high speed and relatively expensive. The Internet is an example of a worldwide public WAN.
The SABRE airline reservation system is a classic example of a strategic information system that depends upon communication provided through a network. 
SABRE Airline Solutions pioneered technological advances for the industry in areas such as revenue management, pricing, flight scheduling, cargo, flight operations and crew scheduling.
In addition, not only did SABRE help invent e-commerce (now referred to as ebusiness) for the travel industry, the company holds claim to progressive solutions that defined — and continue to revolutionize — the travel and transportation marketplace.
It is very important, for example, for managers to be able to retrieve overall corporate sales forecasts from corporate databases to use in developing spreadsheets (or any other program used for business analysis) to project future activity.
In order to satisfy customers, automobile dealers need to be able to locate particular vehicle models and colors with specific equipment installed.
Managers at various points in a supply chain need to have accurate, up-to-date data on inventory levels and locations.
Accountants at corporate headquarters need to be able to retrieve summary data on sales and expenses from each of the company's divisional computer centers.
The chief executive officer, using an executive information system, needs to be able to access up-to-the-minute data on business trends from the corporate network.
An organization has to be concerned about proper identification of users and authorization of network access, the control of access, and the protection of data integrity. Almost all networks require some kind of logon, including user name and password. Many people are casual with their passwords, making them easy to guess. A good password has both letters and numbers along with a few punctuation marks for added security. Most corporate security goes far beyond passwords such as using  a "firewall," a computer that sits between an internal network and the Internet. The firewall allows access to internal data from specified incoming sites but tries to detect unauthorized access attempts and prevent them from occurring.
Some companies, such as Best Buy, Circuit City, Office Depot, and Sears, already have their physical and online stores integrated. These companies have been the fast movers because they already had an area in their stores for merchandise pickup (usually for big, bulky items such as TVs and appliances), and because long before the web they had systems and processes in place that facilitated the transfer of a sale from one store to another.
To take on the challenge of business integration, an organization needs a secure and reliable network for mission-critical systems.


National ISPs
Another type of ISP is the national ISP. These include such companies as Earthlink and MindSpring who offer Internet access in a broad geographical area. Compared to local ISPs, these companies tend to offer higher-speed connections and greater long-term stability. Many national providers also offer a broad range of services, including long-distance telephone service, web site hosting, and secure electronic transactions. They are generally a good choice for small businesses that want employees to be able to access the Internet while traveling. They may also be convenient for businesses that operate in several locations and wish to use the ISP for all locations. The main disadvantages of the larger ISPs are that they rarely offer the level of personalized service available from smaller providers, and they may have so many customers that a small business's employees could have trouble gaining access during prime business hours.
Small ISPs
Small, independent ISPs operate in many local or regional markets. These companies vary widely in size, stability, and quality of service. On the plus side, their access lines may be less busy than national ISPs. In addition, many smaller providers specialize in offering services to small businesses. Some of these ISPs may visit a small business customer's work site, evaluate the company's Internet access needs, and present different service packages. They may even assign a personal account representative to handle the small business's growing electronic needs.
FINDING AN ISP
The first step in selecting an Internet Service Provider for your small business is to compile a list of potential vendors. According to Vince Emery in How to Grow Your Business on the Internet, looking in the local telephone directory is not the best place to start. ISPs are typically classified under a variety of confusing headings in the yellow pages. In addition, making a random selection based on a advertisement is no way to guarantee good service.
Instead, Emery recommends beginning your search for an ISP on the Internet. There are several sites that list ISPs by geographic region and also include pricing and contact information. The oldest and best-known of these sites is The List (www.thelist.com), a searchable site with information on 8,300 providers worldwide. Another possible source of information is an organization named "The Directory" (www.thedirectory.org), which lists 13,000 ISPs. Yahoo! and other search engines also yield a great deal of information about service providers. Those without access to the Internet can obtain a printed guide to ISPs from Light Reading (www.lightreading.com).
Small business owners might also benefit from calling business associates, professional organizations, chambers of commerce, and local computer users groups to obtain suggestions and references for potential ISPs. Another option is to hire a consultant to help you evaluate your business's Internet access needs, sort through the various options, deal with the telephone company and ISP candidates, and avoid unnecessary costs or services. In any case, Emery recommends obtaining at least three quotes, encompassing both price and services provided, before selecting an ISP for your small business.
CONSIDERATIONS IN CHOOSING AN ISP
In choosing among the various ISP options, the most important thing to consider is the needs of the business. How much work will be done online and how dependent will the business's communications be on e-mail and other online services? The answer to these questions will determine the range of bandwidth needed—a simple dial-up connection or a broad band connection capable of providing a number of people with high-speed connections simultaneously. By determining the bandwidth or speed requirements for the Internet connection one may help to limit the number of ISPs to consider.
The next step in choosing an ISP is eliminating those providers that 1) cost too much, 2) do not offer the services you need, or 3) cannot provide the right type of connection. One important factor for small businesses to consider is the availability of technical support. According to William Kilmer in Getting Your Business Wired, ISPs vary widely in the level of support they offer to customers. Online services make it easy to set up an Internet account, for example, but may not be able to provide the personal assistance a small business owner needs. It may be helpful to check the hours that customer support is offered by telephone, and also to inquire about the average time it takes the ISP to respond to requests for assistance.
A Web site for the company is something that many firms hope to establish while they get themselves connected to the Internet. Most ISPs are able to provide assistance to users in setting up a web site, and many ISPs provide space on their servers to host client Web sites. But Kilmer noted that small businesses may need to work with national providers or local providers that specialize in business services in order to establish a professional site with its own domain name. Otherwise, the business may be limited as to the size or usage of its site. Ideally, an ISP should be able to register a domain name, offer web designers to help create the site, and provide statistics on the number of people who access the site.
Another important factor to consider in choosing an ISP is the provider's tier rating. ISPs are rated according to their proximity to the backbone of the Internet, known as their point of presence (POP). Tier 1 providers—usually big companies like AT&T and Sprint—are linked directly to the Internet. Tier 2 providers lease their connections from Tier 1 companies, and so on down the line. The lower an ISP's tier rating, the further its connections lie from the Internet and the slower its access is likely to be. Kilmer recommends that small businesses work with ISPs rated Tier 3 or better.
Other technical considerations in choosing an ISP include the speed and redundancy of its connections. Ideally, an ISP should maintain several different connections to balance traffic and make sure that one is always available in case another fails. Finally, small business owners may wish to seek out an ISP that offers special packages for small businesses. For example, some providers offer several dial-up accounts or mailboxes for a reduced price. Others may offer special deals on registering a domain name and hosting a company web site.
Network Access Technologies
Bandwidth  - The maximum amount of data that can pass from one point to another in a unit of time. Bandwidth is defined as a range within a band of frequencies or wavelengths. For digital devices, the bandwidth is usually expressed in bits per second(bps) or bytes per second. For analog devices, the bandwidth is expressed in cycles per second, or Hertz (Hz).
The bandwidth is particularly important for I/O devices. For example, a fast disk drive can be hampered by a bus with a low bandwidth. This is the main reason that new buses, such as AGP, have been developed for the PC
·         Bit, also known as a Shannon, is the basic unit of information in computing and digital communications. A bit can have only one of two values, and may therefore be physically implemented with a two-state device. These values are most commonly represented as either a 0or1. The term bit is a portmanteau of binary digit.
·         Bit rate is quantified using the bits per second unit (symbol: "bit/s"), often in conjunction with an SI prefix such as "kilo" (1 kbit/s = 1000 bit/s), "mega" (1 Mbit/s = 1000 kbit/s), "giga" (1 Gbit/s = 1000 Mbit/s) or "tera" (1 Tbit/s = 1000 Gbit/s). The non-standard abbreviation "bps" is often used to replace the standard symbol "bit/s", so that, for example, "1 Mbps" is used to mean one million bits per second.
·         Modem (modulator-demodulator) is a network hardware device that modulates one or more carrier wave signals to encode digital information for transmission and demodulates signals to decode the transmitted information. The goal is to produce a signal that can be transmitted easily and decoded to reproduce the original digital data. Modems can be used with any means of transmitting analog signals, from light emitting diodes to radio. A common type of modem is one that turns the digital data of a computer into modulated electrical signal for transmission over telephone lines and demodulated by another modem at the receiver side to recover the digital data.

Broadband is a wide bandwidth data transmission with an ability to simultaneously transport multiple signals and traffic types. The medium can be coaxial cable, optical fiber, radio or twisted pair. Also a high-speed Internet connection that is always connected
  • Digital subscriber line
  • Internet cable connection
  • High speed Internet cable connections
  • Cable modem
  • Telecommuting
  • Broadband over power line

Network Protocols
Protocols exist at several levels in a telecommunication connection. For example, there are protocols for the data interchange at the hardware device level and protocols for data interchange at the application program level. In the standard model known as Open Systems Interconnection (OSI), there are one or more protocols at each layer in the telecommunication exchange that both ends of the exchange must recognize and observe. Protocols are often described in an industry or international standard.
Transmission control protocol/Internet protocol (TCP/IP) - Provides the technical foundation for the public Internet as well as for large numbers of private networks
Domain name system – Converts IP addresses into domains
  • Packet
  • Standard packet format
  • Packet header
  • Packet footer
  • Traceroute
  • Proxy
Network Protocols
A network protocol defines rules and conventions for communication between network devices. Protocols for computer networking all generally use packet switching techniques to send and receive messages in the form of packets.Network protocols include mechanisms for devices to identify and make connections with each other, as well as formatting rules that specify how data is packaged into messages sent and received.
Example of TCP/IP
Defining TCP
As indicated in the name, there are two layers to TCP/IP. The top layer, TCP, is responsible for taking large amounts of data, compiling it into packets and sending them on their way to be received by a fellow TCP layer, which turns the packets into useful information/data.
Defining IP
The bottom layer, IP, is the locational aspect of the pair allowing the packets of information to be sent and received to the correct location. If you think about IP in terms of a map, the IP layer serves as the packet GPS to find the correct destination. Much like a car driving on a highway, each packet passes through a gateway computer (signs on the road), which serve to forward the packets to the right destination.
bal76825_0706.jpg

The Internet works by using a protocol called TCP/IP, or Transmission Control Protocol/Internet Protocol. TCP/IP is the underlying communication language of the Internet. In base terms, TCP/IP allows one computer to talk to another computer via the Internet through compiling packets of data and sending them to right location.
 Internet Domains Domain names are used in various networking contexts and application-specific naming and addressing purposes. In general, a domain name represents an Internet Protocol (IP) resource, such as a personal computer used to access the Internet, a server computer hosting a web site, or the web site itself or any other service communicated via the Internet. For example, the domain name microsoft.com represents about a dozen IP addresses.
Every domain name has a suffix that indicates which top level domain (TLD) it belongs to. There are only a limited number of such domains. For example:

bal76825_0707.jpg

Network Convergence
Network convergence is the efficient coexistence of telephone, video and data communication within a single network. The use of multiple communication modes in a single network offers convenience and flexibility not possible with separate infrastructures. Network convergence is also called media convergence.
bal76825_0708.jpg
  • Unified communication (UC)
 The integration of communication channels or tools into a single service that help people exchange ideas and do their jobs more effectively.
Some communication tools, like IP telephony, presence technology and instant messaging, facilitate synchronous communication. Synchronous communication occurs in real-time and is sometimes referred to as "same time/different place" communication. Other communication tools, like email or Twitter, facilitate asynchronous communication.
http://evilrouters.net/wp-content/uploads/2010/08/what-is-unified-communications.png
§  Peer-to-peer (P2P)
In a P2P network, the "peers" are computer systems which are connected to each other via the Internet. Files can be shared directly between systems on the network without the need of a central server. In other words, each computer on a P2P network becomes a file server as well as a client
https://upload.wikimedia.org/wikipedia/commons/thumb/f/fb/Server-based-network.svg/2000px-Server-based-network.svg.png
Network Convergence :
  • Voice over IP (VoIP)  - Network that Uses IP technology to transmit telephone calls
  • Internet Protocol TV (IPTV) -  Distributes digital video content using IP across the Internet and private IP networks
Numerous vendors offer VoIP services; however, the service works differently depending on the vendor’s IT infrastructure. The start-up Skype pairs P2P (peer-to-peer) technology with a PC’s sound card to create a voice service, which the user can use to call other Skype users, Vonage lets the user place calls to any person who has a mobile or landline (regular telephone) number. Vonage sends the call over a cable via a digital-to-analog converter

BENEFITS OF A CONNECTED WORLD :
Before networks, transferring data between computers was time-consuming and labor-intensive.People had to physically copy data from machine to machine using a disk. Networks offer many advantages for a business including:
Sharing resources
Providing opportunities
Reducing travel
- Sharing resources , Shared resources, also known as network resources, refer to computer data, information, or hardware devices that can be easily accessed from a remote computer through a local area network (LAN) or enterprise intranet. Successful shared resource access allows users to operate as if the shared resource were on their own computer. The most frequently used shared network environment objects are files, data, multimedia and hardware resources like printers, fax machines and scanners.
- Providing opportunities, Many people become easier to find a new job and increase the opportunities for the business itself.
- Reducing Travel, Network nowadays become much easier and can communicate with other business people around the world with internet so they reduce to travel to communicate with their business partner.
Sharing Resources
  • The primary resources for sharing include :
§  Intranet  -  a computer network with restricted access, as within a company, that uses software and protocols developed for the Internet.
§  Extranet - An extranet is a private network that uses Internet technology and the public telecommunication system to securely share part of a business's information or operations with suppliers, vendors, partners, customers, or other businesses. An extranet can be viewed as part of a company's intranet that is extended to users outside the company. It has also been described as a "state of mind" in which the Internet is perceived as a way to do business with other companies as well as to sell products to customers.
§  Virtual private network - A virtual private network (VPN) is a technology that creates an encrypted connection over a less secure network. The benefit of using a VPN is that it ensures the appropriate level of security to the connected systems when the underlying network infrastructure alone cannot provide it. The justification for using a VPN instead of a private network usually boils down to cost and feasibility: It is either not feasible to have a private network (e.g., for a traveling sales rep) or it is too costly to do so. The most common types of VPNs are remote-access VPNs and site-to-site VPNs

Networking enables humans to connect globally without having to meet face view and save time and costs without the need for distance.
·         networks enable us to communicate over long distances.
·         network provides many advantages but it can negatively impact also for Internet users.
SSL Certificates are small data files that digitally bind a cryptographic key to an organization’s details. When installed on a web server, it activates the padlock and the https protocol (over port 443) and allows secure connections from a web server to a browser. Typically, SSL is used to secure credit card transactions, data transfer and logins, and more recently is becoming the norm when securing browsing of social media sites. SSL Certificates bind together:
•             A domain name, server name or hostname.
•             An organizational identity (i.e. company name) and location.
An organization needs to install the SSL Certificate onto its web server to initiate secure sessions with browsers. Depending on the type of SSL Certificate applied for, the organization will need to go through differing levels of vetting. Once installed, it is possible to connect to the website over https://www.domain.com, as this tells the server to establish a secure connection with the browser. Once a secure connection is established, all web traffic between the web server and the web browser will be secure.
The term Digital divide describes a gap in terms of access to and usage of information and communication technology, including the skills to make use of those technology within a geographic area, society or community. It was traditionally considered to be a question of having or not having access, but with a global mobile phone penetration of over 95%,it is becoming a relative inequality between those who have more and those who have less



Infrastructures : Sustainable Technologies Session 11

MIS (Management Information Systems) is the hardware and software systems within an enterprise that provide the information that management needs to run an enterprise.
•             Hardware Physical devices associated with a computer
•             Software is the set of instructions the hardware executes to carry out specific tasks
•             Network is a communication system created by linking two or more devices and establishing a standard methodology in which they can communicate
•             Client is a computer designed to request information from a server
•             Server is a computer dedicated to providing information in response to request
Supported Operating Systems
The supported operating systems derived from this page are for a set of products made up of the combination of Base SAS and the orderable server-side products that are installed at the same time as Base SAS.
Supporting change could include the:
•             Project management of change
•             People psychology aspects of change
•             Communications in change
•             The importance of clarity in change
•             HR issues attached to change       
•             Redeployment
•             Attitudes
•             Policy changes
•             Individual development needs
•             Development – Skills change
•             Behaviours/ attitudes
•             Staffing levels required (up or down)
•             Relocation
•             Mergers

Supporting the Environment
At Dimension Data we’re committed to responsible environmental stewardship and sustainable business practices. Being a sustainable business means focusing on the triple bottom line of people, profit and planet. Our people are integral to our environmental practices and our mission is to raise awareness and show our employees how they can make a positive impact on the environment.
SUPPORTING OPERATIONS INFORMATION MIS INFRASTRUCTURE
Imagine taking a quick trip to the printer on the other side of the room, and when you turn around you find that your laptop has been stolen. How painful would you find this experience? What types of information would you lose? How much time would it take you to recover all of that information? A few things you might lose include music, movies, emails, assignments, saved passwords, not to mention that all-important 40-page paper that took you more than a month to complete. If this sounds painful then you want to pay particular attention to this section and learn how to eliminate this pain.
Be sure to explain to your students that an organization's backup strategy must fit the organization’s needs. If the organization only needs to backup its information daily, then there is no need to backup the information hourly Ask your students how many of them backup the information on their computers.
Ask your students what would happen if their computer crashed right now and they couldn’t recovery any of their information. Would they lose days, weeks, or months of information?
Encourage your students to research the Internet for PC backup information and create a personal information backup plan. www.docsonline.com is a great place to store important information
Fault tolerance A general concept that a system has the ability to respond to unexpected failures or system crashes as the backup system immediately and automatically takes over with no loss of service.
Failover A specific type of fault tolerance, occurs when a redundant storage server offers an exact replica of the real-time data and if the primary server crashes the users are automatically directed to the secondary server or backup server.  
Failback  Occurs when the primary machine recovers and resumes operations taking over from the secondary server.  
A single backup or restore failure can cost an organization more than time and money; some data cannot be recreated, and the business intelligence lost from that data can be tremendous.
Chief information officers (CIO) should have enough confidence in their backup and recovery systems that they could walk around and randomly pull out cables to prove that the systems are safe. The CIO should also be secure enough to perform this test during peak business hours.
Backup and Recovery
Hurricanes, floods, fires, and many other types of natural disasters can have devastating effects on businesses.
One of the most common types of hardware failures occurs from rats, mice, and squirrels chewing on cords, cables, and devices.
Explain to your students that the optimal recovery plan in terms of costs and time is where the two lines intersect.
Organizations should choose a backup and recovery strategy that is in line with its business goals. If the organization deals with large volumes of critical information, it will require daily backups, perhaps even hourly backups, to storage servers. If the organization deals with small amounts of noncritical information, then it might require only weekly backups to tapes, CDs, or DVDs.
Deciding how often to back up information and what media to use is a critical business decision. If an organization decides to back up on a weekly basis, then it is taking the risk that, if a total system crash occurs, it could lose a week’s worth of work. If this risk is acceptable, then a weekly backup strategy will work. If this risk is unacceptable, then the organization needs to move to a daily backup strategy. Some organizations find the risk of losing a day’s worth of work too high and move to an hourly backup strategy.
Union Bank of California has created a disaster recovery plan that includes multiple data centers in diverse locations, mirrored sites which can take over at the flick of a switch, hot sites - where staff can walk in and start working exactly as they would if they were in their normal location - and a vast amount of redundancy.
Hot site A separate and fully equipped facility where the company can move immediately after a disaster and resume business.
Warm site  A separate facility with computer equipment that requires installation and configuration.
Cold site A separate facility that does not have any computer equipment but is a place where employees can move after a disaster.
Business continuity planning
Business continuity planning (or business continuity and resiliency planning) is the process of creating systems of prevention and recovery to deal with potential threats to a company.
A business continuity plan is a plan to continue operations if a place of business is affected by different levels of disaster which can be localized short term disasters, to days long building wide problems, to a permanent loss of a building. Such a plan typically explains how the business would recover its operations or move operations to another location after damage by events like natural disasters, theft, or flooding. For example, if a fire destroys an office building or data center, the people and business or data center operations would relocate to a recovery site.
Any event that could negatively impact operations is included in the plan, such as supply chain interruption, loss of or damage to critical infrastructure (major machinery or computing /network resource). As such, risk management must be incorporated as part of BCP. In the US, government entities refer to the process as continuity of operations planning (COOP).
There are two kinds of event that might occur:
  • Emergency – a sudden unexpected event requiring immediate action
  • Emergency preparedness – ensures a company is ready to respond to an emergency in an organized, timely, and effective manner
The things that must be prepared when dealing with potential threats that may affect a place of a business:
-          Technology Recovery Strategies
-          Disaster Recovery Plan
-          Business Impact Analysis
-          Emergency Notification Services

Technology Recovery Strategy are divided into four items:
-          Hardware
(Servers, Computers, Wireless Devices)
-          Software
(Applications such as Email, Payroll, Instant Messaging)
-          Networking
(Wireless, LAN, Fiber, Cable)
-          Data Center
(Climate Control, Power Supply, Security)

Business impact analysis – Identifies all critical business functions and the effect that a specific disaster may have upon them
Technology failure – occurs when the ability of a company to operate is impaired because of a hardware, software, or data outage
Incident – Unplanned interruption of a service
Incident management – the process responsible for managing how incidents are identified and corrected
Characteristics of an agile MIS infrastructure
-          Accessibility
-          Availability
-          Maintainability
-          Portability
-          Reliability
-          Scalability
-          Usability
Accessibility refers to the varying levels that define what a user can access, view, or perform when operating a system. Web accessibility allows people with disabilities to use the Web .Administrator access unrestricted access to the entire system. Availability is time frames when the system is operational. Unavailable is time frames when a system is not operating and cannot be used. High availability is when the system is continuously operational at all times.
MIS AND THE ENVIRONMENT
·         Moore’s Law - Refers to the computer chip performance per dollar doubles every 18 months
·         Sustainable, or “green,” MIS -  Describes the production, management, use, and disposal of technology in a way that minimizes damage to the environment
·         Corporate social responsibility - Companies’ acknowledged responsibility to society
The general trend in MIS is toward smaller, faster, and cheaper devices. Gordon Moore, co-founder of Intel, the world’s largest producer of computer chips or microprocessors, observed in 1965 that continued advances in technological innovation made it possible to reduce the size of a computer chip (the brains of a computer, or even a cell phone now) while doubling its capacity every two years.
There are Three Primary Side Effects Of Businesses’ Expanded Use Of Technology :
1.            Increased Electronic Waste
2.            Increased Energy Consumption
3.            Increased Carbon Emissions
Increased Electronic Waste
E-waste, short for electronic waste, can be any outdated or obsolete appliance or electronic device found in offices, homes and pants pockets. Televisions, microwaves, computers and cell phones are all common examples of e-waste.
Sustainable MIS disposal, describes the production, management, use and disposal of technology in a way that minimizes damage to the environment
Increased Energy Consumption
Energy consumption – The amount of energy consumed by business processes and systems. 
Huge increases in technology use have greatly amplified energy consumption
The energy consumed by a computer is estimated to produce as much as 10 percent of the amount of carbon dioxide produced by an automobile
Increased Carbon Emissions
Carbon emissions , Carbon dioxide and carbon monoxide produced by business processes and systems
When left on continuously, a single desktop computer and monitor can consume at least 100 watts of power per hour. The major human-generated greenhouse gases, such as carbon emissions from energy use, are very likely responsible for the increases in climatic temperature over the past half a century.
The components of a sustainable MIS infrastructure include :
·         Grid Computing,
·         Virtualized Computing
·         Cloud computing
Grid computing
Grid computing  - A collection of computers, often geographically dispersed, that are coordinated to solve a common problem.
With grid computing a problem is broken into pieces and distributed to many machines, allowing faster processing than could occur with a single system. Computers typically use less than 25 percent of their processing power, leaving more than 75 percent available for other tasks. Innovatively, grid computing takes advantage of this unused processing power by linking thousands of individual computers around the world to create a “virtual supercomputer” that can process intensive tasks
Smart grid  Delivers electricity using two-way digital technology.
What is Virtual Computing?
Virtual computing allows computer users remote access to software applications and processes when they need it. Users gain access via the Internet through a wireless or network server. For a fee, users can boost their computers' capabilities, size, performance, processes and/or software applications whenever they need it. This real-time technology offers:
•             Operating and utility systems
•             Storage
•             Memory
•             Software
•             Allocation and reassignment of input/output and other processes
•             Data backup
•             Automated problem solving and troubleshooting
•             Tools for monitoring and managing systems
Users can access software applications for a single computer or an entire network because of the ability to select only what you need when you need it. They also can save or back up data and text documents to a virtual server (thus freeing space on individual computers) and reallocate or assign different processes to the virtual environment. This enables computers to operate at optimal speeds.
Virtual computing initially began as a method of borrowing space or storage for computer systems, but it's since grown significantly, offering data and software applications, as well as operating and utility systems. The corporate environment most commonly uses it, where IT system managers run multiple applications on several servers.
Cloud storage In general, the definition of cloud computing is the combined use of computer technology in a network with the development of internet-based which has the function to run a program or application via a computer - a computer connected at the same time, but not all that terkonekasi via the Internet using cloud computing.
Cloud-based computer technology system is a technology that makes the Internet as a central server for managing data and user applications. This technology allows users to run the program without the installation and allow users to access their personal data through a computer with internet access.
Benefits of Cloud Computing And Application In Everyday Life - days
After a brief elaboration of the definition above could certainly use technology to the cloud system is quite easy for users other than in terms of the efficiency of the data, as well as cost savings. Here are the benefits of the benefits to be gained through cloud-based technology system.
1. All Data Stored In Centralized Server
One of the advantages of cloud technology is enabling users to store data centrally on a server based on the services provided by service providers of Cloud Computing itself. In addition, users also do not have to bother anymore to provide infrastructure such as data center, media storage / storage etc because all has been available virtually.
2. Data Security
Security of user data can be stored safely through the server provided by a service provider such as Cloud Computing technology platform guarantees, warranties ISO, personal data, etc.
3. Flexibility and Scalability High
Cloud technology offers flexibility with ease of access to data, whenever and wherever we are with a note that the user (users) connected to the Internet. Additionally, users can easily increase or decrease the capacity of data storage without the need to purchase additional hardware such as the hard disk. Even one of the world-renowned IT practitioners, the late Steve Jobs said that the purchase of physical memory to store data such as the hard drive is useless if we can save it as a virtual / via the internet.
4. Long-Term Investments
The cost savings will be the purchase of inventory, such as infrastructure, hard drive, etc. will be reduced because the user will be charged regular monthly compensation in accordance with the service package agreed upon with the service provider of Cloud Computing. Royalties on software licensing costs can also be reduced because all have been run through Cloud-based computing.
Application of Cloud Computing has been done by several world-renowned IT companies such as Google through the Google Drive app, IBM through Blue Cord Initiative, Microsoft with its operating system based Cloud Computing, Windows Azure and so on. On the national scene itself Cloud technology application can also be seen through the use Point of Sale / cashier program.
One of the companies that develop products based on the Cloud system is DealPOS. The working method Point of Sale (POS) is to distribute retail store sales data that have been inputted by the cashier to retail store owners via the internet anywhere shopkeepers are. In addition, the renowned national telecommunications company, Telkom also developed a Cloud-based computing system through Telkom Cloud VPS with Telkom and Telkom program Collaboration directed to customers SME (Small-Medium Enterprises).
How Cloud Computing Systems Work
Cloud systems work using the internet as a server in data processing. The system allows users to log on to the Internet connected to the program to run needed applications without installation. Infrastructure such as data storage media and also the instruction / command from the user is stored virtually through the Internet network and then orders - orders were followed to the application server. Once the order is received in the application server and then the data is processed and the final process the user will be presented with a page that has been updated in accordance with the instructions received earlier so that consumers will benefit.
For example, through the use of email such as Yahoo or Gmail. Data on multiple servers are integrated globally without having to download software to use it. Users only need an internet connection and all data is managed directly by Yahoo and Google. Software and memory for user data is not in the computer but are integrated directly via the Cloud system using a computer connected to the internet.
Cloud Computing
·         Multi-tenancy – The cloud means that a single instance of a system serves multiple customers
·         Single-tenancy – Each customer or tenant must purchase and maintain an individual system
·         Cloud fabric – The software that makes possible the benefits of cloud computing, such as multi-tenancy

Characteristics of Cloud Computing
Cloud Computing pick five (5) main characteristics are:
·         On-Demand Self-Service: Users can select the type and specifications of the services required, thereby reducing the interaction with the service provider cloud (cloud provider).
·         Broad Network Access: Cloud services require network access sufficient so that the service can be accessed smoothly.
·         Resource Pooling: computing resources derived from the set of servers that the location is different, is not centralized in one location.
·         Rapid Elasticity: capability of service should be regulated according to the desired capacity and can be done in a short time.
·         Measured Service: A service used by the user can be measured clearly so that users only pay the rent according to the amount of service used.
Cloud Computing Model
In cloud computing there are three (3) service model, namely:
·         Software as a Service (SaaS): services provided to users in the form of software like office suite. Sample Google Doc and Apple iWork which is an office application. Types of users of the SaaS service is the End User, users living using any application.
·         Platform as a Service (PaaS): services provided to users in the form of a platform to support the process of software development such as database, service, and platform programming language. Examples of Google App Engine, RedHat OpenShift, and Coding. Type the use of PaaS service is the Application Developer, application developers can immediately focus on developing applications without the need to set up their own platform development.
·         Infrastructure as a Service (IaaS): services provided to users in the form of a computer server (virtual machine) and network services such as VPS (Virtual Private Server). Examples of Amazon Web Services (AWS), Linode, Digital Ocean, and Cloud Lightning. Types of users of IaaS services are Network / System Architect, sysadmin who prepares all of the system configuration from the operating system, network, until the application development platform.
There are four (4) on the cloud computing deployment models:
·         Public Cloud: cloud services can be accessed by anyone (Public). Public Cloud services are paid and some are free. Users Public Cloud in general is the general public. Excess use of Public Cloud, users do not need to bother to think about the cost of investment, infrastructure and human resources so that the service can continue to run. Data can also be easily stored and accessed over the internet connection. The drawback requires adequate internet access and is very dependent on the service provider.
·         Private Cloud: cloud services can only be accessed by the person / organization specific (Private). This model is widely used in education or enterprise environment. The main excess of the Private Cloud is the confidentiality of the data. If the Private Cloud is implemented on the intranet, it can save costs and access faster. The drawback costly infrastructure investment and human resources.
·         Community Cloud: cloud services are developed by a community that has similar interests or goals. Community or association of universities in Indonesia to build cloud services that contain data and applications to the educational environment.
·         Hybrid Cloud: the cloud service is a combination of Private Cloud, Public Cloud, and / or Community Cloud. For example, a company uses a combination of Private and Public Cloud, applications and data that is not confidential or intended to be placed on the consumer while the Public Cloud for applications and highly sensitive data is placed in the Private Cloud.
Risks of Cloud Computing
Cloud Computing is present with a wide range of computing solutions to problems, but there is also a risk that makes an organization does not want to adapt to cloud computing. Two of the most important risk is the problem of security and confidentiality of data, because our data is uploaded to the internet where everyone can access these services or worry experienced cyber attacks.





Minggu, 20 Maret 2016

Management Information System

Five Forces Analysis 
Assumes that there are five important forces that determine competitive power in a business situation. 
These are:
  1. Supplier Power: Here you assess how easy it is for suppliers to drive up prices. This is driven by the number of suppliers of each key input, the uniqueness of their product or service, their strength and control over you, the cost of switching from one to another, and so on. The fewer the supplier choices you have, and the more you need suppliers' help, the more powerful your suppliers are.
  2. Buyer Power: Here you ask yourself how easy it is for buyers to drive prices down. Again, this is driven by the number of buyers, the importance of each individual buyer to your business, the cost to them of switching from your products and services to those of someone else, and so on. If you deal with few, powerful buyers, then they are often able to dictate terms to you.
  3. Competitive Rivalry: What is important here is the number and capability of your competitors. If you have many competitors, and they offer equally attractive products and services, then you'll most likely have little power in the situation, because suppliers and buyers will go elsewhere if they don't get a good deal from you. On the other hand, if no-one else can do what you do, then you can often have tremendous strength.
  4. Threat of Substitution: This is affected by the ability of your customers to find a different way of doing what you do – for example, if you supply a unique software product that automates an important process, people may substitute by doing the process manually or by outsourcing it. If substitution is easy and substitution is viable, then this weakens your power.
  5. Threat of New Entry: Power is also affected by the ability of people to enter your market. If it costs little in time or money to enter your market and compete effectively, if there are few economies of scale in place, or if you have little protection for your key technologies, then new competitors can quickly enter your market and weaken your position. If you have strong and durable barriers to entry, then you can preserve a favorable position and take fair advantage of it.

Porter's Generic Strategies





The Cost Leadership Strategy

Porter's generic strategies are ways of gaining competitive advantage – in other words, developing the "edge" that gets you the sale and takes it away from your competitors. There are two main ways of achieving this within a Cost Leadership strategy:
  • Increasing profits by reducing costs, while charging industry-average prices.
  • Increasing market share through charging lower prices, while still making a reasonable profit on each sale because you've reduced costs.

The Differentiation Strategy

Differentiation involves making your products or services different from and more attractive than those of your competitors. How you do this depends on the exact nature of your industry and of the products and services themselves, but will typically involve features, functionality, durability, support, and also brand image that your customers value.
To make a success of a Differentiation strategy, organizations need:
  • Good research, development and innovation.
  • The ability to deliver high-quality products or services.
  • Effective sales and marketing, so that the market understands the benefits offered by the differentiated offerings.
Large organizations pursuing a differentiation strategy need to stay agile with their new product development processes. Otherwise, they risk attack on several fronts by competitors pursuing Focus Differentiation strategies in different market segments.


The Focus Strategy 

Companies that use Focus strategies concentrate on particular niche markets and, by understanding the dynamics of that market and the unique needs of customers within it, develop uniquely low-cost or well-specified products for the market. Because they serve customers in their market uniquely well, they tend to build strong brand loyalty amongst their customers. This makes their particular market segment less attractive to competitors.
As with broad market strategies, it is still essential to decide whether you will pursue Cost Leadership or Differentiation once you have selected a Focus strategy as your main approach: Focus is not normally enough on its own.
But whether you use Cost Focus or Differentiation Focus, the key to making a success of a generic Focus strategy is to ensure that you are adding something extra as a result of serving only that market niche. It's simply not enough to focus on only one market segment because your organization is too s
mall to serve a broader market (if you do, you risk competing against better-resourced broad market companies' offerings).
The "something extra" that you add can contribute to reducing costs (perhaps through your knowledge of specialist suppliers) or to increasing differentiation (though your deep understanding of customers' needs).


Definition of Value Chain


A value chain is the whole series of activities that create and build value at every step

Definition: A value chain is the whole series of activities that create and build value at every step. The total value delivered by the company is the sum total of the value built up all throughout the company. Michael Porter developed this concept in his 1980 book 'Competitive Advantage'.

Description: The significance of the value chain: The value chain concept separates useful activities (which allow the company as a whole to gain competitive advantage) from the wasteful activities (which hinder the company from getting a lead in the market). Focusing on the value-creating activities could give the company many advantages. For example, the ability to charge higher prices; lower cost of manufacture; better brand image, faster response to threats or opportunities.



Case

Vision : our vision is to build a modern and unique sushi restaurant with an authentic                         Japanese taste that will give an unforgettable and full of pleasure experience.

Mission : Combining the feeding process with sophisticated technology  to build a system          for booking and payment transactions selection of raw materials to be sent                  directly from japan

1. The threat of new entrants:
The threat of new entrants in this culinary industry is nothing to worry about since for  the newcomers to enter this culinary industry is not easy, because it required quite a large capital. Such as the introduction of a system at the booking and payment transactions for a fast and modern system, and also original raw materials from Japan with good quality so that the authenticity of the flavor can be maintained. Then in collaboration with a Japanese chef who will always keep the distinctive taste of Japan. Plus, at this restaurant we also apply e-commerce. And this one is an application that needs to be pursued by the new entrants (low)
Things that will be done to deal with the competitors :
- Maintain a good relationship with the supplier by being a major client, and always loyal to the supplier
- Maintain and control the quality of raw materials and to provide consistency in taste
- Maintaining the applied system  to be always evaluated
- Creating a new innovation for the food or for the service

2. The threat of substitute products or goods
The threat of substitute products is quite big because there are a lot of sushi restaurants located in the area of Jakarta. However, in anticipation of their food products to replace us. Our restaurant will provide good service and atmosphere that  much like being in the original Japanese restaurant, authentic taste, as well as an unforgettable dining experience when the food is mixed with the technological sophistication that is given, and also an affordable price. It will take the hearts of customers, and the customers will be reluctant to switch to another Japanese restaurant although the type of food on offer is similar. (medium)

3. The power of bargain shoppers
Restaurants kitadori face the challenges of bargain shoppers by giving a friendly service, nice, and give some bonuses if customer join as a member. So that the customer will always be loyal.

4. The power of bargaining supplier
high quality goods is certainly easier for companies to provide products and service with good quality as well. Kitadori is depend on several suppliers that already selected and  trusted. which is suppliers that derived from Japan who responsible for the availability of raw materials such as food suppliers who produce japanese rice, suppliers who focus on the production of spices typical of Japan, and for the fish we have two suppliers that come from Japan and from Indonesia. Because we always want to produce the food quality and taste is always maintained. that's why we always try to maintain a good relationship with our suppliers. for example we made a commitment for payment and delivery of goods to be punctual, and maintain good communication in. Because we can't establish a good relationship, the supplier will stop the distribution of raw materials to the kitadori restaurant . So it will have an impact to difficulties of food production, the price will increase, and it will likely to happen for bankruptcy. (Low)

5. Competition from Competitors In The Same Industry
This time although the taverns and sushi restaurants already fulfill the area of jakarta .however, kitadori restaurant is different from other sushi restaurant in jakarta, because there's no other sushi restaurant who can implements a unique system in the process of booking and payment, with affordable price, atmosphere and taste similar as is in the original Japanese restaurant. (Low)


Strategies Focus

Kitadori restaurant is focusing to be a restaurant in Jakarta with the development of e-menu system (electronic menu) with an iPad device to replace the function of a waiter. At each table there is one unit of iPad, which lists the full menu and the price as well. customers only need to simply press the buttons instructions that come with the iPad app to order dishes. A few minutes later the dish will be delivered to our table. The food is delivered to each table through a container that is designed like a Japanese fast trains (shinkansen), through the wooden rails that were on the walls of each table. Each table has a number, which must have been combined with the existing iPad devices. So each train introductory course, will stop right at the table who ordered it. When the dish arrived at the table, cutomer should immediately pick it up, then press a red button on the wall table. The key function is to order food delivery wagon back into place (kitchen) .And when the customer payment transactions just select the button on ipad to total the purchases which later the system will calculate the price that must be paid. But not only focus with the e-menu, but kitadori restaurant also focus on the sushi flavor and the atmosphere will be the same as you eat in Japan directly.


Application of Value Chain in our restaurant

1. Primary Activities

a) Logistics Sign (Inbound Logistics)
In determining the supplier, Kitadori involves various aspects such as quality and customer. that makes supplied products of kitadori restaurant is high in quality. for example is the use of fresh fish to be the main ingredient of the sushi
kitadori using the concept of decentralization that is not focused only on one vendor.

b) Operations (Operations)
 Maintenance of the system on the reservation and payment routine
training for waiters so that the service can be given more improved
Improved infrastructure

c) Logistics Exit (Outbound Logistics)
Establish partnerships so that many transactional processes in procurement can be reduced and the company can focus on its primary purpose
for example: kitadori has built patnership with foodpanda .one the companies who served delivery order for customers

d) Marketing and sales (Marketing and Sales)
Provide a variety of promotions via digital or social media in order to boost sales and increase its popularity in society

e) Services (Service)
Services became the main focus on kitadori for customer satisfaction
Always be friendly to all customers

2. Activities supporters

a) Procurement
In the selection of vendors, we pay more attention to the quality of the raw materials

b) Technology Development
 The implementation of e-menu system is technology that enables a customer to order from the menu directly on the Touch Screen in the customer table, so there's no need to call the waitress to take down the menu

c) Human Resource Management
Training for employees in order to improve service

d) Firm Infrastructure
The new management kitadori transform the company's overall business with the aim of improving the efficiency of operational activities






Sumber :
https://www.mindtools.com/pages/article/newTMC_08.htm ( Five porters strategy )
https://www.mindtools.com/pages/article/newSTR_82.htm ( Generic trategies )
http://economictimes.indiatimes.com/definition/value-chain ( Value chain )