MIS (Management
Information Systems) is the hardware and software systems within an
enterprise that provide the information that management needs to run an
enterprise.
• Hardware
Physical devices associated with a computer
• Software
is the set of instructions the hardware executes to carry out specific tasks
• Network is a communication system
created by linking two or more devices and establishing a standard methodology
in which they can communicate
• Client is
a computer designed to request information from a server
• Server is
a computer dedicated to providing information in response to request
Supported Operating Systems
The supported operating systems derived from this page are
for a set of products made up of the combination of Base SAS and the orderable
server-side products that are installed at the same time as Base SAS.
Supporting change could include the:
• Project
management of change
• People
psychology aspects of change
• Communications
in change
• The
importance of clarity in change
• HR issues attached to change
• Redeployment
• Attitudes
• Policy
changes
• Individual
development needs
• Development
– Skills change
• Behaviours/
attitudes
• Staffing
levels required (up or down)
• Relocation
• Mergers
Supporting the Environment
At Dimension Data we’re committed to responsible
environmental stewardship and sustainable business practices. Being a
sustainable business means focusing on the triple bottom line of people, profit
and planet. Our people are integral to our environmental practices and our
mission is to raise awareness and show our employees how they can make a
positive impact on the environment.
SUPPORTING OPERATIONS INFORMATION MIS INFRASTRUCTURE
Imagine taking a quick trip to the printer on the other side
of the room, and when you turn around you find that your laptop has been
stolen. How painful would you find this experience? What types of information
would you lose? How much time would it take you to recover all of that information?
A few things you might lose include music, movies, emails, assignments, saved
passwords, not to mention that all-important 40-page paper that took you more
than a month to complete. If this sounds painful then you want to pay
particular attention to this section and learn how to eliminate this pain.
Be sure to explain to your students that an organization's
backup strategy must fit the organization’s needs. If the organization only
needs to backup its information daily, then there is no need to backup the
information hourly Ask your students how many of them backup the information on
their computers.
Ask your students what would happen if their computer
crashed right now and they couldn’t recovery any of their information. Would
they lose days, weeks, or months of information?
Encourage your students to research the Internet for PC
backup information and create a personal information backup plan.
www.docsonline.com is a great place to store important information
Fault tolerance A general concept that a system has the
ability to respond to unexpected failures or system crashes as the backup
system immediately and automatically takes over with no loss of service.
Failover A specific type of fault tolerance, occurs when a
redundant storage server offers an exact replica of the real-time data and if
the primary server crashes the users are automatically directed to the
secondary server or backup server.
Failback Occurs when
the primary machine recovers and resumes operations taking over from the
secondary server.
A single backup or restore failure can cost an organization
more than time and money; some data cannot be recreated, and the business
intelligence lost from that data can be tremendous.
Chief information officers (CIO) should have enough confidence
in their backup and recovery systems that they could walk around and randomly
pull out cables to prove that the systems are safe. The CIO should also be
secure enough to perform this test during peak business hours.
Backup and Recovery
Hurricanes, floods, fires, and many other types of natural
disasters can have devastating effects on businesses.
One of the most common types of hardware failures occurs
from rats, mice, and squirrels chewing on cords, cables, and devices.
Explain to your students that the optimal recovery plan in
terms of costs and time is where the two lines intersect.
Organizations should choose a backup and recovery strategy
that is in line with its business goals. If the organization deals with large
volumes of critical information, it will require daily backups, perhaps even
hourly backups, to storage servers. If the organization deals with small
amounts of noncritical information, then it might require only weekly backups
to tapes, CDs, or DVDs.
Deciding how often to back up information and what media to
use is a critical business decision. If an organization decides to back up on a
weekly basis, then it is taking the risk that, if a total system crash occurs,
it could lose a week’s worth of work. If this risk is acceptable, then a weekly
backup strategy will work. If this risk is unacceptable, then the organization
needs to move to a daily backup strategy. Some organizations find the risk of
losing a day’s worth of work too high and move to an hourly backup strategy.
Union Bank of California has created a disaster recovery
plan that includes multiple data centers in diverse locations, mirrored sites
which can take over at the flick of a switch, hot sites - where staff can walk
in and start working exactly as they would if they were in their normal
location - and a vast amount of redundancy.
Hot site A separate and fully equipped facility where the
company can move immediately after a disaster and resume business.
Warm site A separate
facility with computer equipment that requires installation and configuration.
Cold site A separate facility that does not have any
computer equipment but is a place where employees can move after a disaster.
Business continuity planning
Business continuity
planning (or business continuity and resiliency planning) is the process of
creating systems of prevention and recovery to deal with potential threats to a
company.
A business continuity plan is a plan to continue operations
if a place of business is affected by different levels of disaster which can be
localized short term disasters, to days long building wide problems, to a
permanent loss of a building. Such a plan typically explains how the business
would recover its operations or move operations to another location after
damage by events like natural disasters, theft, or flooding. For example, if a
fire destroys an office building or data center, the people and business or
data center operations would relocate to a recovery site.
Any event that could negatively impact operations is
included in the plan, such as supply chain interruption, loss of or damage to
critical infrastructure (major machinery or computing /network resource). As
such, risk management must be incorporated as part of BCP. In the US,
government entities refer to the process as continuity of operations planning
(COOP).
There are two kinds of event that might occur:
- Emergency – a
sudden unexpected event requiring immediate action
- Emergency
preparedness – ensures a company is ready to respond to an emergency in an
organized, timely, and effective manner
The things that must be prepared when dealing with potential
threats that may affect a place of a business:
-
Technology Recovery Strategies
-
Disaster Recovery Plan
-
Business Impact Analysis
-
Emergency Notification Services
Technology Recovery Strategy are divided into four items:
-
Hardware
(Servers,
Computers, Wireless Devices)
-
Software
(Applications
such as Email, Payroll, Instant Messaging)
-
Networking
(Wireless,
LAN, Fiber, Cable)
-
Data Center
(Climate
Control, Power Supply, Security)
Business impact analysis – Identifies all critical business
functions and the effect that a specific disaster may have upon them
Technology failure – occurs when the ability of a company to
operate is impaired because of a hardware, software, or data outage
Incident – Unplanned interruption of a service
Incident management – the process responsible for managing
how incidents are identified and corrected
Characteristics of an agile MIS infrastructure
-
Accessibility
-
Availability
-
Maintainability
-
Portability
-
Reliability
-
Scalability
-
Usability
Accessibility refers to the varying levels that define what
a user can access, view, or perform when operating a system. Web accessibility
allows people with disabilities to use the Web .Administrator access
unrestricted access to the entire system. Availability is time frames when the
system is operational. Unavailable is time frames when a system is not
operating and cannot be used. High availability is when the system is continuously
operational at all times.
MIS AND THE ENVIRONMENT
·
Moore’s Law - Refers to the computer chip
performance per dollar doubles every 18 months
·
Sustainable, or “green,” MIS - Describes the production, management, use,
and disposal of technology in a way that minimizes damage to the environment
·
Corporate social responsibility - Companies’
acknowledged responsibility to society
The general trend in MIS is toward smaller, faster, and
cheaper devices. Gordon Moore, co-founder of Intel, the world’s largest
producer of computer chips or microprocessors, observed in 1965 that continued
advances in technological innovation made it possible to reduce the size of a
computer chip (the brains of a computer, or even a cell phone now) while
doubling its capacity every two years.
There are Three Primary Side Effects Of Businesses’ Expanded
Use Of Technology :
1. Increased
Electronic Waste
2. Increased
Energy Consumption
3. Increased
Carbon Emissions
Increased Electronic Waste
E-waste, short for electronic waste, can be any outdated or
obsolete appliance or electronic device found in offices, homes and pants
pockets. Televisions, microwaves, computers and cell phones are all common
examples of e-waste.
Sustainable MIS disposal, describes the production,
management, use and disposal of technology in a way that minimizes damage to
the environment
Increased Energy Consumption
Energy consumption – The amount of energy consumed by
business processes and systems.
Huge increases in technology use have greatly amplified
energy consumption
The energy consumed by a computer is estimated to produce as
much as 10 percent of the amount of carbon dioxide produced by an automobile
Increased Carbon Emissions
Carbon emissions , Carbon dioxide and carbon monoxide
produced by business processes and systems
When left on continuously, a single desktop computer and
monitor can consume at least 100 watts of power per hour. The major human-generated
greenhouse gases, such as carbon emissions from energy use, are very likely
responsible for the increases in climatic temperature over the past half a
century.
The components of a sustainable MIS infrastructure include :
·
Grid Computing,
·
Virtualized Computing
·
Cloud computing
Grid computing
Grid computing - A
collection of computers, often geographically dispersed, that are coordinated
to solve a common problem.
With grid computing a problem is broken into pieces and
distributed to many machines, allowing faster processing than could occur with
a single system. Computers typically use less than 25 percent of their
processing power, leaving more than 75 percent available for other tasks.
Innovatively, grid computing takes advantage of this unused processing power by
linking thousands of individual computers around the world to create a “virtual
supercomputer” that can process intensive tasks
Smart grid Delivers
electricity using two-way digital technology.
What is Virtual Computing?
Virtual computing allows computer users remote access to
software applications and processes when they need it. Users gain access via
the Internet through a wireless or network server. For a fee, users can boost
their computers' capabilities, size, performance, processes and/or software
applications whenever they need it. This real-time technology offers:
• Operating
and utility systems
• Storage
• Memory
• Software
• Allocation
and reassignment of input/output and other processes
• Data
backup
• Automated
problem solving and troubleshooting
• Tools for
monitoring and managing systems
Users can access software applications for a single computer
or an entire network because of the ability to select only what you need when
you need it. They also can save or back up data and text documents to a virtual
server (thus freeing space on individual computers) and reallocate or assign
different processes to the virtual environment. This enables computers to
operate at optimal speeds.
Virtual computing initially began as a method of borrowing
space or storage for computer systems, but it's since grown significantly,
offering data and software applications, as well as operating and utility
systems. The corporate environment most commonly uses it, where IT system
managers run multiple applications on several servers.
Cloud storage In general, the definition of cloud computing
is the combined use of computer technology in a network with the development of
internet-based which has the function to run a program or application via a computer
- a computer connected at the same time, but not all that terkonekasi via the Internet
using cloud computing.
Cloud-based computer technology system is a technology that
makes the Internet as a central server for managing data and user applications.
This technology allows users to run the program without the installation and
allow users to access their personal data through a computer with internet
access.
Benefits of Cloud Computing And
Application In Everyday Life - days
After a brief elaboration of the definition above could
certainly use technology to the cloud system is quite easy for users other than
in terms of the efficiency of the data, as well as cost savings. Here are the
benefits of the benefits to be gained through cloud-based technology system.
1. All Data Stored In Centralized Server
One of the advantages of cloud technology is enabling users
to store data centrally on a server based on the services provided by service
providers of Cloud Computing itself. In addition, users also do not have to
bother anymore to provide infrastructure such as data center, media storage /
storage etc because all has been available virtually.
2. Data Security
Security of user data can be stored safely through the
server provided by a service provider such as Cloud Computing technology
platform guarantees, warranties ISO, personal data, etc.
3. Flexibility and Scalability High
Cloud technology offers flexibility with ease of access to
data, whenever and wherever we are with a note that the user (users) connected
to the Internet. Additionally, users can easily increase or decrease the
capacity of data storage without the need to purchase additional hardware such
as the hard disk. Even one of the world-renowned IT practitioners, the late
Steve Jobs said that the purchase of physical memory to store data such as the
hard drive is useless if we can save it as a virtual / via the internet.
4. Long-Term Investments
The cost savings will be the purchase of inventory, such as
infrastructure, hard drive, etc. will be reduced because the user will be
charged regular monthly compensation in accordance with the service package
agreed upon with the service provider of Cloud Computing. Royalties on software
licensing costs can also be reduced because all have been run through Cloud-based
computing.
Application of Cloud Computing has been done by several
world-renowned IT companies such as Google through the Google Drive app, IBM
through Blue Cord Initiative, Microsoft with its operating system based Cloud
Computing, Windows Azure and so on. On the national scene itself Cloud
technology application can also be seen through the use Point of Sale / cashier
program.
One of the companies that develop products based on the
Cloud system is DealPOS. The working method Point of Sale (POS) is to
distribute retail store sales data that have been inputted by the cashier to
retail store owners via the internet anywhere shopkeepers are. In addition, the
renowned national telecommunications company, Telkom also developed a
Cloud-based computing system through Telkom Cloud VPS with Telkom and Telkom
program Collaboration directed to customers SME (Small-Medium Enterprises).
How Cloud Computing Systems Work
Cloud systems work using the internet as a server in data
processing. The system allows users to log on to the Internet connected to the
program to run needed applications without installation. Infrastructure such as
data storage media and also the instruction / command from the user is stored
virtually through the Internet network and then orders - orders were followed
to the application server. Once the order is received in the application server
and then the data is processed and the final process the user will be presented
with a page that has been updated in accordance with the instructions received
earlier so that consumers will benefit.
For example, through the use of email such as Yahoo or
Gmail. Data on multiple servers are integrated globally without having to
download software to use it. Users only need an internet connection and all data
is managed directly by Yahoo and Google. Software and memory for user data is
not in the computer but are integrated directly via the Cloud system using a
computer connected to the internet.
Cloud Computing
·
Multi-tenancy – The cloud means that a single instance
of a system serves multiple customers
·
Single-tenancy – Each customer or tenant must
purchase and maintain an individual system
·
Cloud fabric – The software that makes possible
the benefits of cloud computing, such as multi-tenancy
Characteristics of Cloud Computing
Cloud Computing pick five (5) main characteristics are:
·
On-Demand Self-Service: Users can select the
type and specifications of the services required, thereby reducing the
interaction with the service provider cloud (cloud provider).
·
Broad Network Access: Cloud services require
network access sufficient so that the service can be accessed smoothly.
·
Resource Pooling: computing resources derived
from the set of servers that the location is different, is not centralized in
one location.
·
Rapid Elasticity: capability of service should
be regulated according to the desired capacity and can be done in a short time.
·
Measured Service: A service used by the user can
be measured clearly so that users only pay the rent according to the amount of
service used.
Cloud Computing Model
In cloud computing there are three (3) service model,
namely:
·
Software as a Service (SaaS): services provided
to users in the form of software like office suite. Sample Google Doc and Apple
iWork which is an office application. Types of users of the SaaS service is the
End User, users living using any application.
·
Platform as a Service (PaaS): services provided
to users in the form of a platform to support the process of software
development such as database, service, and platform programming language.
Examples of Google App Engine, RedHat OpenShift, and Coding. Type the use of
PaaS service is the Application Developer, application developers can
immediately focus on developing applications without the need to set up their
own platform development.
·
Infrastructure as a Service (IaaS): services
provided to users in the form of a computer server (virtual machine) and
network services such as VPS (Virtual Private Server). Examples of Amazon Web
Services (AWS), Linode, Digital Ocean, and Cloud Lightning. Types of users of
IaaS services are Network / System Architect, sysadmin who prepares all of the
system configuration from the operating system, network, until the application
development platform.
There are four (4) on the cloud computing deployment models:
·
Public Cloud: cloud services can be accessed by
anyone (Public). Public Cloud services are paid and some are free. Users Public
Cloud in general is the general public. Excess use of Public Cloud, users do
not need to bother to think about the cost of investment, infrastructure and
human resources so that the service can continue to run. Data can also be
easily stored and accessed over the internet connection. The drawback requires
adequate internet access and is very dependent on the service provider.
·
Private Cloud: cloud services can only be
accessed by the person / organization specific (Private). This model is widely
used in education or enterprise environment. The main excess of the Private
Cloud is the confidentiality of the data. If the Private Cloud is implemented
on the intranet, it can save costs and access faster. The drawback costly
infrastructure investment and human resources.
·
Community Cloud: cloud services are developed by
a community that has similar interests or goals. Community or association of
universities in Indonesia to build cloud services that contain data and
applications to the educational environment.
·
Hybrid Cloud: the cloud service is a combination
of Private Cloud, Public Cloud, and / or Community Cloud. For example, a
company uses a combination of Private and Public Cloud, applications and data
that is not confidential or intended to be placed on the consumer while the
Public Cloud for applications and highly sensitive data is placed in the
Private Cloud.
Risks of Cloud Computing
Cloud Computing is present with a wide range of computing
solutions to problems, but there is also a risk that makes an organization does
not want to adapt to cloud computing. Two of the most important risk is the
problem of security and confidentiality of data, because our data is uploaded
to the internet where everyone can access these services or worry experienced
cyber attacks.
Tidak ada komentar:
Posting Komentar