Вы находитесь на странице: 1из 18

Chapter One

Big data
What many people dont know is that beyond their online presence on Facebook,
YouTube and Google there is a vast wealth of knowledge waiting to be discovered. This
information is commonly referred to as big data, and is largely inaccessible to
conventional web users.
What is big data?
The term big data refers to the part of the internet that is not indexed by regular search
engines. Search engines like Google or Yahoo! are actually web spiders. When you type
in a search term, the web spiders crawl through trails of hyperlinks and give you an index
of pages. This works well for searching the surface of the web, but the internet goes
much deeper, and there are many places that web spiders cannot enter.
What web crawlers are able to access is really only the tip of the iceberg, and no one
knows for sure how deep the iceberg goes. Most of big data is raw data that does not
include the hyperlinks that web spiders rely on to index sites. Library databases, websites
that password protected or have time-limited access, private networks of organizations,
and websites that are new are all excluded from search engine results. These pages are
not necessarily inaccessible, but a typical web user is not aware of their existence, or
where to find them, so they do not have access to the sites.

http://www.brightplanet.com/2012/06/what-is-big-data/
http://www.brightplanet.com/2012/06/structured-vs-unstructured-data/

Structured vs Unstructured Data


Of course; if it was possible or feasible to instantly transform unstructured data to
structured data, then creating intelligence from unstructured data would be easy.
However, structured data is akin to machine-language, in that it makes information much
easier to deal with using computers; whereas unstructured data is (loosely speaking)
usually for humans, who dont easily interact with information in strict, database format.
Email is an example of unstructured data; because while the busy inbox of a corporate
human resources manager might be arranged by date, time or size; if it were truly fully
structured, it would also be arranged by exact subject and content, with no deviation or
spread which is impractical, because people dont generally speak about precisely one
subject even in focused emails.
Spreadsheets, on the other hand, would be considered structured data, which can be
quickly scanned for information because it is properly arranged in a relational database
system. The problem that unstructured data presents is one of volume; most business
interactions are of this kind, requiring a huge investment of resources to sift through and
extract the necessary elements, as in a web-based search engine. Because the pool of
information is so large, current data mining techniques often miss a substantial amount of
the information thats out there, much of which could be game-changing data if
efficiently analyzed.
Six Strategic business
Business firms invest heavily in information systems
to achieve six strategic business objectives:
1. Operational excellence
2. New products, services, and business models
3. Customer and supplier intimacy
4. Improved decision making
5. Competitive advantage
6. Survival
ONCICS

Six strategic businesses (p 10)


Differentiate - Info Tech, management info system
Green technology -> new product
Customer supplier intimacy -> logitech; making a website
How can they increase the intimacy

Netflix and Amazon


Improve decision making
Competitive advantage - Apple vs Samsung
Information vs data , raw data -> process, input - process - output

Set of interrelated components


Collect, process, store, and distribute
information
Support decision making, coordination, and
Control
Information vs. data
Data are streams of raw facts.
Information is data shaped into meaningful form.

Input: Captures raw data from organization or


external environment
Processing: Converts raw data into meaningful
form
Output: Transfers processed information to
people or activities that use it
Hireachy
3 Dimensions
Senior, middle, operational
UPS case study
The UPS Interactive Session, the companys package tracking systems
exemplify their commitment to customer service and putting the customer
First.
Dimensions of UPS tracking system
Organizational:
Procedures for tracking packages and managing
inventory and provide information
Management:
Monitor service levels and costs
Technology:
Handheld computers, bar-code scanners, networks,
desktop computers, and so on

Chapter 4
Many Web sites today have more than one hundred tracking programs
(bugs) on their home page.
5 moral dimensions of the information age

- Information rights and obligations


Property rights and obligations
Accountability and control
System quality
Quality of life
Information rights - privacy
- Inet challenges to privacy : cookies ( what is it?, how it works?)
Property rights : trademarks : differentiate
Accountability
Data quality and system error -> difference between IT firms and non..
Health risks
Site privacy policy
DMCA ( Digital Millenium Copyright Act)
FTC privacy
Cookies

Identify browser and track visit

Web beacons (Web bugs)


Tiny graphics embedded in e-mails and Web pages
Monitor who is reading e-mail message or visiting site

Spyware
Surreptitiously (Secretly) installed on users computer
May transmit users keystrokes or display unwanted ads

Chapter 6
File org concepts - database
Attribute apa, hierarchy
Problem with traditional file environment
Logical vs physical data?
Relational database management system
Differentiate DBMS and ..
Operations of a relational DBMS - select, join, project
Normalization
What is data warehouse, datamarts? Differentiate it? Discuss?
What is data mining, web mining

Chapter 7 - Telecommunication
Circuit and Packet switching - differentiate

Packet switching
Method of slicing digital messages into parcels
(packets), sending packets along different
communication paths as they become available, and
then reassembling packets at destination
Previous circuit-switched networks required assembly
of complete point-to-point circuit
Packet switching more efficient use of networks
communications capacity
Data are grouped into small packets, which are transmitted independently over various
communications
channels and reassembled at their final destination.

TCP/IP and connectivity


Protocols: rules that govern transmission of information
between two points
Transmission Control Protocol/Internet Protocol (TCP/IP)
Common worldwide standard that is basis for Internet

P. 18 layers
TCP/IP
Network, internet, transport, application layer
Note that what happens, when computer A sends a message to computer B, is that
the data that computer A creates is transferred within that computer from the
application layer to subsequent layers in sequence.
In this process it is split into packets, and information is added at each stage,
ultimately translating the packets into a form that can be transferred over the
network interface. After traveling over the network interface, the packets are
reassembled at the recipient computer, from the network interface layer up,
ultimately for use by the application layer.
P. 20 WAN, LAN

Types of networks
Local-area networks (LANs)
Ethernet
Client/server vs. peer-to-peer
Wide-area networks (WANs)
Metropolitan-area networks (MANs)
Campus area networks (CANs)

http://www.diffen.com/difference/LAN_vs_WAN

What is a LAN?
Local area networks (LANs) allow computers and devices that are near each other
and usually making use of the same switch or router to connect to share files and
complete tasks. Consisting only of everyday devices (e.g., desktops, laptops, tablets,
printers), router and/or switch, and Ethernet cables or wireless cards, LANs are
relatively inexpensive to set up and are commonly used in homes.
Ethernet cables, like the Cat5, Cat5e, and Cat6 and Cat6a, can be used to physically
connect computers to the network. In the instances where fiber-to-the-home (or
similar) is available, copper cabling may also be used at some point. Wi-Fi has
become one of the most popular methods for wireless networking over a local
network.

What is a WAN?
A wide area network (WAN) is used to connect computers that are not close to one
another. It is possible and almost always the case that LANs are connected to
WANs. This enables small home or office networks to connect to wider networks,
such as those across state or country lines. Most WANs connect through public
networks, like the telephone system, or via leased lines. The Internet, which connects
computers all around the world, can be considered the largest WAN in existence.

A router is a more sophisticated device than a switch. Traditional routers are designed to
join multiple area networks (LANs and WANs). Routers serve as intermediate
destinations for network traffic. They receive TCP/IP packets, look inside each packet to
identify the source and target IP addresses, then forward these packets as needed
toensure the data reaches its final destination.
A network switch is a small hardware device that joins multiple computers together
within one local area network (LAN). Switches are incapable of joining multiple
networks or sharing an Internet connection. A home network with a switch must
designate one computer as the gateway to the Internet, and that device must possess two
network adapters for sharing, one for the home LAN and one for the Internet WAN. With

a router, all home computers connect to the router equally, and it performs the equivalent
gateway functions.

Wired vs. Wireless Speeds


Wirelessly transferring data via Wi-Fi significantly slows down transfer speeds, as
typical wireless technology has a theoretical maximum speed that is lower than a
wired connection's theoretical maximum speed.[1] Wireless connections will also
likely feel less reliable, as wireless signals may experience interference from other
devices' signals, from separating walls, from radio waves, etc. If consistent high
speeds are needed within a LAN or WAN, particularly for business or gaming
purposes, one should be physically connected to the network.
It is worth noting, however, that wireless technology has begun to "catch up" to
wired technology in recent years. While the most reliable, high-speed connection is
still one that is wired, wireless technology will likely feel just as comfortable for the
average user.
Physical Transmission Cable, fibre optics
Wireless
What is DNS? Convert Ip to domain names
The Domain name system (DNS)
Converts IP addresses to domain names
Hierarchical structure
Top-level domains
IPv4 vs IPv6
domain name system makes it
possible for people to remember addresses
INet services -> email, chatting , www, ftp, etc
Voice-over IP - what is this?
Benefit to a company

Voice over IP (VoIP)


Digital voice communication using IP, packet switching
Providers
Cable providers
Google, Skype

A VoIP phone call digitizes and breaks up a voice message into data packets that may
travel along different routes before being reassembled at the final destination. A processor
nearest the calls destination, called a gateway, arranges the packets in the proper order
and directs them to the telephone number of the receiver or the IP address of the receiving
computer.

Definitions

data
raw facts

information
collection of facts organized in such a way that they have value
beyond the facts themselves

What is the value of information?

its directly linked to how it helps deciison makers achieve their


organization's goals

What is an Information System?

A set of interrelated components that collect, manipulate, store,


and disseminate data and information and provide feedback to
meet an objective (THIS PROCESS COULD BE MANUAL
OR COMPUTERIZED)

hardware

computer equipment used to perform input, processing, and


output activities

software

computer programs that govern the operation of the computer

database

an organized collection of facts and information, typically


consisting of two or more related data files

telecommunications

the electronic transmission of signals for communications which


enables organizations to carry out their processes and tasks

people

the most important element in most CBIS; includes people who


manage, run, program, and maintain the system

procedures

includes the strategies, policies, methods and rules for using the
CBIS; procedures for operations, maintenance, security

What is systems development?

The activity of creating new business systems or modifying


existing business systems using internal or external resources

What are the 5 Systems Development


Stages?
Investigation, Analysis, Design, Implementation, Maintenance
& review IADIM

Organization

a formal collection of people and other resources established to


accomplish a set of goals

value chain

a series of activities that includes inbound logistics, warehouse


& storage, production, finished product storage, outboun
logistics, marketing & sales, and customer service

organizational culture

major understandings and assumptions of a business or other


organization

organizational change

how organizations plan for, implement, and handle change

technology diffusion

a measure of how widely technology is spread throughout an


organization

technology infusion

is the exten to which technology permeates an area or


department

technology acceptance model TAM

specifies the factors that can lead to higher acceptance and


usage of technology in an organization

competitive advantage

a significant and (ideally) long-term benefit to a company over


its competition

Factors that lead firms to seek


competitive advantage

rivalry among existing competitors, threats of new entrants,


threat of substitute produts and services, bargaining power of
customers, bargaining power of suppliers (cost efficiency is
generally not a motive for seeking competitive advantage)

three stages in the use of "IS"

cost reduction and productivity, competitive advantage, and


performance based management

Performance is used to evaluate the


contributions (value & cost) of the IS
(six phases)
Productivity= (Output/Input) * 100 OI
Return on Investment (ROI)
Earnings growth
Market Share
Customer Awareness and satisfaction
Total Cost of Ownership

Roles, Functions, and careers in "IS"


Executive management, Operationss, Systems Development,
Support

A computer is a device that

Accepts input, Processes data, Stores data,Produces output

A computer system includes

Hardwarethe physical components


Softwarethe programs or lists of instructions

Architecture or configuration means


is the design of the computer (what the computer consists of)

Specification

is the technical detail about each component (how fast is the


printer)

Types of computers

Hand-held
Portable (Laptop, Notebook, Tablet)
Thin Client
Desktop
Workstation
Servers
Mainframes
Supercomputers

Input devices

Keyboard
Mouse
Other Pointing Devices
Wireless pointer

Touch pad
Track ball
Microphone
Digital Camera
Scanner
Touch sensitive screens
Bar-Code Scanners
Optical Data Readers
Point-of-Sale (POS) Devices
Magnetic Ink Character Recognition (MICR) Devices

Hardware (types)
Input devices
Output devices
Processing hardware
Storage devices

Hardware (output)
Monitors
Printers
Plotters
Speakers

Monitors
Screen Size
Resolution
Dot Pitch

Printers
Laser
Ink-jet
Dot Matrix

Eight bits is a byte. Each byte


represents a unique character.
How many are there?
Kilobyte (KB) is about one thousand bytes
Megabyte (MB) is about one million bytes
Gigabyte (GB) is about one billion bytes
Terabyte (TB) is about one trillion bytes

What are the two most important


components of personal computer
hardware?
Microprocessor (CPU) and the memory *both directly affect the
price and performance

What is the microprocessor or CPU


is an integrated circuit or chip on the main circuit board inside
the computer. It is made up of:
Arithmetic/logic unit (ALU)
Control unit
Its speed is determined by:
Clock Speed/Machine cycle
Word size or Wordlength
Physical characteristics (distance and resistance

Ram

Random Access Memory) is temporary memory that is


constantly changing while the computer is on.

Rom

Read-Only Memory) is the permanent storage location for a set


of instructions the computer uses.

Types of processing

Multicore microprocessor - combines two or more independent


processors into a single computer so they can share the
workload
Parallel processing - A form of multiprocessing that speeds
processing by linking several processors to operate at the same
time, or in parallel.
Grid computing - use a collection of computers often owned by
multiple organizations, to work in a coordinated manner

Storage Access Methods

Sequential Access - The retrieval method in which data must be


accessed in the order in which it is stored. (tape drives)
Direct Access - The retrieval method in which data can be
retrieved without the need to read and discard other data.

SAN (Storage Area Networks)

The technology that provides high-speed connections between


data-storage devices and computers over a network

RAID (Redundant Array of Independent


Disks)

A method of storing data that generates extra bits of data from


existing data, allowing the system to create a "reconstruction
map" so that if a hard drive fails, the system can rebuild lost
data.

What is software?

is the instructions and data that direct the computer to


accomplish the task. It can refer to a single program or a
package

System software

helps the computer carry out it s basic operating tasks.

Application software

helps the user carry out a variety of tasks.

Systems Software Operating Systems


Perform common computer hardware functions
Provide a user interface
Manage system memory
Manage processing tasks
Provide networking capability
Control access to system resources
Manage files

Application software examples


Personal Productivity Applications
Workgroup Applications
Enterprise Applications

Database Heirarchy from biggest to


smallest
Database, files, records, fields, character

Data Modeling Key Considerations


Content - What data should be collected, and at what cost?
Access - What data should be provided to which users and
when?
Logical structure - How should data be arranged so it makes
sense to a given user?
Physical organization - Where should data be physically
located?

Manipulating Data

Selecting - data manipulation that eliminates rows according to


certain criteria

Projecting - data manipulation that eliminates columns in a table


Joining - data manipulation that combines two or more tables

Database Management Systems

A group of programs that manipulate the database and provide


an interface between the database and its users and other
application programs.

What is a DBA (database administration)

the role of the database administrator (DBA) is to plan, design,


create, operate, secure, monitor, and maintain databases
Selecting a DBMS
Size
Cost
Number of Users
Performance
Integration
Vendor

Data Warehouse
a database that collects business information from many sources
in the enterprise, covering all aspects of the company's
processes, products, and customers.

Data Mart

a subset of a data warehouse

Data Mining

an information analysis tool that involves the automated


discovery of patterns and relationships in a data warehouse.
Bottom-up approach

Online Analytical Processing (OLAP)

the software that allows users to explore data from a number of


different perspectives. Top-down approach.

Business Intelligience

Gathering enough of the right information in a timely manner


and usable form and analyzing it to have a positive impact on
business strategy, tactics, or operations

Competitive intelligience

a continuous process involving the legal and ethical collection


of information about competitors, its analysis, and controlled
dissemination of information to decision makers

Counterintelligience
the steps an organization takes to protect information sought by
"hostile" intelligence gatherers

Knowledge Management

the process of capturing a company's collective expertise


wherever it resides, and distributing it wherever it can help
produce the biggest payoff

Character Level Formats

Font
Font size (point size)
Font color
Bold Italicize Underline Strikethrough Superscript/ subscript

Paragraph Level Format

Alignment
Indentations
Left, Double, First, or hanging indent
Tabs
Line Spacing

Document level formats

Margins, paper size, paper orientation, vertical alignment

Field (equals what?)

describes the entity; an attribute or characteristic of the entity


(equals column)

Record (equals what?)

description of each entity; set of related field values


(equals row)

Table

collection of fields and group of related records

Database

collection of related tables and other objects

What are two parts of a table?


1) Structure 2) Data

Primary Key

in the main table


field value must be unique
field value is required

Foreign Key

in the related table


field value is not necessarily unique
field value is required

Вам также может понравиться