IT 342 Loyola University of Chicago Network Layer and Enterprise Systems Essay

User Generated

fnybzbaqeva12

Humanities

IT 342

Loyola University of Chicago

IT

Description

Page 1

A reflection paper based on what you learned in class, what you enjoyed and what you didn't.

Unformatted Attachment Preview

Reflection Essay You are required to submit a reflection essay at the end of the course by date listed in COL. What I am looking for is personal reflection about insights you’ve gained from the course. • I am not looking for you to repeat back to me factual material we covered. • I am not looking for you to tell me what you think I want to hear. • I am not looking for compliments about how great the course was (unless you genuinely feel that way.) • I am not looking only for constructive criticism about the course in this reflection (although I am happy to accept it); • This document should be based on YOUR OWN reflection, not on reflection of what I should have done differently. • I am looking for you to take some time to reflect on what you will take away from this class in terms of the website assignment as it applies to enterprise technologies. • I am looking for you to reflect on insights that came from your readings, the blogs, the class presentations or guest speakers. I am interested in how you anticipate utilizing these insights in future classes or your work. There is no maximum or minimum word limit. Most good essays are 1,200 to 1,500 words—some longer; longer is better than shorter as long as you have something insightful to say—merely filling pages won’t do it. As always, I care about the quality of writing (spelling, grammar, usage.) Reflection essay should be submitted on D2L. Please don't email them to me; emailed assignments tend to get lost. NOTE: Your Final Exam will ONLY be released to you after you submit your reflection essay on D2L. I recommend that you begin to keep a personal journal or log early in the course. Put into it your reflection related thoughts. If you do this, the essay will pretty much write itself—and it will be a much better document than if you sit down and try writing it from scratch with a deadline. ECT 424/IS 324 Class 3 Network Layer, and Internet & Enterprise Systems 1 Recap  Last week we explored  Layer 2 (OSI Model) – Ethernet LANs, wireless LANs and were getting started on WAN services 2 How do I connect my locations into an Enterprise?  If we run local systems on Local Area Networks  We connect widely separate networks with a Wide Area Network 3 What is a WAN 4 ©Cisco 2010 WAN Physical Layer Terms 5 ©Cisco 2010 WAN Options 6 ©Cisco 2010 WAN Options 7 ©Cisco 2010 WAN Protocols Serial Line Internet Protocol High Level Data Link Control Point to Point Protocol Asynchronous Transfer Mode 8 ©Cisco 2010 Do we have a universal standard for communication at the lower layers of the model outside the enterprise? Frame Relay, MPLS (multi protocol label switching), Metro Ethernet, DSL, PPP, ATM 9 Leased Lines  Dedicated point to point links  Cost is determined by capacity of the link and the distance from the end points  Inflexible, and expensive  You pay for the link, whether or not data is travelling at link capacity  Highly secure as your data is only stuff on the link 10 Types of T-Carriers – Leased Lines Table 7-1 Carrier specifications T1 use • Connects branch offices, connects to carrier • Connects telephone company COs, ISPs • Costs vary per region but a rough ballpark about $1000- $1500 per month T3 use • Data-intensive businesses • Costs also vary but can range form $10K-$30K (or even more) per month • T3 provides 28 times more throughput 11 • Multiple T1’s may accommodate needs T- Carrier  How much throughput do I need?  T1: good for about 25 users doing regular office work (~5 power users)  Bundle T1s to increase capacity  T3 (28 T1s): ~600 regular users, ~150 power users 12 Circuit Switching is when two nodes establish a dedicated communication channel for the duration of a session. The Public Switched Telephone Network (PSTN) uses this (well, used to). Packet Switching is when information is sent across shared channels inside of blocks (or packets). The Internet uses this. 13 Circuit vs Packet • Circuit is DEDICATED and SESSION BASED • Circuit goes via dedicated path 14 ©Cisco 2010 • packet IS BLOCKS OF DATA (think internet) • Packet finds the shortest distance through the network Circuit Switching  Connection established between two network nodes  Before transmitting data  Dedicated bandwidth  All Data follows same path selected initially by switch  Monopolizes bandwidth while connected  Resources wasted  Uses  Live audio, videoconferencing  Home modem connecting to ISP 15 Packet Switching  Most popular  Breaks data into packets before transporting  Packets  Travel any network path to destination  Find fastest circuit available at any instant  Need not follow each other  Need not arrive in sequence  Must be Reassembled at destination  Requires speedy connections for live audio, video transmission 16 Packet Switching  Advantages  No wasted bandwidth  Devices do not process information  Examples  Ethernet networks  Internet 17 Frame Relay Overview DCE or Frame Relay Switch Frame Relay Router CSU/DSU Provider network Ethernet LAN • Virtual circuit connections  One physical circuit  Multiple virtual circuits  Connection-oriented service  Permanent Virtual Circuit (PVC) 18 Frame Relay (cont.)  Address: Data Link Connection Identifier (DLCI), 10-bit, local significance.  CIR (committed information rate)  Guaranteed minimum amount of bandwidth selected when leasing a frame relay circuit  Can burst higher than CIR  Users get more than they pay for. 19 burst (512k) CIR (768k) MPLS  Multi-Protocol Label Switching  A more efficient way to forward and route packets  MPLS is a technique, not a service MPLS can be considered a Layer 2.5 networking protocol  Label Edge Router (LER)  Analyzes each packet on arrival to the MLPS network and puts on a wrapper which tells each router where to forward the packet without reading the header (just the wrapper) 84 % of companies with a WAN are using MPLS Label Traffic class/QOS/ECN TTL BOS 20 bits 3 bits 8 bits 1 bit 20 MPLS Components 21 MPLS Network -How it works 22 MPLS – Outside Traffic movement  Best parts of circuit switch and packet switch  Uses Labels to select predetermined “routes”  Uses circuit-like techniques within ISP, and packet within Customer  Deploys VPN like features (customer packets remain “private” 23 Introducing a Software-Defined WAN (SD-WAN)  A WAN might be used, for example, to connect branch offices to a central corporate network, or to connect data centers separated by distance.  In the past, these WAN connections often used technology that required special proprietary hardware.  The SD-WAN movement seeks to move more of the network control is moved into the “cloud,” using a software approach 24 Advantages of an SD-WAN  SD-WAN can be used to improve and secure Internet connectivity, making it more competitive with more expensive legacy WAN technologies such as T-1 or MPLS  SD-WAN also has the advantage of removing potentially expensive routing hardware by provisioning connectivity and services via the cloud  SD-WAN technology can also be more flexible such as allowing customers to “scale up” during peak times (more about that in our cloud computing class)  SD-WANs are customer focused on cost, reliability and security 25 26 Edge modules  The enterprise edge module provides connectivity for voice, video, and data services outside the enterprise  An edge device primarily enables a local user to connect and transfer data to a network, which is external or is nonpropriety to the organization/user. An edge device serves as the entry point into a service provider, carrier or an enterprise primary network. 27 Edge modules (cont.) E-commerce networks and servers: • Remote access and VPN: • This submodule of the enterprise edge provides remote-access termination service, including authentication for remote users and sites. • Components of this submodule include This submodule enables enterprises to support ecommerce applications through the Internet. • Devices located in the e-commerce submodule include • • • • web, application database servers firewall and firewall routers network intrusion prevention systems (IPS). • • • • Internet connectivity and demilitarized zone (DMZ): • • • This submodule of the enterprise edge provides internal users with secure connectivity to Internet services such as public servers, email, and DNS. Connectivity to one or several Internet service providers (ISPs) is provided Devices located in this submodule include • • • • • firewall and firewall routers Internet edge routers FTP and HTTP servers SMTP relay servers DNS servers 28 Firewalls dial-in access concentrators Adaptive Security Appliances (ASA) Network intrusion prevention system (IPS) appliances. WAN: • The WAN submodule uses various WAN technologies for routing traffic between remote sites and the central site. • Enterprise WAN links include technologies such as • • • • • • • • • Multiprotocol Label Switching (MPLS) Metro Ethernet, leased lines Synchronous Optical Network (SONET) Synchronous Digital Hierarchy (SDH) PPP Frame Relay ATM Cable, digital subscriber line (DSL) wireless This week:  WAN design steps  WAN Topologies  Wireless WAN  WAN Services  HTTP  VPN  Remote Access  Layer 3 –  The Internet  IP Addressing with IPv4 and IPv6  Internetworks – getting from here to there  Layer 4  Ports  Enterprise Architecture Frameworks (if time permits)  Enterprise Systems (if time permits) 29 WAN Design Steps  Businesses install WAN connectivity to meet their strategic business requirement to move data between their remote (geographically diverse) branches.  WAN connectivity is important and expensive. Below are some simple steps one must take to design a WAN for the organization 30 Analyzing Traffic Patterns 31 WAN Connection Technologies 32 WAN topologies  A wide area network (WAN) is a network connecting geographically distinct locations, which may or may not belong to the same organization.  WAN topologies use both LAN and enterprise-wide topologies as building blocks, but add more complexity Why?  distance they must cover  the larger number of users they serve  the heavy traffic they often handle. 33 WAN Peer to Peer Topology  The WAN peer-to-peer topology is often the best option for organizations with only a few sites and the capability to use dedicated circuits 34 RING WAN  In a RING WAN topology, each site is connected to two other sites so that the entire WAN forms a ring pattern  Advantages of a RING WAN over a peer-to-peer WAN are?  a single cable problem will not affect the entire network  routers at any site can redirect data to another route if one route becomes too busy 35 STAR WAN  STAR WAN topology is similar to a STAR LAN. A single site acts as the central connection point for all other sites.  Advantage over Peer to Peer and RING WANs are?  It provides separate routes for data between any two sites  provides shorter data paths between any two sites 36 MESH WAN  A MESH WAN topology incorporates many directly interconnected nodes--like geographical locations. Because every site is interconnected, data can travel directly from its origin to its destination. If one connection suffers a problem, routers can redirect data easily and quickly.  Mesh WANs are the most fault-tolerant type of WAN configuration because they provide multiple routes for data to follow between any two points but of course there is a ???? to it! 37 Tiered Topology on WAN  Sites connected in star or ring formations are interconnected at different levels, with interconnection points organized into layers  flexibility makes the tiered approach quite practical. Tiered systems allow for easy expansion and inclusion of redundant links to support growth  Reminds you of a STAR-WIRED BUS LAN? Doesn’t it? 38 Type Rate Additional info 1.480Mbps ISDN 23B+1D (all 64K) ~ T1 ISDN: PRI(N America) xDSL: ADSL 640+Kbps up/ 1.544+Mbps down Asymmetric Digital Subscriber Line Nonmatching send/receive transmission rates SDSL 768Kbps Single Line Digital Subscriber Line VDSL 19.2Mbps up/51.84Mbps down Very high rate Digital Subscriber Line IDSL 128Kbps ISDN over low quality non-CAT5 copper Handy Bandwidth Chart T Carrier: T1 1.544Mbps 24 DS0 channels, equivalent to 1 DS1 T2 6.312Mbps 96 channels T3 44.736Mbps 672 channels T4 274.176Mbs 4032 channels DS0 64Kbps 1 channel, same rate in NA, Japan, and Europe DS1 1.544Mbps 24 channels (T1) DS2 6.312Mbps 96 channels (T2) DS3 44.736Mbps 672 channels (T3) DS4 274.176Mbps 4032 channels (T4) OC-1 51.48Mbps SONET - Synchronous Optical Network OC-3 155.52Mbps SONET - Synchronous Optical Network OC-12 622.08Mbps SONET - Synchronous Optical Network OC-48 2.4Gbps SONET - Synchronous Optical Network OC-192 9.6Gbps SONET - Synchronous Optical Network OC-256 13.1Gbps SONET - Synchronous Optical Network OC-768 40Gbps SONET - Synchronous Optical Network 10Base2 10MB/s Thin coax 607 feet (bus) 10Base5 10MB/s Thick coax 1640 feet (bus) 10BaseT 10MB/s Twisted Pair 328 feet (star) 10BaseF 10MB/s Fiber 1.2 miles (star) 100BaseT 100MB/s Twisted Pair Optical Carrier: Switched: 39 Common WAN Implementation Issues 40 Cisco©2010 Bigger is better?  Many companies rely on high speed data transfer between remote locations so it is imperative that they have higher bandwidth for more data to be transmitted at any given time.. ….However….  When bandwidth is inadequate or inefficiently managed, competition between the various types of data traffic will cause delay leading to lower employee productivity and monetary losses to the company 41 So what can be done besides a bigger pipe?…  So what else can we do to improve the capacity of the WAN? Answer:  Optimization  Virtualization 42 Other than bigger..  We can deduplicate the data on the WAN  A WAN optimization device with deduplication capabilities will have a local cache on both the sending and receiving ends of the connection. If either end calculates that the data has already been sent to the other site, then only the reference information - not the entire data set -- is sent. 43 Wireless WAN MAN, WAN 44 WMAN LTE (4G) 45 Point to Point Transmissions WMAN is also often called WIMAX 46 Line of Sight Issues:  Limited Distance  Weather is a factor 47  Wireless WAN- Also called "wireless broadband“, use cell towers to transmit a radio signal within a range of several miles to a moving or stationary device.  WWAN services are typically delivered by cellular service providers  4G LTE (Long Term Evolution) is the last evolution in wireless broadband (introduced December 2009)  5G has been introduced in Chicago as of May 2019. it uses 400 MHz of 28 GHz (millimeter wave) spectrum at 80 to 900 Mbit/s download WWAN 48 Other WAN Services 49 Remote Access  Provide access Provide access for remote locations and workers 50 ©Cisco 2010 Virtual Private Networks (VPNs)  VPN is a private network over a public network (internet). A VPN may or may not be IP-based. 51 ©Cisco 2010 VPN  My packet gets to the VPN enabled edge device  It takes my packet (encrypts it), puts it into an envelope and addresses the envelope to the edge device at the destination (using Ipsec mostly)  At the destination – edge device opens the envelope (throws it away), decrypts the packet and forwards within the network to final destination 52 Memo 2  What am I looking for?  What to do about our WAN infrastructure  Do some research  Is what we have adequate (I don’t think so)  What should we do (buy more, what kind, how much)  Change what we do (how, what techniques)  On the addition of a Sales site, what happens to your WAN recommendation if we host that at Hoffman Estates? Is there a better option? 53 Network Layer Protocol in use is Internet Protocol (IP) Originally developed for APRANET by the DoD in the early 1960s. Used by BITNET and other networks that make up the Internet. Address is the IP address, Data Unit is Packet 54 tryIPthis metaphor HowLets Does transmit packets? Header To: From: Text Data Text Data Text Data 55 IP Data Transmission 56 Internet Names and Addresses Internet Corporation for Assigned Names and Numbers (non profit) ICANN Address SO http://www.youtube.com/watch?v=IJY5xJKPhjA Regional Internet Registries ARIN www.arin.net Protocol SO Domain Name SO LACNIC AfriNIC APNIC RIPE 57 The Opte Project The Opte Project is a project that seeks to make an accurate representation of the extent of the Internet using visual graphics The internet in 2003 The internet in 2010 58 Source: http://www.opte.org/the-internet • The Opte project is a visualization of Internet routing paths • Each line is drawn between two nodes, representing two IP addresses. The length of the lines are indicative of the delay between those two nodes. IP Addresses  IP v4  Dotted quad (32 bits – 4 sets of 8 bits)  140.192.38.98  4.3 billion addresses  Ip v6  128 bits (8 sets of 4 Hex values [each Hex == 4 bits])  2001:0db8:85a3:0000:0000:8a2e:0370:7334 General unicast address format (routing prefix size varies) bits 48 (or more) 16 (or fewer) 64 field routing prefix subnet id interface identifier 60 Assigning IPv4 Addresses to Nodes  Public addresses  Static  Good for stuff that doesn’t move (printers, servers)  High management costs  Dynamic (DHCP)  Good for stuff that moves, can accommodate stuff that doesn’t  Better management  NAT (network address translation) with Private address  Allows me to use private addresses, swaps to public address as needed  Slows traffic 61 Addressing in IPv6  Slated to replace the current IP protocol, IPv4  Better security  Better address management (can be automated more easily)  Perhaps the most valuable advantage IPv6 offers over IPv4 is its promise of billions and billions of additional IP addresses through its new addressing scheme (128 bits)  Address format: F:F:0:0:0:0:3012:0CE3  000F:000F:0000:0000:0000:0000:3012:0CE3  8×(4×4))=128 bits  F:F::3012:0CE3 62 IPv6 – What you need to know  Much Larger address space!  Total IPv4 Space: 4,294,967,296 addresses (232 or 4.3Billion)  Total IPv6 Space: 340,282,366,920,938,463,463,374,607,431,768,211,456 addresses ( 2128 or 340 trillion, trillion, trillion) The white area is a monitor where each pixel is one ip (and the res is 105 pixels/ lin inch) – about the distance Sun to Saturn +200 mill miles If instead I said each pixel is the size of the full IPv4 address space (4.3 bill), how many of these is the IPv6 address space? My monitor would be 645 miles wide! 63 So we could assign an IPV6 address to EVERY ATOM ON THE SURFACE OF THE EARTH, and still have enough addresses left to do another 100+ earths. IPv6 Address Construction  All start with 2001  Get /48 address/site Party responsible for the value of GRP 64  Link Local Addressing in IPv6  similar to the unicast address in IPv4-a single address identifying a single interface  Type of IPv6 address that represents a single route on a device used for single subnet, start with fe80:  Similar to NAT address space, but now each org can have their own  Multicast address  Multicast in IPv6 is similar to the old IPv4 broadcast address  Type of address in IPv6 that represents multiple routes, often on multiple nodes  No Broadcast address  Anycast address  Type of address specified in IPv6 that represents a group of routes, any of which can accept a transmission  NOTE: No broadcast addresses are used 65 Stateless auto configurations Allows the various devices attached to an IPv6 network to connect to the Internet without requiring any intermediate IP support in the form of a Dynamic Host Configuration Protocol (DHCP) server.  Router advertises  Top 64 bits  Lower 48 host gen from MAC (plus a special filler FFFE)  00:0a:95:f5:24:6e  20a:95ff:fef5:246e (lower 64)  DHCPv6 is used for DNS and GW 66  Done with Dual Stacking protocols * preferrerd or  6to4 tunneling 67 IPv6 Security  Better  Can use Authentication Header and IPSec  Provides for both data security and integrity because it encrypts traffic and checks packet integrity to provide VPN-like protection for standard Internet traffic. 68 IPSec Choices Even though the IPv6 standards have mandated support for IPSec; note that IPSec by itself can not stop all attacks against the IPv6 protocol, such as application-level attacks. 69 The Internet is not the WWW • The Internet is a massive network of networks, a networking infrastructure. It connects millions of computers together globally. • The World Wide Web, or simply Web, is a way of accessing information over the medium of the Internet. It is an information-sharing model that is built on top of the Internet. It is simply one application that runs over the Internet 70 History of Internet  Started 1960s - Packet Switching  Research project by U.S. Dept. of Defense  ARPAnet  USENET  WWW Linklider Cerf Often called the “poor man’s ARPAnet” Was like a bulletin board 71 Gore World Wide Web  1989 Tim Berners-Lee developed concept of HTTP  1992 Lynx text browser  1993 Marc Andreessen developed Mosaic: First GUI browser  1995 Web went commercial (March)  1995 Netscape IPO (went public) (Nov)  2001 E-Commerce stocks crashed  2003 “Web2.0” coined (O’Reilly) 72 Tim Berners-Lee Marc Andreessen Eric Bina A little History  This is the first HTTP based web page http://www.w3.org/History/19921103-hypertext/hypertext/WWW/TheProject.html How does the WWW work? news.com amazon.com cnn.com chicago.com yahoo.com Servers Nodes depaul.edu microsoft.com Router 74 Internet Connections – NAP/IXP 75 IXP and ISP 76 International IXP 77 http://www.telegeography.com/research-services http://www.bgp4.as/internet-exchanges Global Fiber Links 78 http://www.telegeography.com/research-services 79 http://www.telegeography.com/research-services NETFLIX is now the largest source of internet traffic in the United States http://www.telegeography.com/research-services 80 Global Internet Access 81 http://cloudscorecard.bsa.org/2013/assets/images/worldmap_redone.jpg Today, I want to explain how a browser gets a web page heh heh heh 82 1. Browser says…  “I am interested in being served the information in a particular file” and sends a URL to a text address (with a default port) and with a specific file name http://www.this-is-a-site.com/gimme.html http://www.this-is-a-site.com:80/gimme.html At this point, the easiest way to think of a port is as an apartment number in an apartment building, or a mailbox at your local post office 83 URL: Universal Resource Locator  Four parts to each one (some parts optional)     Protocol Domain name or server IP address Director(ies) File name [suffix is important to the server] http://www.cdm.depaul.edu/Pages/default.aspx Protocol Domain Name Directory 84 File Name Each Computer has an IP Address 126.1.1.1 15.35.200.2 126.12.1.1 126.12.1.6 15.35.200.1 126.12.1.5 132.12.1.5 132.12.1.7 132.12.1.6 126.12.1.7 126.12.1.2 126.12.1.3 126.12.1.4 132.12.1.2 245.12.50.6 132.12.1.4 245.12.50.9 152.123.200.1 245.12.50.8 132.12.1.3 152.124.20.8 152.124.20.6 15.35.200.3 152.124.20.7 132.12.1.1 245.12.50.7 245.12.50.5 172.11.11.16 172.11.11.14 152.124.20.2 152.124.20.5 152.124.20.3 152.124.20.4 146.182.5.5 145.12.50.1 172.11.11.15 146.182.0.1 172.11.11.10 146.182.0.7 146.182.0.2 146.182.0.3 146.182.0.4 172.11.11.11 172.11.11.7 172.11.11.2 146.182.0.5 172.11.11.3 172.11.11.12 172.11.11.8 146.182.0.6 172.11.11.1 172.11.11.6 172.11.11.4 172.11.11.5 85 172.11.11.9 172.11.11.13 2. URL goes to a DNS  Device calls a Domain Name Server to translate text URL into a numeric IP address. www.this-is-a-site.com = 128.142.112.108 If the DNS does not know the site, it forwards the text URL upstream to a DNS that does know it. If no DNS can report the IP address, then an error message is returned. 86 IP addresses are translated as Domain Names news.com amazon.com cnn.com chicago.com yahoo.com www.chicago.com www.cti.depaul.edu www.yahoo.com www.microsoft.com depaul.edu microsoft.com 87 www.depaul.edu  International Domains  com Usually a company or other commercial institution or organization, such as www.ibm.com  net Gateways and other administrative hosts for a network  org A private organization, such as www.greenpeace.org  biz Similar to .com  US Only  edu An educational institution, such as www.depaul.edu  gov A government site, such as www.irs.gov  mil A military site, such as www.af.mil (Air Force)  Each country also has its own top-level domain  au Australia; ca Canada; fr France; uk The United Kingdom. These also have sub-domains of things like ac.uk for academic sites and co.uk for commercial ones  me -- country code for Montenegro  tv -- country code for Pacific Island country of Tuvalu Names are managed by ICANN 88 Domain Name Server www.yahoo.com (Domain Name) 64.58.76.223 (IP Address) 89 Iterative/Recursive 90 3. HTTP Packet goes to a Router  Gateway Server sends the HTTP packet (a packet of information) upstream into the Internet. It hits a router. This is a PACKET of information The router acts as a traffic cop and determines the best possible route for the packet. It then sends the packet along that path to the next router. And so on until it reaches its destination. 91 Routing Table R2 address table for R1 and R3 92 126.1.1.1 15.35.200.2 126.12.1.1 126.12.1.6 15.35.200.1 126.12.1.5 132.12.1.5 132.12.1.7 132.12.1.6 126.12.1.7 126.12.1.2 126.12.1.3 126.12.1.4 132.12.1.2 245.12.50.6 132.12.1.4 245.12.50.9 152.123.200.1 245.12.50.8 132.12.1.3 152.124.20.8 152.124.20.6 15.35.200.3 152.124.20.7 132.12.1.1 245.12.50.7 245.12.50.5 172.11.11.16 172.11.11.14 152.124.20.2 152.124.20.5 152.124.20.3 152.124.20.4 145.12.50.1 146.182.5.5 172.11.11.15 146.182.0.1 172.11.11.10 146.182.0.7 146.182.0.2 146.182.0.3 146.182.0.4 172.11.11.11 172.11.11.7 172.11.11.2 146.182.0.5 172.11.11.3 172.11.11.6 172.11.11.4 172.11.11.5 This really happens hop to hop! 93 128.142.112.108 172.11.11.8 146.182.0.6 172.11.11.1 172.11.11.9 172.11.11.13 4. HTTP Packet hits destination IP  Assuming no error, the computer at the destination site receives the packet. It determines which port to allow the packet in. If a port is explicitly specified, that port is used. If not, if there is an HTTP prefix, port 80 is assumed. A word about Firewalls 94 FW and DMZ SW1 R1 HQ 95 Ports Some Common “Well-Known” Ports Number Description 20 FTP – Data 21 FTP -- Control 22 SSH Remote Login Protocol (secure) 23 Telnet Remote Login Protocol (unsecure) 25 Simple Mail Transfer Protocol (SMTP) Each of the services operate at a specific location • Called a Port • Operates at the Transport Layer of the OSI/TCP model 96 53 Domain Name System (DNS) 80 HTTP 110 POP3 143 Interim Mail Access Protocol (IMAP) 156 SQL Server 194 Internet Relay Chat (IRC) HTTPS (http over secure socket layer, not the 443 same as s-http) 458 Apple QuickTime 5. Packet is given to WebServer  An HTTP packet is handed to the WebServer software (via port 80) or to the service requested by the port in the packet.  The WebServer software parses the packet and decides what to do with it. It has lots of decisions to make. 97 6. Parsing Process HTTP://www.this-is-a-site.com/gimme.html         IF there a file name at the end THEN IF the suffix is .htm or .html THEN traverse directories, find file, send file ELSE IF suffix is .asp (or similar) THEN send to program to interpret URL data ELSE IF exists THEN send the default file in the directory ELSE send error message (404) 98 7. File is returned to the sending IP address (already in numeric form)  The file is likely broken into several packets, each sent separately. Each packet has a header with both the sending and receiving IP address. The packets may go different routes and arrive in a different order. A protocol is responsible for collecting them and putting them in order to be passed up to the requesting application. 99 Web Servers provide Services  WWW  This service hands out web pages, using HTML (or one of it variants)  Email  This service sends and receives email for the domain  FTP  The service handles the transfer of files to and from the server  Telnet  This service allows for remote connections to the server from a remote host  Each of these require a server (service) side (a daemon) and a client side (client) 100 HTTP  Most basic command is GET  This will cause the server to retrieve from its files the requested page  The GET will retrieve the full URL  http://www.cdm.depaul.edu/index.htm  This allows multiple sites to be located on the same machine  This is called virtualization, or shared hosting 101 What makes an Enterprise System?  A system that supports enterprise-wide (cross-function) requirements (rather than a single department or group within the organization)**  Generally, an enterprise system is one that would have a major impact on a business whether it fails or works.  The system architecture may have to include many entities (supply-chain, customers, prospects, stakeholders, non-clients, anti-clients, govt, community **Debatable 102 Every System Has These Parts Computer-based information systems are composed of:       Hardware (physical components) Software (programs of instructions) A Database (the information must be stored) A Network (connectivity to the world) Procedures (business rules for the system) People (users/roles for the system) 103 Information Systems Inside the Organization 104 Where does data start?  For an enterprise – it starts with transactions  These are the day to day interactions (sales) of the organization  There has to be a system in place to manage/monitor/complete the transactions  This is a Transaction Processing System (TPS) 105 Transaction processing systems  Most people think about mainframes when they think TPS  But TPS are alive and well  Think about buying things on Amazon, or doing Online Banking  These are all TPS 106 Relationships to other Systems Country 107 Characteristics of TPS  Rapid Response  Input must become output in seconds  Reliability  Failure is NOT an option  Inflexibility  Every transaction must be processed in the same way, standard operations  Controlled processing  Must support organization’s operations  Some examples of TPS are Invoice Processing Systems, Payroll Processing Systems, Ticket Reservation Systems, Purchase order entry forms 108 Components of TPS Hardware Software People 109  Types of TPS  Batch  Real-time  Manual 110 Thick vs. Thin client Net Operating Systems 111 2 Tier PAD (packet assembler/disassembler) Architecture Presentation Fat Client Application 112 Data Server PAD (packet assembler/disassembler) Model – 3 Tier Application Presentation Thin Client Server Server Data Server Start withPAD Model – 2 Tier 113 PAD (packet assembler/disassembler) Model – n Tier Presentation Thin Client Application Servers 114 Data Servers Underlying Technologies  LANs  Usually a thin client  Access to the servers housing the Business Rules of the Transaction Processing System (TPS)  Always a large Database server  Older models this is a single DB  WANs  Client is similar  Business Rules (application) is distributed (there is often a middleware component as well)  DB is distributed 115 Readings for this week Because IT systems have become unmanageably complex increasingly costly to maintain and because they are mission critical… Enterprise architecture methods help in reducing IT cost and complexity, while increasing business value and effectiveness  4 Enterprise Architecture Methods     Zachman Framework TOGAF (The Open Group Architectural Framework) Federal Enterprise Architecture Gartner/Meta Methodology 116 Enterprise Architecture  The field of enterprise architecture essentially started in 1987, with the publication in the IBM Systems Journal of an article titled "A Framework for Information Systems Architecture," by J.A. Zachman  Enterprise Architecture sought to address  System complexity where organizations were spending more and more money building IT systems  Poor business alignment where organizations were finding it more and more difficult to keep increasingly expensive IT systems aligned with business need.  The Zachman framework is a logical structure intended to provide a comprehensive representation of an information technology enterprise.  Although self-described as a framework, is actually more accurately defined as a taxonomy  It deals with each meeting point between a player's perspective (for example, business owner) and a descriptive focus (for example, data.)  Each player needs to know the what, how, where, who when and why but each focus is thought of differently by different players. 117 Zachman Framework 118 TOGAF The Open Group Architectural Framework • Although called a framework, is actually more accurately defined as a process. • TOGAF is an Architecture Development Method • Zachman tells you how to categorize your artifacts. TOGAF complements Zachman and gives you a process for creating them. Enterprise Architecture (as a supply chain) 120 Michael Porter* put all this together in: Porter’s Value Chain Model (Understanding How Value is Created Within Organizations) *Is a leading authority on competitive strategy and the competitiveness and economic development of nations, states, and regions. Professor at The Institute for Strategy and Competitiveness, based at the Harvard Business School. http://www.isc.hbs.edu/Pages/default.aspx Firm Infrastructure Technology and Product Development 122 Profit Human Resources Service Outbound Logistics Marketing & Sales Operations Inbound Logistics Procurement Firm Infrastructure Technology and Product Development 123 Profit Human Resources Service Outbound Logistics Marketing & Sales Operations Inbound Logistics Procurement Supply Chain Model is the oversight of materials, information, and finances as they move in a process from supplier to manufacturer to wholesaler to retailer to consumer. 124 Supply chain management flows can be divided into three main flows:  The product flow  The information flow  The financial flow product includes the The information involves financial flow flowflow consists of credit movement oforders goods from aand supplier transmitting and updating terms, payment schedules, to astatus customer, as well any the of delivery. consignment and title as ownership arrangements. customer returns or service needs. Supply Chain Systems track all three 125 Firm Infrastructure Technology and Product Development Human Resources 126 Profit Procurement Service Marketing & Sales Outbound Logistics Operations Inbound Logistics CRM What is the goal of CRM?  To gain insight into the behavior of customers and the value of those customers.  An effective CRM strategy will increase revenues by:  providing services and products that are exactly what customers want  Provide better customer service  cross sell products more effectively  help sales staff close deals faster  retain existing customers and discover new ones 127 Firm Infrastructure Technology and Product Development Human Resources 128 Profit Procurement Service Marketing & Sales Outbound Logistics Operations Inbound Logistics Enterprise Resource Planning System Enterprise Resource Planning defined • A business management system that integrates all facets of the business. • This includes: • • • • planning manufacturing sales marketing. 129 There are five major reasons why companies undertake ERP.      Integrate financial information Integrate customer order information Standardize and speed up manufacturing processes Reduce inventory Standardize HR information 130 Other important systems Decision Support System A computer application that analyzes business data and presents it so that users can make business decisions more easily. 131 Type of DSS  Expert Systems  Decision Analytic Systems  Executive Information Systems  Group Support Systems 132 Other important systems Unified Communications System Integrates real-time communication services with non-real-times services. Provides a single point of contact for communicators and a single data repository for communication artifacts. 133 Cisco, Microsoft, and others have UC products 134 IPT or VoIP?  VoIP is a component of IP Telephony.  IP telephony solutions look to provide the exact same services as a public switch telephone network (PSTN) or internal business telephone network, using internet technologies instead of traditional analog lines. 135 ©Cisco 2001 *IPT = IP Telephony Other important systems Portals and Intranets . An intranet portal is a central location for information and applications within an organization, presented in an electronic format 136 Intranets and Portals  Both Campus Connection and MyCDM are examples of Intranet Portals  Actually, CampusConnection is an ERP system with a Portal front end  Actually, MyCDM is a CRM system that also serves as a portal to other information 137 Lots of kinds of systems in the modern enterprise Many of them are migrating to the cloud 138 Further, there are significant complementary architectural changes occurring as well MVC Architecture Middleware Platforms Open Source *I’m talking about this here so you will have some background on what we are doing with WordPress 139 Model View Controller What it is, and why it is important  The Model – or a connector that stores information of each single table of a database. The model also does the validation of the data before it gets into the database. Most of the time you will find a table in the database and an relating model in your application. Model stores the FRAMEWORK of the database. It’s a model after all! Model View Controller What it is, and why it is important  The view – a website we actually see as viewers. Inside the view you will find (most of the time) HTML with embedded Ruby code. It performs tasks related solely to the presentation of the data. 141 Model View Controller What it is, and why it is important  The controller – small bits of code that gets information from the database and displays it to the view.  The controller knows how to process the data that comes from the model and how to pass it onto the view. 142 Model View Controller What it is, and why it is important  Separates  Database  Skin Design  Programming 143 Model View Contoller  Model  database tables (persistent data)  session information (current system state data)  rules governing transactions  View  (X)HTML  CSS style sheets  server-side templates  Controller  client-side scripting  http request processing  business logic/preprocessing 144 It is about Content Management Systems Systems that decouple architecture, data, and presentation so that each can be managed separately.  Architecture: a software framework for fast modular construction of a system  Data: information stored and organized independent of architecture; ability to change content without touching software  Presentation: an skin independent of architecture and data; ability to change skins 145 146 What does a CMS framework have?          Modularity Security Model Template/Skin/Theme also Language User/Role Model Media Management Taxonomy Workflow Model Content Distribution Management Front End / Back End Dashboard 147 Uses of a CMS          Blogs (and discussion forums) News and magazine style publishing Online books Social Networks Knowledge repository Portal Enterprise Document Management Enterprise Workflow Management E-Commerce site 148 And this is one reason Why. . .  We are building a form of CMS using WordPress (because it is easy and a good example of an MVC framework)  The message exchange environment we are using is a blog  We could have chosen a Wiki or a discussion board (used to call them bulletin boards or threaded discussions)  But we didn’t!! 149 For next class  Enterprise Data Center Issues Readings  Memo 1 is due to the Submission box. Be sure to both upload AND submit!! (if you don’t get an email it wasn’t submitted)  Web 2 is due (please be sure to upload a Word Readable doc with your url or put the URL in the comments part of the upload and upload a blank pdf.) 150 Memo 1 Activity  Given the handout, design the cabling for this company.  Consider the cable type, where it should go  Where will you put the Equipment Room, Demarc, AP? 151 Memo 1 Activity  This layout represents a clinic within a larger Hospital building. The clinic operates as a separate unit but is to be connected to the Hospital’s IT infrastructure. It will have its own Internet connection and WAN connection to its remote clinic location.  LAN Assignment:  1. Consider the LAN cabling options  a. must connect input stations in all treatment rooms, Dr. Offices, and other working spaces (incld Lab, Meds, Conference Rm)  b. must connect all phones for voip, same cabling  c. Must provide unsecured Internet access for patients at least in Wait Room  d. Must provide for secured wireless access for doctors in all areas of the clinic  2. Consider the location of the equipment room  a. will house all electronic health record servers (3)  b. will house all intermediary devices for the LAN and connection to WAN (remote clinic, Internet)  c. will serve as the connection to the Hospital IT system.  d. will serve as the DMARC point for WAN provider   Your group will recommend:  1. What type of cable you will use for connection within the clinic,  2. What type of cable for connection to Hospital system.  3. Placement of the wireless AP(s)  4. Placement of the equipment room 152  5. What other considerations are important in your decision. 153 1 RFP and SLA Class 6 2 Agenda • RFPs • SLAs • IT Governance 3 Housekeeping • Citations are required. At least two sources. You will lose points if you do not cite your work. • Your memos should be clear & easy to understand. ▫ ▫ ▫ ▫ ▫ ▫ Get your point across. Avoid run on sentences. List pros and cons. Describe the technology. Anita does not know IT! You have to convince her. Recommend and Justify, Justify, Justify! • Keep the amount of quoted material to a minimum please. I’m trying to assess your knowledge of the material, can’t do that when you over quote. Cite the source, restate in your own words. Memo 5 – Cloud Computing 4 (required memo for both IS324 and ECT 424) • This must have a Memo format cover page ▫ The memo body recommendation is what applications TRU should consider moving to the cloud (based on your white paper). • I want to know what your opinion is of the types of applications you think it makes sense for retail operations (like TRU) to consider moving to the cloud and why you think so. (examples are ERP, CRM, e-commerce, email, inventory management etc) • The background material will be in the general form of a “white paper.” 5 Memo 5 – Cloud Computing • On d2l there is a simple template for the white paper (in case you want to use it.) • To construct a White Paper; check out: • https://owl.english.purdue.edu/owl/resource/546/1/ 6 A Possible Problem Plagiarism • Note that in case I see an increase in the use of material not written by the submitter without proper quotation or citation. • I do, on occasion, use turnitin • This becomes a violation of Academic Integrity Policy and subject to dismissal from the university. • If it happens, I have the right to file an Academic integrity report. 7 Web Assignment 4 • Be sure to follow instructions carefully • Most common error – making only 1 Post for Web 4 – minimum of two are REQUIRED ▫ One can deal with the selection and installation of the theme ▫ One can deal with the selection and installation of the plugins and widgets ▫ When done you will have at least 3 of your posts on your Blog site (context, theme, widgets). 8 Discussion – Memo 4 – VDI • What did you learn about VDI? • What are the issues being discussed about it? • What part of TRU do you think could benefit from a VDI implementation? 9 VDI- Pros and Cons 1. Every desktop user can utilize the same image. • Pro: Having each user utilize the same image--the operating system as well as the installed applications--reduces administrative and support costs. • Con: You’ll need a unique image for each user who requires a different set of applications 2. Processing moves from individual workstations to a VDI server. • Pro: There’s no need to upgrade numerous PCs to meet the new OS’s minimum hardware requirements. • Con: VDI will require a major investment in server, storage, network. The total cost may be more than of procuring a basic PC for each user. 3. Maintaining a single OS image can reduce management and support costs. • Pro: Install applications, patches, and drivers once, and every user relying on that image benefits from the update. • Con: Administrators will need to learn the VDI software’s capabilities and limitations 4. When you encounter problems, you’ll generally have just one system to troubleshoot. • Pro: Problems can generally be resolved from within the data center; there’s no need to run out to the actual PCs • Con: Server-side problems can affect multiple users--everyone using that server or that image. For that reason, it’s a good idea to set up redundant servers. 10 RFI, RFP,SLA,ITGOV (alphabet soup) 11 Request for Information (RFI) • Used during Planning Phase • When can’t clearly define product requirements, specification or purchase options • Trying to ID products and services available • Use to collect information about capabilities of suppliers • Be sure that you state a contract will not automatically follow 12 RFI Best Practices • • • • • Use a standardized format (easier comparison) Be as specific as you can be Limit the request to information only Don’t request pricing Be considerate – this is a relationship building step • Give adequate time to respond RFPs 13 Harris, G. “Fundamentals of Purchasing”. AMACOM. © 2000 Request for Proposals 14 Request for Proposals (RFPs) • • • • • What they are Why they’re needed How they’re used Details of interest An Example 15 RFP: Definition • A document that requests bids or proposals from suppliers under specified conditions. • Typically written but can be oral also (not good practice) 16 Bid/Quote vs. Proposal • Bid/Quote: ▫ supplier submits a bid or quote when buyer interested in product specifications, price, and delivery terms • Proposal ▫ supplier submits a proposal when buyer is interested in how the supplier will approach the work, the specific tasks to be performed including, schedules, options in pricing, and when the buyer wants to negotiate the terms of the purchase. 17 Comparisons of Bids & Proposals Bid/Quote Proposal (more comprehensive) • • • • • • • • • • Products Specifications Delivery and Availability Fixed Prices Standardized Terms Off-the-Shelf, Standard Offerings • Prices • Simple Evaluation Criteria • Award on Price • • • • • Services Statements of Work Tasks and Schedules Fixed Prices, and Time and Materials or Cost Plus Standardized and Unique Terms Custom Offerings Total Costs Complex Evaluation Criteria Award on Price and Other Factors 18 How do you know when to use what? Verbal Buyer’s Solicitation In Writing Low $ amount; Simple Specifications; Low $ amount Quick Response Verbal Higher $ amount; Industry Standard Complex custom requirements and services In Writing Supplier’s Bid/Response When it doubt – write it out! 19 An Example of a Price Quote • Radiology Services from Sunquest • There is a document on D2L for this (readings section) 20 Written solicitations • Takes many forms including: ▫ e-mail, ▫ fax, ▫ hard copy letter, or some form of verbal communication ▫ Online submission ▫ HAVE DEADLINES!! 21 Business reasons to insist on written solicitations: • Protects both parties' interests • Provides a record of transaction for historical perspective • Ensures that suppliers receive exact information on bid requirements • Efficient use of buyer's resources • Buyer is able to include terms and conditions of purchase and seller can review applicable information. 22 Features of a Standard Solicitation 1. 2. 3. 4. 5. Statement of Work/Specifications Legal Terms and Conditions Business Conditions Due Date and Time for Response Evaluation Criteria (unless Award Is Made Solely on Cost and Availability) 23 I. Statement of Work/Specifications • Intended to ensure supplier has… ▫ ▫ ▫ ▫ technical ability, capacity, experience, and financial resources • …to perform the work 24 Buyer should include this type of language: • Supplier must provide data in its proposal regarding Sections ———— of this solicitation. Data includes stating its ability to perform, compliance with contract terms and conditions, and submission of requested plans and standards. Failure to comply with providing this data to buyer may result in buyer's decision, at its sole discretion, to reject the proposal and not consider it further. 25 Evaulate • Can you understand what is required? • Will a supplier understand what is required? • Will a supplier be able to submit a responsive bid? • Do the requirements unreasonably restrict competition? • Have you received an accurate estimate of the price of the product/service? • Do you agree that the description of the product and service favorably compares to the written estimate? 26 II. Legal Terms and Conditions 1. Warranties ▫ Time to repair or replace product or repeat service if work done not performed properly or if workmanship poor 2. Inspection and Acceptance ▫ How product/service to be inspected by buyer and terms of acceptance 27 II. Legal Conditions, cont’d 3. Indemnification ▫ Buyer may require supplier to indemnify the buyer against claims arising from suppliers actions or inactions including patent or copyright indemnities 4. Applicable Law ▫ Buyer indicates which state law applies to the purchase 28 II. Legal Conditions, cont’d 5. Disputes and remedies ▫ How these will be resolved and remedies available for seller non-performance 6. Termination ▫ Conditions under which buyer can cancel or terminate agreement 29 II. More Legal Conditions • 7. Changes ▫ Made by the buyer to form, fit or function after contract has been signed • 8. Risk Loss ▫ Must define the timing of transfer of title to the product and responsibilities of damage or loss 30 II. Even more Legal Conditions • 9. Assignment ▫ Possibility of assigning responsibilities to 3rd party w/o buyer’s consent • 10. Integration ▫ Only what’s written in the contract governs the relationship 31 II. Legal Conditions • 11. Insurance ▫ Buyer usually requires this if work is done at buyer’s site 32 III. Business Conditions • 1. Quality requirements ▫ buyer should indicate the overall quality requirements that will be placed on suppliers • 2. Inventory ▫ supplier may be asked to hold inventory on the buyer's behalf or consign inventory at buyer's facility 33 III. Business Conditions, cont’d • 3. Payment terms ▫ Addresses the point(s) at which the supplier will be paid • 4. Transportation method ▫ Buyer states whether the supplier has the option to use its own transport company, 34 III. Business Conditions, cont’d • 5. Shipping and Delivery Point ▫ Various shipping points are available including:  Seller's plant  Distribution Facility  Buyer's plant • 6. Technical Assistance ▫ Buyer needs in setting up and using products supplied 35 III. Business Conditions, cont’d 7. Installation ▫ Buyer will likely ask supplier to ensure product installed properly • 8. Delivery Schedule ▫ Specific delivery schedule and quantities of products or services 36 III. Business Conditions, cont’d • 9. Packaging ▫ Strength, material composition, inside and outside packaging • 10. Type of Contract ▫ Selected by buyer dependent on specification of the work and ability of supplier to develop accurate proposal 37 IV. Due Date and Time for Response • Proposal Development Time ▫ ▫ ▫ ▫ ▫ ▫ ▫ Complexity of requirement Length of agreement Standard versus custom needs Partnership or arms-length relationship desired Purchase order or contract terms Proposal submittal requirements Local or worldwide bid 38 V. Evaluation Criteria Two basic options: • Proposals can be evaluated based on purchase price and availability of product/service; or • Proposals can be evaluated using a number of factors, including price. This system includes weighting of criteria and measuring/rating proposals against meeting the criteria. 39 V. Evaluation Criteria, cont’d • Records of Past Performance ▫ Ask for references ▫ Ask for a current customer list ▫ Request samples from the supplier so that they can be evaluated ▫ Research the current experience with suppliers, and perhaps current bidders, in terms of delivery and quality performance ▫ Ask performance to provide data of feedback received from other customers 40 V. Evaluation criteria, cont’d • Other special conditions ▫ ▫ ▫ ▫ ▫ ▫ ▫ ▫ Buyer approvals Security Non-disclosure of proprietary information Level of effort (hours) Requirement for reports Software source code Bankruptcy rights On-site presence 41 Process 42 Best Practices: Writing Solicitations • Be ▫ ▫ ▫ ▫ ▫ Concise Consistent Considerate of time Accurate Thorough 43 RFP Example/Template • City of Bellevue, Washington for Miscellaneous IT Services • RFP template example (in word) • Posted on D2L (readings section) SLAs 44 Hiles, Andrew. E-Business Service Level Agreements: Strategies for Service Providers, ECommerce and Outsourcing. Rothstein Associates. © 2002 Service Level Agreements 45 SLAs • • • • • What they are Why they’re needed How they’re used Details of interest An Example 46 Internal vs External • SLA are not just external (with your providers) • Growing use internally (why?) ▫ Keeps IT honest ▫ Helps them ensure they are providing services their customers want and value ▫ Provides measures of success 47 Impacts Company Date Duration of Outage Losses, Costs AT&T Feb 1998 6-26 hours Rebates of $40m Charles /Schwab Feb-Apr 1999 6 – 26 hours Losses believed to be hours >$20m; $70m invested in infrastructure E-Bay June 1999 22 hours $3 – $5m; Shares: down 26% E*Trade February – March, 1999 >5 hours Revenues: $3m $Shares: down 22% Amazon April 2011 >13 hours Were there losses?! 48 Loss impact • In 2014 EMC Corporation surveyed 3,300 IT decision makers from across 24 countries in an effort to determine how well organizations are prepared to deal with incidents resulting in downtime and data loss. • According to the study, enterprises (organizations employing more than 250 people) have lost a total of $1.7 TRILLION!! in the past year due to downtime and data loss. • While the overall number of data loss incidents has decreased, the volume of lost data has increased by 400% over the last two years. 49 Definition • A Service Level Agreement (SLA) is an agreement between the provider of the computing service and the customers of it…. quantifying the minimum acceptable service to the user. 50 Why “an agreement”? • negotiation and commitment from both service provider and customer. 51 SLA should cover the following: • Purpose of SLA • Duration of agreement • Description of application or service • Service overview • Any corporate dependence • Priority • Impact and cost of outage 52 SLAs should cover: (2) • Traffic volumes ▫ standard day ▫ critical periods ▫ peak periods • Forecast utilization and growth/decline ▫ now ▫ projected growth or decline in 6 months ▫ projected growth or decline in 1 year and as far forward as is practicable 53 SLAs should cover: (3) • Cache / storage requirements ▫ physical access control ▫ logical (systems) access control ▫ back-up ▫ disaster recovery and contingency planning • Any Value Added / Managed Services 54 SLAs should cover: (4) • Service levels (e.g. availability, reliability, response, latency with definitions) • Scheduled downtime (if any) • Support hours ▫ help desk ▫ technical support ▫ customer account management arrangements 55 SLA should cover: (5) • Problem escalation procedure ▫ Technical ▫ Managerial ▫ ▫ ▫ ▫ ▫ ▫ ▫ ▫ ▫ Charging arrangements Change control Service level measurement Customer Satisfaction Monitoring actual service level against SLA targets Service level reporting Penalties for failure Arbitration and mediation arrangements Arrangements for customer/supplier review meetings  Contacts (inside and outside normal working hours) ▫ Duration of agreement ▫ Review / renegotiation arrangements 56 Service Quality (in SLA) • • • • Times Service Availability Service Reliability Delay, response, latency, lead time 57 A concept: Uptime/Availability • The proportion of the time or when the function and facilities provided are actually available as a % of scheduled. • Could be expressed as actual times or as: ▫ 24/365 ▫ from xx.xx hours to xx.xx hours on specified days ▫ at xx.xx hours on specified days http://www.internettrafficreport.com/details.htm 58 What does it mean in real time? Up Time % Down Percent # days #hours 98.5 1.5 5 120 99 1 3.65 87.6 99.5 0.5 1.825 43.8 99.75 0.25 1 22 99.9 0.1 .365 9.75 99.95 0.05 .1825 4.38 99.99 0.01 .0365 1 hour (over 365 days) 99.99% uptime over a 30 day month is 4.32 min of down time 59 60 Other concepts: Delay • Delay or Response is the elapsed time for a packet to be passed from the sender, through the network, to the receiver. • Increased delay is characterized by lack of response of the application or system. • Typically host and database processing time is excluded from response measurement 61 Other concepts: latency • An aspect of response or delay. • Latency is the amount of time it takes to transmit a single piece of data from one location to another. • In one SLA it was defined as: The Network Transit Time for a 128-character-length package (a "Packet") — i.e., a single trip. • But it is more usually expressed as round-trip delay 62 Other concepts: Jitter • Jitter is the variation in endto-end transit delay. • High jitter is not tolerable in some real-time activities such as audio or video transmissions, where it creates distorted reception. 63 Jitter explained 64 Other concepts: Bandwidth • Bandwidth is the maximum data transfer rate that can be sustained between two end points. • Bandwidth limitations arise from constraints within the network infrastructure and the traffic on it. 65 Other concepts: Reliability • Reliability is normally defined as packet loss. • It may also apply to packets delivered in the wrong order. In audio and video transmissions, packet loss is identified by the sound or picture breaking up or moving jerkily. 66 More on Reliability • Also defined as the number of unscheduled outages of service ▫ preferable to have as few outages as possible ▫ in some cases it might be better not to suffer a single long outage but to have more, but shorter, outages 67 Feature: E-Commerce & SLAs Application $000s/hour Brokerage Operations $6,000 Credit Card Authorization $2,500 Pay-per-view $145 Home Shopping $110 Catalog Sales $110 Airline reservations $100 Teleticket sales $70 Package shipping $25 Source: Contingency Planning Research & Dataquest 68 E-Commerce SLAs Should Consider: • High volume/value: potential loss justifies service level • Apply SLA definition to your situation • Establish what to include • Keep all service aspects together in an SLA appendix • Ensure measurements meaningful 69 More Considerations • “Close down” percentages • Decide on the basis on which penalties will be set • Legal jurisdiction • Residual risk • Plan for change 70 71 What is IT Governance? “Specifying the decision rights and accountability framework to encourage desirable behavior in using Weill & Ross, (2004) IT Governance, HBS Press. IT.” or IT Governance is putting structure around how organizations align IT strategy with business strategy, ensuring that companies stay on track to achieve their strategies and goals, and implementing good ways to measure IT’s performance. Karen D. Schwartz CIO Magazine (2007) 72 Role of IT Governance 73 IT Governance Framework • An IT governance framework consists, essentially, of a set of principles, a decision-making hierarchy and a tailor-made suite of reporting and monitoring processes. 74 Why have IT Governance? • Survey by MIT/Slone of 250 organizations and how they govern IT. “We conclude that effective IT governance is the single most important predictor of the value an organization generates from IT.” Weill & Ross, (2004) IT Governance, HBS Press. 75 76 Calder-Moir IT Govern. Framework ISO/IEC 38500 CoBIT ITIL ValIT 77 Plan Plan Do Do 78 Information Systems Audit and Control Association Professional association focused on IT Governance 79 COBIT 5 is an ISACA framework You can download COBIT 5 framework here: (it will cost you!) http://www.isaca.org/COBIT5INFO-SEC It defines the Security Policy framework 80 8 Key Decision Areas 1. Governance Principles and decision-making hierarchy 2. Information Strategy 3. Risk Management 4. Software applications 5. ICT Architecture 6. ICT Infrastructure/technology 7. Investment and Project Governance 8. Information Compliance and Security 81 1. Governance Principles/DecisionMaking • There are two types of principle in this context: ▫ governance principles  How IT is to be managed in the enterprise ▫ implementation principles  How IT is to be used to achieve the business strategy. 82 1. Decisions Three governance questions... 1. What decisions must be made? 2. Who should make these decisions? ◼ ◼ Input rights Decision rights 3. How will we make and monitor these decisions? 5 types of Decisions….6 Archetypes… Weill & Ross, (2004) IT Governance, HBS Press. 83 What decisions must be made? IT Principles Decisions High-level statements about how IT is used in the business IT Architecture IT Infrastructure IT Investment and Decisions Decisions Prioritization Decisions Organizing logic for data, Applications, and infrastructure captured in a set of policies, relationships and technical choices to achieve desired business and technical standardization and integration. Centrally coordinated, shared IT services that provide the foundation for the enterprise IT capability. Decisions about how much and where to invest in IT, including project approvals and justification techniques Business application needs Specifying the business need for purchased or internally developed IT applications. Weill & Ross, (2004) IT Governance, HBS Press. 84 Questions Key to each IT Decision • IT Principles ▫ ▫ ▫ ▫ What is the enterprise’s operating model? What is the role of IT in the business? What are IT-desirable behaviors? How will IT be funded? 85 2. Information Strategy • (which MUST be derived from the business strategy): ▫ What information do we need, where does it come from and what are we going to do with it? ▫ Out of the information strategy comes the ICT strategy, which is made up of:  application,  architecture, and  infrastructure/technology strategies. 86 3. IT Risk Management • Within the context of the organization’s overall risk management framework, ▫ risk to information and ICT ▫ Assessing the severity 87 Risk Severity Assessment Tag Meaning Definition Critical A revenue-generating opportunity, or representing a definite and substantial financial, legal or HR risk to the business. For software development, this represents functionality that is unavailable, severely corrupted, or severely degraded for a significant number of customers and/or employees. SEV2 Serious A cost-containment opportunity, or representing a moderate financial, legal or HR risk to the business. In software development, this represents functionality that is unavailable, severely corrupted, or severely degraded for a limited number of customers and/or employees. SEV3 Medium A potential legal, HR or financial risk to the business. In software development, this represents an issue where a bypass or manual fix is available. Minor No potential cost savings or revenue generating capability, and no risks to the business. In software development, this represents functionality that is degraded, but this degradation is relatively insignificant (i.e. cosmetic or negative goodwill). SEV1 SEV4 88 4,5,6. Software, ICT Architecture and ICT Technology • How applications are specified, developed, authorized, acquired and managed • Integration, standardization of ICT architecture • Infrastructure ▫ How are IT services specified, developed, authorized ▫ What services should be outsourced, how, why and by whom 89 Questions Key to Each IT Decision 4. Business Application Needs ▫ What are the market and business process opportunities for new business applications? ▫ How are experiments designed to assess whether they are successful? ▫ How can business needs be addressed within architectural standards? When does a business need justify an exception to standards? 90 Questions Key to each IT Decision 5. IT Architecture ▫ What are the core business processes of the enterprise? How are they related? ▫ What information drives these core processes? How must the data be integrated ▫ What technical capabilities should be standardized enterprise-wide to support IT efficiencies and facilitate process standardization and integration? ▫ What activities must be standardized enterprisewide to support data integration? ▫ What technology choices will guide the enterprise’s approach to IT initiatives? 91 Questions Key to Each IT Decision 6. IT Infrastructure ▫ What infrastructure services are most critical to achieving the enterprise’s strategic objectives? ▫ For each capability cluster, what infrastructure services should be implemented enterprise-wide and what are the service-level requirements of those services? ▫ How should infrastructure services be priced? ▫ What infrastructure services should be outsourced? 92 7. IT Investment • • • • Which initiative should be implemented Prioritization Managed (as a project) ROI 93 Questions Key to Each IT Decision 7. IT Investment and Prioritization ▫ What process changes or enhancements are strategically most important to the enterprise? ▫ What are the distributions in the current and proposed IT portfolios? ▫ Are these portfolios consistent with the enterprise's strategic objectives? ▫ What is the relative importance of enterprise-wide versus business unit investments? ▫ Do actual investment practices reflect their relative importance? 94 8.Compliance and Security • • • • • Criteria for securing information Demonstration of legal/regulatory compliance Measurements? IP protections Audits 95 Who Makes the Decisions • Governance Archetypes ▫ Business Monarchy  Group of business executives (may include CIO) ▫ IT Monarchy  IT Executives ▫ Feudal  Business Unit Leaders, Process Owners ▫ Federal  C-Level executives and business units (central and state government) ▫ IT Duopoly  IT executives and one other group ▫ Anarchy  Each individual user Governance Decisions 96 IT Governance Components Domain Style IT Principles IT Architecture IT Infrastructure Strategies Business Application Needs IT Investment Governance Archetype Business Monarchy IT Monarchy Feudal Federal Duopoly Anarchy Don’t Know © MIT Sloan CISR 97 IT Duopoly • IT Executives and one other group ▫ 2-party arrangement where decisions represent a bilateral agreement ▫ Differs from a federal model in that federal always has both corporate and local business representation  Duopoly has one or the other – but not both – and always includes IT professionals ▫ Duopolies can take one of two forms  Bicycle wheel or t-shaped Weill & Ross, (2004) IT Governance, HBS Press. 98 Bicycle Wheel IT Duopoly BU BU RM RM BU = Business Unit RM = Relationship Mgr IT RM BU RM BU Weill & Ross, (2004) IT Governance, HBS Press. 99 T-Shaped IT Duopoly Executive Committee XXXXXXYXXXXXX IT Committee Y Y Y Y Y X = Business manager Y = IT manager Y Weill & Ross, (2004) IT Governance, HBS Press. 100 How Enterprises Actually Govern - Survey © MIT Sloan CISR 101 Top 3 Governance Performers from Survey Governance Decisions Domain Style Governance Archetype IT Principles IT Architecture IT Infrastructure Strategies 3 3 3 Business Monarchy IT Monarchy 1 2 2 Business Application Needs IT Investment 2 3 1 Feudal Federal Duopoly 1 1 2 2 3 1 Anarchy Don’t Know © MIT Sloan CISR 102 Next Module 7 • Bring a Laptop • Virtual Collaboration Technologies • Social Media 103 Questions Module 7 1 » Collaboration Tools ˃ ˃ ˃ ˃ ˃ Enterprise 2.0 revisited Definitions Brigg’s Patterns of Collaboration Tool Selection Multicultural Issues » KM » Social Enterprise » Adoption and Diffusion 2 » Enterprise 2.0 is the integration of Web 2.0 technologies into an enterprise's business processes. ˃ Web 2.0 + Communication + Collaboration + Information Storage/Retrieval/Mining » Enterprise 2.0 technologies emphasize employee, partner and consumer collaboration. » Connectivity (internetworking) » Enterprise 2.0 implementations use a combination of social software and collaborative technologies like blogs, wikis, social networks » Utilizes Internet/Web/Mobile » Hardware (processing and storage architectures) is usually 3 Cloud/SAAS » People innovate faster in a collaborative workplace » Save time » Increase quality of output ˃ When you work with a team, you utilize many strengths » Increase participation ˃ More likely to have the right experts available ˃ More likely to increase buy in for the result ˃ Using resources to their fullest improves employee retention » Cooperation supports both team and individual goals 4 We need some shared definitions 9/21/2009 5 Group A Group is two or more individuals who share common interests or characteristics and whose members identify with each other due to similar traits. Team Any group of people involved in the same activity. Team members work together toward a common goal and share responsibility for the team's success. 6 Teams are different from groups in 5 ways: 1. 2. 3. 4. 5. task orientation Purpose Interdependence formal structure familiarity among members. 7 This model of group development was first proposed by Bruce Tuckman in 1965, who maintained that these phases are all necessary and inevitable in order for the team to grow, to face up to challenges, to tackle problems, to find solutions, to plan work, and to deliver results. 8 » » » » » » Standing [Work or Production] Project Ad-Hoc “Virtual” [Inter-organizational] Leaderless Action 9 Low Level 1 Collected Work : Sprinters Degree of Collaborative Effort Uncoordinated Individual Efforts Level 2 Coordinated Work: Relay Coordinated Individual Efforts Level Concerted Work: High Crew Concerted Team Effort Sprinters » Individual, uncoordinated effort toward team goal » Team productivity is sum of individual performances » Individualized Processes from Start to Finish » Examples are: Office Applications ˃ MSWord group editing ˃ Multiple spreadsheet editing ˃ Powerpoint presentation passing Relay » Coordinated Efforts and Processes » Coordination, sharing, and hand-offs » Coordination Applications examples are ˃Workflow Applications Crew » All team members work a process simultaneously to achieve the team goal » Repeatable Customized Process » Collaborative applications examples are: ˃GroupSystems Hierarchy of Collaboration » Can also be referred to as group decision support systems (GDSS). GSS is any combination of hardware and software that is used to support group functions and processes. » A Group Support System permits modeling many different structured synchronous team interventions to support task oriented collaborative intellective work. 15 Collaboration Group Systems Share Information Generate Ideas Session Planning Organize Ideas Poll Consensus Explore Issues Knowledge Management Organizational Memory Enterprise Model Corporate Database Intranet World Wide Web FTP/Gopher Group Systems Virtual Collaboration Collaboration Share Information NY DC Generate Ideas Boston Session Planning LA SF NY Organize Ideas Poll Consensus PIT HK SYD DC ATL Explore Issues Knowledge Management LA Paris LON DC SF Organizational Memory Enterprise Model Corporate Database Intranet World Wide Web FTP/Gopher CHI 18 » » » » http://www.mindmeister.com You should have gotten an invite for this activity Click on a topic (it will be outlined in blue) You may need to create a basic account 19 20 All meetings consist of collaboration patterns A SEVEN-LAYER MODEL OF COLLABORATION FOR DESIGNERS OF COLLABORATION SYSTEMS - Robert O. Briggs, Center for Collaboration Science, University of Nebraska at Omaha 1. 2. 3. 4. 5. 6. 7. Goals - A goal is a desired state or outcome. Deals with group goals and private goals. Collaboration is defined as joint effort toward a group goal. Products - A product is a tangible or intangible artifact or outcome produced by the group’s labor. Activities - Activities are sub-tasks that, when completed, yield the products that constitute attainment of the group goal. Patterns of Collaboration - Patterns of collaboration are observable regularities of behavior and outcome that emerge over time in teamwork. Techniques - A collaboration technique is a reusable procedure for invoking useful interactions among people working toward a group goal. Tools - Collaboration tools are artifacts or apparatus used in performing an operation for moving a group toward its goals. Scripts - A script is everything team members say to each other and do with their tools to move toward the group goal. Scripts may be internal or external, 21 tacit or explicitly captured as documentation. Generate Reduce Clarify To move from having fewer concepts to having more concepts in the set of ideas shared by the group. Move from having many concepts to a focus on a few deemed worthy of further attention Move from less to more mutual understanding about a concept Organize Move from having less to more understanding of the relationships among concepts Evaluate Move from less to more understanding of the benefit of concepts toward attaining a goal relative to one or more criteria. 22 Commit Move from less to more commitment among stakeholders about an action toward the stated goal » Ask yourself: » What types of tools support the patterns of collaboration you plan to use? » Can the tool assist in structuring the meeting? » Can the tool assist in structuring the outcomes? 23 Kinds of meetings » Briefing ˃ Presentation ˃ Training ˃ Status » Problem Solving ˃ ˃ ˃ ˃ Ideation Knowledge Acquisition Knowledge Exposition Decision Making » Execution ˃ Group Writing ˃ Group Modeling » Social ˃ Kick Off ˃ Team Building ˃ Celebration 24 How do I select Web2.0 tools that aren’t $1,000 a seat? 25 26 Simply adding technology alone never solves a significant problem http://www.podio.com You should have gotten an invite from me for this tool. 27 It’s the process, silly 28 Evaluate the solution Scope the Context [Feasibility] Define the Business Problem Use Cases Find and define the problem Define the Team Processes Required Evaluation Criteria Define the Technology Groupware Categories Generate and test candidate solutions Pick and implement a solution Select & Configure Product Execute Solution Eval. options against criteria for relevant use cases 29 » Briefing ˃ Presentation ˃ Training ˃ Status » Problem Solving ˃ ˃ ˃ ˃ Ideation Knowledge Acquisition Knowledge Exposition Decision Making » Execution ˃ Group Writing ˃ Group Modeling » Social ˃ Kick Off ˃ Team Building ˃ Celebration » Streaming tools ˃ Web conference ˃ Desktop sharing ˃ Audio/Video conference » GSS Suites ˃ ˃ ˃ ˃ MindMapping Wikis Group Modeling Voting/Polling » Office Suites ˃ Collaborative Authoring ˃ Collaborative Modeling » Messaging ˃ Micro-blogging ˃ Social Networking Systems ˃ Streaming tools 30 31 32 Core capabilities Primary characteristics of a collaboration technology that provide the group with the means to take action toward attaining their goals. Data Content Kinds of contributions users can add using core capabilities, e.g. text, graphics, voice, video. Kinds of relationships users can establish among their contributions, e.g. collection, ordinal, hierarchical, network. Data relationships Data limits Data persistence Actions Synchronicity The kinds of limits that are or can be imposed on contributions, e.g. size, duration, content. The degree to which contributions can be made permanent. Kinds of actions that users in each role can take with respect to contributions to a technology: add, receive/view, associate, edit, move, evaluate, and delete. Expected delay between the time a person executes an action and the time s/he could reasonably expect that other users could perceive the effects of that action. E.g. instantly, within seconds, within minutes, within hours. 33 Identifiability Access controls Roles Awareness indicators Interruption alerts Instructions Degree to which users can determine who executed an action. E.g. full Identifiability, full anonymity, identification by role, identification by pseudonym. The kinds of limits that may be placed on user’s ability to access a technology and act on its contents. E.g. login name, password, invitation, smart card. The degree to which a technology affords differentiation in access and action by sub-group, e.g. leaders, participants, observers. Ways users know who else has access to the system, who is currently present in the system, what contributions others are viewing, what they are doing. Ways that participants are notified that something or someone in the system requires their attention. Ways a technology implementation provides process guidance to a user about what they may contribute, what actions they may take, and the significance of those actions. 34 Lets consider three dimensions of virtuality in “We are the workplace working virtually” 35 Same Time Different Time Same Place Different Place Large Different Group Culture Small Same Group Culture A Fourth Key Dimension is Culture 36 Meeting One Repositories Meeting Two 37 Virtual Project Support Information generated between group-to-group and distributed meetings Different Time Same Time Corporate Database Small Group External Information Services Large Group Virutal FTF Meetig Group Meeting (office) to Room Group 38 Adapted from J. Morrison, 1992 UofAZMIS Note: We will not review Google Hangouts (most of you already use it!!) 39 IS 483 » Do you have these? » Where do they show up? » How do you manage them? 41 3/9/2020 » National Culture » Organizational Culture » Professional Culture 42 Social Psychologist and former IBM employee conducted one of the most comprehensive studies of how values in the workplace are influenced by culture. He broke down these values into 5 Dimensions of National Culture 1. Power Distance index ˃ Power Distance Index (PDI) - focuses on the degree of equality, or inequality, between people in the country's society. A High Power Distance ranking indicates that inequalities of power and wealth have been allowed to grow within the society. 2. Uncertainty Avoidance -Tolerance ˃ Uncertainty Avoidance Index (UAI) - focuses on the level of tolerance for uncertainty and ambiguity within the society i.e. unstructured situations. A High Uncertainty Avoidance ranking indicates the country has a low tolerance for uncertainty and ambiguity. 43 3. Individualism-Collectivism ˃ Individualism (IDV) - focuses on the degree the society reinforces individual or collective achievement and interpersonal relationships. A High Individualism ranking indicates that individuality and individual rights are paramount within the society. 4. Masculinity-Femininity ˃ Masculinity (MAS) - It depicts the degree to which masculine traits like authority, assertiveness, performance and success are preferred to female characteristics like personal relationships, quality of life, service and welfare. 5. Long term-Short term Time Horizon ˃ Long-Term Orientation (LTO) - focuses on the degree the society embraces, or does not embrace, long-term devotion to traditional, forward thinking values. High Long-Term Orientation ranking indicates the country prescribes to the values of long-term commitments and respect for tradition. 44 ➢ Want transferable skills that support job mobility ➢ Expect to have many jobs over their lifetimes ➢ High value placed on engagement and attention from companies, bosses, mentors ➢ Broad attention span and multitasking ➢ Communicate via multiple channels ➢ High use of computer games, have developed job-related skills via gaming ➢ Willing to trade off between income and job demands ➢ Less willing to unquestioningly adhere to “traditional” norms around the workplace From various sources, including Carolyn Martin’s and Bruce Tulgan’s work on Generation Y in the workplace. Laptops are increasingly the assumed standard for personal computers. Many companies say that out-of-office work is “nothing special – just part of how we do business now.” Urban nomads: ▪ People connected anywhere, anyplace ▪ Not just for business travelers, but for people going about their daily lives in their local environment ▪ A single smart device (cellphone+internet) taking the place of multiple pieces of equipment ▪ Assumption that you can access your personal files from any device Quote from The Telework Coalition’s Teleworking Benchmarking Study Best Practices for LargeScale Implementation in Private and Public Sector Organizations – Executive Summary (2006). “Urban nomads” from The Economist - Mobile Edition (April 10, 2008). 47 http://www.knowledge-managementtools.net/knowledge-management-model.html “Communities come to life when they fulfill an ongoing need in people’s lives. To create a successful community, you’ll need to first understand why you’re building it and who you’re building it for; and then express your vision in the design, technology and policies of your community.” – Amy-Jo Kim, Community Building on the Web » Opportunities for Knowledge Creation » Opportunities for Knowledge sharing » Knowledge types ˃ Tacit (what lives between the ears) ˃ Explicit (what has been captured and stored) » Information overload: ˃ Knowledge workers spend between 15 and 30 percent of their time searching for information, and these searches are successful less than 50 percent of the time. (this is a KM issue) 49 » Collaboration creates massive quantities of data and experience » It rarely gets shared outside of the immediate group involved » Organizations are trying to figure out how to keep from repeating experiences (learning) » We have been trying for nearly 20 years (mid 90s) 50 The Changing Face of the Knowledge Business » Economic reliance on knowledge workers is increasing. ˃ About 40% of the US workforce are classified as knowledge workers » Customers and employers want a more integrated approach. » There won’t be enough of them » Their expectations are different » Technology will transform when, where and how work is done. 51 » Knowledge » Knowledge Sharing vs Knowledge Management » CMS (underlying technology) 52 » This is the DIK pyramid » Based on systems-theory thinking – that one leads to the other by simple aggregation » – what do you think ??? ? Knowledge Information Data 53 You’re outside Washington, DC driving to the airport to catch a plane to New York for a meeting. » Data: 10, 34, 25. » Information: a weather station 10 miles from Washington National Airport reports sleet, temperature 34 degrees, wind out of the West at 25 mph. » Knowledge: you know the weather will cause delays or cancellations and you may miss your meeting. » Wisdom: you reserve a seat on the next train so you get to your meeting on time. 54 DEFINITIONS ➢ Understanding via experience ➢ A person’s range of information ➢ Accumulation of facts or procedural rules » Types of Knowledge: ˃ ˃ ˃ ˃ ˃ ˃ Know-What: Facts Know-Why: Analysis Know-Who: Politics Know-Where: Marketing Know-When: Strategy Know-How: Expertise 55 Tacit Socialization Tacit Externalization Explicit Internalization Explicit Combination 56 Explicit vs Tacit Knowledge » Tacit knowledge is knowledge that's difficult to write down, visualize or transfer from one person to another. » Some Examples of Tacit Knowledge • • • • • • • • Innovation Leadership How to speak a language Sales Body Language Intuition Humor Emotional Intelligence 57 “The chief economic priority for developed countries is to raise the productivity of knowledge . . . The country that does this first will dominate the twenty-first century economically.” Peter F. Drucker 58 Share ideas, have conversations Create spaces for conversations People Technology Processes Learning Provide structure to the things that must be done Revisit the processes/conversations for what can be done better 59 People create knowledge with: Colleagues Experts Customers Partners and friends Places where people can: Share ideas Form communities Learn Create answers to problems Things structured and unstructured content we: Create Classify Capture Share 60 Communities of practice share ideas. They are about conversations. Networks and communities of practices are groups of workers with shared interests who meet to share ideas and create knowledge. 61 Technology lets us collaborate on a large scale. “I need to know.” Searching Mining “We need a place to work on this.” Collaboration Communities “I need someone to explain this to me.” e-Mail Discussion database Portal Groupware 62 » KM PROCESS ˃ ˃ ˃ ˃ ˃ ˃ Creates Captures Organizes (codifying, cataloging, etc.) Refines (collaborating, mining, etc.) Disseminate (Transfer, share, alert, push, etc.) Maintains Knowledge lives in communities and networks. Group knowledge is more powerful than individual knowledge. Knowledge sharing needs trust – which comes with experience 64 » It’s not convenient. » They don’t know what they know. » They don’t know the value of what they know. » They believe knowledge hoarding is job security. » They don’t get credit for it. » They don’t have the time. Knowledge Management Magazine, January 2000 65 » They take pride in their expertise. » They enjoy interacting with peers. » They wish to learn. » They expect others to reciprocate. » They want to contribute to the common good. » Their culture encourages sharing. » They are loyal to the organization. Program Management 2000: Know the Way (modified) 66 Dynamic Systems » Locate know carriers and seekers » Create social forum » Access to experts » Support cross functional teams » Provide cross-skills set for projects » Expert NW » Comm. Of Practice » Yellow Pages Process-Oriented Integrative » Capture Know for reuse in recurrent problems » Improve processes ➢ Integrate knowledge source and provide single point of access » Lessons learned from best practice » Process description DB » Knowledge repositories ➢ Corporate portals (extranets and intranets 67 » If we make it everyone’s job, no one will do it. » Must be meaningful to the user and facilitate the creation, retrieval and sharing of knowledge » It has to integrated into the work people are doing anyway (it can’t be an extra step) » It should support searching and browsing » May employ a controlled vocabulary » Can purchase Taxonomy Vocabulary » “An integrative discipline for structuring, describing and governing information assets across organizational and technological boundaries to improve efficiency, promote transparency and enable business insight.” (Gartner, 7/09) This is about the data, documents, files – not knowledge! » UCC + KM + ERP + DATA = separate systems, less innovation » Need ˃ Tools to leverage collaboration, communication, connection ˃ “Social communications” » Designed to support workflows ˃ Integrate asynchronous communications (email, blogs, wiki, activity feeds) ˃ With synchronous communications ( presence, voice, video, web collaboration) and ˃ Shared workspaces/content stores ˃ Regardless of device, location or time 72 » Organize the collaboration » Organize the collective learning » Access to the collective learning by others ….. » Content Management Systems 73 » ECM is an umbrella term representing a vision and a framework for integrating a broad range of content management technologies, encompassing document management, records management, and web content management. » In a KM context, content management is a way to organize and control information artifacts that contain valuable intellectual capital that can be written down, made explicit or otherwise captured in text and pictures. » Need to focus on non-technology issues ˃ Policies, taxonomies, change management, governance » E-discovery is an emerging need » Video will become common content type » Mobile content delivery is big 76 What's the problem we are trying to solve? ➢ any technology that facilitates social interactions and is enabled by a communications capability 77 78 http://www.marketingcharts.com/interactive/top-10-social-networking-websites-forums-february-2010-12248/ » Do not dismiss social software as a fad or a general productivity plague. ˃ Instead, prepare a strategy and have a realistic understanding of the risks and benefits of social software. » Understand the unique challenges associated with social software and factor them into the decision on when and how to proceed with initiatives. 79 Hypatia Res. 2011 Social Networking Conversations Micro-Blogs Content Wikis Connections Blogs Collaboration Project workspaces 81 ACTIONS PROFILE MESSAGES CONTACTS REQUEST INSTANT MESSAGE PARTICIPATION BAR COMMUNITY What's the problem we are trying to solve? 84 Strategic Networks promote integration among the departments of a company. This integration is based on five layers: The 5Cs Communication Blogs Forums Micro-blogs / Lifestreaming Chat/IM VOIP Content Content Sharing Content Management Tagging / Rating Social – Bookmarking Syndication Connections Collaboration User Profiles Social Graphs Friends/Contacts People Matching Wikis Workspaces Project / Process Support Innovation / Idea Generation Calendars & Events Community 85 86 87 So we build it – will they come? 88 » This is change management, pure and simple “Technology change projects succeed if and only if two conditions are met: there is a clear problem to solve; and the cost of the project is less than the perceived cost of changing from the status quo.” – pip coburn 89 90 NY Times, 2/10/2008 91 Roger,s 1963 92 » Technology Acceptance Model ˃ Predicts short-term use after first exposure ˃ Not explanatory ˃ Not a general model of change ˃ Can’t explain abandonment Ease of Use System Use Usefulness 93 94 Karahanna, Straub, Chervany, 1999 Perceived Frequency of Value The Value-Frequency Model * Perceived Net Value + Willingness to Change * Economic Political Social Cognitive Certainty About Perceptions Perceived Value of Transition Affective Physical 95 Briggs, 2006 96 » effective communication is central to the transformation process. » Remember: someone is getting something out of the current state of affairs (if they weren’t, it would change) 97 98 » » » » Top Down Transition Bottom Up Transition Key Opinion Leader Transition Self Selected Elite Transition 99 » Where does it put pressure? » What can be done? 100 » Any comments on the readings? 101 » Reflection Essay will be released on D2L on Thursday October 31 and will be due in one week (Thursday November 13, 9 pm). » The final exam will be released to D2L ONLY after Reflection Essay is turned in and at the end of Module 10. (November 14, 9pm) It is due November 21, 9:00 pm. » Check D2L for exact dates and times. » Do NOT miss these deadlines (you cannot email it to me) 102 http://www.plinko.net/nevermore.htm 103 This research note is restricted to the personal use of gartner-lib@depaul.edu G00230025 Big Data Challenges for the IT Infrastructure Team Published: 10 February 2012 Analyst(s): Sheila Childs, Merv Adrian Big data use cases have the power to radically transform how organizations use information. Today, most of the emphasis on big data is focused on either (1) managing large volumes of information; or (2) implementing imagination capturing scenarios for data analytics. IT needs to have a solid understanding of what is meant by big data in order to plan for supporting infrastructures. Impacts ■ IT needs to understand that big data is not simply big volume, and that big data projects may fail if they don't pay attention to variety, velocity and complexity, as well as volume. ■ IT should expect significant infrastructure re-engineering and budget changes as priorities shift to big data processing and analysis. ■ IT should understand that, while some well-known organizations tout their big data successes, outside of these edge cases, most big data projects in 2012 will be best-described as exploratory. ■ CIOs and hiring managers must ensure that the budget and training are in place to satisfy the demand for experienced IT personnel. Without skilled people, big data projects will churn data, but will lack intelligence. Recommendations ■ IT should join with the business to aggressively embrace the concept of big data as providing the potential to deliver new revenue and/or competitive differentiation. ■ Realize that big data is not about doing more of the same thing; it's about utilizing high volumes of complex data for rapid analysis. ■ Develop enterprise information management strategies, including hardware, software, services and policies for capturing, storing and analyzing big data. This research note is restricted to the personal use of gartner-lib@depaul.edu This research note is restricted to the personal use of gartner-lib@depaul.edu ■ When getting started, be sure to scope big data projects definitively and to require that consultant proposals meet functional specifications and price. Analysis IT is experiencing confusing times with respect to understanding and managing data growth. On the one hand, data is growing at an out-of-control pace, storage infrastructure costs continue to be an IT pain point and data management is becoming more complex. On the other hand, businesses are clamoring for more information. New content types, data management systems and analytics are enabling the business to derive more value from information than ever before. These diametrically opposed driving forces are coming together as big data. The problem of determining which information is useful and how long it is useful increases stress on current systems. Keeping everything in a giant information landfill is a hoarder principle. However, in this case, hoarding is a result of the awareness that information has value, and that when business strategies and tactics change, so does the value of the information; thus, you "never know what you might need." The IT organization needs to be equipped to supply the right infrastructures that can respond to dynamic business requirements for big data, and it needs to start by understanding some of these dynamics. Figure 1 shows four areas for IT focus as big data projects begin to make their way into supported data center infrastructures. The analysis below discusses each impact in more detail, so that IT can be prepared for these projects starting in 2012. Page 2 of 10 Gartner, Inc. | G00230025 This research note is restricted to the personal use of gartner-lib@depaul.edu This research note is restricted to the personal use of gartner-lib@depaul.edu Figure 1. Impacts and Top Recommendations for Preparing to Support Big Data Projects Within IT Impacts Top Recommendations IT needs to understand that big data is not simply big volume, and that big data projects may fail if they don't pay attention to variety, velocity and complexity, as well as volume. • IT needs to understand that, while volume is a IT should expect significant infrastructure re-engineering and budget changes as priorities shift to big data processing and analysis. critical ...
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Hi!! Please check it out and let me know if something can be added or improved!

Technology has was created to create the knowledge and to learn the use of tools, techniques,
and systems to serve a larger purpose such as problem-solving or making life easier and
better. Its importance for human beings is enormous because it has helped them adapt to the
environment they are in to. The development of the internet has meant that the information is
now in many places. Before the information was concentrated, it was given by parents,
teachers or books. School and university were the areas that concentrated knowledge. Today
these barriers have been broken and with the Internet, there is more access to it.
This situation brought to my mind that during the course, we saw the importance of
technology environment within high-level companies an...

Similar Content

Related Tags