Professional Documents
Culture Documents
to
Information
Technology
Learning Objectives
• why organization should invest in IT based solution;
• should organizations invest in networking and
processing capacity ahead of applications needs, or be
driven by the current business;
• what level of IT solutions organizations should
implement;
• major changes that needs to be addressed in terms of
organization and management;
• different level of activities being performed by various
level of managers and their information solutions
needs.
• the latest trends in Information Technology.
Information Technology
for Management
COMMUNICATION
Communication is the transfer of
information from one place to another.
The process of communication
essentially involves the following three
components:
Sender
Receiver
Medium
Sender :- The component from where the
information is transferred
A network is a collection of
computers that can talk with
one another.
Internet
Public Network
Intranet
Private Network using Internet
technologies
Extranet
Private-Private Network using Internet
Technologies
LAN
If a network is confined to a single location,
typically one building or complex, it is called
local area network.
The maximum distance from one end of a
network to another is usually limited .
Generally sending and receiving of messages
through a physical connection such as a cable
Best example is sharing the data in a single
building.
LANs
Hub –
a device that facilitates connection
LAN acts logically like a bus.
Star –
the dominant topology today.
MAN
In between LAN and WAN is the
metropolitan network.
This networks that covers entire city,
but uses LAN technology.
Cable television networks are the
examples of MAN s.
The MAN s we are interested in carry
information in the form of computer
signals from one computer to another.
WAN
SAN
SAN is a high-speed network that allows
the establishment of direct connection
between storage devices and
processors (servers) centralized to the
extent supported by the distance of
Fibre Channel.
Storage Area Network (SAN)
CATEGORIES OF
NETWORK
Star Network Topology Token Ring Network Topology Self-healing Ring Topology
Two rings
Network Topology Neighbor Connectivity and Redunda
Computer security incorporates the protection of computer systems and the data
that they store or access. Given the widespread use of computers, their security
is a critical priority in the modern world. Businesses must take computer security
seriously in order to enhance the confidence of stakeholders in order to support
critical business processes and protect business information.
Computer security involves a blend of technical and user inputs. For example
locking a computer screen whilst a user is away from the desk is a useful security
measure but relies on the user remembering to lock the screen when leaving
their desk.
Why organization should invest in IT
based solution?
• Because the business is changing; competition
is changing; and technology is changing.
• Because of emergence of:
– Globalisation, Liberalisation and Privatisation
– Business Process Outsourcing
– Knowledge Process Outsourcing
– Digital Economy & Knowledge Economy
– Organization Level Transformation
Why organization should invest in IT
based solution?
• Information technology can help all kinds of
businesses improve the efficiency and effectiveness
of their business processes, managerial decision
making, and workgroup collaboration, thus
strengthening their competitive positions in a
rapidly changing marketplace.
• Internet-based systems have become a necessary
ingredient for business success in today’s dynamic
global environment.
FEEDBACK
Information System
• Information system is a set of procedures that
collects, process, store and disseminate
information to support decision making.
• Information systems always have a pre-
defined boundary and operate in an
environment which includes other systems
and also players like customers, suppliers and
government departments etc.
Information Technology vs.
Information System.
• Information Technology is a means to Information
System or they are similar to heart and soul
relationship.
• Information technology provides effective and
efficient means of storing, processing and
disseminating information.
• Information Systems provides best practices to
manage business processes. To learn about
information systems, one needs to understand
the organisation, management and technology.
Components of Information System
ENVIRONMENT
FEEDBACK
System Boundary
Major Characteristics of Information
Systems
• Intrinsic
• Accessibility
• Contextual
• Representation
• Information system needs to be economical to
develop and maintain
• Information system needs to flexible and
adaptable
Uses of Information
• Identification
• Collection
• Controlling
• Measuring and
• Decision Making
Organizational Structure
• Organizations are structured in a many ways, which is
dependant on their objectives and culture.
• The structure of an organization will determine the
manner in which it operates and it’s performance.
• Structure allows the responsibilities for different
functions and processes to be clearly allocated to
different departments and employees.
• Organizational structures are created in such a way
that it aims at maximizing the efficiency and success of
the Organization.
• Common organization structures that exist are:
Hierarchical, Flat and Matrix.
Functions of Management
• Management is creative problem solving which can be accomplished
through four functions of management: planning, organizing, directing
and controlling.
• Planning: Planning is the ongoing process of developing the organizational
goals and objectives and determining how they will be accomplished.
• Organizing: Organizing also means to establish the internal organizational
structure of the organization. The focus is on division, coordination, and
control of tasks and the flow of information within the organization.
• Directing: Directing also means to influence staff behavior through
motivation, communication, group dynamics, leadership and discipline.
• Controlling: It is a multi stage process which includes establishing
performance standards based on the firm's objectives; evaluating and
reporting actual job performance; comparing the two, and taking
corrective or preventive action as necessary.
MANAGEMENT LEVELS AND
MANAGERIAL FUNCTIONS
Strategic
Management
(Top Level)
In
orf
ns
Semi-
m
io
at
structured Tactical
cis
io
Management
n
De
(Middle Level)
Structured
Operational
Management
(Lower Level)
Major Roles of Information Systems
Support of
Strategic
Advantage
Support of
Managerial
Decision Making
Support of
Business Operations
Types of Information Systems
• Transaction Processing System (TPS)
• Management Information System (MIS)
• Office Automation System (OAS)
• Decision Support System (DSS)
• Executive Support System (ESS) and
• Expert Systems (ES)
Characteristics of Transaction
Processing System (TPS)
• Serves the Operational Level or lower level management
• Performs & records the daily routine transactions
• Tasks, resources and goals for TPS are predefined & highly structured
• TPS captures data about the organization and its environment
• TPS are major producers of information about the organization
• TPS failure will result in failure of the organizational system
• TPS is often tied to other systems
• TPS is a main feeder of data to other information systems
• TPS serves the most elementary day-to-day activities of an organization
• It can have strategic consequences (eg railway/air reservation system)
• It usually has high volumes of input and output
• TPS systems are meant to be repetitive and predictable
Characteristic of Management
Information System (MIS)
• Provide managers with reports and in some cases on-line
access to the organization performance
• Serves the Management control level
• Produce summary reports generated by TPS
• Have limited analytical capabilities and use simple models
• Address structured questions that are known well in
advance
• Not very flexible
• Rely more on existing organizational data & data flows
• Generally past and present oriented
• MIS are generally reporting and control oriented
• Exception reports
Characteristics of Decision Support
System (DSS)
• For Semi-structured & Unstructured decisions
• For managers at different levels
• For groups and individuals
• Adaptability and flexibility
• Effectiveness, not efficiency
• Humans control the machine
• Modeling & Knowledge based
Characteristics of Executive Support
System (ESS)
• Serves the Strategic Level
• Address unstructured decisions and involve a
generalized computing and communication
environment rather than fixed application.
• Dependent on internal & external information
• Make less use of analytical models
• ESS are more oriented towards external events
• More graphic oriented
• What Business should we be in?
• What are the competitors doing?
Office Automation Systems (OAS)
• Office Automation Systems (OAS) are information
system solutions that try to improve the productivity of
employees of an organization.
• OAS objective is to create the technology driven
environment in an organization and it provides
individuals effective ways to process personal and
organisational data, perform calculations, and create
documents.
• They are used for increasing productivity and reducing
paper work by processing major work electronically.
Communication systems and groupware concepts
facilitate implementation of OAS.
Expert Systems (ES)
• Expert System (ES) are computer system or
program that uses artificial intelligence
techniques to solve problems that ordinarily
require a knowledgeable human.
• Expert Systems help to guide users to find
solutions to problems that would otherwise need
expert advice.
• Expert Systems are useful in diagnosing,
monitoring, selecting, designing, predicting and
training.
Information Technology Trends
• Information technologies are becoming the dominant force in our culture.
– Worldwide Internet Use Continues to Expand
– e-Business is Here to Stay
– Websites are a Necessary Function of Business
– Wireless Communication will Increase Significantly
– Technically Trained People will be in Demand Worldwide
• Information technologies will continue to transform the way we live and work.
– IT is Transforming How We Conduct Business
– IT is Changing How We Manufacture
– IT is Changing the Role of Consumers
– IT is Changing How We Travel and Move Goods
– IT is Transforming How Our Governments Operate
• The pace of change will accelerate.
– Nano-technology is the Next New Frontier
– Requirement for Service Oriented Architecture
– Strong Security systems like Biometric
Generation of Computers
• First Generation – Vacuum Tubes (1939-1959): These computers were powered by thousands of vacuum
tubes. The Z1, Z3 and UNIVAC I are some examples. First generation computers were very slow,
consumed huge amount of power and had poor reliability accuracy.
• Second Generation – Transistors (1959-1965): These computers were made of transistors. Transistors
controlled the flow of electricity through the circuits. The use of transistors was a breakthrough in
technology that allowed computers to become physically smaller and more powerful, more reliable, and
even faster.
• Third Generation – Integrated Circuits (1965-1971): These computers used integrated circuits (ICs).
Integrated Circuits were also smaller, more efficient, and more reliable as compared to Vacuum tubes and
Transistors. Third generation computers used secondary storage devices, such as magnetic tapes,
magnetic disks, which are located outside the computer. The use of faster input/output devices
contributed to the enhanced utility of these computers for multiprogramming, wherein a number of
programs could be executed simultaneously by a single computer.
• Fourth Generation – PCs and VSLI (1971-1991): Fourth generation is the generation of Large-Scale
Integration (LSI) of chips with several thousand transistors and Microprocessors (based on Very-Large-
Scale Integration (VLSI)). Microcomputers were developed which allowed home and business users to
adapt computers for word processing, spreadsheet, file handling, graphics, and much more.
• Fifth Generation – Artificial Intelligence and Internet (1991 till date): The fifth generation computers are
more intelligent and have “thinking” power and capacity to take decisions. The concept of Artificial
Intelligence (AI) is being used in these computers and the processors used are known as `Knowledge
Processors’. Grand scale integration (GSI) happened, which allowed over thousand million transistors
embedded on a single chip. The GSI, allowed the computer to perform teraflop (trillion floating point
processing per second) of data. Fifth generation also introduced the concept of parallel processing, which
was the necessity of AI to happen.
Classification of Computers
• Computers are available in different shapes, sizes,
processing capacities and weights, due to these
different shapes and sizes they perform different
types of jobs and have different functionalities.
– Supercomputer
– Mainframe
– Micro-computer
– Notebook
– PDAs
Computer Architecture
Components of a Computer System
• Central Processing Unit (CPU): The “brain” of the Computer – this is where the
actual computing is done. The CPU usually controls all the operations of the
computer.
• Memory: An electronic storage medium used to hold the program which instructs
the CPU and other components of the computer.
• Input/Output Devices: These are the link between man and machine. They
depend on the processing requirements.
• Input/ Output Interfaces: These are `middleman` between the CPU and the I/O
devices. They provide the actual hard-wired control of the I/O devices, according
to the commands that are issued by the CPU.
93
Memory
• Random-access memory (RAM) is that part of
primary storage where data and program
instructions are held temporarily while being
manipulated or executed.
• Read-Only Memory (ROM), as the name implies,
the contents of ROM can be read only; data
cannot be written into it.
• Cache Memory
• Dynamic random access memories (DRAMs)
• Synchronous DRAM (SDRAM)
Input Devices
• An input device is a peripheral device through
which data are entered and transformed into
machine-readable form. Some of the commonly
used input devices are:
– Keyboards
– Mouse
– Light Pens and Digitizers
– Voice Recognitions
– Magnetic-Ink Character Recognition -Optical Scanners
– Web Camera
– Secondary Storage media like CD, DVD etc.
Output Devices
• An output device is a peripheral device that
accepts data from a computer and transforms
them into a usable form, thus allowing the
computer to communicate information to
humans or other machines. Commonly used
output devices are:
– Printers
– Plotters
– Monitors and Terminals
– Speakers
– Secondary Storage media like CD, DVD etc.
Secondary Storage
• Secondary storage is the non-volatile memory that
supplements main memory by providing data storage
that is permanent and typically of much greater
capacity than main memory. It is less expensive, as
compared to the primary storage and is usually used
for storage of large amounts of data for permanent
storage. Secondary storage is also used for storing
backups, or copies, of data and programs that are
frequently required at a later date. Commonly used
secondary storage devices are:
– Magnetic Tapes
– Magnetic Disks
– Optical Disks
Computer Software
• The set of instructions used to control hardware
and accomplish specific tasks are called software.
Computer software provides the logic that drives
computer hardware.
• The major functions of software are to:
– manage the computer resources of the organisation;
– develop tools that human beings can utilize to take
advantage of these resources; and
– act as an intermediary between stored information
and organisations.
Type’s of Software
• System Software: System software directly interacts
with the hardware and comprises of programs that
manage the hardware components.
• Application Software: Programs that help the user, the
system software, and the hardware work together to
solve end-user problems are application software.
• Applications software can be purchased in stores and is
called packaged or commercial software.
• Packaged software can be purchased, or in some cases,
it is available free of cost called Freeware
Operating Systems
• An operating system is a set of programs that controls and
supervises a computer system’s hardware and provides service to
application software, programmers, and users of a computer
system.
• The purpose of an operating system is to manage the hardware
resources efficiently and to provide an interface between the
hardware and an application program and end user.
• An operating system helped in increasing the efficiency of a CPU, it
decides which resources will be used, which programs will run, and
how the programs will be translated into machine language.
• Major Goals of Operating System:
– To hide details of hardware by creating abstraction
– To allocate resources to processes (Manage resources)
– Provide a pleasant and effective user interface
Types of Operating Systems
• Single-User Operating System
• Multi-user Operating System
• Multiprogramming Operating System
• Time-sharing Operating System
• Multiprocessing Operating System
• Virtual-storage Operating System
• Virtual-Machine Operating System
• Mobile Operating System
Types of Information Processing
• Batch Processing
• Real-time Processing
• Distributed Processing
• Parallel Processing
– Sequence scheduling
– Concurrent scheduling
Industry Trends
• DNA COMPUTING
• Nanotechnology
• WEARABLE COMPUTING
• EMBEDDED COMPUTERS, Optoelectronic computers
and Quantum computing.
• Componentware
• Services-oriented architecture (SOA
• Autonomic Computing
• Grid Computing
• Cloud Computing
• Content and content
Networks
• A Network is interconnection of resources that
organization owns.
• A Network is a technology solution that helps
organization to interconnect its hardware,
software, databases and various media to achieve
interconnectivity between its employees and
stakeholders.
• Data communication or data conferencing allows
two or more users to share the common data
resource either on the common computer server
or their networked computers.
Types of Networks
• Local Area Network (LAN)
– A local area network (LAN) interconnects two or more
computers or devices within a relatively small, well-
defined area, such as a room, building, or cluster of
buildings using physical wires, infrared links or
wireless systems.
• Wide Area Network (WAN)
– A wide area network (WAN) interconnects two or
more computers that are geographically dispersed.
• Virtual Private Network (VPN)
Network Topologies
• Topology is the process and method of
connecting different nodes in a network. A
network can be arranged as per one of the
four different topologies:
– Star Topology
– Ring Topology
– Bus Topology
– Tree Topology
– Mesh Topology
Network Architectures
• Broadly there are two types of network
architecture that are being implemented by
most of the organizations.
• Centralized
• Distributed
• Client-Server
Network Technologies for Business
• Internet
– Public Network
• Intranet
– Private Network using Internet technologies
• Extranet
– Private-Private Network using Internet
Technologies
E-Commerce
• Electronic commerce (E-commerce) can be defined as
any business transaction conducted using electronic
means.
• E-commerce is usually associated with buying and
selling over the Internet, or through a computer-
mediated network.
• A more complete definition is: E-commerce is the use
of electronic communications and digital information
processing technology in business transactions to
create, transform, and redefine relationships for value
creation between or among organizations, and
between organizations and individuals.
E-Business
• E-Business does not mean only buying or
selling products on-line, it will lead to
significant changes in the way products are
customized, distributed and exchanged and
the way consumers search and bargain for the
products and services and consume them.
• E-business focus more on enhancement of the
Customer process, production process and
employee processes.
Extroverted Deals only external Parties but Ambiverted deals both internal(employees,
Depts etc) and external parties.
Goal of E-Business
• The goal of any E-Business solution is to create
value, which can be created in the following
manner:
– Increased Profitability
– More Satisfied Customer
– Increased Employee Motivation
– Better Supplier Relationships
Categories of E-Business Solutions
• Business-to-Business (B2B)
• Business-to-Consumer (B2C)
• Consumer-to-Consumer (C2C)
• Consumer-to-Business (C2B)
• Mobile Commerce
Building E-Business Models
• Market Opportunity Analysis
• Value Proposition
• Online Strategy
• Resource Management
• Source of Revenue
Revenue Models
• There are many revenue models that exists on
the internet, but some of the most popular
ones are:
– Advertising
– Affiliation
– Licensing
– Sales
– Subscription
E-Business Models
• Broker Models
• Auction Models
• Reverse Auction
• Advertising Model
• Portal
• Info-mediary Models
• Merchant Models
• Community Models
• E-Procurement
M-Commerce
• M-commerce allows integration of the traditional
e-business models on the mobile networks.
• Number of applications of m-commerce includes:
– Mobile Ticketing
– Mobile Coupons
– Mobile Content
– Local Services
– Mobile Banking
– Mobile Marketing
What is ERP?
• Software tools
• Manages business systems
– Supply chain, receiving, inventory, customer orders,
production planning, shipping, accounting, HR
• Allows automation and integration of business
processes
• Enables data and information sharing across
enterprise
• Introduces “best practices”
ERP Components
• ERP systems are modular.
• It supports multiple modules each for a given
functionality.
• All functional modules share data among each other
using common databases.
• ERP Components are:
– Finance
– Sales & Distribution
– Materials Management
– Production Planning & Control
– Human Resource Management
– Business-to-Business
Disadvantages of ERP
• Focus on applications rather than business processes
• Lack of ERP project management expertise
• Scope and change management
• Sub-optimization of system capabilities
• Staffing and retaining full time project resources
• Experienced implementation partners
• Product maturity and limitations
• Customization of the ERP software is limited.
• Re-engineering of business processes to fit the "industry standard" prescribed
by the ERP system may lead to a loss of competitive advantage.
• ERPs are often seen as too rigid and too difficult to adapt to the specific
workflow
• Resistance to share internal data by key employees, results in poor
effectiveness of the software.
• The system may be too complex measured against the actual needs of the
customers.
• ERP Systems centralize the data in one place, example customer , financial
data. This can increase the risk of loss of sensitive information.
Cloud Computing
• Cloud computing is shared pools of configurable computer
system resources and higher-level services that can be
rapidly provisioned with minimal management effort,
often over the Internet.
• Cloud computing relies on sharing of resources to achieve
coherence and economies of scale, similar to a public utility
cloud computing is the delivery of computing services—servers, storage,
databases, networking, software, analytics, intelligence and more
37 Signals
Zoho
…
PaaS
Why providing SaaS?
Easier to maintain
Centralizing computing resource
Control usage
No illegal copies
Why using SaaS?
Reduce expenses
Multiple computers
Multiple users
Ease of usage
Easy installation
Access everywhere
Who are they?
GoogleAppEngine
Amazon EC2
Microsoft Azure
IBM Blue
Cloud.vn
Why Cloud Computing?
New Technology Trends and Business Models
Web 2.0
Pay-as-you-go
New niche of market.
Cloud Computing vs. P2P?
Both take advantage of remote resources
P2P: does not use clouds (datacenters), peers do not
get paid, lower reliability
Cloud Computing vs. Grid Computing?
Both use clouds
Grid Computing requires commitment. Not public cloud
Why Cloud Computing?
New Application Opportunities
Mobile and web applications
Mobile devices: low memory & computation power
Extensions of desktop software
Matlab, Mathematica
Batch processing
Peter Harkins at The Washington Post: 200 EC2
instances (1,407 server hours), convert 17,481 pages of
Hillary Clinton’s travel documents within 9 hours
The New York Times used 100 Amazon EC2 instances to
recognize 4TB of raw TIFF image into 1.1 million
PDFs in 24 hours ($240)
Why Cloud Computing?
Pay by use instead of provisioning for peak
Capacity
Resources
Resources
Demand Capacity
Demand
Time Time
Unused resources
Why Cloud Computing?
Capacity
Unused resources
Resources
Demand
Time
161
The Browsers and its Timeline
2006 internet explorer 7 is released
October 2006, Microsoft releases version 7
of their browser, adopting some features
form its open source competition (firefox)
such as tabbed browsing and anti-phishing
protection.
162
The Browsers and its Timeline
2008 Google Chrome, Browser War
Intensifies
Google launches its own web browser,
entering into the browser battles in market
share, Lightweight, fast and surprisingly
stable compared to early releases of other
web browsers, the second browser war
gains another strong competitor
163
The Browsers and its Timeline
164
Information Security
Office of Budget and Finance
Education – Partnership – Solutions
What is IoT?
Smart Appliances
Wearable
Tech
Healthcare
Information Security
Office of Budget and Finance
Education – Partnership – Solutions
The IoT Market Information Security
Office of Budget and Finance
Education – Partnership – Solutions
Information Security
Does IoT add additional risk? Office of Budget and Finance
Education – Partnership – Solutions
Attacking IoT
Construction equipment
Healthcare
Wearable technology
Consumer
Cars, RVs, campers, trucks
Home appliances
Wearables devices
IoT Devices Characteristics
Small
Long life: 5 to 10 years
Long battery life; 3 to 5 years
Low maintenance
Inexpensive
Most likely wireless
May be embedded
New Business Model
Product profits are limited by competition usually
less than 10%.
Replacement parts are more profitable. An
example is the printer and ink cartridges.
iPods were cheap. Music services made the profit.
Replacement profits can be 25%+.
Service profits can be 25%+
Device producers have an advantage because
they are incumbents.
ERP- Enterprise Resource Planning systems
ERP is a business software system that support business or enterprise
throughout the organizing, planning, maintaining, tracking and utilization
of organization resources(Man, Machine, Material and Money).
ERP is gate way to integrate the data and processes of an organization into
single system with all modules that supports the core business areas.
ERP software system allows the business to achieve real time business
process, increase productivity, improves delivery, reduce cost and
increase profits, increase product quality, improve information and
performance management.
ERP is an integrated systems of different business process for e.g. if a
company has different departments like sales department, production
department, material management, finance department, etc,
so in ERP we have an integration of all the departments and they all use
common database.
BIRTH OF ERP
ERP Software meets the needs of customers from the small organizations to Multi-
National companies .
ERP SAP software was founded by five former IBM employees in the year 1972’s.
SAP company head quarters are located at the Walldorf, Germany
SAP software has been updated to several versions such as SAP R/1, SAP R/2 and
SAP R/3.
SAP had subsidiaries in many countries and more than 47k customers organization
using this SAP software.
SAP company is continuously developing their labs around the world like in
Germany, China, United States, China, Canada, India, etc.
Further SAP company is expanding and developing their products according to the
needs of customers.
What is SAP software – SAP is a world largest software company in the world. It is a business
software package that developed to integrates and implement all the areas of business in one
system.
SAP software helps in reduction of inventory levels and cycle times and helps to increase
productivity.
Software enables better planning, scheduling and tracking everything that is performing in an
organization.
It wont allows duplicate data so the data can be accurate in the system.
Data is secures and no data or information is accessible by an unauthorized user.