Infrastructures Sustainable Technologies Session 11

MIS (Management Information Systems) is the hardware and software systems within an enterprise that provide the information that management needs to run an enterprise. • Hardware Physical devices associated with a computer • Software is the set of instructions the hardware executes to carry out specific tasks • Network is a communication system created by linking two or more devices and establishing a standard methodology in which they can communicate • Client is a computer designed to request information from a server • Server is a computer dedicated to providing information in response to request Supported Operating Systems The supported operating systems derived from this page are for a set of products made up of the combination of Base SAS and the orderable server-side products that are installed at the same time as Base SAS. Supporting change could include the: • Project management of change • People psychology aspects of change • Communications in change • The importance of clarity in change • HR issues attached to change • Redeployment • Policy changes • Individual development needs • Development – Skills change • Behaviours/ attitudes • Staffing levels required (up or down) Supporting the Environment At Dimension Data we’re committed to responsible environmental stewardship and sustainable business practices. Being a sustainable business means focusing on the triple bottom line of people, profit and planet. Our people are integral to our environmental practices and our mission is to raise awareness and show our employees how they can make a positive impact on the environment. SUPPORTING OPERATIONS INFORMATION MIS INFRASTRUCTURE Imagine taking a quick trip to the printer on the other side of the room, and when you turn around you find that your laptop has been stolen. How painful would you find this experience? What types of information would you lose? How much time would it take you to recover all of that information? A few things you might lose include music, movies, emails, assignments, saved passwords, not to mention that all-important 40-page paper that took you more than a month to complete. If this sounds painful then you want to pay particular attention to this section and learn how to eliminate this pain. Be sure to explain to your students that an organization’s backup strategy must fit the organization’s needs. If the organization only needs to backup its information daily, then there is no need to backup the information hourly Ask your students how many of them backup the information on their computers. Ask your students what would happen if their computer crashed right now and they couldn’t recovery any of their information. Would they lose days, weeks, or months of information? Encourage your students to research the Internet for PC backup information and create a personal information backup plan. is a great place to store important information Fault tolerance A general concept that a system has the ability to respond to unexpected failures or system crashes as the backup system immediately and automatically takes over with no loss of service. Failover A specific type of fault tolerance, occurs when a redundant storage server offers an exact replica of the real-time data and if the primary server crashes the users are automatically directed to the secondary server or backup server. Failback Occurs when the primary machine recovers and resumes operations taking over from the secondary server. A single backup or restore failure can cost an organization more than time and money; some data cannot be recreated, and the business intelligence lost from that data can be tremendous. Chief information officers (CIO) should have enough confidence in their backup and recovery systems that they could walk around and randomly pull out cables to prove that the systems are safe. The CIO should also be secure enough to perform this test during peak business hours. Hurricanes, floods, fires, and many other types of natural disasters can have devastating effects on businesses. One of the most common types of hardware failures occurs from rats, mice, and squirrels chewing on cords, cables, and devices. Explain to your students that the optimal recovery plan in terms of costs and time is where the two lines intersect. Organizations should choose a backup and recovery strategy that is in line with its business goals. If the organization deals with large volumes of critical information, it will require daily backups, perhaps even hourly backups, to storage servers. If the organization deals with small amounts of noncritical information, then it might require only weekly backups to tapes, CDs, or DVDs. Deciding how often to back up information and what media to use is a critical business decision. If an organization decides to back up on a weekly basis, then it is taking the risk that, if a total system crash occurs, it could lose a week’s worth of work. If this risk is acceptable, then a weekly backup strategy will work. If this risk is unacceptable, then the organization needs to move to a daily backup strategy. Some organizations find the risk of losing a day’s worth of work too high and move to an hourly backup strategy. Union Bank of California has created a disaster recovery plan that includes multiple data centers in diverse locations, mirrored sites which can take over at the flick of a switch, hot sites – where staff can walk in and start working exactly as they would if they were in their normal location – and a vast amount of redundancy. Hot site A separate and fully equipped facility where the company can move immediately after a disaster and resume business. Warm site A separate facility with computer equipment that requires installation and configuration. Cold site A separate facility that does not have any computer equipment but is a place where employees can move after a disaster. Business continuity planning Business continuity planning (or business continuity and resiliency planning) is the process of creating systems of prevention and recovery to deal with potential threats to a company. A business continuity plan is a plan to continue operations if a place of business is affected by different levels of disaster which can be localized short term disasters, to days long building wide problems, to a permanent loss of a building. Such a plan typically explains how the business would recover its operations or move operations to another location after damage by events like natural disasters, theft, or flooding. For example, if a fire destroys an office building or data center, the people and business or data center operations would relocate to a recovery site. Any event that could negatively impact operations is included in the plan, such as supply chain interruption, loss of or damage to critical infrastructure (major machinery or computing /network resource). As such, risk management must be incorporated as part of BCP. In the US, government entities refer to the process as continuity of operations planning (COOP). There are two kinds of event that might occur: * Emergency – a sudden unexpected event requiring immediate action * Emergency preparedness – ensures a company is ready to respond to an emergency in an organized, timely, and effective manner The things that must be prepared when dealing with potential threats that may affect a place of a business: – Technology Recovery Strategies – Business Impact Analysis – Emergency Notification Services Technology Recovery Strategy are divided into four items: (Servers, Computers, Wireless Devices) (Applications such as Email, Payroll, Instant Messaging) (Wireless, LAN, Fiber, Cable) (Climate Control, Power Supply, Security) Business impact analysis – Identifies all critical business functions and the effect that a specific disaster may have upon them Technology failure – occurs when the ability of a company to operate is impaired because of a hardware, software, or data outage Incident – Unplanned interruption of a service Incident management – the process responsible for managing how incidents are identified and corrected Characteristics of an agile MIS infrastructure Accessibility refers to the varying levels that define what a user can access, view, or perform when operating a system. Web accessibility allows people with disabilities to use the Web .Administrator access unrestricted access to the entire system. Availability is time frames when the system is operational. Unavailable is time frames when a system is not operating and cannot be used. High availability is when the system is continuously operational at all times. · Moore’s Law – Refers to the computer chip performance per dollar doubles every 18 months · Sustainable, or “green,” MIS – Describes the production, management, use, and disposal of technology in a way that minimizes damage to the environment · Corporate social responsibility – Companies’ acknowledged responsibility to society The general trend in MIS is toward smaller, faster, and cheaper devices. Gordon Moore, co-founder of Intel, the world’s largest producer of computer chips or microprocessors, observed in 1965 that continued advances in technological innovation made it possible to reduce the size of a computer chip (the brains of a computer, or even a cell phone now) while doubling its capacity every two years. There are Three Primary Side Effects Of Businesses’ Expanded Use Of Technology : 1. Increased Electronic Waste 2. Increased Energy Consumption 3. Increased Carbon Emissions Increased Electronic Waste E-waste, short for electronic waste, can be any outdated or obsolete appliance or electronic device found in offices, homes and pants pockets. Televisions, microwaves, computers and cell phones are all common examples of e-waste. Sustainable MIS disposal, describes the production, management, use and disposal of technology in a way that minimizes damage to the environment Increased Energy Consumption Energy consumption – The amount of energy consumed by business processes and systems. Huge increases in technology use have greatly amplified energy consumption The energy consumed by a computer is estimated to produce as much as 10 percent of the amount of carbon dioxide produced by an automobile Increased Carbon Emissions Carbon emissions , Carbon dioxide and carbon monoxide produced by business processes and systems When left on continuously, a single desktop computer and monitor can consume at least 100 watts of power per hour. The major human-generated greenhouse gases, such as carbon emissions from energy use, are very likely responsible for the increases in climatic temperature over the past half a century. The components of a sustainable MIS infrastructure include : Grid computing – A collection of computers, often geographically dispersed, that are coordinated to solve a common problem. With grid computing a problem is broken into pieces and distributed to many machines, allowing faster processing than could occur with a single system. Computers typically use less than 25 percent of their processing power, leaving more than 75 percent available for other tasks. Innovatively, grid computing takes advantage of this unused processing power by linking thousands of individual computers around the world to create a “virtual supercomputer” that can process intensive tasks Smart grid Delivers electricity using two-way digital technology. What is Virtual Computing? Virtual computing allows computer users remote access to software applications and processes when they need it. Users gain access via the Internet through a wireless or network server. For a fee, users can boost their computers’ capabilities, size, performance, processes and/or software applications whenever they need it. This real-time technology offers: • Operating and utility systems • Allocation and reassignment of input/output and other processes • Data backup • Automated problem solving and troubleshooting • Tools for monitoring and managing systems Users can access software applications for a single computer or an entire network because of the ability to select only what you need when you need it. They also can save or back up data and text documents to a virtual server (thus freeing space on individual computers) and reallocate or assign different processes to the virtual environment. This enables computers to operate at optimal speeds. Virtual computing initially began as a method of borrowing space or storage for computer systems, but it’s since grown significantly, offering data and software applications, as well as operating and utility systems. The corporate environment most commonly uses it, where IT system managers run multiple applications on several servers. Cloud storage In general, the definition of cloud computing is the combined use of computer technology in a network with the development of internet-based which has the function to run a program or application via a computer – a computer connected at the same time, but not all that terkonekasi via the Internet using cloud computing. Cloud-based computer technology system is a technology that makes the Internet as a central server for managing data and user applications. This technology allows users to run the program without the installation and allow users to access their personal data through a computer with internet access. Benefits of Cloud Computing And Application In Everyday Life – days After a brief elaboration of the definition above could certainly use technology to the cloud system is quite easy for users other than in terms of the efficiency of the data, as well as cost savings. Here are the benefits of the benefits to be gained through cloud-based technology system. 1. All Data Stored In Centralized Server One of the advantages of cloud technology is enabling users to store data centrally on a server based on the services provided by service providers of Cloud Computing itself. In addition, users also do not have to bother anymore to provide infrastructure such as data center, media storage / storage etc because all has been available virtually. Security of user data can be stored safely through the server provided by a service provider such as Cloud Computing technology platform guarantees, warranties ISO, personal data, etc. 3. Flexibility and Scalability High Cloud technology offers flexibility with ease of access to data, whenever and wherever we are with a note that the user (users) connected to the Internet. Additionally, users can easily increase or decrease the capacity of data storage without the need to purchase additional hardware such as the hard disk. Even one of the world-renowned IT practitioners, the late Steve Jobs said that the purchase of physical memory to store data such as the hard drive is useless if we can save it as a virtual / via the internet. The cost savings will be the purchase of inventory, such as infrastructure, hard drive, etc. will be reduced because the user will be charged regular monthly compensation in accordance with the service package agreed upon with the service provider of Cloud Computing. Royalties on software licensing costs can also be reduced because all have been run through Cloud-based computing. Application of Cloud Computing has been done by several world-renowned IT companies such as Google through the Google Drive app, IBM through Blue Cord Initiative, Microsoft with its operating system based Cloud Computing, Windows Azure and so on. On the national scene itself Cloud technology application can also be seen through the use Point of Sale / cashier program. One of the companies that develop products based on the Cloud system is DealPOS. The working method Point of Sale (POS) is to distribute retail store sales data that have been inputted by the cashier to retail store owners via the internet anywhere shopkeepers are. In addition, the renowned national telecommunications company, Telkom also developed a Cloud-based computing system through Telkom Cloud VPS with Telkom and Telkom program Collaboration directed to customers SME (Small-Medium Enterprises). How Cloud Computing Systems Work Cloud systems work using the internet as a server in data processing. The system allows users to log on to the Internet connected to the program to run needed applications without installation. Infrastructure such as data storage media and also the instruction / command from the user is stored virtually through the Internet network and then orders – orders were followed to the application server. Once the order is received in the application server and then the data is processed and the final process the user will be presented with a page that has been updated in accordance with the instructions received earlier so that consumers will benefit. For example, through the use of email such as Yahoo or Gmail. Data on multiple servers are integrated globally without having to download software to use it. Users only need an internet connection and all data is managed directly by Yahoo and Google. Software and memory for user data is not in the computer but are integrated directly via the Cloud system using a computer connected to the internet. · Multi-tenancy – The cloud means that a single instance of a system serves multiple customers · Single-tenancy – Each customer or tenant must purchase and maintain an individual system · Cloud fabric – The software that makes possible the benefits of cloud computing, such as multi-tenancy Characteristics of Cloud Computing Cloud Computing pick five (5) main characteristics are: · On-Demand Self-Service: Users can select the type and specifications of the services required, thereby reducing the interaction with the service provider cloud (cloud provider). · Broad Network Access: Cloud services require network access sufficient so that the service can be accessed smoothly. · Resource Pooling: computing resources derived from the set of servers that the location is different, is not centralized in one location. · Rapid Elasticity: capability of service should be regulated according to the desired capacity and can be done in a short time. · Measured Service: A service used by the user can be measured clearly so that users only pay the rent according to the amount of service used. In cloud computing there are three (3) service model, namely: · Software as a Service (SaaS): services provided to users in the form of software like office suite. Sample Google Doc and Apple iWork which is an office application. Types of users of the SaaS service is the End User, users living using any application. · Platform as a Service (PaaS): services provided to users in the form of a platform to support the process of software development such as database, service, and platform programming language. Examples of Google App Engine, RedHat OpenShift, and Coding. Type the use of PaaS service is the Application Developer, application developers can immediately focus on developing applications without the need to set up their own platform development. · Infrastructure as a Service (IaaS): services provided to users in the form of a computer server (virtual machine) and network services such as VPS (Virtual Private Server). Examples of Amazon Web Services (AWS), Linode, Digital Ocean, and Cloud Lightning. Types of users of IaaS services are Network / System Architect, sysadmin who prepares all of the system configuration from the operating system, network, until the application development platform. There are four (4) on the cloud computing deployment models: · Public Cloud: cloud services can be accessed by anyone (Public). Public Cloud services are paid and some are free. Users Public Cloud in general is the general public. Excess use of Public Cloud, users do not need to bother to think about the cost of investment, infrastructure and human resources so that the service can continue to run. Data can also be easily stored and accessed over the internet connection. The drawback requires adequate internet access and is very dependent on the service provider. · Private Cloud: cloud services can only be accessed by the person / organization specific (Private). This model is widely used in education or enterprise environment. The main excess of the Private Cloud is the confidentiality of the data. If the Private Cloud is implemented on the intranet, it can save costs and access faster. The drawback costly infrastructure investment and human resources. · Community Cloud: cloud services are developed by a community that has similar interests or goals. Community or association of universities in Indonesia to build cloud services that contain data and applications to the educational environment. · Hybrid Cloud: the cloud service is a combination of Private Cloud, Public Cloud, and / or Community Cloud. For example, a company uses a combination of Private and Public Cloud, applications and data that is not confidential or intended to be placed on the consumer while the Public Cloud for applications and highly sensitive data is placed in the Private Cloud. Cloud Computing is present with a wide range of computing solutions to problems, but there is also a risk that makes an organization does not want to adapt to cloud computing. Two of the most important risk is the problem of security and confidentiality of data, because our data is uploaded to the internet where everyone can access these services or worry experienced cyber attacks.