Friday 30 September 2011

Week 8: Databases and Data Warehouses

List, Describe and Provide an Example of Each of the Five  Characteristics of High Quality Information

As we progress into what is often called the 'Information Age', the gap between what is considered to be low quality and high quality information is becoming of greater significance. This is particularly true in business where information or poor information can cost an organisation time, money and even reputation.

When it comes to determining what is ‘High Quality’ information, the five characteristics looked for are;

·         Accuracy

·         Completeness

·         Consistency

·         Uniqueness

·         Timeliness




Define the Relationship Between a Database and a Database Management System

For many businesses, the most effective way to store and access information is through the use of a database. In its most basic form, a Database maintains information about various types of objects, events, people and places. To help with the finding of information, the database is also usually given a schema which is a description of the objects and entries represented within it and the relationship between them. These schemas can take many different forms and result in the creation of a variety of data models such as;

·         Hierarchical Database Model

·         Network Database Model

·         Relational Database Model

Closely related to the database, is the Database Management System (DBMS) used to run it. Where the database itself, is the particular information and data stored and accessed, the DBMS is simply the computer program used to manage and query the database.


Describe the Advantages an Organisation Can Gain by Using a Database

From a business perspective, the use of databases as a means of storing and accessing information offers many advantages. The five most prominent of these benefits are;
·         Increased Flexibility
·         Increased Scalability and Performance
·         Reduced Information Redundancy
·         Increased Information Integrity
·         Increased Information Security
 
Increased Flexibility. Like strong business structures, a good database can handle changes quickly and easily. As well as this, they also provide an organisation with flexibility by allowing each user to access relevant information in whatever way best suits their needs or requirements.

Increased Scalability and Performance. In today’s modern business world many organisations are finding that they must support hundreds or thousands of online users, all who want to access and share information at a high performance level. In this way databases benefit business operations because they can scale to exceptional levels and allow all types of users and programs to perform information-processing and information-searching tasks at a relatively fast speed.

Reduced Information Redundancy. The duplication of information often occurs in an organisation because information is stored in multiple locations making it inconsistent and possibly inaccurate. Fortunately, databases can eliminate information redundancy by recording each piece of information in only one place. In this way, databases have the benefit of saving space, making updates easier to perform and improving information quality.

Increased Information Integrity. Databases help ensure the quality and integrity of its information through the use of integrity constraints. These constraints are defined and built into the database design and the DBMS then ensures that users never violate these ‘rules’.

Increased Information Security. To any business, information is one of their most valuable organisational assets. For this reason, a firm’s information must be protected from unauthorised users and misuse. The extensive security features offered in many databases such as passwords, access levels and access controls help organisations achieve this.



Define the Fundamental Concepts of the Relational Database Model


The relational database model is a type of database that stores information in the form of logically related two-dimensional tables each consisting of rows and columns. The fundamental concepts of this model are;

·         Entities

·         Entity Classes

·         Attributes

·         Keys

·         Relationships


Entities. People Places, things, transactions or events about which information is stored
 
Entity Classes. The collection of similar entities such as Customers, Products or Distributors
 
Attributes. Also known as fields or columns. They are the characteristics or properties of an entity class
 
Keys. Used to manage and organise various entity classes within the database and create logical relationships between them. A Primary Key is a field or group of fields that uniquely identifies a given entity in a table such as Customer or Product ID. A Foreign Key  is a primary key of one table that appears as an attribute in another table and acts to provide a logical relationship between the two
 
Relationship. A link between two tables of a database which is created when a foreign key in one references the primary key of another.



Describe the Benefits of a Data-Driven Website
 
A data-driven website is an interactive website that is kept constantly updated and relevant to the needs of its users and customers through the use of a database. In a data-driven website such as Wikipedia, the customers can enter search criteria into an engine and the database then runs a quick query and displays the relevant information. It is particularly useful when a site offers a great deal of products or services. These types of dynamic websites are most beneficial to businesses that display continually changing information such as press releases, new product information and updated pricing. Although they can be more expensive than more ‘static’ websites the advantages of data-driven sites are extensive and include;

·         Development

·         Content Management

·         Future Expandability

·         Minimising Human Error

·         Cutting Production and Update Costs

·         More Efficient

·         Improved Stability




If You Were a Sales Manager in a Multinational Company, What are Some Reports You Would Want to See?

Within Multinational companies management must maintain awareness of the happenings both within and outside of their regional area. For this reason database reports can be extremely useful in helping determine the organisation’s current and future position. For example, a Sales Manager from one of these companies may want to see reports such as;

·         Monthly, Quarterly or Yearly Budgets

·         Projected Earnings

·         Sales By Region

·         Reported Profits of Competitors

·         Monthly, Quarterly or Yearly Profits

·         Projected Versus Annual Sales

Wednesday 28 September 2011

Week 7: Networks and Wireless

Explain the Business Benefits of Using Wireless Technology


The rapid and widespread growth and development of wireless technology, especially in the last few decades, has seen many businesses take advantage of the benefits it offers. With its ability to increase productivity, speed up product delivery and reduce operating costs, the use of wireless technologies has become a necessity for businesses wishing to remain competitive in their industry. By providing universal access to information and applications to its users, wireless technologies have the power to automate business processes as well as facilitate the convenient and timely transfer of information. As the range for wireless networks continues to expand and grow, business employees are given the ability to conduct business 24 hours a day, 365 days a year, no matter their physical location.



 Describe the Business Benefits Associated with VoIP

Voice over IP (VoIP) is a system that uses TCP/IP technology to transmit voice calls over internet technology. Offering a fixed fee for calling within the country of origin and a low per-minute charge for international calls, VoIP offers business the benefits of significant cost savings, productivity gains and service enhancement.

 As one of the most popular options of VoIP, Skype also offers a variety of other benefits to business. With its extensive features such as free calling to other members, call forwarding, conference calling and file sharing capabilities just to name a few, many companies such as RipCurl are taking advantage of the benefits Skype offers in company communication.





Compare LANs and WANs

 The two main types of networks that make up the internet are known as Local Area Networks (LANs) and Wide Area Networks (WANs). LANs connect computers that reside in a single geographic location on the premises of the company that operates it. In comparison, a WAN connects computers at different geographic sites. Essentially, the internet is made up of a bunch of LANs interconnected by WANs, and as seen in the table below, both network types have a variety of key differences.

 
For a more detailed comparison of LANs and WANs click here



Describe RFID and How it Can Be Used to Help Make a Supply Chain More Effective

Radio Frequency Identification (RFID) is a technology that uses active or passive tags in the form of chips or smart labels that can store unique identifiers and relay this information to electronic readers. Combining tiny chips with antenna, when placed on an item these tags automatically radios its location to RFID readers on shop shelves, checkout counters, loading bay doors and shopping carts. In this way, RFID technology helps to make the supply chain more effective by automatically and continuously taking inventory. As well as providing more current and accurate information to the supply chain, RFID also has the ability to reduce costs by requiring fewer staff and making the business processes more transparent and efficient.




What is One New Emerging Technology That Could Change a Specific Industry

Currently, the emerging technology of RFID is heavily used in inventory tracking, but it also has relevant applications in other areas such as the sporting industry. For example, in many major sporting events worldwide, RFID transponders are being used as timing systems. This works by attaching a chip to the athlete’s shoes, bicycle or other apparel. In this way, timing can begin and end with a great deal of accuracy, with the timer stopping when the person crosses the finishing mat and signals a nearby antenna. In doing this, RFID technology is changing the nature of the whole industry, reducing the controversy of such events as close finishes between competitors.

Week 6: Enterprise Architectures

What is Information Architecture and What is Information Infrastructure and How Do They Differ and How Do They Relate to Each Other?


As society begins to turn more and more to technology in order to do business, information architecture and infrastructure will remain at the heart of most common companies’ operating capabilities. In its simplest form, Information Architecture identifies and determines where and how important information, such as customer records and financial statements are maintained and secured. In this way, this form of architecture focuses on the three areas of;

·         Backup and Recovery

·         Disaster Recovery

·         Information Security


In comparison, Information Infrastructure refers to the hardware, software and telecommunication equipment that, when combined, provides the underlying foundation to support the organisation’s goals. Unlike Information Architecture where the focus is on the security of the data itself, solid infrastructure relies on its performance to deliver and hold these records. Therefore, following this reasoning, the five primary characteristics of a good Information Infrastructure are;

·         Flexibility

·         Scalability

·         Reliability

·         Availability

·         Performance
 

In this way, despite their differences, both Information Architecture and Infrastructure are shown to work hand-in-hand to help companies reach their goals. Where Information Architecture provides set guidelines regarding the handling and maintenance of data, without a solid infrastructure that provides the hardware and software needed to support these plans, the business’ best intention will most likely fail. The fact is, that the future of any organisation is greatly dependent on its ability to meet its partners and customers expectations and terms at their pace, at any time of the day and in any location. This is why strong and flexible infrastructure is crucial for any business.



Describe How an Organisation Can Implement a Solid Information Architecture

In order to implement a solid information architecture, an organisation  must focus on the three primary areas of;

·         Backup and Recovery

·         Disaster Recovery

·         Information Security
 

Backup and Recovery. In order to create any solid information architecture it is important to create a suitable back-up and recovery plan in order to minimise the damage of a system crash. In this way, all important information should be regularly backed up so that an exact copy is stored away if needed. Then, in the event of a system crash or failure, the organisation will be able to recover much more efficiently and quickly get the system back up and running.

Disaster Recovery. As seen in the work of such firms as Continuity Planners Australia, Disaster Recovery is of crucial importance to every business. In order to implement solid information architecture, a disaster recovery plan must be put in place, outlining the process of recovering information and IT systems in the event of a catastrophe. In doing this, the organisation should plan ahead and ensure that the architecture facilitates the location of backup information, and supports the use of a hot or cold site in the event of the main building being destroyed.

Information Security. When large amounts of confidential and private organisational information is stored using technology, breaches of security can be catastrophic. For this reason, solid information architecture should provide for strict management of user access and the regular installation of up-to-date antivirus software and patches. One of the biggest security risks to data protection is often the use of multiple passwords and usernames, especially when it causes employees to  write them down in order to keep track of all their login details. To counter this, password management strategies such as Single Sign On (SSO) can be incorporated into the organisation’s architecture so that only one set of credentials is needed per employee.



List and Describe the Five Requirement Characteristics of Infrastructure Architecture


As seen in the image above, Infrastructure architecture is made up of 5 main characteristics;

Flexibility. Systems must be flexible enough to meet all types of business changes without having to redesign all its systems

Scalability. An effective system is able to adapt to increased demands. If an organisation grows faster than anticipated it might experience significant degradations. For this reason, trying to anticipate future demands is the key to building scalable systems.

Reliability. An organisation’s systems should function correctly and provide accurate information. If it fails to do so, the inaccurate data could result in information corruption.

Availability. The characteristic that addresses when systems can be accessed by users. All organisations should ultimately aim towards ‘High Availability’, where the system is continuously operational for a desirably long length of time.

Performance. All effective systems should be able to be measured to determine how quickly they perform a certain process or transaction. Low performance capacity can have a devastatingly negative impact on a business, and so organisations should conduct capacity planning to help determine future IT infrastructure requirements.



Describe the Business Value in Deploying a Service Oriented Architecture

Service Oriented Architecture (SOA) is a business driven approach that supports the integrating of a business as linked, repeatable tasks or services. In this way, SOA brings value to the business, encouraging innovation by ensuring that IT systems can adapt quickly, easily and economically to support rapidly changing business needs.

The fact is that in today’s business IT environment, enterprise architectures flow across operating systems, applications, system software and application infrastructure. For this reason, when applications become redundant it is not always possible to build a new architecture from scratch. It is in this way that SOA is particularly valuable. To be successful, all organisations must be able to quickly and efficiently respond to changes.  By allowing organisations to plug in new services or upgrade existing ones in a granular fashion, SOA ensures this requirement can be achieved. In doing this, it enables the business to address any new business requirements and provides the option to make the services consumable across different channels.




What is an Event?

An ‘Event’ is an electronic message indicating that something has happened. In many ways it is the eyes and ears of the business expressed in technology, detecting threats and opportunities, and alerting those who can act on the information.



What is a Service?

A service is a set of related commands that can be re-used to fulfil certain objectives such as ‘credit check’ and ‘process payment’.  In this way, it is more like a software product than a coding project, and must both appeal to a broad audience and be reusable if it is to have any kind of significant impact on company productivity.



What Emerging Technologies can Companies use to Increase Performance and Utilise their Infrastructure More Effectively?
In order to keep business systems up and running, today’s organisations must continuously monitor the emergence of new technologies that can be used to increase performance and utilise their infrastructure more effectively. Two of these technologies are;

·         Virtualisation

·         Grid Computing


Virtualisation is a framework for dividing the resources of a computer into multiple execution environments. It is a way of increasing physical resources to maximise the investment in hardware and consolidate and reduce hardware infrastructure.


 
Grid Computing is an aggregation of geographically dispersed computing, storage and network resources, coordinated to deliver improved performance, higher quality of service, better utilisation and easier access to data. In this way, it enables the virtualisation of distributed computing and data resources such as processing, network bandwidth and storage capacity to create a single system image where users and applications are granted seamless access to vast IT capabilities.



Tuesday 27 September 2011

Week 5: Ethics and Security

Explain the Ethical Issues Surrounding Information Technology

As the internet and information software has become more advanced, the ethical issues surrounding information technology have become more and more pronounced in the world of eBusiness.

The five main technology-related ethical issues faced by businesses and individuals today include;

·         Intellectual Property:- The collection of rights that protect creative and intellectual effort

·         Copyright:- The exclusive right to do, or omit to do, certain acts with intangible property such as music, video games and other propriety  documents

·         Pirated Software:- The unauthorised duplication, distribution, or sale of copyrighted software

·         Counterfeit Software:- Software that is manufactured to look like the real thing and sold as such
As seen in the following video, the issues of pirated and counterfeited software especially, has become a prominent ethical concept stemming from advances in the technology that is now available to individuals.






Describe a Situation Involving Technology That is Ethical but Illegal

Within the area of information ethics there are very few hard and fast rules for always determining what is or is not ethical. The fact is that knowing the law, will not always help you in making the ‘right’ choice because what might be ethical is not always legal.
Take for example, a situation in which someone is in a position to save someone’s life, but the only way to do so is by sharing confidential information. What would be the right thing to do?
Alternately, another scenario could involve the action of backing up software. Under the Copyright Act (1968), it is technically illegal to copy, use and distribute software, but think of a business such as a doctor’s surgery running on a database program like BlueChip. From an ethical perspective it is the surgery’s duty to maintain, and care for all their patients’ records. Is it ok then if, as long as they are not sharing these records with any other party, they make a copy of the software to back-up all the information it holds in the event of a crash?



Describe and Explain One of the Computer Use Policies That a Company Might Employ
When it comes to the treatment and access of corporate information, it is important that managers of an organisation create a corporate culture amongst their staff based on ethical principles. This can be achieved through the development of written policies known as ‘computer use policies’ or ‘e-Policies’. These policies set the company’s policies and procedures that address the ethical use of computers and internet usage within the work environment.
 The most important of these policies is that known as the Ethical Computer Use Policy (ECUP). As the basis of all other policies the organisation might establish, an ECUP ensures that users know how to behave at work and that the organisation has a published standard by which to deal with user infractions. For example, this type of policy is widely used amongst business and educational facilities, where, after an appropriate number of warnings, the continuous breach of its conditions may result in the termination of an employee, or suspension of a student.
In this way, the enforcement of an ECUP is most effective when it is done on the basis of informed consent. Under this concept, a conscientious effort must be made on behalf of the organisation to inform all users of the conditions of the policy, and by agreeing to use the system on this basis, it is understood that the user consents to abide by these rules



What Are The 5 Main Technology Security Risks?

When they hear the term ‘Technology Security Risk’, the first thought that passes through many people’s minds are Spam and Software Viruses. Although it is true that these two concepts do pose a significant threat to internet and technological security, they are not the only ones in existence. Instead, the vast amount of security risks that can impact the use of technology in business can be divided into 5 main types;

·         Human Error

·         Natural Disaster

·         Technical Failures

·         Deliberate Acts

·         Management Failure

 As can be seen below, within these 5 risks, there are many threats to a business’ information technology besides the most recognized of Spam and Software Viruses.



Outline One Way to Reduce Each Risk




What is a Disaster Recovery Plan, What Strategies Might a Firm Employ?

As seen by the recent disasters such as the September 11 Terrorist Attacks, Victorian Bushfires and Queensland Floods, all organisations should have a comprehensive data recovery plan in place to prepare for unexpected occurrences.  As a detailed process for recovering information and regaining access to IT systems after a disaster has taken place, this type of plan outlines such things as;

       ·         Communications Plan

      ·         Alternative Sites

      ·         Business Continuity

      ·         Location of Backup Data

In this way, Disaster Recovery Plans help a business to plan ahead
and develop executable strategies to deal with contingencies. By
doing this, the company ensures business continuity by making all
employees aware of exactly what happens in the event of a disaster. Some of these strategies include;

·       Storing back-up date and information in an off-site facility


·       Establishing a Hot Site (a fully equipped facility where the company can move immediately after a disaster and resume business)


·       Establishing a Cold Site (a separate facility that does not have any computer equipment , but where employees can move after a disaster)


·       Ensuring all recovery procedures are well documented and accessible to all organisation members        


·       Conducting regular recovery testing