Professional Documents
Culture Documents
Business Driven Information Systems 5th Edition Baltzan Solutions Manual 1
Business Driven Information Systems 5th Edition Baltzan Solutions Manual 1
Business Driven Information Systems 5th Edition Baltzan Solutions Manual 1
INFRASTRUCTURES: SUSTAINABLE
TECHNOLOGIES
Technical architecture refers to the structured process of designing and building software architecture, with focus
on interaction with software and hardware developers. Technical architecture is a part of software architecture,
which focuses on how to deal with certain aspects of the software engineering process. It allows us to design
better systems by:
• Meeting system requirements and objectives: Both functional and non-functional requirements can be
prioritized as "must have", "should have" or "want", where "must have" identifies properties that the system
must have in order to be acceptable. Architecture allows us to evaluate and make tradeoffs among
requirements of differing priority. Though system qualities (also known as non-functional requirements) can be
compromised later in the development process, many will not be met if not explicitly taken into account at the
architectural level.
• Enabling flexible partitioning of the system: A good architecture enables flexible distribution of the system by
allowing the system and its constituent applications to be partitioned among processors in many different ways
without having to redesign the distributable component parts. This requires careful attention to the distribution
potential of components early in the architectural design process.
• Reducing cost of maintenance and evolution: Architecture can help minimize the costs of maintaining and
evolving a given system over its entire lifetime by anticipating the main kinds of changes that will occur in the
system, ensuring that the system's overall design will facilitate such changes, and localizing as far as possible
LEARNING OUTCOMES
Learning Outcome 5.1: Explain MIS infrastructure and its three primary types.
The three primary areas where enterprise architects focus when maintaining a firm’s MIS infrastructure are:
• Supporting operations: Information MIS infrastructure identifies where and how important information, such as
customer records, is maintained and secured.
• Supporting change: Agile MIS infrastructure includes the hardware, software, and telecommunications
equipment that, when combined, provides the underlying foundation to support the organization’s goals.
• Supporting the environment: Sustainable MIS infrastructure identifies ways that a company can grow in terms
of computing resources while simultaneously becoming less dependent on hardware and energy consumption.
Learning Outcome 5.2: Identify the three primary areas associated with an information MIS infrastructure.
The three primary areas an information infrastructure provides to support continuous business operations are:
• Backup and recovery: A backup is an exact copy of a system’s information. Recovery is the ability to get a
system up and running in the event of a system crash or failure that includes restoring the information backup.
• Disaster recovery plan: This plan provides a detailed process for recovering information or a system in the
event of a catastrophic disaster.
• Business continuity plan: This details how a company recovers and restores critical business operations and
systems after a disaster or extended disruption.
CLASSROOM OPENER
Top Ten Data Failure Stories
CLASSROOM OPENER
Drivers and Trends for Enterprise Architectures
Change is inevitable and unavoidable, but that does not need to cost your business money, time, or
resources. Aligning IT with business requirements and being able to immediately respond to changes in those
requirements is what drives today's need for enterprise architecture.
CLASSROOM OPENER
Why Macs Make Sense in the Corporate Market
Apple's market share has jumped to more than 10% in the consumer PC market, according to IDC. And consumer
applications, from chat to Facebook, are seeping into offices. As more business folk consider notebook PCs for
personal as well as work activities, many choose Apples MacBooks.
CLASSROOM OPENER
Neil Young: The Old Man Uses Java
In his 1972 hit song "Old Man," rock legend Neil Young sings out: "Old man take a look at my life. I'm a lot like you
..." Indeed, it is Young who is now an "old man" of sorts and has compiled 45 years of archives about his music
career on Blu-ray discs using Java technology.
Young joined Sun Microsystems CEO and President Jonathan Schwartz and Rich Green, the company's executive
vice president for software, on stage during the JavaOne conference opening keynote to announce the new
archive project and demonstrate some of the interactive features of his upcoming Blu-ray disc box set.
Young also announced his collaboration with Sun and Reprise/Warner Bros. for the release of the upcoming Neil
Young Archive series on Blu-ray disc, powered by Java technology. Visit: www.java.com or www.neilyoung.com
for more information.
Young said the Blu-ray format delivers both unsurpassed 192/24 audio quality and high-definition video, capturing
the quality of the original analog master recordings in the best digital format available today. The first Neil Young
Archive release will be a 10 Blu-ray disc set available this fall from Reprise/Warner Bros. Records, covering
Young's career from 1963-1972.
"Previously, there was no way to browse archival material on a disc and listen to a song in high resolution at the
same time," said Young. "The technology had not yet evolved to that capability. It is important for me that the user
experience the high-resolution music along with the archival visual material. Previous technology required
unacceptable quality compromises. I am glad we waited and got it right. "
Moreover, "We needed technology to go through this chronological thing like a video game," Young said. "And
Java technology made it possible to do things we couldn't do just a few years ago. Java allows us to play the
music and walk through the archives. We wanted to do this in the '80s, but the DVD wasn't good enough; we were
defeated by the technology."
CLASSROOM EXERCISE
Backup and Recovery
Ask your students to answer the following questions:
• Do you have a backup strategy for your computer?
• How often do you backup?
• What do you backup?
• What type of format do you use for your backup?
• Where do you save the backup?
• How long do you save the backup?
Now ask your students that if you stole their computer or spilled a hot cup of coffee on their computer right now
how much information would they lose? Encourage your students to create a backup strategy.
Another common argument, one that is more difficult for open source advocates to contradict with hard facts, is
that closed source development allows more control over the final product. The theory behind this argument is that
open source software is primarily a volunteer effort, while closed-source development is typically a salary-driven
effort. By having the monetary resources to fund developers and management, and the ability to force
development in a given direction, closed source proponents argue that development can be more efficient and
more focused.
Legal risks
The legal risks of adopting open source software may not be confined to intellectual property problems. "Open
source" describes a belief that software is best written in an open collaborative process in which the resulting
product is freely available to others to use, improve, and distribute. Early proponents of open source based it on
moral principles of free access, while later supporters have promoted it as a viable business model for commercial
developers and users.
Licensing issues
Open source comes with unusual license restrictions that may impact a company's strategies, particularly the risk
that its own proprietary software may be "tainted" by a duty to open its source code to others. This risk is different
from the infringement risk. Open source is not in the public domain but instead is available for use only under one
of a variety of licenses that impose restrictions on users. These licenses differ, and it is important to know and
observe their terms.
Linux has been distributed under the General Public License (GPL). One risk under the GPL stands out: the
possibility that a user's proprietary code will be "tainted" by a duty to make its source code open. If a user of GPL
code decides to distribute or publish a work that in whole or in part contains or is derived from the open source or
any part thereof, it must make the source code available and license the work as a whole at no charge to third
parties under the terms of the GPL (thereby allowing further modification and redistribution). In other words, this
can be a trap for the unwary: a company can unwittingly lose valuable rights to its proprietary code.
Areas (departments, companies, industries, etc.) where open source makes most sense
Business Driven Information Systems - Instructor’s Manual Chapter 5 Page 6 of 30
Open source is most useful in areas of technology that are well understood. Proprietary companies have the
advantage in new technology realms due to better information regarding real-world customer needs and their
ability to experiment in parallel regarding the satisfaction of those needs.
Open source also makes most sense in "infrastructure." Most contributors to open source do so free of charge.
This means that their work will tend to be oriented towards areas of interest to themselves. Infrastructure is of
necessity oriented towards technical personnel, and thus the interests of the open-source contributors and end
users (technical personnel) align closely. Open source is being used successfully in government, industry, and
education.
Security issues
The reason viruses are written for Microsoft is because most people use it. Therefore, if 90 percent of software
was open source there would be just as many attacks, only worse. Imagine smart hackers with access to source
code.
Those in favor of open source say that because everyone has access to the code, bugs and vulnerabilities are
found more quickly and thus are fixed more quickly, closing up security holes faster. They also point out that any
and everyone is free to create a better, more secure version of the software.
Those on the other side maintain that a closed system in which only trusted insiders debug the code makes it less
likely that discovered vulnerabilities will be exploited before they can be patched.
They also point out that there are many reasons (in addition to market share) that are unrelated to the technical
security of the software but that can account for a larger number of attacks against proprietary software. One is the
nature of the “OS wars” – because open source software has traditionally been more difficult to use, those who
gravitate toward it tend to be more technically savvy. The larger number of self-proclaimed hackers who are pro-
open source and anti-Microsoft means there are more people out there with the motive and the means to write
malicious code targeting Windows systems.
Open standards (i.e., open protocols) are often quoted as being more important than open source code. Yet, both
are necessary, since open source projects depend on open protocols (think Apache and HTTP, Mozilla and
HTML/CSS/JavaScript, Sendmail and SMTP), but that proprietary products do, too (IIS, IE, Exchange Server).
CORE MATERIAL
The core chapter material is covered in detail in the PowerPoint slides. Each slide contains detailed teaching notes
including exercises, class activities, questions, and examples. Please review the PowerPoint slides for detailed
notes on how to teach and enhance the core chapter material.
The section emphasizes the need to keep business systems up-and-running 24x7x365 while continuing to be
flexible, scalable, reliable, and available is no easy task. Organizations today must continually watch new
architecture trends to ensure they can keep up with new and disruptive technologies.
LEARNING OUTCOMES
Learning Outcome 5.4: Identify the environmental impacts associated with MIS.
Increased energy consumption, increased electronic waste, and increased carbon emissions are all associated
with MIS. Ewaste refers to discarded, obsolete, or broken electronic devices. Sustainable MIS disposal refers to
the safe disposal of MIS assets at the end of their life cycle.
Learning Outcome 5.5: Explain the three components of a sustainable MIS infrastructure along with their
business benefits.
The components of a sustainable MIS infrastructure include:
• Grid computing: A collection of computers, often geographically dispersed, that are coordinated to solve a
common problem.
• Cloud computing: The use of resources and applications hosted remotely on the Internet. The term comes (at
least in part) from the image of a cloud to represent the Internet or some large networked environment.
• Virtualized computing: The creation of multiple “virtual” machines on a single computing device.
CLASSROOM OPENER
Grid Computing
Discuss some real-world examples of grid applications (not mentioned in the book):
• A company needing to reach a decision on the placement of a new factory invokes a sophisticated financial
forecasting model from an Application Service Provider (ASP), providing the ASP with access to appropriate
proprietary historical data from a corporate database on storage systems operated by a Storage Service
Provider (SSP). During the decision-making meeting, what-if scenarios are run collaboratively and
interactively, even though the division heads participating in the decision are located in different cities. The
ASP itself contracts with a cycle provider for additional "oomph" during particularly demanding scenarios,
requiring of course that cycles meet desired security and performance requirements.
• An industrial consortium formed to develop a feasibility study for a next-generation supersonic aircraft
undertakes a highly accurate multidisciplinary simulation of the entire aircraft. This simulation integrates
proprietary software components developed by different participants, with each component operating on that
participant’s computers and having access to appropriate design databases and other data made available to
the consortium by its members.
CLASSROOM EXERCISE
Intel and Apple
Ask your students if they use an Intel based Apple (Macintosh). If they raise their hands, they have the ability to
use virtualization. Parallels Desktop and VMware Fusion make it possible to run Windows and other PC-based
operating systems on a Mac. Until the release of Mac OS X 10.5 Leopard Server, Apple's software license
agreement explicitly forbade running multiple copies of Mac OS X Server on a single Mac, preventing Parallels and
VMware from including Mac OS X Server among the operating systems that could be virtualized legally.
CLASSROOM EXERCISE
Understanding SOA
Tell your students to imagine for a moment that they have a goal to get from their house in Cleveland, Ohio, to a
hotel in Denver, Colorado. How might they accomplish this?
A few responses might be… You will drive in your car to off-site parking near an airport. You’ll park your car and
ride a shuttle bus to the airport where (if you successfully get through security) you board an airplane for Denver.
When you get off, you walk to the taxi stand and take a taxi to the hotel.
Each of these modes of transportation — car, the shuttle bus, the airplane, and the taxi — came together as you
needed them. Or, said another way, when you set out from your home in Cleveland, you had not specified the
entire transportation network from exactly which shuttle bus you would take to exactly which taxi you would use. In
addition, at the intersection of each of these transportation modes — where one mode stopped and you were not
yet at your goal — there is likely more than one option you can use that will take you a step closer to your
destination. For example, you could have started from your house with a walk to a light rail station that took you
directly into the airport terminal, thus eliminating the car ride and the shuttle bus.
In this analogy, one could call the transportation modes “services.” A service can be defined as “the capability to
perform work for another, the specification of the work offered for another, and the offer to perform work for
another.” The car, airplane, bus, taxi, and light rail are all services used to reach the end goal.
Here is an excellent short video that you can use to support the analogy above.
http://www.infoworld.com/video/archives/2007/03/soa.html
CLASSROOM EXERCISE
Ray Kurzweil Video: How Technology’s Accelerating Power will Transform Us
Prolific inventor and outrageous visionary Ray Kurzweil explains in abundant, grounded detail why -- by the 2020s
-- we will have reverse-engineered the human brain, and nanobots will be operating your consciousness. Kurzweil
draws on years of research to show the speed at which technology is evolving, and projects forward into an almost
unthinkable future to outline the ways we'll use technology to augment our own capabilities, forever blurring the
lines between human and machine.
Business Driven Information Systems - Instructor’s Manual Chapter 5 Page 10 of 30
http://www.ted.com/index.php/talks/view/id/38
CLASSROOM EXERCISE
One Laptop Per Child
Nicholas Negroponte lays out the details of his nonprofit One Laptop Per Child project. Speaking just days after
relinquishing his post as director of the MIT Media Lab, he announces that he'll pursue this venture for the rest of
his life. He takes us inside the strategy for building the "$100 laptop," and explains why and how the project plans
to launch "at scale," with millions of units distributed in the first seven countries. "This is not a laptop project; it's an
education project," he says.
http://www.ted.com/index.php/talks/view/id/41
CLASSROOM EXERCISE
Making Movies that Change
Jeff Skoll made his fortune as the first president of eBay. Now he's spending it at the movies. His company,
Participant Productions, makes entertaining, issues-driven films that inspire real change -- Murderball, Syriana, An
Inconvenient Truth ... Here, he talks about the people who've inspired him to do good, and about some upcoming
films that will open your eyes.
http://www.ted.com/index.php/talks/view/id/170
CORE MATERIAL
The core chapter material is covered in detail in the PowerPoint slides. Each slide contains detailed teaching notes
including exercises, class activities, questions, and examples. Please review the PowerPoint slides for detailed
notes on how to teach and enhance the core chapter material.
1. Knowledge: List the ways that an agile MIS infrastructure supports Box’s business.
An agile MIS infrastructure supports change. An agile MIS infrastructure includes the hardware, software, and
telecommunications equipment that, when combined, provides the underlying foundation to support the
organization’s goals. An agile MIS infrastructure includes all of the following:
• Accessibility refers to the varying levels that define what a user can access, view, or perform when
operating a system.
• Availability refers to the time frames when the system is operational.
• Maintainability (or flexibility) refers to how quickly a system can transform to support environmental
changes.
• Portability refers to the ability of an application to operate on different devices or software platforms, such
as different operating systems.
• Reliability (or accuracy) ensures a system is functioning correctly and providing accurate information.
• Scalability describes how well a system can “scale up” or adapt to the increased demands of growth.
• Usability is the degree to which a system is easy to learn and efficient and satisfying to use.
Student answers to how an agile MIS infrastructure supports Box will differ depending on their personal view
of this business. Students who are familiar with Box and are using the service will know intimately how an
agile MIS infrastructure supports a customer’s needs. Students who are unfamiliar with Box might have
different views on what the customer wants and the important part of this exercise is ensuring the students
include their analysis and justification for each component.
2. Comprehension: Describe the reasons Box can help a company with its disaster recovery plan and a
business continuity plan.
A company can create a disaster recovery plan, which is a detailed process for recovering information or a
system in the event of a catastrophic disaster. This plan includes such factors as which files and systems need
to have backups and their corresponding frequency and methods along with the strategic location of the
storage in a separate physical site that is geographically dispersed. A company might strategically maintain
operations in New York and San Francisco, ensuring that a natural disaster would not impact both locations. A
disaster recovery plan also foresees the possibility that not only the computer equipment but also the building
where employees work may be destroyed. A hot site is a separate and fully equipped facility where the
company can move immediately after a disaster and resume business. A cold site is a separate facility that
does not have any computer equipment but is a place where employees can move after a disaster. A warm
site is a separate facility with computer equipment that requires installation and configuration.
Box is a key supplier for offsite storage so customers can easily recover from any type of major disaster
from a fire to equipment malfunctions. Keeping the data at Box is a great way to ensure the company
employees can get back on track if they experience disasters.
4. Analysis: Analyze how Box can benefit from a sustainable MIS infrastructures.
Sustainable MIS infrastructure identifies ways that a company can grow in terms of computing resources while
simultaneously becoming less dependent on hardware and energy consumption. Sustainable, or green, MIS
describes the production, management, use, and disposal of technology in a way that minimizes damage to
the environment. Sustainable MIS is a critical part of corporate social responsibility, that is, companies’
acknowledged responsibility to society. Building sustainable MIS infrastructures is a core initiative and critical
success factor for socially responsible corporations. The three primary side effects of businesses’ expanded
use of technology include:
• Electronic waste
• Energy consumption
• Carbon Emissions
5. Synthesis: Develop a way that a company could benefit from grid computing using Box.
Combating ewaste, energy consumption, and carbon emissions requires a firm to focus on creating
sustainable MIS infrastructures. A sustainable MIS infrastructure identifies ways that a company can grow in
terms of computing resources while simultaneously becoming less dependent on hardware and energy
consumption. The components of a sustainable MIS infrastructure include:
• Grid computing is a collection of computers, often geographically dispersed, that are coordinated to solve
a common problem. A smart grid delivers electricity using two-way digital technology. It is meant to solve
the problem of the world’s outdated electrical grid, making it more efficient and reliable by adding the
ability to remotely monitor, analyze, and control the transmission of power.
• Cloud computing: A smart grid delivers electricity using two-way digital technology. It is meant to solve the
problem of the world’s outdated electrical grid, making it more efficient and reliable by adding the ability to
remotely monitor, analyze, and control the transmission of power. Utility computing offers a pay-per-use
revenue model similar to a metered service such as gas or electricity.
• Virtualized computing creates multiple “virtual” machines on a single computing device.
6. Evaluate: Assess how Box uses server virtualization to support its growth while helping the
environment.
Through the use of virtualization, computers can run multiple operating systems along with multiple software
applications—all at the same time. Virtualization creates multiple “virtual” machines on a single computing
device. A good analogy is a computer printer. In the past you had to purchase a fax machine, copy machine,
answering machine, and computer printer separately. This was expensive, required enough energy to run four
separate machines, not to mention created additional amounts of ewaste. Today, you can buy a virtualized
computer printer that functions as a fax machine, answering machine, and copy machine all on one physical
machine, thereby reducing costs, power requirements, and ewaste. Virtualization is essentially a form of
consolidation that can benefit sustainable MIS infrastructures in a variety of ways, for example:
• By increasing availability of applications that can give a higher level of performance depending on the
hardware used.
• By increasing energy efficiency by requiring less hardware to run multiple systems or applications.
• By increasing hardware usability by running multiple operating systems on a single computer.
REVIEW QUESTIONS
3. What is the difference between a disaster recovery plan and a business continuity plan?
A disaster recovery plan, which is a detailed process for recovering information or a system in the event of a
catastrophic disaster. This plan includes such factors as which files and systems need to have backups and
their corresponding frequency and methods along with the strategic location of the storage in a separate
physical site that is geographically dispersed. For this reason many companies are turning to a more
comprehensive and all-encompassing emergency preparedness plan known as business continuity planning
(BCP), which details how a company recovers and restores critical business operations and systems after a
disaster or extended disruption. BCP includes such factors as identifying critical systems, business processes,
departments, and the maximum amount of time the business can continue to operate without functioning
systems.
4. What are the three forms of MIS infrastructures and what do they support?
Information MIS infrastructure identifies where and how important information, such as customer records, is
maintained and secured and support operations. An agile MIS Infrastructure includes the hardware, software,
and telecommunications equipment that, when combined, provides the underlying foundation to support the
organization’s goals and supports change. A sustainable MIS infrastructure identifies ways that a company
5. List the characteristics of an agile MIS infrastructure and explain why they are all critical for
supporting change.
An agile MIS infrastructure supports accessibility, availability, maintainability, portability, reliability, scalability,
and usability.
6. Explain what capacity planning is and how it can help a business prepare for growth.
Capacity planning determines future environmental infrastructure requirements to ensure high-quality system
performance. If a company purchases connectivity software that is outdated or too slow to meet demand, its
employees will waste a great deal of time waiting for systems to respond to user requests.
12. What is a data center and why would a business develop one.
A data center is a facility used to house management information systems and associated components, such
as telecommunications and storage systems. Data centers are central locations where all of the organizations
computer resources are safeguarded and maintained.
13. List and describe the three most popular cloud computing delivery models.
Infrastructure as a Service, Software as a Service, and Platform as a Service are the three primary delivery
methods for cloud computing.
15. Explain why a business today would want to follow sustainable MIS practices.
With the ever increasing issues associated with ewaste and the environment organizations need to understand
green computing to ensure a sustainable MIS enterprise.
16. Explain why ebusiness is contributing to the three pressures driving sustainable MIS infrastructures.
Increased electronic waste, energy consumption, and carbon emissions are the three pressures driving
sustainable MIS infrastructures. With new laws and regulations organizations must focus on everything to
ensure they are not contributing to these issues.
United Parcel Service (UPS) will make about $1 billion in technology investments to improve the efficiency of
its operations, with the goal of cutting billions more from its costs over the long term. One of its main goals is to
improve the speed and efficiency of its delivery operations. To achieve that, UPS is equipping its vans with
sensors that allow it to collect data about things such as fuel consumption, chosen routes, and how much time
• Hardware being underutilized. Today, many data centers have machines running at only 10 or 15
percent of total processing capacity which translates to 85 or 90 percent of the machine’s power is
unused. In a way, Moore’s Law is no longer relevant to most companies because they are not able to take
advantage of the increased power available to them.
• Data centers running out of space. The business world has undergone an enormous transformation
over the past 20 years. In 1985, the vast majority of business processes were paper based. Computerized
systems were confined to so-called backroom automation: payroll, accounting, and the like. That has all
changed, thanks to the steady march of Moore’s Law. Business process after business process has been
captured in software and automated, moving from paper to computers.
• Increased energy costs. The cost of running computers, coupled with the fact that many of the machines
filling up data centers are running at low utilization rates, means that virtualization’s ability to reduce the
total number of physical servers can significantly reduce the overall cost of energy for companies. Data
center power is such an issue that energy companies are putting virtualization programs into place to
address it.
• System administration costs mounting. Virtualization enables data center managers to make far better
use of computer resources than in non-virtualized environments, and enables an enterprise to maximize
its investment in hardware.
4. What role does each characteristics of an agile MIS infrastructure play in helping UPS to operate its
business?
An agile MIS infrastructure supports change. An agile MIS infrastructure includes the hardware, software, and
telecommunications equipment that, when combined, provides the underlying foundation to support the
organization’s goals. An agile MIS infrastructure includes all of the following:
• Accessibility refers to the varying levels that define what a user can access, view, or perform when
operating a system.
• Availability refers to the time frames when the system is operational.
• Maintainability (or flexibility) refers to how quickly a system can transform to support environmental
changes.
• Portability refers to the ability of an application to operate on different devices or software platforms, such
as different operating systems.
• Reliability (or accuracy) ensures a system is functioning correctly and providing accurate information.
6. What types of ethical issues might UPS encounter with the tracking technology it has placed in its
trucks?
UPS will encounter the same types of ethical issues that every organization faces including insider threats and
like most leading ebusiness sites, UPS encrypts much of the data sent between customers' computers and
UPS servers, which means that when customers type their password into UPS’s website, that information
cannot be viewed by hackers. Most ebusiness sites use Secure Socket Layer (SSL), a technology that
encrypts sensitive information such as customer passwords and account activity while the data is in transit to
another computer.
7. What types of security issues might UPS encounter with the tracking technology it has placed in its
trucks?
Information security is important for everyone and every organization. UPS needs to keep its sensitive
information secure and ensure it is protected against hackers, viruses, and theft. Moving to cloud
infrastructures can feel like the security risks are increased since the physical location of the information is in
the cloud, but actually for most organizations security is far stricter in the cloud. UPS needs to make sure that
they have a security plan in place as well as:
• Backup and recovery
• Disaster recovery
1. Knowledge: List the ways that an agile MIS infrastructure supports Pandora’s business.
An agile MIS infrastructure supports change. An agile MIS infrastructure includes the hardware, software, and
telecommunications equipment that, when combined, provides the underlying foundation to support the
organization’s goals. An agile MIS infrastructure includes all of the following:
• Accessibility refers to the varying levels that define what a user can access, view, or perform when
operating a system.
• Availability refers to the time frames when the system is operational.
• Maintainability (or flexibility) refers to how quickly a system can transform to support environmental
changes.
• Portability refers to the ability of an application to operate on different devices or software platforms, such
as different operating systems.
• Reliability (or accuracy) ensures a system is functioning correctly and providing accurate information.
• Scalability describes how well a system can “scale up” or adapt to the increased demands of growth.
• Usability is the degree to which a system is easy to learn and efficient and satisfying to use.
Student answers to how an agile MIS infrastructure supports Pandora will differ depending on their personal
view of this business. Students who are familiar with Pandora and are using the service will know intimately
how an agile MIS infrastructure supports a customer’s needs. Students who are unfamiliar with Pandora might
have different views on what the customer wants and the important part of this exercise is ensuring the
students include their analysis and justification for each component.
2. Comprehension: Describe the reasons Pandora would create a disaster recovery plan and a business
continuity plan.
A company can create a disaster recovery plan, which is a detailed process for recovering information or a
system in the event of a catastrophic disaster. This plan includes such factors as which files and systems need
to have backups and their corresponding frequency and methods along with the strategic location of the
storage in a separate physical site that is geographically dispersed. A company might strategically maintain
operations in New York and San Francisco, ensuring that a natural disaster would not impact both locations. A
disaster recovery plan also foresees the possibility that not only the computer equipment but also the building
where employees work may be destroyed. A hot site is a separate and fully equipped facility where the
company can move immediately after a disaster and resume business. A cold site is a separate facility that
does not have any computer equipment but is a place where employees can move after a disaster. A warm
site is a separate facility with computer equipment that requires installation and configuration.
Pandora would need to create a disaster recovery plan to ensure that all customers have continuous
listening capabilities, regardless of what was occurring at Pandora. Just like customers expect to have electric
or cable 24x7, radio listeners expect to have service 24x7, a disaster recovery plan or a continuity plan would
ensure that 24x7 service occurs.
5. Synthesis: Develop a way that Pandora could benefit from grid computing.
Combating ewaste, energy consumption, and carbon emissions requires a firm to focus on creating
sustainable MIS infrastructures. A sustainable MIS infrastructure identifies ways that a company can grow in
terms of computing resources while simultaneously becoming less dependent on hardware and energy
consumption. The components of a sustainable MIS infrastructure include:
• Grid computing is a collection of computers, often geographically dispersed, that are coordinated to solve
a common problem. A smart grid delivers electricity using two-way digital technology. It is meant to solve
the problem of the world’s outdated electrical grid, making it more efficient and reliable by adding the
ability to remotely monitor, analyze, and control the transmission of power.
• Cloud computing: A smart grid delivers electricity using two-way digital technology. It is meant to solve the
problem of the world’s outdated electrical grid, making it more efficient and reliable by adding the ability to
remotely monitor, analyze, and control the transmission of power. Utility computing offers a pay-per-use
revenue model similar to a metered service such as gas or electricity.
• Virtualized computing creates multiple “virtual” machines on a single computing device.
6. Evaluate: Assess the use of virtualization to support Pandora’s business growth while helping the
environment.
Through the use of virtualization, computers can run multiple operating systems along with multiple software
2. DESKTOP VIRTUALIZATION
Project Purpose: To understand how personal devices impact business environments.
Potential Solution: This is such a hot subject to discuss in your course. There are so many security and
ethical issues surrounding personal computing devices including:
• Who owns the data?
• Who is responsible for the device including backups and security measures?
• Is there an added risk for viruses and hackers from personal devices?
• Is there an added risk of data theft from a personal device?
• If the employ develops a product or application on work device from home who owns the content?
• What policies would a company need to put in place to help alleviate personal device issues?
• What if an employee is posting inappropriate or sensitive information to social networking site?
4. SUSTAINABLE DEPARTMENTS
Project Purpose: To understand how different departments contribute to environmental MIS issues.
Potential Solution: There are many issues that the different departments would face including:
• Accounting and finance would have issues such as computer upgrades and energy use.
• Marketing would have issues such as wasted paper for marketing campaigns, any types of gadgets they
use to attract business such as bouncing balls or staplers with the company logo, as well as computer and
energy use.
• Sales would have several issues such as energy use associated with travel, mailing sales information, cell
phones and other PDAs required to perform their jobs.
• Manufacturing would have the most environmental issues due to the massive amounts of energy and
waste associated with creating products.
8. COOL SCHOOLS
Project Purpose: To analyze your schools data center.
Potential Solution: Students need to be focusing on your schools specific data center structure and issues. If
you can take this opportunity to do a mini field trip by visiting your schools data center. If you have a big class
you can easily take some videos using your cell phone of flip device to show during class – a sort of virtual
data center field trip. If you school does not have a data center and is using cloud computing you can show
the following video for your students to analyze during this activity.
• Green Data Center Virtual Tour – Syracuse
http://www.syr.edu/greendatacenter/
Organizations must determine which components are most important to their business. The infrastructure
architecture components include:
• Flexibility
• Scalability
• Reliability
• Availability
• Accessibility
• Performance
Business Driven Information Systems - Instructor’s Manual Chapter 5 Page 23 of 30
• Capacity Planning
You are the enterprise architect (EA) for a large clothing company called Xedous. You are responsible for
developing the initial enterprise architecture. Create a list of questions you will need answered to develop your
architecture.
The list of questions required will vary for each student. A few examples could include:
• Is the architecture scalable for future growth?
• Does the system need a failover strategy?
• Does the system need a fault tolerance system?
• Is there a need for a hot site?
• Is there a need for a cold site?
• Is there a need for high availability?
• What are the performance requirements?
• What are the company’s growth expectations?
• Will systems be able to handle additional users?
• How long will information be stored in the systems?
• How much customer history must be stored?
• What are the organization’s business hours?
• What are the organization’s backup requirements?
• Cell Phones for Soldiers has committed to provide 750,000 FREE communication tools to U.S. armed forces
in 2011. Help us meet our goal by donating today! http://www.cellphonesforsoldiers.com/
• Answer the Call of the Wild! Bring your old cell phone to the guest services counter at the main entrance of
Business Driven Information Systems - Instructor’s Manual Chapter 5 Page 24 of 30
the Denver Zoo. Many of us have old cell phones cluttering closets and taking up valuable space in our
drawers at home. During 2005, it is estimated that there will be 500 million cell phones out of use in the United
States. Rather than throw an old cell phone away, guests are encouraged to donate their old cell phones to
Denver Zoo, who has partnered with Eco-Cell to recycle and reuse old cell phones.
o Why should I recycle my cell phone? Help the environment by recycling hazardous waste Cell
phones contain a number of hazardous substances that can seriously impact the environment. Donate
your cell phone to the Denver Zoo and the Zoo will have it recycled by Eco-Cell who will ensure that
most of these cell phones and their accessories will be reused or properly recycled. Eco-Cell will pay
Denver Zoo up to $10 for each working digital cell phone. Funds from the program will support Denver
Zoo in providing world class care to its wild residents.
o Help Wildlife in the Congo: Columbite-tantalite, or Coltan for short, is a dull metallic ore found in
major quantities in the eastern areas of the Congo. It is used in cell phones, laptops, pagers and other
electronic devices. Coltan mining is occurring illegally in protected lands all across the Congo
endangering wildlife. In order to mine the coltan, rebels have overrun Congo's national parks and are
hunting the park's endangered elephants and gorillas for food.
o Who gets the phones? Through the program, approximately 80 percent of the phones collected will
be refurbished and reused by first time, low income users in Latin America or by select local
programs, such as battered women's organizations, senior citizens groups and other groups for
emergency 911 calls. All unusable cell phones and accessories will be recycled under strict EPA
guidelines by certified recyclers.
o Why is there Coltan in your cellular phone? When refined, coltan becomes metallic tantalum, a
heat resistant powder that can hold a high electrical charge. These properties make it a vital element
in creating capacitors, the electronic elements that control flow inside miniature circuit boards.
Tantalum capacitors are used in almost all cell phones, laptops, pagers and other electronic devices.
o Privacy & Recycling Your Phone ECO-Cell does not clear cell phones of data or content left on
phones. It is the responsibility of the donating party to cancel or switch service on the phone and to
delete any data such as phone numbers, text messages, pictures, emails, documents, etc. that might
be on the cell phone. ECO-Cell sends donated phones to refurbishing companies who often delete
any content left on phones, but Eco-Cell cannot guarantee that content will always be deleted.
Therefore it is Eco-Cell’s position and recommendation that those wishing to donate a phone take the
time to clear phone of all data to ensure maximum privacy.
To understand the value of backup and recovery. Each year businesses lose time and money because of system
crashes and failures. One way to minimize the damage of a system crash is to have a backup and recovery
strategy in place. A backup is an exact copy of a system’s information. Recovery is the ability to get a system up
and running in the event of a system crash or failure and includes restoring the information backup. Many different
types of backup and recovery media are available, including redundant storage servers, tapes, disks, and even
CDs and DVDs. All the different types of backup and recovery media are reliable; their primary differences are the
speed and associated costs.
Disasters such as power outages, floods, and even harmful hacking strike businesses every day. Organizations
must develop a disaster recovery plan to prepare for such occurrences. A disaster recovery plan is a detailed
process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood.
Spending on disaster recovery is rising worldwide among financial institutions. A comprehensive disaster recovery
Business Driven Information Systems - Instructor’s Manual Chapter 5 Page 25 of 30
plan takes into consideration the location of the backup information. Many organizations store backup information
in an offsite facility. A comprehensive disaster recovery plan also foresees the possibility that not only the
computer equipment but also the building where employees work may be destroyed. A hot site is a separate and
fully equipped facility where the company can move immediately after a disaster and resume business. A cold site
is a separate facility that does not have any computer equipment, but is a place where employees can move after
a disaster.
A disaster recovery cost curve charts (1) the cost to the organization of the unavailability of information and
technology and (2) the cost to the organization of recovering from a disaster over time. A disaster recovery cost
curve and shows that where the two lines intersect is the best recovery plan in terms of cost and time. Creating an
organization’s disaster recovery cost curve is no small task. It must consider the cost of losing information and
technology within each department or functional area, and the cost of losing information and technology across the
whole enterprise. During the first few hours of a disaster, those costs will be low but become increasingly higher
over time. With those costs in hand, an organization must then determine the costs of recovery. Cost of recovery
during the first few hours of a disaster is exceedingly high and diminishes over time.
Saving the information on your system is time-consuming and requires discipline. Why should you do it? Why
should you spend time planning and evaluating it?
Because you may have a problem. You will need to use your backup copies of information. Every system needs to
restore some or all of its information at some point in time. Here are a few guideline to follow when you are ready
to start planning your strategy:
When you select a save strategy, you should balance what your users think is an acceptable save window with
the value of the data you might lose and the amount of time it may take to recover.
If your system is so critical to your business that you do not have a manageable save window, you probably
cannot afford an unscheduled outage either. Choose one of the following save strategies, based on the size of
your save window. Then reevaluate your decision based on how you save strategy positions you for a recovery.
The following are the availability options that you can use to complement your save strategy:
• Journal management lets you recover the changes to objects that have occurred since your last complete
save.
• Access path protection lets you re-create the order in which records in a database file are processed.
• Disk pools limit the amount of data you have to recover to the data in the disk pool with the failed unit.
• Device parity protection enables you to reconstruct data that is lost; the system can continue to run while
the data is being reconstructed.
• Mirrored protection helps you keep your data available because you have two copies of the data on two
separate disk units.
• Clustering lets you maintain some or all data on two systems; the secondary system can take over critical
application programs if the primary system
The best way to test your strategy for saving is to test a recovery. Although you can test a recovery on your
own system, doing so can be risky. If you have not saved everything successfully, you may lose information
when you attempt to restore.
EWaste Fraud
It seemed a perfect symmetry: California, the world's high-tech capital, would lead the way in recycling the debris
of our digital revolution. But five years after its launch, the state government-run electronic waste program stands
out not as a model of the green innovation for which California is famous but as an example of good intentions
gone awry. By paying more than $320 million to collect and recycle computer monitors and televisions, the state
has built a magnet for fraud totaling tens of millions of dollars, including illegal material smuggled in from out of
state. "I don't think anybody could have forecast the greed that has poisoned the program," said Bob Erie, chief
executive officer of E-World Recyclers north of San Diego and once an enthusiastic supporter of the state effort.
http://www.cleveland.com/business/index.ssf/2010/08/e-waste_recycling_begun_with_l.html