Experiencing MIS 10th by m kronenke chapter 04

59 161 0
Experiencing MIS  10th by m  kronenke chapter 04

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

Using MIS 10 th Edition Chapter Hardware, Software, and Mobile Systems Copyright © 2018, 2017, 2016 Pearson Education, Inc All Rights Reserved 4-1 “3D Printing Our Own Drones Isn’t Going to Save Us Enough Money.”  • Investigating using 3D-printed parts to make drones in-house  Cost-savings, greater flexibility updating current fleet • Not enough parts can be replicated  Nonprintable component parts • Maybe not compatible with internal systems • Passive recharging platform using 3D-printed parts a huge success • Frustrating, costly to be on “bleeding edge.” Copyright © 2018, 2017, 2016 Pearson Education, Inc All Rights Reserved 4-2 Study Questions Q4-1 What business professionals need to know about computer hardware? Q4-2 How can new hardware affect competitive strategies? Q4-3 What business professionals need to know about software? Q4-4 Is open source software a viable alternative? Q4-5 What are the differences between native and Web applications? Q4-6 Why are mobile systems increasingly important? Q4-7 What are the challenges of personal mobile devices at work? Q4-8 2027? Copyright © 2018, 2017, 2016 Pearson Education, Inc All Rights Reserved 4-3 Processors and Memory Q4-1 What business professionals need to know about computer hardware? Central processing unit (CPU) - “the brain.” Dual-processor and Quad-processor computers CPUs vary in speed, function, cost CPU works in conjunction with main memory (RAM) CPU reads data and instructions from memory, and stores results of computation in memory Copyright © 2018, 2017, 2016 Pearson Education, Inc All Rights Reserved 4-4 Storage Hardware Q4-1 What business professionals need to know about computer hardware? Save data and programs Common storage devices Non-volatile Magnetic disks (Hard drive) Solid-state storage (SSD) Thumb drives Optical disks (CD/DVD) Volatile - cache and main memory Copyright © 2018, 2017, 2016 Pearson Education, Inc All Rights Reserved 4-5 Basic Types of Hardware Q4-1 What business professionals need to know about computer hardware? Hardware Type Personal computer (PC) Including desktops and laptops Tablet Including e-book readers Example(s) Apple Mac Pro iPad, Microsoft Surface, Google Nexus, Kindle Fire Smartphone Samsung Galaxy, iPhone Server Dell PowerEdge Server Server farm Racks of servers (Figure 4-2) Figure 4-1 Basic Types of Hardware Copyright © 2018, 2017, 2016 Pearson Education, Inc All Rights Reserved 4-6 Server Farm Q4-1 What business professionals need to know about computer hardware? Figure 4-2 Server Farm Source: © Andrew Twort/Alamy Copyright © 2018, 2017, 2016 Pearson Education, Inc All Rights Reserved 4-7 Computer Data: Binary Digits (Bits) Q4-1 What business professionals need to know about computer hardware? Figure 4-3 Bits Are Easy to Represent Physically Copyright © 2018, 2017, 2016 Pearson Education, Inc All Rights Reserved 4-8 Important Storage Capacity Terminology Q4-1 What business professionals need to know about computer hardware? Term Definition Abbreviation Byte Number of bits to represent one character Kilobyte 1,024 bytes KB Megabyte 1,024 KB = 1,048,576 bytes MB Gigabyte 1,024 MB = 1,073,741,824 bytes GB Terabyte 1,024 GB = 1,099,511,627,776 bytes TB Petabyte 1,024 TB = 1,125,899,906,842,624 bytes PB Exabyte 1,024 PB = 1,152,921,504,606,846,976 bytes EB Zettabyte 1,024 EB = 1,180,591,620,717,411,303,424 bytes ZB   Figure 4-4 Important Storage-Capacity Terminology Copyright © 2018, 2017, 2016 Pearson Education, Inc All Rights Reserved 4-9 Specifying Hardware with Computer Data Sizes Q4-1 What business professionals need to know about computer hardware? Disk capacities specified by amount of bytes 500 GB CPU speed expressed in cycles called hertz Slow personal computer speed of Gigahertz Fast PC 3.5+ GHz Copyright © 2018, 2017, 2016 Pearson Education, Inc All Rights Reserved 4-10 Free Apps For Data Ethics Guide Permissions Take pictures and videos Super-Bright LED Flashlight Brightest Flashlight Free Brightest LED Flashlight Flashlight High-Powered Flashlight Tiny Flashlight + LED X X X X X X X X X Receive data from Internet Control flashlight X X X* X X** X X* X X* Change system display settings Modify system settings X*   X* X*   Prevent device from sleeping X X X   X X X View network connections X X X X X X Full network access X X X X X X Run at startup           X X Control vibration Retrieve running apps     X* X X* X X* X X* X X   X*   X* Modify or delete the contents of your storage Read the contents of your storage     X*   X* View Wi-Fi connections Read phone status and identity     X X*   X* Read Home settings and shortcuts Write Home settings and shortcuts       X*         X* Disable your screen lock Install shortcuts   X   X* X X* Uninstall shortcuts Approximate location   X     X* X   X* Precise location Disable or modify status bar   Draw over other apps   Copyright © 2018, 2017, 2016 Pearson Education, Inc All Rights Reserved Count 2013 20 X*         X**     15 13     15 4-45 Elements of Mobile Systems Q4-6 Why are mobile systems increasingly important? Figure 4-22 Elements of a Mobile Information System Copyright © 2018, 2017, 2016 Pearson Education, Inc All Rights Reserved 4-46 Five Components of Mobile Change and Opportunity Q4-6 Why are mobile systems increasingly important?   Hardware Impact of mobile systems Many, many more mobile growth devices will be sold Software Compact interfaces; new technology for active users; application scaling Data Procedures People More data, but more Always on, always at work information? Less device real Employee lifestyle becomes Ability to thrive in a dynamic estate means fewer ads hybrid of personal and environment more important possible professional PCs less important; high Industry changes demand (and requirement) for html5, css3, and JavaScript Loss of control Ad model in innovative devices as well as increase capability of thin-clients danger? Personal mobile devices at work More part-time employees and independent contractors cheap copycats New technology levels the playing Career opportunities Jobs for mobile device sales, field for html5 Business expertise marketing, support needed for mobile requirements New companies! Innovative use of just-in-time Reporting and data mining even data Need for adjusting more important Design of business processes gives effective mobile reports another premium to nonroutine problem solvers Independent contractors (and some employees) work where and when they want What is this new social organism? Figure 4-23 Five Components of Mobile Change and Opportunity Copyright © 2018, 2017, 2016 Pearson Education, Inc All Rights Reserved 4-47 Personal Mobile Devices at Work Q4-7 What are the challenges of personal mobile devices at work? Advantages Disadvantages Cost savings Data loss or damage Greater employee satisfaction Loss of control Reduced need for training Compatibility problems Higher productivity Risk of infection Reduced support costs Greater support costs Figure 4-24 Advantages and Disadvantages of Employee Use of Mobile Systems at Work Copyright © 2018, 2017, 2016 Pearson Education, Inc All Rights Reserved 4-48 Survey of Organizational BYOD Policy Q4-7 What are the challenges of personal mobile devices at work? Figure 4-25 Six Common BYOD Policies Copyright © 2018, 2017, 2016 Pearson Education, Inc All Rights Reserved 4-49 Advantages of Example BYOD Policies Q4-7 What are the challenges of personal mobile devices at work? BYOD Policy They don’t exist Description Organization looks the other way when employees bring mobile devices to work Advantage to Organization None We’ll be a coffee shop You’ll be able to sign in to our wireless network using your mobile device Packet sniffing of employee mobile device use at work We’ll offer limited systems you can access from Organization creates https applications with sign-in and offers access to Employees gain public access from any device, not just mobile devices, any device noncritical business systems without having to use VPN accounts You’re responsible for damage Threatening posture to discourage employee use of mobile devices at work We’ll check it out, reload software, then manage Employees can use their mobile devices just as if they were computers remotely provided by the corporate IS department If you connect it, we own it Appear to be permissive without actually being so Employee buys the hardware (perhaps with an employer's contribution) Employees are not to use mobile devices at work If they do, they lose Ultimate in control for highly secure work situations (intelligence, them Part of employment agreement military) Figure 4-26 Advantages of Example BYOD Policies Copyright © 2018, 2017, 2016 Pearson Education, Inc All Rights Reserved 4-50 Hardware, Software, and Mobile Systems in 2027? Q4-8 2027? Always on, always connected, always communicating, always working, and playing trend continues Internet of Things Home analyzes you; see what, how, when you things, anticipate your needs Same at work Hot jobs today – IoT architect, marketing technologist, BigData architect, and DevOps manager Best-paying jobs in 2026 don’t currently exist To prepare, cultivate creativity, novel problem solving, good judgment, develop sincere desire to learn new things Copyright © 2018, 2017, 2016 Pearson Education, Inc All Rights Reserved 4-51 Smart Home Q4-8 2027? Figure 4-27 Smart Home Source: Si-Gal/iStock Vectors/Getty Images Copyright © 2018, 2017, 2016 Pearson Education, Inc All Rights Reserved 4-52 Poisoned App-les Security Guide Apple reported that dozens of apps available on the App Store contained a malware application named XcodeGhost Accessed user credentials Hijacked URLs Able to read and write data on devices Compromised other iOS apps More than 500 million iOS users could have been exposed Copyright © 2018, 2017, 2016 Pearson Education, Inc All Rights Reserved 4-53 Poisoned App-les (cont’d) Security Guide Apple notified users that the dangerous apps had been removed from the App Store Key Point: An app does not have to be considered malware to be dangerous or invasive Do users end up paying for apps with their privacy? Can developers change the terms of privacy agreements after a user has agreed to a prior version of the terms? Copyright © 2018, 2017, 2016 Pearson Education, Inc All Rights Reserved 4-54 Technical Account Manager Career Guide Alfredo Zorrilla at Microsoft Corp Q What attracted you to this field? A “Working as a technical account manager is a great way to combine relationship management with technical planning and troubleshooting I didn’t want to just sit at a desk all day and "crush code." I also wanted to be involved in high-level strategy discussions with BDMs (business decision makers) and TDMs (technical decision makers).” Q What advice would you give to someone who is considering working in your field? A “… demonstrate you are an expert in one or two things but can also speak reasonably well to many others… because many platforms are becoming increasingly interdependent.” Copyright © 2018, 2017, 2016 Pearson Education, Inc All Rights Reserved 4-55 Active Review Q4-1 What business professionals need to know about computer hardware? Q4-2 How can new hardware affect competitive strategies? Q4-3 What business professionals need to know about software? Q4-4 Is open source software a viable alternative? Q4-5 What are the differences between native and Web applications? Q4-6 Why are mobile systems increasingly important? Q4-7 What are the challenges of personal mobile devices at work? Q4-8 2027? Copyright © 2018, 2017, 2016 Pearson Education, Inc All Rights Reserved 4-56 The Apple of Your i Case Study Created mobile markets with iPod, iPhone, iPad Opened own stores Open and inviting sales floor, Genius Bar help desk, incredibly well-trained and disciplined sales force Pioneered Internet sale of music and applications Tripled market share in three years Second largest public company in world Copyright © 2018, 2017, 2016 Pearson Education, Inc All Rights Reserved 4-57 The Apple of Your i (cont’d) Case Study Figure 4-28 Growth in Apple Stock Price Source: Financial data from finance.yahoo.com Copyright © 2018, 2017, 2016 Pearson Education, Inc All Rights Reserved 4-58 ... computer hardware? Term Definition Abbreviation Byte Number of bits to represent one character Kilobyte 1,024 bytes KB Megabyte 1,024 KB = 1 ,048 ,576 bytes MB Gigabyte 1,024 MB = 1,073,741,824 bytes... function, cost CPU works in conjunction with main memory (RAM) CPU reads data and instructions from memory, and stores results of computation in memory Copyright © 2018, 2017, 2016 Pearson Education,... Businesses with a strong commitment to Microsoft Unix Servers Fading from use Replaced by Linux Linux Servers Very popular Aggressively pushed by IBM Figure 4-12 Major Operating Systems Copyright © 2018,

Ngày đăng: 17/01/2018, 16:47

Từ khóa liên quan

Mục lục

  • Using MIS

  • Slide 2

  • Study Questions

  • Processors and Memory

  • Storage Hardware

  • Basic Types of Hardware

  • Server Farm

  • Computer Data: Binary Digits (Bits)

  • Important Storage Capacity Terminology

  • Specifying Hardware with Computer Data Sizes

  • Disruptive New Tech Hardware

  • Internet of Things (IoT)

  • Impact of the Internet of Things

  • Digital Reality Devices

  • Digital Reality Devices (cont’d)

  • Digital Reality Devices (cont’d)

  • Self-driving Cars by 2020

  • Self-driving Cars Will Disrupt Businesses

  • 3D Printing

  • Existing 3D Printing Examples

Tài liệu cùng người dùng

Tài liệu liên quan