© 2004, David Gadish, Ph.D.1 Software Engineering CIS 410 Winter 2004 Week 9 Lecture Dr. David Gadish.

Slides:



Advertisements
Similar presentations
Module 6 – Systems Administration MIS5122: Enterprise Architecture for the IT Auditor.
Advertisements

ProAssist ® complex assistance services management system Global Assistance & INGENIUM Praha.
Geographic Information Systems “GIS”
Systems Analysis and Design in a Changing World
Chapter 8: Evaluating Alternatives for Requirements, Environment, and Implementation.
Introduction Edited 8/29/03 What is a GIS? GIS stands for Geographic Information Systems. This system is not just a set of software and hardware, but includes.
ACG 6415 SPRING 2012 KRISTIN DONOVAN & BETH WILDMAN IT Security Frameworks.
ATTENTION This presentation breaks down the purchasing process into 6 steps, which are then detailed in the subsequent slides. While responding from either.
Network Design and Implementation
Chapter 15 Application of Computer Simulation and Modeling.
Intro to GIS Edited 10/24/05 1 What is GIS? GIS stands for Geographic Information Systems. This system is not just a set of software and hardware, but.
Security Controls – What Works
An Introduction to Information Systems in Organizations
The Fundamentals of Enterprise Resource Planning Olayele Adelakun (Ph.D) Assistant Professor CTI Office: Room 735 CTI 7th Floor Phone: Fax:
Designing new systems or modifying existing ones should always be aimed at helping an organization achieve its goals State the purpose of systems design.
Geographic Information Systems ( GIS) Geography is the study of locational and spatial trends about the earth’s surface, the objects found on it, and the.
© 2004, David Gadish, Ph.D.1 Project Management CIS 486 Fall 2005 Week 7 Lecture Dr. David Gadish.
INDUSTRIAL & SYSTEMS ENGINEERING
CHAPTER 6 SECONDARY DATA SOURCES. Important Topics of This Chapter Success of secondary data. To understand how to create an internal database. To distinguish.
IS112 – Chapter 1 Notes Computer Organization and Programming Professor Catherine Dwyer 2003.
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 Systems Design, Implementation, Maintenance, and Review Chapter 13.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
COSO Framework A company should include IT in all five COSO components: –Control Environment –Risk Assessment –Control activities –Information and communication.
USING GIS TO FOSTER DATA SHARING AND COMMUNICATION SEAN MURPHY IVS BURLINGTON, VT.
Management Information Systems, 4 th Edition 1 Chapter 16 Alternative Avenues for Systems Acquisitions.
8 Systems Analysis and Design in a Changing World, Fifth Edition.
Introduction to SAP R/3.
BUSINESS DRIVEN TECHNOLOGY
Geography is the study of locational and spatial trends about the earth’s surface, the objects found on it, and the people who inhabit it. GIS is a technology.
CGS 1000 Introduction to Computers and Technology.
GIS Lecture 1 Introduction to GIS Buildings. Poly Streams, Line Wells, Point Roads, Line Zoning,Poly MAP SHEETS.
Chapter 3 Application Software.
The Office Procedures and Technology
Session 16: Distribution of Geospatial Data 1 Distribution of Geospatial Data in the Public Environment Hazard Mapping and Modeling.
By Anthony W. Hill & Course Technology 1 Product Evaluation Strategies and Support Standards Beisse.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Intro to GIS Edited 10/14/05 1 What is GIS? GIS stands for Geographic Information Systems. This system is not just a set of software and hardware, but.
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
Introduction: Databases and Database Users
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
SCSC 311 Information Systems: hardware and software.
Business Software What is database software? p. 145 Allows you to create, access, and manage data Add, change, delete, sort, and retrieve data Next.
Principles of Information Systems, Sixth Edition Systems Design, Implementation, Maintenance, and Review Chapter 13.
Big Data Bijan Barikbin Denisa Teme Matthew Joseph.
Fundamentals of Information Systems, Third Edition1 Systems Design Answers the question “How will the information system do what it must do to solve a.
Information: Policy, Strategy and Systems Module Overview
Storing Organizational Information - Databases
Principles of Information Systems, Sixth Edition Systems Design, Implementation, Maintenance, and Review Chapter 13.
5 - 1 Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved.
13 Step Approach to Network Design Steps A Systems Approach 8Conduct a feasibility Study 8Prepare a plan 8Understand the current system 8Design.
Chapter 1 Introduction to Databases. 1-2 Chapter Outline   Common uses of database systems   Meaning of basic terms   Database Applications  
E.Soundararajan R.Baskaran & M.Sai Baba Indira Gandhi Centre for Atomic Research, Kalpakkam.
 2001 Prentice Hall Business Publishing, Accounting Information Systems, 8/E, Bodnar/Hopwood Systems Implementation, Operation, and Control Chapter.
Concepts in Enterprise Resource Planning Fourth Edition
Discovering Computers Fundamentals, Third Edition CGS 1000 Introduction to Computers and Technology Summer 2007.
Principles of Information Systems, Sixth Edition 1 Systems Design, Implementation, Maintenance, and Review Chapter 13.
What is GIS ? A method to visualize, manipulate, analyze, and display spatial data “Smart Maps” linking a database to the map.
Foundations of Information Systems in Business. System ® System  A system is an interrelated set of business procedures used within one business unit.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Chapter 7 Storing Organizational Information - Databases.
Introduction to Networks. When Personal Computers first appeared in business, software programs were designed for a single user. However as computers.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Chapter 14: System Administration Mark Milan. System Administration Acquiring new IS resources Maintaining existing IS resources Designing and implementing.
Systems Analysis and Design in a Changing World, Fifth Edition
COMP532 IT INFRASTRUCTURE
Discovering Computers 2010: Living in a Digital World Chapter 14
System Administration
Introduction to Local Area Networks
Systems Architecture, Seventh Edition
PLANNING A SECURE BASELINE INSTALLATION
Presentation transcript:

© 2004, David Gadish, Ph.D.1 Software Engineering CIS 410 Winter 2004 Week 9 Lecture Dr. David Gadish

© 2004, David Gadish, Ph.D.2 Week 8 Review  Reviewed individual project progress  Operating Systems (Chapter 11)  File Management Systems (Chapter 12)

© 2004, David Gadish, Ph.D.3 Week 9 Agenda  Student Presentations (10-15 min each): –Adolpho, Martin, Sean –Jonathan, Allan, Stephanie  System Administration (Chapter 14)  CAD Technology - Overview  GIS Technology - Overview

4 System Administration Chapter 14

© 2004, David Gadish, Ph.D.5 Objectives  System administration responsibilities and tasks  The process of acquiring computer hardware and system software  Tools and processes for evaluating application resource requirements and computer system performance  System security model –how it can be implemented  Installing and protecting computer hardware

© 2004, David Gadish, Ph.D.6 Chapter Topics

© 2004, David Gadish, Ph.D.7 System Administration System Administration responsibilities: –Acquiring new IS resources –Maintaining existing IS resources –Designing and implementing an IS security policy –Ensure the efficient and reliable delivery of information services

© 2004, David Gadish, Ph.D.8 System Administration Strategic Planning issues: –Strategies for developing services and markets for them –Strategies for acquiring sufficient resources for operations and growth –Organizational structure and control

© 2004, David Gadish, Ph.D.9 System Administration Hardware and Software as Infrastructure: Capital resources have the following characteristics: –Service to a large and diverse set of users –Costs that are difficult to allocate to individual users –Recurring need for new capital expenditures –Significant operating costs for maintenance

© 2004, David Gadish, Ph.D.10 System Administration Hardware and Software as Infrastructure: The strategic issues that must be addressed by organizations are: –What services will be provided? –How will service users be charged? –What infrastructure is required to provide the services? –How can the infrastructure be operated, maintained, and improved at minimal cost?

© 2004, David Gadish, Ph.D.11 System Administration Standards:  Providing infrastructure-based services to a wide variety of users requires adopting services standards.  Standardization causes problems for users that want services near the leading edge.  It is hard to standardize when dealing with hardware and software.

© 2004, David Gadish, Ph.D.12 System Administration Competitive Advantage: Describes a state of affairs in which one organization employs resources so as to give it a significant advantage over its competitors.

© 2004, David Gadish, Ph.D.13 System Administration Competitive Advantage:  Providing services that competitors are unable to provide  Providing services of unusually high quality  Providing services at unusually low price  Generating services at unusually low cost

14 The Acquisition Process

© 2004, David Gadish, Ph.D.15 The Acquisition Process 1. Determine the applications that the hardware/software will support. 2. Specify detailed requirements in terms of hardware and software capability and capacity. 4. Draft a request for proposals and circulate it to potential vendors. 5. Evaluate the responses to the request for proposals. 6. Contract with a vendor or vendors for purchase, installation, and/or maintenance.

© 2004, David Gadish, Ph.D.16 The Acquisition Process Determining and Stating Requirements:  Integration with existing hardware/software  Availability of maintenance services  Availability of training  Physical parameters such as size, cooling requirements, and disk space for system software  Availability of upgrades

© 2004, David Gadish, Ph.D.17 The Acquisition Process Request for Proposal (RFP) A formal document sent to vendors that states requirements and solicits proposals to meet those requirements.

© 2004, David Gadish, Ph.D.18 The Acquisition Process Evaluating Proposals: 1. Determine acceptability of each proposal 2. Rank acceptable proposals 3. Validate high-ranking proposals

19 Determining and Evaluating Performance

© 2004, David Gadish, Ph.D.20 Determining Requirements and Evaluating Performance Determining hardware requirements for software is difficult: –Computer systems are complex combinations of interdependent components. –The configuration of operating and other system software can significantly affect raw hardware performance. –The hardware and system software resources required by applications cannot always be predicted precisely.

© 2004, David Gadish, Ph.D.21 Determining Requirements and Evaluating Performance Benchmarks:  A measure of computer performance for specific tasks  Select the benchmark test most relevant to the intended application.  Determine the relationship between benchmark tests and the actual work that the new computer system will perform.

© 2004, David Gadish, Ph.D.22 Determining Requirements and Evaluating Performance Measuring Resource Demand and Utilization: –Hardware monitors (between hardware components) –Software monitors (usually embedded in OS) –Program profilers (in S/W code)

23 Security

© 2004, David Gadish, Ph.D.24 Security Well integrated approach includes measures to:  Protect physical resources against accidental loss or damage  Protect data and software resources against accidental loss or damage  Protect all resources against malicious tampering  Protect sensitive software and data resources against unauthorized access and accidental disclosure

© 2004, David Gadish, Ph.D.25 Security Access Control Processes:  Authentication – the process of determining or verifying the identity of a user or process owner.  Authorization - determining whether an authenticated user or process has sufficient rights to access a particular resource.

© 2004, David Gadish, Ph.D.26 Security

© 2004, David Gadish, Ph.D.27 Security Password Controls and Security Methods:  Restrictions on the length and composition of valid passwords  Requirements that passwords periodically be changed  Encryption of passwords in files and during transmission over a network

© 2004, David Gadish, Ph.D.28 Security

© 2004, David Gadish, Ph.D.29 Security

© 2004, David Gadish, Ph.D.30 Security Auditing – the process of creating and managing records of user activity or resource access.

© 2004, David Gadish, Ph.D.31 Security Virus Protection Software Capabilities:  Scanning messages and attachments  Monitoring access to important system files and data structures  Scanning removable media  Periodically scanning the file system

© 2004, David Gadish, Ph.D.32 Security Software Updates:

© 2004, David Gadish, Ph.D.33 Security

© 2004, David Gadish, Ph.D.34 Security Firewalls:  Application firewalls – (proxy server) – a server that handles the service requests of external users.  Stateful firewalls – tracks the progress of complex client-server interactions.

© 2004, David Gadish, Ph.D.35 Security

36 Physical Environment

© 2004, David Gadish, Ph.D.37 Physical Environment Computer Hardware Installation Issues:  Electrical Power  Heat Dissipation  Moisture  Cable Routing  Fire Protection

© 2004, David Gadish, Ph.D.38 Physical Environment Electrical Power - fluctuations in power can cause: –Momentary power surges –Momentary power sags –Long-term voltage sags –Total loss of power

© 2004, David Gadish, Ph.D.39 Physical Environment Heat Dissipation:  All computer equipment requires some means of heat dissipation.  Many hardware devices use fans to move air through the unit.  Auxiliary cooling can be provided within an individual equipment cabinet.

© 2004, David Gadish, Ph.D.40 Physical Environment Moisture:  Excessive moisture is an enemy of electrical circuitry.  Well-designed cabinets are one defense against the dangers of moisture.  Humidity can be controlled automatically by optional components of heating, ventilation and air conditioning systems.

© 2004, David Gadish, Ph.D.41 Physical Environment Cable Routing: A raised floor is generally used in a room that contains multiple hardware cabinets, a single mainframe computer system or multiple minicomputers.

© 2004, David Gadish, Ph.D.42 Physical Environment Fire Protection:  Carbon dioxide, fire retardant foams and powders, and various gaseous compounds are alternate methods of fire protection, but not for computer equipment.  Halon gas is used around computer equipment since is does not promote condensation.

© 2004, David Gadish, Ph.D.43 Physical Environment Disaster Planning and Recovery:  Periodic data backup and storage of backups at alternate sites.  Backup and storage of critical software at alternate sites.  Installing of duplicate or supplementary equipment at alternate sites.  Arrangements for leasing existing equipment at alternate sites.

44 Computer Aided Design (CAD)

© 2004, David Gadish, Ph.D.45 In the Beginning…  Ivan Sutherland who demonstrated a sketching program called Sketchpad in  Sketchpad allowed engineers for the first time to generate drawings by using an interactive graphics terminal, and to manipulate them by using a light pen and keyboard.  From these beginnings, the field developed rapidly.

© 2004, David Gadish, Ph.D.46 And then…  The first CAD systems appeared in the mid-1960s –IBM's DAC-1 for use by General Motors in car design.  Architectural uses of CAD lagged behind engineering applications. –CAD typically required investments of hundreds of thousands of dollars.  The introduction of personal computers, particularly the IBM PC in 1981 was a turning point for architectural CAD.  In 1982, Autodesk introduced the first CAD program for the IBM PC, called AutoCAD. With this, CAD became affordable.

© 2004, David Gadish, Ph.D.47 Computer Aided Design  Using computers for design activities –Points, Lines, Shapes,… –Color, Line Weight, Style,… –Graphics, Attributes –2D, 3D –Lighting, …

© 2004, David Gadish, Ph.D.48 Computer Aided Design  Two of the major players: –Autodesk AutoCad software –Bentley Microstation software

© 2004, David Gadish, Ph.D.49 CAD Sectors  Architectural Design  Civil Engineering  Facilities Management  Geospatial (GIS)  Plant Design  Landscape Design  Automobile Design

© 2004, David Gadish, Ph.D.50 CAD for Architectural Design

© 2004, David Gadish, Ph.D.51 CAD for Architectural Design

© 2004, David Gadish, Ph.D.52 CAD for Civil Engineering

© 2004, David Gadish, Ph.D.53 CAD for Civil Engineering

© 2004, David Gadish, Ph.D.54 CAD for Facilities Management

© 2004, David Gadish, Ph.D.55 CAD for GIS Data Creation / Maintenance

© 2004, David Gadish, Ph.D.56 CAD for GIS Data Creation / Maintenance

© 2004, David Gadish, Ph.D.57 CAD for Plant Design

© 2004, David Gadish, Ph.D.58 CAD for Landscape Design

© 2004, David Gadish, Ph.D.59 CAD for Automobile Design

60 Geographic Information Systems (GIS)

61 What is GIS ?

© 2004, David Gadish, Ph.D.62 What is GIS ?  Combination of computer hardware, software, data, business processes and people to manage data that has a location component  A technology to visualize, manipulate, analyze, and display spatial data  Analysis allowing for timely, informed decisions  “Smart Maps” linking a database to a map

© 2004, David Gadish, Ph.D.63 Geographic Information Systems (GIS) Customers Buildings Streets Reality

© 2004, David Gadish, Ph.D.64 Traditional Business Databases “ Not Easy to Interpret ”

© 2004, David Gadish, Ph.D.65 Visualization “ Worth a Thousand Words ”

© 2004, David Gadish, Ph.D.66 Asking A Question – Interaction

© 2004, David Gadish, Ph.D.67 Maps and Database are “ Interactive ”

68 Applications of GIS

© 2004, David Gadish, Ph.D.69 Some ways GIS is Used  Emergency Services – Fire & Police  Environmental – Monitoring & Modeling  Business – Site Location, Delivery Systems  Industry – Transportation (Fleet Mgmt), Communication,  Mining, Pipelines, Healthcare  Government – Local, State, Federal, Military  Education – Research, Teaching Tool, Administration

© 2004, David Gadish, Ph.D.70 GPS for Business  The following are key areas of interest for businesses: –Sales –Customers –Inventory –Demographic profiles –Mailing lists, and much more.

© 2004, David Gadish, Ph.D.71 GIS for Business  At the core of this business information is an: –Address –A service boundary –A sales territory –or a delivery route  that can be illustrated and interactively managed on a map.

© 2004, David Gadish, Ph.D.72 GIS for Business  By tying business information to specific locations on interactive maps, businesses can: –identify business patterns –understand relationships not apparent from static tables and charts

© 2004, David Gadish, Ph.D.73 Example: Banking and Insurance Companies  GIS technology provides financial users with insight about their customer's purchasing habits, financial behavior, and needs for additional products or services.  As a result, banks are able to target their best prospects and not misdirect marketing and advertising resources.

© 2004, David Gadish, Ph.D.74 Chocolate Locator

© 2004, David Gadish, Ph.D.75 Real Estate Where to buy a home?

© 2004, David Gadish, Ph.D.76 Learn GPS  A GPS receiver is a device that communicates with satellites to determine locations.  Learn to navigate using the Global Positioning System (GPS).

© 2004, David Gadish, Ph.D.77 Learn How GPS Works With GIS  Use GPS for GIS data collection and data maintenance is essential for timely decision-making and the wise use of resources.

© 2004, David Gadish, Ph.D.78 Take my Intro. To Business GIS  Learn fundamentals of GIS – What it is about?  Get acquainted with the most popular GIS software out there – ArcGIS  Learn about Global Positioning Systems ( GPS )  Learn how to use a GPS

© 2004, David Gadish, Ph.D.79 More Info? Visit me! Simpson Tower #609 me!

80 Project Presentations Adolpho, Martin, Sean Jonathan, Allan, Stephanie

© 2004, David Gadish, Ph.D.81 Project Deliverables  Cover page  TOC  Overview / Introductions –important section  Research (sections/sub-sections)  Summary –your thoughts, conclusions –important section  References / bibliography

© 2004, David Gadish, Ph.D.82 Project deliverables  Quality vs. Quantity  Proper English grammar, spelling  Professional look  Pictures, bullets where needed  In binder  CD with soft copy of document and presentation attached to finder.  “Project Specifications” doc for more details  Contact me if need clarifications

© 2004, David Gadish, Ph.D.83 Next Week (Week 10)  Hand in projects before class (6:10pm)  The rest of the student presentations  Course review  A look at the future: Individual and global perspectives