MIS 111: CCR-FE Master Study Guide

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Internet Bridges the Communications Gap Transparently

User PC: Multi-media displays including video, MIDI, microphone, encryption, speaker/headset <-> Origins of Online Content: Includes legacy systems, books, scanners/OCR, recordings, video/movie, phone, financial markets, embedded chips, anyplace online!

"The best place in North America for Data Center"- CIO Magazine

> Partnership between IBM and Rackforce > $100m investment - 85,000 sq ft > Cheap renewable power, well educated community, geological stability > Hydro electric power as low as 2 cents per kilowatt, versus 20 cents in other jurisdictions in Canada - Kelowna, BC

IT/IOT Converged Security Model

Enterprise IT: enterprise network DMZ: demilitarized zone IoT: supervisory, automation & control - cloud, network security, application control, identity services, secure access, configuration management *Chart on Class 40 In-Person Slides pg. 34

Which of the following applications would be most commonly associated with short range systems (up to 1 meter) that are commonly in the vicinity of metals and liquids?

Animal identification Systems

Insight platforms

Enterprise, business analytics platforms, insight application platforms; business insight solution platforms, big data fabrics - Brian Hopkins - Noel Yuhanna • Insight Platforms Accelerate Digital Transformation • TechRadar™: Big Data, Q1 2016 • Vendor Landscape: Insights Platforms, Q3 2016 • Big Data Fabric Drives Innovation And Growth

Electric Telegraph Networks

Electric telegraph networks exploded - Message switching & Store-and-Forward operation - Key elements: Addressing, Routing, Forwarding *Visual on Class 36 In-Person Slides pg. 10

What type of guided (wireline) media is relatively slow for transmitting data, subject to interference from other electrical sources, and can be easily tapped by unintended recipients to gain unauthorized access to confidential data?

Twisted-pair

Confirming your hosting

U-System website host -> Your computer (via browser) http://www.u.Arizona.edu/~<yourUANetID>

Which of the following data communications computer ports is a multi-function, bus-oriented (up to 127 devices), high-speed (up to 600 MBps) serial interface?

USB Port

Mechanical Specifications: High-Speed (Local) Serial Ports

USB port - multi-function, bus-oriented (up to 127 devices), highspeed serial interface (backward compatible standards from USB-1 at 1.5MBps to USB-3 at 600MBps) FireWire port - (IEEE 1394 / Apple) high-speed serial interface (backward compatible standards from FW 400 at 50MBps to FWS 3200 at 400MBps)

Spatial Multiplexing

Increases total available bandwidth by limiting cell size thereby allowing frequencies to be reused in nonadjacent areas of a network *Visual on Class 38 TO Slides pg. 7

SaaS: Software delivery model

Increasingly popular with SMEs No hardware or software to manage Service delivered through a browser

Which of the following issues would not be considered as a disadvantage of packet switched network operation?

Inefficient line utilization

Telecommunication Milestones

Discovery and Viability: • 1837 - Samuel Morse exhibited a working telegraph system. • 1876 - Alexander Graham Bell, invented the first telephone. Economic and Technical Expansion: • 1880 - first pay telephone • 1915 - first transcontinental and transatlantic telephone service • 1951 - first direct long distance dialing • 1962 - first international satellite telephone call Regulatory Controls: • 1968 - Carterfone court decision allowed non-Bell equipment to connect to Bell System Network • 1970 - Permitted MCI to provide limited long distance service in competition to AT&T.

Video Case Study: Telecommunications History

- Pony Express (letters)

________ is an unauthorized access point into a wireless network.

A rogue access point

IT is essential to business

▪Ubiquitous ▪Integral to modern business processes ▪Dominant capital expense for most companies ▪Prerequisite to survival ▪Can, in right circumstances, boost productivity . . . but is it essential to business strategy?

Features of Symmetric Ciphers

⚫ Fast to encrypt and decrypt, suitable for large volumes of data ⚫ A well-designed cipher is only subject to brute-force attack; the strength is therefore directly related to the key length. ⚫ Current recommendation is a key length of around 128 bits, for data protection around 20 years.* ⚫ Problem - how do you distribute the keys?

Will people really do that? Forrester Report

" . . . the next 10 years will generate an order of magnitude of more change than the past 10 years."

Edge computing's triplets

"40% of IoT data will be 'stored, processed, and analyzed at/or near the edge' and that 50% of IoT systems will be 'network constrained.'" - Industrial Internet Consortium, OpenFog, MEC, Cisco, General Electric, HP, Intel, Philips, Rockwell Automation, SIEMENS

Cloud computing

"Cloud computing is a computing paradigm shift where computing is moved away from personal computers or an individual application server to a "cloud" of computers. Users of the cloud only need to be concerned with the computing service being asked for, as the underlying details of how it is achieved are hidden. This method of distributed computing is done through pooling all computer resources together and being managed by software rather than a human." Cloud computing is a novel platform for computing and storage. Cloud computing provisions and configures servers as needed. It allows for more efficient use of the enterprise resources and applications. It introduces accountability and streamlines computing needs of an enterprise.

Why build green?

"In Iroquois society, leaders are encouraged to remember seven generations in the past and consider seven generations in the future when making decisions that affect people." - Wilma Pearl Mankiller (Nov. 8, 1945 - Apr. 6, 2010), Cherokee Leader

Share of tasks performed by humans vs machines

*Chart on Class 44 TO Slides pg. 7

Changes in skills for job roles

*Chart on Class 44 TO Slides pg. 9

Rotation Cipher

*Cipher example on Class 39 TO Slides pg. 3

Projecting (Abstracting) Data Cube Information

*Visual of cube and cube breakdown on Class 37 In-Person Slides pg. 7

Connected Vehicles

*Visual on Class 38 In-Person Slides pg. 16

WinSCP File Access ("Classic" Menu)

*Visual on Class 39 In-Person Slides pg. 11

"Success" Confirmation Message

*Visual on Class 39 In-Person Slides pg. 15

Pivot Tables: Data summary and analysis

*Visuals on Class 37 In-Person Slides pg. 11-12

IOT Security

- "... the intelligence community views Internet of Things as a rich source of data," they can spy on you through your dishwasher, Wired 2012. - David M. Nicol, Information Trust Institute, "in recent months, cybersecurity has made the news on a near-daily basis... and former Secretary of Defense Leon Panetta has forewarned of a coming 'cyber Pearl Harbor'."

Cell phones changed our relationship with communication technology

- "For the first time, you were calling a person, not a place..." - Martin Cooper (Inventor of the Cell Phone)

Business Use of Cloud Services: Financial Savings

▪ Equipment ▪ Personnel ▪ Infrastructure ▪ Space & utilities ▪ Reduced obsolescence ▪ Reduced capital expenditures ▪ Reduced implementation costs

Business Use of Cloud Services: Streamlined business development

▪ Focus on innovation & research ▪ Reduced effort on management, maintenance & support ▪ Simplified entry into or exiting from business initiatives ▪ Increased access to technical expertise

Define the Cloud Ecosystem: Essential Characteristics

▪ On demand self service ▪ Broad network access ▪ Resource pooling ▪ Rapid elasticity ▪ Measured service

Cloud Service Risks: Security

▪ Physical access to infrastructure, systems & data ▪ Physical location of systems, data ▪ Logical access to the network, OS, applications & databases ▪ Network & data segregation

Define the Cloud Ecosystem: Deployment Models

▪ Private cloud ▪ Community cloud ▪ Public cloud ▪ Hybrid cloud

Define the Cloud Ecosystem: Community (Vertical) Cloud

▪ Provisioned for exclusive use by and the needs of a specific community ▪ May be managed by one or more of the community organizations ▪ May be managed by community organization or outsourced

Define the Cloud Ecosystem: Public Cloud

▪ Provisioned for general public ▪ Exists on the premise of the cloud provider ▪ May be owned, managed & operated by a business, academic or government organization or a combination

Define the Cloud Ecosystem: Private Cloud

▪ Provisioned for single organization ▪ May exist on or off site ▪ May be managed by organization or outsourced

Business Use of Cloud Services: Increased Flexibility

▪ Rapid deployment ▪ Ability to add or reduce capacity ▪ On-demand provisioning ▪ Disaster recovery ▪ Business expansion (across town or across the globe)

Isn't IT different?

▪Not just hardware - software, too ▪"General purpose" technology ▪Malleable and flexible ▪Endless innovation potential Isn't IT different? True - but market forces push IT toward rapid commoditization.

Shifting priorities

▪Spend less ▪Follow, don't lead ▪Innovate when risks are low ▪Focus on vulnerabilities more than opportunities

Video Case Study: Cell Phone History

- 5 billion cell phones in the world - first cell phone call made 40 years ago in New York - inventor: Martin Cooper - instead of calling a place, you call a person - walkie-talkie inspired the cell phone

IoT Is Here Now - and Growing! (Cisco Internet Business Solutions Group)

- 50 Billion "Smart Objects" - Rapid Adoption Rate of Digital Infrastructure: 5X Faster Than Electricity and Telephony *Chart on Class 40 In-Person Slides pg. 14

But it's not that simple

- 50% of Americans see sustainability as "hype" or worse - Other 50% at least recognize problems and are willing to take action "Mainstream Green" - Super greens 16% - Upper middle greens 33% & Lower middle greens 33% (Middle greens 66%) - Green rejectors 18%

Video Case Study: Digital Transformation of Retail

- 87% of retail company executives think digital will disrupt their industry - 55% of retail companies without a digital transformation strategy think they have less than a year before losing their market share - augmented reality improves conversion metrics by 94% 1. metaverse 2. anything-as-a-service 3. augmented reality 4. social commerce 5. data analytics

Businesses are Using the Cloud

- 94% of respondents using cloud - 22% public cloud only - 69% hybrid - 3% private cloud only - public = 91% - private = 72%

Smart Building Infrastructure

- AC power sub-meters; Outdoor temperature; Temp, Hum., Light, CO2 sensors; Relay nodes; Routers; Gas/Water sub-meters - Executive dashboards *Visual on Class 40 In-Person Slides pg. 25

Five technologies to be insight-driven

- AI/cognitive - IoT analytics - Spatial analytics - Insight platforms - Customer journey analytics *Chart on Class 43 In-Person Slides pg. 32

Character Set Standardization Emergence of ASCII

- ASCII was a response to a proliferation of proprietary character sets (e.g., EBCDIC (IBM 8-bit), Baudot (5-bit paper tape), Binary-coded Decimal (BCD), Hollerith (Punched card)) - Led by Bob Bremer, a group of computer, peripheral, and data transmission companies joined to establish a standard: American Standard Code for Information Interchange, also known today as ASCII - 7-bit code provided unique codes for up to 128 different characters: upper and lower case and special characters

Industry 4.0 IOT Environment

- Aware: smart products are equipped with sensor technology giving access to condition information regarding the product and its environment - Intelligent: smart products are equipped with computing power that enables autonomous decision-making and self-learning processes based on defined algorithms - Connected: smart products are equipped with a M2M communication device that enables Interaction and data exchange with other cyber-physical systems - Responsive: smart products are equipped with control technology that enables autonomous product adaption based on internal or external commands

Industry 4.0 Smart Factory

- CPPS = CYBER-PHYSICAL PRODUCTION SYSTEM - M2M = MACHINE-TO-MACHINE - cyber-physical components carrying all necessary processing information are triggered by the order - CPPS interact in a multi-agent system like a market place of production services, and machines configure themselves automatically *Visual on Class 40 In-Person Slides pg. 30

"Zero Carbon" data center facilities connected by optical networks

- Canarie - Canada's Advanced Network *Visual on Class 42 In-Person Slides pg. 26

Technology Adoption by 2025

- Cloud computing 17% - Big data analytics 2% - IoT and connected devices 9% - Encryption and cybersecurity 29% - Artificial intelligence 8% - Text, image, and voice processing -% - E-commerce and digital trade 2% - Robots, non-humanoid 10% - Augmented and virtual reality 1% - Distributed ledger technology (blockchain) 11% - 3D and 4D printing and modeling 10% - Power storage and generation -% - New materials -12% - Biotechnology 8% - Robots, humanoid 11% - Quantum computing -5% *Chart on Class 44 TO Slides pg. 6

More About Cloud Computing

- Cloud computing is about much more than technological capabilities. - Technology is the mechanism, but, as in any shift in business, the driver is economics.

RFID is used in Organizations across many industries

- Consumer Packaged Goods & Retail - Manufacturing - Process Industries - Healthcare *Images on Class 38 In-Person Slides pg. 12

Comparing Total Lifecycle Energy Consumption

- DVD vs. Streaming *Visual on Class 42 In-Person Slides pg. 26

MIS is about seeing new meaning in data....

- Dr. Sudha Ram - Using MealPlan Data to understand student retention at the University of Arizona - Dr. Joe Valacich - Developed a tool for detecting fraud using real-time score of the authenticity of based on an applicant's behaviors - Dr. Hsinchun Chen - Developed a sophisticated data-analysis software called COPLINK that is used by law-enforcement agencies worldwide

English Letter Frequencies

- E, T, and A are the most frequent *Chart on Class 39 TO Slides pg. 5

Green IT Lifecycle Perspectives: 2nd Order Impact

- Efficiency / Substitution

Unintended IOT Security Exposures*

- Farm Feeding System in the U.S. - Mine Ventilation System in Romania - Hydroelectric Plant in the U.S.

From Datacenters to Clouds

- First large datacenters: ENIAC, ORDVAC, ILLIAC Many used vacuum tubes and mechanical relays - Berkeley NOW Project Supercomputers Server Farms (e.g., Oceano) - Peer-to-Peer (P2P) Systems (90s-00s): Millions of users, Many GB per day - Data Processing Industry: 1968 - $70 M., 1978 - $3.15 Billion. - Timesharing Industry (1975): •Market Share: Honeywell 34%, IBM 15%, •Xerox 10%, CDC 10%, DEC 10%, UNIVAC 10% •Honeywell 6000 & 635, IBM 370/168, Xerox 940 & Sigma 9, DEC PDP-10, UNIVAC 1108 - Grids (1980s-2000s): •GriPhyN (1970s-80s) •Open Science Grid and Lambda Rail (2000s) •Globus & other standards (1990s-2000s) *Visual on Class 41 In-Person Slides pg. 11

Industry Trends Leading to Cloud Computing

- Grid Computing: Solving large problems with parallel computing; Made mainstream by Globus Alliance - Utility Computing: Offering computing resources as a metered service; Introduced in late 1990s - Software as a Service: Network-based subscriptions to applications; Gained momentum in 2001 - Cloud Computing: Next-Generation Internet computing; Next-Generation Data Centers

Logical vs. Physical Transmission of Data

- HTTP message, TCP segment, IP Packet *Visual on Class 36 In-Person Slides pg. 16

WinSCP Login Screen

- Host name: u.arizona.edu - File protocol: SFTP / Port Number: 22 - Host name is "u.arizona.edu" - DO NOT include the URL "www." *Visual on Class 39 In-Person Slides pg. 11

Five technologies to be fast and connected

- Hybrid wireless - Edge computing - Cloud native application platform - Containers and container management - Security automation and orchestration *Chart on Class 43 In-Person Slides pg. 38

IoT Expands Security Needs

- Increased Attack Surface - Threat Diversity - Impact and Risk - Remediation - Protocols - Compliance and Regulation - IoT CONNECTIVITY: converged, managed network; resilience at scale; security; distributed intelligence; application enablement

4 Layers Model for IoT

- Information Application -> Integrated Application Layer - Information Processing -> Information Processing Layer - Information Transmission -> Network Construction Layer - Information Generation -> Sensing & Identification Layer

More on 4 Layers Model

- Integrated Application: smart logistic, smart grid, green building, smart transport, env. monitor - Information Processing: data center, search engine, smart decision, info. security, data mining - Network Construction: WWAN, WPAN, WMAN, WLAN - Sensing and Identification: GPS, smart device, Internet RFID, sensor

Video Case Study: What is Cable vs. DSL vs. Fiber Internet?

- Internet travels through wires - cable: wires made of copper; used for TV and telephones: shared - DSL: made with wire; individual; impacted by distance from Internet provider - both cable and DSL use electric wavelength - fiber: glass fiber optic wires; light wavelength; measured in gigabits per minute

Video Case Study: IoT Innovation Lab

- IoT includes all smart devices - use IoT devices to predict, prevent, etc. insurance risks - develop unique value propositions - used to be safer - reaction-based -> insurance-based - can give you insight into other issues like energy conservation

Five technologies to be customer-led

- IoT software and solutions - Intelligent agents - Augmented and virtual reality - real-time interaction management - personal identity and data management *Chart on Class 43 In-Person Slides pg. 29

Leading to a more connected world

- Libelium Smart World *Visual on Class 40 In-Person Slides pg. 17

MIS informs leaders about public policy and planning

- Mayor Roberto Claudio - Fortaleza, Brazil PhD, University of Arizona - Partnering with the UofA, Mayor Claudio used data analytics and visualizations of accidents to reduce road death by 30% since 2015

Early Radio-base Data Communication: ALOHAnet

- Norman Abramson - How can we connect these users? - getting Internet/connecting islands of Hawaii *Visual on Class 38 TO Slides pg. 3

Retail & E-Commerce Spending

- Online penetration increased with the onset of COVID-19 and has remained about 35% above pre-COVID-19 levels *Chart on Class 43 TO Slides pg. 11

Packet Switched Networking

- Packets may follow different routes through the network. *Visuals on Class 36 In-Person Slides pg. 19-20

Key Properties of Virtualization

- Partitioning: Run multiple virtual machines simultaneously on a single PC - Isolation: The virtual machine is isolated from Host OS, other VMs on the same PC - Encapsulation: Entire virtual machine is saved in files. Can be moved and copied like any other file. - HW Independence & Transparency: Run a virtual machine on any PC without modification. Break dependence between OS & HW

Creating business value from an MIS/OSCM perspective...

- People - Process - Technology

Relationship to the Internet of Everything (IoE)

- People: Connecting People in More Relevant, Valuable Ways - Process: Delivering the Right Information to the Right Person (or Machine) at the Right Time - Data: Leveraging Data into More Useful Information for Decision Making - Things: Physical Devices and Objects Connected to the Internet and Each Other for Intelligent Decision Making

How does Bluetooth Work?

- Piconet no. 1, Piconet no. 2, laptop computers *Visual on Class 38 In-Person Slides pg. 15

Cloud Computing and Services Significantly Reduce Local Energy Use

- Present day business software vs. Cloud-based business software - Cloud-based software could reduce present day energy use by around 85% - Technical potential for energy savings equates to approx. 23 billion kWh/yr, or the total annual electricity use of Los Angeles *Visual on Class 42 In-Person Slides pg. 25

Symmetric Cipher

- Private Key/Symmetric Ciphers - The same key is used to encrypt the document before sending and to decrypt it once it is received *Visual on Class 39 TO Slides pg. 11

Green IT Lifecycle Perspectives: 1st Order Impact

- Reduce, Reuse and Recycle - Reduce Through Improved Efficiency - Reuse and Recycle

How does NFC Work?

- Same fundamental principles as RFID, contactless smart cards or access control badges. - Reader (e.g. mobile device) provides power, initiates RF communications and captures data from the tag (or programs data into the tag) - power and commands; serial number/data *Visual on Class 38 In-Person Slides pg. 10

What is an SLA?

- Service Level Agreement - A negotiated agreement or contract. - An SLA is a vendor commitment to provide a specified level of service, such as system availability. However, an SLA is not a guarantee, but rather, a promise of financial compensation if the terms of that promise are met.

Rotor Wheels

- Simple substitution - Latch turns next rotor once per rotation *Visual on Class 39 TO Slides pg. 6

Ubicomp Vision

- The Computer for 21st Century, M. Weiser, Xerox-PARC, Scientific American, 1991. - Live Boards - Pads - Tabs/Active Badge - Infrared, Radio Frequency and Wired Networks - IoT can be viewed as a fuller expression of a Weiser's vision

Create a U-System Account

- These are NOT clickable icons to access these systems *Visual on Class 39 In-Person Slides pg. 8

First Transcontinental Telegraph System

- Transcontinental Telegraph Line (completed October 1861) *Visuals on Class 36 In-Person Slides pg. 9

Maps of Different Internet Providers

- UUNET, AT&T, Sprint, Level 3 *Maps on Class 36 TO Slides pg. 9

Improving Efficiency with Hybrid Ciphers

- Use a symmetric cipher with a random key (the "session key"). Use a public key cipher to encrypt send the session key as an encrypted document. - random session key and encrypted session key *Visual on Class 39 TO Slides pg. 14

Virtualization and Cloud Hosting

- Virtual Machine Manager before & after migration *Visuals on Class 42 In-Person Slides pg. 25

Asymmetric Public/Private Keys

- We generate a cipher key pair. One key is the private key, the other is the public key. - The private key remains secret and should be protected. - The public key is freely distributable. It is related mathematically to the private key, but you cannot (easily) reverse engineer the private key from the public key. - Use the public key to encrypt data. Only someone with the private key can decrypt.

Different Types of Innovators Are Leveraging Different Technologies

- Well-being and care delivery innovators - Data and platform innovators • Healthcare • Telehealth • Medical Device Manufacturing • Medical Research • Pharmaceuticals • Software Development *Charts on Class 43 TO Slides pg. 7

Video Case Study: Navajo Code Talkers

- World War II; U.S. Marine Corps - code developed from ancient Navajo language - code never broken by Japanese - language considered a precious commodity

Birth of Ubiquitous Computing

- Xerox PARC *Visuals on Class 40 TO Slides pg. 5

Video Case Study: Lean Example from "The Founder"

- about the founding and growth of McDonald's - how they figured out the process of making fast food - fake kitchen outlined with chalk in order to practice food preparation

Video Case Study: Digital and Analog Signals

- analog: varies continually in amplitude and frequency - digital: only two values (1 or 0); sent as a series of pulses - digital is better for sending info. over long distances - noise/interference damages analog, but not digital - digital carried more info and is more easily interpreted by computers

Evolution of infrastructural technology

- as ubiquity increases, advanced potential decreases - Proprietary advantages: access, knowledge, foresight *Chart on Class 43 In-Person Slides pg. 16

Video Case Study: Green IT Strategies

- being green makes good business sense (fewer expenses = higher profits) - server virtualization - saves space, cooling, power - $1/2 million saved per year by virtualizing Windows servers - $150k a year saved in energy - $10 million saved a year in real estate expenses from letting employees work from home

Emerging Technology Roadmap for Midsize Enterprises

- bubble chart of deployment risk and enterprise value *Chart on Class 43 In-Person Slides pg. 22

Railways vs. Long Haul Fiber Map

- cable lines followed railway infrastructure that already existed - SPRINT (Southern Pacific Railroad Internal Network for Telecommunications) *Maps on Class 36 TO Slides on pg. 7

CenturyLink Global Network

- cables tend to be placed in international, regulated waters - 360* communications *Map on Class 36 TO Slides pg. 8

Video Case Study: Introducing Cellular V2X

- cars are becoming more autonomous, connected, efficient, intelligent - cars can share data in real-time - fewer accidents, less congestion, more efficient

Connected Vehicle Physical View

- cell tower, satellite, back office, ITS roadway devices, other vehicles, roadside equipment unit, connected vehicle, vulnerable road user - wired or wireless communications; wireless communications *Map on Class 38 In-Person Slides pg. 16

Video Case Study: Public, Private, and Hybrid Clouds

- clouds are data centers made of resources connected through a network - smart, automotive, adaptive - public: hosted by a cloud service provider who rents to customers; popular for everyday apps - private: cloud for one tenant; customizable - hybrid: combination of private and public clouds

Video Case Study: DARPA - The Formative Years

- computers previously only crunched numbers - could they improve operations and commands/controls? - IPTO - Dr. Charles H... - challenge was linking computers to create a network using a router (IMP?) - ARPANet -> Internet -> the Web

Top cross-cutting, specialized skills of the future

- specialized skills and their emerging job clusters *Chart on Class 44 TO Slides pg. 9

Video Case Study: The Future of Medtech

- data is more valuable than devices - smart mirrors, watches, etc. are already helping patients with their overall health - transformative, cognitive tech. to change how health is approached - medicine and tech. companies can/should work together - can reduce medical costs, optimize provider performance, shift care settings, improve patient outcomes, acute care model -> model based on early/preventative detection

Video Case Study: A Day with IoT

- drive to innovate/technology reaching most mundane parts of our lives - smart boilers, beds, fridges, coffeemakers, clothing, etc. - biotechnology and face recognition - data will be gathered about you all day and it will be shared between the tech/devices

Video Case Study: e-Waste South Africa

- electronic waste - came about with rapid advancements in technology and more devices being used - have to follow proper protocols to dispose of electronic gadgets - some parts can be recycled and reused

Video Case Study: Key Skills in the Future

- empathy & emotional intelligence - communication between humans - critical thinking - creativity - manual input - dexterity - imagination & vision

Pretty Good Privacy (PGP)

- encryption process and decryption process *Visual on Class 39 TO Slides pg. 18

Atlantic Fiber Optic Cables

- fiber optic cables wired under the ocean to provide Internet to all continents *Map on Class 36 TO Slides pg. 8

Step 1: Set up your account on the U-System

- https://account.arizona.edu/welcome • A video tutorial for setting up your U-System account is available in the ACHosting folder - Creating a U-System Account • If you have not created your account before viewing the podcast, you may want to pause the recording at this time. Accounts are usually setup with 2-4 hours, but may take longer depending upon system workload

Augmented Reality Offers Context-Aware Interaction

- identity - location - objects

Video Case Study: AlohaNEt - Norm Abramson

- investigate the use of radio communication as an alternative to telephone system (for computer communications and situations where radio is preferred to wire)

Changes in demand for job roles

- job roles with increasing demand - job roles with decreasing demand *Chart on Class 44 TO Slides pg. 8

Roles and jobs of tomorrow

- jobs in Data and AI, Marketing, Product Development, Cloud Computing *Chart on Class 44 TO Slides pg. 8

Sensors and Actuators

- machine vision/optical ambient light, position/presence/proximity, motion/velocity/displacement, temperature, humidity/moisture, acoustic/sound/vibration, chemical/gas, flow, force/load/torque/strain/pressure, leaks/levels, electric/magnetic, acceleration/tilt *Visual on Class 40 TO Slides pg. 10

Video Case Study: Ubiquitous Computing - Xerox PARC

- mobile computations devices will be transparent (not literally) - communicative; can be active and reactive - 3 classes of devices: yard-sized devices, foot-sized devices, inch-sized devices

Video Case Study: A New Way to Invest in Clean Energy

- need to change how we make things to reduce green house gas emissions, pollution, etc. - solar power vs. fossil fuels - innovate how private and public sectors come together - Breakthrough Energy Catalyst Program - next generation of climate solutions to market in a timely manner - philanthropists, gov'ts, and leading companies making bold investments - will reduce emissions and create jobs - green hydrogen, long-duration energy storage, sustainable aviation fuel, direct air capture - program meant to accelerate innovation

Video Case Study: Nicholas Carr on "IT still doesn't matter"

- novel to follow his essay "Does IT Matter?" - change from statement to question because of commercial reasons and broader research in the novel - novel only further convinced author that IT is simply a commodity (cemented his argument) - wanted to make his argument stronger in the novel - multiple CEOs, experts, etc. said his essay was "dead wrong"

Video Case Study: PwC's 2022 Emerging Tech Exchange

- pace of change is rapid; near constant innovation - regulations and state laws

Video Case Study: Self-Checkout for Convenience Stores (Currently in use at McKale Arena)

- payment system/Google Pay - image/visual recognition to determine prices

Video Case Study: Physical vs. Logical Topologies

- physical topology: physical layout of the devices and cabling - logical: path along which data travels from one point in the network to another - bus, ring, star, mesh topologies (physical) - logical = a bus trip - physical = map, bus ticket

Video Case Study: Vint Cerf Explains TCP Networking

- postcards - delivery and order of postcards not guaranteed in delivery - multiple copies, decoding, etc. - everyone could see the postcard - everything could go wrong

Asymmetric (Public/Private Key pair):

- public key and private key - One key is used to encrypt the document, a different key is used to decrypt it. - This is a big deal! *Visual on Class 39 TO Slides pg. 13

Industry 4.0 Supply Chain

- raw material supplier -> logistics -> manufacturer -> logistics -> customer -> logistics -> end user - the supply chain control tower creates transparency along the supply chain by linking data and material flows *Visual on Class 40 In-Person Slides pg. 31

How does a RFID system work?

- reader (coupler): to read from and/or write to tags - tags (transponders): where item ID/data etc. are stored - types: active, passive - host computer/network *Visual on Class 38 In-Person Slides pg. 11

Diversifying Applications and Stakeholders

- smart mobility, smart factory, smart cities, smart healthcare, smart pro-services, smart energy, smart retail, smart building home, smart entertainment, smart logistics *Visual on Class 40 In-Person Slides pg. 15 Internet of Things Landscape 2016: - applications (verticals): personal, home, vehicles, enterprise, industrial internet - platforms & enablement (horizontals): platforms, interfaces, 3D - building blocks: hardware, software, connectivity, partners *Visual on Class 40 In-Person Slides pg. 16

Video Case Study: The Fourth Industrial Revolution

- steam engines, electricity, computers and communications technology (1st-3rd Revolutions) - 4th: combination of digital, physical, and biological systems - won't change what we do, but will change us - focus on maximizing human well-being and growth - clean air, water, energy - by 2020, 5 million jobs lost to technology - has potential to make inequalities visible ad less acceptable in the future - genome editing; DNA sequencing - government will play a big role

Video Case Study: What is a Pivot Table?

- summarizes/reorganizes selected columns/rows of data - turns/pivots to view data from different perspectives - summarizes reports, calculates sums and averages, identifies mins/maxs, generates list of unique values, shows total percentages of a whole, etc.

Video Case Study: RFID creates value in retail

- supply chain, retail, omni-channeling - 1. tag your product - 2. your data - 3. gain value/business insights

Video Case Study: What is Cloud Computing?

- the on-demand delivery of IT resources via the Internet - pay-as-you-go buying - access tech services on an as-needed basis from cloud provider/vendor - used for data backup, disaster recovery, email, virtual desktops, software development/testing, Big Data analytics, customer-facing web applications - healthcare, finances/banking, video game developers

Video Case Study: What is the Internet of Things?

- today, many devices are connected to the Internet - by 2020, 50 billion objects will be connected to the Internet - for every person, 6.6 objects will be connected to the Internet - lots of objects/devices use sensors - there are more potential IP addresses than atoms on the surface of the earth (IPv6) - everything is regulated by the Internet of Things

Video Case Study: Preparing for the Future of Work - Business, Education, Digital Disruption

- used to be, education -> career -> retire - now, learn -> leverage -> longevity (learning continues throughout life) - 65% of jobs don't exist yet - 47% of jobs automated by 2033 - 27% of students end up working in their major - will have 17 jobs over 5 industries

Emerging tech will unleash massive change

- x-axis: time - y-axis: disruptive potential - includes 3 sets of 5 standout technologies *Chart on Class 43 In-Person Slides pg. 28

Cyber-Physical System (CPS)

-> Cyber Space -> Actuation Information -> Real Space / Object Domain -> Physical Sensing -> *Visual on Class 40 TO Slides pg. 10

Encryption Security Goals

1. -- Confidentiality 2. -- Integrity 3. -- Authentication - Access Control - Verification - Repudiation 4. -- Availability

ICT in the United Nations Goals for Sustainable Development

1. No poverty 2. Zero hunger 3. Good health and well-being 4. Quality education 5. Gender equality 6. Clean water and sanitation 7. Affordable and clean energy 8. Decent work and economic growth 9. Industry, innovation, and infrastructure 10. Reduced inequalities 11. Sustainable cities and communities 12. Responsible consumption and production 13. Climate action 14. Life below water 15. Life on land 16. Peace, justice, and strong institutions 17. Partnerships for the goals

Evolution of the Modern IT Infrastructure

1. Stand-alone Mainframes 2. Mainframe and Dumb Terminals 3. Stand-alone Personal Computers 4. Local Area Networks (Client/Server Computing) 5. Enterprise Computing 6. Cloud Computing and Mobile Computing

Video Case Study: Cloud Computing Trends for 2020

1. multicloud evolution 2. automated/intelligent cloud security 3. edge computing 4. disaster recovery as a service 5. Microsoft & Google gain traction - more than one company being used for services

"A Cloudy History of Time"

1940-1950: The first datacenters! 1960-1980: Timesharing Companies & Data Processing Industry 1980-1990: PCs (not distributed) 1990-2012: Peer-to-Peer Systems 1980-2012: Grids, Clusters 2000-2012: Clouds & Datacenters *Visual on Class 41 In-Person Slides pg. 10

The Effects of Technology on Environmental Sustainability

1st Order (direct result of its existence): GHG Emission, E-Waste, Hazardous Substances, Use of Scarce and Nonrenewable Resources 2nd Order (from application): Travel Substitution, Transportation Optimisation, E-Business & E-Government, Environmental Control Systems 3rd Order (Long term socio-economic structural changes): Energy Intensity, GHG Intensity, Transportation Intensity, Material Intensity

IPv4, which is the most widely used Internet Protocol addressing scheme, uses _____ bits allowing it to uniquely identify (address) at most 4,294,967,295 computers and devices.

32

Impact of Dedicated Resources

A call can be blocked due to resources (e.g. communication links) being unavailable for the duration of another call *Visual on Class 36 In-Person Slides pg. 13

The expansion of telecommunications infrastructure occurred primarily during while era of globalization, as described by Thomas Friedman?

A. Countries B. Companies C. Individuals B. Companies ***

What filename should you use for your ACHosting webpage?

A. INDEX.html B. index.html*** C. ACWebsite.html D. MyWebsite.html

The adoption of new digital technologies to offer improved telecommunications options was partially based on limitations of previous technologies, as described by who?

A. Moore B. Gilder C. Metcalf D. Shannon D. Shannon***

What is the name of the UArizona website hosting server that you MUST use for your MIS 111 AC website?

A. websites.arizona.edu B. hosting.arizona.edu C. u.arizona.edu*** D. mis111.arizona.edu

Technology Adoption by Sector

AGRI = Agriculture, Food and Beverage; AUTO = Automotive; CON = Consumer; DIGICIT = Digital Communications and Information Technology; EDU = Education; ENG = Energy Utilities & Technologies; FS = Financial Services; GOV = Government and Public Sector; HE = Health and Healthcare; MANF = Manufacturing; MIM = Mining and Metals; OILG = Oil and Gas; PS = Professional Services; TRANS = Transportation and Storage. *Chart on Class 44 TO Slides pg. 7

IaaS: Computer infrastructure delivery model

Access to infrastructure stack: Full OS access Firewalls Routers Load balancing

Communication Architecture

All communications require: • Transmitters/Senders and receivers (actors) • Transmission medium (infrastructure) • Rules of communication (protocol) • A message (content) How message travels: Transmitter -> Medium -> Receiver

Density of Use Fact

Americans own some 2 billion electronic products - about 25 products per home! (Consumers Electronics Association)

Electronic Product Environmental Assessment Tool (EPEATTM) www.epeat.net

An easy to use environmental procurement tool designed to help institutional purchasers compare and select desktop computers, laptops and monitors based on their environmental attributes

Data Type vs. Transmission Type

Analog Data & Analog Transmission: radio, broadcast TV Analog Data & Digital Transmission: PCM & Video standards using codecs Digital Data & Analog Transmission: modem-based communications Digital Data & Digital Transmission: LAN cable standards

________ modems use a portion of a voice telephone line to maintain a connection to offer immediately-available broadband access.

DSL

Which of the following security goals addresses issues such as access control, verification, and repudiation?

Authentication

Expanding Opportunities for ICT Environmental Contribution

Automation: Industrial Robots, Logistics for Transportation, LEED Certified Buildings, Smart Motors, Smart Power Delivery Substitution: Video Conferencing, Online Entertainment, e-Commerce, Paperless Office De-Materialization: Converting Atoms to Bits, On-line Banking, Digital Media Content

When is the due date for submitting your report for the Additional Credit Website Hosting Project by 11:59pm local Tucson (University time, UTC/GMT-7)?

B. Thursday, December 8th

Server Virtualization

Before Server Virtualization: Single OS image per machine Software and hardware tightly coupled Running multiple applications on same machine often creates conflict Underutilized resources Fault/security vulnerability After Server Virtualization: Virtual machines (VMs) break 1-to-1 dependency between OS and HW Manage OS and application as single unit by encapsulating them into VMs Hardware-independent: they can be provisioned anywhere Strong isolation between VMs *Visuals on Class 42 In-Person Slides pg. 24

From a networking infrastructure perspective, which of the following descriptive terms would generally be associated with the transmission of digital data?

Bits per second

In a circuit switched network, which of the following terms describes when a telephone call cannot be made due to the needed resources (e.g. communication links) being unavailable while assigned to another subscriber's call?

Blocked

RFID, Bluetooth, and NFC

Bluetooth: - Bluetooth technology eliminates the use of cables to connect your devices to one another. - Wirelessly pair your computer with your mouse, your phone with your car, or your speakers with your headset. NFC (near field communication): - NFC is the newest of these technologies, connecting you to a world of convenience, information, and enhanced experiences. With NFC Tap Technology You Can: - pay for groceries securely - exchange photos with a friend - track your fitness stats - download production information - expedite travel and transit - easily discover special retail offers - enjoy an interactive museum exhibit RFID (radio frequency identification): - UHF RFID technology uses radio frequencies to identify objects and transmit information. - Because it requires proprietary standalone readers, UHF RFID is ideal for tracking inventory and other types of one-way logistics/supply chain communications. It had a read range of 100m.

Development of IoT

By 2004 scientists showed its household applications In 2008-2009 period analysts form Cisco concluded that the number of devices connected to the global network has exceeded the population of the Earth, thus "internet of people" became the "Internet of things" 2009 - with the support of the European Commission in Brussels, annually Conference on "Internet of Things" is held 2010 - IoT becomes the driving force for the "Fog computing" paradigm

SaaS: Examples

CRM Financial Planning Human Resources Word processing Commercial Services: Salesforce.com emailcloud

Offering broadband access to the Internet, ________ modems share bandwidth among subscribers which means that when large numbers of subscribers access the Internet at the same time, each user's bandwidth can decrease significantly.

Cable

Disadvantages of Cloud Computing: Can be slow

Can be slow: Even with a fast connection, web-based applications can sometimes be slower than accessing a similar software program on your desktop PC. Everything about the program, from the interface to the current document, has to be sent back and forth from your computer to the computers in the cloud. If the cloud servers happen to be backed up at that moment, or if the Internet is having a slow day, you would not get the instantaneous access you might expect from desktop applications.

Which of the following NFC (Near Field Communication) communication modes allows your phone to act like an "interactive card" for payment, transportation, identification, and physical access?

Card emulation mode

From a data network infrastructure perspective, what type of cabling (wired guided media) is commonly associated with residential subscribers with POTS (plain old telephone service) service?

Category 3 Twisted Pair Cables

Time Division Multiplexing (TDM) (periodically on - full bandwidth)

Circuit Utilization (time and frequency) *Visual on Class 38 TO Slides pg. 6

Analysis Methods for Data Mining Pattern Evaluation

Classification - Categories Clustering - Grouping Association - Commonality Sequencing - Ordering Forecasting - Statistical

Define the Cloud Ecosystem

Cloud Computing: Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model is composed of five essential characteristics, three service models, and four deployment models.

As described by the UofA's Autonomic Computing Lab, which of the following would NOT be commonly considered as being one of the challenges for the Future of the IOT (Internet of Things)?

Competition

Mechanical Specifications: Computer Interfaces (Ports)

Computer ports are interfaces between peripheral devices and the computer. They are mainly found at the back of the computer but are often also built into the front of the computer chassis for easy access.

Cloud Service Risks: Confidentiality & Privacy

Confidentiality: ▪ Comingling of data & other assets ▪ Unauthorized access to sensitive or trade secret information Privacy: ▪ International laws affecting the physical location of the service provider's data center ▪ Regulatory compliance/legal liability ▪ Breach & incident management

NFC: How does it work? - 3 communication modes

Connect the world of apps with the physical world: - Apps jump into the world and touch people, objects, and other apps - Tag/Card Reader/Writer (terminal) - multi-standard (ISO/IEC14443,J1S X 6319-4/Felica, ISO/IEC15693) Connect devices through physical proximity: - A magical connection of devices by simply touching them. A true device "hand shake". - P2P Communication (device to device) - NFCIP-1, NFCIP-2 (ISO/IEC18092, ISO/IEC21481) Interactive Wallet: - Allows your phone to act like an "interactive card" for payment, transportation, ID, and physical access. - Card Emulation - EMVCo/ISO/IEC14443, JIS X 6319-4/Felica

IoT Delivers Extraordinary Benefits

Connected Rail Operations: PASSENGER SECURITY: in-station and onboard safety, Visibility into key events ROUTE OPTIMIZATION: Enhanced Customer Service, Increased efficiency, Collision avoidance, Fuel savings CRITICAL SENSING: Transform "data" to "actionable intelligence", Proactive maintenance, Accident avoidance - Cost savings, improved safety, superior service Smart City Infrastructure: - Safety, financial, and environmental benefits CONNECTED TRAFFIC SIGNALS: Reduced congestion, Improved emergency services response times, Lower fuel usage PARKING AND LIGHTING: Increased efficiency, Power and cost savings, New revenue opportunities CITY SERVICES: Efficient service delivery, Increased revenues, Enhanced environmental monitoring capabilities REMOTE ACCESS: Increased traffic congestion, Creation of unsafe conditions SYSTEM CONTROL: Device manipulation, Remote monitoring, Creation of unsafe conditions SERVICE MANIPULATION: Environmental degradation, System shutdown, Lost revenue - Potential impact to services and public safety The Connected Car: WIRELESS ROUTER: Online entertainment, Mapping, dynamic re-routing, safety and security CONNECTED SENSORS: Transform "data" to "actionable intelligence", Enable proactive maintenance, Collision avoidance, Fuel efficiency URBAN CONNECTIVITY: Reduced congestion, Increased efficiency, Safety (hazard avoidance) - Actionable intelligence, enhanced comfort, unprecedented convenience

Which of the following business applications would typically NOT be something that commonly associated with NFC (Near Field Communication) technology?

Connected vehicles, such as Qualcomm's V2X (Vehicle to Everything)

Three Phases of a Connection

Connection Set-Up: - Pick up phone - Dial tone - Dial number - Network selects route; sets up connection; called party alert Information Transfer: - Exchange voice signals Connection release: - Hang up *Visual on Class 36 In-Person Slides pg. 12

In the Internet Bridges the Communications Gap Transparently case study, what role does an ISP (Internet Service Provider) POP (Point of Presence) serve in the network?

Connects "Local Loop Carriers" to User Services

Hosting your U-System website

D2L -> Download -> Your Computer (via browser) -> Upload -> U-System (Transform) (via WinSCP) to public_html ▪ index.html ▪ image file ▪ icon file • Download website template (zipfile) • Extract website template (from Zipfile) • F22-ACHosting-index.html • Rename template to index.html • Use Dreamweaver to edit website template file (index.html) to add: - Image, Title, and Icon (optional)

Which of the following ciphers was developed in 1973 by the United States Commerce Department's National Bureau of Standards (NBS), and offered a cost-effective and practical way for businesses to encrypt and decrypt sensitive information using symmetric-key cryptography?

DES Cipher

Communications

Data Communications: - The movement of computer information from one point to another by means of electrical or optical transmission systems. - Such systems are called data communications networks. • Telecommunications: Includes the transmission of voice, video and data.

Encryption Standards

Data Encryption Standard (DES): • IBM developed the most widely used private-key systems: Data Encryption Standard (DES). - It was made a standard in 1977 by the U.S government. • DES uses lookup and table functions and works much faster than public-key systems. • DES uses 56-bit private keys. Triple Data Encryption Standard (3DES): • Triple Data Encryption Standard was originally developed in the late 1970s • The recommended method of implementing DES encryption in 1999. • 3DES encrypts three times, and it allows us to use one, two, or three separate keys. Therefore, 3DES is slow. Advanced Encryption Standard (AES): • The Advanced Encryption Standard (also known as Rijndael) has been the "official" encryption standard in the United States since 2002. • AES has key lengths of 128, 192, or 256 bits. • The United States government has determined that 128-bit security is adequate for things like secure transactions and all materials deemed Secret • All Top Secret information must be encoded using 192- or 256-bit keys. • The AES standard has proven amazingly difficult to crack.

AI and cognitive technology

Deep learning frameworks and services, cognitive computing services, natural language processing, and semantic discovery - Diego Lo Giudice - Jennifer Belissent, Ph.D. - Ted Schadler • Cognitive Engagement: A New Force Of Creative Destruction • Artificial Intelligence Can Finally Unleash Your Business Applications' Creativity • Insights Services Disrupt The Data And Analytics Market

Online Analytical Processing (OLAP) Multi-dimensional Analysis

Dimensions: • Time • Product • Location *Cube on Class 37 In-Person Slides pg. 7

Artificial intelligence and cognitive technology are critical to being insightsdriven and customer-led

Disruptive Potential: AI-based services and applications will eventually change most industries and redistribute the workforce. This impact will cascade; for example; self-driving cars will have a broad impact on the auto and transportation industries. Achieve disruptive potential in 5 years: Digital leaders will exploit this technology to evolve their offerings, but it will take 3 years for the technology to become practical for typical enterprise uses, and a few more years for widespread disruption to start. Technology includes: - deep learning frameworks and services - cognitive computing services - natural language processing (NLP) - semantic discovery

Insight platforms accelerate your journey to become insights-driven

Disruptive potential: Insight platforms will help insights-driven businesses stay ahead of the competition. Real-time interaction management (RTIM) engagement solutions will be built on insight platforms, and intelligent agents will depend on data from them to train algorithms. Achieve disruptive potential in 1-3 years: Business impact will accelerate quickly as insights-driven businesses demonstrate their value. Firms will turn to vendors as do-it-yourself experiments struggle. Technology includes: - enterprise insight platforms (cloud, suites, service providers) - insight application platforms - business insight platforms - business solution insight platforms - Big Data management foundation platforms

Edge computing will help you across the board, but through technologies higher in the stack

Disruptive potential: This is a support technology that will significantly but indirectly affect other technologies like IoT analytics, artificial intelligence, and real-time consumer engagement automation, and, as a result, create highly connected experiences. Achieve disruptive potential in 5 years: Edge computing started moving from academia to industries only recently. The immaturity of networking components means that its impact will likely be felt in 5 years or more. Technology includes: - mobile edge computing - Cloudlets - fog computing - the industrial internet - software-defined networking (SDN) - OpenNFV

Vanishing advantage

Distinctive systems once provided competitive barriers: - Access: American's Sabre - Knowledge: American Hospital Supply's ASAP - Foresight: Reuters' Monitor But barriers have rapidly eroded as accessibility, affordability, and standardization have increased

Disadvantages of Cloud Computing: Does not work well with low-speed connections & Features might be limited

Does not work well with low-speed connections: Similarly, a low-speed Internet connection, such as that found with dial-up services, makes cloud computing painful at best and often impossible. Web-based applications require a lot of bandwidth to download, as do large documents. Features might be limited: This situation is bound to change, but today many web-based applications simply are not as full-featured as their desktop-based applications. - For example, you can do a lot more with Microsoft PowerPoint than with Google Presentation's web-based offering

What is the name of the computer software system that translates Uniform Resource Locator (URL's) into IP addresses?

Domain Name System

Advantages of Cloud Computing: Easier Group Collaboration & Device Independence

Easier group collaboration: Sharing documents leads directly to better collaboration. Many users do this as it is an important advantages of cloud computing - multiple users can collaborate easily on documents and projects Device independence: You are no longer tethered to a single computer or network. Changes to computers, applications and documents follow you through the cloud. Move to a portable device, and your applications and documents are still available.

Widely used in the areas of business-to-business (B2B) electronic commerce and supply chain management (SCM), what term is used to describe a network that connects parts of the intranets of different organizations and enables business partners to communicate securely over the Internet using virtual private networks (VPNs)?

Extranet

Frequency Division Multiplexing (FDM) (always on - lower bandwidth)

FM Radio (time and frequency) *Visual on Class 38 TO Slides pg. 6

Assessing the Effectiveness and Capabilities of Encryption

Factors to Consider: • Technical capabilities available • Potential vulnerabilities • Likelihood of an exploit • Impact of compromise

Which of the following technologies is primarly used to provide data communication links across the Atlantic ocean?

Fiber-optic Cables

IMPORTANT: Case Sensitivity

File names on the u.arizona.edu hosting system are cAsE sEnSiTiVe • index.html is NOT the same as Index.html (one uses a lowercase and one uses an uppercase "I") • Often windows or mac programs will automatically capitalize the first letter when you are typing, you must fix and make lowercase

Industry 4.0: The Fourth Industrial Revolution

First Industrial Revolution: through the introduction of mechanical production facilities with the help of water and steam power (first mechanical loom, 1784) Second Industrial Revolution: through the introduction of a division of labor and mass production with the help of electrical energy (first assembly line Cincinnati slaughter houses, 1870) Third Industrial Revolution: through the use of electronic and IT systems that further automate production (first programmable logic controller (PLC), Modicon 084, 1969) Fourth Industrial Revolution: through the use of cyber-physical systems

IaaS: Examples

Flexiscale AWS: EC2

Forrester Market

Forrester Market Insights service provides a holistic perspective on buyers and the competitive landscape. It provides objective advice to see your company as your buyers see you and includes: Bold Vision, Deep Buyer And Competitive Insights, and Tools For Growth

Second Industrial Revolution (1870)

Generally, the second industrial revolution can be broadly characterized by expansion of industries and electrically-powered mass production based on the division of labor. • Use of electricity for mass production • Electricity, combustion engine, steel, chemical synthesis, large factories, assembly lines

Which of the following business opportunities was enabled by the evolution of cellular communication technologies (i.e., 3G, 4G, and 5G networks) allowing cellular network providers to have higher density networks?

Increased customers

Terrestrial Radio and Microwave Communication Characteristics

Good news: • Have no right-of-way issues: Links can be rapidly deployed across difficult terrain Bad news: • Need unobstructed line-of-sight: No physical barriers can exist between transmitter and receiver

PaaS: Examples

Google App Engine Mosso AWS: S3

Internet structure: network of networks

Hierarchical network design: • At center: "tier-1" ISPs (e.g., UUNet, BBN/Genuity, Sprint, AT&T), national/international coverage - multiple Tier 1 ISPs interconnected with an NAP - Tier-1 providers interconnect (peer) privately - Tier-1 providers also interconnect at public network access points (NAPs) *Visual on Class 36 TO Slides pg. 10 • "Tier-2" ISPs: smaller (often regional) ISPs - Connect to one or more tier-1 ISPs, possibly other tier-2 ISPs - multiple Tier 1 and Tier 2 ISPs interconnected with an NAP - Tier-2 ISP pays tier-1 ISP for connectivity to rest of Internet - Tier-2 ISPs also peer privately with each other, interconnect at NAP *Visual on Class 36 TO Slides pg. 10 "Tier-3" ISPs and local ISPs - last hop ("access") network (closest to end systems) - multiple Tier 1, Tier 2, and Tier 3 ISPs and local ISPs interconnected with an NAP - Local and tier3 ISPs are customers of higher tier ISPs and Connect them to rest of Internet *Visual on Class 36 TO Slides pg. 11 • A packet passes through many networks! *Visual on Class 36 TO Slides pg. 11

Strategic Use of Data Networking

How does data networking create strategic advantage for businesses? • More efficient and effective business operations • Geographical distance irrelevant (Globalization) • More timely and efficient access to information • Enables a flexible and mobile workforce

What term is used to describe the connection (reference URL) to a document that is typically activated by clicking on a highlighted word or image on a webpage in a browser?

Hyperlink

According to the What is The Internet of Things? video case, which of the following IP (Internet Protocol) addressing schemes creates more IP addresses than there are atoms on the surface of the earth?

IPv6

The adoption of ________ has been an important factor in the development of the Internet of Things.

IPv6

A worthy goal for CIOs?

IT will come to "be thought of more like electricity or the telephone network than as a decisive source of organizational advantage. In this world, a company trumpeting the appointment of a new chief information officer will seem as anachronistic as a company today naming a new vice president for water and gas. People like me will have succeeded when we have worked ourselves out of our jobs. Only then will our organizations be capable of embracing the true promise of information technology." - Max Hopper, 1990

Which of the following space-based satellite systems is NOT primarily intended to provide global positioning services?

Iceye Oy Are Intended: - EU (European Union) Galileo - Russian GLONASS - China's BeiDou

Advantages of Cloud Computing: Improved Performance & Reduced Software Costs

Improved performance: With few large programs hogging your computer's memory, you will see better performance from your PC. Computers in a cloud computing system boot and run faster because they have fewer programs and processes loaded into memory... Reduced software costs: Instead of purchasing expensive software applications, you can get most of what you need for free-ish! - most cloud computing applications today, such as the Google Docs suite. better than paying for similar commercial software - which alone may be justification for switching to cloud applications.

Wildcats' "ZeroWaste" Football Greening the Game

In 2018, Students for Sustainability, Compost Cats, Facilities Management, Arizona Athletics, the UA Student Unions, the Zona Zoo, the Associated Students of the UA, Coca Cola brought the amount of waste generated at Arizona Stadium as close to zero as possible.

Cloud Taxonomy: Infrastructure, Software, Platform, and Applications

Infrastructure Services: storage, compute, services management Cloud Software: data, compute, cloud management Platform Services: general purpose, business intelligence, integration, development and testing Software Services: billing, financials, legal, sales, desktop productivity, human resources, content management, backup and recovery, CRM, document management, collaboration, social networks *Chart on Class 41 In-Person Slides pg. 18

Advantages of Cloud Computing: Instant Software Updates & Improved Document Format Compatibility

Instant software updates: Another advantage to cloud computing is that you are no longer faced with choosing between obsolete software and high upgrade costs. When the application is web-based, updates happen automatically - available the next time you log into the cloud. When you access a web-based application, you get the latest version - without needing to pay for or download an upgrade. Improved document format compatibility: You do not have to worry about the documents you create on your machine being compatible with other users' applications or OSes There are potentially no format incompatibilities when everyone is sharing documents and applications in the cloud.

Intelligent agents

Intelligent agents, chatbots, digital assistants, and robotic process automation - Craig Le Clair - Jennifer Wise - Brendan Witcher • The State Of Robotic Process Automation • Brief: Facebook Messenger Bets On Bots • The Business Case For Virtual Agents • The Future Of White-Collar Work: Sharing Your Cubicle With Robots • The Future Of Jobs, 2025: Working Side By Side With Robots • The Rise Of Intelligent Agents

Which of the following challenges for wireless communication is commonly caused by unregulated wireless network frequencies (e.g., 2.4 GHz) shared by other devices (e.g., cordless phones) and other general noise sources?

Interference

What is IoT?

Is a network of physical objects (devices) that are embedded with electronics, sensors, software and network allows objects to be sensed and controlled remotely across existing network infrastructure

Internet of Things (IoT) Architecture

Local Analytics -> Internet -> Device Data -> Operational Insight / Device Data Analytics / Business Insight *Visual on Class 40 TO Slides pg. 11

Comparison of Short-range Wireless: Applications vs. Frequency Range

Long Range Applications (Applications requiring large data transfer): - automatic toll collection systems - supply chain applications Long Range Systems (Range > 1m): - dock door reading - asset management in warehouse - overhead reading - smart shelves - baggage tracking Short Range Systems (Up to 1m; Applications in vicinity of metals and liquids): - animal identification - item level tracking - baggage handling - smart shelves Short Range Systems: - electronic door locking system - contactless smart card systems - POS applications *Chart on Class 38 In-Person Slides pg. 6

Since ________ satellites move relative to a point on the Earth, a moderate number is needed for global coverage.

MEO (mid-earth orbit)

MIS Advising and Career Support

MIS Careers and Internship: - Christian Lagarda MIS/OSCM Career Coach - [email protected] MIS Major Advisor: - Julio Peña MIS/OSCM Advisor - [email protected]

ARPANET (DARPA 1969 - 1982)

Maps of the United States from December 1969 to February 1982 *Maps on Class 36 TO Slides pg. 7

In a network communication architecture, what term is used to describe the infrastructure used to transmit a message?

Medium

Reminiscent of the inter-personal communication challenges described in by Brook's Mythical Man Month, what type of networking topology allows for fast, low-overhead messaging between nodes using fully inter-connected direct communication?

Mesh

Terrestrial Microwave in Telecommunications

Microwaves are focused radio waves. • Microwave signals travel in a straight line • Long distance terrestrial data link stations are typically 30+ miles apart • Stations must have an unobstructed line-of-sight

Edge computing

Mobile edge computing, cloudlets, fog computing, the industrial internet, SDN, and OpenNFV - Dan Bieler - Dave Bartoletti - Eveline Oehlrlich • Mobile Edge Computing Will Be Critical For Internet-OfThings Success • TechRadar™: BT Infrastructure, Q2 2016 • Top Eight Technology Trends That I&O Pros Should Watch: 2016

Mechanical Specifications: Twisted-pair Cable Ports

Modem port - 4-wire (RJ11) connector that is used to connect to an analog modem to a voice telephone line. Ethernet port - 8-wire (RJ45) connector that is used to connect to a digital data network (LAN/DSL Model).

Comparison of Wireless Functionality and Technology

NFC: - 10cm, 13.56 MHz, Two Way, 106/212/424 Kbps - e-tickets, credit card payment, membership card RFID: - 3m, varies, One Way, varies - tracking items, EZ-pass Bluetooth: - 10m, 2.4 GHz, Two Way, 22 Mbps - communicate between phones, peripheral devices Wifi: - 100m, 2.4/5 GHz (802.11n), Two Way, 144 Mbps - wireless Internet *Chart on Class 38 In-Person Slides pg. 7

What is OLAP ??

OLAP - On-Line Analytical Processing Set of functionalities that facilitate multi-dimensional data analysis for faster, more informed decision making - Natural to users / 'Cubes' of data - Detection / Measurement / Comparison - Multiple views / Drill-Down / Slice-n'-Dice - Data / Processes / Relations / Concepts

Bluetooth Technology

Offers a single wireless standard integrating technologies *Images on Class 38 In-Person Slides pg. 14

Comparison of on-premise software, infrastructure-as-a-service, platform-as-a-service, and software-as-a-service.

On-Premise Software: - applications, data, operating system, servers, virtualization, storage, networking (customer manages) Infrastructure-as-a-Service: - applications, data, operating systems(customer manages) - servers, virtualization, storage, networking (vendor manages) Platform-as-a-Service: - applications, data (customer manages) - operating system, servers, virtualization, storage, networking (vendor manages) Software-as-a-Service: - applications, data, operating system, servers, virtualization, storage, networking (vendor manages) *Chart on Class 41 In-Person Slides pg. 23

Tracking, traceability, authentication, and control are all associated with what type of benefit provided by RFID (Radio Frequency Identification) tracking?

Operational

Benefits of RFID Tracking

Operational Benefits: Reduce cost - increased visibility, automation, increased outcome, higher quality Increase Security- tracking, traceability, control, authentication Product Benefits: Generate value - new service, new product feature, CRM Legal Benefits: Fulfill requirements - law, mandate

Multiplexing

Options for increasing bandwidth utilization by sharing the spectrum

IaaS: Advantages

Pay per use Instant Scalability Security Reliability APIs

PaaS: Advantages

Pay per use Instant Scalability Security Reliability APIs

SaaS, PaaS, IaaS: Common Factors

Pay per use Instant Scalability Security Reliability APIs

SaaS: Advantages

Pay per use Instant Scalability Security Reliability APIs

Near Field Communication Business Applications

Payment: - Google Wallet - P2P payment - SIMPass Travel: - oyster card (transport for London) - Washington DC Metro - DB touch Media and Ads: - BBMMusic - Access to music in Billboard Brazil Magazine - Coca Cola's out-of-home advertising in Singapore Social Media: - NFriendConnector - Walibi Connect NFC bracelet in amusement park Authentication: - TapToLogin platform in Brazil - NFC keys in Hotel Sky Park Central in Seoul, Korea Retail: - personalized shopping from Swiss online fashion store Heidi.com - Vodafone's 'Virtual Shelf' Shopping Wall in Dusseldorf Games: - McParty Run app, McDonald's Happy Table Initiative in Singapore Loyalty Apps: - ACS mCard Wallet in Singapore - Canadian Kiosk Digital Rewards Contact Sharing: - TapMyBiz Business Cards - Jewelry Range from Amodoria in Dubai

PaaS: Platform delivery model

Platforms are built upon Infrastructure, which is expensive Estimating demand is not a science! Platform management is not fun!

Two types of technology

Proprietary: can be owned, actually or effectively, by a single firm e.g., patents, secrets, exclusive licenses Infrastructural: is shared broadly by all firms in an industry or region e.g., rail, telegraph, telephone, electricity, IT

In a network communication architecture, what term is used to describe the rules of communication used to transmit a message?

Protocol

What type of cryptography was launched in 1976 by Bailey Whitfield, Diffie, Martin Hellman and Ralph Merkle that facilitated encrypted communications without the need for advance delivery of keys?

Public-key cryptography

Which of the following wireless technologies only supports one-way directional communication?

RFID

Key Take-aways for 2022

Remote Work: • Network modernization of their network infrastructure • Piloting cloud-delivered services to support a remote workforce and expanded use of edge computing Productivity and performance: • Enabling speed and agility to empower business teams to perform development, analytics, and integration • IT automation and AI tools to streamline product delivery and enhance employee productivity • Use machine learning to understand the employee experience and improve performance Operational efficiency: • Increase efficiency of infrastructure management by investing in serverless computing • Simplify provisioning of security environments for virtualization and edge investments using firewall-as-a-service solutions

Disadvantages of Cloud Computing: Requires a constant Internet connection

Requires a constant Internet connection: Cloud computing is impossible if you cannot connect to the Internet. Since you use the Internet to connect to both your applications and documents, if you do not have an Internet connection you cannot access anything, even your own documents. A dead Internet connection means no work and in areas where Internet connections are few or inherently unreliable, this could be a deal-breaker.

Digital Communications

Samuel Morse (1835) developed Morse code that converts (encodes) text message into sequence of dots and dashes - Technical capability and human factors *Chart on Class 36 In-Person Slides pg. 9

According to the UofA's Autonomic Computing Lab's Model for the IOT (Internet of Things), which of the four layers incorporates technologies such as Smart Devices, Internet RFID (Radio Frequency ID), and the GPS (Global Positioning System)?

Sensing and Identification Layer

Mechanical Specifications: Serial and Parallel Ports

Serial port - a 9-pin port. Often called COM ports (communication) - Com1, Com2 etc. Mice and external modems were commonly connected to these ports. Parallel port - a 25-pin port used to connect printers, scanners, external hard disks, zip drives etc. to the computer. They are commonly referred to as LPT ports (line printer terminal) - LPT1, LPT2 etc.

Define the Cloud Ecosystem: SaaS, IaaS, PaaS

Service Models: Software as a Service (SaaS) Platform as a Service (PaaS) Infrastructure as a Service (IaaS) SaaS: Microsoft Dynamics, Google Apps for Business, Adobe Creative Cloud Paas: Sony Meet CI, CA Technologies, Google Cloud Platform IaaS: Amazon Web Services, GoGrid, Rackspace

Secure Messaging Apps

Signal / Telegram Encryption: end-to-end by default using the Signal Protocol; some end-to-end options using the MTProto 2.0 protocol Data collected: none except phone number; phone number, contacts, IP address Messaging types: individual, group, video, voice; individual, group, channels, video, voice Self-destruct messages: yes, for all chats; yes, for secret chats only Customization: limited; extensive Cost: free; free

Intelligent agents will improve service and create efficiencies

Significant business impact on: - customer-led - insights-driven - fast - connected Disruptive potential: Intelligent agents will change the world because they will replace many tasks that now depend on humans (such as customer service reps and eventually truck/taxi drivers). There will be secondary impacts as well. For example, the automotive industry will need to adapt, as will logistics firms. Achieve disruptive potential in 3-5 years: Intelligent agents have emerged, but wide adoption is not yet mainstream. As cognitive elements are added, capabilities will expand and target more use cases. Technology includes: - chatbots - digital assistants - robotic process automation - AI/cognitive

Trends to watch in the 4th Industrial Revolution

Smart Factory: The Fourth Industrial Revolution fosters called a "smart factory". Over the IoT, cyber-physical systems communicate and cooperate with e/o and with humans in synchronic time both internally and across organizational services. Predictive Maintenance: Industry 4.0 provides predictive maintenance due to the use of technology and IoT sensors. Predictive maintenance - identify maintenance issue in live - allows machine owners to perform cost-effective maintenance and determine it before the machinery fails or gets damaged. 3D Printing: The 4th Industrial Revolution is said to have extensive dependency on 3D printing technology. 3D printers can print many geometric structures, as well as simplify the product design process. Smart Sensors: Sensors and instrumentation drive the central forces of innovation, not only for Industry 4.0 but also for other "smart" megatrends such as smart production, smart mobility, smart homes, smart cities, and smart factories. Agriculture & Food Industries: Smart sensors collect, interpret, and communicate the information available in the plots (leaf area, vegetation index, chlorophyll, hygrometry, temperature, water potential, radiation).

Start Measuring and Analyzing

Start measuring and reporting consumption Set targets for consumption Create a dashboard - UA EcoReps Dashboard

PaaS: Popular services

Storage Database Scalability

Which of the following terms describes a technique used with the electric telegraph in which information is sent to an intermediate station where it is received and then sent at a later time to the final destination or to another intermediate station?

Store-and-forward

Disadvantages of Cloud Computing: Stored data might not be secure & Stored data can be lost

Stored data might not be secure: With cloud computing, all your data is stored on the cloud. - The questions is How secure is the cloud? Can unauthorized users gain access to your confidential data? Stored data can be lost: Theoretically, data stored in the cloud is safe, replicated across multiple machines. But on the off chance that your data goes missing, you have no physical or local backup. - Put simply, relying on the cloud puts you at risk if the cloud lets you down.

Parts of a PivotTable on Excel 2016

Sum of Qty Sold -> Rows: Products Jan / Feb / March -> Values: Sum of Qty Sold Grand Total -> Columns: Months, Date Field List (Drag and Drop to task pane) -> Columns: Months, Date *Visual on Class 37 In-Person Slides pg. 13

Hybrid Cipher Systems

Symmetric Ciphers are not vulnerable in the previous way, so the symmetric cipher key length can be much shorter. So, we do this: − Generate a one-time private key. − Encrypt the key using a public key. − Send it to the other side, decrypt the one-time key. − Start transmitting data using the symmetric cipher.

Three sets of five technologies stand out

Systems of engagement technologies: IoT software and solutions, intelligent agents, personal identity and data management, real-time interaction management, augmented and virtual reality Systems of insight technologies: AI/cognitive, customer journey analytics, insight platforms, IoT analytics, spatial analytics Supporting technologies: security automation and orchestration, containers and container management, edge computing, cloud native application platforms, hybrid wireless

Optional Tasks 2 to 5

Task 2: Website URL accesses website directly Hint: Just be sure your website is named index.html in public_html Task 3: Add company logo with an alt tag to website Hint: Be sure to copy your image file to public_html Task 4: Add Title directive to website Hint: Title directive is easily added in "code" view Task 5: Add an icon to website Hint: Be sure to copy the icon image file to public_html Hint: Directive to add the icon is easily added in "code" view

2022 Emerging Technology Trends: Market and Legal Insights for Innovators

Technology has increasingly shaped the way we live and interact with the environment. Perkin's Coie's report examines some of the key developments, trends, and implications of 10 emerging and nascent technologies that are not only disrupting today's markets but are also influencing and shaping those of tomorrow.

Success Factors for New Services

Technology not only factor in success of a new service Three factors considered in new telecom services Market (Can there be demand for the service?), Technology and Standards (Can it be implemented cost-effectively?), and Regulation (Is the service allowed?) overlap to create a New Service *Venn Diagram on Class 36 In-Person Slides pg. 8

Public Circuit Switched Network

Telephone (Subscriber Loop) -> End Office (Connecting Trunk) -> Long-distance office (Intercity Trunk) -> Long-distance office (Connecting Trunk) -> End Office -> Digital PBX (private branch extension) *Visual on Class 36 In-Person Slides pg. 11

Printers and Printing

The Opportunity: • The Paper itself consumes 10x the energy of the process of printing on it. The Fix (mostly behavioral): • Print Less - Analyze business flows • Consider duplex printing • Buy Energy Star devices. • Recycle - paper, toner cartridges

History of IoT

The concept of a network of smart devices was discussed in 1982, at Carnegie Mellon University The term "Internet of Things" was coined by Peter T. Lewis in a 1985 The concept became popular in 1999 through AUTO-ID research labs in MIT

Digging Deeper: Data Privacy (General Data Protection Regulation (GDPR))

The 7 Data Protection Principles: - Lawfulness, Fairness and Transparency - *Purpose Limitation* - Data Minimization - Accuracy - Storage Limitations - Integrity and Confidentiality - Accountability

Wireless: Signal Properties

The Electromagnetic Spectrum: radio waves -> microwaves -> infrared -> visible -> ultraviolet -> "soft" x-rays -> "hard" x-rays -> gamma rays *Visual on Class 38 TO Slides pg. 2

The Future of Jobs Report 2020

The Future of Jobs Report 2020 aims to shed light on the expected outlook for technology adoption jobs and skills in the next five years.

Encoding the Message

The Navajo language lacked words for most military terms and technology, so the Code Talkers developed symbols specific to their task, such as using "whale" for "battleship" *Chart of code on Class 39 TO Slides pg. 9

Switch OFF Equipment When Not in Use!

The Opportunity: • PCs and monitors account for more 30% of IT power consumption and CO2 emissions • Sixty percent of PCs are left on after hours The Fix (mostly behavioral): • Ditch the active screen savers • Use a low-power state, such as standby, for PCs and monitors after hours.

First Industrial Revolution (1784)

The first industrial revolution shifted the production from a previously labour intensive to a more capital intensive. • Late 18th Century and early 19th Century • Characterized by Industrialization • Initially using water, advancement of steam engine mechanized production

Why is it called Bluetooth?

The name Bluetooth was suggested as a project code name by Jim Kardach from Intel because "King Harald Blaatand (aka "Bluetooth") was famous for uniting Scandinavia just as we (Intel, Noika, and Ericsson) intend to unite the PC and cellular industries with a short-range wireless link." Fun Fact - The Bluetooth logo is actually the initials of Harald Bluetooth in Old Norse runic symbols

Mark Weiser Chief Scientist, Xerox PARC

The real purpose for ubiquitous computing, of course, are the applications.

Third Industrial Revolution (1969)

The third industrial revolution is an era of rapid technological progress associated with the development of information technology. It is in this era that electronics and information technology was used to further advance automation. • 'Digital revolution' enabled by ICT (Information and Communication Technologies) • Use of electronics and ICT to automate production

Physical Media: Cables

Three types: twisted-pair, coaxial, fiber-optic *Visual on Class 35 In-Person Slides pg. 18 Twisted-pair cables: Category 3 cable: the type of twisted-pair cable that telephone companies primarily use for POTS (Plain Old Telephone Service) to transmit voice signals Category 5 cable: carries signals between 10 and 100 times faster than coaxial cable, easy to install Coaxial cable: Much faster than Category 3 UTP cable, but more expensive and harder to install and maintain Fiber-optic cable: most expensive type of cable; transmits pulsing beams of light through very thin strands of glass or plastic, has the fastest transmission rate and highest immunity to noise

What network infrastructure term describes the physical layout of nodes on a network, such as bus, star or ring?

Topology

Cost Analysis Case Study of a Cloud Deployment

Traditional: - New development - Software costs - Power costs - Labor costs (operations and maintenance) - Hardware costs (annualized) Cloud: - Liberated funding for new development, transformation investment, or direct saving - Deployment (1-time) - Software costs - Power costs (88.8%) - Labor costs (- 80.7%) - Hardware costs (-88.7%) - Hardware, labor & power savings reduced annual cost of operation by 83.8% *Visual on Class 41 In-Person Slides pg. 17

Domain Name System

Translates URLs into IP Addresses www.eller.arizona.edu -> 128.196.190.150 root -> org / net / edu / com / uk / ca (top level domains) -> wisc / ucb / arizona / cmu / mit -> eller / uaccess -> www

Advantages of Cloud Computing: Universal Document Access & Latest Version Availability

Universal document access: That is not a problem with cloud computing, because you do not take your documents with you. Instead, they stay in the cloud, and you can access them whenever you have a computer and an Internet connection Documents are instantly available from wherever you are Latest version availability: When you edit a document at home, that edited version is what you see when you access the document at work. The cloud always hosts the latest version of your documents - as long as you are connected, you are not in danger of having an outdated version

Advantages of Cloud Computing: Unlimited Storage Capacity & Increased Data Reliability

Unlimited storage capacity: Cloud computing offers virtually limitless storage. Your computer's current 1 Tbyte hard drive is small compared to the hundreds of Pbytes available in the cloud. Increased data reliability: Unlike desktop computing, in which if a hard disk crashes and destroy all your valuable data, a computer crashing in the cloud should not affect the storage of your data. - if your personal computer crashes, all your data is still out there in the cloud, still accessible In a world where few individual desktop PC users back up their data on a regular basis, cloud computing is a datasafe computing platform!

Virtual Private Network (VPN)

Use a VPN is so a host can traverse an insecure network (Internet) and become local to the remote network *Visual on Class 39 TO Slides pg. 17

Mechanical Specifications: Video Ports

Video port - used to connect a monitor to the computer system. There are two common types: VGA port - This is a 15-pin port and is blue in colour. It is an analogue port and is being replaced by the DVI port. DVI port - white in colour, it is a digital port. This means that no analog-to-digital conversion is necessary between the computer and the monitor and that means that images can be produced more quickly on the monitor

Which of the following is a polyalphabetic substitution cipher that encrypts each character of a plaintext message individually based on a secret key word that is used as an index into a conversion grid?

Vigenere Cipher

Characteristics of Cloud Computing

Virtual - Physical location and underlying infrastructure details are transparent to users Scalable - Able to break complex workloads into pieces to be served across an incrementally expandable infrastructure Efficient - Services Oriented Architecture for dynamic provisioning of shared compute resources Flexible - Can serve a variety of workload types - both consumer and commercial

EPEAT uses a Voluntary Consensus Process Model

Voluntary Consensus Process -> Product Criteria + Corporate Criteria = EPEAT *Visual on Class 42 In-Person Slides pg. 17

Electric Telegraph

William Sturgeon Electro-magnet (1825) - Electric current in a wire wrapped around a piece of iron generates a magnetic force Joseph Henry (1830) - Current over 1 mile of wire to ring a bell Experimental telegraph line over 40 miles (1840) - Telegraph line signals propagates at the speed of light - Pulses of current deflect electromagnet to generate dots & dashes (open/close of a relay) - When relay closed Buzzer sounds

Which of the following is an autonomous device that monitors its own condition as well as physical and environmental conditions around it, such as temperature, sound, pressure, vibration, and movement?

Wireless sensor

Wireless Data Transmission

Wireless transmission transmits using unguided media using carriers such as light (visible or infrared), electromagnetic (radio or microwave), or acoustical (sound) signals or waves.

Advantages of Cloud Computing: Lower computer costs

You do not need a high-powered and high-priced computer to run cloud computing's web-based applications. Since applications run in the cloud, not on the desktop PC, your desktop PC does not need the processing power or hard disk space demanded by traditional desktop software. When you are using web-based applications, your PC can be less expensive, with a smaller hard disk, less memory, more efficient processor... In fact, your PC in this scenario does not even need a CD or DVD drive, as no software programs have to be loaded and no document files need to be saved.

In the URL "http://www.arizona.edu/index.html", which of the following defines the "top level domain"?

edu

Understanding a URL

http://www.arizona.edu/index.html • Protocol - Method Used to Send the webpage - HTTP:// - HyperText Transfer Protocol • Server - Identifies the location of the website - Domain: type of organization (.edu, .com, .net) - Organization: responsible party (.arizona) - Location of website on server: "public_html" directory • Resource - Information about the website - Filename: index (file name in "public_html" directory) - Website programming: html - HyperText Markup Language

Using the Caesar Cipher shown below (with a shift key of 19), the PLAIN TEXT message of "PAR" would decode to what "cipher text" message?

itk

Sustainability and Business

• "70% of companies have placed sustainability permanently on their management agendas" • "Two-thirds said sustainability is necessary to competitiveness in today's marketplace" • "Almost a third of respondents say their sustainability activities contribute to their profitability" - "Sustainability Nears a Tipping Point" (2012) N=4,000 managers in 113 countries

What do MIS/OSCM professionals actually do?

• "Solve real problems... for real people" - Dr. Jay Nunamaker, Regents Professor and Founding Chair, UA MIS

EPEATTM Performance Categories

• 4.1 Reduction/elimination of environmentally sensitive materials • 4.2 Materials selection • 4.3 Design for end of life • 4.4 Product longevity/life cycle extension • 4.5 Energy conservation • 4.6 End of life management • 4.7 Corporate performance metrics • 4.8 Packaging waste

802.11 (WiFi) Wireless Cells

• 802.11 has 11 channels • Channels 1, 6, and 11 are nonoverlapping • Each AP coverage area is called a "cell" • Wireless nodes can roam between cells *Visual on Class 38 TO Slides pg. 8

Wireless LAN Standardization

• 802.11a - 23 Mbit/s throughput - About 75 m range outdoors • 802.11b (most prevalent) - 4.5 Mbit/s throughput - About 80 m range outdoors • 802.11g - 20 Mbit/s throughput - About 90 m range outdoors

U-System Video Tutorial

• A video tutorial for setting up your U-System account is available in the ACHosting folder • A video tutorial for transferring files to the U-System server using WinSCP is available in the ACHosting folder

2022 Emerging Technology Trends

• AI, Machine Learning & Quantum Computing • Cloud Computing & Distributed Infrastructure • Digital Media & Entertainment • Greentech*** • Healthtech & Medtech*** • Mobile Wireless Technology • Privacy & Security • Retail & E-Commerce*** • Robotics & Autonomous Systems • Spacetech

Why Focus on Electronics?

• Advances in technology have resulted in: - Increased sales of electronics worldwide - Increased energy consumption - A new stream of obsolete and discarded products

Bus (Ethernet): Linear Bus

• Advantages: Ease of connections, Less cabling • Disadvantage: Cable breaks shut down network

Mesh (Peer-to-Peer): Fully Interconnected Direct Connections

• Advantages: Fast, low-overhead messaging • Disadvantage: More cabling, Complex Interfaces

Star (Ethernet): Central Hub or Switch

• Advantages: Fault tolerant, Easy expansion • Disadvantage: More cabling, Single point of failure

Ring (Token Ring): Circular Bus

• Advantages: Low-overhead messaging • Disadvantage: Slower transmission (send/receive)

Circuit Switching: Advantages

• Circuit is dedicated to the call - no interference, no sharing - This didn't always work in old telephone networks where circuits on different frequency bands on the same wire sometimes could overlap of the band filters were not working correctly, or pairs of wire next to each other created interference, sometimes you could hear other calls • Guaranteed the full bandwidth for the duration of the call • Guaranteed quality of service

Types of Data Transmitted

• Analog data (Human Voice) - Sound waves, which vary continuously over time • Digital data (Computer Data) - Binary data - represented as a series of ones and zeros *Visual on Class 35 TO Slides pg. 6

Types of Transmission

• Analog transmissions: - Analog data transmitted in analog form which varies continuously - Examples of analog data being sent using analog transmissions are broadcast TV and radio • Digital transmissions: - Made of square waves with a clear beginning and ending using discrete (binary) signals - Computer networks send digital data using digital transmissions. Data converted between analog and digital formats: - Modem (modulator/demodulator): used when digital data is sent as an analog transmission (digital to analog) - Codec (coder/decoder): used when analog signals are sent using digital data transmission (analog to digital)

What MIS/OSCM Skills Did You See Applied in the Video Case?

• As-is process analysis (Time-and-motion) • Business process re-design / improvement • Value proposition (customer acceptance) • Stakeholder communication • Project management (uncertainty) • Risk Management (mitigation) • Visualization (spatial design)

Design Factors to Consider When Choosing a Network Topology

• BUS - network is small - network will not be frequently reconfigured - least expensive solution is required - network is not expected to grow much • STAR - it must be easy to add/remove PCs - it must be easy to troubleshoot - network is large (physical area or number of nodes) - network is expected to grow in the future • RING - network must operate reasonably under heavy load - consistent network performance is required - network will not be frequently reconfigured

What is Sustainability?

• Balancing today's needs with future needs • Addressing and valuing the interconnectedness of natural, social, and economic systems - environment, economic, social intersect to create sustainable development

Key Terminology: Bandwidth

• Bandwidth the amount of information (or data) that can be transmitted through a communications channel - Analog signals are measured in Hertz, or cycles per second (Hz) - Digital signals are measured in bps, or bits per second • Broadband - any transmission medium that transports high volumes (typically megabits) of data at high speeds

Packet Switching: Advantages

• Bandwidth used to full potential - shared use • Not affected by single points of failure (redirects signal) - original DOD objective • During a major disaster, the public telephone network might become congested, but e-mails and texts can still be sent via packet switching

What Can Breach IoT Networks?

• Billions of connected devices • Secure and insecure locations • Security may or may not be built in • Not owned or controlled by IT ... but data flows through the network • Any node on your network can potentially provide access to the core

SERVER WITH VIRTUALIZATION

• Can run multiple OS simultaneously. • Each OS can have different hardware configuration. • Efficient utilization of hardware resources. • Each virtual machine is independent. • Save electricity, initial cost to buy servers, space etc. • Easy to manage and monitor virtual machines centrally. *Visual on Class 42 In-Person Slides pg. 23

AlohaNet's Impact

• Changed the perspective of how errors are managed in data communications • Technologies Based on AlohaNet Protocols: * Ethernet (CSMA/CD) * SMS/Paging * Satellite * WiFi (CSMA/CA) * Mobile Phones * Cable (DOCSIS)

Circuit Switching: Origin and Use

• Circuit switching was designed in 1878 in order to send telephone calls down a dedicated channel. • This channel remains open and in use throughout the whole call and cannot be used by any other data or phone calls. *Visual on Class 36 In-Person Slides pg. 11

Internet of Everything

• Cisco: 99.4% of things that should be connected aren't • Predicting 200-800 Billion Devices in 10 years Connected Devices: - In 2014, nearly 2 billion connected devices will be shipped - This number will grow to nearly 8 billion devices for the year 2020 - Home (Consumer) 3,745.71 (devices millions) - Transport (Mobility) 392.72 (devices millions) - Body (Health) 360.03 (devices millions) - Buildings (Infrastructure) 1,726.59 (devices millions) - Cities (Industry) 1,524.70 (devices millions)

Backbone and Content Services

• Connectivity • Content Distribution • Content Providers ISP Backbone ( ISP #1 and ISP #2) includes Private Peering, Large Capacity Circuits, Large Capacity Routers/Switches, Large Capacity Exchange Points -> Online Content such as a Hosting Platform (web, audio, video) -> Origins of Online Content (legacy systems, books, scanners/OCR, recordings, video/movie, phone, financial markets, embedded chips, anyplace online!)

Wireless Voice and Data Communication Technologies

• Data Networking (LANs): WiFi - IEEE Standards 802.11 • Cellular Telephone Networks • Long-range: Microwaves, Satellite • Short-range: Bluetooth, RFID

Packet Switching Operation

• Data is broken into packets, each of which can be routed separately • Advantages: better line efficiency, signals can always be routed, prioritization option • Disadvantages: transmission delay in nodes, variable delays can cause jitter, extra overhead for packet addresses

Transmission challenges of using wireless communication

• Decreasing signal strength: radio signal attenuates as it propagates through matter (path loss) • Interference from other sources: unregulated wireless network frequencies (e.g., 2.4 GHz) shared by other devices (e.g., phone) and general noise sources • Multi-path propagation: radio signal reflects off objects ground, arriving at destination at slightly different times (signal echoes) .... Makes communication across (even a point to point) wireless link much more "difficult" (unreliable)

Hosting Your AC Website

• Detailed instructions are included in guidelines to configuring and hosting your webpage on the UofA's U-System Server • Conceptually simple - uploading (copying) your website you developed on your computer to your personal UofA website, much like the extract-transform-load (ETL) process used in our prior assignments

Packet-Switching Networks

• Developed in 1970s for long-distance data transmission due to circuit switching limitations - In user/host data connection the line is often idle, so circuit-switching is inefficient - Circuit-switching requires both devices to transmit and receive at the same data rate, limiting interconnection options

Connection Options

• Dial-up service (voice-grade circuits) - aka - POTS (or plain old telephone service) - basic voice-grade, analog telephone service • Asymmetric Digital Subscriber Line (ADSL): - transmission speeds ranging (Kbps to Mbps) • Cable Modems: - data networks over cable TV systems

Transformation Technologies

• Disruption - New business models will disrupt traditional ways of working and enable the development of new products and services. • Pace of Change - The COVID-19 pandemic has fast-tracked the transformation and innovation. • Convergence of Advanced Technologies - The combination of technologies will not only foster growth and economic development but also disrupt of existing business models and create entirely new business categories. • Implications for Industry, Society, and the Law - Innovative technologies also create unique business, legal, and regulatory challenges. While Breakthrough developments in technology are helping to grow our economy as they reshape society and the environment.

Step 3: Download the ACHosting website zip file

• Download the "F22_ACHosting-index.zip" file and save it to your personal computer • Extract the zip file to a new folder - F22_ACHosting-index.html - website file

Healthtech & Medtech Risk Factors

• Information Blocking to Health Data • Litigation Risks Related to Algorithms' Ability to Provide Medical 'Advice' • Regulatory Review of Access to EMRs and Discriminatory Use of Data

Enigma's Problems

• Each day, a new set of initial settings were used... - ...and these were stored in a book that was stolen. • Each network had a unique setup for the machine... - ...which was also stolen. • For each message, a random set of three characters would be used to decipher the text... - ...but people were lazy and used the same letters and also repeated them at the beginning of the message

Navajo Code Talkers: Using a Unique Carrier Frequency

• Easily intercepted (radio signals) • Syntax, tonal qualities, dialects make it unintelligible to anyone without extensive exposure and training. • No alphabet or symbols • Spoken only on the Navajo lands of the American Southwest. • Less than 30 non-Navajos, none of them Japanese, could understand the language at the outbreak of World War II.

Greentech Impact

• Economic - Electric Generation and Storage • Social - Increasing access to affordable and reliable renewable electricity, even in remote locations - Lower-impact, less-polluting technologies can reduce social, economic, and environmental issues that have burdened certain communities • Policy - more than 100 countries have committed to net-zero emissions by 2050 - established greenhouse gas reduction targets, including many carbon neutrality

Healthtech & Medtech Impact

• Economic - Leaner, more efficient organizations • Social - Simplify healthcare administration and free up resources for frontline care • Environmental - Medical waste management (single use, biodegradable) • Policy - Improved patient care and reduced healthcare spending through value-based care

Impact of Disposal Facts

• Electronic equipment contains materials such as lead, mercury, and other toxic materials • On average, about 460,000 PCs are discarded every day! - Only about 25% of these are recycled

Seven Key Skills for Success

• Emotional intelligence • Empathy (Diversity and Inclusion) • Communicating with Humans • Critical Thinking • Creativity • Manual Input • Dexterity • Imagination and Vision

Security through Cryptography

• Encoding Information Digitally • Security Objective: CIA-A • Symmetric Cipher (Private Key) • Asymmetric Ciphers (Public/Private Key) • Hybrid (Symmetric and Asymmetric Pair)

Circuit Switching: Disadvantages

• Inefficient - the equipment may be unused for a lot of the call; if no data is being sent, the dedicated line still remains open. • It takes a relatively long time to set up the circuit. • During a crisis or disaster, the network may become unstable or unavailable. • It was primarily developed for voice traffic rather than data traffic.

Excel Pivot Tables

• Excel tool for managing a data cube • Transform large amounts of data from a table or database into an organized summary report • Ability to rotate and reorganize the row and column headings from your original database into this new table • Ability to select subsets of data (filtering) • Pivot tables allow you to quickly summarize and analyze large amounts of data in lists and tables by dragging and dropping fields to different rows, columns, or summary positions. • Pivot tables use but are independent of the original data layout in your spreadsheet • A pivot table can sort, count, total or give the average of the data as well as other functions • Pivot tables do not require you to write formulas

Pivot Table Terminology

• Fields are categories of data table • Row / Column Fields select values to display • Value Field selects the comparative value • Report Field defines groups of the data in the table • Grand Totals and Subtotals are sum calculations that appear at the end of relative rows or columns • Field Settings specify calculations for totals • Items are the values within a field

Network Security Filtering and Authentication

• Firewalls (Access Control Lists) • Tunneling Applications - Virtual Private Networks (VPN) - Secure Socket Layer (SSL)

Access Control Lists (ACLs)

• Firewalls are tools implemented to prevent unauthorized users from gaining access to your private network. • Firewalls can use a lot of various technologies to restrict information flow; the primary method is known as an access control list (ACL). • ACLs typically reside on routers to determine which devices are allowed to access them based on the requesting device's Internet Protocol (IP) address. *Visual on Class 39 TO Slides pg. 16

Excel Pivot Table Demonstration

• Follow along with Excel file (in Class 37): "FIP-Class_37 Pivot Table Example.xlsx" • Demonstration Outline - Creating a Pivot Table - Defining Pivot Fields - Defining Summation Values - Manipulating a Pivot Table • Projections and Hierarchy - GDPR Purpose Limitation (Scope Creep)

Satellite Transmission

• Geostationary Orbit (GEO) -GlobalSat Data Networking • Middle Earth Orbit (MEO) -Global Positioning System • Low Earth Orbit (LEO) - Irridum Satellite Telephones *Visual on Class 38 TO Slides pg. 13

Greentech Technologies

• Greentech is an umbrella term that covers a broad array of technologies associated with improving: - environmental sustainability and - energy and other resource efficiencies • Expectations for greentech are rising as governments and consumers put increased emphasis on environmental sustainability, in turn exerting increasing pressure on businesses across the economy. • Greentech is related to the term Cleantech, which describes technologies that are intended to: - reduce greenhouse gas (GHG) emissions or - mitigate the impacts of climate change.

Ethical Dimension of Green Computing

• Guiding principles of social responsibility: - Labor: Upholding the human rights of workers - Health and safety: Providing a safe and healthy work environment - Environment: Minimizing adverse effects - Management system: Ensuring compliance

Local Equipment

• Home - Modem/Routers - Wireless • Office - Ethernet / Wireless - DNS/Email/Security User's Comm. Equip. -> Home / Corporation, Ethernet, LAN, User Services (DNS, Email, etc.), Security, Modem / Custom Card <- User's Location / "Local Loop Carrier"

Retail & E-Commerce Projections

• Impact of COVID-19 on Retail Spaces - 20% to 30% of the pandemic-related digital shift is expected to be permanent - 80,000 retail locations (9%) will close in the next five years - Transition to immersive spaces for consumers to experience brands or - Realigned as centers to provide local support for goods and services.

Circuit Switching

• In modern circuit-switched networks, electronic signals pass through several switches before a connection is established. • There are three phases in circuit switching: - Establish, Transfer Information, and Disconnect • During a call no other network traffic can use those switches, and resources remain dedicated to the circuit during the entire data transfer and the entire message follows the same path. • Circuit switching can be analog or digital. • Multiple Circuits are often sent over the same wire by using different frequency bands for each circuit

Other Connection Options

• Integrated Services Digital Network (ISDN): - first technology developed using a DSL protocol; offers bandwidths up to 256 Kbps - Commonly used internationally • Dedicated T1, T3, SONET, or ATM connections: - often used by larger organizations; much faster and more expensive than consumer oriented POTS, ADSL or ISDN connections.

Enigma

• Invented commercially, 1923 • German Navy, Army, Air Force • About 50,000 in use (many were captured by Allies) • Modified throughout WWII, Germans believed perfectly secure • Kahn's Codebreakers (1967) didn't know it was broken • Turing's 1940 Treatise on Enigma declassified in 1996 - Enigma machine at Bletchley Park

Challenges in the Future of IoTs

• IoT will inherit the drawbacks of the current internet on an larger, but more invisible scale - Privacy - data management will be a huge issue - Identity - Online Fragmentation of Identity - Impersonalization - Becoming a unique IP address - Decision making - delegation of freedom of choice to things and machines

Worked okay for 44BCE, but...

• Language is not random! • Random strings: the probability of two letters in the two messages matching is 1/26 (number of letters in alphabet) • Same-encrypted strings: the output letters will match when the input letters match - This happens much more frequently because some letters (e.g., "e" is ~13% of all letters) are more common

Local Loop / ISP

• Local Loop - POTS/DSL/Cable - Satellite/PLC/WiMax • ISPs - POPs - DNS/Email/Services "Local Loop Carrier" -> POTS, DSL, & Leased Lines / Cable / Satellite / Electric Power Lines / Wireless -> ISP's Point of Presence -> User Devices

Advantages of Cloud Computing

• Lower Costs • Improved Performance • Reduced Software Costs • Instant Software Updates • Improved document format compatibility • Unlimited storage capacity • Increased data reliability • Easier group collaboration • Device independence

Other Opportunities to Get Involved and Learn More!

• MISA - Management Information Systems Association - U/G Student Club - https://uofamisa.org/ • Zipperman Scholars Program • Advanced Zipperman Associates Program • American Indigenous Business Leaders

How would you describe an Information Systems professional?

• Management Information Systems is effective business - people, process and technology. - MIS Professionals develop solutions using computer technology, quantitative techniques, and administrative skills to the information processing requirements of organizations. • Operations and Supply Chain Management improves the operational quality. - OSCM professionals manage quality and improve the efficiency, effectiveness, and consistency of business processes.

What are some of the jobs that an MIS/OSCM might be hired to do?

• Managerial - Consulting / Implementation - Financial auditing - Project/Product Management - Business analyst • Operational (OSCM) - Logistics / Distribution - Inventory Management - Product Life Cycle Planning - Production Planning / Forecasting • Technical - E-commerce development - Web site design management - Decision support systems - Database management

End-user Device

• Multi-Media - Video - Audio • Encryption • Productivity User PC: Multi-media displays including video, MIDI, microphone, encryption, speaker/headset

IT Delivering Value for Business

• Network - Edge and 5G • Security and Storage - Cloud and Identity • Workplace - Augmented Reality and Desktop as a Service • Infrastructure - IOT, Data Science, Machine Learning, Business Analytics • IT Automation - AI and Virtual Support Agents

UA is Nationally Recognized for Sustainability

• One of only 40 in the U.S. to earn Gold STARS rating • UA-wide assessment - academics & research - operations - administration, planning and engagement

SERVER WITHOUT VIRTUALIZATION

• Only one OS can run at a time within a server. • Under utilization of resources. • Inflexible and costly infrastructure. • Hardware changes require manual effort and access to the physical server. *Visual on Class 42 In-Person Slides pg. 23

Telegraphs: Digitally-encoding messages

• Only upper-case alphabetic characters, digits, and a few "special characters" (periods, parentheses, dollar signs, arithmetic operators) were supplied. Therefore, 10 digits, 26 letters, (less than) 20 "special" character symbols → (less than) 56 code patterns were required. • Used by IBM and Western Union (the telegraph company), a 6-bit (26 = 64 unique values) encoding systems permits 64 symbols to be encoded.

Step 6: Complete the form on your hosted webpage

• Open a web browser (FireFox or Chrome recommended) and navigate to your web page in the U-System server • The URL for your U-System webpage will be: http://www.u.arizona.edu/~ • As a reminder, your UANetID is part of your UA email address, and not your numeric StudentID (12345678), for example: email: [email protected] UANetID: wtn u.arizona.edu website URL: http://www.u.arizona.edu/~wtn

Check if your account is setup

• Open a web browser (FireFox or Chrome recommended) and navigate to your web page in the U-System server • The URL for your U-System webpage will be: http://www.u.arizona.edu/~ - e.g., http://www.u.arizona.edu/~wtn • You should see "Welcome to my homepage"

Brief History and Timeline of Industrial Revolutions

• Over the years there have been distinct transitional changes that have caused shifts in the speed, quality and organization of production, • Each transition had its unique contribution to the contemporary world we live in today, • These transitions were driven by the industrial revolutions, signaled by a growth rate increase in industrial production

Physical Network Topologies

• Physical network topology - describes the physical layout of nodes on a network • Four fundamental "shapes" - Bus, Star, Ring, Mesh - Topology balances cost, performance and reliability • Topology integral to type of network, cabling infrastructure, and transmission media used

IT Breach at Target via IOT Network

• Point-of-Sale systems breached via Stolen Credentials (Identity) obtained from a phishing attach of a trusted HVAC (Heating, Ventilation, and Air Conditioning) Vendor • 40 Million Credit And Debit Cards Stolen • PII (Personally Identifiable Information) Stolen From 70 Million Customers - $250 Million Remediation Costs • $18.5 million in lawsuit settlement spanning 47 states • Reputation Damage: - 46% drop in year-over-year profit ($500 Million) - 5.3% drop in year-over-year revenue - 2.5% drop in stock price • Both CEO (35 year veteran at Target) and CIO Fired

Personal Security Applications

• Pretty Good Privacy (PGP) - Email encryption • Remote Access Services - Remote Desktop Protocol • Secure messaging - Telegram vs. Signal

Digital Transmission: Advantages

• Produces fewer errors - Easier to detect and correct errors, since transmitted data is binary (1s and 0s, only two distinct values)) • Permits higher maximum transmission rates - e.g., Optical fiber designed for digital transmission • More efficient - Possible to send more data through a given circuit • More secure - Easier to encrypt using mathematical data encryption algorithms • Simpler to integrate voice, video and data - Easier to combine them on the same circuit, since signals made up of digital data

Greentech Risk Factors

• Product Liability Litigation • Cybersecurity Risks from Digitization • Increased Regulation and Enforcement • Trade Barriers in the Supply Chain

WinSCP Setup Message

• Recall VPN Authentication / Tunneling - Establishing a trusted tunnel (end point) - First time you use WinSCP, you are asked to accept the credentials of the server

Remote Access Services

• Remote Access Services (RAS) is not a protocol but refers to the combination of hardware and software required to make a remote-access connection. • Remote Desktop Protocol (RDP) allows users to connect to a computer running Microsoft's Terminal Services. After establishing a connection, the user sees a terminal window that's basically a preconfigured window that looks like a Windows or other operating system's desktop. *Visual on Class 39 TO Slides pg. 19

2 nd Order Opportunities for Substitution

• Remote Work / Collaboration • Virtualization • Cloud-based Applications

Task 1 - Hosting your website

• Request an account for your personal website on u.Arizona.edu website server • Install WinSCP, CyberDuck, or use VCAT • Download the F22_ACHosting-index website file from D2L to your computer (or VCAT) • Upload website to u.Arizona.edu with the filename index.html into the public_html directory • Open website on u.Arizona.edu in a browser and complete the form • Cut-and-paste the "Success" confirmation message into your report

Disadvantages of Cloud Computing

• Requires a constant Internet connection • Does not work well with low-speed internet • Features might be limited • Can be slow • Stored data might not be secure • Stored data can be lost

Healthtech & Medtech Innovation

• Research and Development - Discovery (AI, Machine Learning) and Optimization (Process) • Prevention - Fitness and Sleep Tracking • Screening and Diagnosis - Genomics and omics - Digital at-home diagnostics • Finance and Operations - Value-based care and benefits - Operational (backoffice) efficiency • Care Delivery - Clinical Decision Support and Electronic Medical Records - Telehealth and remote monitoring - Digital pharmacies and supply chain solutions

Retail & E-Commerce Technologies

• Retail technology supports or enables the selling of consumer products: - assist merchandising, - Support shopper marketing, - modernize operations and supply chain management, - facilitate order fulfillment (in stores, online, and across other retail channels), and - enable new retail formats and experiences

SSL - Secure Socket Layer

• Secure Sockets Layer (SSL). This security protocol was developed by Netscape to work with its browser. It's based on Rivest, Shamir, and Adleman (RSA) publickey encryption and used to enable secure Session-layer connections over the Internet between a web browser and a web server. *Visual on Class 39 TO Slides pg. 17

Wireless Network Technologies

• Short Range - Proximity and PANs • Medium Range - LANs • Long Range - MANs and WANs *Visual on Class 38 In-Person Slides pg. 5

The Future of Jobs: Selected Key Findings

• Skills gaps continue to be high as in-demand skills across jobs change in the next five years • The future of work has already arrived for a large majority of the online white-collar workforce • Despite the current economic downturn, the large majority of employers recognize the value of human capital investment • Automation is creating a 'double-disruption' scenario for workers as companies also expect to make changes to locations, their value chains, and use of contractors for specialized work

UA Green Fund

• Student-funded program offers $400,000 annually in grants for programs • Student Committee Solicits, Reviews, and Recommends Funding Proposals

Public Switched Telephone Network (PSTN)

• Subscribers • Subscriber Line ("local loop") - Connects subscriber to local telco exchange • Exchanges ("end office") - Telco switching centers - >19,000 in US • Trunks - Connections between exchanges - Carry multiple voice circuits using FDM or synchronous TDM - Managed by IXCs (inter-exchange carriers)

AC Hosting Assignment Tasks (40 points Maximum)

• Task 1 [Mandatory, 15 points] - Host ACHosting Website on u.Arizona.edu • Task 2 [Optional, 5 points] - Correctly name website in public_html directory • Task 3 [Optional, 5 points] - Correctly add company logo to website • Task 4 [Optional, 5 points] - Correctly Title directive to website • Task 5 [Optional, 10 points] - Correctly add icon to website

Cellular Communication Technology

• Technologies: - 1G Analog - low bandwidth - 2G Digital - Voice (ISDN model) - 3G Web/Video/IM/Voice - 4G WiFi/WiMax - 5G Improved Bandwith and Lower Latency • Business Opportunities - Lower power - Increased product usage - Higher density - Increased customers - Higher bandwidth - Increased product offerings

What is driving Cloud Computing

• Technology advances that support massive scalability & accessibility • Emergence of data intensive applications & new types of workloads →Large scale information processing, i.e. parallel computing using Hadoop →Web 2.0 rich media interactions →Light weight run anywhere web apps - Money! - Explosion of data intensive applications on the Internet - Fast growth of connected mobile devices - Growth of Web 2.0- enabled PCs, TVs, etc. - Advances in multi-core computer architecture - Skyrocketing costs of power, space, maintenance, etc.

Telecommunications Development Parallels Globalization

• Telegraph & Telephone (19th century) • Satellite communications (1960s) • Digital communications (1980s) • Internet age (1990s) • Wireless communications (2000s)

Follow the instructions exactly!

• The guidelines are long because we provided step-by-step instructions to address every issue • If you skip things because it is long (TL;DR), there is a good chance you will have issues, so please take time to read and follow the assignment guidelines (please, it really makes it easier) • Most emails we get are from people who did NOT read and/or follow the assignment guidelines • If something doesn't work, send an email to [email protected]. Most of the time, we will refer you to something in the guidelines

The Caesar Cipher

• The network: The Roman roads • The message: Orders to Roman troops • Also known as a Rotation Cipher, you simply replace a letter with another letter that is a certain number of letters away. • Technically, a Caesar Cipher is a Rotation Cipher where n = 3. • Popularly, you can find this cipher today as a simple "decoder ring."

Healthtech and Medtech Technologies

• The term "healthtech" refers to technology-enabled healthcare, or healthcare administration • The term "medtech" refers to medical technology improvements.

What will we do today?

• To complete the demo, you should: - create your u.Arizona.edu account - install WinSCP (or CyberDuck for MacOS users) - download the AC Hosting website template to your computer (or VCAT desktop) • If you have everything setup, you can follow along with the AC Hosting demo and be able to complete Tasks 1-2 as you view this podcast • All AC Hosting files are available in the Additional Credit section "AC Hosting" folder • Key steps (that we will do in class): - Download and unzip the ACHosting website from ACHosting folder on D2L - Rename the ACHosting website to complete the optional additional credit task 2 - Use WinSCP to upload index.html to the U.Arizona.edu server - Using the website, complete the AC Hosting form to record you completed the assignment

Step 5: Upload your "index.html" file to the U-System server

• To transfer the files to public_html on the u.Arizona.edu server using WinSCP: - double click on the "public_html" directory in WinSCP or Cyberduck to open the directory folder - "drag-and-drop" the file from a directory on your computer to the WinSCP or Cyberduck screen.

Tunneling

• Tunneling is a concept which means encapsulating one protocol within another to ensure that a transmission is secure. • For example: IP, known as a payload protocol, which can be encapsulated within a delivery protocol like Internet Protocol Security (IPSec). *Visual on Class 39 TO Slides pg. 16

Selecting a Route for a Packet

• Two metrics used by routing protocols are: • Hop count - # Sends • Bandwidth - Link Speed *Visual on Class 36 In-Person Slides pg. 21

Impact of Use Facts

• U.S. has more than 180 million computers in use, which consume nearly 58 billion kWh/year, or about 2% of the U.S. annual electricity use • PCs and monitors consume between 5 to 13% of all the electricity used • Idle Equipment can waste energy when left running in "active" mode

How Do We Uniquely Identify a Host?

• URL - Name - descriptive name - Well suited for humans ("name") - Example: www.eller.arizona.edu • IP Address - unique number - Well suited for machines ("Phone number") - Example: 134.126.20.50 • How to we "lookup" a URL's IP Address?

Packet Switching: Disadvantages

• Under heavy use there can be a delay (latency) • Data packets can get lost or become corrupted -Recovered, but slows transmission latency • Real-time video streams, such as streaming video, can lose frames when packets arrive out of sequence.

Sample Caesar Cipher

• Using the cipher wheel shown - Outside is "Plain Text" - Inside is "Cipher Text" • Plain Text: DATA - Cipher Text: wtmt • Cipher Text: dxr - Plain Text: KEY

Starting Salaries - Spring 2021

• Vary greatly by size and type of employer, location, and individual experience • UA graduate average offer: $65,460 - UA Professional Development Center • National average salary offer: $63,565

Dedicated Short Range Communications (DSRC)

• What it is - Low latency, Wi-Fi-like medium adapted for vehicle environment - Original FCC spectrum allocation in 1999 - FCC revised allocation in 2004 and 2006 • How the technology works - Data can be distributed in a broadcast mode (300m range - line of sight) - Direct peer-to-peer data exchanges as well - Communication links are engineered to work well while vehicles are in motion - Protection of personally-identifiable information

Step 2: Install WinSCP or Cyberduck on your computer (optional, you can use an OSCR lab to upload your files)

• https://softwarelicense.arizona.edu/ • Windows (WinSCP) or Mac (Cyberduck)

'It's Mostly a Behavioral Challenge!'

•Create a social contract: - Why this is important for all stakeholders - Lays out employee personal responsibilities - What behaviors are expected - Services the company will provide •Regularly communicate the goals and progress

Cloud Service Risks: Processing Integrity

▪ Adherence to change management procedures ▪ Incident management ▪ Failure of the provider to adhere to SLAs - Timeliness, Accuracy, Authorization, Completeness

Cloud Service Risks: Availability

▪ Cloud provider service interruptions ▪ Data location/availability for restoration ▪ Network/connectivity interruptions ▪ Failure of the provider to adhere to SLAs ▪ Service provider disaster recovery

Define the Cloud Ecosystem: Hybrid Cloud

▪ Combination of two or more distinct cloud infrastructures ▪ Combines characteristics of private, public & community clouds


संबंधित स्टडी सेट्स

Tableau Interview questions Part 2

View Set

AP Spanish Language and Culture- Comparaciones Culturales - ejemplo con la Republica Dominicana

View Set

General Phycology Chapter 4 Quiz

View Set

CH. 6 Work and Energy (Quantitative)

View Set

Roncagli exam 3 definition problems

View Set