Presentation is loading. Please wait.

Presentation is loading. Please wait.

MD703 Class 10 Agenda Chapter 3: Strategic Use of InfoTech Chapter 8: Operations Tech Talk: Groupware & Messaging Part 2 Case: Information Security.

Similar presentations


Presentation on theme: "MD703 Class 10 Agenda Chapter 3: Strategic Use of InfoTech Chapter 8: Operations Tech Talk: Groupware & Messaging Part 2 Case: Information Security."— Presentation transcript:

1 MD703 Class 10 Agenda Chapter 3: Strategic Use of InfoTech Chapter 8: Operations Tech Talk: Groupware & Messaging Part 2 Case: Information Security

2 Chapter 3: Review British Railways Example –Value from business process change GE Power systems Case –“Company-smart”, rapid app dev –Rapid Application Design Cisco Case, Dell Case –Supply chain mgmt Commoditizing IT –Impact on strategy

3 Chapter 8: Review Operations Issues: sustainable advantage Outsourcing Transaction Costing Information Security

4 Discussion Questions Which aspects of IT/IS are of strategic concern and which are not? What IT/IS factors weight a decision toward outsourcing? Is it commodity-status only?

5 Groupware & Messaging Email (Web) Shared Files Messaging IM

6 Email Basics SMTP –Sendmail program IMAP –Assumes internet access POP –Predated internet Roaming –Store and retrieve preferences

7 Email Architecture Servers –Manage mailboxes –Virus/spam filtering –Send/receive mail to mailboxes Clients –Retrieve from mailbox –Send via server

8 E-mail Mechanics ReceiveDeliver MailBoxes User IMAP POP Internet SMTP Directory (Client Prefs)

9 E-mail Directory Services Receive Deliver MailBoxes User IMAP/ POP Internet SMTP LDAP DB Access & Preferences

10 (Web) File/Document Sharing Architecture Access Control Versioning Clients Notifications Demonstration of “MyFiles”

11 Instant Messaging Clients use IP “channels” to send messages –“Chat room” is essentially a port –“Buddy list” has firewall aspects block/allow lists Packets are delivered directly to the client –No Email service between users AOL or MS act as registries –Track which ID’s are on which servers –ISP’s can monitor/log activity Discussion Question: Business Usage?

12 Messaging (1) Definition –Email for computers –Delivery of structured data to a process via a queuing mechanism Architecture –Queues Request/Response pairs –Manager –Clients

13 Messaging (2) Strengths –Asynchronous communication –Controls multi-server processes –Parallel processing –Reliability “Once and only once” delivery option “Publish and Subscribe” delivery Websphere MQ is most common –Evolved from mainframe “MQSeries” JMS (java messaging service) defines the standards for open systems

14 Messaging Source Server Target Server Message Queueing Server Q2Q1Q2Q3Q4 Queue Rules: Q1:… Q2:ssin Q2:tsout

15 Part 2 Case: Information Security Outsourcing network security management? Yes/No? Why/Why not? When/When not? Castles and Gates: where do we defend?

16 Information Security Case Discussion Why is the Domain Name Server outside of the Firewall? (ref pg 358) Open Source or Proprietary systems for Security? Select and defend.


Download ppt "MD703 Class 10 Agenda Chapter 3: Strategic Use of InfoTech Chapter 8: Operations Tech Talk: Groupware & Messaging Part 2 Case: Information Security."

Similar presentations


Ads by Google