assignment-1.txt
Class, This week, you have read about server virtualization and cloud computing in chapter 6 of your textbook. For your written assignment this week, complete a case study of the organization you work for (use a hypothetical or “other” organization if more applicable) that will address the following prompts: • Describe the organization’s environment, and evaluate its preparedness for virtualization. • Explain Microsoft (or another product) licensing for virtualized environments. • Recommend a configuration for shared storage; make sure to discuss the need for high availability and redundancy for virtualization for the organization. • Explain Windows Azure capabilities for virtual machines and managing a hybrid cloud, including Windows Azure’s Internet as a Service (IaaS) and storage capabilities Make a recommendation for cloud computer use in the organization, including a justification for your recommendations. Submit your midterm research paper as a single document. Your paper should meet the following requirements: • Be approximately four to six pages in length (1200-1800 words), not including the required cover page and reference page. • Follow APA6 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion. • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources. • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing. Regards,
assignment-2.txt
Class Discuss the benefits of virtualization software, as described in the text. Do you agree/disagree with these benefits, or can you think of additional benefits not already presented? Also discuss the security concerns highlighted by server sprawl and how you would propose to solve those in your (real or hypothetical) organization. Provide extensive additional information on the topic Explain, define, or analyze the topic in detail Share an applicable personal experience Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA) Make an argument concerning the topic. At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post. Regards, Write 1 Page , APA format
prof-reading/A Detailed Study of Azure Platform.pdf
2019 International Conference on Machine Learning, Big Data, Cloud and Parallel Computing (Com-IT-Con), India, 14th -16th Feb 2019
978-1-7281-0211-5/19/$31.00 2019 ©IEEE 129
A Detailed Study of Azure Platform & Its Cognitive Services
Ankita Verma, Dhutima Malla, Amrit Kaur Choudhary, Vasudha Arora Department of Computer Science & Engineering
Manav Rachna International Institute of Research and Studies
Faridabad, India ankitav061@gmail.com, dhutima.malla98@gmail.com, kauramrit1997@gmail.com,
vasudha.fet@mriu.edu.in
Abstract—Windows Azure is the Microsoft's conveyed registering contraption. In this paper, we will learn about the prelude to the Azure framework. The scattered enlisting stage outfits clients with assets and associations for an affiliation. We would in like way talk about azure associations: Register, structuring, Stockpile, Fabric Controller Mesh, Cellphone, Holder, Index, Problem-Solving, A.I + M.L, I.O.T, Combination, Identity, Safety, DevOps, Migrate and The executive's aids. Microsoft’s Azure is the standard circled figuring stage which draws in the client to send and work assets with speed of adaptability. Our basic work in this paper is to go up against recognizing confirmation and face attestation utilizing "Face API" where we will use our own one of a kind codes, for example, to perceive and see the powers of the all-inclusive community.
Keywords— Windows Azure, Resources, Services, Deployment, Cloud Computing, Face Detection, Face API
I. INTRODUCTION Conveyed registering is an unused headway. It is the update of parallel figuring, dispersed enrolling system arranging, and is the blend and advancement of Virtualization, Utility dealing with, Software-as-a-Service (SaaS), Infrastructure-as- a-Service (IaaS) and Platform-as-a-Service (PaaS). In the method for the most current couple of years, apportioned enlisting viewpoint has seen a to an incredible degree extraordinary pass closer to its social occasion and it has changed into a precedent in the quantifiable improvement district as it ensures fundamental cost decreases and new fitting undertaking reachable to its purchasers and providers.[10] Scattered enlisting is a creation manual for dessert on and continue programming and is being gotten by the business, for instance, Google, IBM, Microsoft, and Amazon. A couple of mannequin purposes and stages, for instance, the IBM ―Azure Cloud structure, the Google App Engine, the Amazon Cloud, and the Elastic Computing Platform. Dissipated making prepared is viewed as the running with an upgrade that will influence distinctive leveled affiliations and how they manage their IT establishments. The progress and organization that cloud connection and association models offer are a key territory of research. Appropriated processing uses Azure as a phase for its distinctive organizations, for instance, Analytics, AI, Machine Learning, IOT, Face API, etc. and engages customers to send and work resources with the speed of versatility.
Azure is a foundation for fleeing data in the cloud. Instead of giving programming that Microsoft customers can present and run themselves in solitude PCs. Nowadays, Azure is an association: Customers utilize it to sprint apps and stockpile facts & figures on web-accessible devices rued by Microsoft Corporation. Associations are being offered to the relationships, customers or both by these applications, Azure Platform is a web-based distributed technology. Extremely systematic, changeable and compatible capacity can be utilized to amass unused apps to remain constant for the cloud or revive live apps with cloud-based cutoff administrations. Azure is a Distributed framework that gives progress, for empowering the Microsoft’s Azure Platform. Azure proceeds running in Microsoft on machine server farms. The target of Windows to equip engineers with on-ask for figure & restrain arrange to have, scale, and regulate web or cloud applications. The arrange itself surrenders and keeps it exceptionally possess a duplicate of Windows. Designers based exclusively on making applications that proceed running on Windows. Windows backings a solid headway episode by compromising with its IDE. Windows is an open organize that underpins both Microsoft and non-Microsoft tongues and conditions. [2] Azure invites outcast disobedient and vernaculars, for an occasion, Obscure, python, ruby, and php. Azure gives a Windows-based figuring and constraint condition within the distributor. Escaping information within the distributor is a proper choice for some conditions. The differing bit of Azure collaborates to form this conceivable. Microsoft’s Azure Tables provide adaptable, accessible, and firmly collected as collecting tables. A clear interface to fixing the tables are granted by Microsoft’s Azure. The tables are versatile to many of the pieces of stuff and terabytes of realities may separate transversely named records adjacent metadata. Solid constrain and development of messages for an application and are the foremost for the most part seen clarification behind Web and Laborer portion correspondence are granted by Microsoft’s Azure [3]. In this paper, we are going conversation around the Azure Components, Cloud Benefit Suppliers, Cloud Architecture, Azure Cloud Storage Model and Demystifying the Use of Face API in Windows Azure. By overcoming with the ideas of Azure Cognitive Services in this paper, we will build up software in our next paper in which we will put together our model to identify n number of appearances precisely.
130
II. WINDOWS AZURE COMPONENTS [3]
i. Computer: Windows procedure can run a gathering of vocations. Whatever an application does, regardless, it needs to be done as no short of what one occupation. Azure at that factor typically runs a variety of examples of each movement, utilizing worked in load changing as per spread needs crosswise over them. ii. Storage: The 2nd stage in Azure is a limit. We have three journalists perfect here – Blobs, that take after records, Tables, which are entered and well-shaped limit, and lines, which let Web Parts and Specialist Parts, provide for one another. iii. Fabric Controller: The 3rd sort out in Azure is the connect controller or App connect. It handles articulations and association – between Microsoft Windows Azure applications, and in development from the servers. Ready to express that we got the opportunity to have that expansive SQL Server or Database structure and enabling access to an Azure app, & we will not permit customers of an app in our framework.
CLOUD ARCHITECTURE:
Dispersed considering can be separated along with two regions, the client and the distributor. By and huge, the client is associated with the distributor by the methodology for the net It is additionally productive for a relationship to own an individual conveyance where a client associates with an intranet. Regardless, the two conditions are dim other than the usage of an individual and unbolted framework or distribution. The customer sends asking the distributor and the distributor gives the association. Inside the distributor, a focal server oversees administering the composition and from
different perspectives fills in as the working redirection organize of the specific distribution orchestrate.
III.TOOLS AVAILABLE EVERY COMPANY BASED ON CLOUD:
Distributing merchants are passing on the plague of unused instruments to help adventure IT produce, buy, supervise, screen, change and track cloud organizations. These gadgets are proposed to help IT officials free up their budgetary plans and their staff so both can be used towards progressively key, a rule of business adventures. 1. Cloud ability: Cloud ability is a money related administration device for checking and dissecting all cloud costs over an association. 2. Cloudyn: These instruments are intended to help corporate IT from over-purchasing Amazon cloud assets. 3. AtomSphere: AtomSphere is a cloud-based programming Platform as a Service utilized by clients that need to incorporate their different cloud-based applications with one another and with on-commence applications. 4. Enstratius: Enstratius gives cross-stage cloud framework administration for open, private and crossover mists that can be firmly lined up with an endeavor’s administration and security prerequisites. 5. Cloud Hub: Conveyed as a bundled incorporation experience, Cloud Hub and Mule ESB are based on open source innovation to give brisk, dependable application joining without seller secure.
AZURE CLOUD STORAGE MODEL:
Azure ability "gives chose, monotonous limit inside the distributor". Microsoft will likely make amassing that is solid and secure, flexible and helpful. Azure ability awards us to keep facts for whenever assignment and to save any level of bits of awareness. [4] Data can be saved in Windows Azure in 4 unique ways i.e.: Queues, SQL Azure Database, Tables, Blobs. Blobs: These are handed-down for coordinated estimations and take after records on our troublesome drive. Tables: To draw in support to work with a fact in a much increasingly basic fine-grained method, Azure storing offers tables. A table has no described graph or perhaps, properties can have forms. Queues: This amassing is used to trade messages between squares of code.
Figure 1: Windows Azure components [1]
Fig 2. Cloud Architecture [10]
131
SQL Azure Database: We are capable make utilization of SQL Azure Databases when we require social storing and use the negotiate-SQL code we are starting at by and by have. SQL Azure offers a basic subset of SQL Server's
accommodation, which fuses counting, as an administered cloud advantage.
CLOUD DEPLOYMENT MODEL: Inside the distributing association show up, sorting out, orchestrate, storing, and programming foundation is given as associations that go up or down surprising upon the captivated. The distributing demonstrate has four guideline sending models which are:
i. Private Cloud: Private cloud is another term that a few dealers have begun late used to portray duties that emulate passed on enrolling on private structures. It is set up inside an alliance's inward parts wind datacenter. [12] For E.g. Eucalyptus Frameworks.
ii. Public Cloud: Open cloud depicts dissipated enlisting inside the customary standard sense, whereby resources are continuously provisioned on a fine-grained, self-advantage present over the Web, by construes of web applications/web relationship, from an off-site page removed provider who offers resources and bills on a fine-grained utility dealing with the introduction. [13] For E.g. Microsoft Azure & Google App Motor
iii. Crossover Cloud: Crossover cloud other than known as Crossbreed cloud could be an individual merchant identified with at scarcest one outside circulating affiliations, for the most part coordinated, provisioned as a specific unit, and included by a tied down a structure. [14] It gives virtual IT strategies through a blend of both open and private veils of mist.
CLOUD COMPUTING SERVICES:
Platform As A service: Platform as a service [4] (PaaS) is a sending & advancement condition inside the cloud that conveys straightforward cloud-based applications to complex, cloud-empowered applications. PaaS is intended to help the total web application lifecycle of the building, testing, conveying, overseeing, and refreshing. PaaS incorporates a total foundation of servers, stockpiles, organizing, and middleware improvement apparatuses like business knowledge administrations (BI), database administration frameworks, and so forth [4].
i. Software As A Service: Software as a service [4] (SaaS) allows clients to associate with and make use of cloud-based applications over the Internet. Basic models are email, calendaring and office instruments, (for example, Microsoft Office 365). SaaS gives a whole programming association which you buy on a compensation as-you-go premise from a cloud specialist co-op.
ii. Infrastructure As A Service: Infrastructure as a service [4] (IaaS), a moment figuring foundation, provisioned and oversaw over the Internet. Rapidly scale here and there with the request and pay simply for what you utilize. IaaS reasons you to preserve away from the fee and multifaceted nature of buying and dealing with your personal bodily servers and another data center framework [4].
iii. DEMYSTIFYING THE USE OF FACE API IN
WINDOWS AZURE:
The Face API Service, a cloud-based organization that gives the most dynamic face computations. It is a biometric programming application arranged to do especially perceiving or checking a man by differentiating and examining structures subject to the person's facial structures.
Fig3. Windows Azure Cloud Storage Model [3]
Fig 4. Cloud Deployment Model [4]
Fig 5. Microsoft Cloud Computing Architecture (Source
Microsoft) [4]
Fig 6. Face API in Azure [7]
132
FACE DETECTION: It perceives some places around one human faces in a photograph and get returned go up against rectangular shapes for where inside the photograph the appearances are, close-by defy characteristics which join M.L-ground needs for gesture highlights. The defy property features accessible are Age, Feeling, Sexual introduction, Posture, Grin and Facial Hair adjacent 27 markers for each stands up to inside the image. [7] The Face API sees up to 64 personal appearances with higher accuracy oppose an area in a picture. In like manner, the picture can be appeared by the record in bytes or huge URL. Face square shape (left, best, width, and stature) exhibiting the face district in the picture is returned adjacent each perceived face. On the other hand, defy area expels a movement of face-related properties, for instance, present, sex, age, head present, facial hair, and glasses. For Example:
Detection result [16]: JSON: [ { "faceId": "2090b697-46a0-497b-95d0-4a965f6dfffd", "Rectangleface": { "top": 184, "left": 358, "width": 157, "height": 157 }, "Attributeface": { "hair": { "bald": 0.06, "invisible": false, "hairColor": [ { "color": "brown", "confidence": 1.0 }, { "color": "black", "confidence": 0.86 }, { "color": "red", "confidence": 0.51 }, { "color": "other", "confidence": 0.07 }, { "color": "gray", "confidence": 0.05 }, {
"color": "blond", "confidence": 0.04 } ] }, "smile": 1.0, "headPose": { "yaw": 3.2, "pitch": 0.0, "roll": 12.1, }, "age": 28.0, "gender": “female”, "facialHair": { "moustache": 0.0, "beard": 0.0, "sideburns": 0.0 }, "glasses": "No Glasses", "makeup": { "eyeMakeup": true, "lipMakeup": true }, "emotion": { "anger": 0.0, "contempt": 0.0, "disgust": 0.0, "fear": 0.0, "happiness": 1.0, "neutral": 0.0, "sadness": 0.0, "surprise": 0.0 }, "occlusion": { "foreheadOccluded": false, "eyeOccluded": false, "mouthOccluded": false }, "accessories": [], "blur": { "blurLevel": "low", "value": 0.08 }, "exposure": { "exposureLevel": "goodExposure", "value": 0.57 }, "noise": { "noiseLevel": "low", "value": 0.29 } }, "faceLandmarks": { "pupilLeft": { "x": 405.7, "y": 220.9 }, "pupilRight": { "x": 477.4, "y": 237.3 }, "noseTip": { "x": 439.9, "y": 271.3 }, "mouthLeft": { "x": 394.1, "y": 287.8 }, "mouthRight": { "x": 463.9, "y": 304.6
Fig 7. Example of Face Detection [16]
133
}, "eyebrowLeftOuter": { "x": 378.2, "y": 198.9 }, "eyebrowLeftInner": { "x": 432.8, "y": 210.6 }, "eyeLeftOuter": { "x": 392.7, "y": 219.4 }, "eyeLeftTop": { "x": 408.0, "y": 217.8 }, "eyeLeftBottom": { "x": 404.0, "y": 227.2 }, "eyeLeftInner": { "x": 418.9, "y": 226.2 }, "eyebrowRightInner": { "x": 467.8, "y": 219.6 }, "eyebrowRightOuter": { "x": 509.9, "y": 227.0 }, "eyeRightInner": { "x": 467.0, "y": 237.6 }, "eyeRightTop": { "x": 483.1, "y": 234.0 }, "eyeRightBottom": { "x": 479.8, "y": 245.1 }, "noseLeftAlarOutTip": { "x": 413.7, "y": 265.0 }, "noseRightAlarOutTip": { "x": 465.0, "y": 277.2 }, "upperLipTop": { "x": 433.8, "y": 291.3 }, "upperLipBottom": { "x": 432.0, "y": 297.4 }, "underLipTop": { "x": 426.4, "y": 309.5 }, "underLipBottom": { "x": 423.2, "y": 321.7 } } } ]
FACE/EMOTION RECOGNITION:
Face affirmation is extensively used in various circumstances including security, regular UI, picture content examination and organization, convenient applications, and apply self-rule. Four face affirmation limits are given: defy affirmation, finding equivalent appearances, stand up to the social event, and individual recognizing proof [7] . The Face API as of now additionally organizes feeling affirmation, reestablishing the sureness over a relationship of affections for each face in the image, for instance, shock, disdain, irritate, fear, euphoria, neutral, pain and surprise. These feelings are grasped to be differently and all around talked with exact outward appearances. For Example:
Detection result [16]: 1 face detected JSON: [ {
"faceRectangle": { "top": 56, "left": 123, "width": 59, "height": 59 }, "scores": { "anger": 6.932031E-08, "contempt": 1.34474765E-09, "disgust": 9.843048E-08, "fear": 1.65876812E-10, "happiness": 0.9999997, "neutral": 4.23310347E-08, "sadness": 2.851677E-10, "surprise": 1.01985542E-07 } } ]
1. Face Verification: Face API affirmation plays out a check against two distinguished appearances or approval from one perceived face to one individual question [7].
2. Finding Similar Faces: Given a goal recognized face and a game plan of cheerful appearances to look for with, the organization finds a little course of action of countenances that look most like the objective face [7].
3. Face Grouping: Given one course of action of cloud faces, defy gathering API normally parcels them into a couple of social affairs considering closeness. [7] Each get-together is a mixed-up suitable subset of the main darken confront set and contains relative faces. Also, all
Fig 8. Example of Face Recognition [16]
134
the appearances in a comparable get-together can be considered to have a place with a comparative individual inquiry [7].
4. Face Identification: Face API can be used to perceive people in perspective of a recognized face and a people database (portrayed as a Large Person Group/Person Group). Make this database early, which can be adjusted after [7].
IV. CONCLUSION Scattered figuring a massive change to web age; it felt the invigorating impact from the upstream of the industry to clients. Windows Azure gives an Aperture figuring and control condition inside the cloud. In this paper, we find that how they go up against request/perceiving insistence get into the universe of current advancement. By and large the upsides of the usage of going up against API inside the Microsoft Azure that how it makes things present day. Microsoft's Windows Azure make with its foundation and stages affiliations will help & steer the improvement culture move from on-begin application makers to cloud engineers. Azure gives an orchestrating and constraint condition inside the distributor. SQL Azure gives a social DBMS inside the cloud, adjoining sorting out and information synchronization. The Windows Azure programming show can be obliging for anyone who should make less unpredictable to immediate, increasingly accessible, and progressively flexible applications. As Microsoft Azure gives a phase to develop any of its organizations. Henceforth in the wake of inquisitive about on Azure, we will furthermore get significant into the emotional organizations i.e. Face Application Program Interface (API) Service. It is furthermore isolated into Face Detection with properties, Face Recognition and Face Storage. Face Detection attributes are Emotion Recognition, Face Identification, Similar Face Search and Face Grouping. We are intending to use these Face API's to develop an application in which the participation of the whole class can be taken by just clicking a social event picture.
ACKNOWLEGEMENT
We might want to truly convey our caring gratefulness to Dr. Prateek Jain, Accendere Information Administration organizations for having any kind of effect and guiding us in this paper course of action.
REFERENCES
[1] “Windows Azure Platform: An Era for Cloud Computing”,
Madhurima et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 2 (2), 2011, 621-623.
[2] Dong Xu, “Cloud Computing: An Emerging Technology”, International Conference on Computer Design and Applications (ICCDA 2010), Volume-1, Pgs (100-104).
[3] “Cloud Computing: Windows Azure Platform”, Volume 3, No. 1, January 2012, Journal of Global Research in Computer Science.
[4] “Windows Azure Paas Cloud: An Overview”, International Journal of Computer Application Issue2, Volume 1 (February 2012), Issn: 2250-1797.
[5] Rimal, B., Choi, E., and Lumb, I. (2009). A Taxonomy and Survey of Cloud Computing Systems. In Fifth International Joint Conference on INC, IMS and IDC, pages 44–51. IEEE.
[6] [6] Sujay. R, “Hybrid Cloud: A New Era”, International Journal of Computer Science and Technology, Vol. 2, Issue 2, June 2011.
[7] Windows Azure platform: http://www.microsoft.com/windowsazure/
[8] David Chappell, A white paper on “Introducing The Azure Services Platform: An Early Look at Windows Azure, .Net Services, Sql Services, And Live Services”, Oct 2008.
[9] Moother, J.; Bhatt, V. (2009): A cloud computing solution for universities: Virtual computing lab: case study of North Carolina state university, www.google search engine.
[10] “Cloud Computing: Overview & Current Research Challenges”, IOSR Journal of Computer Engineering (IOSR-JCE), ISSN: 2278- 0661, ISBN: 2278-8727Volume 8, Issue 1 (Nov. - Dec. 2012), PP 14-22,
[11] S. Zhang, S. F. Zhang, X. B. Chen, and X. Z. Huo, “The Comparison between Cloud Computing and Grid Computing,” 2010 International Conference on Computer Application and System Modelling (ICCASM), pp. V11-72 - V11-75, DOI= 22-24 Oct. 2010.
[12] B. R. Kandukuri, R. Paturi V, A. Rakshit, ―Cloud Security Issuesǁ, In Proceedings of IEEE International Conference on Services Computing, pp. 517-520, 2009.
[13] A Platform Computing Whitepaper. ―Enterprise Cloud Computing: Transforming IT.ǁ Platform Computing, pp6, 2010.
[14] Global Netoptex Incorporated. ―Demystifying the cloud. Important opportunities, crucial choices.ǁ pp4-14. Available: http://www.gni.com [Dec. 13, 2009].
[15] Vaquero, L.M.; Radero-Merino, L.; Linder, M. (2009): A break in clouds towards a cloud definition, SIGCOMM Comput. Communication Rev. 39, pp.50-55.
[16] Face Application Programming Interface: https://goo.gl/images/HDtBHJ/smiling_human_faces_image
[17] SQL Azure: http://www.microsoft.com/en- us/sqlazure/default.aspx
[18] T. Zou, R. Bras, M. Salles, A. Demers and J. Gehrke, “ClouDiA: a deployment advisor for public clouds”, Proceedings of the 39th International Conference on, Very Large Data Bases, pp. 121-132, 2012.
[19] P. Kalagiakos “Cloud Computing Learning,” 2011 5th International Conference on Application of Information and Communication Technologies (AICT), Baku pp. 1 - 4, DOI=12-14 Oct. 2011.
[20] B. Grobauer, T. Walloschek, and E. Stöcker, “Understanding Cloud Computing Vulnerabilities,” 2011 IEEE Security and Privacy, pp.50-57, DOI= March/April 2011.
prof-reading/ch06(1).pptx
Managing and Using Information Systems: A Strategic Approach – Sixth Edition
Keri Pearlson, Carol Saunders, and Dennis Galletta
© Copyright 2016 John Wiley & Sons, Inc.
Chapter 6 Architecture and Infrastructure
2
Mohawk Paper
What did Mohawk paper see as an opportunity?
What did they do?
What was the result?
© 2016 John Wiley & Sons, Inc.
3
Opportunity: Cloud, SOA, XML technology allowing them to make service the primary focus, collaborate with network of partners, incorporate flexibility into the process. Can shift quickly from outsourced to insourced for projects.
Results: 5 times the number of products sold to customers compared to before. Tripled earnings. More customers than before: now 100, previously 10-15 distributors. Automated transactions: saving $1 to $2 million
3
From Vision to Implementation
Architecture translates strategy into infrastructure
Home architect develops a blueprint of a proposed house—based on customer
Business architect develops a blueprint of a company’s proposed systems—based on strategy
This “blueprint” is used for translating business strategy into a plan for IS.
The IT infrastructure is everything that supports the flow and processing of information (hardware, software, data, and networks).
© 2016 John Wiley & Sons, Inc.
4
4
From abstract to concrete – building vs. IT
5
The Manager’s Role
Must understand what to expect from IT architecture and infrastructure.
Must clearly communicate business vision.
May need to modify the plans if IT cannot realistically support them.
Manager MUST be involved in the decision making process.
© 2016 John Wiley & Sons, Inc.
6
6
From Strategy to Architecture
Manager starts out with a strategy.
Strategy is used to develop more specific goals
Business requirements must be determined for each goal so the architect knows what IS must accomplish.
© 2016 John Wiley & Sons, Inc.
7
7
Example
Strategy: Be a customer-oriented company
Goal: 30-day money back guarantee
Business Requirement: ability to track purchases
Business Requirement: ability to track problems
Goal: Answer email questions within 6 hours
Business Requirement: Ability to handle the volume
© 2016 John Wiley & Sons, Inc.
8
From Business Requirements to Architecture
© 2016 John Wiley & Sons, Inc.
9
9
The Example Continues
Business Requirement: Ability to track purchases
Architectural Requirement:
Database that can handle all details of more than a 30-day history
© 2016 John Wiley & Sons, Inc.
10
From Architecture to Infrastructure
Adds more detail to the architectural plan.
actual hardware, software, data, and networking
Components need coherent combination
© 2016 John Wiley & Sons, Inc.
11
11
From Architecture to Infrastructure
© 2016 John Wiley & Sons, Inc.
12
12
The Example Continues
Architectural Requirement: Database that can handle all details of more than a 30-day history
Functional Specification: be able to hold 150,000 customer records, 30 fields; be able to insert 200 records per hour
Hardware specification: 3 gigaherz Core 2 Duo Server
Hardware specification: half terabyte RAID level 3 hard drive array
Software specification: Apache operating system
Software specification: My SQL database
Data protocol: IP (internet protocol)
© 2016 John Wiley & Sons, Inc.
13
A Framework for the Translation
Considerations for moving from strategy to architecture to infrastructure:
Hardware – physical components
Software – programs
Network – software and hardware
Data – utmost concern: data quantity & format
What-who-where is a useful framework
© 2016 John Wiley & Sons, Inc.
14
14
Component What Who Where
Hardware What hardware does the organization have? Who manages it? Who uses it? Who owns it? Where is it located? Where is it used?
Software What software does the organization have? Who manages it? Who uses it? Who owns it? Where is it located? Where is it used?
Network What networking does the organization have? Who manages it? Who uses it? Who owns it? Where is it located? Where is it used?
Data What data does the organization have? Who manages it? Who uses it? Who owns it? Where is it located? Where is it used?
Information systems analysis framework.
15
Figure 6.3 Infrastructure and architecture analysis framework with sample questions.
16
Common IT Architecture Configurations
Centralized architecture – All purchases, support, and management from data center
Decentralized architecture – uses multiple servers perhaps in different locations
Service-Oriented architecture – uses small chunks of functionality to build applications quickly.
Example: e-commerce shopping cart
Software-Defined architecture – instantly reconfigures under load or surplus
© 2016 John Wiley & Sons, Inc.
17
Software-Defined Architecture
Birdbath example: Thanks to the Oprah Winfrey show, sales went from 10 per month to 80,000.
Increased sales seen as an attack with static system
Adaptive system warns other parts of sales fluctuations, preventing lost sales
Famous Coffee Shop example:
WiFi shares lines with production systems; problems in one can be shunted to another
Also, coffee bean automatic reordering; spot market purchasing
High potential for decreasing costs
© 2016 John Wiley & Sons, Inc.
18
New Technologies
Peer to peer architecture: Allows networked computers to share resources without a central server
Wireless (mobile) infrastructure: allows communication without laying wires
Web-based architecture: places information on web servers connected to the Internet
Cloud-based architecture: places both data and processing methods on servers on the Internet, accessible anywhere
Capacity-on-demand: enables firms to make available more processing capacity or storage when needed
© 2016 John Wiley & Sons, Inc.
19
Architectural Principles
Fundamental beliefs about how the architecture should function
© 2016 John Wiley & Sons, Inc.
20
Enterprise Architecture (EA)
The “blueprint” for all IS and interrelationships in the firm
Four key elements:
Core business processes
Shared data
Linking and automation technologies
Customer groups
One example is TOGAF (The Open Group Architecture Foundation)
Methodology and set of resources for developing an EA
Specifications are public
Business and IT leaders develop EA together
© 2016 John Wiley & Sons, Inc.
21
Virtualization and Cloud Computing
Cloud computing refers to:
Resources that are available “on the Internet”
No software for the organization to develop or install (only web browser)
No data for the organization to store (it stays somewhere in the Internet “cloud”)
The provider keeps and safeguards programs and data
This is “infrastructure as a service” (IaaS)
Also available is SaaS (Software as a service)
And there is also PaaS (Platform as a service)
Utility Computing: Pay only for what you use (like power, lights)
Source: Computerworld Aug 4, 2008
© 2016 John Wiley & Sons, Inc.
22
Examples of Systems Provided in the “Cloud?”
Just some examples
Word processing; spreadsheeting; email (Google Docs: $50 per user annually)
Buying/selling Financial services (Salesforce.com)
Email (Gmail, Hotmail)
Social networking (Facebook)
Business networking (LinkedIn)
Music (iTunes)
Storage (Amazon’s Simple Storage Service—S3)
A server (Amazon’s Elastic Compute Cloud—EC2)
Source: Computerworld Aug 4, 2008 and CRN website
© 2016 John Wiley & Sons, Inc.
23
Assessing Strategic Timeframe
Varies from industry to industry
Level of commitment to fixed resources
Maturity of the industry
Cyclicality
Barriers to entry
Also varies from firm to firm
Management’s reliance on IT
Rate of advances affecting the IT management counts on
© 2016 John Wiley & Sons, Inc.
24
Assessing Adaptability
Guidelines for planning adaptable IT architecture and infrastructure
Plan for applications and systems that are independent and loosely coupled
Set clear boundaries between infrastructure components
When designing a network architecture, provide access to all users when it makes sense to do so
© 2016 John Wiley & Sons, Inc.
25
Assessing Scalability
Scalability refers to how well a component can adapt to increased or decreased demand
Needs are determined by:
Projections of growth
How architecture must support growth
What happens if growth is much higher than projected
What happens if there is no growth
© 2016 John Wiley & Sons, Inc.
26
Other Assessments
Standardization – Common, shared standards are easy to plug in
Maintainability – Can the infrastructure be maintained?
Security – Decentralized architecture is more difficult to secure
© 2016 John Wiley & Sons, Inc.
27
Assessing Financial Issues
Quantify expected return on investment
Can be difficult to quantify
Steps
Quantify costs
Determine life cycles of components
Quantify benefits
Quantify risks
Consider ongoing dollar costs and benefits
© 2016 John Wiley & Sons, Inc.
28
28
Managing and Using Information Systems: A Strategic Approach – Sixth Edition
Keri Pearlson, Carol Saunders, and Dennis Galletta
© Copyright 2016 John Wiley & Sons, Inc.
AbstractConcrete
Owner’s
Vision
Architect’s
Plans
Builder’s
Implementation
StrategyArchitectureInfrastructure
Information
Technology
Building
Abstract
Concrete
Owner’s Vision
Architect’s Plans
Builder’s Implementation
Strategy
Architecture
Infrastructure
Information Technology
Building