lecture5-8

25
From Applegate, L.M., Austin, R.D., and Soule, D.L., Corporate Information Strategy and Management, 8 th edition, Burr Ridge, IL: McGraw-Hill/Irwin, 2009 Manajemen Teknologi Informasi Lecture 5 – 8

Upload: daniel-wong

Post on 01-Dec-2014

137 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Lecture5-8

From Applegate, L.M., Austin, R.D., and Soule, D.L., Corporate Information Strategy and Management, 8th edition, Burr Ridge, IL:

McGraw-Hill/Irwin, 2009

Manajemen Teknologi Informasi

Lecture 5 – 8

Page 2: Lecture5-8

From Applegate, L.M., Austin, R.D., and Soule, D.L., Corporate Information Strategy and Management, 8th edition, Burr Ridge, IL:

McGraw-Hill/Irwin, 2009

A Graphical Representation of Moore‘s Law

Page 3: Lecture5-8

From Applegate, L.M., Austin, R.D., and Soule, D.L., Corporate Information Strategy and Management, 8th edition, Burr Ridge, IL:

McGraw-Hill/Irwin, 2009

The Evolution

of Corporate

IT Infrastruct

ure

Page 4: Lecture5-8

From Applegate, L.M., Austin, R.D., and Soule, D.L., Corporate Information Strategy and Management, 8th edition, Burr Ridge, IL:

McGraw-Hill/Irwin, 2009

A Graphical Illustration of Metcalfe’s Law

Page 5: Lecture5-8

From Applegate, L.M., Austin, R.D., and Soule, D.L., Corporate Information Strategy and Management, 8th edition, Burr Ridge, IL:

McGraw-Hill/Irwin, 2009

The Bandwidth Explosion

Page 6: Lecture5-8

From Applegate, L.M., Austin, R.D., and Soule, D.L., Corporate Information Strategy and Management, 8th edition, Burr Ridge, IL:

McGraw-Hill/Irwin, 2009

A Simple LAN

Page 7: Lecture5-8

From Applegate, L.M., Austin, R.D., and Soule, D.L., Corporate Information Strategy and Management, 8th edition, Burr Ridge, IL:

McGraw-Hill/Irwin, 2009

An Example of a WAN

Page 8: Lecture5-8

From Applegate, L.M., Austin, R.D., and Soule, D.L., Corporate Information Strategy and Management, 8th edition, Burr Ridge, IL:

McGraw-Hill/Irwin, 2009

Servers in a Possible E-commerce

Configuration

Page 9: Lecture5-8

From Applegate, L.M., Austin, R.D., and Soule, D.L., Corporate Information Strategy and Management, 8th edition, Burr Ridge, IL:

McGraw-Hill/Irwin, 2009

A Modern Data Center

Page 10: Lecture5-8

From Applegate, L.M., Austin, R.D., and Soule, D.L., Corporate Information Strategy and Management, 8th edition, Burr Ridge, IL:

McGraw-Hill/Irwin, 2009

Five Components in Series (Each 98

percent available)

Page 11: Lecture5-8

From Applegate, L.M., Austin, R.D., and Soule, D.L., Corporate Information Strategy and Management, 8th edition, Burr Ridge, IL:

McGraw-Hill/Irwin, 2009

Combining Components in Series Decreases Overall

Availability

Page 12: Lecture5-8

From Applegate, L.M., Austin, R.D., and Soule, D.L., Corporate Information Strategy and Management, 8th edition, Burr Ridge, IL:

McGraw-Hill/Irwin, 2009

Five Components in Parallel

(Each 98 percent

available)

Page 13: Lecture5-8

From Applegate, L.M., Austin, R.D., and Soule, D.L., Corporate Information Strategy and Management, 8th edition, Burr Ridge, IL:

McGraw-Hill/Irwin, 2009

Redundancy Increase Overall Availability

Page 14: Lecture5-8

From Applegate, L.M., Austin, R.D., and Soule, D.L., Corporate Information Strategy and Management, 8th edition, Burr Ridge, IL:

McGraw-Hill/Irwin, 2009

A Representative E-Commerce Infrastructure

Page 15: Lecture5-8

From Applegate, L.M., Austin, R.D., and Soule, D.L., Corporate Information Strategy and Management, 8th edition, Burr Ridge, IL:

McGraw-Hill/Irwin, 2009

Normal and DoS Handshakes

Page 16: Lecture5-8

From Applegate, L.M., Austin, R.D., and Soule, D.L., Corporate Information Strategy and Management, 8th edition, Burr Ridge, IL:

McGraw-Hill/Irwin, 2009

A Distributed Denial-of-Service Attack

Page 17: Lecture5-8

From Applegate, L.M., Austin, R.D., and Soule, D.L., Corporate Information Strategy and Management, 8th edition, Burr Ridge, IL:

McGraw-Hill/Irwin, 2009

“Spoofing”

Page 18: Lecture5-8

From Applegate, L.M., Austin, R.D., and Soule, D.L., Corporate Information Strategy and Management, 8th edition, Burr Ridge, IL:

McGraw-Hill/Irwin, 2009

Managing Infrastructure Risks: Consequences and

Probabilities

Page 19: Lecture5-8

From Applegate, L.M., Austin, R.D., and Soule, D.L., Corporate Information Strategy and Management, 8th edition, Burr Ridge, IL:

McGraw-Hill/Irwin, 2009

Purchase versus

Subscribe Cash Flows

Page 20: Lecture5-8

From Applegate, L.M., Austin, R.D., and Soule, D.L., Corporate Information Strategy and Management, 8th edition, Burr Ridge, IL:

McGraw-Hill/Irwin, 2009

An “On Demand” Computing Environment

Page 21: Lecture5-8

From Applegate, L.M., Austin, R.D., and Soule, D.L., Corporate Information Strategy and Management, 8th edition, Burr Ridge, IL:

McGraw-Hill/Irwin, 2009

An “On Demand” Computing Environment

(continued)

Page 22: Lecture5-8

From Applegate, L.M., Austin, R.D., and Soule, D.L., Corporate Information Strategy and Management, 8th edition, Burr Ridge, IL:

McGraw-Hill/Irwin, 2009

Internal versus External Delivery

Page 23: Lecture5-8

From Applegate, L.M., Austin, R.D., and Soule, D.L., Corporate Information Strategy and Management, 8th edition, Burr Ridge, IL:

McGraw-Hill/Irwin, 2009

Effects of Additional Risk Factors (Large Size, High Technology, High Requirements Volatility)

on Project Risk

Page 24: Lecture5-8

From Applegate, L.M., Austin, R.D., and Soule, D.L., Corporate Information Strategy and Management, 8th edition, Burr Ridge, IL:

McGraw-Hill/Irwin, 2009

What People Expect and What Often Happens at System Cutover

Page 25: Lecture5-8

From Applegate, L.M., Austin, R.D., and Soule, D.L., Corporate Information Strategy and Management, 8th edition, Burr Ridge, IL:

McGraw-Hill/Irwin, 2009

Project Benefits