0% found this document useful (0 votes)
38 views49 pages

OMBA531 EmergingTechnologies Lecture 9A

The document discusses data science, cloud computing, cyber security, and artificial intelligence as emerging trends and technologies. It provides details about data science including definitions, related fields, the data science lifecycle, and applications of data science.

Uploaded by

Kalkidan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
38 views49 pages

OMBA531 EmergingTechnologies Lecture 9A

The document discusses data science, cloud computing, cyber security, and artificial intelligence as emerging trends and technologies. It provides details about data science including definitions, related fields, the data science lifecycle, and applications of data science.

Uploaded by

Kalkidan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 49

American College of Technology

A Place for Dreamers, Thinkers and Doers!!

Management Information Systems


Course: MBA531
Credit Value: 2 Credit Hours
Prerequisite Course(s): RDBMS
Instructors : Dr. Fikre Y. Wondimu

MIS - Emerging Trends, Technologies, and Applications - Lecture 9


Insight

1 Data Science

2 Cloud Computing

3 Cyber Security

4 Artificial Intelligence
Data Science
Data Science
Data Science may be defined as a multidisciplinary blend
of data inference, algorithm development, and technology
to solve complex data analysis issues. Data Science deals
with identification, representation, and extraction of
meaningful information from large data sources to be used
for variety of purposes [1].
also
Data science is a detailed study of the flow of information
from colossal amounts of data present in an organization’s
repository. It involves obtaining meaningful insights from raw
and unstructured data which is processed through analytical,
programming, and business skills [2].

[1] https://www.digitalvidya.com/blog/what-is-data-science/
[2] https://intellipaat.com/blog/what-is-data-science/
Data Science
Hal Varian, chief economist at Google and UC Berkeley
professor of information sciences, business, and economics in
his view to describe Data science activities:

“The ability to take data — to be able to understand


it, to process it, to extract value from it, to visualize
it, to communicate it — that’s going to be a hugely
important skill in the next decades.”
Data Science Competence includes 5 areas/groups
• Data Analytics
• Data Science Engineering
• Domain Expertise
• Data Management
• Scientific Methods (or Business Process Management)
Data Warehouse

Evolution
Before 1960- Flat Files used to store data.

During 1960- DBMS Software emerged.

During 1970- RDBMS Software Emerged, Dr. E. F. Codd set


the foundations of RDBMS.

In the 1980s-Business operations became decentralized


geographically and DDBMS emerged. OLTP technology
used to capture and store business user needs.

In the 1990s-Organizations began to achieve competitive


advantage by building data warehouse systems. OLAP
technology to analyze data stored in Data Warehouse
Data Science Lifecycle
Data Science & Related Fields
Data Science vs. Big Data vs. Data Analytics [3]
Data Science: Dealing with unstructured and structured data, Data Science is a
field that comprises of everything that related to data cleansing, preparation, and
analysis. In simple terms, it is the umbrella of techniques used when trying to
extract insights and information from data.

Big Data: Refers to humongous volumes of data that cannot be processed


effectively with the traditional applications that exist. The processing of Big Data
begins with the raw data that isn’t aggregated and is most often impossible to
store in the memory of a single computer. It is high-volume, and high-velocity
and/or high-variety information assets that demand cost-effective, innovative
forms of information processing

Data Analytics: It is the science of examining raw data with the purpose of
drawing conclusions about that information. Data Analytics involves applying an
algorithmic or mechanical process to derive insights.

[3] SimplyLearn: https://www.simplilearn.com/data-science-vs-big-data-vs-data-analytics-article


Data Warehouse - Overview
Data Warehouse - Overview

Definitions
 A Database is a collection of related data which represents
some elements of the real world. It is designed to be built and
populated with data for a specific task. It is also a building block
of a data solution.

 A Data Warehouse is an information system which stores


historical and commutative data from single or multiple
sources. It is designed to analyze, report, integrate transaction
data from different sources. Data Warehouse eases the analysis
and reporting process of an organization. It is also a single
version of truth for the organization for decision making and
forecasting process.
Data Warehouse - Overview

Why Use a Database?


 It offers the security of data and its access.
 A database offers a variety of techniques to store and retrieve
data.
 Database act as an efficient handler to balance the requirement
of multiple applications using the same data.
 A DBMS offers integrity constraints to get a high level of
protection to prevent access to prohibited data.
 A database allows you to access concurrent data in such a way
that only a single user can access the same data at a time.
Data Warehouse - Overview

Why Use a Data Warehouse?


 Data warehouse helps business users to access critical data
from some sources all in one place.
 It provides consistent info. on various cross-functional activities
 Helps to integrate many sources of data to reduce stress on the
production system.
 Data warehouse helps you to reduce TAT (total turnaround
time) for analysis and reporting.
 Data warehouse helps users to access critical data from
different sources in a single place so.
 Data warehouse allows you to stores a large amount of
historical data to analyze different periods and trends to make
future predictions.
 Separates analytics processing from transactional databases,
improving the performance of both systems.
Data Warehouse - Overview
arameter Database Data Warehouse
Purpose Database vs
Is designed to Data Warehouse
record Is designed to analyze
Processing The database uses the Online Data warehouse uses Online Analytical Processing
Method Transactional Processing (OLTP) (OLAP).
Usage The database helps to perform Data warehouse allows you to analyze your
fundamental operations for your business business.
Tables and Joins Tables and joins of a database are Table and joins are simple in a data warehouse
complex as they are normalized. because they are denormalized.
Orientation Is an application-oriented collection of It is a subject-oriented collection of data
data
Storage limit Generally limited to a single application Stores data from any number of applications
Availability Data is available real-time Data is refreshed from source systems as and when
needed
Usage ER modeling techniques are used for Data modeling techniques are used for designing.
designing.
Technique Capture data Analyze data
Data Type Data stored in the Database is up to date. Current and Historical Data is stored in Data
Warehouse. May not be up to date.
Storage of data Flat Relational Approach method is used Data Ware House uses dimensional and normalized
for data storage. approach for the data structure. Example: Star and
snowflake schema.
Query Type Simple transaction queries are used. Complex queries are used for analysis purpose.
Data Summary Detailed Data is stored in a database. It stores highly summarized data.
Data Warehouse - Overview

Definitions
The term "Data Warehouse" was first coined by Bill Inmon in 1990.
 According to Inmon, a data warehouse is a subject oriented,
integrated, time-variant, and non-volatile collection of data.
This data helps analysts to take informed decisions in an
organization.
 A single, complete and consistent store of data obtained from a
variety of different sources made available to end users in a
what they can understand and use in a business context [Barry
Devlin]
 A process of transforming data into information and making it
available to users in a timely enough manner to make a
difference [Forrester Research, 1996]
Data Warehouse - Overview

Definitions (Oracle)
 Data warehouses separate analysis workload from transaction
workload and enable an organization to consolidate data from
several sources. This helps in:
o Maintaining historical records
o Analyzing the data to gain a better understanding of the
business and to improve the business
 In addition to a relational database, a data warehouse
environment can include an extraction, transportation,
transformation, and loading (ETL) solution, statistical analysis,
reporting, data mining capabilities, client analysis tools, and other
applications that manage the process of gathering data,
transforming it into useful, actionable information, and delivering
it to business users.
Data Warehouse

Data Warehouse Applications

Data Warehouse helps business executives to organize, analyze,


and use data for decision making. A data warehouse serves as a
sole part of a plan-execute-assess "closed-loop" feedback system
for the enterprise management.

Data warehouses are widely used in the following fields −


 Financial services
 Banking services
 Consumer goods
 Retail sectors
 Controlled manufacturing
Application of Data Science

Internet Search
Digital Advertisements (Targeted Advertising and re-
targeting)
Recommender Systems
Image Recognition
Speech Recognition
Gaming
Price Comparison Websites
Airline Route Planning
Cloud Computing
Cloud Computing (CC)
NIST Cloud Computing Definition

“Cloud computing is a model for enabling convenient,


on-demand network access to a shared pool of
configurable computing resources (e.g., networks,
servers, storage, applications, and services) that can be
rapidly provisioned and released with minimal
management effort or service provider interaction.”[1]

[1] SOURCE: NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY , U.S. (NIST)


Cloud Computing (CC)
Cloud Computing (CC)

Conventional Cloud
 Manually Provisioned  Self-provisioned
 Dedicated Hardware  Shared Hardware
 Fixed Capacity  Elastic Capacity
 Pay for Capacity  Pay for Use
 Capital & Operational  Operational Expenses
Expenses  Managed via APIs
 Managed via Sysadmins
Cloud Computing (CC)
Five Basic Attributes of CC
1. Shared / pooled resources
❑ Resources are drawn from a common pool
❑ Common resources build economies of scale
2. Broad network access
❑ Open standards and APIs
❑ Almost always IP, HTTP, and REST
❑ Available from anywhere with an internet connection
3. On-demand self-service
❑ Completely automated
❑ Near real-time delivery (seconds or minutes)
❑ Services accessed through a self-serve web interface
4. Scalable and elastic
❑ Resources dynamically-allocated between users
❑ Additional resources dynamically-released when needed
5. Metered by use
❑ Services are metered, like a utility
❑ Users pay only for services used
Cloud Computing – Service Model
 Software as a Service (SaaS): On-demand applications are provided through
an Internet.

Example: Office 365, Google Doc, gMail

 Platform as a Service (PaaS): The provision of platform for building, developing,


testing or customizing applications in the same integrated development
environment.

Example: Google’s App Engine, Microsoft Azure.

 Infrastructure as a Service (IaaS): virtual delivery of computing resources in the


form of hardware, networking, and storage services.

Example: Amazon Elastic Compute Cloud (Amazon EC2) is a web service


that provides resizable computing capacity
Cloud Computing – Service Model
Cloud Computing – Deployment Model
 Public Cloud: The provision of access to computing resources for
the public over the Internet.
Example: Amazon Web Services, IBM's Blue Cloud, Sun Cloud,
Google App Engine and MS Azure Services Platform

 Private Cloud: The provision of cloud services to users with


immediate access to privately owned computing resources hosted
within an organization's infrastructure.
Example: Financial (banking) application provides customers with
web access to manage their accounts over the Internet.

 Community Cloud: The provision of cloud services for organizations with


similar interests and requirements to share a common cloud
infrastructure.
Example: regulatory compliance for audit, quick response

 Hybrid Clouds: Combining one or more public clouds, and one or more
private clouds by technology that enables data and application migration.
Example: Financial Institution requires additional storage or DR
What Can be Used for?

 Software as a Service (SaaS): Develop an ERP application and provide the


service of a pay per use bases

Example: Companies requiring account, HR application

 Platform as a Service (PaaS): Develop your RDBM or Gateway to the


Internet via VSAT

Example: Virtual ISP

 Infrastructure as a Service (IaaS): virtual delivery of computing resources


in the form of hardware, networking, and storage services.

Example: Virtual ISP - Gateway to the Internet via VSAT


SaaS and PaaS
 SaaS is where an application is hosted as a service provided to
customers across the Internet. Email, word processing, CRM, HRM
❑ SaaS alleviates the burden of software installation,

maintenance/support but users relinquish control over software


versions and requirements.
 PaaS provides a computing platform and a solution stack as a
service. (OS, web service, development platforms)
❑ Consumer creates the software using tools and/or libraries from

the provider.
❑ The consumer also controls software deployment and

configuration settings. The provider provides the networks,


servers, storage and other services.
❑ Avoid worrying about scalability of platform

27
IaaS
 IaaS providers offer virtual machines, virtual-machine
image libraries, raw (block) and file-based storage,
firewalls, load balancers, IP addresses, virtual local area
networks (VLANs), and software bundles. Data storage,
processing power, server virtualization.
 Pools of hypervisors can scale services up and down
according to customers' varying requirements
 All infrastructure is provided on-demand
 Avoid buying servers and estimating resource needs
Core Advantages of Cloud
 Cost saving: You pay for what you use
 Easy on installation and maintenance
 Increased storage
 Highly automated
 Flexibility
 Better mobility
 Shared resources
 Back up and restoration
 Disaster Recovery
 Automatic software update
 Increased collaboration
 Security
Advantage for Ethiopia
 Optimum utilization of the available infrastructure including the
broadband network and National Data Center. This will bring
down the cost of access to information and communication
technology solutions.
 Modernization of policies, regulation, and procurement processes
to mitigate risks and enhance service delivery
 Advancement of skills and research and development for
knowledge economy,
 Development and deployment of eGov applications towards the
realization of e-government strategy, and
 Easy replication of successful applications across the government,
regional governments, zones and Woredas in order to avoid
duplication of effort and costs.
Cybersecurity
Cybersecurity
Cybersecurity is:

“Protection of information systems against unauthorized access to


or modification of information, whether in storage, processing or
transit, and against the denial of service to authorized users,
including those measures necessary to detect, document, and
counter such threats.”

Cyber Security’s goal: Protect our information and information


systems
Cybersecurity

 According to CISCO, Cybersecurity is the practice of protecting


systems, networks, and programs from digital attacks.
These cyberattacks are usually aimed at accessing, changing, or
destroying sensitive information; extorting money from users; or
interrupting normal business processes [5].
 Implementing effective cybersecurity measures is particularly
challenging today because there are more devices than people,
and attackers are becoming more innovative.
 A successful cybersecurity approach has multiple layers of
protection spread across the computers, networks, programs, or
data that one intends to keep safe. In an organization, the people,
processes, and technology must all complement one another to
create an effective defense from cyber attacks.
[5] CISCO - https://www.cisco.com/c/en/us/products/security/what-is-cybersecurity.html
Cybersecurity
Other Terminologies
Confidentiality: Safeguards information from being accessed by
individuals without the proper clearance, access level, and need to
know.
Integrity: Results from the protection of unauthorized modification
or destruction of information.
Availability: Information services are accessible when they are
needed. Authentication means a security measure that establishes
the validity of a transmission, message, or originator, or a means of
verifying an individual's authorization to receive specific categories
of information.
Non-repudiation: Assurance the sender of data is provided with
proof of delivery and the recipient is provided with proof of the
sender's identity, so neither can later deny having processed the
Cybersecurity
Other Terminologies

 Information privacy, or data privacy: the relationship


between collection and dissemination of data,
technology, the public expectation of privacy, and the
legal and political issues surrounding them.
 Information privacy is the right to control what
information about a person is released.
Cybersecurity
CIA
Information is considered sensitive if the loss of Confidentiality,
Integrity, or Availability could be expected to have a serious, severe,
or catastrophic adverse effect on organizational operations,
organizational assets, or individuals.
Example: Stealing customers’
Protecting information from usernames, passwords, or
unauthorized access and credit card information
disclosure

Protecting information
from unauthorized
modification
Example:Your customers
Preventing disruption in how
are unable to access your
information is accessed
online services
Cybersecurity
Cybercecurity Treats

 Phishing Attacks
 Ransomware
 Hacking
 Imposter Scams
 Environmental events

More
NIST Interagency Report 7621, revision 1 | Small Business
Information Security:The Fundamentals, section 2.1
Cybersecurity Actions

Protect Passwords
Prevent Identity Theft
Beware of Phishing
Avoid Malware
Run Antivirus Software
Install Updates
Back Up Important Files
Turn On Firewalls
Cybersecurity Functional Framework

The Framework is voluntary guidance, based on existing


guidelines, and practices for organizations to better manage and
reduce cybersecurity risk. According to NIST, Cybersecurity
Framework Component are:
Cybersecurity Functional Framework
Cybersecurity Training & Certification
ISC
Map
Code Certification Levels Certification Course Exam
ISC01 Entry Level CISSP Course 100-105
Certification ICND1

ISC02-1 CISSP concentration in CISSP-ISSAP CISSP-ISSAP


architecture (CISSP- Course Exam
ISC02-1 ISSAP), engineering
(CISSP-ISSEP) or CISSP-ISSEP CISSP-ISSEP
ISC02-3 management (CISSP- Course Exam
ISSMP) CISSP-ISSMP CISSP-ISSMP
Course Exam
Artificial Intelligence

May 6, 2019
Artificial Intelligence

Simulation of human
Man made Human mind
intelligence by machines.

Intelligence: “The capacity to learn and solve problems”


Artificial Intelligence: Artificial intelligence (AI) is the simulation of human
intelligence by machines.
 The ability to solve problems
 The ability to act rationally
 The ability to act like humans
Artificial Intelligence
Artificial intelligence (AI) is an area of computer science that
emphasizes the creation of intelligent machines that work and
react like humans. Some of the activities computers with artificial
intelligence are designed for include:
 Speech recognition
 Machine learning
 Reasoning
 Problem solving
 Face recognition
Why AI?
AI can have two purposes.
 To use the power of computers to augment human thinking
 To use a computer's artificial intelligence to understand how
humans think
Artificial Intelligence
AI Goal
To develop algorithms that human use.
Algorithms can require enormous computational
resources and problem goes beyond a certain size

AI Basics

Machine learning is the fundamental concept of AI


search.
Unsupervised learning is the ability to find patterns in
stream of input
Supervised learning includes both classification and
numerical regression
Artificial Intelligence
Application of AI
 Robotics
 Vision System
 Learning System
 Voice to text features.
 Smart Cars and Drones
 Smart Home Devices

The future of AI
 Improved speech, voice, image ,video recognition will change the
way interact with our devices
 Personal assistants will become more personal and context aware
 More and more systems will run autonomously to a point
 AI assistants will become truly useful (robotic intelligence with AI
assistants – Siri, Alexa)
Artificial Intelligence
Advantages of AI
 The chances of error are almost nil
 It can be used to explore space, depths of ocean
 Smartphones are greatest example of A.I
 It can be used in time consuming tasks efficiently
 Algorithms can help the doctors asses patients
and their health risks
 Machines do not require sleep or break and are able to function
without stopping

Disadvantages of AI
 High cost
 Decrease in demand for human labor
 AI may be programmed to do something devastating
 Machine Ethics
Other Emerging Technologies

What else ?
Well this is an eye opener
End of Lecture 9

http://www.actamericancollege.com/MYACT/login
/index.php

E-mail: [email protected]
Mobile: +251 936984220
+251 911275717

You might also like