American College of Technology
A Place for Dreamers, Thinkers and Doers!!
Management Information Systems
Course: MBA531
Credit Value: 2 Credit Hours
Prerequisite Course(s): RDBMS
Instructors : Dr. Fikre Y. Wondimu
MIS - Emerging Trends, Technologies, and Applications - Lecture 9
Insight
1 Data Science
2 Cloud Computing
3 Cyber Security
4 Artificial Intelligence
Data Science
Data Science
Data Science may be defined as a multidisciplinary blend
of data inference, algorithm development, and technology
to solve complex data analysis issues. Data Science deals
with identification, representation, and extraction of
meaningful information from large data sources to be used
for variety of purposes [1].
also
Data science is a detailed study of the flow of information
from colossal amounts of data present in an organization’s
repository. It involves obtaining meaningful insights from raw
and unstructured data which is processed through analytical,
programming, and business skills [2].
[1] https://www.digitalvidya.com/blog/what-is-data-science/
[2] https://intellipaat.com/blog/what-is-data-science/
Data Science
Hal Varian, chief economist at Google and UC Berkeley
professor of information sciences, business, and economics in
his view to describe Data science activities:
“The ability to take data — to be able to understand
it, to process it, to extract value from it, to visualize
it, to communicate it — that’s going to be a hugely
important skill in the next decades.”
Data Science Competence includes 5 areas/groups
• Data Analytics
• Data Science Engineering
• Domain Expertise
• Data Management
• Scientific Methods (or Business Process Management)
Data Warehouse
Evolution
Before 1960- Flat Files used to store data.
During 1960- DBMS Software emerged.
During 1970- RDBMS Software Emerged, Dr. E. F. Codd set
the foundations of RDBMS.
In the 1980s-Business operations became decentralized
geographically and DDBMS emerged. OLTP technology
used to capture and store business user needs.
In the 1990s-Organizations began to achieve competitive
advantage by building data warehouse systems. OLAP
technology to analyze data stored in Data Warehouse
Data Science Lifecycle
Data Science & Related Fields
Data Science vs. Big Data vs. Data Analytics [3]
Data Science: Dealing with unstructured and structured data, Data Science is a
field that comprises of everything that related to data cleansing, preparation, and
analysis. In simple terms, it is the umbrella of techniques used when trying to
extract insights and information from data.
Big Data: Refers to humongous volumes of data that cannot be processed
effectively with the traditional applications that exist. The processing of Big Data
begins with the raw data that isn’t aggregated and is most often impossible to
store in the memory of a single computer. It is high-volume, and high-velocity
and/or high-variety information assets that demand cost-effective, innovative
forms of information processing
Data Analytics: It is the science of examining raw data with the purpose of
drawing conclusions about that information. Data Analytics involves applying an
algorithmic or mechanical process to derive insights.
[3] SimplyLearn: https://www.simplilearn.com/data-science-vs-big-data-vs-data-analytics-article
Data Warehouse - Overview
Data Warehouse - Overview
Definitions
A Database is a collection of related data which represents
some elements of the real world. It is designed to be built and
populated with data for a specific task. It is also a building block
of a data solution.
A Data Warehouse is an information system which stores
historical and commutative data from single or multiple
sources. It is designed to analyze, report, integrate transaction
data from different sources. Data Warehouse eases the analysis
and reporting process of an organization. It is also a single
version of truth for the organization for decision making and
forecasting process.
Data Warehouse - Overview
Why Use a Database?
It offers the security of data and its access.
A database offers a variety of techniques to store and retrieve
data.
Database act as an efficient handler to balance the requirement
of multiple applications using the same data.
A DBMS offers integrity constraints to get a high level of
protection to prevent access to prohibited data.
A database allows you to access concurrent data in such a way
that only a single user can access the same data at a time.
Data Warehouse - Overview
Why Use a Data Warehouse?
Data warehouse helps business users to access critical data
from some sources all in one place.
It provides consistent info. on various cross-functional activities
Helps to integrate many sources of data to reduce stress on the
production system.
Data warehouse helps you to reduce TAT (total turnaround
time) for analysis and reporting.
Data warehouse helps users to access critical data from
different sources in a single place so.
Data warehouse allows you to stores a large amount of
historical data to analyze different periods and trends to make
future predictions.
Separates analytics processing from transactional databases,
improving the performance of both systems.
Data Warehouse - Overview
arameter Database Data Warehouse
Purpose Database vs
Is designed to Data Warehouse
record Is designed to analyze
Processing The database uses the Online Data warehouse uses Online Analytical Processing
Method Transactional Processing (OLTP) (OLAP).
Usage The database helps to perform Data warehouse allows you to analyze your
fundamental operations for your business business.
Tables and Joins Tables and joins of a database are Table and joins are simple in a data warehouse
complex as they are normalized. because they are denormalized.
Orientation Is an application-oriented collection of It is a subject-oriented collection of data
data
Storage limit Generally limited to a single application Stores data from any number of applications
Availability Data is available real-time Data is refreshed from source systems as and when
needed
Usage ER modeling techniques are used for Data modeling techniques are used for designing.
designing.
Technique Capture data Analyze data
Data Type Data stored in the Database is up to date. Current and Historical Data is stored in Data
Warehouse. May not be up to date.
Storage of data Flat Relational Approach method is used Data Ware House uses dimensional and normalized
for data storage. approach for the data structure. Example: Star and
snowflake schema.
Query Type Simple transaction queries are used. Complex queries are used for analysis purpose.
Data Summary Detailed Data is stored in a database. It stores highly summarized data.
Data Warehouse - Overview
Definitions
The term "Data Warehouse" was first coined by Bill Inmon in 1990.
According to Inmon, a data warehouse is a subject oriented,
integrated, time-variant, and non-volatile collection of data.
This data helps analysts to take informed decisions in an
organization.
A single, complete and consistent store of data obtained from a
variety of different sources made available to end users in a
what they can understand and use in a business context [Barry
Devlin]
A process of transforming data into information and making it
available to users in a timely enough manner to make a
difference [Forrester Research, 1996]
Data Warehouse - Overview
Definitions (Oracle)
Data warehouses separate analysis workload from transaction
workload and enable an organization to consolidate data from
several sources. This helps in:
o Maintaining historical records
o Analyzing the data to gain a better understanding of the
business and to improve the business
In addition to a relational database, a data warehouse
environment can include an extraction, transportation,
transformation, and loading (ETL) solution, statistical analysis,
reporting, data mining capabilities, client analysis tools, and other
applications that manage the process of gathering data,
transforming it into useful, actionable information, and delivering
it to business users.
Data Warehouse
Data Warehouse Applications
Data Warehouse helps business executives to organize, analyze,
and use data for decision making. A data warehouse serves as a
sole part of a plan-execute-assess "closed-loop" feedback system
for the enterprise management.
Data warehouses are widely used in the following fields −
Financial services
Banking services
Consumer goods
Retail sectors
Controlled manufacturing
Application of Data Science
Internet Search
Digital Advertisements (Targeted Advertising and re-
targeting)
Recommender Systems
Image Recognition
Speech Recognition
Gaming
Price Comparison Websites
Airline Route Planning
Cloud Computing
Cloud Computing (CC)
NIST Cloud Computing Definition
“Cloud computing is a model for enabling convenient,
on-demand network access to a shared pool of
configurable computing resources (e.g., networks,
servers, storage, applications, and services) that can be
rapidly provisioned and released with minimal
management effort or service provider interaction.”[1]
[1] SOURCE: NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY , U.S. (NIST)
Cloud Computing (CC)
Cloud Computing (CC)
Conventional Cloud
Manually Provisioned Self-provisioned
Dedicated Hardware Shared Hardware
Fixed Capacity Elastic Capacity
Pay for Capacity Pay for Use
Capital & Operational Operational Expenses
Expenses Managed via APIs
Managed via Sysadmins
Cloud Computing (CC)
Five Basic Attributes of CC
1. Shared / pooled resources
❑ Resources are drawn from a common pool
❑ Common resources build economies of scale
2. Broad network access
❑ Open standards and APIs
❑ Almost always IP, HTTP, and REST
❑ Available from anywhere with an internet connection
3. On-demand self-service
❑ Completely automated
❑ Near real-time delivery (seconds or minutes)
❑ Services accessed through a self-serve web interface
4. Scalable and elastic
❑ Resources dynamically-allocated between users
❑ Additional resources dynamically-released when needed
5. Metered by use
❑ Services are metered, like a utility
❑ Users pay only for services used
Cloud Computing – Service Model
Software as a Service (SaaS): On-demand applications are provided through
an Internet.
Example: Office 365, Google Doc, gMail
Platform as a Service (PaaS): The provision of platform for building, developing,
testing or customizing applications in the same integrated development
environment.
Example: Google’s App Engine, Microsoft Azure.
Infrastructure as a Service (IaaS): virtual delivery of computing resources in the
form of hardware, networking, and storage services.
Example: Amazon Elastic Compute Cloud (Amazon EC2) is a web service
that provides resizable computing capacity
Cloud Computing – Service Model
Cloud Computing – Deployment Model
Public Cloud: The provision of access to computing resources for
the public over the Internet.
Example: Amazon Web Services, IBM's Blue Cloud, Sun Cloud,
Google App Engine and MS Azure Services Platform
Private Cloud: The provision of cloud services to users with
immediate access to privately owned computing resources hosted
within an organization's infrastructure.
Example: Financial (banking) application provides customers with
web access to manage their accounts over the Internet.
Community Cloud: The provision of cloud services for organizations with
similar interests and requirements to share a common cloud
infrastructure.
Example: regulatory compliance for audit, quick response
Hybrid Clouds: Combining one or more public clouds, and one or more
private clouds by technology that enables data and application migration.
Example: Financial Institution requires additional storage or DR
What Can be Used for?
Software as a Service (SaaS): Develop an ERP application and provide the
service of a pay per use bases
Example: Companies requiring account, HR application
Platform as a Service (PaaS): Develop your RDBM or Gateway to the
Internet via VSAT
Example: Virtual ISP
Infrastructure as a Service (IaaS): virtual delivery of computing resources
in the form of hardware, networking, and storage services.
Example: Virtual ISP - Gateway to the Internet via VSAT
SaaS and PaaS
SaaS is where an application is hosted as a service provided to
customers across the Internet. Email, word processing, CRM, HRM
❑ SaaS alleviates the burden of software installation,
maintenance/support but users relinquish control over software
versions and requirements.
PaaS provides a computing platform and a solution stack as a
service. (OS, web service, development platforms)
❑ Consumer creates the software using tools and/or libraries from
the provider.
❑ The consumer also controls software deployment and
configuration settings. The provider provides the networks,
servers, storage and other services.
❑ Avoid worrying about scalability of platform
27
IaaS
IaaS providers offer virtual machines, virtual-machine
image libraries, raw (block) and file-based storage,
firewalls, load balancers, IP addresses, virtual local area
networks (VLANs), and software bundles. Data storage,
processing power, server virtualization.
Pools of hypervisors can scale services up and down
according to customers' varying requirements
All infrastructure is provided on-demand
Avoid buying servers and estimating resource needs
Core Advantages of Cloud
Cost saving: You pay for what you use
Easy on installation and maintenance
Increased storage
Highly automated
Flexibility
Better mobility
Shared resources
Back up and restoration
Disaster Recovery
Automatic software update
Increased collaboration
Security
Advantage for Ethiopia
Optimum utilization of the available infrastructure including the
broadband network and National Data Center. This will bring
down the cost of access to information and communication
technology solutions.
Modernization of policies, regulation, and procurement processes
to mitigate risks and enhance service delivery
Advancement of skills and research and development for
knowledge economy,
Development and deployment of eGov applications towards the
realization of e-government strategy, and
Easy replication of successful applications across the government,
regional governments, zones and Woredas in order to avoid
duplication of effort and costs.
Cybersecurity
Cybersecurity
Cybersecurity is:
“Protection of information systems against unauthorized access to
or modification of information, whether in storage, processing or
transit, and against the denial of service to authorized users,
including those measures necessary to detect, document, and
counter such threats.”
Cyber Security’s goal: Protect our information and information
systems
Cybersecurity
According to CISCO, Cybersecurity is the practice of protecting
systems, networks, and programs from digital attacks.
These cyberattacks are usually aimed at accessing, changing, or
destroying sensitive information; extorting money from users; or
interrupting normal business processes [5].
Implementing effective cybersecurity measures is particularly
challenging today because there are more devices than people,
and attackers are becoming more innovative.
A successful cybersecurity approach has multiple layers of
protection spread across the computers, networks, programs, or
data that one intends to keep safe. In an organization, the people,
processes, and technology must all complement one another to
create an effective defense from cyber attacks.
[5] CISCO - https://www.cisco.com/c/en/us/products/security/what-is-cybersecurity.html
Cybersecurity
Other Terminologies
Confidentiality: Safeguards information from being accessed by
individuals without the proper clearance, access level, and need to
know.
Integrity: Results from the protection of unauthorized modification
or destruction of information.
Availability: Information services are accessible when they are
needed. Authentication means a security measure that establishes
the validity of a transmission, message, or originator, or a means of
verifying an individual's authorization to receive specific categories
of information.
Non-repudiation: Assurance the sender of data is provided with
proof of delivery and the recipient is provided with proof of the
sender's identity, so neither can later deny having processed the
Cybersecurity
Other Terminologies
Information privacy, or data privacy: the relationship
between collection and dissemination of data,
technology, the public expectation of privacy, and the
legal and political issues surrounding them.
Information privacy is the right to control what
information about a person is released.
Cybersecurity
CIA
Information is considered sensitive if the loss of Confidentiality,
Integrity, or Availability could be expected to have a serious, severe,
or catastrophic adverse effect on organizational operations,
organizational assets, or individuals.
Example: Stealing customers’
Protecting information from usernames, passwords, or
unauthorized access and credit card information
disclosure
Protecting information
from unauthorized
modification
Example:Your customers
Preventing disruption in how
are unable to access your
information is accessed
online services
Cybersecurity
Cybercecurity Treats
Phishing Attacks
Ransomware
Hacking
Imposter Scams
Environmental events
More
NIST Interagency Report 7621, revision 1 | Small Business
Information Security:The Fundamentals, section 2.1
Cybersecurity Actions
Protect Passwords
Prevent Identity Theft
Beware of Phishing
Avoid Malware
Run Antivirus Software
Install Updates
Back Up Important Files
Turn On Firewalls
Cybersecurity Functional Framework
The Framework is voluntary guidance, based on existing
guidelines, and practices for organizations to better manage and
reduce cybersecurity risk. According to NIST, Cybersecurity
Framework Component are:
Cybersecurity Functional Framework
Cybersecurity Training & Certification
ISC
Map
Code Certification Levels Certification Course Exam
ISC01 Entry Level CISSP Course 100-105
Certification ICND1
ISC02-1 CISSP concentration in CISSP-ISSAP CISSP-ISSAP
architecture (CISSP- Course Exam
ISC02-1 ISSAP), engineering
(CISSP-ISSEP) or CISSP-ISSEP CISSP-ISSEP
ISC02-3 management (CISSP- Course Exam
ISSMP) CISSP-ISSMP CISSP-ISSMP
Course Exam
Artificial Intelligence
May 6, 2019
Artificial Intelligence
Simulation of human
Man made Human mind
intelligence by machines.
Intelligence: “The capacity to learn and solve problems”
Artificial Intelligence: Artificial intelligence (AI) is the simulation of human
intelligence by machines.
The ability to solve problems
The ability to act rationally
The ability to act like humans
Artificial Intelligence
Artificial intelligence (AI) is an area of computer science that
emphasizes the creation of intelligent machines that work and
react like humans. Some of the activities computers with artificial
intelligence are designed for include:
Speech recognition
Machine learning
Reasoning
Problem solving
Face recognition
Why AI?
AI can have two purposes.
To use the power of computers to augment human thinking
To use a computer's artificial intelligence to understand how
humans think
Artificial Intelligence
AI Goal
To develop algorithms that human use.
Algorithms can require enormous computational
resources and problem goes beyond a certain size
AI Basics
Machine learning is the fundamental concept of AI
search.
Unsupervised learning is the ability to find patterns in
stream of input
Supervised learning includes both classification and
numerical regression
Artificial Intelligence
Application of AI
Robotics
Vision System
Learning System
Voice to text features.
Smart Cars and Drones
Smart Home Devices
The future of AI
Improved speech, voice, image ,video recognition will change the
way interact with our devices
Personal assistants will become more personal and context aware
More and more systems will run autonomously to a point
AI assistants will become truly useful (robotic intelligence with AI
assistants – Siri, Alexa)
Artificial Intelligence
Advantages of AI
The chances of error are almost nil
It can be used to explore space, depths of ocean
Smartphones are greatest example of A.I
It can be used in time consuming tasks efficiently
Algorithms can help the doctors asses patients
and their health risks
Machines do not require sleep or break and are able to function
without stopping
Disadvantages of AI
High cost
Decrease in demand for human labor
AI may be programmed to do something devastating
Machine Ethics
Other Emerging Technologies
What else ?
Well this is an eye opener
End of Lecture 9
http://www.actamericancollege.com/MYACT/login
/index.php
E-mail: [email protected]
Mobile: +251 936984220
+251 911275717