Information Technology for Management 10th Edition Solutions Manual
Short Description
=> download: https://goo.gl/VV1cJZ <= information technology for management 10th edition solutions manual inform...
Description
Information Technology For Management 10th Edition Solutions Manual By Turban Volonino Completed Download: https://testbankarea.com/download/information-technology-management10th-edition-solutions-manual-turban-volonino/
Test Bank For Information Technology For Management Digital Strategies For Insight Action And Sustainable Performance 10th Edition By Efraim Turban, Linda Volonino. Completed download: https://testbankarea.com/download/information-technology-management10th-edition-test-bank-turban-volonino/
Chapter 4 Networks for Efficient Operations and Sustainability IT at Work 4.1 Net Neutrality Debate Intensifies 1. What is Net neutrality? The concept of net neutrality holds that Internet service providers (ISPs) and their regulators should treat all Internet traffic the same way. It has been the center of a debate over whether ISPs can give preferential treatment to some traffic (by traffic shaping), in effect creating a two-tier Web. 2. What tiers are created by traffic shaping? One tier would be for “normal” network traffic, such as bulk data transfers, P2P filesharing programs, and BitTorrent traffic, which would be considered less important. Another tier would be for content that is time-sensitive, such as such as streaming video and Internet phone services (versus traffic that can be delayed briefly with little-to-no adverse effect) and for those, such as businesses, who would pay a premium price for priority service. 3. Why did the battle over Net neutrality intensify in 2014? In January 2014 an appeals court struck down the FCC’s 2010 decision (providing a Net “semi-neutrality”.) The court allowed ISPs to create a two-tiered Internet, but promised
close supervision to avoid anticompetitive practices, and banned “unreasonable” discrimination against providers. On April 24 FCC Chairman Tom Wheeler reported that his agency would propose new rules to comply with the court’s decision that would be finalized by December 2014. 4. Did the FCC’s 2010 ruling favor either side of the debate? The FCC approved a compromise that created two classes of Internet access, one for fixed-line providers and the other for the wireless Net. In effect, the new rules are Net semi-neutrality. They ban any outright blocking of and “unreasonable discrimination” against Web sites or applications by fixed-line broadband providers. But the rules do not explicitly forbid “paid prioritization,” which would allow a company to pay an ISP for faster data transmission. 5. What has been a reaction to the 2014 appeals court decision? Explain. On April 24 FCC Chairman Tom Wheeler reported that his agency would propose new rules to comply with the court’s decision that would be finalized by December 2014. Wheeler stated that these rules “would establish that behavior harmful to consumers or competition by limiting the openness of the Internet will not be permitted” (Wheeler, 2014). But Wheeler’s proposal would allow network owners to charge extra fees on content providers. This decision has angered consumer advocates and Net neutrality advocates who view Wheeler with suspicion because of his past work as a lobbyist for the cable industry and wireless phone companies.
4.2 NFC-Embedded Guitar Picks 1. Assume you attended a concert and were given a brochure similar to the one distributed to fans at The Wild Feathers concert. Would you use the guitar pick or comparable NFCembedded item to participate in a contest? To post on Facebook or tweet about the concert? Explain why or why not. Answers may vary. 2. How can NFC be applied to create an interesting user experience at a sporting event? At a retail store or coffee shop? Answers may vary. 3. Refer to your answers in Question 2. What valuable information could be collected by the NFC tag in these businesses? Answers may vary.
4.3 Smart City or Police State? 1. What are the benefits of a smart city? Answers nay vary. Some benefits may be improving the quality of life, reducing energy consumption, and engaging its citizens in civic duties. 2. What are the potential abuses of data collected in this way? Answers nay vary. Data streams and mobile apps that keep citizens informed also keep the government informed.
3. Consider the dark side of smart. Are you skeptical of the benefits of a smart city? Answers nay vary. 4. Would you want to live in a smart city? Explain. Answers nay vary. 5. How would you prevent Santander from becoming a police state? Answers nay vary.
REVIEW QUESTIONS 4.1 Data Networks, IP Addresses, and APIs 1. Why has IPv6 become increasingly important? IPv4 can support roughly 4.3 billion unique IP address. IPv6 can support 340 trillion, trillion, trillion addresses. IPv6 offers also enhanced quality of service that is needed by the latest in video, interactive games, and e-commerce. In April 2014 ARIN, the group that oversees Internet addresses, reported that IPv4 addresses were running out—making it urgent that enterprises move to the newer IPv6 2. What is an IP address? Every device that communicates with a network must have a unique identifying IP address. An IP address is comparable to a telephone number or home address. 3. What are bandwidth and broadband? Bandwidth is the communication capacity of a network. Bandwidth is the amount of data that passes through a network connection over time as measured in bits per second (bps). For an analogy to bandwidth, consider a pipe used to transport water. The larger the diameter of the pipe, the greater the throughput (volume) of water that flows through it and the faster water is transferred through it. Broadband is short for broad bandwidth and means high capacity. 4. Briefly describe the basic network functions. Business networks support basic functions including: communication, mobility, collaboration, relationships, and search. Communication: Provides sufficient capacity for human and machine generated transmissions, such as being able to talk, text, tweet, fax, send messages, etc. Mobility: Provides secure, trusted, and reliable access from any mobile device anywhere at satisfactory download (DL) and upload (UL) speeds. Collaboration: Supports teamwork activities that may be synchronous or asynchronous; brain storming; and knowledge and document sharing. Relationships: Manages interaction with customers, supply chain partners, shareholders, employees, regulatory agencies, etc. Search: Able to locate data, contracts, documents, spreadsheets, and other knowledge within an organization easily and efficiently.
5. What is the difference between circuit switching and packet switching? The two types of switching are: Circuit switching: A circuit is a dedicated connection between a source and a destination. Circuit switching is older technology that was used for telephone calls. The distinguishing characteristic is that the circuit cannot be used by any other call until the session (connection) is ended. It is inefficient for digital transmission. Packet switching: Packet switching transfers data or voice in packets. Files are broken into packets, numbered sequentially, and routed individually to their destination. When received at the destination, the packets are reassembled into their proper sequence. The astute student may realize: The path of the signal is digital, and is neither dedicated nor exclusive. That is, the networks are shared. When packets are transmitted over a shared network, such as the Internet, they may follow different paths to the destination, where they are reassembled into the original message once all of them have arrived. 6. What is the difference between 3G and 4G? 4G delivers average download rates of 3Mbps or higher. In contrast, today's 3G networks typically deliver average download speeds about one-tenth of that rate. Even though individual networks, ranging from 2G to 3G, started separately with their own purposes, soon they will be converted to the 4G network. 4G is based purely on the packet-based Internet Protocol (IP) – unlike current 2G and 3G networks that have a circuit-switched subsystem. Users can get 4G wireless connectivity through one of the following standards: 1. WiMAX is based on the IEEE 802.16 standard and the metropolitan area network (MAN) access standard. IEEE 802.16 specifications are: • Range: 30 miles (50 km) from base station • Speed: 70 megabits per second (Mbps) • Line-of-sight not needed between user and base station WiMAX operates on the same basic principles as Wi-Fi in that it transmits data from one device to another via radio signals. 2. LTE (Long-Term Evolution) is a GSM-based technology that is deployed by Verizon, AT&T, and T-Mobile. LTE has download data rates of 100 Mbps and upload data rates of 50 Mbps. 7. What are the mobile network standards? Mobile broadband: Describes various types of wireless high-speed Internet access through a portable modem, telephone or other device. Various network standards may be used, such as GPRS, 4G, 3G, WiMAX, LTE UMTS/HSPA, EV-DO, and some portable satellite-based systems. The textbook discusses 4G standards, so students’ answers will probably be focused along this line. In general, users can get 4G wireless connectivity through one of two standards: WiMAX or LTE (Long-Term Evolution). 8. Explain the Net neutrality debate.
In January 2014 an appeals court struck down the FCC’s 2010 decision (providing a Net “semi-neutrality”.) The court allowed ISPs to create a two-tiered Internet but to avoid anticompetitive practices, and banned “unreasonable” discrimination against providers. However, the rules do not explicitly forbid “paid prioritization,” which would allow a company to pay an ISP for faster data transmission. Those in favor of Net neutrality. They want a one-tier system in which all Internet data packets are treated the same, regardless of their content, destination, or source. In contrast, those who favor the two-tiered system argue that there have always been different levels of Internet service and that a two-tiered system would enable more freedom of choice and promote Internet-based commerce.
9. What are two applications of NFC? NFC enables two devices within close proximity to establish a communication channel and transfer data through radio waves. NFC is location-aware technologies that are more secure than other wireless technologies like Bluetooth and Wi-Fi. Unlike RFID, NFC is a two-way communication tool. Answers may vary. Location-aware NFC technology, such as smartphones, can be used to make purchases in restaurants, resorts, hotels, theme parks and theaters, at gas stations, and on buses and trains. They also can provide consumers with content to complement their current activity, such as recipe or idea videos when shopping at a supermarket having proper NFC tag-equipped units. 10. What are the benefits of APIs? For programmers: The benefits of APIs are that they simplify the programmer’s job and ensure that all programs using the same API use that resource in the same manner. APIs are the common method for accessing information, websites, and databases. Business benefits of APIs include: APIs are channels to new customers and markets: APIs enable partners to use business assets to extend the reach of a company’s products or services to customers and markets they might not reach easily. APIs promote innovation: Through an API, people who are committed to a challenge or problem can solve it themselves. APIs are a better way to organize IT: APIs promote innovation by allowing everyone in a company to use each other’s assets without delay. APIs create a path to lots of Apps: Apps are going to be a crucial channel in the next 10 years. Apps are powered by APIs. Developers use APIs and combinations of APIs to create new user experiences.
4.2 Wireless Networks and Mobile Infrastructure 1. What factors are contributing to mobility? Answers may vary. Factors contributing to mobility can include the following:
• • • • •
New wireless technologies such as WiMAX-Wireless Broadband and standards such as 8.11n High-speed wireless networks such as 4G Multitasking mobile devices More robust mobile OSs and their applications Increased competitive pressure as others start adopting mobile technology for strategic applications
2. Why is strategic planning of mobile networks important? Organizations are recognizing the strategic value of mobile technology. So, organizations are moving away from ad hoc adoption of mobile devices and network infrastructure to a more strategic planning build-out of their mobile capabilities. As technologies that make up the mobile infrastructure evolve, identifying strategic technologies and avoiding wasted investments require more extensive planning and forecasting. 3. How does Wi-Fi work? Wi-Fi is a technology that allows computers to share a network or internet connection wirelessly without the need to connect to a commercial network. Wi-Fi networks beam packets over short distances using part of the radio spectrum, or they can extend over larger areas, such as municipal Wi-Fi networks. Municipal networks are not common because of huge costs. Wi-Fi is the standard way computers connect to wireless networks. Nearly all computers have built-in Wi-Fi chips that allow users to find and connect to wireless routers. The router must be connected to the Internet in order to provide Internet access to connected devices. Wi-Fi networking standards are: • •
• •
802.11b. This standard shares spectrum with 2.4 GHz cordless phones, microwave ovens, and many Bluetooth products. Data are transferred at distances up to 100 meters or 328 feet. 802.11a. This standard runs on 12 channels in the 5 GHz spectrum in North America, which reduces interference issues. Data are transferred about 5 times faster than 802.11b, improving the quality of streaming media. It has extra bandwidth for large files. Since the 802.11a and b standards are not interoperable, data sent from an 802.11b network cannot be accessed by 802.11a networks. 802.11g. This standard runs on three channels in 2.4 GHz spectrum, but at the speed of 802.11a. It is compatible with the 802.11b standard. 802.11n. This standard improves upon prior 802.11 standards by adding multiple-input multiple-output (MIMO) and other newer features. Frequency ranges from 2.4 GHz to 5GHz with a data rate of about 22 Mbps, but perhaps as high as 100 Mbps.
4. What is a WLAN? A WLAN (Wireless Local Area Network) is a type of local area network that uses highfrequency radio waves to communicate between computers or devices such as printers, which are referred to as nodes on the network. A WLAN typically extends an existing wired LAN by attaching a wireless access point (AP) to a wired network.
5. Why is WiMAX important? Wireless broadband WiMAX transmits voice, data, and video over high-frequency radio signals to businesses, homes, and mobile devices. It was designed to bypass traditional telephone lines and is an alternative to cable and DSL. WiMAX is based on the IEEE 802.16 set of standards and the metropolitan area network (MAN) access standard. Its range is 20 to 30 miles and it does not require a clear line of sight to function. 6. What factors should be considered when selecting a mobile network? When evaluating mobile network solutions, four factors to consider are: 1. Simple: Easy to deploy, manage and use. 2. Connected: Always makes the best connection possible. 3. Intelligent: Works behind the scenes, easily integrating with other systems. 4. Trusted: Enables secure and reliable communications.
4.3 Collaboration and Communication Technologies 1. Why is group work challenging? Group work involves processes that can be quite complex depending on the following factors: Group members may be located in different places or work at different times. Group members may work for the same or for different organizations. Some of the needed data, information, or knowledge may be located in many sources, several of which are external to the organization. Despite the long history and benefits of collaborative work, groups are not always successful. 2. What might limit the use of in-person brainstorming? Answers may vary. In-person brainstorming can be limited by travel expense if members are geographically dispersed. Other limiting factors, such as schedules, time zones, and available resources, such as an available meeting place, may limit in-person brainstorming. 3. How can online brainstorming tools overcome those limits? Online brainstorming tools can be accessed virtually from anywhere Internet access is available. Many of these tools allow users to post comments on their own time rather than having to meet at a particular time, however, virtual meetings may be necessary as well. 4. What is the difference between an intranet and an extranet? Intranets are used within a company for data access, sharing, and collaboration. An extranet is a private, company-owned network that can be accessed remotely via the Internet. It connects two or more companies, suppliers, vendors, partners, or customers, so they can securely share information. 5. How does a virtual private network (VPN) provide security?
Virtual private networks (VPNs) encrypt the data packets before they are transferred over the network and decrypt at the receiving end.
4.4 Sustainability and Ethical Issues 1. Why do some experts warn that carbon emission reductions between 50 percent and 85 percent are necessary by 2050? The Prince of Wales’ Corporate Leaders Group on Climate Change holds that carbon emission reductions between 50 percent and 85 percent are necessary by 2050 to prevent the global temperature from rising too much too fast because of the greenhouse effect. 2. What contributes to the rise of global mean temperature? Scientists have concluded that increases in CO2 resulting from human activities have thrown the earth’s natural carbon cycle off balance, increasing global temperatures. 3. What is the greenhouse effect? The greenhouse effect is the holding of heat within the earth’s atmosphere. 4. How does the use of mobile devices contribute to the level of greenhouse gases? Almost all of these devices are powered by the burning of fossil fuels. 5. What is ICT’s role in global warming? Climate Group found that ICT plays a key role in reducing global warming by transforming the way people and businesses use IT. The role of IT includes emission reduction and energy savings not only in the sector itself, but also by transforming how and where people work. The most obvious ways are by substituting digital formats— telework, video-conferencing, e-paper, and mobile and e-commerce—for physical formats. 6. Why is global warming hotly debated? Many scientists and experts are extremely alarmed by global warming and climate change, but other experts outright deny that they are occurring. 7. Explain the goal of sustainability. Answers may vary. The goal is to preserve the earth’s capacity to support human life by curbing emissions and reducing environmental impact, yet preserving the ability of businesses to show a return on investment (ROI) through the use of four factors essential to preserving the environment: reduce, reuse, recycle, and recover. 8. Explain the characteristics of a life out of control. IT keeps people connected with no real off switch. Tools that are meant to improve the productivity and quality of life in general can also intrude on personal time. In our hyperconnected world, people are always on, collaborating, communicating, and creating—and not always aware of how technology impacts them. Downtime has given way to filling
every moment with bite-sized chunks of information, education, and entertainment— seemingly packing our lives with productivity.
CRITICAL THINKING QUESTIONS 1. Explain how network capacity is measured. Network capacity is measured in terms of its throughput per second, or bandwidth. Bandwidth is a measure of the speed at which data is transmitted. Very large data transfers can reduce availability for others on the network. 2. How are devices identified to a network? A device’s Internet Protocol (IP) address uniquely identifies it to the network. 3. Explain how digital signals are transmitted. Internet Protocol (IP) is the method by which data, which is broken into packets, is sent from one device to another via a private network, cellular network, or public Internet. Network switches and routers transmit data to their destination based on IP addresses. Switches and routers are the building blocks for all business communications— data, voice, video, and wireless. A switch acts as a controller, enabling networked devices to talk to each other efficiently. Business networks use switches to connect computers, printers, and servers within a building or campus. Switches create a network. Routers connect networks. A router links computers to the Internet, so that users can share the connection. Routers act like a dispatcher, choosing the best paths for packets to travel. Packet switching transfers data in small blocks called packets based on the destination IP address in each packet. When received at the destination, the packets are reassembled into their proper sequence. 4. Explain the functions of switches and routers. Network switches and routers are devices that transmit data to their destination based on IP addresses. Switches and routers are the building blocks for all business communications— data, voice, video, and wireless. A switch acts as a controller, enabling networked devices to talk to each other efficiently. Business networks use switches to connect computers, printers, and servers within a building or campus. Switches create a network. Routers connect networks. A router links computers to the Internet, so that users can share the connection. Routers act like a dispatcher, choosing the best paths for signals or packets to travel. 5. QoS technologies can be applied to create two tiers of traffic. What are those tiers? Give an example of each type of traffic. QoS technologies can be applied to create two tiers of traffic: • Prioritize traffic: Data and apps that are time-delay sensitive or latency-sensitive apps, such as voice and video, are given priority on the network.
• Throttle traffic: In order to give latency-sensitive apps priority, other types of traffic need to be held back (throttled). This category of data could be an Excel table that is not time-sensitive but must be delivered without any loss. The ability to prioritize and throttle network traffic is referred to as traffic shaping. 6. Typically, networks are configured so that downloading is faster than uploading. Explain why. Usually, queries (small piece of information) are uploaded and the results (large chunk of information) are downloaded. Hence higher bandwidths are allocated for downloads in relation to uploads. 7. What issues are significant about 4G wireless networks? 4G technologies represent the latest available stage in the evolution of wireless data technologies. 4G delivers average download rates of 3Mbps or higher. In contrast, today's 3G networks typically deliver average download speeds about one-tenth of that rate. Even though individual networks, ranging from 2G to 3G, started separately with their own purposes, soon they will be converted to the 4G network. What is significant about 4G networks is that they do not have a circuit-switched subsystem, as do current 2G and 3G networks. Instead, 4G is based purely on the packet-based Internet Protocol (IP). With the build-out of 5G networks, huge gains in both speed and capacity over existing 4G networks will be available. 8. What are two 4G wireless standards? In general, users can get 4G wireless connectivity through one of two standards: WiMAX or LTE (Long-Term Evolution). WiMAX is based on the IEEE 802.16 standard and the metropolitan area network (MAN) access standard. It is used by Sprint, Comcast, and Time-Warner Cable to deliver wireless broadband. LTE is a GSM-based technology that will be deployed by Verizon, AT&T, and TMobile. 9. How is network performance measured? An important measure is throughput (data transfer capacity.) For evaluation purposes one needs to consider the bandwidth of the channels and the protocols used. 10. Discuss two applications of near-field communication (NFC). NFC enables two devices within close proximity to establish a communication channel and transfer data through radio waves. NFC are location-aware technologies that are more secure than other wireless technologies like Bluetooth and Wi-Fi. Unlike RFID, NFC is a two-way communication tool. Answers may vary. Location-aware NFC technology, such as smartphones, can be used to make purchases in restaurants, resorts, hotels, theme parks and theaters, at gas stations, and on buses and trains. Also, banks, credit card issuers, and other financial organizations
can benefit from NFC smart-phones, as password-protected smart-phones send data over encrypted wireless networks and can be much more secure than conventional credit and debit cards. They also can provide consumers with content to complement their current activity, such as recipe or idea videos when shopping at a supermarket having proper NFC tagequipped units. 11. What are the benefits of APIs? For programmers: The benefits of APIs are that they simplify the programmer’s job and ensure that all programs using the same API use that resource in the same manner. APIs are the common method for accessing information, websites, and databases. Business benefits of APIs include: APIs are channels to new customers and markets: APIs enable partners to use business assets to extend the reach of a company’s products or services to customers and markets they might not reach easily. APIs promote innovation: Through an API, people who are committed to a challenge or problem can solve it themselves. APIs are a better way to organize IT: APIs promote innovation by allowing everyone in a company to use each other’s assets without delay. APIs create a path to lots of Apps: Apps are going to be a crucial channel in the next 10 years. Apps are powered by APIs. Developers use APIs and combinations of APIs to create new user experiences. 12. Describe the components of a mobile communication infrastructure. Mobile infrastructure consists of the integration of technology, software, support, security measures, and devices for the management and delivery of wireless communications. Two components of wireless infrastructures are wireless LANs and WiMax. 13. What is the range of WiMAX? Why does it not need a clear line of sight? The range of WiMAX wireless broadband is 20 to 30 miles. It is based on IEEE 802.16 standards. Since it uses high frequency radio signals, it does not require a clear line of sight. 14. Why are VPNs used to secure extranets? An extranet is a private, company-owned network that can be logged into remotely via the Internet. Typical users are suppliers, vendors, partners, or customers. Basically, an extranet is a network that connects two or more companies so they that can securely share information. A major concern is the security of the transmissions that could be intercepted or compromised. One solution is to use virtual private networks (VPNs), which encrypt the packets before they are transferred over the network. VPNs consist of encryption software and hardware that encrypt, send, and decrypt transmissions. In effect, instead of using a leased line to create a dedicated, physical connection, a company can invest in VPN technology to create virtual connections routed through the Internet from the company’s private network to the remote site or employee.
15. How can group dynamics improve group work? How can it disrupt what groups might accomplish? Answers may vary. The following are some ideas: Group dynamics can improve group work as hearing the ideas and perspectives of others may encourage new ideas. The enthusiasm, energy, and inertia of a group also may help drive the project. Group dynamics can disrupt groups in several ways, such as dissension, people wanting their way, never being able to come to a consensus, group members hijacking the group, members getting off on tangents and not focusing on the issue at hand, and intimidation by a strong personality or higher-ranked individual. 16. What are the benefits of using software to conduct brainstorming in the cloud (remotely)? Online brainstorming tools can be accessed virtually from anywhere Internet access is available, reducing some expenses such as travel. Many of these tools allow users to post comments on their own time rather than having to meet at a particular time, however, virtual meetings may be necessary as well. Group dynamics may be less of an issue when using online collaborative tools. 17. How do mobile devices contribute to carbon emissions? Almost all of these devices are powered by the burning of fossil fuels. Communications technology accounts for approximately 2 percent of global carbon emissions, a figure that is predicted to double by 2020 as end-user demand for high-bandwidth services with enhanced quality of experience explodes worldwide. 18. Discuss the ethical issues of anytime-anywhere accessibility. The technologies covered in this chapter blur work, social, and personal time. IT keeps people connected with no real off switch. Tools that are meant to improve the productivity and quality of life in general can also intrude on personal time. Managers need to be aware of the huge potential for abuse by expecting 24/7 response from workers. 19. What health and quality-of-life issues are associated with social networks and a 24/7 connected lifestyle? Management needs to consider ethical and social issues, such as quality of working life. Workers will experience both positive and negative impacts from being linked to a 24/7 workplace environment, working in computer-contrived virtual teams, and being connected to handhelds whose impact on health can be damaging. The importance of understanding ethical issues has been recognized by the Association to Advance Collegiate Schools of Business (AACSB International, aacsb.edu). For business majors, the AACSB International has defined Assurance of Learning Requirements for ethics at both the undergraduate and graduate levels. In Standard 15: Management of Curricula (AACSB Accreditation Standards, 2006), AACSB identifies general knowledge and skill learning experiences that include “ethical understanding and reasoning abilities” at the undergraduate level. At the graduate level, Standard 15 requires
learning experiences in management-specific knowledge and skill areas to include “ethical and legal responsibilities in organizations and society” (AACSB International Ethics Education Resource Center, 2006). 20. Is distracted driving an unsolvable problem? Explain. Answers will vary. However, distracted driving is a crime and a major cause of crashes.
ONLINE AND INTERACTIVE EXERCISES 21. Visit the Alcatel-Lucent website (www.alcatel-lucent.com) and search for “ecosustainability strategy.” a. Read about Alcatel’s eco-sustainability strategy. b. Describe how the company is developing eco-sustainability networks. In your opinion, is this an effective strategy? Explain. Answers will vary. Cloud computing will be critical to the future of energy-efficient networks, starting with cloud-enabled labs that share resources and the energy needed to test and develop solutions. c. Explain how the company is enabling a low carbon economy. What is its most significant contribution to sustainability? ICT applications and solutions where Alcatel-Lucent technology helps reduce the environmental impact of other sectors include: Smart grids deployed for power utilities Intelligent transport systems for transportation and logistics companies Energy and building management for smart cities Smart city services such as remote patient care and monitoring, state and local government applications, public safety, disaster management and cloud offerings (virtualization and dematerialization) Answers will vary. 22. Visit the Google Apps website. Identify three types of collaboration support and their value in the workplace. Answers will vary. 23. Compare the various features of broadband wireless networks (e.g., 3G, Wi-Fi, and WiMAX).Visit at least three broadband wireless network vendors. Answers will vary. 3G networks support multimedia and broadband services, do so over a wider distance, and at faster speeds than prior 1G and 2G generations. 3G networks have far greater ranges because they use large satellite connections to telecommunication towers. Wi-Fi is the standard way computers connect to wireless networks. Nearly all computers have built-in Wi-Fi chips that allow users to find and connect to wireless routers. Wi-Fi technology allows devices to share a network or Internet connection without the need to connect to a commercial network. Wi-Fi networks beam packets over short distances using part of the radio spectrum, or they can extend over larger areas, such as municipal Wi-Fi networks.
WiMAX operates on the same basic principles as Wi-Fi in that it transmits data from one device to another via radio signals. Wireless broadband WiMAX transmits voice, data, and video over high-frequency radio signals to businesses, homes, and mobile devices. It was designed to bypass traditional telephone lines and is an alternative to cable and DSL. WiMAX is based on the IEEE 802.16 set of standards and the metropolitan area network (MAN) access standard. Its range is 20 to 30 miles from the base station, speed is 70 Mbps, and it does not require a clear line of sight to function. a. Prepare a list of capabilities of each network. Answers will vary. b. Prepare a list of actual applications that each network can support. Answers will vary. c. Comment on the value of such applications to users. How can the benefits be assessed? Answers will vary.
APPLY IT CONCEPTS TO BUSINESS DECISIONS 24. View the iMindMap Online tutorial on YouTube at http://www.youtube.com/watch?v=EuB0zyV_lJY. Describe the potential value of sharing maps online and synching maps with other computers or devices. What is your opinion of the ease or complexity of the iMindMap interface? Creating mindmaps online that can be easily synched and shared with others reduces work redundancy and allows users to easily collaborate on a mind map, adding notes and changes on their own or together. The iMindMap has a very user friendly interface that is simple, clean, and easy to use. Opinion: Answers will vary. 25. Visit Google Green at http://www.google.com/green/bigpicture. Describe Google’s efforts to minimize the environmental impact of its services. Do you believe that Google can reduce its carbon footprint beyond zero, as the company claim? Explain your answer. Data centers: Google’s data centers use 50% of the energy of most other data centers. This has saved Google over a billion dollars in energy costs so far. Renewable energy: In 2013, 35% of Google’s energy consumption was from renewable resources. Google buys energy directly from wind farmers near their data centers. Initiatives: Google offices have solar panels on their roofs. They also encourage their employees to bike to work, bike between campus buildings, use electric vehicles or the GFleet on campus, or use their biodiesel powered shuttle program. Carbon offsets: Even after efforts in efficiency and renewable energy, Google still impacts the environment. They help bring their footprint to zero by investing in projects that reduce carbon emissions at another source outside of Google. Customers: Google is also trying to help customers reduce their carbon footprint by providing easy to access alternatives such as biking and walking routes with Google Maps; helping commuters use public transportation with Google Transit; helping people
find electric charging stations with GoogleMaps, and providing good driving directions with Android GPS. Opinion: Answers will vary. Google is working hard at reducing its carbon footprint and has invested hundreds of millions of dollars in renewable energy projects such as large scale wind and rooftop solar panels that create far more renewable energy for the world than they consume as a company.
CASES OPENING CASE 1: SONY BUILDS AN IPV6 NETWORK TO FORTIFY COMPETITIVE EDGE 1. Why might IPv6 be a business continuity issue for organizations? Answers may vary. As businesses grow, their internal networks may have compatibility issues, such as conflicting IP addresses, as was the case with Sony. Use of IPv6 eliminated this issue, enabling Sony employees in all divisions to take advantage of the productivity benefits of real-time collaboration applications. Also, as available IPv4 Internet addresses decrease and IPv6 becomes more widespread, businesses will need to be able to be compatible with IPv6 in order to continue and grow. 2. Explain how Sony’s IPv4 enterprise network was restricting the productivity of its workers. Once they integrated the previously independent networks, the duplicate IP address caused traffic-routing conflicts. Routing conflicts, in turn, led to the following problems: 1. Sony’s employee communication options were severely limited, which harmed productivity. 2. File sharing and real-time communication were not possible. 3. Introducing cloud services was difficult and time-consuming. 3. What problems did duplicate IP addresses cause at Sony? Give an analogy. Devices connected to the independent networks were using the same IP addresses. The duplicate IP address caused traffic-routing conflicts. That situation is comparable to users having duplicate telephone numbers—making it impossible to know which phone was being called. Also, phones with the same number could not call each other. 4. Why did Sony need to run both protocols on its network instead of replacing IPv4 with IPv6? Running both protocols on the same network at the same time was necessary because Sony’s legacy devices and apps only worked on IPv4. 5. Describe the strategic benefit of Sony’s IPv6 implementation.
The use of IPv6 eliminated the issue of conflicting IP addresses enabling Sony employees in all divisions to take advantage of the productivity benefits of real-time collaboration applications. Other business improvements are: • Flexibility to launch new businesses quickly • Reduced TCO of enterprise network • Network without communications constraints, supporting “One Sony” through information systems 6. Do research to determine the accuracy of this prediction: “Today, almost everything on the Internet is reachable over IPv4. In a few years, both IPv4 and IPv6 will be required for universal access.” Answers may vary. Mainly, by allowing all devices, including legacy devices, to have Internet access.
CASE 2 BUSINESS CASE: GOOGLE MAPS API FOR BUSINESS 1. Describe Google Maps API. The Google Maps API delivers the full power of Google’s routing engine to applications. Among other features, it: • Generates routes between up to 23 locations for driving, walking, or cycling. • Generates routes to avoid toll roads or highways. • Reduces travel time by calculating the optimal order to visit each location. • Calculates travel time and distance between locations, for example, to offer users a way to filter search results by drive time. 2. Why do you think Google provides free noncommercial use of its Maps API? Answers may vary. Use by not-for-profit companies; developer use as they work on new applications. 3. How many times have you used a website’s mapping feature for directions or to calculate distance? How did having a familiar interface improve your experience? Answers may vary. 4. Google claims that its Maps API helps a company’s customers and employees make better business and purchasing decisions by visualizing important information on a familiar map. Explain how data visualization provides these benefits. Give two examples in your explanation. Answers may vary. Symbols can identify different types of locations (restaurants, gasoline, recreation, etc.) helping customers (and businesses) locate the type of businesses in their area. Demographics can help businesses decide if an area is appropriate for sustaining future expansion plans.
CASE 3 VIDEO CASE: FRESH DIRECT CONNECTS FOR SUCCESS 1. Visit and explore the Fresh Direct website at www.freshdirect.com to learn about the company.
2. Visit the Cisco website at www.cisco.com. 3. Search for the video “Fresh Direct Produce.” The URL is www.cisco.com/cisco/web/solutions/small_business/resource_center/index.html. 4. Watch the video to learn how Fresh Direct uses network technology to connect employees, suppliers, and customers. Meet CEO Davis Yung and see how Cisco wireless technology gives his team constant connectivity to meet customer demands (video runs 2:50 minutes). 5. Describe how network technology enables Fresh Direct’s business model. Fresh Direct relies on rapid communication with suppliers, business partners, and customers. Produce is a perishable product, and market conditions can change in an instant, so speed is critical to success. As Fresh Direct grew, the company found that its network and phone system could no longer keep up with its fast-paced business operations. The company had no wireless networking capabilities, and its call management features were also limited, making it difficult to reach a highly mobile workforce. The aging phone system also hampered the company’s ability to support growth, which created serious strategic planning issues. The Cisco solution supports all of the company’s voice, data, and wireless communications on one secure network. Its intelligent call-handling features make communication fast and simple, regardless of location, improving the company’s efficiency and productivity. 6. What factors are critical to Fresh Direct’s performance? Answers may vary. Warehouse operations are a critical part of the Fresh Direct business, so the company added Cisco Wireless LAN Controllers and Access Points for secure wireless voice and data networking. Wireless capability gives them the communication tools needed to keep up in a fast-paced environment. They also are considering applying the wireless network to support barcode systems for inventory control. Plans for expansion required a scalable platform. Managing and maintaining the solution is much simpler than before, because Cisco Unified Communications provides plug-andplay support for phones and other network devices. They no longer have to call a technician just to add a phone or other device. Safeguarding sensitive business information was an important priority for Fresh Direct. The Cisco firewall allowed them to enforce only authorized user access to their network.
More download links: information technology for management 10th edition solutions manual information technology for management 10th edition test bank information technology for management 10th edition pdf information technology for management 10th edition pdf download information technology for management turban 10th edition pdf
information technology for management 10th edition free download information technology for management 10th edition ebook information technology for management 10th edition pdf free information technology for management: digital strategies for insight pdf
View more...
Comments