81
Software 11/03/2012 6:59:00 PM 9.1 What is a software and what is the difference from hardware ? computing hardware : we‘re talking about the physical components of information technologythe equipment that you can physically touch, including computers, storage devices, networking equipment, and other peripherals.

Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

Software 11/03/2012 6:59:00 PM

9.1

What is a software and what is the difference from hardware ?

computing hardware : we‘re talking about the physical components of information

technology—the equipment that you can physically touch, including computers, storage

devices, networking equipment, and other peripherals.

It‘s software that makes the magic of computing happen.--> more precisely ,it’s the

instructions—the software code—that enable a computer to do something wonderful, driving

the limitless possibilities of information technology.

Software refers to a computer program or collection of programs—sets of instructions that

tell the hardware what to do. Software gets your computer to behave like a Web browser or

word processor, makes your iPod play music and video, and enables your bank‘s ATM to

spit out cash.

Conclusion : Software refers to a computer program or collection of programs. It enables

computing devices to perform tasks.

What are the major classifications of software and give examples of each.

Page 2: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

Conclusion :

You can think of software as being part of a layer cake, with hardware at the bottom; the

operating system controlling the hardware and establishing standards, the applications

executing one layer up, and the users at the top.

*understand that softwares are everywhere, from computers to cellphones to ATM,cars

9.2 Operating Systems

What is an operating system and why computing devices require operating systems. ?

The operating system has come role to control the computing hardware

Differences between the Windows and Mac operating systems are evident throughout the

user interface, particularly when a program interacts with hardware.( These items look and

behave differently because each of these functions touches the hardware, and the team that

developed Microsoft Windows created a system distinctly different from their Macintosh

counterparts at Apple)

Conclusion : The operating system (sometimes called the ―OS‖) provides a common set of

controls for managing computer hardware, making it easier for users to interact with

computers and for programmers to write application software. ex Similarly, when Apple

provided developers with a common set of robust, easy-to-use standards for the iPhone and

(via the App Store) an easy way for users to install these applications on top of the

iPhone/iPod touch/iPad‘s operating system (iOS), software development boomed, and Apple

became hands-down the most versatile mobile computing device available

How embedded systems extend Moore‘s Law, allowing firms to create ―smarter‖ products

and services ?

many smaller, special-purpose computing devices have their operating systems installed on

nonvolatile memory, often on read-only memory (ROM) chips.

Page 3: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

Control programs stored on chips are sometimes referred to as firmware(software store on

non-volatile memory chips).

Another term you might hear is embedded systems.--> As computing gets cheaper, special-

purpose technology is increasingly becoming embedded into all sorts of devices like cars,

picture frames, aircraft engines, photocopiers, and heating and air conditioning systems

Moore‘s law enables embedded systems.

Ex : The Otis Elevator Company, a division of United Technologies, uses embedded systems

in its products to warn its service centers when the firm‘s elevators, escalators, and moving

walkways need maintenance or repair

Conclusion : Embedded systems are special-purpose computer systems designed to perform

one or a few dedicated functions, and are frequently built into conventional products like

cars, air conditioners, and elevators.

Embedded systems can make products and services more efficient, more reliable, more

functional, and can enable entire new businesses and create or reinforce resources for

competitive advantage.

9.3 Application Software

Application software focuses on the work of a user or an organization.

What is the difference between desktop and enterprise software ?

Operating systems are designed to create a platform( product and services that allow for the

developtment of software product and other complementary goods) so that programmers can

write additional applications, allowing the computer to do even more useful things.

While operating systems control the hardware, application software (or even just apps)

perform the work that users and firms are directly interested in accomplishing where real

work gets done

Page 4: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

Desktop software refers to applications installed on a personal computer—your browser,

your Office suite (e.g., word processor, spreadsheet, presentation software), photo editors,

and computer games are all desktop software.

Enterprise software refers to applications that address the needs of multiple, simultaneous

users in an organization or work group.--> enterprise software programs to keep track of their

inventory, record sales, manage payments to suppliers, cut employee paychecks, and handle

other functions.

Conclusion : The more application software that is available for a platform, the more

valuable that platform becomes.. Desktop applications are typically designed for a single

user. Enterprise software supports multiple users in an organization or work group.

What are the categories of enterprise software ?

customer relationship management (CRM) systems used to support customer-related sales

and marketing activities

supply chain management (SCM) systems that can help a firm manage aspects of its value

chain, from the flow of raw materials into the firm through delivery of finished products and

services at the point-of-consumption

business intelligence (BI) systems, which use data created by other systems to provide

reporting and analysis for organizational decision making

Conclusion : These systems are used in conjunction with database management systems,

programs that help firms organize, store, retrieve, and maintain data.

What is an ERP (enterprise resource planning) software package ?

Since many firms have similar procedures for accounting, finance, inventory management,

and human resource functions, it often makes sense to buy a software package (a software

product offered commercially by a third party) to support some of these functions.

Page 5: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

enterprise resource planning (ERP) software packages serve precisely this purpose

(integrate the functions of business : accounting, inventory, human ressources).

Conclusion :

What is the relationship between the DBMS (database system) and the other

enterprise software systems

Most enterprise software works in conjunction with a

database management system (DBMS), sometimes referred to as a ―database system.‖

The database system stores and retrieves the data that an application creates and uses.

it‘s often useful to think of a firm‘s database systems as sitting above the operating system,

but under the enterprise applications

Many ERP systems and enterprise software programs are configured to share the same

database system so that an organization‘s different programs can use a common, shared set of

data.( Firms that don‘t have common database systems with consistent formats across their

enterprise often struggle to efficiently their value chain.)

Exemple of efficient coordination of software between organization : Sell a product?

Deduct it from your inventory. When inventory levels get too low, have your computer

systems send a message to your supplier‘s systems so that they can automatically build and

ship replacement product to your firm.

Conclusion : The DBMS stores and retrieves the data used by the other enterprise

applications. Different enterprise systems can be configured to share the same database

system in order share common data.

firms with common database systems and standards often benefit from increased

organizational insight and decision-making capabilities.

Page 6: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

Recognize both the risks and rewards of installing packaged enterprise systems

Conclusion : Enterprise systems can cost millions of dollars in software, hardware,

development, and consulting fees, and many firms have failed when attempting large-scale

enterprise system integration. Simply buying a system does not guarantee its effective

deployment and use.

When set up properly, enterprise systems can save millions of dollars and turbocharge

organizations by streamlining processes, making data more usable, and easing the linking of

systems with software across the firm and with key business partners.

9.4 Distributed Computing

Understand the concept of distributed computing and its benefits.

When computers in different locations can communicate with one another, this is often

referred to as distributed computing.

Let‘s start with the term server. This is a tricky one because it‘s frequently used in two ways:

(1) in a hardware context a server is a computer that has been configured to support requests

from other computers (e.g., Dell sells servers) and (2) in a software context a server is a

program that fulfills requests (e.g., the Apache open source Web server)

Understand the client-server model of distributed computing.

The World Wide Web, like many other distributed computing services, is what geeks call a

client-server system.

Client-server refers to two pieces of software, a client that makes a request, and a server that

receives and attempts to fulfill the request

Ex : the client is the browser (e.g., Internet Explorer, Firefox, Safari). When you type a Web

site‘s address into the location field of your browser, you‘re telling the client to ―go find the

Web server software at the address provided, and tell the server to return the Web site

requested.‖

Page 7: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

Know what Web services are and the benefits that Web services bring firms.

more advanced distributed environments may use a category of software called an

application server.

The application server (or app server) houses business logic for a distributed system.

The World Wide Web consortium defines Web services as software systems designed to

support interoperable machine-to-machine interaction over a network

Individual Web services served up by the app server are programmed to perform different

tasks: ex.-->returning a calculation (―sales tax for your order will be $11.58‖), accessing a

database program (―here are the results you searched for‖), or even making a request to

another server in another organization (―Visa, please verify this customer‘s credit card

number for me‖).

Page 8: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

In this multitiered distributed system, client browsers on various machines (desktop, laptop,

mobile) access the system through the Web server. The cash register doesn’t use a Web

browser, so instead the cash register logic is programmed to directly access the services it

needs from the app server. Web services accessed from the app server may be asked to do a

variety of functions, including perform calculations, access corporate databases, or even

make requests from servers at other firms (for example, to verify a customer’s credit card).

Appreciate the importance of messaging standards and understand how sending messages

between machines can speed processes, cut costs, reduce errors, and enable new ways of

doing business

Page 9: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

When computers can talk together (instead of people), this often results in fewer errors, time

savings, cost reductions, and can even create whole new ways of doing business!

Each Web service defines the standard method for other programs to request it to perform a

task and defines the kind of response the calling client can expect back.

These standards are referred to as application programming interfaces (APIs).

Look at the advantages that Web services bring a firm like Amazon. Using Web services, the

firm can allow the same order entry logic to be used by Web browsers, mobile phone

applications, or even by third parties who want to access Amazon product information and

place orders with the firm

Organizations that have created a robust set of Web services around their processes and

procedures are said to have a service-oriented architecture (SOA).

Example : Southwest Airlines had a Web site where customers could book flights, but many

customers also wanted to rent a car or book a hotel, too. To keep customers on

Southwest.com, the firm and its hotel and rental car partners created a set of Web services

and shared the APIs. Now customers visiting Southwest.com can book a hotel stay and rental

car on the same page where they make their flight reservation. This process transforms

Southwest.com into a full service travel destination and allows the site to compete head-to-

head with the likes of Expedia, Travelocity, and Orbitz.

KEY TAKEAWAYS

Client-server computing is a method of distributed computing where one program (a client)

makes a request to be fulfilled by another program (a server).

Server is a tricky term and is sometimes used to refer to hardware. While server-class

hardware refers to more powerful computers designed to support multiple users, just about

any PC or notebook can be configured to run server software.

Page 10: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

Web servers serve up Web sites and can perform some scripting.

Most firms serve complex business logic from an application server.

Isolating a system‘s logic in three or more layers (presentation or user interface, business

logic, and database) can allow a firm flexibility in maintenance, reusability, and in handling

upgrades.

Web services allow different applications to communicate with one another. APIs define the

method to call a Web service (e.g., to get it to do something), and the kind of response the

calling program can expect back.

Web services make it easier to link applications as distributed systems, and can make it easier

for firms to link their systems across organizations.

Popular messaging standards include EDI (older) and XML. Sending messages between

machines instead of physical documents can speed processes, drastically cut the cost of

transactions, and reduce errors.

Distributed computing can yield enormous efficiencies in speed, error reduction, and cost

savings and can create entirely new ways of doing business.

When computers can communicate with each other (instead of people), this often results in

fewer errors, time savings, cost reductions, and can even create whole new ways of doing

business.

Web services, APIs, and open standards not only transform businesses, they can create entire

new firms that change how we get things done.

Page 11: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

9.5 Writing Software

Understand, at a managerial level, what programming languages are and how software is

developed.

Programmers write software in a programming language.

most commercial software is written in C++ (pronounced “see plus plus”) or C#

(pronounced “see sharp”)

Most professional programmers use an integrated development environment (IDE) to

write their code : The IDE includes a text editor, a debugger for sleuthing out errors, and

other useful programming tools.

The IDE will also compile a programmer’s code, turning the higher-level lines of instructions

that are readable by humans into lower-level instructions expressed as the patterns of ones

and zeros that are readable by a computer’s microprocessor.

Conclusion : Programs are often written in a tool called an IDE, an application that includes an

editor (a sort of programmer’s word processor), debugger, and compiler, among other tools.

Recognize that an operating system and microprocessor constrain the platform upon which

most compiled application software will run.

Look at the side of a box of commercial software and you’re likely to see system

requirements that specify the operating system and processor that the software is designed

for (e.g., “this software works on computers with Windows 7 and Intel-compatible

processors”).

Conclusion : Compiling takes code from the high-level language that humans can

understand and converts them into the sets of ones and zeros in patterns representing

instructions that microprocessors understand. Most software is written for a platform—a

combination of an operating system and microprocessor.

Page 12: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

Understand what Java is and why it is significant.

Know what scripting languages are.

Java is a programming language designed to run everywhere (developped by Sun

Microsystems)

Java programmers don’t write code with specific operating system commands (say for

Windows, Mac OS X, or Linux), instead they use special Java commands to control their user

interface or interact with the display and other hardware

Java Virtual Machine (JVM), a software layer that interprets Java code so that it can be

understood by the operating system and processor of a given computer

Java’s platform independence—the ability for developers to “write once, run

everywhere”—is its biggest selling point

As long as the machine receiving the Java code has a JVM, then the Java application should

run. However, Java has not been popular for desktop applications. Since Java isn’t

optimized to take advantage of interface elements specific to the Mac or Windows, most

Java desktop applications look clunky and unnatural.

Conclusion : Java is designed to be platform independent. Computers running Java have a

separate layer called a Java Virtual Machine that translates (interprets) Java code so that it can

be executed on an operating system/processor combination. In theory, Java is “write once, run

everywhere,” as opposed to conventional applications that are written for an operating system

and compiled for an OS/processor combination.

Java is popular on mobile phones, enterprise computing, and to make Web sites more

interactive. Java has never been a successful replacement for desktop applications, largely

because user interface differences among the various operating systems are too great to be

easily standardized.

Page 13: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

9.6 Understanding Technology beyond the Price Tag: Total Cost of Ownership (TCO) and

the Cost of Tech Failure

What are the different cost categories that comprise total cost of ownership ?

Managers should recognize that there are a whole host of costs that are associated with

creating and supporting an organization’s information systems.

There are costs associated with design and documentation (both for programmers and for

users

There are also testing costs. New programs should be tested thoroughly across the various

types of hardware the firm uses, and in conjunction with existing software and systems,

before being deployed throughout the organization.

Any errors that aren’t caught can slow down a business or lead to costly mistakes that could

ripple throughout an organization.

Studies have shown that errors not caught before deployment could be one hundred times

more costly to correct than if they were detected and corrected beforehand

The price tag and complexity of these tasks can push some managers

to think of technology as being a cost sink rather than a strategic

resource.

These tasks are often collectively referred to as the

total cost of ownership (TCO) of an information system

Conclusion : The total cost of ownership of systems can include software development and

documentation, or the purchase price and ongoing license and support fees, plus

configuration, testing, deployment, maintenance, support, training, compliance auditing,

Page 14: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

security, backup, and provisions for disaster recovery. These costs are collectively referred

to as TCO, or a system’s total cost of ownership

How come once a system is implemented, the costs of maintaining and supporting the

system continue. ?

Once a system is “turned on,” the work doesn’t end there. Firms need to constantly engage

in a host of activities to support the system that may also include the following:

providing training and end user support

collecting and relaying comments for system improvements

auditing systems to ensure compliance (i.e., that the system operates within the firm’s legal

constraints and industry obligations)

providing regular backup of critical data

planning for redundancy and disaster recovery in case of an outage

vigilantly managing the moving target of computer security issues

Conclusion :.

What are the reasons that technology development projects fail and the measures that can

be taken to increase the probability of success ?

Sometimes technology itself is to blame, other times it’s a failure to test systems

adequately, and sometimes it’s a breakdown of process and procedures used to set

specifications and manage projects.

Ex : a multimillion-dollar loss on the NASA Mars Observer was traced back to a laughably

simple oversight—Lockheed Martin contractors using English measurements, while the folks

at NASA used the metric system. [5] Yes, a $125 million taxpayer investment was lost

because a bunch of rocket scientists failed to pay attention to third grade math.

Page 15: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

The most common factors include the following: [6]

Unrealistic or unclear project goals

Poor project leadership and weak executive commitment

Inaccurate estimates of needed resources

Badly defined system requirements and allowing “feature creep” during development

Poor reporting of the project’s status

Poor communication among customers, developers, and users

Use of immature technology

Unmanaged risks

Inability to handle the project’s complexity

Sloppy development and testing practices

Poor project management

Stakeholder politics

Commercial pressures (e.g., leaving inadequate time or encouraging corner-cutting)

Improve Success

Information systems organizations can work to implement procedures to improve the

overall quality of their development practices.

Mechanisms for quality improvement include

capability maturity model integration (CMMI), which gauge an organization’s process

maturity and capability in areas critical to developing and deploying technology projects,

and provides a carefully chosen set of best practices and guidelines to assist quality and

process improvement.

why reinvent the wheel when there is an opportunity to learn from and follow blueprints

used by those who have executed successful efforts.

Page 16: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

When methodologies are applied to projects that are framed with clear business goals and

business metrics, and that engage committed executive leadership, success rates can

improve dramatically

Conclusion : Information systems development projects fail at a startlingly high rate. Failure

reasons can stem from any combination of technical, process, and managerial decisions.

One in three technology development projects fail to be successfully deployed. S

organizations can employ project planning and software development methodologies to

implement procedures to improve the overall quality of their development practices.

Page 17: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

Software in Flux: Partly Cloudy and Sometimes Free 11/03/2012 6:59:00 PM

10.1 Introduction

How low marginal costs, network effects, and switching costs have combined to help create

a huge and important industry

Unlike physical products assembled from raw materials, the marginal cost to produce an

additional copy of a software product is effectively zero

Network effects and switching cost can also offer a leading software firm a degree of

customer preference and lock in that can establish a firm as a standard, and in many cases

creates winner-take-all (or at least winner-take-most) markets.

Conclusion : The software business is attractive due to near-zero marginal costs and an

opportunity to establish a standard—creating the competitive advantages of network

effects and switching costs.

What are the changes that the software industry is experimenting ? (include open source

software, cloud computing and software as a service)

But as great as the business has been, the fundamental model powering the software

industry is under assault. Open source software (OSS) offerings—free alternatives where

anyone can look at and potentially modify a program’s code—pose a direct challenge to the

assets and advantages cultivated by market leaders

How can we compete with free

And if free software wasn’t enough of a shock, the way firms and users think about software

is also changing

A set of services referred to as cloud computing is making it more common for a firm to

move software out of its own IS shop so that it is run on someone else’s hardware

Page 18: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

In one variant of this approach known as software as a service (SaaS), users access a

vendor’s software over the Internet, usually by simply starting up a Web browser.

With SaaS, you don’t need to own the program or install it on your own computer.

Hardware clouds can let firms take their software and run it on someone else’s hardware

Another software technology called virtualization can make a single computer behave like

many separate machines. This function helps consolidate computing resources and creates

additional savings and efficiencies.

Conclusion : New trends in the software industry, including open source

software (OSS), hardware clouds, software as a service (SaaS), and

virtualization are creating challenges and opportunity across tech markets.

Understanding the impact of these developments can help a manager make

better technology choices and investment decisions. These transitions are

important. They mean that smaller firms have access to the kinds of burly,

sophisticated computing power than only giants had access to in the past.

10.2 Open Source

What is open source software and understand how it differs from conventional

offerings ?

Open source software (OSS) is often described as free. While most OSS can be

downloaded for free over the Internet, it’s also “free” as in liberated

The source code for OSS products is openly shared. Anyone can look at the

source code, change it, and even redistribute it, provided the modified

software continues to remain open and free.

Page 19: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

The old notion of open source being fueled on the contributions of loners

tooling away for the glory of contributing to better code is now largely

inaccurate.

OSS is not only available for free, but also makes source code available for

review and modification

While open source alternatives are threatening to conventional software

firms, some of the largest technology companies now support OSS initiatives

and work to coordinate standards, product improvements, and official

releases.

10.3 Why Open Source?

What are the primary reasons firms choose to use OSS (open sourcing) ?

Cost : Free alternatives to costly commercial code can be a tremendous motivator,

particularly since conventional software often requires customers to pay for every copy

used and to pay more for software that runs on increasingly powerful hardware

Reliability : the more people who look at a program’s code, the greater the likelihood that

an error will be caught and corrected. The open source community harnesses the power of

legions of geeks who are constantly trawling OSS products, looking to squash bugs and

improve product quality

How OSS can beneficially impaxt industry and government ?

Security : OSS advocates also argue that by allowing “many eyes” to examine the code,

the security vulnerabilities of open source products come to light more quickly and can be

addressed with greater speed and reliability. Many OSS vendors offer security focused

(sometimes called hardened) versions of their products. These can include systems that

Page 20: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

monitor the integrity of an OSS distribution, checking file size and other indicators to be

sure that code has not been modified and redistributed by bad guys

Scability : allows a firm to scale from start-up to blue chip without having to significantly

rewrite their code, potentially saving big on software development costs.

Agility and Time to Market : Vendors who use OSS as part of product offerings may be able

to skip whole segments of the software development process, allowing new products to

reach the market faster than if the entire software system had to be developed from

scratch, in-house. (Motorola has claimed that customizing products built on OSS has helped

speed time-to-market for the firm’s mobile phones, while the team behind the Zimbra e-

mail and calendar effort built their first product in just a few months by using some forty

blocks of free code.)

10.4 Examples of Open Source Software

There are thousands of open source products available, covering nearly every software

category. Many have a sophistication that rivals commercial software products.

Not all open source products are contenders. Less popular open source products are not

likely to attract the community of users and contributors necessary to help these products

improve over time (again we see network effects are a key to success—this time in

determining the quality of an OSS effort).

Just about every type of commercial product has an open source equivalent.

10.5 Why Give It Away? The Business of Open Source

Understand the disproportional impact OSS has on the IT market.

By lowering the cost of computing, open source efforts make more computing options

accessible to smaller firms. More reliable, secure computing also lowers costs for all users.

OSS also diverts funds that firms would otherwise spend on fixed costs, like operating

Page 21: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

systems and databases, so that these funds can be spent on innovation or other more

competitive initiatives.

Think about Google, a firm that some estimate has over 1.4 million servers. Imagine the

costs if it had to license software for each of those boxes!

Understand how vendors make money on open source.

One way is by selling support and consulting services

in revenue from paying customers subscribing for access to software updates and support

services

ex : Oracle, a firm that sells commercial ERP and database products, provides Linux for free,

selling high-margin Linux support contracts for as much as five hundred thousand dollars

And every dollar saved on buying someone else’s software product means more money IBM

customers can spend on IBM computers and services

With OSS, hardware firms spend less money than they would in the brutal, head-to-head

competition where each once offered a “me too” operating system that was incompatible

with rivals but offered little differentiation.

Microsoft recognizes that if a whole generation of first-time computer users grows up

without Windows, they may favor open source alternatives years later when starting their

own businesses. As a result, Microsoft has begun offering low-cost versions of Windows (in

some cases for as little as seven dollars) in nations where populations have much lower

incomes.

Know what SQL and MySQL are

MySQL (pronounced “my sequel”) is the “M” in the LAMP stack, and is used by

organizations as diverse as FedEx, Lufthansa, NASA, Sony, UPS, and YouTube.

Page 22: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

The “SQL” in name stands for the structured query language, a standard method for

organizing and accessing data

Since all of these databases are based on the same standard, switching costs are lower, so

migrating from a commercial product to MySQL’s open source alternative is relatively easy.-

-> BAD GOR COMMERCIAL FIRLMS

Conclusion: MySQL is the dominant open source database software product. Adoption of the

SQL standard eases some issues with migrating from commercial products to MySQL.

10.6 Cloud Computing: Hype or Hope?

What is the concepts of cloud computing

Its replacing computing resources (either an organization’S or individual’s harware with

services provided over the internet.

What are the two major categories of cloud computing

(1) software as a service (SaaS), where a firm subscribes to a third-party software-replacing

service that is delivered online, and

(2) models often referred to as utility computing, which can include variants such as

platform as a service (PaaS) and infrastructure as a service (IaaS).

Using these latter techniques, an organization develops its own systems, but runs them

over the Internet on someone else’s hardware.

10.7 The Software Cloud: Why Buy When You Can Rent?

Page 23: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

How come firms usins SaaS product dramatically lower several costs associated with their

information system ?

Firms using SaaS products can dramatically lower several costs associated with the care and

feeding of their information systems, including software licenses, server hardware, system

maintenance, and IT staff.

Cloud computing tells you don’t download or buy any more software. Instead let someone

else run it on their hard disk and deliver the result over the internet.

Organizations that adopt SaaS forgo the large upfront costs of buying and installing

software packages. For large enterprises, the cost to license, install, and configure products

like ERP and CRM systems can easily run into the hundreds of thousands or even millions of

dollar

Know how SaaS vendors earn their money.

Most SaaS firms earn money via a usage-based pricing model akin to a monthly

subscription.

What are the benefits to users that accrue from using SaaS.

Save money:

additional costs like annual maintenance contracts have also been rising as rivals fail or get

bought up

There’s also the added cost for the IT staff needed to run these systems.

Firms that adopt software as a service never actually buy a system’s software and

hardware, so these systems become a variable operating expense

Reduce the financial risks associated with making a large capital investment in information

systems

SaaS offerings also provide the advantage of being highly scalable. :

Page 24: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

Some firms might expect systems to be particularly busy during tax time or the period

around quarterly financial reporting deadlines, while others might have their heaviest

system loads around a holiday season.

But sometimes these loads are difficult to predict, and if the difference between high

workloads and average use is great, a lot of that expensive computer hardware will spend

most of its time doing nothing.

In SaaS, however, the vendor is responsible for ensuring that systems meet demand

fluctuation. Vendors frequently sign a service level agreement (SLA) with their customers to

ensure a guaranteed uptime and define their ability to meet demand spikes.

the potential for higher quality and service levels :

SaaS firms handle backups, instantly deploy upgrades and bug fixes, and deal with the

continual burden of security maintenance

Be able to list the benefits to vendors from deploying SaaS.

While a packaged software company like SAP must support multiple versions of its software

to accommodate operating systems like Windows, Linux, and various flavors of Unix, an

SaaS provider develops, tests, deploys, and supports just one version of the software

executing on its own servers.

SaaS vendors are more attuned to customer needs. Since SaaS firms run a customer’s

systems on their own hardware, they have a tighter feedback loop in understanding how

products are used (and why they fail)—potentially accelerating their ability to enhance their

offerings

impact distribution costs and capacity. ;

As much as 30 percent of the price of traditional desktop software is tied to the cost of

distribution—pressing CD-ROMs, packaging them in boxes, and shipping them to retail

Page 25: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

outlets. [4] Going direct to consumers can cut out the middleman, so vendors can charge

less or capture profits that they might otherwise share with a store or other distributor.

SaaS allows a vendor to counter the vexing and costly problem of software piracy. It’s just

about impossible to make an executable, illegal copy of a subscription service that runs on a

SaaS provider’s hardware.

What are the risks associated with SaaS ?

The largest concerns involve the tremendous dependence a firm develops with its SaaS

vendor

And in addition to the switching costs associated with switching on conventional software

platforms, switching SaaS vendors may involve the slow and difficult task of transferring

very large data files over the Internet.

Having all of your eggs in one basket can leave a firm particularly vulnerable.

If a traditional software company goes out of business, in most cases its customers can still

go on using its products. But if your SaaS vendor goes under, you’re hosed.

They’ve got all your data, and even if firms could get their data out, most organizations

don’t have the hardware, software, staff, or expertise to quickly absorb an abandoned

function.

Firms that buy and install packaged software usually have the option of sticking with the old

stuff as long as it works, but organizations adopting SaaS may find they are forced into

adopting new versions

any radical changes in a SaaS system’s user interface or system functionality might result in

unforeseen training costs, or increase the chance that a user might make an error.

Page 26: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

Relying on an Internet connection also means that data is transferred to and from a SaaS

firm at Internet speeds, rather than the potentially higher speeds of a firm’s internal

network.

Any time a firm allows employees to access a corporation’s systems and data assets from a

remote location, a firm is potentially vulnerable to abuse and infiltration.

Conclusion :

Risks are

concern about the long-term viability of partner firms.

users may be forced to migrate to new versions—possibly incurring unforeseen training

costs and shifts in operating procedures.

reliance on a network connection—which may be slower, less stable, and less secure.

data asset stored off-site—with the potential for security and legal concerns.

limited configuration, customization, and system integration options compared to packaged

software or alternatives developed in-house.

the user interface of Web-based software is often less sophisticated and lacks the richness of

most desktop alternatives.

ease of adoption may lead to pockets of unauthorized IT being used throughout an

organization.

10.9 The Hardware Cloud: Utility Computing and Its Cousins

Distinguish between SaaS and hardware clouds.

While SaaS provides the software and hardware to replace an internal information system,

sometimes a firm develops its own custom software but wants to pay someone else to

run it for them.

That’s where hardware clouds, utility computing, and related technologies come in.

Page 27: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

In this model, a firm replaces computing hardware that it might otherwise run on-site with a

service provided by a third party online.-->hardware computing

What are the concepts of cloud computing, cloudbursting, and black swan events.

In a cloudbursting scenario a firm’s data center running at maximum capacity can

seamlessly shift part of the workload to IBM’s cloud, with any spikes in system use metered,

utility style.

Cloudbursting is appealing because forecasting demand is difficult and can’t account for the

ultrarare, high-impact events, sometimes called black swans.

Understand the challenges and economics involved in shifting computing hardware to the

cloud.

For all the hype about cloud computing, it doesn’t work in all situations.

Installing a complex set of systems on someone else’s hardware can be a brutal challenge

and in many cases is just about impossible. (sometimes inhouse software)

For that reason we can expect most cloud computing efforts to focus on new software

development projects rather than options for old software.

Firms considering cloud computing need to do a thorough financial analysis, comparing the

capital and other costs of owning and operating their own systems over time against the

variable costs over the same period for moving portions to the cloud. For high-volume, low-

maintenance systems, the numbers may show that it makes sense to buy rather than rent.

Cloud costs can seem super cheap at first. Sun’s early cloud effort offered a flat fee of one

dollar per CPU per hour. But users often also pay for the number of accesses and the

number of data transfers

Page 28: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

If a cloud vendor fails you and all your eggs are in one basket, then you’re down, too.

Vendors with multiple data centers that are able to operate with fault-tolerant provisioning,

Conclusion: Cloud computing varieties include platform as a service (PaaS), where vendors

provide a platform (e.g., the operating system and supporting software like database

management systems) but where client firms write their own code; and infrastructure as a

service (IaaS), where cloud vendors provide and manage the underlying infrastructure

(hardware and networking), while clients can create their own platform, choosing operating

systems, applications, and configurations.

Benefits and risks are similar to those discussed in SaaS efforts. Benefits include the use of the

cloud for handling large batch jobs or limited-time tasks, offloading expensive computing tasks,

and cloudbursting efforts that handle

10.10 Clouds and Tech Industry Impact

Cloud computing’s impact across industries is proving to be broad and significant.

Clouds can lower barriers to entry in an industry, making it easier for start-ups to launch

and smaller firms to leverage the backing of powerful technology.

Clouds may also lower the amount of capital a firm needs to launch a business, shifting

power away from venture firms in those industries that had previously needed more VC

money.

Clouds can shift resources out of capital spending and into profitability and innovation.

Hardware and software sales may drop as cloud use increases, while service revenues will

increase.

Cloud computing can accelerate innovation and therefore changes the desired skills mix and

job outlook for IS workers. Tech skills in data center operations, support, and maintenance

may shrink as a smaller number of vendors consolidate these functions.

Page 29: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

Demand continues to spike for business-savvy technologists. Tech managers will need even

stronger business skills and will focus an increasing percentage of their time on strategic

efforts. These latter jobs are tougher to outsource, since they involve an intimate

knowledge of the firm, its industry, and its operations.

The market for expensive, high margin, sever hardware is threatened by companies moving

applications to the cloud instead of investing in hardware.

Server farms require plenty of cheap land, low cost power, ultrafast fiber-optic connections,

and benefit from mild climates.

Sun, Microsoft, IBM, and HP have all developed rapid-deployment server farm modules that

are pre configured and packed inside shipping containers

10.11 Virtualization

What is virtualization software and how does it impact cloud computing ?

It si a software tool in the cloud computing toolbox

A server running virtualization software can create smaller compartments in memory that

each behave as a separate computer with its own operating system and resources

(transform one computing into multiple computer)

Virtualization can generate huge savings

Using virtualization, firms can buy and maintain fewer servers, each running at a greater

capacity. It can also power down servers until demand increases require them to come

online

What are the benefits to a fimr using virtualization ?

Virtualization software can lower a firm’s hardware needs, save energy, and boost

scalability.

Data center virtualization software is at the heart of many so-called private clouds and

scalable corporate data centers, as well as the sorts of public efforts described earlier.

Page 30: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

Virtualization also works on the desktop, allowing multiple operating systems (Mac OS X,

Linux, Windows) to run simultaneously on the same platform.

Virtualization software can increase data center utilization to 80 percent or more.

While virtualization is used to make public cloud computing happen, it can also be used in-

house to create a firm’s own private cloud.

A number of companies, including Microsoft and Dell, have entered the growing

virtualization market.

10.12 Make, Buy, or Rent

An organization can purchase packaged software from a vendor, use open source offerings,

leverage SaaS or other type of cloud computing, outsource development or other IT

functions to another firm either domestically or abroad, or a firm can develop all or part of

the effort themselves

When presented with all of these options, making decisions about technologies and systems

can seem pretty daunting.

The key variable to consider when choosing which option better suits the firm are :

Competitive Advantage—Do we rely on unique processes, procedures, or technologies that

create vital, differentiating competitive advantage? If so, then these functions aren’t a good

candidate to outsource or replace with a package software offering.

Security—Are there unacceptable risks associated with using the packaged software, OSS,

cloud solution, or an outsourcing vendor? Are we convinced that the prospective solution is

sufficiently secure and reliable? Can we trust the prospective vendor with our code, our data,

our procedures and our way of doing business? Are there noncompete provisions for vendor

staff that may be privy to our secrets? For off-site work, are there sufficient policies in place

for on-site auditing? If the answers to any of these questions is no, outsourcing might not

be a viable option.

Page 31: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

Legal and Compliance—Is our firm prohibited outright from using technologies? Are there

specific legal and compliance requirements related to deploying our products or services?

Even a technology as innocuous as instant messaging may need to be deployed in such a

way that it complies with laws requiring firms to record and reproduce the electronic

equivalent of a paper trail.

Skill, Expertise, and Available Labor—Can we build it? The firm may have skilled

technologists, but they may not be sufficiently experienced with a new technology. Even if

they are skilled, managers much consider the costs of allocating staff away from existing

projects for this effort.

Cost—Is this a cost-effective choice for our firm? A host of factors must be considered when

evaluating the cost of an IT decision. The costs to build, host, maintain, and support an

ongoing effort involve labor (software development, quality assurance, ongoing support,

training, and maintenance), consulting, security, operations, licensing, energy, and real

estate. Any analysis of costs should consider not only the aggregate spending required over

the lifetime of the effort but also whether these factors might vary over time.

Time—Do we have time to build, test, and deploy the system?

Vendor Issues—Is the vendor reputable and in a sound financial position? Can the vendor

guarantee the service levels and reliability we need? What provisions are in place in case the

vendor fails or is acquired? Is the vendor certified via the Carnegie Mellon Software Institute

or other standards organizations in a way that conveys quality, trust, and reliability?

Page 32: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

Social Media, Peer Production and Web 2.011/03/2012 6:59:00 PM

What is the unexpected rise and impact of social media and peer production systems ?, and

understand how these services differ from prior generation tools. :

“Web 2.0,” these new services are targeted at harnessing the power of the Internet to

empower users to collaborate, create resources, and share information in a distinctly different

way

The peer production leveraged by collaborating users isn’t only used to create social media; it

can be used to create services, too, and these are also considered to be part of Web 2.0.

do not only benefits from the service but the users also TAKE part of the service

Description Features Technology Providers

Blogs Short for “Web log”—an online publication

that keeps a running chronology of entries.

Readers can comment on posts. Can connect

to other blogs through blog rolls or trackbacks.

Key uses: Share

ideas, obtain

feedback, mobilize

a community.

1. Immediate

publication and

distribution

2. Reverse chronology

3. Comment threads

4. Persistence

5. Searchability

6. Tags

7. Trackbacks

• Blogger (Google)

• WordPress

• Tumblr

• Posterous

Wikis A Web site that anyone can edit directly from

within the browser.

Key uses: Collaborate on common tasks

or to create a common knowledge base.

• Collaborative content

creation

• All changes are

attributed

• Revision history, with

the ability to roll

back changes and

revert to earlier

• Socialtext

• PBWorks

• Google Sites

• Atlassian

• Jive

• Microsoft

(SharePoint)

• Apple OS X Server

Page 33: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

versions

• Automatic notification

of updates

• Searchability

• Tags

• Monitoring

Electronic

Social

Network

Online community that allows users to

establish a personal profile, link to other

profiles (i.e., friends), share content, and

communicate with members via messaging,

posts. Most personal relationships are

reciprocal (i.e., both parties agree to be

“friends”).

Key Uses: Discover and reinforce

affiliations; identify experts; message

individuals or groups; virally share media.

• Detailed personal

profiles using

multimedia

• Affiliations with

groups,

organizations,

and individuals

• Messaging and public

discussions

• Media sharing

• “Feeds” of recent

activity among

members

Open/Public

• Facebook

• LinkedIn

Private Platforms

• Ning

• Lithium

• SelectMinds

• LiveWorld

• IBM/Lotus

Connections

• Salesforce.com

• Socialtext

Microblog

ging

Short, asynchronous messaging system. Users

send messages to “followers” who aren’t

required to follow back.

Key Uses: distribute time-sensitive

information, share opinions, virally spread

ideas, run contests and promotions, solicit

feedback, provide customer support, track

commentary on firms/products/issues,

organize protests.

• 140-character

messages sent

and received

from mobile

device

• Ability to respond

publicly or

privately

• Can specify tags to

classify

Open/Public

• Twitter

Private Platforms

• Socialtext Signals

• Yammer

• Salesforce.com

(Chatter)

Page 34: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

discussion topics

for easy

searching and

building

comment threads

• Follower lists

7.2 BLOGS

What is a blog ?

This is clearly a long tail phenomenon, loaded with niche content that remains ―discoverable‖

through search engines and that is often shared via other types of social media like Facebook and

Twitter.

Trackbacks (citation links back to original blog post) and blog rolls (a list of a blogger‘s

favorite sites—a sort of shout-out to blogging peers) also help distinguish and reinforce the

reputation of widely read blogs.

Well-known blogs can be powerfully influential, acting as flashpoints on public opinion

Understand the benefits and risks of blogging

Corporations that blog can enjoy immediate and unfiltered distribution of their ideas, with

no limits on page size, word count, or publication deadline. And they can gather

immediate feedback from readers via comments

Immediate and unfiltered publication. The ability to reach the public without limits on

publication size and without having posts filtered, edited, or cut by the mainstream

media.

Ease of use. Creating a new post usually involves clicking a single button.

Comment threads. Readers can offer comments on posts.

Page 35: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

Reverse chronology. Posts are listed in reverse order of creation, making it easy to see the

most recent content.

Persistence. Posts are maintained indefinitely at locations accessible by permanent links.

Searchability. Current and archived posts are easily searchable.

Tags. Posts are often classified under an organized tagging scheme.

Trackbacks. Allows an author to acknowledge the source of an item in their post, which

allows bloggers to follow the popularity of their posts among other bloggers.

Appreciate the growth in the number of blogs, their influence, and their capacity to generate

revenue.

Blog comments can be a hothouse for spam and the disgruntled

Employee blogging can be difficult to control and public postings can ―live‖ forever in

the bowels of an Internet search engine or as content pasted on other Web sites

7.3 Wikis

What is a Wiki ? How can corporate and people used them at their advantages ?

A wiki is a Web site anyone can edit directly within a Web browser (provided the site

grants the user edit access).

What are Wikis‘ feature ?

Wikis support what you see is what you get (WYSIWYG) editing that, while not as robust

as traditional word processors, is still easy enough for most users to grasp without training or

knowledge of arcane code or markup language. Users can make changes to existing content

and can easily create new pages or articles and link them to other pages in the wiki.

Click the ―History‖ link on Wikipedia, for example, and you can see when edits were

made and by whom. This feature allows the community to roll back a wiki to a prior

Page 36: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

page, in the event that someone accidentally deletes key info, or intentionally defaces a

page.

How can organization use wikis to leverage technology ?

Wikis can be vital tools for collecting and leveraging knowledge that would otherwise be

scattered throughout an organization; reducing geographic distance; removing boundaries

between functional areas; and flattening preexisting hierarchies. Companies have used wikis

in a number of ways:

The greater the number of wiki users, the more likely the information contained in the wiki will

be accurate and grow in value.

7.4 Social Networks

Know what social networks are, be able to list key features, and understand how they are used by

individuals, groups, and corporations.

Social network is an online community that allow users to establish a profile and

communicate with users

Feeds are inherently viral. By seeing what others are doing on a social network, and by

leveraging the power of others to act as word-of-mouth evangelists, feeds can rapidly

mobilize populations, prompt activism, and offer low-cost promotion and awareness of a

firm‘s efforts. ** most important feature of social network

feeds can rapidly mobilize populations, prompt activism, and offer low-cost promotion

and awareness of a firm‘s efforts

Typical features of a social network include support for the following:

Detailed personal profiles

Affiliations with groups (e.g., alumni, employers, hobbies, fans, health conditions,

causes); with individuals (e.g., specific ―friends‖); and with products, firms, and other

organizations

Private messaging and public discussions

Page 37: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

Media sharing (text, photos, video)

Discovery-fueling feeds of recent activity among members (e.g., status changes, new

postings, photos, applications installed)

The ability to install and use third-party applications tailored to the service (games, media

viewers, survey tools, etc.), many of which are also social and allow others to interact

Understand the difference between major social networks MySpace, Facebook, and LinkedIn.

LinkedIn has become a vital tool for many businesses and professionals.

n LinkedIn, members post profiles and contact information, list their work history, and

can be ―endorsed‖ by others on the network.

Recognize the benefits and risks of using social networks.

Information spreads virally via news feeds. Feeds can rapidly mobilize populations, and

dramatically spread the adoption of applications. The flow of content in social networks is

also difficult to control and sometimes results in embarrassing public disclosures.

Feeds have a downside and there have been instances where feed mismanagement has caused

user discontent, public relations problems, and the possibility of legal action.

Be aware of trends that may influence the evolution of social networks.

The use of public social networks within private organizations is growing, and many

organizations are implementing their own, private, social networks.

Firms are also setting up social networks for customer engagement and mining these sites

for customer ideas, innovation, and feedback.

7.5 Twitter and rise of microbloggin

Explain the rise of twitter (scale, scope and broad appeal)

Twitter is a microblogging that allows users to post 140 character messages vie the web.

How does individuals, corporate and political movement use twitter ?

They can classify comments on a given topic using hash tags allowing others to find related

tweets

The users can also spread news during disasters, terror attack and major events

The political movement need twitter to support the voice of the activist

Page 38: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

It is also used as a business tool (starbucks used twitter to spread free samples of new product

such as VIA instant coffee line), massage clinics tweet last minute cancellation

Twitter is incredible for raison millions via Text-to –donate and other fundraisers

Firms are leveraging Twitter in a variety of ways, including promotion, customer response,

gathering feedback, and time-sensitive communication.

Like other forms of social media, Twitter can serve as a hothouse that attracts opinion and forces

organizational transparency and accountability.

What is the different between twitter, microbloggind and facebook , conventional blogs and

other web 2.0 efforts ?

Unlike facebook you do not have to ‗‘friend‘‘ someone to access that person on twitter

Unlike status updates found on services like Facebook and LinkedIn, Twitter‘s default supports

asymmetric communication, where someone can follow updates without first getting their

approval. This function makes Twitter a good choice for anyone cultivating a following—

authors, celebrities, organizations, and brand promoters.

What is the commercial viability of the effort, its competitive environment and converns

regarding limited revenue ?

- You don‘t need to tweet to get value. Many Twitter users follow friends, firms, celebrities, and

thought leaders, quickly gaining access to trending topics.

- Twitter has been following a ―grow-first-harvest-later‖ approach

- The site‘s rapid rise has allowed it to attract enough start-up capital to enable it to

approach revenue gradually and with caution, in the hopes that it won‘t alienate users with

too much advertising

Page 39: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

- Twitter‘s ―deliberately cautious‖ approach to revenue development, the ad model

featuring sponsored ―promoted tweets‖ rolled out first as part of the search, with distribution

to individual Twitter feeds progressing as the firm experiments and learns what works best

for users and advertisers.

- Another issue—as the service grew, many Twitter users rarely visited the firm‘s Web

site. Instead, most active users would post and read tweets using one of many—often free—

applications provided by third parties, such as Seesmic, TweetDeck, and Twhirl.

- Exposing data can be a good move as it spawned an ecosystem of over one hundred

thousand complementary third-party products and services that enhance Twitter‘s reach and

usefulness (generating network effects from complementary offerings similar to other

―platforms‖ like Windows, iPhone, and Facebook).--> downfall to such opennes : If users

don‘t visit Twitter.com, that makes it difficult to count users, serve profiling technologies

such as tracking cookie

- All this creates what is known as the ―free rider problem,‖ where others benefit from a

service while offering no value in exchange Encouraging software and service partners to

accept ads for a percentage of the cut could lessen the free rider problem

-Users can link a Twitter account used on their iOS devices to other apps, which means no

need to log in or manually add an account each time you add an app that you‘ll want to tweet

from

- Microblogging does appear to be here to stay

Conclusion: Sites like Twitter have made data available to third parties via an API

(application programming interface). The API has helped a rich ecosystem of over seventy

thousand Twitter-supporting products and services emerge. But by making data available to

third parties, firms may suffer from the free rider problem where others firms benefit from a

service without providing much benefit back to the sponsor itself.

Page 40: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

7.6 Key Words and Concepts of the Web 2.0

What is RSS and how effective business use this terms and technology?

RSS (an acronym that stands for both “really simple syndication” and “rich site

summary”) enables busy users to scan the headlines of newly available content and click

on an item’s title to view items of interest, thus sparing them from having to continually

visit sites to find out what’s new. Users begin by subscribing to an RSS feed for a Web

site, blog, podcast, or other data source. The title or headline of any new content will

then show up in an RSS reader. Subscribe to the New York Times Technology news

feed, for example, and you will regularly receive headlines of tech news from the Times.

Many firms use RSS feeds as a way to mange information overload, opting to distribute

content via feed rather than e-mail. Some even distribute corporate reports via RSS. RSS

readers are offered by third-party Web sites such as Google and Yahoo! and they have

been incorporated into all popular browsers and most e-mail programs.

RSS fosters the rapid sharing and scanning of information, including updates from

Web 2.0 services such as blogs, wikis, and social networks. RSS feeds can be

received via Web browsers, e-mail, cell phones, and special RSS readers.

What is Folksonomies and how effective business use this terms and technology?

Folksonomies (sometimes referred to as social tagging) are keyword-based classification

systems created by user communities as they generate and review content. (The label is

meant to refer to a people-powered taxonomy.) Example : Twitter‘s hash tags all make

heavy use of folksonomies.

By leveraging the collective power of the community to identify and classify content,

objects on the Internet become easier to locate, and content carries a degree of

recommendation and endorsement.

It helps adding values to the pile of data !

Folksonomies allow users to collaboratively tag and curate online media, making

it easy for others to find useful content. Since folksonomies are created by users

Page 41: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

themselves, they are often more easily understood and embraced than

classification schemes imposed by site owners.

What is Mash-ups and how effective business use this terms and technology?

Mash-ups are combinations of two or more technologies or data feeds into a single,

integrated tool

Ex : Some of the best known mash-ups leverage Google‘s mapping tools. Mapnificent.net

combines transit agency data with Google Maps to let users find locations that are close

to public transportation.

Mash-ups are made easy by a tagging system called XML (for extensible markup

language).

Site owners publish the parameters of XML data feeds that a service can accept or offer

(e.g., an address, price, product descriptions, images). Other developers are free to

leverage these public feeds using application programming interfaces (APIs)

Using APIs and XML, mash-up authors smoosh together seemingly unrelated data

sources and services in new and novel ways

Mash-ups promote the useful combination of different Web services, such as maps and

other information feeds. Mash-up authors leverage technologies such as APIs and XML

to combine seemingly unrelated data sources and services in new and novel ways.

What is Location-based services and how effective business use this terms and technology?

Computing devices increasingly know where you are

Business leverage the location-based services like Twitter, Facebook, and Google Buzz

to allow you to tweet or post a status update attached with a physical location as

determined by your phone‘s global positioning system (GPS)

Augmented-reality apps can overlay real data on top of images from a GPS and

compass-equipped smartphone ex : Wikitude overlays images appearing through your

phone‘s camera lens with geotagged data from Wikipedia. Point your Yelp app down the

street and activate the monocle feature to see starred reviews hover over the top of

Page 42: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

establishments that appear on screen.

Perhaps the best known among the location-based pure plays is Foursquare. The service

allows players to ―check in‖ at different locations, allowing players to earn ―badges‖

displayed in the app for completing specific achievements (―gym rat‖ for exercise buffs,

―school night‖ for weeknight bar hoppers). Check into a location more than anyone else

and you become that spot‘s ―mayor.‖

Location-based services are increasingly combining geolocated data with social media.

Users can now quickly see related social media surrounding an area, even overlaying this

data on top of maps and images through a phone‘s camera lens. Sites like Foursquare are

morphing into loyalty and customer-rewards programs. While users are largely in control

of sharing location data, some fear privacy and security issues from oversharing.

What is Virtual worlds and how effective business use this terms and technology?

In virtual worlds, users appear in a computer-generated environment in the form of an

avatar, or animated character.

Many corporations and organizations have established virtual outposts by purchasing

―land‖ in the world of Second Life, while still others have contracted with networks to

create their own, independent virtual worlds.

Virtual worlds allow users to interact with and within a computer-generated alternate

reality.

What is Rich Media and how effective business use this terms and technology?

Rich media is content such as text, graphics, animation, video, audio, etc.

Internet media is increasingly becoming ―richer,‖ leveraging audio, video, and animation.

Organizations and users are creating and distributing rich media online, with interesting

content spreading virally.

7.7 Prediction Markets and the Wisdom of Crowd

What is the wisdowm of crowd (applied to social network) and what are the necessary

criteria for a crowd to be smart ?

Page 43: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

Many social software efforts leverage what has come to be known as the

wisdom of crowds.

Its the idea that a group of individuals (the crowd often consists mostly of untrained

amateurs), collectively has more insight than a single or small group of trained

professionals.

the idea of crowd wisdom is at the heart of wikis, folksonomy tagging systems, and many

other online efforts.

One technique for leveraging the wisdom of crowds is a prediction market, where a

diverse crowd is polled and opinions aggregated to form a forecast of an eventual

outcome.

Ex : When Best Buy asked its employees to predict gift card sales, the ―crowd‘s‖

collective average answer was 99.5 percent accurate; experts paid to make the prediction

were off by 5 percent.

Criteria : The crowd must

1. be diverse, so that participants are bringing different pieces of information to the

table,

2. be decentralized, so that no one at the top is dictating the crowd‘s answer,

3. offer a collective verdict that summarizes participant opinions,

4. be independent, so that each focuses on information rather than the opinions of

others.

Google, which runs several predictive markets, underscored these principles when it

found that predictions were less accurate when users were geographically proximate,

meaning folks in the same work group who sat near one another typically thought too

much alike. ex of decentralized

7.8 Crowdsourcing

What is crowdsourcing and what are the values assigned with crowdsourcing ?

The power of Web 2.0 also offers several examples of the democratization of production

and innovation. Need a problem solved? Offer it up to the crowd and see if any of their

Page 44: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

wisdom offers a decent result. This phenomenon, known as crowdsourcing

How did compangies used crowdsourcing succesfully ?

Crowdsourcing tackles challenges through an open call to a broader community of

potential problem solvers. Examples include Goldcorp‘s discovering of optimal mining

locations in land it already held, Facebook‘s leverage of its users to create translations of

the site for various international markets, and Netflix‘s solicitation of improvements to its

movie recommendation software.

The compagny Goldcorp a mining firm was struggling to gain a return from its 55,000-

acre Canadian property holdings

Goldcorp offered up all the firm‘s data, on the company‘s Web site. Along with the data,

McEwen ponied up $575,000 from the firm as prize money for the Goldcorp Challenge

to anyone who came up with the best methods and estimates for reaping golden riches.

Eighty percent of the new targets identified by entrants yielded ―substantial quantities of

gold.

Netflix followed Goldcorp‘s lead, offering anonymous data to any takers, along with a

one-million-dollar prize to the first team that could improve the accuracy of movie

recommendations by 10 percent

The winning team represented an astonishing brain trust that Netflix would never have

been able to harness on its own

Several firms run third-party crowdsourcing forums, among them InnoCentive for

scientific R&D, TopCoder for programming tasks, and Amazon‘s Mechanical Turk for

general work.

Amazon.com has even created an online marketplace for crowdsourcing called

Mechanical Turk. Anyone with a task to be completed or problem to be solved can put it

up for Amazon, setting their price for completion or solution. For its role, Amazon takes

a small cut of the transaction. And alpha geeks looking to prove their code chops can turn

to TopCoder, a firm that stages coding competitions that deliver real results for

commercial clients, such as ESPN. TopCoder contests have attracted roughly 300,000

participants from 200 countries

Page 45: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

Facebook leveraged crowd wisdom to develop versions of its site localized in various

languages. Facebook engineers designated each of the site‘s English words or phrases as

a separate translatable object. Members were then invited to translate the English into

other languages, and rated the translations to determine which was best. Using this form

of crowdsourcing, fifteen hundred volunteers cranked out Spanish Facebook in a month.

7.9 Get Smart !

What are the skills and issues involved in creating and staffing an effective social media

awareness and response team (SMART) ?

Given the power of social media, it‘s time for all firms to get SMART, creating a social

media awareness and response team

SMART capabilities, including creating the social media team, establishing firmwide

policies, monitoring activity inside and outside the firm, establishing the social media

presence, and managing social media engagement and response.

1. Creating the team :

Firms need to treat social media engagement as a key corporate function with

clear and recognizable leadership within the organization.

Important to have someone ―dedicated 100% of the time, rather than someone

who‘s got a day job on top of a day job

While firms are building social media responsibility into job descriptions, also

recognize that social media is a team sport that requires input from staffers

throughout an organization. The social media team needs support from public

relations, marketing, customer support, HR, legal, IT, and other groups

, consider that the social media team at Starbucks (regarded by some as the best in

the business) is organized under the interdisciplinary ―vice president of brand,

content, and online.‖

2. Establishing policies :

Establishing corporate policies and setting employee expectations are imperative

for all organizations

Page 46: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

Most guidelines emphasize the ―three Rs‖: representation, responsibility, and

respect.

Representation. Employees need clear and explicit guidelines on expectations for

social media engagement.

Responsibility. Employees need to take responsibility for their online actions.

Firms must set explicit expectations for disclosure, confidentiality and security,

and provide examples of engagement done right, as well as what is unacceptable

Respect. Best Buy‘s policy for its Twelpforce explicitly states participants must

―honor our differences‖ and ―act ethically and responsibly.‖ Many employees can

use the reminder. Sure customer service is a tough task and every rep has a story

about an unreasonable client. But there‘s a difference between letting off steam

around the water cooler and venting online

Firms must train employees and update their knowledge as technologies, effective

use, and threats emerge. Security training is a vital component of establishing

social media policy. Penalties for violation should be clear and backed by

enforcement. Ex : Kenneth Cole making light of the outburst in egypt to promote

excitement for new collection

3. Monitoring activities (inside, outisde) :

Concern over managing a firm‘s online image has led to the rise of an industry

known as online reputation management.

Ex : All firms can take advantage of Google Alerts, Twitter search and Twitter

clients like TweetDeck can display all mentions of a particular term, Facebook

provides a summary of page activity to administrators (including stats on visits,

new fans, wall posts, etc.), while Facebook‘s Insights tool measures user

exposure, actions, and response behavior relating to a firm‘s Facebook pages and

ads.

Location-based services like Foursquare have also rolled out robust tools for

monitoring how customers engage with firms in the brick-and-mortar world.

Foursquare‘s analytics and dashboard present firms with a variety of statistics,

Page 47: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

such as who has ―checked in‖ and when, a venue‘s male-to-female ratio, and

which times of day are more active for certain customers.

Firms are leveraging social media both inside their firms and via external services

(e.g., corporate groups on Facebook and LinkedIn), and these spaces should also

be on the SMART radar. This kind of monitoring can help firms keep pace with

employee sentiment and insights, flag discussions that may involve proprietary

information or other inappropriate topics, and provide guidance for those who

want to leverage social media for the firm‘s staff

4. Establishing social media presence :

Many firms take an embassy approach to social media, establishing presence at

various services with a consistent name. Ex : facebook.com/starbucks,

twitter.com/starbucks, youtube.com/starbucks, flickr.com/starbucks, and so on.

While a big brand like Starbucks is often a target of criticism, social media also

provides organizations with an opportunity to respond fairly to that criticism and

post video and photos of the firm‘s efforts. In Starbucks‘ case, the firm shares its

work investing in poor coffee-growing communities as well as efforts to support

AIDS relief. A social media presence allows a firm to share these works without

waiting for conventional public relations (PR) to yield results or for journalists to

pick up and interpret the firm‘s story

A word to the self-reflective: Customer conversations will happen online even if

you don‘t have any social media embassies. Users can form their own groups,

hash tags, and forums. A reluctance to participate may signal that the firm is

facing deeper issues around its product and service.

The voice of the firm should come from the firm. In fact, it should come from

employees who can provide authentic expertise. Starbucks‘ primary Twitter feed

is managed by Brad Nelson, a former barista

5. Managing social media engagement and response :

Having an effective social media presence offers ―four Ms‖ of engagement: it‘s a

Page 48: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

megaphone allowing for outbound communication; it‘s a magnet drawing

communities inward for conversation; and it allows for monitoring and mediation

of existing conversations.

Many firms will selectively and occasionally retweet praise posts, underscoring

the firm‘s commitment to customer service. Highlighting service heroes also

reinforces exemplar behavior to employees who may be following the firm online,

too. Users are often delighted when a major brand retweets their comments, posts

a comment on their blog, or otherwise acknowledges them online—just be sure to

do a quick public profile investigation to make sure your shout-outs are directed

at customers you want associated with your firm. Escalation procedures should

also include methods to flag noteworthy posts, good ideas, and opportunities that

the social media team should be paying attention to

Many incidents can be responded to immediately and with clear rules of

engagement. For example, Starbuck issues corrective replies to the often-tweeted

urban legend that the firm does not send coffee to the U.S. military because of a

corporate position against the war. A typical response might read, ―Not true, get

the facts here‖ with a link to a Web page that sets the record straight.

Prominent bloggers and other respected social media participants can provide

keen guidance and insight. The goal isn‘t to create a mouthpiece, but to solicit

input, gain advice, gauge reaction, and be sure your message is properly

interpreted.

In the event of a major crisis, firms can leverage online media outside the social

sphere.

What are the implications of ethical issues in social media such as “sock puppetry” and

“astroturfing” and provide examples and outcomes of firms and managers who used social

media as a vehicle for dishonesty ?

Astroturfing and Sock Puppets : Fake personas set up to sing your own praises are

known as sock puppets among the digerati, and the practice of lining comment and

Page 49: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

feedback forums with positive feedback is known as astroturfing.

Social media can be a cruel space. Sharp-tongued comments can shred a firm‘s reputation

and staff might be tempted to make anonymous posts defending or promoting the firm.

Don‘t do it! Not only is it a violation of FTC rules, IP addresses and other online

breadcrumbs often leave a trail that exposes deceit.

Ex : Whole Foods CEO John Mackey fell victim to this kind of temptation, but his

actions were uncovered.

For years, Mackey used a pseudonym to contribute to online message boards, talking up

Whole Foods stock and disparaging competitors. When Mackey was unmasked, years of

comments were publicly attributed to him. The New York Times cited one particularly

cringe-worthy post where Mackey used the pseudonym to complement his own good

looks, writing, ―I like Mackey‘s haircut. I think he looks cute!‖

Page 50: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

Google in Three Parts: Search, Online Advertising, and Beyond 11/03/2012 6:59:00 PM

The firm‘s market capitalization (market cap), the value of

the firm calculated by multiplying its share price by the number of shares, makes Google

the most valuable media company on the

planet.

Online advertising represents the only advertising category that, over the last several

years, has been consistently trending with positive growth.

Google dominates Internet search volume and controls the lion‘s share of the Internet

search advertising business and online advertising dollars. The firm also earns more total

advertising revenue than any other firm, online or off.

Google‘s market cap makes it the most valuable media company in the world; it has been

rated as having one of the world‘s strongest brands, and it ranks among the most

profitable firms in the United States.

Understand the mechanics of search, including how Google indexes the Web and ranks

its organic search results.

Before diving into how the firm makes money, let’s first understand how Google’s core

service, search, works.

Perform a search (or query) on Google or another search engine, and the results you’ll

see are referred to by industry professionals as organic or natural search.

Organic or natural search : search engines use different algorithms for determining

the order of organic search results, but at Google the method is called PageRank

PageRank results are a kind of popularity contest. Web pages that have more pages

linking to them are ranked higher.

The process of improving a page’s organic search results is often referred to as

search engine optimization (SEO).

SEO has become a critical function for many marketing organizations since if a firm’s

pages aren’t near the top of search results, customers may never discover its site.

The less scrupulous have tried creating a series of bogus Web sites, all linking back to

Page 51: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

the pages they’re trying to promote (this is called link fraud, and Google actively works

to uncover and shut down such efforts—see the “Link Fraudsters” sidebar)

Example of Link Fraud : JCPenney is a big retailer, but not necessarily the first firm to

come to mind when you think of most retail categories. So the New York Times

suspected that something fishy was up when the retailer’s site came out tops for dozens

of Google searches, including the phrases “skinny jeans,” “dresses,” “bedding,” “area

rugs,” “home decor,” “comforter sets,” “furniture,” and “table cloths” someone paid to

have thousands of links placed on hundreds of sites scattered around the Web, all of

which lead directly to JCPenney.com.

Link fraud undercuts the credibility of Google‘s core search product JCPenney organic results

plummeted, in some cases from first to seventy-first death penalty‖

To create these massive indexes, search firms use software to crawl the Web and uncover as

much information as they can find. This software is referred to by several different names—

spiders, Web crawlers, software robots—but they all pretty much work the same way.

The spiders ask each public computer network for a list of its public Web

Then the spiders go through this list (―crawling‖ a site), following every available link until all

pages are uncovered.

Google will crawl frequently updated sites, like those run by news organizations, as often as

several times an hour

The method used to crawl the Web also means that if a Web site isn‘t the first page on a public

server, or isn‘t linked to from another public page, then it‘ll never be found.

But what if you want the content on your Web site to remain off limits to search engine indexing

and caching?

There are other techniques to keep the spiders out, too. Web site administrators can add a special

file (called robots.txt) that provides similar instructions on how indexing software should treat

the Web site

Conclusion :

Users don‘t really search the Web; they search an archived copy built by crawling and indexing

discoverable documents.

Page 52: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

Google operates from a massive network of server farms containing hundreds of thousands of

servers built from standard, off-the-shelf items. The cost of the operation is a significant barrier

to entry for competitors. Google‘s share of search suggests the firm can realize economies of

scales over rivals required to make similar investments while delivering fewer results (and hence

ads).

Web site owners can hide pages from popular search engine Web crawlers using a number of

methods, including HTML tags, a no-index file, or ensuring that Web sites aren‘t linked to other

pages and haven‘t been submitted to Web sites for indexing.

Examine the infrastructure that powers Google and how its scale and complexity offer

key competitive advantages.

Google doesn‘t disclose the number of servers it uses, but by some estimates, it runs

over 1.4 million servers in over a dozen so-called server farms worldwide.

In the first three months of 2011 alone, the firm spent $890 million on data centers.

The size of this investment not only creates a barrier to entry, it influences industry

profitability, with market-leader Google enjoying huge economies of scale.

14.3 The Increase in online ad

understand how media consumption habits are shifting.

There are three factors driving online ad growth trends:

(1) increased user time online : So advertisers are simply following the market. Online channels

also provide advertisers with a way to reach consumers at work—something that was previously

much more difficult to do.

(2) improved measurement and accountability : Many advertisers have also been frustrated by

how difficult it‘s been to gauge the effectiveness of traditional ad channels such as TV, print, and

radio.

Well, with the Internet, now you know. While measurement technologies aren‘t perfect,

advertisers can now count ad impressions (the number of times an ad is shown on a Web site),

whether a user clicks on an ad, and the product purchases or other Web site activity that comes

Page 53: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

from those clicks.

Measurement techniques allow advertisers to track the performance of their ads

Measurement metrics can be linked to payment schemes, improving return on investment (ROI)

and accountability compared to many types of conventional advertising.

(3) targeting : Various technologies and techniques also make it easier for firms to target users

based on how likely a person is to respond to an ad.

14.4 Search advertising

Understand Google‘s search advertising revenue model.

the practice of running and optimizing search engine ad campaigns is referred to as

search engine marketing (SEM)

Over two-thirds of Google‘s revenues come from ads served on its own sites, and the vast

majority of this revenue comes from search engine ads.

for the most part, the ads you‘ll see to the right (and sometimes top) of Google‘s organic search

results are text ads. These ads are keyword advertising, keyword advertising : ads are targeted

based on the words in a user‘s search query. Advertisers bid on the keywords and phrases that

they‘d like to use to trigger the display of their ad Linking ads to search was a brilliant move,

since the user‘s search term indicates an overt interest in a given topic.

Text ads appearing on Google search pages are billed on a pay-per-click (PPC) basis, meaning

that advertisers don‘t spend a penny unless someone actually clicks on their ad.-->if no one click

on an ad google doesnt make any money

If an advertiser wants to display an ad on Google search, they can set up a Google

AdWords advertising account in minutes, specifying just a single ad, or multiple ad campaigns

that trigger different ads for different keyword

Know the factors that determine the display and ranking of advertisements appearing on

Google‘s search results pages.

So in order to create a winning scenario for everyone, Google has developed a precise ad

ranking formula that rewards top performing ads by considering two metrics

Page 54: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

1)the maximum CPC (cost per click) that an advertiser is willing to pay

2)the advertisement‘s quality score—a broad measure of ad performance.

Create high quality ads and your advertisements might appear ahead of competition, even if

your competitors bid more than you. But if ads perform poorly they‘ll fall in rankings or even

drop from display consideration.

Ad Rank = Maximum CPC × Quality Score

One factor that goes into determining an ad‘s quality score is the click-through rate (CTR) for

the ad, the number of users who clicked an ad divided by the number of times the ad was

delivered (the impressions). The CTR measures the percentage of people who clicked on an ad to

arrive at a destination-site.

Second factor :When an ad is clicked, advertisers don‘t actually pay their maximum CPC;

Google discounts ads to just one cent more than the minimum necessary to maintain an ad‘s

position on the page. So if you bid one dollar per click, but the ad ranked below you bids ninety

cents, you‘ll pay just ninety-one cents if the ad is clicked more fair for company because no

one is overbidding

Be able to describe the uses and technologies behind geotargeting.

Geotargeting occurs when computer systems identify a user‘s physical location (sometimes

called the geolocation) for the purpose of delivering tailored ads or other content. On Google

AdWords, for example, advertisers can specify that their ads only appear for Web surfers located

in a particular country, state, metropolitan region, or a given distance around a precise locale

Ads in Google Search are geotargeted based on IP address ; Every device connected to the

Internet has a unique IP address assigned by the organization connecting the device to the

network

IP addresses will change depending on how and where you connect to the Internet. Connect your

laptop to a hotel‘s Wi-Fi when visiting a new city, and you‘re likely to see ads specific to that

location

Page 55: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

14.5 Ad network

Understand ad networks, and how ads are distributed and served based on Web site content.

Google originally developed AdSense to target ads based on keywords automatically detected

inside the content of a Web site. Ex : A blog post on your favorite sports team, for example,

might be accompanied by ads from ticket sellers or sports memorabilia vendors.

Recognize how ad networks provide advertiser reach and support niche content providers.

AdSense and similar online ad networks provide advertisers with access to the long tail of

niche Web sites by offering both increased opportunities for ad exposure as well as more-refined

targeting opportunities.

Be aware of content adjacency problems and their implications.

Contextual advertising based on keywords is lucrative, but like all technology solutions it has

its limitations. Vendors sometimes suffer from content adjacency problems ; when ads appear

alongside text they‘d prefer to avoid

Ex : a New York Post article detailed a gruesome murder where hacked up body parts were

stowed in suitcases. The online version of the article included contextual advertising and was

accompanied by…luggage ads.

To avoid such situation : ad networks provide opportunities for both advertisers and content

providers to screen out potentially undesirable pairings based on factors like vendor, Web site,

and category. Advertisers can also use negative keywords, which tell networks to avoid showing

ads when specific words appear (e.g., setting negative keywords to ―murder‖ or ―killer‖ could

have spared luggage advertisers from the embarrassing problem mentioned above)

Page 56: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

Know the strategic factors behind ad network appeal and success.

While advertisers can use multiple ad networks, there are several key strategic factors driving the

Industry (network effect (two-sided), economies of scale)

The ability to reach more potential customers across more Web sites attracts

more advertisers to Google. And content providers (the Web sites that distribute

these ads) want there to be as many advertisers as possible in the ad networks

that they join, since this should increase the price of advertising, the number of

ads served, and the accuracy of user targeting. If advertisers attract content

providers, which in turn attract more advertisers, then we‘ve just described

network effects

More participants bringing in more revenue also help the firm benefit from scale

Economie.

14.6 More Ad Formats and Payment Schemes

Know the different formats and media types that Web ads can be displayed in

The specific ad formats supported depend on the ad network but can include the following:

1) image (or display) ads (such as horizontally oriented banners, smaller rectangular

buttons, and vertically oriented ―skyscraper‖ ads);

2) rich media ads (which can include animation or video);

3) interstitials (ads that run before a user arrives at a Web site‘s contents). The industry

trade group, the Internet Advertising Bureau (IAB) sets common standards for display ads

so that a single creative (the design and content of the advertisement) can run unmodified

across multiple ad networks and Web sites

Know the different ways ads are sold.

And there are lots of other ways ads are sold besides cost-per-click. Most graphical display ads

are sold according to the number of times the ad appears (the impression).

Ad rates are quoted in CPM, meaning cost per thousand impressions (the M representing the

roman numeral for one thousand). Display ads sold on a CPM basis are often used as part of

branding campaigns targeted more at creating awareness than generating click-throughs.

Page 57: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

Ex :promoting products like soft drinks, toothpaste, or movies.

Cost-per-action (CPA) ads pay whenever a user clicks through and performs a specified action

such as signing up for a service, requesting material, or making a purchase. Affiliate programs

are a form of cost-per-action, where vendors share a percentage of revenue with Web sites that

direct purchasing customers to their online storefronts. Amazon runs the world‘s largest affiliate

program, and referring sites can earn 4 percent to 15 percent of sales generated from these click-

through

And rather than buying targeted ads, a firm might sometimes opt to become an exclusive

advertiser on a site. For example, a firm could buy access to all ads served on a site‘s main page

Know that games can be an ad channel under the correct conditions.

Finding a way to introduce ads without eroding the game experience can be a

challenge.

Branding ads often work best since click-throughs are typically not something

you want disrupting your gaming experience

Firms have also created online mini games (so-called advergames) for longer

term, immersive brand engagement

14.7 Customer Profiling and Behavioral Targeting

Be familiar with various tracking technologies and how they are used for customer profiling and

ad targeting.

Advertisers are willing to pay more for ads that have a greater chance of reaching their

target audience, and online firms have a number of targeting tools at their disposal

Much of this targeting occurs whenever you visit a Web site, where a behind-the-scenes

software dialogue takes place between Web browser and Web server that can reveal a

number of pieces of information, including IP address, the type of browser used, the

computer type, its operating system, and unique identifiers, called cookies.

IP addresses are leveraged extensively in customer profiling. An IP address not only

helps with geolocation, it can also indicate a browser‘s employer or university, which can

Page 58: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

be further matched with information such as firm size or industry

Example :IBM has used IP targeting to tailor its college recruiting banner ads to specific

schools, for example, ―There Is Life After Boston College, Click Here to See Why.‖

The ability to identify a surfer‘s computer, browser, or operating system can also be used

to target tech ads. For example, Google might pitch its Chrome browser to users detected

running Internet Explorer, Firefox, or Safari; while Apple could target Mac ads just to

Windows users

But perhaps the greatest degree of personalization and targeting comes from cookies.

Visit a Web site for the first time, and in most cases, a dialogue between server and

browser takes place that goes something like this:

Server: Have I seen you before?

Browser: No.

Server: Then take this unique string of numbers and letters (called a cookie). I’ll use it to

recognize you from now on.

Upon accepting this cookie your browser has been tagged, like an animal. As you surf

around the firm‘s Web site, that cookie can be used to build a profile associated with your

activities

The next time you return to the Web site, your browser responds to the server‘s

―Have I see you before?‖ question with the equivalent of ―Yes, you know me;,‖

and it presents the cookie that the site gave you earlier. The site can then match this cookie

against your browsing profile, showing you the weather, stock quotes, sports scores, and

other info that it thinks you‘re interested in.

Cookies are used for lots of purposes. Retail Web sites like Amazon use cookies to pay

attention to what you‘ve shopped for and bought, tailoring Web sites to display products

that the firm suspects you‘ll be most interested in

Understand why customer profiling is both valuable and controversial.

Any server that serves you content can leverage these profiling technologies. You might be

profiled not just by the Web site that you‘re visiting (e.g., nytimes.com), but also by any ad

Page 59: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

networks that serve ads on that site (e.g., Platform-A, DoubleClick, Google AdSense, Microsoft

adCenter).

By serving and tracking cookies in ads shown across partner sites, ad networks can build detailed

browsing profiles that include sites visited, specific pages viewed, duration of visit, and the types

of ads you‘ve seen and responded to.

And that surfing might give an advertising network a better guess at demographics like gender,

age, marital status, and more.

Recognize steps that organizations can take to help ease consumer and governmental

concerns.

The most popular Web browsers allow you to block all cookies, block just third-party cookies,

purge your cookie file, or even ask for your approval before accepting a cookie.

14.8 Profiling and Privacy

Understand the privacy concerns that arise as a result of using third-party or tracking cookies to

build user profiles.

Google AdSense would now issue a third-party cookie and would track browsing activity across

AdSense partner sites

Says one Google project manager, ―We‘re looking to make ads even more interesting.

But while targeting can benefit Web surfers, users will resist if they feel that they are being

mistreated, exploited, or put at risk.

Be aware of the negative consequences that could result from the misuse of third-party or

tracking cookies.

The U.S. Federal Trade Commission has already called for more transparency and user control in

online advertising and for requesting user consent (opt-in program that require consent

from the customers) when collecting sensitive data.

Page 60: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

Know the steps Google has taken to demonstrate its sensitivity to privacy issues.

Google‘s roll-out of interest-based ads shows the firm‘s sensitivity to these issues. First, while

major rivals have all linked query history to ad targeting, Google steadfastly refuses to do this.

Other sites often link registration data (including user-submitted demographics such as gender

and age) with tracking cookies, but Google avoids this practice as well.

Each interest-based ad is accompanied by an ―Ads by Google‖ link that will bring users to a page

describing Google advertising and which provides access to the company‘s ―Ads Preferences

Manager.‖

Google also allows users to install a cookie that opts them out of interest-based tracking. And

since browser cookies can expire or be deleted, the firm has gone a step further, offering a

browser plug-in that will remain permanent, even if a user‘s opt-out cookie is purged.

14.9 Search Engines, Ad Networks, and FraudBe Be able to identify various types of online

fraud, as well as the techniques and technologies used to perpetrate these crimes.

Some of the more common types of fraud that are attempted in online advertising include the

following:

1. Enriching click fraud—when site operators generate bogus ad clicks to earn PPC income.

2. Enriching impression fraud—when site operators generate false page views (and hence ad

impressions) in order to boost their site‘s CPM earnings.

3. Depleting click fraud—clicking a rival‘s ads to exhaust their PPC advertising budget.

4. Depleting impression fraud—generating bogus impressions to exhaust a rival‘s CPM ad

budget.

5. Rank-based impression fraud—on-sites where ad rank is based on click performance,

fraudsters repeatedly search keywords linked to rival ads or access pages where rival ads

appear. The goal is to generate impressions without clicks. This process lowers the

performance rank (quality score) of a rival‘s ads, possibly dropping ads from rank results,

and allowing fraudsters to subsequently bid less for the advertising slots previously occupied

by rivals.

Page 61: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

6. Disbarring fraud—attempting to frame a rival by generating bogus clicks or impressions that

appear to be associated with the rival, in hopes that this rival will be banned from an ad

network or punished in search engine listings.

7. Link fraud (also known as spamdexing or link farming)—creating a series of bogus Web sites,

all linking back to a page, in hopes of increasing that page‘s results in organic search.

Keyword stuffing—packing a Web site with unrelated keywords (sometimes hidden in fonts that

are the same color as a Web site‘s background) in hopes of either luring users who wouldn‘t

normally visit a Web site, or attracting higher-value contextual ads.

Understand how firms can detect, prevent, and prosecute fraudsters.

Each visitor is identified by an IP address, so lots of clicks from a single IP make

the bad guys easy to spot you cant just click like crazy

So organized crime tried to raise the bar, running so-called click farms to

spread fraud across dozens of IP addresses

Fraudsters then moved on to use zombie networks—hordes of surreptitiously

infiltrated computers, linked and controlled by rogue software.

hackers exploit security holes, spread viruses, or use so-called phishing

techniques to trick users into installing software that will lie dormant, awaiting

commands from a central location. The controlling machine then sends out tasks

for each zombie, instructing them to visit Web sites and click on ads in a way that

mimics real traffic. Zombie botnets can be massive.

HOWEVER, firms can prevent zombie network ;Higher click-through rates than comparable

sites? Caught. Too many visits to a

new or obscure site? Caught. Clicks that don‘t fit standard surfing patterns for

geography, time, and day? Caught.

CONCLUSION :

Fraud can undermine the revenue model behind search engines, ad networks, and the ad-

based Internet. It also threatens honest competition among rivals that advertise online.

Page 62: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

There are many forms of online fraud, including enriching fraud (meant to line the

pockets of the perpetrators), depleting fraud (meant to waste the ad budgets of rivals),

disbarring fraud (meant to frame the innocent as fraudsters), and methods to lower rival

ad rank performance, or gain search engine ranking algorithms.

While fraudsters have devised ingenious ways to exploit the system (including click

farms and zombie attacks), IP addresses and detailed usage pattern monitoring

increasingly reveal bogus activity.

Fraud rates are widely disputed. However, it is clear that if widespread fraud were

allowed to occur, advertisers would see lower ROI from online ad efforts, and Internet

business models would suffer. The continued strength of the online advertising market

suggests that while fraud may be impossible to stop completely, most fraud is under

control.

14.10 The Battle Unfolds

Understand the challenges of maintaining growth as a business and industry mature.

it will likely be difficult for Google to find new growth markets that are as lucrative as

adsense and ads served on search

Emerging advertising outlets such as social networks have lower click-through rates than

conventional advertising, and Google has struggled to develop a presence in social media—

trends suggesting that Google will have to work harder for less money.

As outlined earlier, Google enjoys major scale advantages in search, and network effects

in advertising But the strength of Google‘s other competitive resources is less clear.

Because Google gathered such an impressive set of data ; Within Google‘s ad network, there

are switching costs for advertisers and for content providers.

Google partners have set up accounts and are familiar with the firm‘s tools and analytics.

Content providers would also need to modify Web sites to replace AdSense or DoubleClick

ads with rivals. But choosing Google doesn‘t cut out the competition

Page 63: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

Another vulnerability may exist with search consumers. While Google‘s brand is strong,

switching costs for search users are incredibly low. Move from Google.com to Bing.com

and you actually save two letters of typing!

Recognize how the businesses of many firms in a variety of industries are beginning to

converge.

-Google‘s biggest deal to date was the purchase of Motorola Mobility. This makes Google a

mobile phone handset manufacturer

-it‘s tough to imagine any peer-produced video site displacing YouTube. Users go to

YouTube because there‘s more content, while amateur content providers go there seeking

more users (classic two-sided network effects). This critical advantage was the main reason

why, in 2006, Google paid $1.65 billion for what was then just a twenty-month-old start-up

-Google Wallet is another example of how the search giant is looking to deliver value

through mobile devices. Announced in the spring of 2011, Google Wallet allows phones to

replace much of the ―stuff‖ inside your wallet.

Appreciate the magnitude of this impending competition, and recognize the competitive

forces that will help distinguish winners from losers.

Critically evaluate the risks and challenges of businesses that Google, Microsoft, and other

firms are entering.

For big firms like Microsoft and Google, pushing stock price north requires not just new

markets, but billion-dollar ones. Adding even $100 million in new revenues doesn‘t do much

for firms bringing in $62 billion and $29 billion a year, respectively. That‘s why you see

Microsoft swinging for the fences, investing in the uncertain but potentially gargantuan

markets of video games, mobile phone software, cloud computing

CONCLUSION :

For over a decade, Google‘s business has been growing rapidly, but that business is

maturing.

Page 64: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

Slower growth will put pressure on the firm‘s stock price, so a firm Google‘s size will

need to pursue very large, risky, new markets—markets that are also attractive to well-

financed rivals, smaller partners, and entrepreneurs.

Rivals continue to innovate in search. Competing with technology is extremely difficult

since it is often easy for a firm to mimic the innovations of a pioneer with a substitute

offering. Microsoft, with profits to invest in infrastructure, advertising, and technology,

may pose Google‘s most significant, conventional threat.

Although Microsoft has many distribution channels (Windows, Internet Explorer, Office)

for its search and other services, European and U.S. regulators will likely continue to

prevent the firm from aggressive product and service bundling.

Google is investing heavily in methods that promote wider Internet access. These include

offering free software to device manufacturers and several telecommunications and

lobbying initiatives meant to lower the cost of getting online. The firm hopes that more

users spending more time online will allow it to generate more revenue through ads and

perhaps other services.

Google Wallet uses NFC communications to allow mobile phones to make credit and

debit card payments, manage loyalty programs, redeem coupons, and more. Payments are

linked to existing credit cards. Google will not charge for transaction fees but plans to use

Wallet as a way to sell other services such as those offered by its Google Offers coupon

and deal program.

YouTube demonstrates how a firm can create a large and vastly influential business in a

short period of time but also that businesses that host and serve large files of end-user

content can be costly.

Google, Microsoft, and smaller rivals are also migrating applications to the Web,

allowing Office-style software to execute within a browser, with portions of this

computing experience and storage happening off a user‘s computer, ―in the cloud‖ of the

Internet. Revenue models for this business are also uncertain.

With scale and influence comes increased governmental scrutiny. Google has

increasingly become a target of antitrust regulators. The extent of this threat is unclear.

Page 65: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

Google‘s extreme influence is clear. However, the firm‘s software is based on open

standards; competitors have a choice in ad networks, search engines, and other services;

switching costs are relatively low; users and advertisers aren‘t locked into exclusive

contracts for the firm‘s key products and services; and there is little evidence of

deliberate, predatory pricing or other ―red-flag‖ activity that usually brings government

regulation.

Page 66: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

Security and Online Privacy 11/03/2012 6:59:00 PM

13.1 Introduction

Recognize that information security breaches are on the rise.

TJX example There was a personnel betrayal: the mastermind was an alleged FBI informant

who previously helped bring down a massive credit card theft scheme but then double-

crossed the Feds and used insider information to help his gang outsmart the law and carry out

subsequent hacks.

Understand the potentially damaging impact of security breaches.

The massive impact of the TJX breach should make it clear that security must be a top

organizational priority.

While the examples and scenarios presented here are shocking, the good news is that the vast

majority of security breaches can be prevented.

What is the source and motivation of those initiating information security attacks.

There are a lot of bad guys out there, and motivations vary widely, including the following:

Account theft and illegal funds transfer

Stealing personal or financial data

Compromising computing assets for use in other crimes

Extortion

Espionage

Cyberwarfare

Terrorism

Pranksters

Protest hacking (hacktivism)

Revenge (disgruntled employees)

While some steal cash for their own use, others resell their hacking take to others. There is a

thriving cybercrime underworld market in which data harvesters (cibercriminal who infiltrates

systems and collect data for illegal resale) sell to cash-out fraudsters (firms that purchase asset

for data harvesters) criminals who might purchase data from the harvesters in order to buy

(then resell) goods using stolen credit cards or create false accounts via identity theft.

Page 67: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

Hackers might also infiltrate computer systems to enlist hardware for subsequent illegal acts.

Botnets of zombie computers (networks of infiltrated and compromised machines

controlled by a central command) are used for all sorts of nefarious activity.

Botnez includes sending spam from thousands of difficult-to-shut-down accounts, launching

tough-to-track click fraud efforts or staging what’s known as

distributed denial of service (DDoS) attacks (effectively shutting down Web sites by

overwhelming them with a crushing load of seemingly legitimate requests sent

simultaneously by thousands of machines).

Ex : Botnets have been discovered that are capable of sending out 100 billion spam messages

a day, and botnets as large as 10 million zombies have been identified.

Relate examples of various infiltrations in a way that helps raise organizational awareness of

threats.

Google has identified China as the nation of origin for a series of hacks targeting the Google

accounts of diplomats and activists.

Other threats come from malicious pranksters (sometimes called griefers or trolls), like the

group that posted seizure-inducing images on Web sites frequented by epilepsy sufferers

Others are hacktivists, targeting firms, Web sites, or even users as a protest measure.

Ex. In 2009, Twitter was brought down and Facebook and LiveJournal were hobbled as Russian-

sympathizing hacktivists targeted the social networking and blog accounts of the Georgian

blogger known as Cyxymu

And as power and responsibility is concentrated in the hands of a few revenge-seeking

employees can do great damage

Key takeways :

Computer security threats have moved beyond the curious teen with a PC and are

now sourced from a number of motivations, including theft, leveraging compromised

computing assets, extortion, espionage, warfare, terrorism, pranks, protest, and

revenge.

Threats can come from both within the firm as well as from the outside.

Page 68: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

Cybercriminals operate in an increasingly sophisticated ecosystem where data

harvesters and tool peddlers leverage sophisticated online markets to sell to cash-out

fraudsters and other crooks.

Technical and legal complexity make pursuit and prosecution difficult.

Many law enforcement agencies are underfunded, underresourced, and underskilled

to deal with the growing hacker threat.

13.3 Where Are Vulnerabilities? Understanding the Weaknesses

What are the potential entry points for security compromise ?

Every physical or network ―touch point‖ is a potential vulnerability.

Bad Apples :

70 percent of loss-causing security incidents involve insiders.

Inside employees or temporary workers, contract workers (the leak comes from inside the

organization

Password :

Password are usely the same for all the sites.

If not, they are kept ‗‘safe‘‘ on a postite or email

The protection questions are easy to guess for strangers (especially with information on

the internet because of social media)

Page 69: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

What are the infiltration techniques such as social engineering, phishing, malware, Web site

compromises (such as SQL injection), and more ?

1. Social Engineering :

Con games that trick employees into revealing information or performing other tasks

that compromise a firm are known as social engineering in security circles.

It‘s likely that a directory of a firm‘s employees, their titles, and other personal details is

online right now via social networks like LinkedIn and Facebook.

With just a few moments of searching, a skilled con artist (a social engineering) can piece

together a convincing and compelling story.

2. Phishing :

Phishing refers to cons executed through technology. The goal of phishing is to leverage

the reputation of a trusted firm or friend to trick the victim into performing an

action or revealing information.

phishing attacks specifically target a given organization or group of users.--> the more

you know information about the user the more convincing your trap is (ex download

resumer from monster.com)

Ex : (―Our Web site has been compromised, click to log in and reset your password.‖),

Ex phishing : Other phishing attempts might dupe a user into unwittingly downloading

dangerous software (malware) that can do things like record passwords and keystrokes,

provide hackers with deeper access to your corporate network

3. Malware :

Malware (for malicious software) seeks to compromise a computing system without

permission.

Some hackers will try to sneak malware onto a system via techniques like phishin

Microsoft‘s Internet Safety Enforcement Team claims that the mean time to infection for

an unprotected PC is less than five minutes.

Adobe is a particularly tempting target, as Flash and Acrobat Reader are now installed on

nearly every PC, including Mac and Linux machines.

Methods of infection are as follows:

8. Viruses. Programs that infect other software or files. They require an executable (a running

Page 70: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

program) to spread, attaching to other executables. Viruses can spread via operating

systems, programs, or the boot sector or auto-run feature of media such as DVDs or USB

drives. Some applications have executable languages (macros) that can also host viruses

that run and spread when a file is open.

9. Worms. Programs that take advantage of security vulnerability to automatically spread, but

unlike viruses, worms do not require an executable. Some worms scan for and install

themselves on vulnerable systems with stunning speed (in an extreme example, the SQL

Slammer worm infected 90 percent of vulnerable software worldwide within just ten

minutes)

10. Trojans. Exploits that, like the mythical Trojan horse, try to sneak in by masquerading as

something they‘re not. The payload is released when the user is duped into downloading

and installing the malware cargo, oftentimes via phishing exploits.

While the terms above cover methods for infection, the terms below address the goal of the

malware:

• Botnets or zombie networks. Hordes of surreptitiously infected computers linked and

controlled remotely by a central command. Botnets are used in crimes where controlling

many difficult-to-identify PCs is useful, such as when perpetrating click fraud, sending

spam, registering accounts that use CAPTCHAs(those scrambled character images

meant to thwart things like automated account setup or ticket buying), executing

―dictionary‖ password cracking attempts, or launching denial-of-service attacks.

• Malicious adware. Programs installed without full user consent or knowledge that later serve

unwanted advertisements.

• Spyware. Software that surreptitiously monitors user actions, network traffic, or scans for files.

• Keylogger. Type of spyware that records user keystrokes. Keyloggers can be either software-

based or hardware, such as a recording ―dongle‖ that is plugged in between a keyboard

and a PC.

• Screen capture Variant of the keylogger approach. This category of software records the

pixels that appear on a user‘s screen for later playback in hopes of identifying proprietary

information.

Page 71: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

Blended threats. Attacks combining multiple malware or hacking exploits.

4. Compromised Websites :

Some exploits directly target poorly designed and programmed Web sites.--> Consider

the SQL injection technique directly target poorly designed and programmed Web sites

How does it work ? : Imagine that you visit a Web site and are asked to enter your user

ID in a field on a Web page (say your user ID is smith). A Web site may be programmed

to take the data you enter from the Web page‘s user ID field (smith), then add it to a

database command (creating the equivalent of a command that says ―find the account for

‗smith‘‖). The database then executes that command.

In the end, it target websites that don’t verify user entry.

5. Push Button Hacking

hackers have created tools to make it easy for the criminally inclined to automate attacks.

The barrier of entry is becoming so low that literally anyone can carry out these

attacks.

Network Threats :

The network itself may also be a source of compromise. Recall that the TJX hack

happened when a Wi-Fi access point was left open and undetected.

Other troubling exploits have targeted the very underpinning of the Internet itself. This is

the case with so-called DNS cache poisoning. (The DNS, or domain name service, is a

collection of software that maps an Internet address, such as (http://www.bc.edu), to an

IP address, such as 136.167.2.220. 220) DNS cache poisoning exploits can redirect this

mapping and the consequences are huge. Imagine thinking that you‘re visiting your

bank‘s Web site, but instead your network‘s DNS server has been poisoned so that you

really visit a carefully crafted replica that hackers use to steal your log-in credentials and

drain your bank account

Physical Threats :

Organization must have backups to take into the potential impact of physical security

threats such as terrorism, or vandalism, as well.

Page 72: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

Anything valuable that reaches the trash in a recoverable state is also a potential security

breach. Hackers and spies sometimes practice dumpster diving, sifting through trash in

an effort to uncover valuable data or insights that can be stolen or used to launch a

security attack.

Other compromises might take place via shoulder surfing, simply looking over

someone‘s shoulder to glean a password or see other proprietary information that might

be displayed on a worker‘s screen.

Identify various methods and techniques to thwart infiltration ?

Dont get cut ! : It‘s possible that the e-mail address has been spoofed (faked) or that it was

sent

via a colleague‘s compromised account.

know how to read the complete URL to look for tricks

zero-day exploit : attacks that are so new that they haven‘t been identified yet, so they cant

be prevented yet

There‘s no simple answer for the password problem. Biometrics (technologies that replace

conventionally typed passwords with things like fingerprint readers, facial recognition, or iris

scans )are often thought of as a solution, but are still rarely used, and PCs that include such

technologies are widely viewed as novelties.

SQL injection and other application weaknesses are particularly problematic because there‘s

not a commercial software patch or easily deployed piece of security software that can

protect a firm. Instead, firms have to meticulously examine the integrity of their Web sites to

see if they are vulnerable

Encryption scrambles data, making it essentially unreadable to any program that doesn‘t

have the descrambling password, known as a key.

To date, the largest known brute-force attacks, demonstration hacks launched by grids of

simultaneous code-cracking computers working in unison, haven‘t come close to breaking

the type of encryption used to scramble transmissions that most browsers use when

communicating with banks and shopping sites. The problem occurs when data is nabbed

Page 73: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

before encryption or after decrypting, or in rare cases, if the encrypting key itself is

compromised.

Encryption is also employed in virtual private network (VPN) technology, which scrambles

data passed across a network. Public wireless connections pose significant security threats—

they may be set up by hackers that pose as service providers, while really launching attacks

on or monitoring the transmissions of unwitting users. The use of VPN software can make

any passed-through packets unreadable. Contact your firm or school to find out how to set up

VPN software.

KEY TAKEAWAYS

An organization‘s information assets are vulnerable to attack from several points of

weakness, including users and administrators, its hardware and software, its networking

systems, and various physical threats.

Social engineering attempts to trick or con individuals into providing information, while

phishing techniques are cons conducted through technology.

While dangerous, a number of tools and techniques can be used to identify phishing scams,

limiting their likelihood of success.

Social media sites may assist hackers in crafting phishing or social engineering threats,

provide information to password crackers, and act as conduits for unwanted dissemination of

proprietary information.

Most users employ inefficient and insecure password systems; however, techniques were

offered to improve one‘s individual password regime.

Viruses, worms, and Trojans are types of infecting malware. Other types of malware might

spy on users, enlist the use of computing assets for committing crimes, steal assets, destroy

property, serve unwanted ads, and more.

Examples of attacks and scams launched through advertising on legitimate Web pages

highlight the need for end-user caution, as well as for firms to ensure the integrity of their

participating online partners.

SQL injection and related techniques show the perils of poor programming. Software

developers must design for security from the start—considering potential security

Page 74: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

weaknesses, and methods that improve end-user security (e.g., in areas such as installation

and configuration).

Encryption can render a firm‘s data assets unreadable, even if copied or stolen. While

potentially complex to administer and resource intensive, encryption is a critical tool for

securing an organization‘s electronic assets.

13.4 Take actions !

What are the critical steps one should take to improve information security ?

Here‘s a brief list of major issues to consider:

Surf smart. Think before you click—question links, enclosures, download request, and the

integrity of Web sites that you visit. Avoid suspicious e-mail attachments and Internet

downloads. Be on guard for phishing, and other attempts to con you into letting in malware.

Verify anything that looks suspicious before acting. Avoid using public machines (libraries,

coffee shops) when accessing sites that contain your financial data or other confidential

information.

Stay vigilant. Social engineering con artists and rogue insiders are out there. An appropriate

level of questioning applies not only to computer use, but also to personal interactions, be it

in person, on the phone, or electronically.

Stay updated. Turn on software update features for your operating system and any

application you use (browsers, applications, plug-ins, and applets), and manually check for

updates when needed. Malware toolkits specifically scan for older, vulnerable systems, so

working with updated programs that address prior concerns lowers your vulnerable attack

surface.

Stay armed. Install a full suite of security software. Many vendors offer a combination of

products that provide antivirus software that blocks infection, personal firewalls that repel

unwanted intrusion, malware scanners that seek out bad code that might already be nesting

on your PC, antiphishing software that identifies if you‘re visiting questionable Web sites,

and more. Such tools are increasingly being built into operating systems, browsers, and are

Page 75: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

deployed at the ISP or service provider (e-mail firm, social network) level. But every

consumer should make it a priority to understand the state of the art for personal protection.

In the way that you regularly balance your investment portfolio to account for economic

shifts, or take your car in for an oil change to keep it in top running condition, make it a

priority to periodically scan the major trade press or end-user computing sites for reviews and

commentary on the latest tools and techniques for protecting yourself (and your firm).

Be settings smart. Don‘t turn on risky settings like unrestricted folder sharing that may act as

an invitation for hackers to drop off malware payloads. Secure home networks with password

protection and a firewall. Encrypt hard drives—especially on laptops or other devices that

might be lost or stolen. Register mobile devices for location identification or remote wiping.

Don‘t click the ―Remember me‖ or ―Save password‖ settings on public machines, or any

device that might be shared or accessed by others. Similarly, if your machine might be used

by others, turn off browser settings that auto-fill fields with prior entries—otherwise you

make it easy for someone to use that machine to track your entries and impersonate you. And

when using public hotspots, be sure to turn on your VPN software to encrypt transmission

and hide from network eavesdroppers.

Be password savvy. Change the default password on any new products that you install.

Update your passwords regularly. Using guidelines outlined earlier, choose passwords that

are tough to guess, but easy for you (and only you) to remember. Federate your passwords so

that you‘re not using the same access codes for your most secure sites. Never save passwords

in nonsecured files, e-mail, or written down in easily accessed locations.

Be disposal smart. Shred personal documents. Wipe hard drives with an industrial strength

software tool before recycling, donating, or throwing away—remember in many cases

―deleted‖ files can still be recovered. Destroy media such as CDs and DVDs that may contain

sensitive information. Erase USB drives when they are no longer needed.

Back up. The most likely threat to your data doesn‘t come from hackers; it comes from

hardware failure. [1] Yet most users still don‘t regularly back up their systems. This is

another do-it-now priority. Cheap, plug-in hard drives work with most modern operating

systems to provide continual backups, allowing for quick rollback to earlier versions if

you‘ve accidentally ruined some vital work. And services like EMC‘s Mozy provide

Page 76: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

monthly, unlimited backup over the Internet for less than what you probably spent on your

last lunch (a fire, theft, or similar event could also result in the loss of any backups stored on-

site, but Internet backup services can provide off-site storage and access if disaster strikes).

Check with your administrator. All organizations that help you connect to the Internet—your

ISP, firm, or school—should have security pages. Many provide free security software tools.

Use them as resources. Remember—it‘s in their interest to keep you safe, too!

Recognize the major information security issues that organizations face, as well as the resources,

methods, and approaches that can help make firms more secure.

Processes and policies will include education and awareness

So information security should start with an inventory-style auditing and risk assessment for the

employees to know what they have to protect.

Economic decisions usually drive hacker behavior, too. While in some cases attacks are based on

vendetta or personal reasons, in most cases exploit economics largely boils down to

Adversary ROI = Asset value to adversary – Adversary cost

Methods organization can use :

Patch. Firms must be especially vigilant to pay attention to security bulletins and install software

updates that plug existing hole

Lock down hardware. Firms range widely in the security regimes used to govern purchase

through disposal system use.

Lock down the network. Network monitoring is a critical part of security, and a host of technical

tools can help.

Look for others in the textbook.

Conclusion :

End users can engage in several steps to improve the information security of themselves and

their organizations. These include surfing smart, staying vigilant, updating software and

products, using a comprehensive security suite, managing settings and passwords responsibly,

Page 77: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

backing up, properly disposing of sensitive assets, and seeking education.

Frameworks such as ISO27k can provide a road map to help organizations plan and implement

an effective security regime.

Many organizations are bound by security compliance commitments and will face fines and

retribution if they fail to meet these commitments.

The use of frameworks and being compliant is not equal to security. Security is a continued

process that must be constantly addressed and deeply ingrained in an organization‘s culture.

Security is about trade-offs—economic and intangible. Firms need to understand their assets and

risks in order to best allocate resources and address needs.

Information security is not simply a technical fix. Education, audit, and enforcement regarding

firm policies are critical. The security team is broadly skilled and constantly working to identify

and incorporate new technologies and methods into their organizations. Involvement and

commitment is essential from the boardroom to frontline workers, and out to customers and

partners.

Page 78: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

3/11/2012 6:59:00 PM

Page 79: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

3/11/2012 6:59:00 PM

Page 80: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

3/11/2012 6:59:00 PM

Page 81: Software 11/03/2012 6:59:00 PM - Amazon S3s3.amazonaws.com/prealliance_oneclass_sample/ZRz4GVrPlb.pdf · devices, networking equipment, and other peripherals. ... Software gets your

3/11/2012 6:59:00 PM