Tag Archives: it

Does IT Matter: An Article Review & Response

Review: Information Technology

In his article, Carr (2003) discusses the economic growth versus ubiquity of Information Technology and the impact this has on corporate stability. Carr likens the emergence and innovation of Information Technology to that of the electric power grid and the continental railroad; where those who invest in emerging technology tend to initially out-pace their competition, the competitors who wait for standards to emerge from the same technology can steadily grow beyond at a lower cost. In contrast, those who do not adopt the standard of the innovation are unable to compete within the market and eventually fail.

Carr continues to describe business’ dwindling reliance Information Technology as a cutting-edge innovation and instead as a required commodity with the largest risk being overspending. This phenomenon is stated clearly in the economics law of diminishing marginal utility which states that, as one obtains more of a particular good, eventually the marginal utility declines. Businesses require Information Technology to stay competitive but are now required to focus on efficient use of the technology. As Carr states, the bubble has burst and the time of initial investment has passed.

Standards have been established and innovation will occur steadily and in stride. Like with electricity, businesses need to have Information Technology incorporated within their business model, but gone is the time of unfettered spending. A strong IT infrastructure is certainly a requirement in this age of computing, but there must be a plan in place to implement any further innovation and avoid overspending on a resource that may provide very little in the way of financial return. In the upcoming years of this young industry, IT professionals must learn to focus their efforts and clearly delineate needs and solutions.

Response: Information Technology

Does IT matter? In the age of computers, it, of course, matters. The real question is where does IT matter, or where can IT matter. In their editorial discussion, Grover et al. (2009) posits that there needs to be methods of allowing dissenting views to be heard and argued in a forum that fosters positive growth. Perhaps, in this domain, IT professionals can come together and provide positive solutions to serious problems effecting the information field.

Many other professions, young and old, face this same dilemma. As an example, in the 1980’s when firefighters changed their focus from fire suppression to fire prevention, their efforts were so overwhelmingly good that the incidence of residential and commercial fires decreased and there was no longer a need for so many firefighters. Luckily for the firefighters, there were other niches to fill, and firefighting jobs, though less specialized now, are no longer threatened for a lack of need (Falkenthal, 1999).

We need to find niches for IT. We need to understand where application of IT provides the best solutions. I put forth that IT professionals should be looking for ways to improve the non-IT world.

References

Carr, N. G. (2003). IT Doesn’t Matter. Harvard Business Review, 81(5), 41-49.

Falkenthal, G. (1999, March). It’s time for us to reclaim our fire service. Fire Engineering, 152(3), 32-35.

Grover, V., Straub, D., and Galluch, P. (2009). Turning the Corner: The Influence of Positive Thinking on the Information Systems Field. MIS Quarterly, 33(1), Iii-viii.

Innovation of Technology

Any expansion of the core infrastructure has historically driven technological growth spurts. From the advent of fire, electricity, and assembly-line manufacturing, there has been huge growth in technology following these cataclysms, but what is truly impressive is the exponential growth when these technologies are combined.

The telephone is a great example of this growth. Telephone systems evolved from the telegraph when Alexander Graham Bell combined his expertise of acoustics and oration to his knowledge of electricity. Bell, at the time, was attempting to perfect a multi-band telegraph, or a musical telegraph (Casson, n.d.). I feel that Bell’s contribution to the telephone and others succeeding in the field resulted in his lifelong dream of the musical telegraph being realized as he meant for it to be, unfortunately well after his death. The computer modem is such a device using multiple tones in quick succession to communicate with other computers with modems. The same concepts have been applied to promulgate broadband technology which most of the world now relies upon.

Whenever an innovation of technology occurs, it allows more people more opportunity to expand on it. With this in mind, I feel the biggest benefit of Internet2 and IPv6 would be the spark of innovation that is sure to come soon after acceptance.

References

Casson, H. N. (n.d.). The History of the Telephone. Electronic Text Center, University of Virginia Library. Retrieved on 22 June 2009 from http://etext.virginia.edu/etcbin/toccer-new2?id=CasTele.sgm&images=images/modeng&data=/texts/english/modeng/parsed&tag=public∂=1&division=div1

Wireless reliance

Wireless information appliances will improve overall performance and communications, but will also have an adverse impact as we see today with Blackberry devices. Many people who work with Blackberry devices disregard them during off hours as they become bothersome. This is detrimental as the instantaneous notification is usually expected to be answered immediately. We will see more of this affect towards these devices. On the other hand, those people who welcome the ability to be connected and available at all times will be more accessible and therefore viewed by others as in a better light, perhaps. These people will become the “go-to” people and increase others perception of them on the network. This will lead to reliance on in-house electronic social networking to promote the usefulness of improved connectivity. Realistically, organizations must be clear on the expectations of the responsibilities of having increased connectivity with these and other wireless information appliances.

Another issue with increased connectivity is the increase in the opportunity of exploitation. As Metcalfe’s Law states that a network becomes exponentially more valuable as the user base increases, the inverse of Metcalfe’s Law should also hold true in that the network becomes increasingly vulnerable with a significant risk in membership and the connections themselves. Security becomes exponentially important as the network becomes more valuable.

Whenever I talk about network security, I try to relate it to the brick-and-mortar world: Homes in rural areas with unlocked doors are more secure than the dead-bolted homes of the urban environment.

Comparison of Property Management Software Solutions

In an attempt to isolate two possible property management software solutions from the many available, it was imperative to look at a significant number of options and choose the best two options from that list. Six different software solutions (Buildium™, PropertyBoss™, Propertyware™, Rent-Right™, Tenant-Pro™, and Yardi™) were chosen to be included in the initial comparison based on an internet search for “property management software” and an ad-hoc conversation with a property management professional. The search was specific to the management of 50 properties without regard to specialization in the various property types as it is assumed that any robust solution should be able to handle any property type with little modification.

Figure 1 shows the six chosen solutions, in table format listed in random order of search discovery, correlated with ten requirements (a document management system, a property portfolio, a tenant portfolio, automated financial management, tenant complaint and incident tracking, a service request management system, a work order management system, vacant property marketing tools, tenant screening tools and customizable report generators) which were chosen as valuable traits for any property management solution. Two of the solutions are commercial, off-the-shelf (COTS) solutions while the remaining four are internet-based solutions, or products from application service providers (ASPs). The two COTS solutions (Rent-Right™ and Tenant-Pro™) were immediately discounted as they met the least of the requirements while not having any comparatively significant cost savings (Domin-8 Solutions, Inc., 2007, 2008).

Of the remaining four solutions, all ASPs, Yardi™ (Gnosio, 2002a, 2002b) became obvious as the most costly option and was discounted as a viable option leaving three solutions to compare.

The three remaining solutions appear to be robust and feature-rich with comparable pricing. Of the three remaining solutions, PropertyBoss™ was removed from consideration for lack of available information on specific pricing options. PropertyBoss™ also proved to be the most costly of the remaining three products (O’Bannon, 2006; Real Estate Center at Texas A&M University, 2004).

The greater list of six solutions has been narrowed down to two robust and viable options for a property management solution, Buildium™ (2009) and Propertyware™ (2008). Though both would be fully recommended based on the initial research and greater product comparison, the stated goal is to narrow the available choices to a single recommendation. To this end, a detailed comparison of features and cost must be made.

Buildium™ and Propertyware™ both meet most of the requirements. Propertyware™ lacks only customized reporting, though it does allow for customized fields within the database that are reportable. Though this feature requirement is not met in a strict fashion, it may be a feature that is not adequately advertised. Buildium™, on the other hand, meets all requirements but charges extra fees for some services, and the direct needs of the purchaser should be accounted for to ensure no significant increased cost for these services.

In review of all available information, the recommended solution must be Propertyware™. This recommendation is made with caution as the specific needs of a property manager may very well be better met by another solution. Business owners who rely on software solutions to track legal records should both research their options themselves and consult an attorney for any legal considerations.

References

Buildium, LLC. (2009). Buildium online property management software. Retrieved June 12, 2009, from http://property-management.buildium.com/

Domin-8 Enterprise Solutions. (2007). Rent-right property management software. Retrieved June 12, 2009, from http://www.rent-right.com/Version3/Features/Features.htm

Domin-8 Enterprise Solutions. (2008). TenantPro 7 property management software. Retrieved June 12, 2009, from http://www.tenantpro.com/products/tp7/

Gnosio. (2002a). Email from Paul T. Monson. Retrieved June 12, 2009, from http://www.gnosio.com/gnosio/business/yardi.adp

Gnosio. (2002b). Software solutions for property management. Retrieved June 12, 2009, from http://www.gnosio.com/gnosio/business/solutions.adp

O’Bannon, I. (2006, January). PropertyBoss solution [Electronic version]. The CPA Technology Advisor. Retrieved June 12, 2009, from http://www.cpatechnologyadvisor.com/article/article.jsp?id=1067&pageNum=1

Propertyware, Inc. (2008). Propertyware product feature comparison. Retrieved June 12, 2009, from http://www.propertyware.com/products-compare.shtml

Real Estate Center at Texas A&M University. (2004). Real estate software directory [Survey]. Retrieved June 12, 2009, from http://recenter.tamu.edu/soft/overview.asp?id=1400

Yardi Systems, Inc. (2009). Residential Voyager [Brochure]. Retrieved June 12, 2009, from http://www.yardi.com/US/VoyagerResidential.asp

Figure 1. Comparison chart of six Property Management Software solutions indicating the two most viable options.

Comparison chart of six Property Management Software solutions indicating the two most viable options.
Comparison chart of six Property Management Software solutions indicating the two most viable options.

Defining OS

The purpose of a computer operating system is purely to allow programs to run on the computer and utilize the faculties of the hardware installed. It is no less than the soul of the machine. While a calculator only requires a simple arithmetic engine with simplified inputs and outputs, a large research mainframe requires a much more complex system of input, output, storage, memory management, and busing to connect peripheral devices.

A Brief History

In the 1950’s and ’60’s, institutions that owned computers (at the time, machines that took up large rooms) were required to write the operating system for the machine based on their needs. This was not an efficient means of programming. Every computer upgrade required rewriting the software to run it. This was very costly. Additionally, the simplistic operating system only allowed one set of operations to run at any given time which wasted resources and kept the processor time expensive, itself.

During the 1960’s, a large multi-institutional group (lead by MIT) attempted to solve this problem by creating an efficient, multi-user, timesharing system. Though they made some breakthroughs, the operating system that they designed, Multics (Multiplexed Information and Computing Service), was still bulky and inefficient. The project was soon abandoned.

A few die-hard users at Bell Labs, Inc. decided to continue the effort, and after a few years, UNIX was born. The name was an intended pun on the operating system that predated it.

UNIX is the first operating system to promote object-oriented programming and data pipes which set the standard for operating systems to come. The versatility of UNIX is apparent by its ability to command a range of devices from mainframes to microcomputers. Unix has been described as “of unusual simplicity, power, and elegance….” Its development and evolution led to a new philosophy of computing, and it has been a never-ending source of both challenges and joy to programmers around the world. (Bell Labs, n.d.)

The First UNIX Port

Just as UNIX was being tapped as a useful business tool, one of the developers on sabbatical took a teaching position at the University of California at Berkeley (UCB) where he taught classes on UNIX. Professors and students at UCB continued the development of the operating system on their own and eventually, with funding from DARPA, created the BSD operating system, ported from Bell Labs’ UNIX.

UNIX is certainly the precursor to the contemporary operating system, and though it alone proved to be a reliable, efficient and usable operating system, it is responsible for the growth of computer technology in the last four decades. It is the definition of the contemporary operating system and the standard for comparison.

UNIX has been modified to be run on mainframes, supercomputers, and microcomputers to include desktop PC (Linux) and Apple (NEXTSTEP) computer systems.

The NEXTSTEP For Apple

Apple’s Mac OSX is derived from NEXTSTEP which uses two different flavors of UNIX, Mach and BSD, and relies heavily on open-source software packages, essentially free software programs with access to the source code for user-level modification. Apple attempts to use the security and efficiency of UNIX while competing directly with Microsoft for market-share. (Singh, 2003)

The Mainstay

Currently, Microsoft Windows XP is essentially the operating system of choice for many people when it comes to desktop computing. Microsoft also has a large market-share of the server-platform operating systems. Focused on streamlining usability, Microsoft trades efficiency and security for user-friendliness. Though Microsoft has been attempting to integrate UNIX philosophies into their operating systems, it has lacked the ability to do this successfully without sacrificing its business logic (UNIX and UNIX-based operating systems rely heavily on open-source programming and the consumer for fixing and reporting on bugs, or programming errors).

The closest Microsoft has come to the integration of these philosophies is Windows Longhorn. Unfortunately, while trying to get Longhorn to market, Microsoft cut many of the UNIX-friendly features and implemented a tighter security scheme that resembles XP. This release was called Microsoft Vista. (Greene, 2004)

With these trade-offs, Microsoft actually alienated many PC users because of Vista’s obtrusive security implementation. This is a direct result of the heavy integration of Microsoft’s web-browser, Internet Explorer, into the operating system. This practice seems to go against every contemporary philosophy of what an operating system is.

References

Bell Labs, Inc. (n.d.), The Creation of the UNIX* Operating System. Retrieved June 10, 2009, from http://www.bell-labs.com/history/unix/

Greene, J. (2004, April 19). How Microsoft Is Clipping Longhorn [Electronic version]. Business Week, p. A1.

Singh, A. (2003), What is Mac OS X? Retrieved June 10, 2009, from http://osxbook.com/book/bonus/ancient/whatismacosx/arch_xnu.html

Price and Performance Trends for Computer Hardware

It is important for computer professionals to be able to forecast future technology performance and pricing. In order to fulfill future purchasing and support requirements, the IT professional should be able to analyze historical data and arrive at an approximated, though accurate, figure.

Though it is beyond the scope of this paper to find an elegant solution to the problem, I will examine if it is feasible using the process of averaging the average biennial difference (aBD) and linear slope value (sV) of historical data rather than a complex statistical model.

Method

To forecast current prices and performance of various computer hardware components, I will use historical data from O’Brien & Marakas (2007) and attempt to closely approximate current prices and technological performance growth by finding an average of the aBD and sV based on this data. I will then check current prices and compare my results with a published price list available on the internet.

Design and Procedure

This experiment will be isolated to the growth in performance and pricing as it relates to computer processing units (CPUs) (see Figure 1), random-access memory (RAM) chips (see Figure 2) and hard-disk drives (HDDs) (see Figure 3) over a 15 year period from 1991 to 2005. With biennial data, I will find the sV of each set, the aBD of the values of each set, then average the two. I will repeat this process for each component for performance growth and cost.

To find the current prices, I will use Newegg, Inc. (n.d.), known for reliable and consistent pricing, and compare the results of the historical data analysis.

Results

Computer Processors

The performance growth analysis of CPUs shows a sV of 263.01 MHz with an aBD of 269.64 MHz, a variation of 6.63 MHz with an overall average of 266.32 MHz. The cost analysis shows a sV of $23.28 with an aBD of $26.36, a variation of $3.08 with an overall average of $24.82. Continuing this trend shows that a CPU in 2009 should have a performance of 4.8 GHz with a cost of $626.73.

The typical performance of a CPU today is 2.79 GHz with an average cost of $244.29. The price range per processor is $59.99 – 1,039.99.

A CPU with a performance speed of 4.8 GB today is currently in development and unavailable for price comparison. Though the accumulated speed of multiple core processors can achieve this speed, it is outside the scope of this paper.

Random-access Memory

The performance growth analysis of RAM chips show a sV of 103.2 MB with an aBD of 142.79 MB, a variation of 39.59 MB with an overall average of 122.99 MB. The cost analysis shows a sV of $1.14 with an aBD of $6.71, a variation of $5.58 with an overall average of $3.93. Continuing this trend shows that a RAM chip in 2009 should have a performance of 2,214.84 MB with a cost of $125.66.

The typical performance of a single RAM chip today is 2 GB with an average cost of $33.20. The price range per chip is $22.00 – 56.00.

Hard-disk Drive Storage

The performance growth analysis of HDDs show a sV of 18.82 GB with an aBD of 22.85 GB, a variation of 4.03 GB with an overall average of 20.84 GB. The cost analysis shows a sV of $-24.62 with an aBD of $-26.07, a variation of $1.45 with an overall average of $-25.35. Continuing this trend shows that a HDD in 2009 should have a performance of 375.17 GB with a cost of $23.79.

The performance of a HDD today ranges from 18 GB to 2 TB, though typically 500 GB with an average cost of $91.29 (which is also typical of drives up to 1.5 TB). The price range per 500 GB drive is $49.99 – 379.99.

A HDD with a performance capacity of 375 GB today costs approximately $50.00.

Discussion

Though some of the results approximate the current technology and pricing, the data set used is too small to draw any meaningful conclusions at this time. Differences in device stability, manufacturing technologies and branding complicate this issue even further. More research needs to be done to find any meaningful correlation between historical pricing and technological performance growth with that of the future. The use of larger data sets analyzed with statistical methods may prove useful, but at this time, the use of an average of the sV of each set and the aBD of the set values does not provide any realistic outlook on technology in the future.

References

Newegg, Inc. (n.d.). Newegg.com online store. Retrieved June 5, 2009 from http://www.newegg.com/Store/Computer.aspx?name=Computer-Hardware.

O’Brien, J. A., & Marakas, G. M. (2007). Computer hardware. In S. Mattson, S. Isenberg & T. Hauger (Eds.), Introduction to information systems (14th ed.) (p. 109). New York, NY: McGraw-Hill/Irwin.

A prediction

My prediction is that Solid-state drives (SSDs) will be the effective standard for all business and personal computing platforms within ten years.

With the new SATA 3.0 specification calling for link speeds of 6Gbps (effectively providing maximum data transfer speeds of 600 MBps) and devices capable of read and write speeds from 200-240MB/sec, solid-state drives will gain huge momentum in personal computer integration. With these fast speeds, installing essential operating system objects on these drives will contribute to significant decreases in boot time without machine state state saving options like sleep-modes or hibernate-modes, coupled together leading to almost instantaneous booting of the computer.

Utilizing the same technology that made USB-key drives so popular, internal SSDs are robust and integrate easily with SATA buses which allow for maximizing bus speeds, capacity (1TB), redundant data protection (i.e. RAID) and lower power demands than the PATA predescessor (250mV vs. 5-Volt), essential in mobile computing applications.

Academic Goals

Settling on a degree program among the vast array of choices available has been a goal of mine for a very long time. Many people that I know always assume that I have already obtained a degree, no matter how many times I tell them the opposite. They are always surprised by this. Fortunately, soon after graduating high school, I found a career where I excel, and it has always brought me financial stability and the variety which I crave; therefore, I have never felt a professional need to further my academics in my current field.

Obtaining a degree, in my mind, is a personal goal that lends to the creation of academic and professional goals, both short and long-term. I only have one long-term personal goal: leave a positive mark on the society in which I live. This creates a positive personal growth atmosphere where I feel that I can accomplish any task worth undertaking. This is where I start my journey in academia.

The educational choices presented to me were quite diverse, and I was fortunate enough to have the time to weigh the various options. One of the issues that I considered heavily is the motivation of the institutions in their recruitment processes. More students certainly equates to more money, and I do not fault any business for making money. In contrast, I needed to find an institution that promoted other values as well, specifically societal values. Walden University’s values of promoting and affecting positive social change are admirable to say the least. This agrees with my values and coincides with my goal of leaving that positive mark on society. This is why I chose Walden University for my academic growth.

One of my long-term professional goals is to gain a position to be able to help rescue and rebuild in the face of disaster. Today’s society relies heavily on the free flow of information, and in the event of disaster, improving the stream of this data is crucial to the economic prosperity of the affected region. I chose to enroll in the Computer Information Systems program and specialize in forensics to better understand the specifics in disaster-related network response. This will allow me to help more people when they need help the most.

To use a long held standard, “The best way to do is to teach many to do.” So that I may do the most good, I wish to eventually become an expert in my field and teach others in the profession. Thus, my long-term academic goal is to obtain my Ph. D. to further the research and to continue to formulate best practices of recovery in disastrous situations.