1/147
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
What has changed in the US for over half a century?
problem solving
provides insight to operations
can make things happen faster
using data to select strategy, options to pursue paths to follow with confidence
info system components
hardware
software
data
procedures
people
on premise
IT infrastructure hardware and software applications that are hosted on site
evolution of data storage
significant advancements in capacity, speed and accessibility
on demand availability data storage/computer power
free of direct active management
shared resources achieve economies of scale
Cloud pros
minimize up front IT infrastructure costs
get apps up/running faster with improved manageability/ less maintenance
enable rapidly adjust resources to meet fluctuating unpredictable demand
manage firewalls intrusion identification and counteractive action frameworks and information stream inside the network
pay as you go model
can lead to unexpected operating expenses if administrators are not familiarized with cloud pricing models
SaaS
software as a service
google docs, Gmail, basecamp, FreshBooks
accessible via web browser
priced on a pay per basis/subscription fee
PaaS
platform as a service
development and deployment environment
ex. app engine, azure, force.com
IaaS
infrastructure as a service
ex. Rackspace, go grid, aws
servers, storage, and networking
common uses: business continuity, disaster recovery, big data
VPN
virtual private network
enhances privacy
bypasses geo restrictions
security on public wifi
access blocked websites
preventing ISP tracking
secure file sharing
String
str or text
used for combination of any characters that appear on keyboard such as letter numbers and symbols
Character
char
used for single letter/number/symbol
integer
int
used for whole numbers
Float
real
used for numbers that contain decimal points or fractions
Boolean
bool
used where data is restricted
true/false or yes/no
Qualitative
nominal - set of values that don’t process a natural ordering ( cannot be measured through numerical units ( red, yellow, blue)
ordinal - natural ordering (small , medium, large )
Quantitative
discrete - integers or whole numbers
continuous - fractional numbers
BLOB
binary large object
images, audio files, video clips
CLOB
character large objects
remains at native location and CLOB field is an address which references the location of the data
books, medical record doc
API
Application Programming Interface
allows two applications to talk to eachother
Sentiment analysis
determines whether the data is positive, negative or neutral
Evolution
data reporting needs served
tier 1- keep the doors open (support transactions and maintain operations)
tier 2- know the past and current operations
tier 3- combine internal/external data to provide insight to future options/probabilities and help set strategy
Using data to solve problems
full service staff taking orders/running foods/ collecting payment
much more control
everything goes smoother
better experience for customers
QR code where customers place order/make payment, staff only run food
setting strategy
work smartly
move forward w/ confidence
develops trust for all parties
IS tools help ensuring data captured is accurate for which to base decision
provide insight
by #s
when you have mastered #s you will find in fact no longer be reading #s anymore then you read books
picture worth 1000 words
dashboard drive
identify and remove clutter
the more difference the harder to stand out
use contrast to leverage difference and provide focus
employ visual order
faster and cleaner for audience
good GUI
self documenting
minimize data and collect errors
enhances overall understanding
dashboards
a picture worth 1000 words
gives instant meaning and insight to thousands of data points
a visual display of data used to monitor conditions and or facilitate understanding
visualization
best way to understand data is through visualization
well-designed dashboard help convey data driven insight
helps you to make informed decisions with confidences
what gets measured gets moved
focus
well designed dashboards focus on specific areas of business
should be visually pleasing, logically organized, easy to drill down
improves communication and data driven complexity
collaboration
improves communication so everyone can understand and digest
encourages collaboration
responsiveness
identify issues and resolve more quickly so to get projects back on track
able to identify a positive trend as they emerge and capitalize on them
benchmarking
comparing own data to top performance
helps you set reasonable goals so you can be a top student
helps internal players strive to be in top tier
common to mingle of external data and set benchmarks, asses standings against peer /top performers in industry
supports goal of standard to be achieved/surprised
self-serving dashboards
power or self-serving analysis
data help motivate action in the right direction
end user knows where they are and where they need to get
Graphically
the ability to understand and present info in non text formats
sketches, symbols
Technology
think of it as having the ultimate data and reach security program
security
always excessive until its not enough
into security
protecting info systems from unauthorized access, distribution or destruction
confidentiality
keeping data private
integrity
making sure data is not altered
availability
ensuring systems and ata are accessible when needed
IT risk
operational - system failure, human error
security - unauthorized access, hacking
compliance - violating laws or regulations
reputational - data breech leading to loss of trust
cybersecurity
NIST - national institute of standards and technology
Annual risk assessment
continuous review
safegaurding the existance of the data, maintaining of the data and data integrity, definition of data, and appropriate use and access of data
Threats
natural threats - floods, tornadoes
unintentional threat - employee mistakenly accessing the wrong info
intentional threats - spyway, malware, adware companies , actions of a disgrunted employee
Vulnerability
developing weak points to develop strategy for quick response
known weakness that can be exploited by attackers
managing threats
team members stay informed
cybersecurity
preform regular threat assessments
conduct penetration testing
red- attackers/ hack infrastructure
blue- defends against attacks
Ransome wave attacks
cybercriminals employ advanced encryption and targeted strategies
cripple organizations and lead to financial losses and dama
Spear phishing/smishing
malicious email (phishing) or text message (smishing) sent to a person
criminals already have name employment, title, email into about job
criminal addresses victim by name and knows job role, involves making bank transfers on company
go for a top people of company
email phishing
theft scam
theft emails / websites to trick people into giving people into
Angler Phishing
tricking victim by using into the victim has posted on social media
Supply chain attacks
compromise the entire supply chain by infatuating trusted vendors or suppliers
insert malicious code or backdoors into software updates to users
prevent through vendor vesting, regular security assessments
denial of service attacks
text 2 data
shutdown IP addresses
company firewalls
social engineering
cybercriminals employ sophisticated techniques and personalize into device individuals
the abundance of personal data available on social media and online platforms makes these attackers more convincing
AI in cybersecurity
criminals have these tools
Mobile malware
targeting of mobile devices
data breaches and identify theft
Data leak
data locked where it’s not supposed to be
data breech
info is accessed and extracted w out authorization
Access Management
multi factor authentication- additional to password, user has private device response
known device - warnings if account is accessed from unknown device
role based access management - point of access = key to everything
characteristic of high-quality data
accurate
consistent
unique
complete timely
complete
data governance
like 3 branches of gov
creation of rules
execution of rules
adjudication of violations
UI Health Alliance
UIHC
cedar rapids mercy care
davenport genesis health
west Burlington great river health
Prototyping
experimental process where design teams and develops implement ideas into tangible firms from paper to digital
Graphical user interface (GUI)
methods of user centered design are used to ensure that visual language introduced
Value and characteristics of good GUI
methods centered design are used to ensure that visual language introduced in design is well tailored to tasks
goal is to enhance efficiency and ease of use: usability
value and character of good GUI
self-documenting
minimal clicks
enables clean data
works well on any device
Aesthetically pleasing and clear
provides visual appeal - meaningful contrast between screen elements, create elements, align screen elements and groups
visually clean - visual elements, functions, metaphors, words and text
compatibility and configurable
compatible to… user, task and job, product
adopt users’ perspective -
easy personalization, configuration and reconfiguration of settings
enhance sense of control
comprehensive
easy to understand and learn
consistency
should look act and operate the same
similar look, uses, operation
control and directiveness
actions should result from expplicit user requests
preformed quickly
capable of interruption or termination
context maintained must be from perspective of user direct ways to accomplish tasks
efficiency, familiarity, and predictability
minimize hand and eye movements
transitions flow easy
good response time
paths as short as possible
eye movement obvious and sequential
anticipate users wants and needs
comply familiar concepts
user should be able to anticipate natural progression
forgiveness and recovery
tolerate and forgive common unavoidable errors
provide constructive messages when errors occur
ensure users never lose work bc of error
the invaluable SME
good applications stem from good partnerships between the SME and developer
sampling
useful in prototyping exploration
useful in testing
databases
systematic collection of data
supports electronic storage /manipulation of data
eases data management
relationship database
relationships in forms of tables
NOSQL database “not only SQL”
suited from semi structured or unstructured data
useful for large volumes of raw data
object oriented databases (OODB)
storage of all data types
stored in the form of objects each object contains both data and methods that can operate on that data
SQL - structured query language
commands to access and manipulate databases - stored in (RBDMS) relationship database management systems
query language rather than the database itself
relational databases
closely associated w SQL
use tables to organize data
non relational databases
some NOSQL also support SQL like querying or have their own query languages
SQL is a query language
serves as a standard way to interact with databases
can also be used in some non relational databases
language used to instruct a database system on what operations to preform on the data stored within DB
data warehouse
facilitate a single version of truth for a company for design making and forecasting
contains historical commutative data from single or multiple sources
simplifies the reporting and analysis process of the organization
Data lake
centralized repository storing all structured and unstructured data at any scale
can store data as is w out having to first structure data
guides better decisions
traditional data warehouse: stores data in files
data lakes: stores data in flat architecture
holds vast amount of raw data in its original form until needed
data mesh
decentralization and data distribution of data ownership both at a technical and organizational level
transactional data base
operational
good to support good response time for realtime work flow
optimized for running production systems
reporting database
organized to support reporting needs
offload report processing from transaction database
ETL Extract Transform Load
Step 1: Extract
most manage data from many data sources use multiple data analytics
before data can be moved to a new destination it must first be extracted from its source structured and unstructured data is important and consolidated into a single repository
Step 2: transform
CLEANSE: resolve inconsistencies and missing values
STANDARDIZE: apply formatting rules
DE-DUPLICATE: discard redundant data
VERIFY: remove unusable data flag anomalies
SORT: organize data according to type
Step 3: Load
load newly transformed data into new destination
full loading : everything reloaded can grow exponentially if old not dropped
incremental loading: only produces additional records if new and unique info is found
SQL (structured query language )
commands to access and manipulate databases
query’s to insert, delete, update, search, alter and more w database
powerful language that can handle complex queries
Text vs numeric fields
numeric fields should be enclosed in quotes
SQL requires single quotes around text values (most will allow double quotes)
LIKE *
represents 0,1 or multiple characters
LIKE ?
represents 1 single character
Programming basics
to tell a computer to do something , program must be written to tell it exactly what to do and how to do it
Variable
name, type, value
used for calculations striving values and later in decisions and iteration
Synate ruled command statements
structure of programming statements that direct action
input, output, assign value
python programming language
popular high-level general-purpose programming language
designed for code readability
“Patterns include” language due to its comprehensive standard library
programming in python
capure- caputre start and end time the program ran takes to generate story by calls to determine datetime.now
print - print at the end of run “time to generate story:x” where x is the difference between the start and stop time of story creation
end - end with “the end” printed to terminal
network protocols
rules that define how data is transmitted between devices on a network
ensure communication and compatibility
govern data exchange, security, and error handling