IT Blogger

Hi, hope you enjoy my content!

Sunday, May 23, 2010

Ch 11 Information Technology

Week Twelve Ch 11- Weekly Questions

1. Explain the triple constraint and its importance in project management.

The triple constraint involves making changes between the three factors; scope, time and cost for a project. Changes are always going to be made to a project at some point and that will involve the changes to the scope, time or cost of the project. It is important to project management as when a business is making plans for the project it can keep in mind a reasonable timeframe, budget and the requirements that are involved, however, not hold these in concrete. It allows for flexibility and change. It provides a guideline for the project.

The image below shows the triple constraint. http://brianherman.files.wordpress.com/2008/10/triple-constraint.png














2. Describe the two primary diagrams most frequently used in project planning

Pert Chart (Program Evaluation and Review Technique) is a graphically network model that depicts a project’s tasks and the relationship between them. Pert charts show dependency between project tasks.

Here is an example of one below:
http://cobweb.ecn.purdue.edu/~epics/docs/docs/project_plan_example/PERT.gif

















A Gantt chart is a bar chart and a tool that allows the user to model the planning of tasks necessary to the performance of a project against a calendar. It allows for the graphic representation of the progress of the project, but it is also a good means of communication amongst the various persons involved in a project.

http://www.total-quality-management-software.com/images/project_gantt_chart.gif provides an example of one below:













3. Identify the three primary areas a project manager must focus on managing to ensure success.

1. Managing people (e.g. resolving any conflicts).
2. Managing communications (e.g. through a developed communications plan/receiving feedback).
3. Managing change (anticipate and react appropriately to change).

4. Outline 2 reasons why projects fail and two reasons why projects succeed.

Fail:
1. Unrealistic expectations: E.g. The management team may predict for the project to take a shorter duration then would be anticipated usually as they may receive a bonus if they do so, however, the rest of the team forecasts that the project will be ineffective if rushed. The following article- http://www.coleyconsulting.co.uk/failure.htm provides a recommendation to this problem which says that: “The recommendation here is to review all project plans to see if they are realistic, and to challenge the participants to express any reservations they may have with it”.

2. Poor scope- This is a management issue closely related to change control. Management must be realistic about what is it they want to achieve and when, and stick by it.

Succeed:
1. The right mix of team players: Having a team on board that is diverse and dedicated can bring many positive aspects to a projects as everyone has the same common goal, however, can all bring different ideas to to the table.

2. Effective communication: Through delivering effective streams of communication team members can know exactly what is expected of them. They can feel comfortable in asking questions and inputting their ideas to management which can enable the project to run smoothly and efficiently.

Ch 9 Information Technology

Week Ten Ch 9 Weekly Questions

1. What is your understanding of CRM?

Customer Relationship Management is the focus of the relationship between the customer and the business. It aims to meet the needs and wants of the customer and in return the business receives customer retention, loyalty and, therefore, guaranteed productivity.
Includes a one-to-one relationship between a customer and a seller.
One simple idea “Treat different customers differently.” Helps keep profitable customers and maximizes lifetime revenue from them.

The following article http://searchcrm.techtarget.com/definition/CRM defines a CRM as:

“CRM is an information industry term for methodologies, software, and usually Internet capabilities that help an enterprise manage customer relationships in an organised way. For example, an enterprise might build a database about its customers that described relationships in sufficient detail so that management, salespeople, people providing service, and perhaps the customer directly could access information, match customer needs with product plans and offerings, remind customers of service requirements, know what other products a customer had purchased, and so forth.”

2. Compare operational and analytical customer relationship management.

Operational CRM

Is involved with traditional transactional processing for day-to-day front of house operations (sales, marketing and service) that deal directly with the customers. Each interaction with a customer is generally added to a customer's history, and staff can retrieve information on customers from the database as necessary. It simplifies and orderly creates databases of customer information.

Analytical CRM

Is involved with back of house operations and strategic analysis which does not deal directly with the customers. Data gathered is analysed to segment customers or to identify cross- and up-selling potential. This system uses data mining to gather strategic information/data on customers. This can assist in making forecasts and predictions e.g. retaining customers.

http://www.fidis.net/typo3temp/tx_rlmpofficelib_a219f6551f.jpg -shows the relationship between the two.














3. Describe and differentiate the CRM technologies used by marketing departments and sales departments.

MARKETING
1. List generator – gathers customer information from an array of sources and uses the information in the relevant sectors. E.g. for website questionnaires, customer lists, website visits. This information provides the organisation with the tools it needs to target its customer base.

2. Campaign management system – guides users through marketing campaigns e.g. in planning and scheduling. These systems can calculate results for return on investment for each marketing campaign.

3. Cross-selling and up-selling
Cross-selling: selling additional products or services.
Up-selling: increasing the value of the sale.

SALES
1. Sales Management- which tracks each stage of the sales process, which assists sales representatives in maintaining all of their customer records (including accounts). E.g calendars for events, alarms for meetings.

2. Contact Management- holds customer contact details (which is beneficial for future sales as you can send emails of upcoming sales). It contains features including; customer notes and telephone number and name display.

3. Opportunity Management- Aims to create sale opportunities by finding and attracting new customers or companies for future sales. These systems determine potential customers and competitors and detail selling information including budgets.

4. How could a sales department use operational CRM technologies?

The department could use the technologies to maintain its customers records on purchases, how frequently they shop, etc. It could use the sales force automation, (SFA) a system that automatically tracks all of the steps in the sales process to ensure that the process runs smoothly, efficiently and effectively.

5. Describe business intelligence and its value to businesses

http://searchdatamanagement.techtarget.com/definition/business-intelligence describes business intelligence (BI) as:

“A broad category of applications and technologies for gathering, storing, analysing, and providing access to data to help enterprise users make better business decisions. BI applications include the activities of decision support systems, query and reporting, online analytical processing (OLAP), statistical analysis, forecasting, and data mining.”

Its valuable to business as the market is forever changing and advancing and BI enables businesses to identify, address and meet the needs of their customers which helps them maintain a competitive edge. It allows business users to receive data for analysis. For example BI provides valuable information in:

- Determining who their customer base is, enabling the business to correctly market their product.
- Identifying exceptional sales people through their high productivity figures and continual cross-selling sales.
- Determining whether or not campaigns have been successful through customer retention figures.
- Determining whether the business is profitable.

It also provides a single point of access to information for all users, it can be used in every step of the value chain and gives up-to-the-minute information for users.

6. Explain the problem associated with business intelligence. Describe the solution to this business problem.

'Data rich, information poor'
Technology is on constantly advancing and, therefore, so is the amount of information and data that is being provided in organisational systems and databases. It can take hours, days or sometimes weeks to gather and retrieve different sources of information needed in organisations when compiling things like business reports. Business Intelligence systems can solve this problem as they can provide all the information needed in databases where relationships can be linked, providing data involving aspects like customer sales and contact details, more freely to the sales reps.

7. What are two possible outcomes a company could get from using data mining?

Association Detection- which will reveal the degree to which variables are related and the nature and frequency of these relationships in the information. E.g. buying behaviour. Organisations can use this to make predictions of further purchases as well as opportunities for cross selling.

Statistical analysis- which performs functions such as information correlations, distributions, calculations, and variance analysis. The organisation can use this tool to make forecasts and predictions made on the basis of time-series information.

Ch 8 Information Technology

Wk 9 Ch 8 Weekly Questions

1. Define the term operations management

Operations management can be defined as managing the processes to produce and distribute products and services.


The following supporting article: ‘Operations Management’ by Carter McNamara, MBA, PhD http://managementhelp.org/ops_mgnt/ops_mgnt.htm explains that:

“Overall activities often include product creation, development, production and distribution. Operations management is in regard to all operations within the organisation. Related activities include managing purchases, inventory control, quality control, storage, logistics and evaluations. A great deal of focus is on efficiency and effectiveness of processes. Therefore, operations management often includes substantial measurement and analysis of internal processes.”

2. Explain operations management’s role in business

Managing the processes to produce and distribute products and services. To report, plan and control functions involved within the business operations.

The following article: ‘Role of the Operations Manager’ http://publib.boulder.ibm.com/tividd/td/TWS/SC32-1256-00/en_US/HTML/eqqg1mst35.htm states that these roles will produce positive effects including;

- Improving the efficiency of the operation.
- Improving control of service levels and quality.
- Setting service level agreements for end-user applications and for services provided.
- Improving relationships with end-user departments.
- Increasing the return on your IT investment.
- Developing staff potential.

3. Describe the correlation between operations management and information technology


Information Technology influences the way in which operations management runs as well as having a significant impact on the decisions that are made in the field. This is because IT has effective and efficient up-to-date information made readily available as well as systems in place that help with areas including forecasting through systems such as excel and access. IT assists in productivity, the reduction of costs, quality, customer satisfaction. It provides flexibility and a comparison of other operations. They assist managers in making well-informed business decisions including :

- What: What resources will be needed and in what amounts?
- When: When should the work be scheduled?
- Where: Where will the work be performed?
- How: How will the work be done?
- Who: Who will perform the work?

4. Explain supply chain management and its role in a business

Supply chain management is the stream of communication between the different stages involved in the supply chain process. Its aim is to maximise total supply chain effectiveness and profitability.

Supply chain management (SCM) is defined by http://www.wisegeek.com/what-is-supply-chain-management.htm as: “a process used by companies to ensure that their supply chain is efficient and cost-effective.” It’s role in business is to plan, source, make, deliver and return.

Below is an example of a supply chain management mind-map attained from: http://www.axtin.com/solutions/images/supply_chain_diagram.jpg














5. List and describe the five components of a typical supply chain

plan- for the resources that will be used, and for the details of the development process. It must be developed to address how a given good or service will meet the needs of the customers e.g. planning a profitable supply chain.

source- choosing reliable suppliers through extensive research and recommendation. Companies must also develop shipping, delivery, pricing and payment processes with the suppliers.

make- manufacturing, testing, packaging and scheduling the products and/or services for delivery.

deliver- the logistics step that plans for the effective and efficient transportation and storage of supplies from suppliers to customers.

return- creating a network for receiving defective and excess products as well as providing support to customers who have problems or questions regarding the delivered products.

6. Define the relationship between information technology and the supply chain.

Creating the integrations and information linkages between functions within in an organisation e.g. marketing, sales, finance, manufacturing and distribution and between organisations which allow the flow of both information and product between customers, suppliers and transportation providers across the supply chain.

IT ensures that planning, decision making processes, business operating processes and information sharing can be efficient and effective. Examples of changes resulting from advances in information technology involving the supply chain include: visibility, consumer behaviour, competition and speed.

Ch 7 Information Technology

Week 8 Chapter Seven - Weekly Questions

1. Explain the business benefits of using wireless technology.

Some sources of wireless offer connectivity over an area as large as your desktop whilst others can cover a medium-sized office space. Wireless technology can offer businesses more flexible and inexpensive ways to send and receive data. Some benefits include:

- Less hardware.
- Improved infrastructure.
- Increases mobility.
- Easy Access to the Web.
- Enables Access to ‘live’ information.
- Removes Cabling & Wiring.
- Reduces the requirements for hubs/switches.

This supporting article “Wireless Communications- The Benefits of Wireless Communication” says that the four key benefits of wireless technology are:

1. Increased efficiency - improved communications leads to faster transfer of information within businesses and between partners/customers.

2. You are rarely out of touch - you don't need to carry cables or adaptors in order to access office networks.

3. Greater flexibility and mobility for users - office-based wireless workers can be networked without sitting at dedicated PCs.

4. Reduced costs - relative to 'wired', wireless networks are, in most cases, cheaper to install and maintain.

http://www.is4profit.com/business-advice/it-telecoms/wireless-communications/the-benefits-of-wireless-communication.html

2. Describe the business benefits associated with VoIP

As VOIP allows the internet to carry voice in digital format, call costs have dramatically decreased as the international calls are now internet connections.It enables phone calls, faxes, voice mail, e-mail and Web conferences over digital networks. Easy navigation, dial-by-name capability, three-way-calling, comprehensive information about each caller, mobility.

It saves money in three ways;

1. VOIP runs over the existing computer network
2. Calls over the internet do not attract Telecommunications charges.
3. Customers can port their numbers between carriers.

Further benefits are provided through this supporting article: http://www.alltel.com.au/voipbenefits.html ‘Business Benefits of VoIP / IP Telephony’ which states that:

“Business VoIP / IP Telephony will benefit your business in a number of ways...

* cheaper telephony and lower operating costs
* many features at low cost
* easier to make changes
* easier to relocate
* can enable collaboration tools for an increasingly decentralised work force
* convergence provides lower cost WAN connectivity.”

3. Compare LANs and WANs

http://freesoft.org/CIE/Topics/13.htm explains that:

“Local Area Networks (LANs) and Wide Area Networks(WANs) are generic terms referring to two important basic types of networks. Let me try to summarize the characteristics of each, and then discuss their importance to the network engineer.”

Local area networks (LANs) connect computers that reside in a single geographic location on the premises of the company that operates the LAN.

Wide area networks (WANs) – connect computers at different geographic sites.

LAN/WAN Comparison

Local Area Networks (LANs)

- Most commonly: Ethernet, Token Ring, FDDI
- Advantage: speed
- Cost Center: dense installation (about one interface per room)
- Current Speed: 10-100 Mbps (mostly 10 Mbps)
- Common Users: File sharing
- Common Problems: Cable disruption by users
- Conceptually: A bunch of lines hooking users together

Wide Area Networks (WANs)

- Most commonly: Leased lines, serial links, ISDN, X.25
- Advantage: distance
- Cost Center: length of long-haul lines (about one interface per 100 miles)
- Current Speed: 0.01 to 45 Mbps (mostly clustered around 1 Mbps)
- Common Users: Email and file transfer (including Web)
- Common Problems: Cable disruption by backhoes
- Conceptually: A bunch of lines hooking cities together

A good networking design must answer both the LAN and WAN needs of its users.

4. Describe RFID and how it can be used to help make a supply chain more effective.

The following article: ‘How RFID can help optimise supply chain management’ http://www.ameinfo.com/66090.html describes an RFID as:

“A system of small electronic tags (comprising a tiny chip plus an antenna) that transmit data via a radio signal to RFID readers and related hardware and software infrastructure. The transmitters can be placed anywhere that tracking the movement of goods adds value to the commercial process: on containers, pallets, materials handling equipment, cases or even on individual products.”

It can be used to help a supply chain more effective as by adding RFID tags to every product, tool, resource and item of materials handling equipment, manufacturers will be able to get better demand signals from customers and the market. It has the potential of helping retailers provide the right product at the right place at the right time, thus maximising sales and profits.

RFID provides the technology to identify uniquely each item being manufactured, shipped and sold, therefore, provides the stepping stones for increased visibility throughout the supply chain. Organisations are able to link the physical world to the digital world without any human interaction which reduces costs and time, increases efficiency and business intelligence. It has the potential to deliver better asset utilisation, produce higher quality goods, reduce shrinkage and counterfeiting, and increase sales by reducing out-of-stocks. It can even help improve the safety of the food and pharmaceuticals we buy.

The following diagram shows the process involved with RFID: http://www.satoasiapacific.com/img/RFID-Logistics_290.gif













5. Identify the advantages and disadvantages of deploying mobile technology:

Advantages-

* Mobile workforce.
* Real time processing.
* Vast delivery.


Disadvantages-

* Wireless technology can at times be insecure.
* Issues involved with safety.
* Privacy issues with mobile phones.
* Viruses on unsecured devices.


Ch 6 Information Technology

Weekly Questions- Wk 7 Ch 6

1. List, describe, and provide an example of each of the five characteristics of high quality information.


Accuracy- Are all the values correct? E.g. named spelled correctly? Dollar amount recorded properly?

Completeness- Are any of the values missing? E.g. is address complete including state, street, city state and postcode?

Consistency-
Is aggregate or summary information in agreement with detailed information? E.g. Do all total fields equal the true total of individual fields?

Uniqueness-
Is each transaction, entity and event represented only once in the information? E.g. are there any duplicate customers?

Timeliness-
Is the information current with respect to the business requirements? E.g. is information updated weekly, daily or hourly?

2. Define the relationship between a database and a database management system.


Whatis.com defines a database as: "a collection of information that is organised so that it can easily be accessed, managed, and updated. In one view, databases can be classified according to types of content: bibliographic, full-text, numeric, and images." (http://searchsqlserver.techtarget.com/definition/database).

A database is the heart of an organisation. It is a structured collection of related data e.g. a filing cabinet, an address book, a telephone directory, a timetable, etc. It stores key business information like;

* Sales Data – customers, sales, contacts.
* Inventory Data – orders, stock, delivery.
* Student Data – names, addresses, grades.

All businesses use a database of some type. Effective managers know the value of extracting of important data.

A Database Management System (DBMS)- provides all users with access to all the data. It’s software through which users and application programs interact with a database. For examples they can produce reports, run queries through programs such as access (a collection of related tables).

Wisegeek.com explains that a dbms is a computer software program that is designed as the means of managing all databases that are currently installed on a system hard drive or network. Different types of database management systems exist, with some of them designed for the oversight and proper control of databases that are configured for specific purposes. (http://www.wisegeek.com/what-is-dbms.htm)

3. Describe the advantages an organisation can gain by using a database.

DBMSs provide many advantages for an organisation as they minimise the following problems:

- Data redundancy: The same data is stored in many places.
- Data isolation: Applications cannot access data associated with other applications.
- Data inconsistency: Various copies of the data do not agree.

Databases also ensure that:

* Data security is maintained: Through keeping the organisation’s data safe from theft, modification, and/or destruction.
* There is a high level of data integrity: Data must meet constraints (e.g. student grade point averages cannot be negative).
* Data independence exists: Applications and data are independent of one another. Applications and data are not linked to each other, meaning that applications are able to access the same data.

High quality information can significantly improve the chances of making a good decision and directly increase an organisation’s bottom line.

INCREASED FLEXIBILITY- A good database can handle changes quickly and easily. Each user can access information in own way. Physical view> physical storage of information e.g. hard disk. Logical view> focuses on how users seek information to best suit their needs.

INCREASED SCALABILITY & PERFORMANCE- Databases scales to handle masses of information. How well a system can adapt to the increase in demands.

REDUCED INFORMATION REDUNDANCY- the duplication of information, or storing the same information in multiple places. It occurs because organisations frequently capture and store the same information in multiple locations. The problem is that it can often be inconsistent. Eliminating information redundancy saves space, makes performing information updates easier and improves information quality.

INCREASED INFORMATION INTEGRITY (QUALITY)- Measure of the quality of information. Integrity constraints are rules that help ensure the quality of information. They can be defined and built into the database design.
2 types of integrity constraints: relational (rules that enforce basic and fundamental information-based constraints) and business-critical (enforce business rules vital to an organisation’s success and often require more insight and knowledge then relational integrity constraints).

INCREASED INFORMATION SECURITY- Organisation must protect its information from unauthorised users or misuse. Therefore, databases offer passwords, access levels and controls.

4. Define the fundamental concepts of the relational database model.

* A relational database is a collection of tables from which data can be accessed in many different ways without having to reorganise the database tables. It stores information in logical 2D tables that relate to each other.

* Once these relationships are created, we can create links that relate the tables to find:

- Which students are attending all tutorials.
- Which students have high distinctions.
- Which subject has the highest failure rate.
- An example of the model can be seen below:
















http://www.blurtit.com/var/question/q/q1/q19/q192/q1922/q192204_414325_673px-er_diagram_mmorpg.png

5. Describe the benefits of a data-driven website.

* Development- allows website owner to make changes any time. All without having to rely on a developer knowing HTML programing.

* Content management- a static website requires a programmer to make updates. This adds an unnecessary layer between the business and its web content which can lead to misunderstandings.

* Future expandability- having a data-driven website enables the site to grow faster than would be possible with a static site. Changing the layout, displays and functionality of the site is easier with a data-driven solution.

* Minimising human error- a well designed, data-driven website will have ‘error-trapping’ mechanisms to ensure that required information is filled out correctly and that content is entered and displayed in its correct format.

* Cutting production and update costs- Can be updated and published by any competent data-entry or administrative person. It is convenient and affordable and changes and updates take a fraction of the time of static sites. Training a data-entry person can be done in up to an hour.

* More efficient- The system keeps track of the templates so users do not have to. Layouts and structures only have to be programmed once. It improves the reliability and stability of a website, while reducing the chance of ‘breaking’ some part of the site when adding new areas.

* Improved stability- There is a peace of mind knowing the content is never lost- even if your programmer is.

6. Describe the roles and purposes of data warehouses and data marts in an organisation.

The role of a data warehouse is to logically collect information, gathered from many different operational databases, that will support business analysis activities and decision-making tasks.

The primary purpose of a data warehouse is to aggregate information throughout an organisation into a single repository for decision-making purposes.

A data mart contains a subset of data warehouse information. Its role involves allowing organisations to run transactional data and visibility upon the whole organisational whilst showing the relationship between the sectors.

Tech target defines a data mart’s role as being “designed to serve a particular community of knowledge workers. In scope, the data may derive from an enterprise-wide database or data warehouse or be more specialized. The emphasis of a data mart is on meeting the specific demands of a particular group of knowledge users in terms of analysis, content, presentation, and ease-of-use. Users of a data mart can expect to have data presented in terms that are familiar.” http://searchsqlserver.techtarget.com/definition/data-mart

In a data warehouse and data mart, information is multi-dimensional; a cube, it contains layers of columns and rows. Data warehouses have a more organisational focus whereas data marts have focused information subsets (a part of a larger group of related things) particular to the needs of a given business unit e.g. finance.

Ch 5 Information Technology

Week Six Ch 5- Enterprise Architectures: Weekly Questions

1. What is information architecture and what is information infrastructure and how do they differ and how do they relate to each other?

Information architecture identifies where and how important information, such as customer records, is maintained and secured. The three primary areas/components of it are;

- back-up and recovery
- disaster recovery
- information security

Information infrastructure includes the physical pieces of hardware, software and telecommunications equipment that, when combined, provides the underlying foundation to support the organisation’s goals. The system needs to be adaptable to changes as the organisation faces change.

These information systems differ as the information architecture refers to the overall plan of how a business goes about configuring its resources whereas the information infrastructure refers to the actual implementation of the plan through the use of physical pieces of hardware and people’s skills.

They relate to each other as the architecture establishes the plan for the infrastructure implementation. This is supported through the following diagram.
















https://fedoraproject.org/w/uploads/8/87/Infrastructure_Architecture_frontend.png

2. Describe how an organisation can implement a solid information architecture.

An organisation can implement a solid information architecture by implementing the three components areas of information architecture which are;

* back-up and recovery (provides exact copies of system’s information and the recovery component allows the system to run after a crash or failure and includes restoring the information backup).

* disaster recovery (businesses can establish disaster recovery plans to prepare for the occurrence of natural disasters. This usually involves having back-up information stored in another location).

* information security (manages user access and runs up-to-date anti-virus software and patches).

3. List and describe the five requirement characteristics of infrastructure architecture.

The following are the five primary characteristics of a solid infrastructure architecture:

1. flexibility: systems must be flexible enough to meet all types of business changes and demands (this may involve multinational changes).

2. scalability: how well a system can adapt to increased demands of growth requirements. Many factors create organisational growth including; market, industry and economy factors. It also involves capacity planning.

3. reliability: (accuracy) ensures all systems are functioning correctly and providing accurate information. Low accuracy puts the company at risk.

4. availability: when systems can be accessed by users. ‘High availability’ is preferable as its continually operational for a lengthy period of time. It measures relative to 100% operational or ‘never failing.’ Businesses should aim for the 5/9s (99.999 % availability). This ensures business continuity.

5. performance: measures how quickly a system performs a certain process/task or transaction. (E.g. in terms of efficiency IT metrics of both speed and throughput-the amount of items or materials passing through a a system or process). There is a growing pressure on systems to be faster.

4. Describe the business value in deploying a service oriented architecture.

SOA: An approach that supports integrating a business as linked, repeatable tasks or services. SOA helps businesses be innovative by ensuring that IT systems can adapt quickly, easily and economically to support rapidly changing business needs. Helps businesses increase their flexibility of processes, strengthen their IT architecture and reuse their existing IT investments by creating connections among different applications and information sources.

An SOA is a style/concept/representation. A way of thinking. It’s not a framework that can be purchased. It allows enterprises to plugin new services or upgrade existing services, respond more quickly and is cost effective to changing market conditions. Its about using different sources to meet different criteria.

5. What is an event?

An electronic message indicating that something has happened, it detects threats and opportunities and alerts those who can act on the information. E.g a new employee has entered the system.

6. What is a service?

Contains a set of related commands that can be reused, it is more like a software product than a coding project. Needs to be reusable if they are going to have an impact of productivity.

7. What emerging technologies can companies use to increase performance and utilise their infrastructure more effectively?

Virtualisation: a framework that divides the resources of a computer into sectors that allow a user to utilise the functions available. It’s effective as it provides a way of increasing physical resources to maximise the investment in hardware. Its benefits include:

-Rapid application deployment.
-Dynamic load balancing.
-Streamlined disaster recovery.
-Reduces hardware infrastructure and increases utilisation of software.
-Consolidates (and often reduces) power and cooling requirements.

This is supported through the following website: http://www.vmware.com/virtualization/what-is-virtualization.html which states that:

“Today’s x86 computer hardware was designed to run a single operating system and a single application, leaving most machines vastly underutilised. Virtualisation lets you run multiple virtual machines on a single physical machine, with each virtual machine sharing the resources of that one physical computer across multiple environments. Different virtual machines can run different operating systems and multiple applications on the same physical computer. While others are leaping aboard the virtualisation bandwagon now, VMware is the market leader in virtualisation.”

Grid Computing: is an aggregation of geographically dispersed computing, storage, and network resources, coordinated to deliver improved performance, higher quality of service, better utilisation, and easier access to data. Used by scientific, e-Commerce, technical or engineering projects that require many processing cycles to complete a job. People can offer their free-processing time on home computers to companies. Grid computing provides the opportunity to researchers in an area to use the idle computers across the Internet for better use and better cause which is beneficial to human kind and technology.

It benefits include:

-Improving productivity and collaboration of virtual organisations and respective computing and data resources.
-Allowing widely dispersed departments and businesses to create virtual organisations.
-Building robust and infinitely flexible and resilient operational architectures
-Providing instantaneous access to massive computing and data resources.
-Leveraging existing capital investments, which in turn help to ensure optimal utilisation and costs of computing capabilities.

This is supported through the following diagram found at: http://www.csa.com/discoveryguides/grid/images/gridcomp.gif

Sunday, April 4, 2010

Ch 4 Ethics and Security

1. Explain the ethical issues surrounding information technology.

Advances in technology are making it easier for people to copy almost anything.

Intellectual property: This refers to the collection of rights that protect creative and intellectual effort. It can be an invention, trade mark, original design or the practical application of a good idea. In business terms, this means your proprietary knowledge.

Copyright: This exclusive right to do, or omit to do, certain acts with intangible property such as song, video game and some types of proprietary documents. E.g. "Man Fined $1.5M for Leaked Mario Game Upload." Retrieved from: http://www.tomsguide.com/us/nintendo-mario-game,news-5779.html

Fair use doctrine
: In certain situations, it is legal to use copyright material. E.g. you can photocopy up to 20% in some books for study or teaching purposes.

Pirated software: The unauthorised use, duplication, distribution, or sale of copyrighted software. Copyright infringement of this kind is extremely common. Most countries have copyright laws which apply to software, but the degree of enforcement varies.

Counterfeit software:
Software that is manufactured to look like the real thing and sold as if it were. This area is of major concern as the rate in which this occurs has doubled in the last two years.

2. Describe the relationship between an ‘email privacy policy’ and an ‘Internet use policy’.

Organisations can take better control of inappropriate/harmful email sending through implementing and adhering to an email privacy policy.

Email privacy policy: Details the extent to which email messages may be read by others. Under the Privacy Act 1988, organisations must collect, use and store information obtained by tracking an employee's emails in a certain way.

This coincides with the Internet use policy as this policy contains general principles to guide the proper use of the Internet (just like conditions with using email) within an organisation. The policy must:

* Describe available Internet services.
* Define the purpose and restriction of Internet access.
* Complement the ethical computer use policy.
* Describe the user responsibilities.
* State the ramification for violations.

3. Summarise the five steps to creating an information security plan

1) Develop the information security policies: Identify who (preferably the CSO) is responsible for creating and implementing all aspects of the security policy. Include things like never exchanging passwords, logging on and off when taking breaks etc.

2) Communicate the information security policies: Train all employees and use checklists to ensure they understand all aspects of the information that has been given to them. Outline the clear expectations e.g. signing off when not at computer.

3) Identify critical information assets and risks: Require use of IDs, passwords, and anti-virus software on all systems. If any systems have links to external networks ensure that necessary protection is in place e.g. firewalls or intrusion detection software.

4) Test and re-evaluate risks: Regularly perform security reviews, audits, background checks and security assessments.

5) Obtain stakeholder support: Gain approval and support on the information in the policy from the board and the stakeholders.

4. What do the terms; authentication and authorisation mean, how do they differ, provide some examples of each term.

Authentication is a method for confirming users’ identities. Once the person has been identified, it can then determine the access privileges for that user.

The most secure type of authentication involves a combination of all three things listed below:


Something the user knows e.g. a password that should be changed regularly.
Something the user has ie a swipe identification card (smart card).
Something that is part of the user e.g. fingerprint scan or voice recognition.










(Retreived from: http://resources0.news.com.au/images/2009/11/24/1225803/131412-fingerprint-scan-brett-faulkner.jpg)

Authorisation is the process of giving someone permission to do or have something e.g. file access. The means by which you are allowed (have authorisation) into a system. For e.g. once a person has logged on to a computer the system can detect what authorisation levels they have and what areas they can access. For example a student cannot access the same areas that a teacher can. In addition only the Human Resource Manager can access certain aspects of information about an employee's details as this policy is usually formalised into a private system.

The terms differ as authentication refers specifically to who has the privilege to access certain areas, where as authorisation gives someone permission to do or have something.

5. What are the Five main types of Security Risks, suggest one method to prevent the severity of risk?

Human Error- Conduct extensive training and update it regularly. Ask the employees questions about what they have learnt to enforce understanding. Convey that malicious acts will not be tolerated and that any employees that engage in such behaviour will be terminated immediately.

Technical Failure- Ensure that your organisation has robust systems in place and that it keeps its information up-to-date and backed up.

Natural Disaster- Have disaster recovery in place. E.g. communication plans, alternative sites to move to, business continuity, and location of back-up data.

Deliberate Acts- Purchase a corporate security package that has Firewall:
* Anti-Virus (keep it up-to-date)
* Anti Spam
* Anti Spyware
* Phishing Filter
* Remote Management



















Management Failure- Ensure sufficient training is provided, systems are updated and looked after and have a back-up system for files.

Ch 3 Week Four Questions - eBusiness

1. What is an IP Address? What is it’s main function?

I.P. stands for Internet Protocol. Each computer on the internet has an I.P. address. This can either be private or public, however every address must be unique.

It’s main function is to lay out a set of guidelines and implementations of specific networking protocols to enable computers to communicate over a network. It provides end-to-end connectivity specifying how data should be formatted, addressed, transmitted, routed and received at the destination. (Retrieved from: http://en.wikipedia.org/wiki/TCP/IP_model).

2. What is Web 2.0, how does it differ from 1.0?

Web 2.0 is a set of economic, social and technology trends that collectively form the basis for the next generation of the internet. A more mature, distinctive medium characterised by user participation, openness and network effects. It is referred to as the Live Web. Users have the opportunity to collaborate and build their own content using this service.

It refers to changes in the ways software developers and end-users use the web as a platform. It’s a new way of doing business- online.

Web 1.0 was about reading, Web 2.0 is about writing
Web 1.0 was about companies, Web 2.0 is about communities
Web 1.0 was about client-server, Web 2.0 is about peer to peer
Web 1.0 was about HTML, Web 2.0 is about XML
Web 1.0 was about home pages, Web 2.0 is about blogs

Many things have changed since the web culture has revolutionised. Webmaster and user interaction no longer depends on direct means of communication rather a whole new system of social interaction has evolved that includes really simple syndication and also the use of social networking sites.

























Retreived from: http://www.sizlopedia.com/wp-content/uploads/web1_0-vs-web2_0.png.

3. What is 3.0?

Web 3.o uses the concept of tagging to build information about you. Your devices talk to each other and build intelligence about you.

Web 3.0 is expected to turn the web into a database, evolution towards a 3D form, grow towards artificial intelligence through using different medias and transform towards a semantic web.

Calcanis defines Web 3.0 as the creation of high-quality content and services produced by gifted individuals using Web 2.0 technology as an enabling platform.

(http://calacanis.com/2007/10/03/web-3-0-the-official-definition/)

4. Describe the different methods an organisation can use to access information.

Intranet- A private computer network that uses internet portal technologies to securely share any part of an organisation's information or operational systems within that organisation. It allows an organisation to provide access to information and application software to only its employees. It can host multiple private websites and constitute an important component and focal point of internal communication and collaboration e.g. benefits, entitlements. It is very beneficial for providing organisational information to employees.

Extranet- An internet that is available to strategic allies (customers, suppliers, partners). This is beneficial for businesses as individuals outside the company can access intranet based information and application software such as order processing. It offers a competitive advantage as customers, partners and vendors can all access the same area. Refer to the following link for more information: (http://en.wikipedia.org/wiki/Extranet).

Portal- A technology that provides access to information. A website that offers a broad range of resources and services e.g. email, online discussion groups, search engines, online shopping (eBay). General portals (yahoo, google) and niche portals (fool.com) exist to meet a range of needs.

Kiosk- A publicly accessible computer system that allows interactive information browsing. The computer's operating system is not shown in view and the program runs in a full screen mode, providing details of navigation for users.

5. What is eBusiness, how does it differ from eCommerce?

ebusiness is the conducting of business on the internet, including buying and selling, serving customers and collaborating with business partners. eCommerce is the buying and selling of goods and services over the internet. Therefore, the major difference is that eBusiness also conducts online exchanges of information ie a bank allowing you to check your statements online.

6. List and describe the various eBusiness models?

Business-to-Business (B2B): Businesses who buy from and sell to each other over the internet. E.g. electronic marketplaces- where multiple buyers and sellers take part in eBusiness activities.






















Retrieved from: (http://ausweb.scu.edu.au/aw03/papers/stein_______/procfigure1.gif)

Business-to-Consumer(B2C): Applies to businesses that sell their products and services to consumers over the internet. Corporate Express is an example of a business who provides this service selling office supplies, furniture, print etc.





















Retrieved from : (http://thierrygagnon.com/IMG/jpg/Corporate_Express-2.jpg
)

Consumer-to-Business(C2B):
Applies to any consumer that sells a product or service to a business over the internet. E.g. a web master offering advertising services on Amazon.com.

Consumer-to-Consumer (C2C): Applies to sites primarily offering goods and services to assist consumers interacting with each other over the internet. E.g. eBay ties people together who have similiar tastes in items and like-minded budget frames. C2C online communities interact via email groups, web-based discussion forums or chat rooms. This model is consumer-driven and opportunities are available to satisfy most consumer needs.

7. List 3 metrics you would use if you were hired to assess the effectiveness and the efficiency of an eBusiness website?

Cookie: As it contains information about customers and their web activities. (It records their comings and goings).

Click-through: As it guarantees exposure to target ads.

Banner Ad: As tracking the number of banner ad clicks provides a way to understand the effectiveness of the ad on its target audience.

8. Outline 2 opportunities and 2 challenges faced by companies doing business online?

Opportunities:

A rise (increase) in customer loyalty as there are more communication streams open with the chance for more queries/questions and, therefore, faster assistance, response and answers.

A decrease in cost as communication over the internet saves time and is much faster than face-to-face meetings and telephone calls.

Challenges:

Consumers must be protected online at all times. It can be hard to manage as it's not face-to-face and misunderstanding can occur. They must be protected against unsolicited goods and communication, illegal or harmful goods (weapons). Insufficient information can sometimes be given about goods or their suppliers and the invasion of privacy and cyberfraud can occur.

Providing security can be a challenge as accidental and malicious misuse can occur as well as information being leaked out internally or externally.

Weekly Questions - Strategic Decsion Making: Chapter Two Questions

1. Define TPS & DSS, and explain how an organisation can use these systems to make decisions and gain competitive advantages.

Common types of decision-making information systems used in organisations today include: TPS (Transaction Processing Systems) and DSS (Decision Support Systems). TPS systems are generally used by analysts while DSS systems are commonly used by managers.

TPS: Is the basic business system that serves the operational level (analysts) in an organisation. The most common example of this system is an operating accounting system such as a payroll system.

DSS: Models information to support managers and business professionals during the decision-making process. (Below is an example of a DSS for flood analysis and flood plain management). Attained from: proceedings.esri.com.












Organisations can use these systems to make decisions and gain competitive advantages as the TPS can provide transactional based data to a DSS. The DSS will then summarise the given information, asssisting managers in decision making. This eases the process as it is faster and omits a higher risk of error in figures. People and organisations can now rely on these systems to keep them up to date with information, assist in making business forecasts, help with problem solving and opportunity capturing.

Refer to the following link for a further analysis of the characteristics of TPS and DSS.
http://www.angelfire.com/rebellion2/jsmith/case_2.html

2. Describe the three quantitative models typically used by decision support systems.

a) Sensitivity analysis: the study of the impact that changes in one (or more) parts of the model that impacts other parts of the model. Users change the value of one variable repeatedly and observe the resulting changes in other variables.

b) What-if analysis: checks the impact of a change in an assumption of the proposed solution. Users repeat this analysis until they understand all effects of various situations.

c) Goal seeking analysis: Finds the inputs necessary to achieve a goal such as a desired level of output. Instead of observing how changes in a variable affect other variables e.g. what-if analysis and goal seeking analysis. They set a target value (goal) for a variable then repeatedly change other variables until the target value is achieved.

3. Describe a business processes and their importance to an organisation.

Business processes refer to the manner in which work is organised, coordinated and focussed to produce a valuable product or service. E.g. processing a lay-by.

HR Business Processes are crucial to an organisation as data about employees ie their skills, experience can be identified through the organisation’s online human resource information system. It makes the business run more efficiently and effectively as all the information can be located from the same area in an easy manner. This system will also contain information on such things as terminations, workplace health and safety guidelines, hiring policies, counseling, health care benefits etc.

4. Compare business process improvement and business process re-engineering.

Business process improvement: focuses on understanding and measuring the current process and making performance improvements accordingly. Below is an example of a process improvement model used by an organisation.















Attained from: http://www.all-freeware.com/images/full/59784-business_process_improvement_software_business_other.gif

This differs to business process re-engineering (BPR) which is the analysis and redesign of workflow within and between enterprises. BPR assumes that the current process is ineffective or broken and, therefore, must start again from scratch.

5. Describe the importance of business process modeling (or mapping) and business process models.

After redesigning the business process, the organisation must determine the most efficient way to begin improving the process. Business mapping is important as it allow business’ to create flowcharts of work processes showing its inputs, tasks, and activities in a structured sequence. This enables organisations to run efficiently, cutting costs externally e.g. financial experts and time.

Business process models are important as they show and describe the plans graphically so that employees can visually determine what is expected of them e.g. timeframes in which to achieve activities. A set of one or more process models details the many functions of a system or subject area with graphics and text.

The model can:

* expose process detail gradually and in a controlled manner;
* encourage conciseness and accuracy in describing the process model;
* focus attention on the process model interfaces;
* provide a powerful process analysis and consistent design vocabulary.

Saturday, March 6, 2010

Weekly Questions- WK 2

Ch 1.
1. Explain information technology’s role in business and describe how you measure success?

Information technology (IT) enables businesses to conduct a series of different operations using the one system to perform multiple tasks e.g. invoices for shipping goods, databases for customer details. IT ensures a business can run effectively and efficiently. IT gives businesses a competitive advantage by keeping up to date with everyday changes and advances in technology. It also provides ground for a competitive edge.

You measure the success by comparing and contrasting systems and practices in place against the businesses’ competitors gathering information on where your business in sitting in the competitive scale. The measure of success can be determined if IT makes the businesses’ practices more efficient and effective, reliable and simple to use. If it achieves all this it can be considered successful.

2. List and describe each of the forces in Porter’s Five Forces Model.

Buyer power;
high when buyers have many sellers to choose from, low when choosers are few.

Supplier power; consists of all parties involved (direct or indirect) in the acquisition of a product or raw material.

Threat of substitute products or services; high when there are many alternatives to a product or service, low when there a few alternatives to choose from.

threat of new entrants; high when it is easy for new competitors to enter a market, low when there are barriers to entering a market.

rivalry among existing competitors; high when competitor is fierce in a market, low when competition is more complacent.

3. Compare Porter’s three generic strategies.

Cost leadership- reaches a large market segmentation. It describes a way to establish the competitive advantage. It is the lowest cost of operation in the industry.

Differentiation- attracting a niche market through offering a unique product and/or service.

Focussed strategy- concentrates on either cost leadership or differentiation.

These strategies can be compared to one another as they all offer the products and/or services to a speciality market. It is therefore up to the CEO to adopt the strategy that best suits his business. They differ as cost leadership is driven by company efficiency, size, scale, scope and cumulative experience, where as differentiation is driven by the specific needs of its niche market.

4. Describe the relationship between business processes and value chains.

Business processes focus on a set of activities that enable businesses to carry out specific tasks. The effectiveness of this process is then evaluated through a chain approach. This approach views an organisation as a series of processes, each adding value to the product or service. Through doing this the business can evaluate which products and services are being well executed and areas in which the business can improve on. E.g. lowering prices which gains customer rentention and therefore a competitive advantage for the business.