CIS 204

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Business Process

-A network of activities that generate value by transforming inputs into outputs

Value Chain

-A network of value-creating activities -Generic chain consists of 5 primary activities & 4 support activities

Bytes

-8-bit chunks of data; characters of data -Characteristic of data -In databases, bytes are grouped into columns

Jobs (Q1-2)

-84% of college graduates expect employer to provide additional formal training -54% working in jobs not requiring their degree, underemployed -Better success for students with courses related to information systems -Technology Skills Gap

Six Common BYOD Policies

-A BYOD policy is a statement concerning employees' permissions and responsibilities when they use their own device for organizational business. -BYOD policies are rapidly evolving and many organizations have not determined what is best for them. If your employer has a committee to develop such policies, join it if you can. Doing so will provide a great way to gain exposure to the leading technology thinkers at your organization.

What Do Employers Want?

-A Self Starter: Don't wait to be told what to do. -A Team Worker *Develops ideas with others *Asks questions *Pulls more than their own weight

Thin Client Application

-A client-server application that requires nothing more than a browser is called a ________. -A software application that requires nothing more than a browser -One that runs within a browser and does not need to be preinstalled -Web applications (Thin-client applications) run within the browser and can run on any type of computer.

Hierarchy of Data Elements

-A database is a collection of related tables. -In databases, bytes are grouped into columns, such as Student Number and Student Name. -Columns are also called fields. -Columns or fields, in turn, are grouped into rows, which are also called records. -Finally, a group of similar rows or records is called a table or a file.

Phablet

-A device that combines the functionality of a smartphone with the large screen of a tablet

Where is Information? (Q1-5)

-A graph is not information. *It's data people perceive and use to conceive information. -The ability to conceive information is determined by cognitive skills. -People perceive different information from the same data. -You add value by conceiving information from data.

Table/File

-A group of similar rows or records

PC Virtualization

-A personal computer, such as a desktop or laptop -Hosts several different operating systems -The user can run both systems on the same hardware at the same time if the host operating system has sufficient resources

lost-update problem

-A problem that exists in database applications in which two users update the same data item, but only one of those changes is recorded in the data. -Can be resolved using locking.

Server Virtualization

-A server computer hosts one or more other server computers -Hosting multiple virtual machines -Users can log on to any of those virtual machines, and they will appear as normal desktop computers

Key

-AKA: primary key -Is a column or group of columns that identifies a unique row in a table

Abstract Reason (Q1-2)

-Ability to make and manipulate models -Learn to use and construct abstract models: ▪Ch. 1: Five components of an IS model ▪Ch. 5: How to create data models ▪Ch. 10: How to make process models

Systems Thinking (Q1-2)

-Ability to model system components, connect inputs and outputs among components to reflect structure and dynamics -Ability to discuss, illustrate, critique systems; compare alternative systems; apply different systems to different situations

How Can Intro to MIS Help You Learn Non-Routine Skills? (Q1-2)

-Abstract Reason -Systems Thinking -Collaboration -Ability to Experiment

Examples of Critical Skills for Nonroutine Cognition (Q1-2)

-Abstract Reasoning -Systems Thinking -Collaboration -Ability to Experiment

Characteristics of Data Required for Good Information (Q1-6 What are necessary data characteristics?)

-Accurate -Timely -Relevant *To context *To subject -Just sufficient -Worth its cost

Hardware, Software, and Mobile Systems in 2029?

-Always on, always connected, always communicating, always working, and playing trend continues -Internet of Things *Home analyzes you; sees what, how, when you do things, anticipates your needs *Same at work *Hot jobs today - I o T architect, marketing technologist, BigData architect, and DevOps manager -Best-paying jobs in 2029 don't currently exist -To prepare, cultivate creativity, novel problem solving, good judgment, develop sincere desire to learn new things

Amazon Eats Whole Foods

-Amazon recently purchased the grocery retailer Whole Foods for more than $13 billion. -This move is perceived by many as a strategic move against Amazon's major competitor-Walmart. -Walmart sells more groceries than any other company in the United States. -Whole Foods will help Amazon increase its grocery business. -Amazon Go has as no checkout lines or point-of-sale terminals. -Do you think other grocery chains are concerned about this move by Amazon? -Do you see any downsides of the Amazon Go model? -Can you identify any other industries that Amazon may choose to enter in the next 5 years?

Thick Client Application

-An application program that must be preinstalled on the client -Native applications are programs that are written to use a particular operating system. -A software application that requires programs other than just the browser on a user's computer; that is, that requires code on both client and server computers.

Open Source

-Anyone can obtain the source code from the open source project's Web site -Programmers alter or add to this code depending on their interests and goals

Client Application Programs

-Applications that are processed on client computers

Server Application Programs

-Applications that are processed on server computers

Customer Service

-Assisting customer's use of the product and thus maintaining and enhancing the product's value

ACID Transactions

-Atomic, Consistent, Isolated, Durable transactions -Critical to traditional commercial applications -New Internet applications (Twitter) don't need ACID -Either all of a transaction is processed or none of it is (atomic). -Transactions are processed in the same manner (consistent) whether processed alone or in the presence of millions of other transactions (isolated). -Once a transaction is stored it never goes away—even in the presence of failure (durable).

Why is the Difference between I T and I S Important to You? (Q1-4)

-Avoid common mistake: Cannot buy an I S. *Can buy, rent, lease hardware, software and databases, and predesigned procedures. -People execute procedures to employ new I T. -New systems require training, overcoming employee resistance, and managing employees as they use the new system. -High-tech vs low-tech information systems *Consider the amount of work being moved from people to computers. -Understanding scope of new information systems *Assess how big of an investment new technology represents. -Components ordered by difficulty and disruption

Bargaining Power Forces

-Bargaining power of suppliers -Bargaining power of customers

Understanding the Forces Pushing the Evolution of New Digital Devices (Q1-1)

-Bell's Law- *New class of computers establishes a new industry each decade ~New platforms, programming environments, industries, networks, and information systems -Understand how the next digital evolution will affect businesses -What an industry does and how it does it will change

Technological Change is Accelerating (Q1-2 How will MIS affect me?)

-Bell's Law: *Today's highly successful business could be bankrupt quickly because technology changed and it didn't. -Example: Blockbuster *In 2004 Blockbuster had $5.9B in revenues *In 2010 Blockbuster filed for bankruptcy *High-speed network connections and streaming video changed the competitive landscape

Differentiation Industry-wide

-Better product/service across the industry

Differentiation Focus

-Better product/service within an industry segment

Development and Use of Information Systems (Q1-3)

-Business professionals need to: 1. Take an active role to ensure systems meet their needs. 2. Understand how IS constructed. 3. Consider users' needs during development. 4. Learn how to use I S. 5. Remember ancillary requirements (security, backups).

Slick Analytics

-CIOs are looking to merge the storage and analysis of cloud-based data into one synergistic operation. -Laredo Petroleum *Old approach used numerous spreadsheets and manual calculations *Value of data diminished due to the time it took to analyze the data *New approach uses cloud storage and cloud analytics *Needs to know when it should clean chemical deposits in its wells *Cloud storage and analytics improved scalability, robust data analysis, and data accessibility -Cloud analytics will grow by 46% through 2020 -Security and privacy concerns are drawbacks to cloud services.

Deano the Clown

-Certified piano tuner and technician repairing and restoring pianos for many years -Clown entertainer at children's parties

How Does Open Source Work?

-Collaboration of many programmers -Examining source code and identifying a need, creates new feature or redesigns existing feature, or fixes a problem -Code evaluated and extended by others -Iteration, peer reviews and well-managed project yield high-quality code

Outbound Logistics

-Collecting, storing, and physically distributing the products to buyers

Rows

-Columns/fields are grouped into theses -Also called records

Competitive Forces

-Competition from vendors who manufacture substitutes -Competition from new competitors -Competition from existing rivals

Volatile

-Contents are lost when power is off

Nonvolatile

-Contents survive when power is off

Digital Revolution (Q1-1)

-Conversion from mechanical/analog devices to digital devices

The Apple of Your i

-Created mobile markets with iPod, iPhone, iPad -Opened own stores *Open and inviting sales floor, Genius Bar help desk, incredibly well-trained and disciplined sales force -Pioneered Internet sale of music and applications -Tripled market share in three years -Second largest public company in world

How are data models used for database development?

-Crows feet: multiple lines at one end (1:N or 1: to many) *At both ends: N:M (many to many) -Forked lines show there might be more than one advisor

Summary of Database Administration (D B A) Tasks

-DBMS provides tools to assist in database administration. -Database administration involves a wide variety of activities. -Permissions can be limited in very specific ways.

Metadata

-Data that describes other data

Relational Databases

-Databases that carry their data in the form of tables and that represent relationships using foreign keys

Management (Q1-3)

-Develop, maintain, and adapt *Creating an information system that meets your needs, take an active role in system's development Why? *Business professionals using cognitive skills to understand business needs and requirements

Margin

-Difference between value an activity generates and its cost is called -The margin of the business process is the value of the outputs - the cost

Forms, Queries, Reports, and Applications

-Elements of Database Applications -A database application is a collection of forms, reports, queries, and application programs that serves as an intermediary between users and database data

Use (Q1-3)

-Employ the system to accomplish your job tasks *E.g. job task for backing up data

Ethics and Professional Responsibility

-Ethics Guide -Immanuel Kant -Categorical imperative *One should behave only in a way that one would want the behavior to be a universal law. ~Are you willing to publish your behavior to the world? -Necessity to act in accordance with categorical imperative *Perfect duty - behavior that must always be met *Imperfect duty - a praiseworthy action, but not required ~Giving to charity, developing your business skills and abilities

Abstract Reasoning (Examples of Critical Skills for Nonroutine Cognition (Q1-2))

-Example: *Construct a model or representation. -Amanda's Problem at eHeremes: *Hesitancy and uncertainty when conceptualizing a method for using AI and machine learning

Ability to Experiment (Examples of Critical Skills for Nonroutine Cognition (Q1-2))

-Example: *Create and test promising new alternatives, consistent with available resources. -Amanda's Problem at eHeremes: *Fear of failure prohibited discussion of new ideas

Collaboration (Examples of Critical Skills for Nonroutine Cognition (Q1-2))

-Example: *Develop ideas and plans with others. Provide and receive critical feedback. -Amanda's Problem at eHermes: *Unwilling to work with others on work-in-progress

Systems Thinking (Examples of Critical Skills for Nonroutine Cognition (Q1-2))

-Example: *Model system components and show how components' inputs and outputs relate to one another. -Amanda's Problem at eHeremes: *Inability to model eHermes's operational needs

Users' Role in the Development of Databases

-Final judges -Thorough review of data model *Entities must contain all the data users need to do their jobs *Must accurately reflect their view of the business -Take it seriously. -Devote time. -Users are the final judges as to what data the database should contain and how the records in that database should be related to one another. -User review of the data model is crucial.

What is the purpose of a database?

-Forms are difficult, if not impossible, to produce with a spreadsheet, but are easily produced with a database.

Second Mover Advantage

-Gaining market share by following a pioneering company and imitating its product or service, thereby reducing costly R&D expenditures

Desktop Virtualization

-Has the potential to be revolutionary -A server hosts many versions of desktop operating systems -The desktop can be accessed from any computer to which the user has access

Technology Skill Gap

-High level of tech skills demanded by employers and low level of tech skills held by employees

Software Sources and Types

-Horizontal-market application -Vertical-market application -One-of-a-kind application

A Poorly Designed Employee Table

-In bottom figure, some rows show Dept. 100 is "Accounting and Finance," others show Dept. 100 is "Accounting." Which is correct? -Because department names are duplicated in Employee table, every row in table (b) that has a value of "Accounting" must be changed to "Accounting and Finance." -Problem with the table, there are two independent themes: Employee and Department.

Columns

-In databases, bytes are grouped into.. -AKA: Fields -These are then grouped into rows

Firm Infrastructure

-Includes general management, finance, accounting, legal, and government affairs

Technology

-Includes research and development, but is also includes other activities within the firm for developing new techniques, methods, and procedures

Data Integrity Problems

-Incorrect or inconsistent information -Users lose confidence in information -System gets a poor reputation -Can only occur if data are duplicated -Problems are serious. -Information systems with poor reputations become serious burdens to the organizations that use them.

Mining at Work?

-Increasing value of cryptocurrency makes mining an attractive prospect for Richard's boss Steve. -Richard discovers a crypto-mining program running on company servers. *Only runs at night and during off hours *Probably will only increase electricity consumption -What would you do from a categorical imperative and utilitarian perspectives?

Sales and Marketing

-Inducing buyers to purchase the products and providing a means for them to do so

Achieving Strategies (Q1-3)

-Information systems exist to help people achieve business strategies: 1. "What is the purpose of our Facebook page?" 2. "What is it going to do for us?" 3. "What is our policy for employees' contributions?" 4. "What should we do about critical customer reviews?" 5. "Are the costs of maintaining the page sufficiently offset by the benefits?"

Linkages

-Interactions across value activities. -Porter's model of business includes these

Activity

-Is a business function that receives inputs and produces outputs -Can be performed by a human, by a computer, or by both -Gets and puts data resources to and from databases

Repository

-Is a collection of something; a database is a repository of data, and a raw material repository is an inventory of raw materials.

Virtual Reality (VR)

-Is a completely computer-generated virtual world with interactive digital objects. Ex. Sony's PlayStation VR

Server

-Is a computer that is designed to support processing requests from many remote computers & users -Essentially a PC on steroids

Entity-Relationship Data Model

-Is a tool for constructing data models -Developers use it to describe the content of a data model by defining the things (entities) that will be stored in the database and the relationships among those entities

Source Code

-Is computer code as written by humans and understandable by humans

Augmented Reality (AR)

-Is the altering of reality by overlaying digital information on real-world objects. Ex. Google glasses ($1250), Epson's Moverio Smart Glasses ($700), & Daqri Smart Helmet (5,000-15,000)

Mixed reality (MR)

-Is the combination of the real physical world with interactive virtual images or objects. Ex. You would see a real-time 3D virtual model of your city created on your coffee table

Management Information Systems (Q1-3 What is MIS?)

-Key elements: 1.Management and use 2.Information systems 3.Strategies -Goal of MIS: *Managing IS to achieve business strategies

Multiuser Processing Problem

-Lost-update problem is one of the special characteristics of multi-user database processing. -To prevent this problem, some type of locking must be used to coordinate the record update activities of multiple users. -Locking has its own set of problems and those problems must be addressed as well. -Realize converting a single-user database to a multiuser database requires more than simply connecting another computer. -The logic of the underlying application processing needs to be adjusted also. -If you find inaccurate results, you may be experiencing multiuser data conflicts. Contact your IS department for assistance.

Cost Industry-Wide

-Lowest cost across the industry

Cost Focus

-Lowest cost within an industry segment

Elements of a Mobile Information System

-Major elements in a mobile system are users in motion, mobile devices, wireless connectivity, and a cloud-based resource. -Information systems that support users in motion -Access the system from any place -Users in motion, mobile devices, wireless connectivity, and a cloud based resource

Ability to Experiment (Q1-2)

-Make reasoned analysis of an opportunity; develop and evaluate possible solutions *"I've never done this before." *"I don't know how to do it." *"But will it work?" *"Is it too weird for the market?" -Fear of failure paralyzes many good people and ideas

Big Data... Losses

-Many companies are focusing on perfecting powerful Big Data tools. -They spend little effort securing the data they collect. -Information security is neglected for the sake of functionality and convenience. -A security audit showed more than 39,000 No S Q L databases are exposed. -1.1 petabytes of this data were available online. -InformationWeek Survey: -Poor database security practices at 20% of respondents 1. Databases containing sensitive information are not secured. 2. Data breaches have occurred or it cannot be confirmed that breaches have not occurred. 3. Security evaluations are not regularly conducted on respondents' databases. -Securing data is as important as accuracy and reporting capabilities.

Drone Manufacture's Value Chain

-Medium-sized drone manufacturer's value chain -network of value-creating activities -Difference between value an activity generates and its cost is called margin. -Linkages - interactions across value activities.

Increasing Value of Networks (Q1-1)

-Metcalfe's Law -Network value equal to square of number of users connected to it =V = U^2 *Google, Amazon, eBay exist due to large numbers of Internet users.

Sample Metadata (in Access)

-Microsoft Access example of metadata for the Email table -Metadata makes a database self-describing.

Minimum Cardinality

-Minimum number of entities in a relationship -Small oval means entity is optional -Relationship need not have entity of that type

Five Components of Mobile Change and Opportunity

-Mobile systems have major impact on business and society today - an impact forcing industry change while creating new career opportunities for mobile-IS-savvy professionals and large numbers of new, interesting mobile-IS-related jobs. -At the end of 2015 there were 7.9 billion mobile devices generating 3.7 exabytes of traffic per month. By 2020, this will jump to 11.6 billion mobile devices generating more than 30.6 exabytes per month. That's 1.5 devices for every person on the planet. Smartphones will account for nearly 72% of global mobile traffic.

Fundamental Forces Changing Technology (Q1-1)

-Moore's Law -Metcalfe's Law -Nielsen's Law -Kryder's Law

How Can I Attain Job Security? (Q1-2)

-Moore's Law, Metcalfe's Law, and Kryder's Law *Driving data processing, storage, communications costs to essentially zero -Any routine skill can, and will, be outsourced to the lowest bidder.

MIS in 2029 (Q1-7 2029?)

-Most computers won't look like computers. -Smartphones *1Gbps network connection *1 Exabyte storage *Teraflop+ processing power *Connect to any electrical device *Store/stream every song & movie ever made to any device *Battery life over a month on a single charge -Widespread use of AR like Magic Leap or Microsoft's HoloLens -Smart homes connected to everything, predicting wants and needs -More people work at home or wherever -Knowledge and use of business information systems will be more important, not less

Bottom Line of MIS Course (Q1-2)

-Most important course in business school because: 1. Gives background needed to assess, evaluate, and apply emerging information systems technology to business 2. Gives marketable skills by helping you learn abstraction, systems thinking, collaboration, and experimentation 3. Makes you aware of well-paying, high demand MIS-related jobs

New Categories of DBMS

-No SQL DBMS (NotRelational DBMS) *Supports very high transaction rates, processing relatively simple data structures *Replicated on many servers in the cloud, without ACID transaction support *Mongo DB, Cassandra, Bigtable, and Dynamo -New SQL DBMS *Process very high levels of transactions, like No SQL DBMS, but provide ACID support *May or may not support relational model *Current hotbed of development -In-memory DBMS using SQL extension *SAP HANA, Tableau *High volume ACID transaction support with complex relational query processing -Tableau supported by a proprietary in-memory DBMS using an extension to SQL

How is a Data Model Transformed into a Database Design?

-Normalization *Converting poorly structured tables into two or more well-structured tables -Goal *Construct tables with single theme or entity -Purpose *Minimize data integrity problems

First Mover Advantage

-Or gaining market share by being the first to develop a new technology in a market segment, doesn't guarantee an advantage over rivals

Collaboration (Q1-2)

-People working together to achieve a common goal, result, or work product -Ch. 2 discusses collaboration skills and illustrates several collaboration information systems.

Application Software

-Performs a service or function

Virtualization

-Process by which one computer hosts the appearance of many computers. -One operating system, called the host operating system runs one or more operating systems as applications. -Hosted operating systems are called virtual machines (vm). -Each virtual machine has disk space and other resources allocated to it. -Operates as if installed on own computer. -Host operating system controls activities of virtual machines to prevent them from interfering with one another.

Information Age (Q1-1)

-Production, distribution, control of information primary economic drivers

Database Management System (DBMS)

-Program to create, process, administer a database -Software program -Licensed from vendors *IBM, Microsoft, Oracle, and others ~DB2, Access, SQL Server, Oracle Database -Open source *My SQL: License-free for most applications -Different from a database

Client Operating Systems

-Programs that control the client computer's resources

Server Operating System

-Programs that control the server computer's resources

What Skills Will Be Marketable during Your Career? (Q1-2)

-Rapid technological change and increased international competition: *Requires skills and ability to adapt. *Favors people with strong non-routine cognitive skills. *Message: Develop strong non-routine cognitive skills.*

Inbound Logistics

-Receiving, storing, and disseminating inputs to the products

Human Resources

-Recruiting, compensation, evaluation, and training of full-time and part-time employees

Student Table (Also Called a File)

-Relationships of rows and columns in a database -Database - self-describing collection of integrated records -In Figure 5-3 , the collection of data for all columns (Student Number, Student Name, HW1, HW2, and MidTerm) is called a row or a record

Transforming a Data Model into a Database Design

-Represent each entity with a table *Entity identifier becomes table key *Entity attributes become table columns -Normalize tables as necessary -Represent relationships *Use foreign keys *Add additional tables for N:M relationships -Normalized tables eliminate data duplication but can make processing time slower. -Such trade-offs are important considerations in database design.

"We Can't Be Everything to Everybody."

-Reputation as a company that is essentially a mobile, door-to-door eBay -Current focus on selling products -Jessica wants to focus on partnering with local companies to sell new products too -Could expand to become a "shipping" company -Could drastically change the supply chain

Database Development Process

-Requirements -Data model -Database design -Figure summarizes database application system development process. -The design of the database depends entirely on how users view their business environment; user involvement is critical for database development. -A database must include all the data necessary for users to perform their jobs. Ideally, it contains that amount of data and no more. -So, developers must rely on users to tell them what to include in the database.

Native Applications

-Runs on just one operating system. -Web applications run in browsers. -In the latter case, the browser provides a more or less consistent environment for the application; the peculiarities of operating systems and hardware are handled by the browser's code and hidden from the Web application.

Administering the Database

-Set up security system, user accounts, passwords, permissions, limits for processing. -Limit user permissions. -Back up database, improve performance of database applications, remove unwanted data -Third DBMS function is to provide tools to assist in the administration of the database

One-of-a-kind application

-Software is developed for a specific, unique need. -Because of the risk and expense, custom development is the last-choice alternative, used only when there is no other option. -Difficult & Risky

Horizontal-market application

-Software provides capabilities common across all organizations and industries. -Word processors, graphics programs, spreadsheets, and presentation programs are all horizontal-market application software. Ex. Microsoft Word, Excel, PowerPoint -These applications are used in a variety of businesses across all industries -They are purchased off the shelf, and little customization of features is necessary (or possible) -Everybody buys/uses them for different purposes

Vertical-market application

-Software serves the needs of a specific industry. -Example of such programs are those used by dental offices to schedule appointments and bill patients. -They meet the needs of a specific industry -Usually can be altered or customized

Machine Code

-Source code is compiled into machine code that is processed by a computer -Machine code is, in general, not understandable by humans and cannot be modified

Closed Source

-Source code that is highly protected and only available to trusted employees and carefully vetted contractors -Only those trusted programmers can make changes to a closed source project

Components of a Database

-Tables or files + -Relationships among rows in tables + -Metadata = -The formal term for table is "relation". -Linking relations together creates relationships. -A database is a group of related tables. -Metadata describes definitions of tables, fields, and relationships.

The Digital Revolution (Q1-1 Why is Introduction to MIS the most important class in the business school?)

-Technology is fundamentally changing business. -Information Age -Digital Revolution

A is for Alphabet

-The Internet has enabled innovation and changed our lives. -Google is one of the largest publicly traded companies in the world with a diverse portfolio of projects. -As of August 10, 2015, it was a subsidiary of an overarching company named Alphabet Inc. -Page and Brin manage the overall strategy, but not the daily operations of each company. •The company was restructured to: 1. Retain top talent in a highly competitive industry. 2. Decrease the bureaucratic climate. 3. Improve the internal career trajectories of industry superstars. 4. Make individual companies more nimble, efficient, and autonomous.

Value

-The amount of money that a customer is willing to pay for a resource, product, or service

Cost

-The cost of the inputs plus the cost of the activities

Utilitarianism

-The doctrine that actions are right if they are useful or for the benefit of a majority. -Idea that the goal of society should be to bring about the greatest happiness for the greatest number of people

Maximum Cardinality

-The maximum number of entities that can be involved in a relationship -Vertical bar on a line means at least one entity required -1:N, N:M, & 1:1 -Second vertical line on the bar means at least one entity is required

Representing a 1:N Relationship

-To represent an N:M relationship, a third table is created, as shown in the two tables on the right. -Top table has two columns, AdviserName and EmailAddress. AdvisorName field in the lower right table is a foreign key that links records of the top table to those of the lower table by matching AdvisorName values.

Representing an N:M Relationship

-To represent an N:M relationship, you need to create an intersection table, as shown in the figure on the right.

Four Application Programs on a Web Server Computer

-Traditional database applications programs, written in object-oriented languages such as C++ and VisualBasic, and even COBOL, are thick applications. -In some cases, all application logic is contained in the program on users' computers and the server does nothing except run the DBMS and serve up data. -In others, some application code is placed on both users' computers and database server computer.

Operations/Manufacturing

-Transforming inputs into the final products

Sample Query Form Used to Enter Phrase for Search Figure 5-12B Sample Query Results of Query Operation

-Typical database application report, query form, and query report. -Structure of this report creates information because it shows student data in a context meaningful to the professor. -DBMS programs provide comprehensive and robust features for querying database data.

Diagram for Ehermes Database

-Use SQL Server to store metadata -Less risky: uses known technology -Creates E-R diagram -Decide to keep design simple at first -This is an E-R Diagram for eHermes database.

Components of a Database Application System

-Users, User's Computer, Database server -Components of a Database Application System. -The DBMS acts as an interface between user applications and the actual database.

Database Processing in 2029

-Volume of database continues to grow -Cheap, unlimited storage, greater processing speeds in relational databases -Security becomes more important -Many No SQL, New SQL, and in-memory databases exist in commerce -Fixed-size tables, relationships among tables via foreign keys, and theory of normalization -Keep abreast of developments. -Watch from investor's perspective. -New opportunities and career paths will develop around these new DBMS products. -Separate yourself from the competition when it comes to job interviews.

Example of the Modern-Style Interface

-Windows 8 and 10 is distinguished by modern-style applications that are touch-screen oriented and provide context-sensitive pop-up menus used with a mouse and keyboard.

"How is the A I Project Going?"

-eHermes investigating using AI to improve operational efficiency *Cut costs by 20% and double efficiency -Going much more slowly than anticipated *Employee expertise is self-driving vehicles, not AI -Not enough data to train the A I *Data patterns constantly shifting *Need to hire team of AI experts -Frustrating being on the "bleeding-edge"

"The Tricky Part is Correctly Identifying the Inventory Item."

-eHermes is using Google's image classifier API to identify images that customers upload. -Costs a few dollars per 1000 images searched *Need new data storage *Need redesigned database *Need new DBMS -Will be sending and receiving data from multiple data sources -MongoDB for tracking image/video files?

How Can Ehermes Benefit from a Database System?

-eHermes wants to speed up the process of inventorying the new items it receives from sellers *If associates can take a picture of the new item and use Google's image classifier to automatically recognize it, eHermes will be able to automatically fill in its database -Would require lots of data storage and multiple data flows: eHermes can either *Store images on a file server and keep metadata about each image in a relational database to query Use NoSQL MongoDB (document-oriented DBMS)

Porter's Five Forces

1. Bargaining power of customers 2. Threat of substitutions 3. Bargaining power of suppliers 4. Threat of new entrants 5. Rivalry among existing firms -Intensity of each of these 5 forces determines the characteristics of the industry, how profitable it is, and how sustainable that profit will be

Porter's Four Competitive Strategies

1. Cost-leadership 2. Differentiation 3. Cost-focus 4. Focused-differentiation -To be effective, organization goals, objectives, culture, and activities must be consistent with the organization's strategy. -This means, all information systems in an organization must facilitate the organization's competitive strategy. -Each of the three competitive forces concerns the danger of customers taking their business elsewhere. -Have students examine the table with respect to the running case discussed at the start of the chapter.

What is the Entity-Relationship Data Model?

1. Entities -Something to track. *Order, customer, salesperson, item, volunteer, donation 2. Attributes -Describe characteristics of entity. *OrderNumber, CustomerNumber, VolunteerName, PhoneNumber 3. Identifier -Uniquely identifies one entity instance from other instances *Student_I D_Number -The entity-relationship (E-R) data model is a tool for constructing data models. -Developers use it to describe the content of a data model by defining the things (entities) to be stored in the database and relationships among those entities. -A second, less popular tool for data modeling is Unified Modeling Language (UML). Not discussed in chapter.

Five Components of an Information System (Q1-3)

1. Hardware (Actors) 2. Software (Instructors) 3. Data (Bridge) 4. Procedures (Instructors) 5. People (Actors)

This is the Most Important Class in the School of Business Because You Will Learn (Q1-1)

1. How technology fundamentally changes businesses. 2. Why executives try to find ways to use new technology to create a sustainable competitive advantage 3. To assess, evaluate, and apply emerging information technology to business. 4. How to attain the knowledge needed by future business professionals.

Primary Activities of the Value Chain

1. Inbound Logistics 2. Operations/Manufacturing 3. Outbound Logistics 4. Marketing and Sales 5. Customer Service

3 types of virtualization

1. PC virtualization 2. Server virtualization 3. Desktop virtualization

Support Activities in the Value Chain

1. Procurement: which consists of finding vendors 2. Setting up contractual arrangements 3. Negotiating prices

Advantages and Disadvantages of Employee Use of Mobile Systems at Work

Advantages: 1. Cost savings 2.Greater employee satisfaction 3. Reduced need for training 4. Higher productivity 5. Reduced support costs Disadvantages: 1. Data loss or damage 2. Loss of control 3. Compatibility problems 4. Risk of infection 5. Greater support costs -Organizations have a love/hate relationship with their employees' use of their own mobile devices at work. They love the cost-saving possibility of having employees buy their own hardware, but they hate the increased vulnerability and loss of control. -Whatever the costs and risks, employees are bringing their own devices to work. Ignoring the issue will simply make matters worse.

Director of Architecture

Career Guide Gabe Chino in Financial Services Q. What attracted you to this field? A. "I have always been interested in how technology can enhance our lives. After getting some exposure to programming in college, I was hooked. I realize there is no end to innovation and creativity in this field, so I am never bored." Q. What advice would you give to someone who is considering working in your field? A. "My advice would be to always watch where the tech field is going. If this field is really for you, stay current with the latest I T trends."

The Amazon of Innovation

Case Study 2 -Amazon's business lines three categories: *Online retailing ~Own inventory ~Associates program ~Consignment -Order fulfillment -Cloud services NOTES: -Amazon built an enormous supporting infrastructure to ship 9 million items a day during the busy holiday season. Most of the year, Amazon.com has excess infrastructure capacity. Starting in 2000, Amazon began to lease some of that capacity to other companies and that led to the creation of cloud services. -You can ship your inventory to an Amazon warehouse and access Amazon's information systems just as if they were yours. -Amazon Web Services allows organizations to lease time on computer equipment in very flexible ways. Organizations can expand and contract their computer resources within minutes.

Defining Information (Q1-5 What is information?)

Definitions vary: 1.Knowledge derived from data 2.Data presented in a meaningful context 3.Processed data, or data processed by summing, ordering, averaging, grouping, comparing, or other similar operations 4. "A difference that makes a difference"

The Lure of Love Bots

Ethics Guide -The problem: 15% of the total subscribers were female, while 85% were male -"The key to maintaining subscribers on this type of site is keeping them interested" -To keep subscribers paying, "all we have to do is send them some messages from a dummy account" -All interactions can be handled with A I bots -Are the owner's actions illegal? Unethical? GOALS 1. Sensitize students to the fact that a competitive strategy is not just an academic topic. Changing competitive strategy has dramatic impacts on personnel and company culture. 2. Understand the practical applications of business reports. 3. Explore ethical questions concerning communication about sensitive topics.

Imperfect Duty of Business Professionals

Ethics Guide: Ethics and Professional Responsibility -Imperfect duties *Cultivating your talent as a professional responsibility *Obtaining skills necessary to accomplish your job *Continuing to develop business skills and abilities throughout your career

Ethics Guide: Free Apps for Data

How do you monetize "free" apps? -"If you're not paying for it, you are the product. -Data Brokers -Snoopwall reports *Flashlight Apps *Require permission to access data about your location, network connectivity, U S B storage, install shortcuts, receive data to/from the Internet, modify your system settings, and disable your screen lock

Difference between IT and IS (Q1-3)

Information technology (IT) 1.Products 2.Methods 3.Inventions 4.Standards -IT drives development of new IS. -IT components = Hardware + Software + Data -IS = IT + Procedures + People

Nielsen's Law (Q1-1)

Meaning: -Network connection speeds for high-end users will increase by 50%per year. Implications: -Network speed is increasing. Higher speeds enable new products, platforms, and companies.

Moore's Law (Q1-1)

Meaning: -The number of transistors per square inch on an integrated chip doubles every 18 months. Implications: -Computers are getting exponentially faster. The cost of data processing is approaching zero.

Kryder's Law (Q1-1)

Meaning: -The storage density on magnetic disks is increasing at an exponential rate. Implications: -Storage capacity is increasing exponentially. The cost of storing data is approaching zero.

Metcalfe's Law (Q1-1)

Meaning: -The value of a network is equal to the square of the number of users connected to it. Implications: -More digital devices are being connected together. The value of digital and social networks is increasing exponentially.

Characteristics of the Five Components (Q1-4 How can you use the five-component model?)

Most Important Component - You! -Your cognitive skills determine the quality of your thinking, your ability to conceive information from data. -You add value to information and information systems. -*Only humans produce information* All components must work together.

Active Review

Q1-1 Why is Introduction to M I S the most important class in the business school? Q1-2 How will M I S affect me? Q1-3 What is M I S? Q1-4 How can you use the five-component model? Q1-5 What is information? Q1-6 What are necessary data characteristics? Q1-7 2029?

Figure 2-1 Organizational Strategy Determines Information Systems

Q2-1 How does organizational strategy determine information systems structure? 1. This figure summarizes a planning process used by many organizations. 2. Start with Porter's Five Forces to analyze industry structure. 3. Organizations examine the industry structure and determine a competitive strategy. That strategy determines value chains, which determine business processes. The structure of business processes determines the design of supporting information systems. Notes: -This figure summarizes a planning process used by many organizations. -Start with Porter's Five Forces to analyze industry structure. -Organizations examine the industry structure and determine a competitive strategy. That strategy determines value chains, which determine business processes. -The structure of business processes determines the design of supporting information systems.

Five Forces Determine Industry Structure

Q2-2 What five forces determine industry structure? 1. Competitive Forces 2. Bargaining Power Forces 3. The bargaining power of customers 4. The threat of new entrants 5. The threat of substitute products or services.

Using IS to Create Competitive Advantages

Q2-7 How do information systems provide competitive advantages? -Enhances existing products -Differentiates products -Locks in customers -Raises barriers to market entry -Increases profit margins by decreasing costs and decreasing errors -Maintains customer account data *IS collects information for A B C (adds value) *IS saves customers time by automatically filling in part of form (adds value for customer) -Package and information delivery system *IS helps customer to select delivery address and generate shipping labels *What value does the shipper get?

Strategy and Information Systems in 2029

Q2-8 2029? -Pace of change and integration of new technology fast and increasing -Augmented reality devices, like Magic Leap and Microsoft's HoloLens, will change competitive landscape -New businesses based on advances in self-driving cars, drones, 3D printing -New products constructed in someone's garage

Server Farm

Q4-1 What do business professionals need to know about computer hardware? -A server farm is a collection of, typically, thousands of servers. -Large server farms by Microsoft, Google and others cost $1B+ to build, and employ about a total of 50 people to operate.

Important Storage-Capacity Terminology

Q4-1 What do business professionals need to know about computer hardware? -All computer data are represented by bits. -Data can be numbers, characters, currency amounts, photos, recordings, or whatever. -All are simply a string of bits. -Specifications for size of main memory, disk, and other computer devices are expressed in bytes.

Bits Are Easy to Represent Physically

Q4-1 What do business professionals need to know about computer hardware? -Bits are used for computer data because they are easy to represent electronically. -Bits are used to represent electronically. A switch can be open or closed. -An open switch represents 0 or "off" and a closed switch represents "1" or "on". -AKA: Binary Digits -Used for computer software because they are easy to represent physically

Processors and Memory

Q4-1 What do business professionals need to know about computer hardware? -Central processing unit (CPU) - "the brain" -Dual-processor (2) and Quad-processor (4) computers -CPUs vary in speed, function, cost -CPU works in conjunction with main memory (RAM) -CPU reads data and instructions from memory, and stores results of computation in memory -Computer hardware consists of electronic components and related gadgetry that input, process, output, and store data according to instructions encoded in computer programs or software.

Specifying Hardware with Computer Data Sizes

Q4-1 What do business professionals need to know about computer hardware? -Disk capacities specified by amount of bytes *500 GB -CPU speed expressed in cycles called hertz *Slow personal computer speed of 3 Gigahertz (GHz) *Fast P C 3.5+ GHz

Storage Hardware

Q4-1 What do business professionals need to know about computer hardware? -Storage Hardware: save data and programs *Common storage devices: 1. Non-volatile ~Magnetic disks (Hard drive: most common) ~Solid-state storage (SSD) ~Thumb drives ~Optical disks (CD / DVD) 2. Volatile - cache and main memory

Self-Driving Cars Will Disrupt Businesses

Q4-2 How can new hardware affect competitive strategies? -Auto sales - Fewer cars on road may mean fewer cars sold -Auto loans, insurance, collision repair shops -More jobs for engineers, programmers, systems designers -More computer hardware, sensors, and cameras in vehicles

Cryptocurrencies

Q4-2 How can new hardware affect competitive strategies? -Digital-only currencies (like Bitcoin) *Use cryptographic protections to manage and record secure transactions -Benefits: faster, easier, few to no fees *Governments can't monitor, tax, seize -Risks: price volatility, not accepted everywhere, bad reputation (organized crime(?)) -Future: Blockchain - underlying technology, making all types of transactions more secure -Cryptocurrencies are slowly gaining acceptance. -Banks and even some governments are launching their own cryptocurrencies. -Business are using blockchain, or the decentralized public ledgering system used to record cryptocurrency transactions, to manage transactions in traditional sectors like shipping, real estate, voting, and stock trading.

Impact of the Internet of Things

Q4-2 How can new hardware affect competitive strategies? -GE's Industrial Internet *Increase efficiencies, reduce waste, improve decision making *Greatest potential for smart devices in hospitals, power grids, railroads, and manufacturing plants -Smart buildings (Microsoft) *ID problems like wasteful lighting, competing heating and cooling systems, rogue fans, etc.

Smartphone Development

Q4-2 How can new hardware affect competitive strategies? -IOT - Everyday objects embedded with hardware capable of sensing, processing, transmitting data -Objects share data via a network with any other application, service, or device -The network could be a communication company, company network, or the Internet.

Future Cars Will Drive Themselves

Q4-2 How can new hardware affect competitive strategies? -Make things easier, cheaper, safer. -Automobile accidents may become a thing of the past. *Car insurance eliminated? -Eliminate need to have multiple cars. -Avoid costly traffic tickets, parking tickets, DUI citations.

3D Printer

Q4-2 How can new hardware affect competitive strategies? -Plastics, metals, ceramics, foods, biological material -Opportunities in aerospace, defense, automotive, entertainment, and healthcare industries -What happens when 3D-print of extra-large objects like cars, airplanes, boats, houses, drones, etc., becomes possible?

Disruptive New Tech Hardware

Q4-2 How can new hardware affect competitive strategies? -Potentially disruptive hardware developments for existing organizations: 1.Internet of Things (IoT) 2.Digital Reality Devices 3.Self-driving Cars 4.3D Printing 5.Cryptocurrencies

Existing 3D Printing Examples

Q4-2 How can new hardware affect competitive strategies? -Super Bowl Cleat *Vapor Laser Talon: increased traction, reformatted placement equals increased athlete speed -Olympic Running Shoes *Gold-medal-winning sprinter Allyson Felix in collaboration with Nike Other examples: 1. ChefJet: Culinary artists and novices can produce intricate, beautiful, and fully customized deserts. 2. Living cells: Organs, bones, heart valves, skin, joints. 3. Houses & buildings: Print house in 24 hours

Digital Reality Devices

Q4-2 How can new hardware affect competitive strategies? -Tremendous potential to revolutionize our daily lives -Will create entirely new types of companies -Change the way people live, work, shop, and entertain themselves -Different levels of digital reality on a continuum from completely real environments to completely virtual environments -Augmented reality (AR) -Mixed reality (MR) -Virtual reality (VR)

Own Versus License

Q4-3 What do business professionals need to know about software? -License *Right to use specified number of copies *Limits vendor's liability -Site License *Flat fee to install software product on all company computers or all computers at specific site -Open Source *No license fee -You do not actually own a program-you own a license or right to use the program. -When you buy a Windows license, Microsoft is selling you the right to use Windows. Microsoft continues to own the Windows program. -Large organizations negotiate a site license that authorizes the company to install the product on all company computers or a specific site. -Linux, no company can sell you a license to use it. It is owned by the Open Source Community.

What is Firmware?

Q4-3 What do business professionals need to know about software? -Special software installed on read-only memory (ROM) *Printers, print servers, communication devices *As if program's logic is designed into device's circuitry *Can be changed and upgraded like other software, but normally a task for IS professionals

Windows Server Computer Hosting Two Virtual Machines

Q4-3 What do business professionals need to know about software? -Virtualization *Each virtual machine has disk space and other resources allocated to it. Operates as if installed on own computer. *Host operating system controls activities of virtual machines to prevent them from interfering with one another.

So, is Open Source Viable?

Q4-4 Is open source software a viable alternative? -Depends on requirements and constraints -"Free" open source software might require support and operational costs exceeding cost of licensing fee -Blending proprietary and open source software in future -Closed source project *Highly protected source code, only available to trusted employees and carefully vetted contractors

Why Do Programmers Volunteer Their Services to Open Source Projects?

Q4-4 Is open source software a viable alternative? -Exercise creativity on interesting and fulfilling projects -Freedom to choose projects -Exhibit skills to get a job -Start a business selling services -Succeeds because of collaboration -Programming is an intense combination of art and logic. -Designing and writing a complicated computer program is exceedingly pleasurable (and addictive). -Programmers can exercise creativity while working on projects they find interesting and fulfilling. -Programmers can exhibit their skill, both for pride, finding a job or consulting employment, or start a business selling services to support an open source product.

Examples of Open Source Software

Q4-4 Is open source software a viable alternative? -LibreOffice (default office suite in Linux distributions) -Firefox (a browser) -My SQL (a DBMS, see Chapter 5) -Apache (a Web server, see Chapter 6) -Ubuntu (a Windows-like desktop operating system) -Android (a mobile device operating system) -Cassandra (a No S Q L D B M S, see Chapter 5) -Hadoop (a BigData processing system, see Chapter 9)

Developing Native Applications

Q4-5 What are the differences between native and Web applications? -Run on any operating system and device -Serious, heavy-duty, professional programming languages *-Objective-C, C#, C++, Swift, Java, V B.NET, etc. *-Close control over computing device, enable creation of sophisticated and complex user interfaces *Fast and efficient use of memory -Limited to type of operating system -Costly development -All of these languages are object-oriented, which means they can be used to create difficult, complex applications and, if used properly, will result in high-performance code that is easy to alter when requirements change.

Developing Web Applications

Q4-5 What are the differences between native and Web applications? -Web development languages: html5, css3, Javascript -Browsers handle idiosyncrasies of operating system and underlying hardware *html5: support for graphics, animation, 2D animations, other sophisticated user experiences *css3: used with html5 to specify appearance of html coded content *JavaScript: provides underlying logic of application -The benefit of such languages is that they give programmers close control over the assets of the computing device and enable the creation of sophisticated and complex user interfaces.

New from CES 2018

So What -Toyota e-Palette: *Mobility as a service (MaaS) market *Vehicle can be configured for ride-sharing, package delivery, mobile stores, temporary lodging, food truck -Peloton Tread: *Treadmill with 32-inch HD touchscreen that allows users to participate in at least 10 live exercise classes per day. -Sony Aibo: *Robotic dog - AI integrated, self-navigation

Which is Better?

Q4-5 What are the differences between native and Web applications? Depends on: 1. Strategy and goals 2. Application requirements 3. Budget 4. Schedule 5. Tolerance for managing technical projects 6. Need for application revenue -Web applications cheaper to develop and maintain -May lack "Wow!" factor -Choice depends on strategy, particular goals, requirements for your application, budget, schedule, tolerance for managing technical projects, need for application revenue, and other factors. •In general, thin-client applications are cheaper to develop and maintain, but may lack Wow factor.

Characteristics of Native and Web Applications

Q4-5 What are the differences between native and Web applications? •Native applications run on just one operating system. Web applications run in browsers. In the latter case, the browser provides a more or less consistent environment for the application; the peculiarities of operating systems and hardware are handled by the browser's code and hidden from the Web application.

Why Use a Database?

Q5-1 What is the purpose of a database? -Organize and keep track of things -Keep track of multiple themes -General rule: *Single theme - store in a spreadsheet *Multiple themes - use a database *What's a theme? Ex: student grades, student emails, student office visits -General rule: 1. Use a spreadsheet for lists of data involving single theme. 2. Use a database for data with multiple themes.

Passwords and Password Etiquette

Security Guide -12+ characters (14 is better) -Does not contain your user name, real name, or company name -Does not contain a complete dictionary word in any language -Different from previous passwords used Contains both upper- and lowercase letters, numbers, and special characters (such as ˜ ! @; # $ % ^; &; * ( ) _ +; - =; { } | [ ] \ : " ; ' <; >;? , . /) -Never write down your password. -Never ask someone for their password. -Never give your password to someone. -"Do-si-do" move-move away so another person can enter password privately. *Common professional practice

Poisoned App-Les

Security Guide -Apple reported that dozens of apps available on the App Store contained a malware application named XcodeGhost. *Accessed user credentials *Hijacked URLs *Able to read and write data on devices *Compromised other iOS apps -More than 500 million iOS users could have been exposed. -Apple notified users that the dangerous apps had been removed from the App Store. -Key Point: An app does not have to be considered malware to be dangerous or invasive. -Do users end up paying for apps with their privacy? -Can developers change the terms of privacy agreements after a user has agreed to a prior version of the terms?

Hacking Smart Things

Security Guide -Internet of Things (I o T) *Internet-enabled devices *Outfitting every object with Internet access hazardous, even dangerous, proposition -Unintended risks associated with incorporating this capability into things

Internet of Threats

Security Guide -What about securing data stored on Internet-enabled smart devices? *How to protect 10, 20, or 30 different Internet-enabled devices in your home? *Could hacker hijack webcam in your living room or actually hijack your car? *What businesses and government agencies could benefit? -What are some benefits or risks for businesses adopting new Internet-enabled devices? -How about supply chain, customer service? What else?

Major Operating Systems

What do business professionals need to know about software? -Some version of Windows resides on more than 85% of the world's desktops. *For business users, it's more than 95%. Nonmobile Clients (Personal Computers): -Windows (Most popular) -Mac OS -Unix -Linux Mobile Clients: -Symbian -BlackBerry OS -iOS -Android -Windows 10 (mobile) Servers: -Windows Server -Unix -Linux

But Today, They're Not Enough

•Amanda Lacks Skills eHermes Needs 1.Abstract Reasoning Skills 2.Systems Thinking Skills 3.Collaboration Skills 4.Experimentation Skills

Processing the Database

•DBMS Process Operations 1. Read 2. Insert 3. Modify 4. Delete data -These operations are requested in applications that call upon DBMS in different ways. -Structured Query Language - SQL (see-quell) *International standard *Used by nearly all DBMS -SQL Example -INSERT I N T O Student *([Student Number], [Student Name], H W1, H W2, MidTerm) -VALUES (1000, 'Franklin, Benjamin', 90, 95, 100); -Structured Query Language (SQL) used for processing the database. -SQL - international standard language for creating databases and database structures, and processing databases. -Used by all popular DBMS products.


Ensembles d'études connexes

Chp 16: Reentry into the Community

View Set

STAAR Vocab English 9th grade: Set 1

View Set

Chapter 1: General Principles of Pharmacology - PrepU

View Set

5.7A Formación de rocas sedimentarias y combustibles fósiles

View Set

Bones of the upper limbs or upper extremities

View Set

NU 226 Prep U Chapter 39: Oxygenation & Perfusion

View Set

CHAPTER 11: BETWEEN COMPETITION AND MONOPOLY

View Set

PN PASSPOINT: Foundations of Psychiatric Nursing

View Set