MIS 301 Exam I

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

database management system (DBMS)

************** -a licensed software program -software for creating, maintaining, and manipulating data -DBMS programs provide comprehensive and robust features for querying database data -a program with 3 functions: 1) CREATE 2) PROCESS 3) ADMINISTER -database = spreadsheet -DBMS = excel

database application

*************** -a collection of forms, reports, queries, and application programs that process a database -DB may have one or more applications, and each application may have one or more users

structured query language (SQL)

*************** -the most common language for creating and manipulating databases -international standard language for processing DB -all major DBMS products process SQL -can be used to create databases and DB structures -"collect top 10* from employees" means all fields from top 10 employees -aka SQL is very similar/easy to read like English

open standards

-allow any company to use a technology -helps drive penetration, growing the network of users -ex: Android platform (vs. closed iPhone platform)

killer app

-an app, function, or service that is indispensable and superior to rival products, so much so that people will purchase the necessary hardware just to run the app -these can be used to increase the sales of the platform that the app runs on -ex: people buying an xbox so they can play a new, hit xbox game

bitcoin

-an open-source, decentralized payment system that operates in a peer-to-peer environment, without bank or central authority -aka digital, virtual, or cryptocurrency -appeals/features: 1) cuts out transaction fees 2) micropayments 3) international commerce 4) cross-border remittance 5) expanding e-commerce in emerging markets where other forms of payment aren't convenient (credit cards) 6) straddles the line between transparency and privacy 7) no central organization to "freeze" a bitcoin account -concerns 1) consumer benefit needs to be stronger 2) difficult to understand and use 3) reputation problem 4) security concerns 5) ambiguous cloud of not knowing how they will be regulated 6) volatility 7) transaction volume

optical storage

-any storage method in which data is written and read with a laser for archival or back purposes -CDs and DVDs

straddling

-attempts to occupy more than one position, while failing to match the benefits of a more efficient, singularly focused rival -splitting your resources between multiple sides of the market, making your original model weaker -opposite of pure play (ex: Amazon is online only) -ex: if HEB tried to use the fresh direct model along with their brick and mortar model

competitive advantage

financial performance that consistently outperforms industry averages

enterprise software

applications that address the needs of multiple users throughout an organization or work group

grid computing

firms place special software on its exiting PCs or servers that enable these computers to work together on a common problem

capital expense budget

funds used to upgrade assets

cluster computing

connecting server computers via software and networking so that their resources can be used to collectively solve computing tasks

logistics

coordinating and enabling the flow of goods, people, information, and other resources among locations

internet corporation for assigning names and numbers (ICANN)

nonprofit responsible for managing the internet's domain and numbering systems

channel conflict

occurs when manufacturers (brands) disintermediate their channel partners, such as distributors, retailers, dealers, and sales representatives, by selling their products directly to consumers through general marketing methods and/or over the internet

MAC address

unique identifier assigned to a network interface for communication on a physical network segment

black swans

unpredicted but highly impactful events

database

**************** -used to efficiently store and manage large amounts of data -a collection of: 1) tables or files 2) relationship among rows in the table 3) metadata -three TACTICAL ADVANTAGES of using a database: 1) preserve data integrity (assurance that data is consistent, correct, and accessible) 2) eliminate data redundancy (unnecessary repetition of data that slows data processing) 3) limit data view (query, report) so that users only see what they need to see, as cleanly and clearly as possible -STRATEGIC ADVANTAGE: 1) connecting activities across the value chain = more $$ -each record = 2 fields -each table in a database should be organized around one theme -PRIMARY KEY: column or group of columns that identifies a unique row in a table -each table will have one or more columns that serves as a unique identifier called a primary key (ssn is not a good primary key) -ex: primary key is never reassigned, like a UT EID -FOREIGN KEY: non-key column or field in one table that links to a primary key in other table -RELATIONAL DATABASE: store data in tables that represent relationships using foreign keys -METADATA: data that describes data

data forms used to CRUD

**************** Create Read Update Delete data -ex: Google = form

reports

***************** -show data in strutted content -some reports compute values as data presented

dynamic host configuration protocol (DHCP)

****************** -distributes temporary IP address to computers -open computer in McCombs, it looks for an IP address and DHCP gives the computer an IP address when at McCombs

domain name system (DNS)

******************* -converts user-friendly names into public IP address; translates human-readable to IP address, and vice versa -resolves domain name -ICANN manages resolution system -works backwards -a distributed database that looks up the host and domain names that you enter and returns the actual IP address for the computer that you want to communicate with

top level domain (TLD)

-.com, .edu

storage capacity units

-1 byte = 8 bits -1 kilobyte (KB) = 1000 bytes, 2^10 bytes -1 megabyte (MB) = one million bytes, 2^20 bytes -1 gigabyte (GB) = one billion byes, 2^30 bytes -1 terabyte (TB) = one trillion bytes, 2^40 bytes -1 petabyte (PB) = one quadrillion bytes, 2^50 bytes -1 bit → one letter or number -a few KB → an email, typewritten page -500-800 KB → digital book -1.3 MB → digital photo -3 MB → mp3 song -700 MB → CD -4.7 GB → DVD -25 GB → blu ray -100 GB → a normal hard drive -20 TB → collection of library of congress -2.5 PB → wal-mart data warehouse

categories of enterprise software

-ERP (enterprise resource planning) -SCM (supply chain management) -CRM (customer relationship management) -BI (business intelligence) -most works in conjunction with DBMS

LAMP

-Linux Apache Mysql Programming language (perl/python/php) -open source lamp stack -dominant OSS in the world: apache

proprietary technologies

-allow a company to retain ownership and control, but this may restrict the size of the network -aka closed standards -ex: iPhone platform

Microsoft's bundling strategy

-Microsoft's inclusion of web browser and media player "free" with its Windows operating system -they were the first to offer a bundle of application as a discounted price; competitors' slow reaction to create their own bundles contributed to Microsoft's success -what made Microsoft so profitable: 1) complementary products 2) upgrades 3) original equipment manufacturers (OEMs) 4) independent software vendors (ISV) 5) bundling 6) network externalities -biggest threats: 1) imitation 2) hold-up (litigation) 3) market saturation (geographic expansion, diversification) 4) substitution (Java, non-PC devices, free web apps, new entrants) 5) security

hypertext markup language (HTML)

-Tim Berners-Lee designed www. -used HTML to display documents on different machines -hyper text transer protocol (HTTP) enables publishing and receiving HTML pages

contract manufacturing

-Zara avoids contract manufacturing: outsourcing manufacturing to third party firms to keep costs low and margins high; 60% produced in house -Zara only uses it for items with longer shelf life, such as t-shirts and jeans -firms that use contract manufacturers don't own the plants or directly employ the workers who produce the requested goods -disadvantage: has led to race-to-the-bottom cost-cutting measures (ethical issues)

hardware clouds

-a cloud computing model in which a service provider makes computing resources such as hardware and storage, along with infrastructure management, available to a customer on an as-needed basis -utility computing, pay for how much you utilize

software

-a computer program or a collection or programs -precise set of instructions that tells hardware what to do -costly to produce but cheap to reproduce -absence of production capacity constraints -huge SUNK COST (cost that have already been incurred and cannot be recovered); once the first copy of software has been produced, most costs are sunk and cannot be recovered

software as a service (SaaS)

-a form of cloud computing where a firm subscribes to a third-party software and receives a service that is delivered online -benefits to users that accrue from using SaaS: 1) lower costs by eliminating or reducing software, hardware, maintenance, and staff expenses 2) financial risk mitigation since start-up costs are so low 3) potentially faster deployment times compared with installed packaged software or systems developed in-house 4) costs that are a variable operating expense rather than a large, fixed capital expense 5) scalable systems that make it easier for firms to ramp up during periods of unexpectedly high system use 6) higher quality and service levels through instantly available upgrades, vendor scale economies, and expertise gained across its entire client base 7) remote access and availability—most SaaS offerings are accessed through any Web browser, and often even by phone or other mobile device -benefits to vendors for deploying SaaS: 1) limiting development to a single platform, instead of having to create versions for different operating systems 2) tighter feedback loop with clients, helping fuel innovation and responsiveness 3) ability to instantly deploy bug fixes and product enhancements to all users 4) lower distribution costs 5) accessibility to anyone with an Internet connection 6) greatly reduced risk of software piracy -risks: 1) dependence on single vendor 2) long-term viability of partner firms 3) users may be forced to migrate, incurring unforeseen switching costs 4) might not have all features of desktop software 5) data assets stored off-site; potential security and legal concerns 6) reliance on a network connection; may be slower, less stable, and less secure

server farm

-a massive network of computer servers running software to coordinate their collective use -provide the infrastructure backbone to SaaS and hardware cloud efforts, as well as many large-scale internet services

quantum computing

-a quantum computer consisting of just 300 atoms would possess more sheer calculating power than a conventional machine harnessing every last atom in the universe, yielding an almost unimaginable increase in our ability to solve problems of immense complexity -10/15 years until this happens -will revolutionize the future -ex: prosthetics

enterprise resource planning (ERP)

-a software package that integrates the many functions of a business (such as accounting, finance, inventory management, human resources, etc.)

semiconductor

-a substance such as silicon dioxide used inside most computer chips that is capable of enabling as well as inhibiting the flow of electricity -basically computer chips

extensible markup language (XML)

-a tagging language that can be used to identify data fields made available for use by other applications -most APIs and web services send messages where the data exchanged is wrapped in identifying XML tags

point-of-sale (POS) systems

-a transaction processing system that captures purchases and information -ex: cash registers and store checkout systems; date and time known of traffic in stores; schedule employees around this data -critical for capturing sales data and are usually linked to inventory systems

imitation-resistant value chain

-a way of doing business that competitors struggle to replicate and that frequently involves technology in a key enabling role -something on the value chain needs to be unique and hard to copy -Zara

Porter's model of industry structure (5 forces)

-aka industry and competitive analysis -Porter's five forces model is focused externally, describing how a firm is positioned within its industry -framework considering interplay between: 1) rivalry amongst existing competitors 2) power of suppliers 3) power of buyers 4) potential new entrants 5) threat of substitute products or services -five models for analyzing business: (1) industry structure → (2) competitive strategy → (3) value chains → (4) business processes → (5) information systems

barrier to entry

-barriers to entry make it difficult for other firms to enter an industry and compete -when barriers to entry stop your competitors, then sustainable profits are more likely -things that are more valuable, rare, tough to imitate, and non-substitutable create barriers to entry -include: brand, regulation, distribution channels, capital intensity, switching costs, network effects

same-side exchange benefits

-benefits derived by interaction among members of a single class of participants -ex: value goes up as more IM users join network -a type of network effects

vertical integration

-company owns many aspects of its supply chain/value chain -purchasing suppliers = controls production -risk: liable/expose for demand of your product going down

firewall

-computer device that prevents unauthorized network access -may be special-purpose computer or program

local area network (LAN)

-computer network that interconnects only within a certain area -ex: office building, school - UT network, residence -ex: McCombs is a LAN, Jester is a LAN, everything at UT is a LAN

volatile memory

-content is lost when turning device off -storage (such as RAM chips)

information asymmetry

-decision situation where one party has better information than the other party -internet has decreased information asymmetry (ex: price transparency in auto sales)

two-sided market

-derive their value from two classes of users -ex: Ebay - buyers & sellers -ex: games are a two-sided market as users also attract game developers -have more positive feedback loops compared to one-sided markets, as an increase in the number of users on one side of the market (ex: console owners) creates a rise in the other side (ex: game developers)

load balancing

-distributing a computing or networking workload across multiple systems to avoid congestion and slow performance -load balancing & fault tolerant both help make a system SCALABLE

total cost of ownership (TCO)

-economic measure of the full cost of owning a product (typically computing hardware and/or software) -all of the costs associated with the design, development, testing, implementation, documentation, training and maintenance of a software system -maintenance, support, training, compliance auditing, security, backup, provisions for disaster recovery in case of outage, software development and documentation, purchase price, ongoing license and support fees, configuration, testing, deployment

application programs

-enable DB processing over the internet -application is intermediary between the web server and DB -ex: checkout, today's deals, shopping cart -ex: being able to purchase hotel room online through Southwest Airlines when buying a flight; hotel and Southwest are communicating by web services

information system (IS)

-enable business processes -improve value chain links to increase efficiency -support competitive strategy -influence industry structure -5 component information systems framework: 1) hardware 2) software 3) data 4) process 5) people (hardest to change) -information systems allow Zara to design, produce, and distribute products to stores within weeks instead of months -IS is Zara's essential advantage -greater return & lower risk = successful business -Zara = PROCESS innovation vs. product innovation

thick client apps

-enable you to access applications on a remote server simply with a browser -lost of function -ex: chromebook, google docs, Netflix, anything used by browser

demand shaping

-ex: promotions of 4g desktop to 6g desktop to shape demand & keep customers happy -Dell supply chain does this

switching costs

-exist when consumers incur an expense to move from one product or service to another -can involve actual money spent as well as investments in time, any data loss, etc.

fast follower problem

-exists when savvy rivals watch a pioneer's efforts, learn from their successes and missteps, then enter a market quickly with a comparable or superior product at a lower cost before the first mover can dominate -fast follower time frame varies for each industry (ex: auto = year, coffee = week)

Cold War

-fear of soviet space mastery fueled U.S. science investment -fear of war inspired idea of a networked communication system with multiple nodes capable of functioning if partly down -first word on internet = "log"

internet protocol (IP) address

-format: 4 sets of 0-255 -public-used on internet assigned by ICANN -each address is unique -private-used within private networks controlled by company operating network

personal digital assistants

-handheld computing devices meant largely for mobile use outside an office setting -used to gather information input (Zara staff regularly talk to customers to gain feedback)

server

-in a hardware context, a server is a computer that has been configured to support requests from other computers (called clients) -in a software context, a server, like a web server, is a program that fulfills requests -clients are not powerful -servers are powerful

to increase performance of computer

-increase RAM -increase memory

information

-knowledge derived from data -data presented in meaningful context

one-sided market

-market that derives most of its value from a single class of users -ex: AIM - chatters -ex: IM is a one-sided market as IM users attract other IM users

flash memory

-nonvolatile, chip-based storage often used in mobile phones, cameras, and mp3 players -slower than conventional RAM but it holds its charge when the power goes out -aka flash RAM -intermediate between RAM and hard drive -solid state

Linux

-open source OS -COPYLEFT: a general method for making a program (or other work) for free, and requiring all modified and extended versions of the program to be free as well; GNU: general public license -Linux Torvalds -Bun2, RedHat, Cent OS -IBM pays Linux to make Microsoft go down

service-oriented architecture (SOA)

-organizations that have created a robust set of web services around their processes and procedures are said to have a service-oriented architecture (SOA)

packet/packet switching

-packet switching breaks transmissions into messages (or packets, frames) -when a packet arrives at a router, the router must decide which of several paths to use to send the packet on

strategic positioning

-performing different tasks than rivals, or the same task in different ways -ex: FreshDirect versus HEB or Randall's

operational effectiveness

-performing the same tasks better than rivals can perform them (danger is "sameness") -try to improve quality, lower costs, design efficient customer -ex: in both HEB and Randall's, you shop, buy products, and leave all the same

gamification

-powerful tool for enhancing business goals -incentive for customer action or retention -gamifying a business model can pay huge dividends -ex: hotel point system at Hilton Honors -pay $30 more for an upgraded room but get more points = gamification -gamification does not start with game elements, but starts with CORE DRIVES -core drives: meaning, empowerment, social influence, unpredictability, avoidance, scarcity, ownership, accomplishment -gamification steps 1) write down a problem 2) strategy dashboard (business metrics: what you'll measure) 3) the actor 4) points 5) core values -STRATEGY DASHBOARD (look at diagram) -player → commits desired actions & tracks feedback mechanisms -desired actions → impacts business metrics & results in win-state -feedback mechanisms →progresses to win-state -incentives → embedded in win-state

encryption

-process of encoding messages/info in a way such that only authorized parties can read it

platform

-products and services that allow for development and integration of software products and other complementary goods -ex: iPhone app store

just-in-time manufacturing

-products produced to meet demand -no surplus

operating system (OS)

-provides a common set of controls for managing computer hardware, making it easier for users to interact with computers and for programmers to write application software -software that controls the computer hardware and establishes standards for developing and executing applications -four main OS: 1) windows 2) mac OSX Lion 3) linux 4) unix

programming language

-provides the standards, syntax, statements, and instructions for writing computer software -ex: Java (developed by Sun), which was designed to provide true platform independence for application developers

data

-refers simply to raw facts and figures -computers represent data using binary digits (0 or 1), called bits

thin client apps

-require you to load software on your local PC -ex: iTunes, Microsoft word

search costs

-search costs are one facet of transaction costs or switching costs -rational consumers will continue to search for a better product or service until the marginal cost of searching exceeds the marginal benefit -time and money spent locating a suitable product and determining the best price of that product

sold state electronics

-semiconductor-based devices -suffer fewer failures and require less energy than mechanical counterparts -more robust than moving parts -ex: RAM, flash memory, microprocessors, NOT hard drives

radio frequency identification (RFID) tags

-small chip-based tags that wirelessly emit a unique identifying code for the time that they are attached to -next-generation bar code

open source software (OSS)

-software that is free* and where anyone can look at and potentially modify the code -$60B industry -pros: 1) cost 2) reliability 3) security 4) scalability (products can ramp up when demand increases) 5) agility and time to market -drawbacks: 1) complexity of some products 2) higher TCO for some products 3) concern about the ability of a product's development community to provide support or product improvement 4) legal and licensing concerns

embedded systems

-special-purpose software designed and included inside physical products (often on firmware) -makes devices smarter by sharing usage information, helping diagnose problems, indicating maintenance schedules, providing alerts, or enabling devices to take orders from other systems -enabled by Moore's Law; can create real strategic value

business intelligence (BI) systems

-system that uses data created by other systems to provide reporting and analysis for organizational decision making -category of enterprise software

customer relationship management (CRM)

-system used to support customer-related sales and marketing activities -category of enterprise software

fault tolerance

-the ability of a system to continue operations even if a component fails

microprocessor

-the brain of a computing device -executes instructions of computer program

marginal cost (variable cost)

-the cost to produce an additional copy -the cost of software production is dominated by the "first-copy costs"; after the first copy, the marring cost is very close to zero

user interface

-the mechanism through which users interact with a computing device -includes elements of GUI (windows, scroll bars, buttons, menus, dialog boxes) and other forms of interaction (touch screens, motion sensing controllers, or tactile devices for blind people)

operations

-the organizational activities that are required to produce goods and services -can involve the development, execution, control, maintenance, and improvement of an organization's service and manufacturing procedures

hardware

-the physical component of information technology, consisting of microelectronics-based computing or telecommunication devices -input hardware, processing devices, output hardware, storage hardware -input hardware: keyboard, mouse, document scanners, bar code (UPC) scanners, video cameras, microphones -processing devices: CPU, RAM, special function cards -output hardware: video displays, printers, audio speakers, overhead projectors, plotters -storage hardware: magnetic disks (hard drive), optical disks (CDs and DVDs), magnetic tape, flash drives

price elasticity

-the rate at which the demand for a product or service fluctuates with price change -highly price elastic goods show a large change in demand as prices change; applies to products or services that are "wants" or "luxuries" -more price Inelastic goods are less responsive to price change (demand is pretty consistent regardless of price); applies to products or services that are "needs"

value chain

-the set of activities through which a product or service is created and delivered to customers -inbound logistics: getting needed materials and other inputs into the firm from suppliers (peppers) -operations: turing inputs into products and services (chopping) -outbound logistics: delivering products and services to consumers, distribution centers, retailers, or other partners (waiters) -marketing and sales: customer engagement, pricing, promotion, and transaction (advertisements) -support: service, maintenance, and customer support (keep them happy) -breaks functions down into primary and support functions 1) primary functions: touch the product 2) support functions: do not -improvement in any step has the potential to increase profitability

Moore's law

-the speed of a computer chip doubles every 18 months (faster) -chip performance per dollar doubles every 18 months (cheaper) -also, size decreases -could be approaching its limits

brand

-the symbolic embodiment of all the information connected with a product or service -smaller brands have trouble competing with big brand names

bandwidth

-theoretical max -data transmission speeds -often expressed in bits per second, or bps

voice over IP (VOIP)

-transmission technologies that enable voice communication to take place over internet as well as private packet-switched networks -old phone systems use CIRCUIT SWITCHING for a dedicated connection between two entities -internet networks are PACKET SWITCHING, where conversations are sliced into packets and squeezed into smaller spaces -VoIP allows voice and phone systems to become an application traveling over the internet

nonvolatile memory

-turn computer off and on, contents of magnetic and optical disks is unchanged (unless it crashes) -storage that retains data -ex: flash memory, hard disk, DVD storage, external hard drive

virtual private network (VPN)

-uses internet or private network to create appearance of point-to-point connections -uses public internet to create appearance of private network -VPN creates SECURE TUNNEL through UNSECURED INTERNET -PPTP: point-to-point tunneling protocol

bullwhip effect

-variability in order size and order timing increase at each stage up the supply chain -end of bullwhip = pronounced -demand spiking & going down → increase cost structure -ex: ferbes -to eliminate the bullwhip effect, let all participants have access to consumer-demand information -inter-organizational information systems are essential to sharing this data between firms -today, demand data is passed quickly to eliminate bullwhip effect

internet of things

-vision of a future in which sensors are incorporated into many aspects of everyday life -this would allow a vast network to collect data, analyze input, and automatically coordinate collective action -6th wave of computing

random access memory (RAM)

-volatile -fast, chip-based, volatile storage in a computing device -main memory is called RAM -to store data or instructions, RAM needs power

waves of computing

-wave I: 1960s, room size -wave II: 1970s, refrigerator size -wave III: 1980s, personal computers -wave IV: 1990s, internet computing -wave V: today, ubiquitous computing

throughput

-what you actually get -less than bandwidth, which is the theoretical max

cross-side change benefits

-when an increase in the number of users on one side of the market creates a rise on the other side -ex: video game market -a type of network effects

congestion effects

-when increasing numbers of users lower the value of a product or service -ex: when everyone owns a status symbol, like BMWs, it's no longer a status symbol

tipping points

-when network effects are present, markets may reach a tipping point where network effects become so valuable that one winner emerges -ex: Microsoft won the desktop operating system battle; who will win the smart phone war

backward compatibility

-when new technology is still compatible on the older hardware -the ability to take advantage of complementary products developed for a prior generation of technology

economies of scale

-when the cost of an investment can be spread across increasing units of production or in serving a growing customer base -businesses that have favorable economies of scale can be referred to as being highly scalable

network effects

-when the value of a product or service increases with number of users -aka Metcalfe's Law, or network externalities -value = (users)^2 -user base (critical mass) is the key -INCREASE barriers to entry; new entrants must be very desirable -three main sources of value for network effects: 1) EXCHANGE (exchange value refers to the size of network you can connect with; the more people with an xbox, the more people you can play with) 2) STAYING POWER (affected by switching costs) 3) COMPLEMENTARY BENEFITS (platforms encourage complementary benefits) -strategies for competing in markets where network effects are present 1) MOVE EARLY (being first-to-market) 2) SUBSIDIZE ADOPTION (it's worth paying customers to adopt your technology and build the size of your network; Fandango; customer lifetime value (CLV) > customer acquisition cost) 3) PARTNERSHIPS AND ALLIANCES (partner with complementary companies to boost product acceptance)

convergence

-when two or more markets, once considered distinctly separate, begin to offer similar features and capabilities -ex: markets of mobile phones and media players

processing devices of computers

1) central processing unit (CPU): selects instructions, processes them, performs arithmetic and logical comparisons, and stores operation in memory 2) main memory: sometimes called RAM 3) special function cards: enhance computer's basic capabilities on things like video cards

7 key components inside computers

1) motherboard (all connects here) 2) CPU 3) RAM 4) video card 5) power supply 6) hard disk 7) optical drive

Apple in 2010

1) what factors made Apple less successful with their early Macintosh product line? -slow processor speed -lack of compatible software 2) what factors lead to Apple's dominance after the return of Steve Jobs? -frequent upgrades made switching costs rise -bundling excel/word -OEMS helped them become the standard 3) how is Apple different from other PC makers? -breakthrough in ease of use, industrial design, and technical elegance 4) are there weaknesses or potential risks in Apple's model? -heavily dependent of steve jobs -keeping up with the demand of new ideal products by customers -->huge spending in R&D

Microsoft in 2005

1) what factors made Microsoft so successful between 1990 and 2000? -sold MS-DOS and Windows 3.x as complementary products, effectively doubling its OS revenue per PC -offered a bundle of applications at a discounted price and "periodic upgrades" in which customers could switch from competitors to Microsoft for a significantly discounted price -competitors were initially reluctant to write for Windows and even slower to create their own bundles -the launch of Windows 2000 caused Microsoft for the first time to penetrate the high-end corporate server market. -the launch of Internet Explorer quickly dominated the browser market share 2) what challenges was Microsoft facing between 2000 and 2005? -how to reposition Microsoft for modern times -security problems with Internet Explorer led to a rapid loss in market share in 2005. -Java threatened to reduce the significance of the traditional OS as well as the supply of programmers for Windows-based applications -as software moved to a service model, Microsoft's challenge was to manage the complexity of the vast network interconnected computers and to find software that could deliver the new applications and services form that complex, underutilized grid -found guilty of multiple antitrust violations, one of which forced the company to offer an unbundled version for the first time as well as reveal information about Windows' source code -decreased employee morale along with complaints that the company had become unmanageable and too centralized led to organizational changes -expensive techn.ical support across all of its product lines -emergence of Linux and other open source software threatened to put downward pressure on prices and captured some of the market share -efforts to become the backbone of the digital home included the Xbox and Media Center PC. -competed for market share in Web services, digital home services, the cell phone market, the small-business market, and the Internet. *Growth in PC shipments fell drastically, product quality and security issues continued, open source gained momentum, and emerging markets proved more difficult to penetrate 3) how did bundling help with Microsoft's profitability? -they were the first to offer a bundle of applications at a discounted price. Competitors' slow reaction to create their own bundles contributed to Microsoft's success 4) how did Microsoft's relationship with OEMs and ISVs affect profitability? - most of Windows' sales went to OEMs, which would pre-install the program on each computer's hard drive. Consequently, Microsoft's only variable production cost after the initial development was to ship a single master copy of the software to each OEM for reproduction. -Microsoft spent tens of millions of dollars per year for engineers to support ISVs that wrote applications of OSes. -exploited its OEM relationships to secure a dominant position in the worldwide desktop OS and productivity suite markets

VLOOKUP

=VLOOKUP(lookup_value, table_array, col_index_num, [range_lookup]) ex: =VLOOKUP("photo frame", A2:B16, 2, FALSE)

analog vs. digital signal

ANALOG -circuit switching provides dedicated point-to-point connection -telephones, voice, radio -full capacity available to both subscribers during call -callers pay whether they use circuit or not -quality connection -tv used to be analog DIGITAL -packet switching breaks transmissions into messages (or packets, frames) -when a packet arrives at a router, the router must decide which of several paths to use to send the packet on -internet is resilient because it uses packet switching -multiplexing saves money -started with computers; now radio, tv, music, film all digitized

IF function

IF(logical-test,value-if-true,value-if-false) ex: =IF(E2>61,"Pass","Fail")

supply chain management

RDMS -customer order from RETAILERS, who order from DISTRIBUTORS, who order from MANUFACTURERS, who order from SUPPLIERS -systems that can help a firm manage aspects of its value chain, from the flow of raw materials into the firm, through delivery of finished products and services at the point-of-consumption -category of enterprise software

disruptive technology

an innovation that helps create a new market and value network, and eventually disrupts an existing market and value network (over a few years or decades), displacing an earlier technology

uniform resource locator (URL)

a URL corresponds with an IP address

router

a computing device that connects networks and exchanges data between them

domain name service (DNS)

a distributed database that looks up the host and domain names that you enter and returns the actual IP address for the computer that you want to communicate with

utility computing

a form of cloud computing where a firm develops its own software, and then runs it over the internet on a service provider's computers

distributed computing

a form of computing where systems in different locations communicate and collaborate to complete a task

optical fiber line

a high-speed glass or plastic-lined networking cable used in telecommunications

oligopoly

a market dominated by a small number of powerful sellers

bundling

a market strategy that involves offering several products for sale as one combined product

monopoly

a market where there are many buyers but only one dominant seller

client-server model of distributed computing

a method of distributed computing where one program (a client) makes a request to be fulfilled by another program (a server)

protocol

a set of rules for communication

electronic data interchange (EDI)

a set of standards for exchanging messages containing formatted data between computer applications

software package

a software product offered commercially by a third party

client (as in client/server architecture)

a software program that makes requests of a server program

business process

a standardized set of activities that accomplish a specific task, such as processing a customer's order -optimized for each business

scale advantages

advantages related to a firm's size

network interface card (NIC)

all computers have a NIC

desktop software

applications installed on a personal computer, typically supporting tasks performed by a single user

graphical user interface (GUI)

before GUIs, everyone who used computers had to know computer language and work at COMMAND LINE

plain old telephone service (POTS)

circuit switching

massively parallel computing

computers designed with many microprocessors that work together, simultaneously, to solve problems

supercomputers

computers that are among the fastest of any in the world at the time of their introduction

cloudbursting

describes the use of cloud computing to provide excess capacity during periods of spiking demand

differentiation

differentiation strategy has been based on the premise that improved/innovative outputs will translate into greater demand for the business's outputs

e-waste

discarded obsolete technology; electronic waste

compliance

ensuring that an organization's systems operate within required legal constraints and industry and organizational obligations

Nested IFs

ex: =IF(B9>=18,"Adult",IF(B9>12,"Teen","Child"))

magnetic storage

hard drives

latency

higher latency = more delay

capital intensity

how much $$ to start a new business

application

includes desktop applications, enterprise software, utilities, and other programs that perform specific tasks for users and organizations

knowledge

insight from experience and expertise

blue ocean strategy

instead of competing in "blood-red" waters where the sharks of highly competitive firms vie for every available market scrap, firms should seek the "blue waters" of uncontested, new market spaces

database administrator

job title that oversees activities associated with databases

cybersquatting

knowingly registering a domain name to profit from someone else's firm name or trademark

viral marketing

leveraging consumers to promote a product or service

scalability

many major OSS effects can run on everything from cheap commodity hardware to high-end supercomputing

service level agreement (SLA)

negotiated agreement between the customer and the vendor

internet service provider (ISP)

organization or firm that provides access to the internet

multiplexing

packets from many transmissions mixed (multiplexed) over each transmission line

complementary benefits

products or services that add additional value to the primary product or service that makes up a network

commodity

products or services that are nearly identically offered from multiple vendors

application programming interfaces (APIs)

programming hooks, or guidelines, published by firms that tell other programs how to get a service to perform a task such as send or receive data

cloud computing

replacing an organization or individual's software or hardware (computing resources) with online resources

margin (gross margin)

revenue less COGS (cost of goods sold)

application server

software that houses and serves business logic of use and reuse by multiple applications

colocation facilities (colos)

storage places where a firm's servers get super fact connections as close to the action as possible

return on investment

the amount earned from an expenditure

proprietary

the company built it itself

distribution channels

the path through which products or services get to customers

net neutrality

the principle that all Internet traffic should be treated equally

resource-based view of competitive advantage

the strategic thinking approach suggesting that if a firm is to maintain sustainable competitive advantage, it must control an exploitable resource, or set of resources, that are: valuable, rare, tough to imitate, non-substitutable

mental models

the values & beliefs culture a company is molded around; company hires people that match → creates company culture (ie. Xerox's mental model as a copy place made them pass up a lot of opportunities, like the personal computer)

key performance indicator (KPI)

thing you measure

modem

translates between digital device and analog line for data transmission over phone system


Ensembles d'études connexes

HESI Case Study - Chronic Kidney Disease

View Set

SDP208 Human Resources Chapter 1 - 5

View Set

Chapter 3 - Security and Compliance

View Set

ASE A7 - Heating & Air Conditioning Questions

View Set