SlideShare une entreprise Scribd logo
1  sur  28
David Wilson
Angela Devenney
Brittany Matheny
  Brien Mccoy
 IT is used as communication tool to:
     Share information between staff, suppliers, and
       consumers.
    1970’s Information Technology was know as DP.
   Data VS. Information.
   1980’s Business Tech (BT) introduced tools like atm’s
    and voicemail
   Then after the 1980’s (BT) was know as (IT) information
    tech.
   CIO helps businesses use tech for communication
 Allows for online paying and ordering
 How it changed the entertainment
  industry:
    40 year ago you had to go to a movie
     theater
    Allows for video ordering
    Allows for downloading on computer, iPod,
     or cell phone
 Broke time and location barrier
   NASDAQ
 Knowledge makes info useful
 Business Intelligence – software
  applications that analyze an organization’s
  raw data
 BI changes traditional flow of info:
    Used to train workers
    Provides insights
 Business process information
 Physical world Observation
 Biological data
 Public data
 Data that indicates personal references or
 intention
 Tips for organizing E-mail and electron
 files
   Use your e-mail program’s organizing
    tools
   Use consistent file names
   Use online backup services
   Use desktop search software
 Data Warehouse:
  Stores data on a single subject over time
  Purpose is to get data out


 Data Mining:
  Looking for hidden patterns and
   relationships among data
 The road to knowledge


 Network of computer networks


 Was a one to one communication tool


 Now it is a one to many broadcast tool
 Companywide network, closed to public
  access
 Keeps unwanted sources out
 Uses firewalls
 Allows for interactive apps
 Broader version of an Intranet
 Allows for data sharing which encourages
  collaboration between companies
 Good for:
   Same information access
   Processing orders
   Invoices
   payments
 Secure system used with extranets
 Reserved solely for the network
 Issues with Dedicated lines:
   Expensive
   limit extranet use
   Often too time consuming
 Private data network
 Creates secure connections or tunnels
 Advantages of (VPNs):
   Same capabilities as extranets
   Cheaper than extranets
   Allows for on-demand networking
   Keeps corporate networks secure
 Make information available in one place
 Gives users access to their area of the
  intranet
 Advantages:
    Centralizes information
    Serves as entry point
    Allows access according to one’s role
 Allows a continuous connect to the internet
 Sends and receives:
   Video
   Voice
   Data files
 Runs 22000 times faster than today’s
  internet
 Supports heavy duty apps
 Key element
    very-high-speed backbone network
    service vBNS
 Helps remote medical specialists
 Over 325 member universities
 Social Networking
   Inexpensive way to get exposure
   Tools for collaboration between businesses and
    consumers
 Web 2.0
   Tools used to build social and business connection
   Share information & collaborate on projects online
 Examples
   YouTube, Twitter, My space, facebook
 Hardware includes:
      computers
      mobile phones
     Printer
     Scanners
     fax’s
      PDA’s
 CUTTING THE CORD
   Today most experts would agree that people are
      moving away from just using their PC’s to
      connect. Nowadays people are also using Iphones,
      netbooks, blackberry’s, etc.
 Computer Networks:
   Connect people to people and people to data
   Allow companies & people to save time & money
   Have drawbacks, maintaining a fleet of PC’s is
    expensive, also you lose productivity every time you
    update, troubleshoot, or train a new employee how to
    use it
   Some companies are now looking for other options
   One option is hybrid of mainframe & network
    computing
 Thin client networks
      Software changes & upgrades need to be made only on the
       server, so cost can be reduced by 20%
   Rent software & hardware access
 Virtualization & Cloud Computing
   Process that allows networked computer to run
    multiple operating systems & programs through one
    central computer at the same time
   Allows for virtualization but helps with limiting amount
    of data share
   Often sold for a monthly fee
 Turn Technology off when not in use




 Buy programs like surveyor, which shut down
 computers in a office at the push of a button
 Computer software tells the computer what to do
 Shareware
   Copyrighted
   Distributed free of charge but user usually sends a fee to he
      developer if the program meets their needs
 Public Domain Software
   Free for the taking without any fees
 Business people use software for writing
     Word processors
     Spread sheets
     Filing and retrieving data
     graphics
 Human Resource Issues
   Telecommuting has many different advantages:
      The company can save resources
      Easy of use for the employee
      Often increases productivity
      Great for parents that have children or people with
       disabilities
   Disadvantages:
      Less personal contact and confrontation
      Don’t know when to turn off work
      Sometimes part time alternative
 Nanobots
   People who are given the freedom to meet
    the organization’s goals on their own time
    and schedule
   Often given a project with a certain budget
    and time deadline, and are left alone to take
    the task on
   Biggest difficulty is finding the right person
    for the job
 Security Issues
   Viruses
      Pieces of programming code inserted into other programming
       that usually lies dormant until triggered to cause some
       unexpected event
      Antivirus protection is essential
   Phishing
      Scammers often embellish an e-mail message with a stolen logo
       for a well-recognized brand such as eBay, PayPal, or Citibank
      Scammers use phrases such as “Account Activation
       Required”, or “Your account will be cancelled if you do not
       verify”
      When the user clicks on it, the scammer can steal personal and
       private information
 Other threats include:
   Copyright laws being violated
   Sexual and racial harassment
   Cyber terrorism
     Terrorist hackers could shut down the entire
      communications, money supply, electricity, and
      transportation systems
     In 2002 there was a powerful electronic attack
      that crippled 9 of the 13 computers that manage
      internet traffic globally
 Privacy Issues
   Many company managers scan employee e-mail
    regularly (it is legal)
   Hackers can trap and read your email
   Makes easier to do unnecessary snooping
   Cookies:
     Pieces of information that the browser sends back to the
      server whenever you return to that web site
     Tracks your movement
     Spyware can be installed on your computer without your
      knowledge
 Stability Issues
   Being error free
      Hershey company’s $115 million dollar new computer
       system disrupted shipments one Halloween and caused a
       12% deficit that quarter
      Combination of human error, computer error,
       malfunctioning software, and an overly complex marriage of
       software, hardware, and networking equipment


 Management must face all of these challenges
 within the company in order to maintain a strong,
 growing company

Contenu connexe

Tendances

Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICTRoshanMaharjan13
 
Societal impacts PART2
Societal impacts PART2Societal impacts PART2
Societal impacts PART2AVISHITYAGI
 
Impact of ict on society
Impact of ict on societyImpact of ict on society
Impact of ict on societyAMOSOGAGAH
 
Foundation Course: Information Technology UNIT 4
Foundation Course: Information Technology UNIT 4Foundation Course: Information Technology UNIT 4
Foundation Course: Information Technology UNIT 4University of Delhi
 
Foundation Course: Information Technology UNIT 2
Foundation Course: Information Technology UNIT 2Foundation Course: Information Technology UNIT 2
Foundation Course: Information Technology UNIT 2University of Delhi
 
Using Digital Certificates To Secure Sensitive Communications At Uw Madison
Using Digital Certificates To Secure Sensitive Communications At Uw MadisonUsing Digital Certificates To Secure Sensitive Communications At Uw Madison
Using Digital Certificates To Secure Sensitive Communications At Uw MadisonNicholas Davis
 
Internet and pc concepts
Internet and pc conceptsInternet and pc concepts
Internet and pc conceptshoneynut67
 
Its cabinet jan24_2011
Its cabinet jan24_2011Its cabinet jan24_2011
Its cabinet jan24_2011jeremychobbs
 
Modern ICT environment and secretaries
Modern ICT environment and secretariesModern ICT environment and secretaries
Modern ICT environment and secretariesindika rathninda
 
INTERNET AND E-COMMERCE
INTERNET AND E-COMMERCEINTERNET AND E-COMMERCE
INTERNET AND E-COMMERCEUsama ahmad
 
Digital Natives: University Migration
Digital Natives: University MigrationDigital Natives: University Migration
Digital Natives: University MigrationIngrid Melve
 
10 security concerns cloud computing
10 security concerns cloud computing10 security concerns cloud computing
10 security concerns cloud computingHossam Zein
 
Modern Technology
Modern TechnologyModern Technology
Modern TechnologyMd Saylab
 
Cyber Security and GDPR Made Easy
Cyber Security and GDPR Made EasyCyber Security and GDPR Made Easy
Cyber Security and GDPR Made EasyChristoanSmit
 
Unit 3 activity 11 by zaw htoo aung
Unit 3 activity 11 by zaw htoo aung Unit 3 activity 11 by zaw htoo aung
Unit 3 activity 11 by zaw htoo aung Zale Silva
 
The Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD WorldThe Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD Worldmkeane
 
Information communication technology (ict)
Information communication technology (ict)Information communication technology (ict)
Information communication technology (ict)NILISSL
 

Tendances (20)

Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
 
Societal impacts PART2
Societal impacts PART2Societal impacts PART2
Societal impacts PART2
 
Impact of ict on society
Impact of ict on societyImpact of ict on society
Impact of ict on society
 
Foundation Course: Information Technology UNIT 4
Foundation Course: Information Technology UNIT 4Foundation Course: Information Technology UNIT 4
Foundation Course: Information Technology UNIT 4
 
Foundation Course: Information Technology UNIT 2
Foundation Course: Information Technology UNIT 2Foundation Course: Information Technology UNIT 2
Foundation Course: Information Technology UNIT 2
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Using Digital Certificates To Secure Sensitive Communications At Uw Madison
Using Digital Certificates To Secure Sensitive Communications At Uw MadisonUsing Digital Certificates To Secure Sensitive Communications At Uw Madison
Using Digital Certificates To Secure Sensitive Communications At Uw Madison
 
Ch # 5, CISM
Ch # 5, CISMCh # 5, CISM
Ch # 5, CISM
 
Internet and pc concepts
Internet and pc conceptsInternet and pc concepts
Internet and pc concepts
 
Its cabinet jan24_2011
Its cabinet jan24_2011Its cabinet jan24_2011
Its cabinet jan24_2011
 
Modern ICT environment and secretaries
Modern ICT environment and secretariesModern ICT environment and secretaries
Modern ICT environment and secretaries
 
INTERNET AND E-COMMERCE
INTERNET AND E-COMMERCEINTERNET AND E-COMMERCE
INTERNET AND E-COMMERCE
 
Digital Natives: University Migration
Digital Natives: University MigrationDigital Natives: University Migration
Digital Natives: University Migration
 
Relevancy of ict to secretaries and reporters2
Relevancy of ict to secretaries and reporters2Relevancy of ict to secretaries and reporters2
Relevancy of ict to secretaries and reporters2
 
10 security concerns cloud computing
10 security concerns cloud computing10 security concerns cloud computing
10 security concerns cloud computing
 
Modern Technology
Modern TechnologyModern Technology
Modern Technology
 
Cyber Security and GDPR Made Easy
Cyber Security and GDPR Made EasyCyber Security and GDPR Made Easy
Cyber Security and GDPR Made Easy
 
Unit 3 activity 11 by zaw htoo aung
Unit 3 activity 11 by zaw htoo aung Unit 3 activity 11 by zaw htoo aung
Unit 3 activity 11 by zaw htoo aung
 
The Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD WorldThe Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD World
 
Information communication technology (ict)
Information communication technology (ict)Information communication technology (ict)
Information communication technology (ict)
 

En vedette

En vedette (20)

BUS137 Chapter 14
BUS137 Chapter 14 BUS137 Chapter 14
BUS137 Chapter 14
 
How to bring a product to market, Part 2
How to bring a product to market, Part 2How to bring a product to market, Part 2
How to bring a product to market, Part 2
 
Chapter 02 MKT120 Strategies and Plan
Chapter 02 MKT120 Strategies and PlanChapter 02 MKT120 Strategies and Plan
Chapter 02 MKT120 Strategies and Plan
 
Chap008 BUS137
Chap008 BUS137Chap008 BUS137
Chap008 BUS137
 
Personal Finance
Personal FinancePersonal Finance
Personal Finance
 
Chapter 18 MKT120 Sales & Sales Mgmt
Chapter 18 MKT120 Sales & Sales MgmtChapter 18 MKT120 Sales & Sales Mgmt
Chapter 18 MKT120 Sales & Sales Mgmt
 
Chap005 BUS137
Chap005 BUS137Chap005 BUS137
Chap005 BUS137
 
Chap011 BUS137
Chap011 BUS137Chap011 BUS137
Chap011 BUS137
 
Chapter 15 MKT120 Retail
Chapter 15 MKT120 RetailChapter 15 MKT120 Retail
Chapter 15 MKT120 Retail
 
BUS137 Chapter 13
BUS137 Chapter 13BUS137 Chapter 13
BUS137 Chapter 13
 
Chap007 BUS137
Chap007 BUS137Chap007 BUS137
Chap007 BUS137
 
How to close an angel round
How to close an angel roundHow to close an angel round
How to close an angel round
 
Chap004 BUS137
Chap004 BUS137Chap004 BUS137
Chap004 BUS137
 
Legal Environment
Legal EnvironmentLegal Environment
Legal Environment
 
Bodeman personal finance_presentation1-1
Bodeman personal finance_presentation1-1Bodeman personal finance_presentation1-1
Bodeman personal finance_presentation1-1
 
The rise of the angels
The rise of the angelsThe rise of the angels
The rise of the angels
 
Chapter 13 MKT120 Pricing
Chapter 13 MKT120 PricingChapter 13 MKT120 Pricing
Chapter 13 MKT120 Pricing
 
Chap001 BUS137
Chap001 BUS137Chap001 BUS137
Chap001 BUS137
 
Chap006 BUS137
Chap006 BUS137Chap006 BUS137
Chap006 BUS137
 
Customer Development 1: Introduction
Customer Development 1: IntroductionCustomer Development 1: Introduction
Customer Development 1: Introduction
 

Similaire à Technology

L25 network fundamentals
L25   network fundamentalsL25   network fundamentals
L25 network fundamentalsheidirobison
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProjectKaley Hair
 
Introduction to internet, intranet and Extranet . Myths about internet
Introduction to internet, intranet and Extranet . Myths about internet  Introduction to internet, intranet and Extranet . Myths about internet
Introduction to internet, intranet and Extranet . Myths about internet AyushJadon5
 
Cb12e basic ppt ch15
Cb12e basic ppt ch15Cb12e basic ppt ch15
Cb12e basic ppt ch15Eric
 
202160902-Internet-Intranet-Extranet.ppt
202160902-Internet-Intranet-Extranet.ppt202160902-Internet-Intranet-Extranet.ppt
202160902-Internet-Intranet-Extranet.pptDizzi1
 
computer network technology in modern universe.
computer network technology in modern universe.        computer network technology in modern universe.
computer network technology in modern universe. ShohanaakterKakon
 
When Worlds Collide: Ethics and Technology for Lawyers
When Worlds Collide: Ethics and Technology for LawyersWhen Worlds Collide: Ethics and Technology for Lawyers
When Worlds Collide: Ethics and Technology for Lawyersrtrautz
 
iPads and other tablets for Legal Aid
iPads and other tablets for Legal AidiPads and other tablets for Legal Aid
iPads and other tablets for Legal AidJane Ribadeneyra
 
Network fundamentals
Network fundamentalsNetwork fundamentals
Network fundamentalsImoh Etuk
 
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)ijccsa
 
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...ijccsa
 
Software. intranet. e crime
Software. intranet. e crimeSoftware. intranet. e crime
Software. intranet. e crimejuliakad84
 
Web tehnology
Web tehnologyWeb tehnology
Web tehnologygurchet
 
Chapter 3 E Business
Chapter 3 E BusinessChapter 3 E Business
Chapter 3 E BusinessUMaine
 

Similaire à Technology (20)

Services and Products
Services and ProductsServices and Products
Services and Products
 
L25 network fundamentals
L25   network fundamentalsL25   network fundamentals
L25 network fundamentals
 
internet intranet and extranet
internet intranet and extranetinternet intranet and extranet
internet intranet and extranet
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProject
 
Introduction to internet, intranet and Extranet . Myths about internet
Introduction to internet, intranet and Extranet . Myths about internet  Introduction to internet, intranet and Extranet . Myths about internet
Introduction to internet, intranet and Extranet . Myths about internet
 
Cb12e basic ppt ch15
Cb12e basic ppt ch15Cb12e basic ppt ch15
Cb12e basic ppt ch15
 
202160902-Internet-Intranet-Extranet.ppt
202160902-Internet-Intranet-Extranet.ppt202160902-Internet-Intranet-Extranet.ppt
202160902-Internet-Intranet-Extranet.ppt
 
computer network technology in modern universe.
computer network technology in modern universe.        computer network technology in modern universe.
computer network technology in modern universe.
 
Computer network introduction
Computer network introductionComputer network introduction
Computer network introduction
 
When Worlds Collide: Ethics and Technology for Lawyers
When Worlds Collide: Ethics and Technology for LawyersWhen Worlds Collide: Ethics and Technology for Lawyers
When Worlds Collide: Ethics and Technology for Lawyers
 
iPads and other tablets for Legal Aid
iPads and other tablets for Legal AidiPads and other tablets for Legal Aid
iPads and other tablets for Legal Aid
 
Guard Era Security Overview Preso (Draft)
Guard Era Security Overview Preso (Draft)Guard Era Security Overview Preso (Draft)
Guard Era Security Overview Preso (Draft)
 
Network fundamentals
Network fundamentalsNetwork fundamentals
Network fundamentals
 
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
 
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
 
Software. intranet. e crime
Software. intranet. e crimeSoftware. intranet. e crime
Software. intranet. e crime
 
Web tehnology
Web tehnologyWeb tehnology
Web tehnology
 
Chapter 3 E Business
Chapter 3 E BusinessChapter 3 E Business
Chapter 3 E Business
 
Beekman5 std ppt_11
Beekman5 std ppt_11Beekman5 std ppt_11
Beekman5 std ppt_11
 
PC 106 Slide 1.pptx
PC 106 Slide 1.pptxPC 106 Slide 1.pptx
PC 106 Slide 1.pptx
 

Plus de Deborah Oronzio

Chapter 06 MKT120 B2B MKT
Chapter 06 MKT120 B2B MKTChapter 06 MKT120 B2B MKT
Chapter 06 MKT120 B2B MKTDeborah Oronzio
 
Chapter 17 MKT120 Advertising, PR & Sales
Chapter 17 MKT120 Advertising, PR & SalesChapter 17 MKT120 Advertising, PR & Sales
Chapter 17 MKT120 Advertising, PR & SalesDeborah Oronzio
 
Chapter 14 MKT120 Supply Chain Mgmt.
Chapter 14 MKT120 Supply Chain Mgmt.Chapter 14 MKT120 Supply Chain Mgmt.
Chapter 14 MKT120 Supply Chain Mgmt.Deborah Oronzio
 
Chapter 12 MKT120 Services
Chapter 12 MKT120 ServicesChapter 12 MKT120 Services
Chapter 12 MKT120 ServicesDeborah Oronzio
 
Chapter 11 MKT120 Product Development
Chapter 11 MKT120 Product DevelopmentChapter 11 MKT120 Product Development
Chapter 11 MKT120 Product DevelopmentDeborah Oronzio
 
Chapter 10 MKT120 Branding and Pkg
Chapter 10 MKT120 Branding and PkgChapter 10 MKT120 Branding and Pkg
Chapter 10 MKT120 Branding and PkgDeborah Oronzio
 
Chapter 09 MKT120 MKT Research
Chapter 09 MKT120 MKT ResearchChapter 09 MKT120 MKT Research
Chapter 09 MKT120 MKT ResearchDeborah Oronzio
 
Chapter 07 MKT120 Global MKT
Chapter 07 MKT120 Global MKTChapter 07 MKT120 Global MKT
Chapter 07 MKT120 Global MKTDeborah Oronzio
 
Chapter 05 MKT120 Consumer Behavior
Chapter 05 MKT120 Consumer BehaviorChapter 05 MKT120 Consumer Behavior
Chapter 05 MKT120 Consumer BehaviorDeborah Oronzio
 
Chapter 04 MKT120 Mkt Environment
Chapter 04 MKT120 Mkt EnvironmentChapter 04 MKT120 Mkt Environment
Chapter 04 MKT120 Mkt EnvironmentDeborah Oronzio
 
Chapter 03 MKT120 Ethics
Chapter 03 MKT120 EthicsChapter 03 MKT120 Ethics
Chapter 03 MKT120 EthicsDeborah Oronzio
 
Chapter 01 MKT120 Overview
Chapter 01 MKT120 OverviewChapter 01 MKT120 Overview
Chapter 01 MKT120 OverviewDeborah Oronzio
 

Plus de Deborah Oronzio (19)

Chapter 06 MKT120 B2B MKT
Chapter 06 MKT120 B2B MKTChapter 06 MKT120 B2B MKT
Chapter 06 MKT120 B2B MKT
 
Chapter 17 MKT120 Advertising, PR & Sales
Chapter 17 MKT120 Advertising, PR & SalesChapter 17 MKT120 Advertising, PR & Sales
Chapter 17 MKT120 Advertising, PR & Sales
 
Chapter 16 MKT120 IMC
Chapter 16 MKT120 IMCChapter 16 MKT120 IMC
Chapter 16 MKT120 IMC
 
Chapter 14 MKT120 Supply Chain Mgmt.
Chapter 14 MKT120 Supply Chain Mgmt.Chapter 14 MKT120 Supply Chain Mgmt.
Chapter 14 MKT120 Supply Chain Mgmt.
 
Chapter 12 MKT120 Services
Chapter 12 MKT120 ServicesChapter 12 MKT120 Services
Chapter 12 MKT120 Services
 
Chapter 11 MKT120 Product Development
Chapter 11 MKT120 Product DevelopmentChapter 11 MKT120 Product Development
Chapter 11 MKT120 Product Development
 
Chapter 10 MKT120 Branding and Pkg
Chapter 10 MKT120 Branding and PkgChapter 10 MKT120 Branding and Pkg
Chapter 10 MKT120 Branding and Pkg
 
Chapter 09 MKT120 MKT Research
Chapter 09 MKT120 MKT ResearchChapter 09 MKT120 MKT Research
Chapter 09 MKT120 MKT Research
 
Chapter 08 MKT120 STP
Chapter 08 MKT120 STPChapter 08 MKT120 STP
Chapter 08 MKT120 STP
 
Chapter 07 MKT120 Global MKT
Chapter 07 MKT120 Global MKTChapter 07 MKT120 Global MKT
Chapter 07 MKT120 Global MKT
 
Chapter 05 MKT120 Consumer Behavior
Chapter 05 MKT120 Consumer BehaviorChapter 05 MKT120 Consumer Behavior
Chapter 05 MKT120 Consumer Behavior
 
Chapter 04 MKT120 Mkt Environment
Chapter 04 MKT120 Mkt EnvironmentChapter 04 MKT120 Mkt Environment
Chapter 04 MKT120 Mkt Environment
 
Chapter 03 MKT120 Ethics
Chapter 03 MKT120 EthicsChapter 03 MKT120 Ethics
Chapter 03 MKT120 Ethics
 
Chapter 01 MKT120 Overview
Chapter 01 MKT120 OverviewChapter 01 MKT120 Overview
Chapter 01 MKT120 Overview
 
Chap010 BUS137
Chap010 BUS137Chap010 BUS137
Chap010 BUS137
 
Chap009 BUS137
Chap009 BUS137Chap009 BUS137
Chap009 BUS137
 
Chap003 BUS137
Chap003 BUS137Chap003 BUS137
Chap003 BUS137
 
Chap002 BUS137
Chap002 BUS137Chap002 BUS137
Chap002 BUS137
 
Personal Finance
Personal FinancePersonal Finance
Personal Finance
 

Dernier

Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 

Dernier (20)

Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 

Technology

  • 2.  IT is used as communication tool to:  Share information between staff, suppliers, and consumers.  1970’s Information Technology was know as DP.  Data VS. Information.  1980’s Business Tech (BT) introduced tools like atm’s and voicemail  Then after the 1980’s (BT) was know as (IT) information tech.  CIO helps businesses use tech for communication
  • 3.  Allows for online paying and ordering  How it changed the entertainment industry:  40 year ago you had to go to a movie theater  Allows for video ordering  Allows for downloading on computer, iPod, or cell phone  Broke time and location barrier  NASDAQ
  • 4.  Knowledge makes info useful  Business Intelligence – software applications that analyze an organization’s raw data  BI changes traditional flow of info:  Used to train workers  Provides insights
  • 5.  Business process information  Physical world Observation  Biological data  Public data  Data that indicates personal references or intention
  • 6.
  • 7.  Tips for organizing E-mail and electron files  Use your e-mail program’s organizing tools  Use consistent file names  Use online backup services  Use desktop search software
  • 8.  Data Warehouse:  Stores data on a single subject over time  Purpose is to get data out  Data Mining:  Looking for hidden patterns and relationships among data
  • 9.  The road to knowledge  Network of computer networks  Was a one to one communication tool  Now it is a one to many broadcast tool
  • 10.  Companywide network, closed to public access  Keeps unwanted sources out  Uses firewalls  Allows for interactive apps
  • 11.  Broader version of an Intranet  Allows for data sharing which encourages collaboration between companies  Good for:  Same information access  Processing orders  Invoices  payments
  • 12.  Secure system used with extranets  Reserved solely for the network  Issues with Dedicated lines:  Expensive  limit extranet use  Often too time consuming
  • 13.  Private data network  Creates secure connections or tunnels  Advantages of (VPNs):  Same capabilities as extranets  Cheaper than extranets  Allows for on-demand networking  Keeps corporate networks secure
  • 14.  Make information available in one place  Gives users access to their area of the intranet  Advantages:  Centralizes information  Serves as entry point  Allows access according to one’s role
  • 15.  Allows a continuous connect to the internet  Sends and receives:  Video  Voice  Data files
  • 16.  Runs 22000 times faster than today’s internet  Supports heavy duty apps  Key element  very-high-speed backbone network service vBNS  Helps remote medical specialists  Over 325 member universities
  • 17.  Social Networking  Inexpensive way to get exposure  Tools for collaboration between businesses and consumers  Web 2.0  Tools used to build social and business connection  Share information & collaborate on projects online  Examples  YouTube, Twitter, My space, facebook
  • 18.  Hardware includes:  computers  mobile phones  Printer  Scanners  fax’s  PDA’s  CUTTING THE CORD  Today most experts would agree that people are moving away from just using their PC’s to connect. Nowadays people are also using Iphones, netbooks, blackberry’s, etc.
  • 19.  Computer Networks:  Connect people to people and people to data  Allow companies & people to save time & money  Have drawbacks, maintaining a fleet of PC’s is expensive, also you lose productivity every time you update, troubleshoot, or train a new employee how to use it  Some companies are now looking for other options  One option is hybrid of mainframe & network computing
  • 20.  Thin client networks  Software changes & upgrades need to be made only on the server, so cost can be reduced by 20%  Rent software & hardware access  Virtualization & Cloud Computing  Process that allows networked computer to run multiple operating systems & programs through one central computer at the same time  Allows for virtualization but helps with limiting amount of data share  Often sold for a monthly fee
  • 21.  Turn Technology off when not in use  Buy programs like surveyor, which shut down computers in a office at the push of a button
  • 22.  Computer software tells the computer what to do  Shareware  Copyrighted  Distributed free of charge but user usually sends a fee to he developer if the program meets their needs  Public Domain Software  Free for the taking without any fees  Business people use software for writing  Word processors  Spread sheets  Filing and retrieving data  graphics
  • 23.  Human Resource Issues  Telecommuting has many different advantages:  The company can save resources  Easy of use for the employee  Often increases productivity  Great for parents that have children or people with disabilities  Disadvantages:  Less personal contact and confrontation  Don’t know when to turn off work  Sometimes part time alternative
  • 24.  Nanobots  People who are given the freedom to meet the organization’s goals on their own time and schedule  Often given a project with a certain budget and time deadline, and are left alone to take the task on  Biggest difficulty is finding the right person for the job
  • 25.  Security Issues  Viruses  Pieces of programming code inserted into other programming that usually lies dormant until triggered to cause some unexpected event  Antivirus protection is essential  Phishing  Scammers often embellish an e-mail message with a stolen logo for a well-recognized brand such as eBay, PayPal, or Citibank  Scammers use phrases such as “Account Activation Required”, or “Your account will be cancelled if you do not verify”  When the user clicks on it, the scammer can steal personal and private information
  • 26.  Other threats include:  Copyright laws being violated  Sexual and racial harassment  Cyber terrorism  Terrorist hackers could shut down the entire communications, money supply, electricity, and transportation systems  In 2002 there was a powerful electronic attack that crippled 9 of the 13 computers that manage internet traffic globally
  • 27.  Privacy Issues  Many company managers scan employee e-mail regularly (it is legal)  Hackers can trap and read your email  Makes easier to do unnecessary snooping  Cookies:  Pieces of information that the browser sends back to the server whenever you return to that web site  Tracks your movement  Spyware can be installed on your computer without your knowledge
  • 28.  Stability Issues  Being error free  Hershey company’s $115 million dollar new computer system disrupted shipments one Halloween and caused a 12% deficit that quarter  Combination of human error, computer error, malfunctioning software, and an overly complex marriage of software, hardware, and networking equipment  Management must face all of these challenges within the company in order to maintain a strong, growing company