SlideShare une entreprise Scribd logo
1  sur  17
ENTERPRISE 2.0
INFORMATION TECHNOLOGY
FOR BUSINESS
By:
Ugochukwu Ezeagwula
TREM Int’l Headquarters
Sunday 4th August, 2013
ENTERPRISE 2.0
OUTLINE
• Opening
• IT in Business Operations
• General Purpose Application Software
in Business Operations
• Case Study: Wave Accounting
• Marketing 2.0: Online Marketing
• Cyber Safety Tips
• Malicious Codes
• Avoid Inappropriate Materials
• Escaping a Mousetrap
• Social Media Privacy & Geo Location
Same Product. Times have changed.
Opening//
“Information technology and business are becoming
inextricably interwoven. I don't think anybody can
talk meaningfully about one without the talking
about the other.”
- Bill Gates
Opening//
IT in Business Operations//
Management, Accounting, Finance, Legal
Human Resource Management
Research & Development
Purchasing
Make
Product/
Service
Market
Product/
Service
Deliver
Product/
Service
Value
Add
Value Chain
Support
Activities
Primary
Activities
General Purpose Application Software
In Business Operations //
•Spreadsheet software allow manipulation of data
(figures) in rows and columns. Useful for charting
and graphing. Can also be used for basic database
functions. Example is Microsoft Excel
•Data management software supports the storage,
retrieval, and manipulation of data.
There are two basic types of data management
software:
- Simple filing programs e.g. Microsoft Access
- Database management systems (DBMSs)
e.g. Oracle
General Purpose Application Software
In Business Operations //
•Word processing software allows the user to
manipulate text, rather than just numbers,
e.g. Microsoft Word.
•Graphics software allows the user to create, store,
and display or print charts, graphs, maps, and
drawings. The three main types of graphic
software are;
- Presentation Graphics
- Analysis Graphics
- Engineering Graphics
General Purpose Application Software
In Business Operations //
•Multimedia Software
• Communications Software. To share, relate or
exchange information. e.g. Microsoft Outlook or
web email programs.
•Workgroup software, helps teams work together
by sharing information and by controlling
workflow within the group.
•Accounting Software such as
Quickbooks or Peachtree or SAGE
[Case Study: Wave Accounting]
General Purpose Application Software
In Business Operations //
•Enterprise Resource Planning software (ERP)
consists of programs that manage a company’s
vital operations, from order taking to manufacturing
to accounting, e.g. SAP Business One
•Customer Relationship Management (CRM)
Software
Chances of selling a product to an existing customer
far exceed those of selling to a new customer
Examples of CRM Software include:
- Microsoft Dynamics CRM (might be too big for SMEs)
- SalesForce
•A peep into the Google App Marketplace will
surprise you!
Case Study: Wave Accounting //
Marketing 2.0: Online Marketing//
• Websites
• SMS
• E-mail
• Web Adverts
• Social Media
Cyber Safety Tips//
Any
Malicious Codes//
Any software created
to cause damage,
Steal information, or
use up resources on a
computer or a
network.
• Viruses
• Worms
• Trojan Horses
• Spyware
Security Precaution
Turn on Firewall, update
OS &
Avoid Inappropriate Materials//
Apply caution in clicking on
• Advertisements
• Keyword Searches
• Typo Squatting
• E-mail Spam
• Phishing
• Steganography
Spam e-mails are harmful nuisance that can
lead
To identity theft.
To minimize identity theft, examine a
company’s
Privacy policy before shopping online. Look
out for the padlock sign or the HTTPS in the
URL.
Escaping a Mousetrap//
Never click “Ok” on popup windows
When mouse trapped. Instead, follow
The keyboard shortcuts:
• Ctrl+W or Apple+W = Close Active Window
• Alt+F4, Ctrl+Alt+Delete or Apple Q will close the
application
• On a Mac, Apple+Option+Esc will allow you to force
quit.
• Apple+period, should unfreeze your computer
Social Media Privacy & Geo Location//
Be sure that you do not compromise your
personal details such as you address,
telephone number and other personal
information on Social Networking Sites.
You don’t have to put up all your personal
details on your profile, but even if you do,
make sure privacy settings do not expose
such details to the public.
Also ensure your geo location feature on
Facebook and Twitter are always turned
off.
Thank You //
Ugochukwu Ezeagwula
Chief Imagination Officer
Identita Brand Concepts
Telephone:
+234 01 844 3816
+234 806 665 4702
E-mail
me@ugochukwuezeagwula.com
ugochukwu2001@yahoo.com
Website
www.ugochukwuezeagwula.com
www.identitanigeria.com
Facebook:
www.facebook.com/ugochukwuezeagwul
a
www.facebook.com/identitabrand
Twitter:
@ugosanchez

Contenu connexe

En vedette

En vedette (12)

Cloud Computing CIO Summit 2010
Cloud Computing CIO Summit 2010Cloud Computing CIO Summit 2010
Cloud Computing CIO Summit 2010
 
Enterprise business systems - Information technology
Enterprise business systems - Information technologyEnterprise business systems - Information technology
Enterprise business systems - Information technology
 
Robert Carey, Principal Deputy CIO, DOD Insight session
Robert Carey, Principal Deputy CIO, DOD Insight sessionRobert Carey, Principal Deputy CIO, DOD Insight session
Robert Carey, Principal Deputy CIO, DOD Insight session
 
The Internet And The Arts: How new technology affects old aesthetics
The Internet And The Arts: How new technology affects old aestheticsThe Internet And The Arts: How new technology affects old aesthetics
The Internet And The Arts: How new technology affects old aesthetics
 
Camanho & Consultore - CIO as a Service
Camanho & Consultore - CIO as a ServiceCamanho & Consultore - CIO as a Service
Camanho & Consultore - CIO as a Service
 
The CIO & CMO – Adversaries No More
The CIO & CMO – Adversaries No MoreThe CIO & CMO – Adversaries No More
The CIO & CMO – Adversaries No More
 
Ruby on Rails for beginners
Ruby on Rails for beginnersRuby on Rails for beginners
Ruby on Rails for beginners
 
CIO-CTO 90 day plan 2017
CIO-CTO 90 day plan 2017CIO-CTO 90 day plan 2017
CIO-CTO 90 day plan 2017
 
100 Most Social CIOs on Twitter 2015
100 Most Social CIOs on Twitter 2015100 Most Social CIOs on Twitter 2015
100 Most Social CIOs on Twitter 2015
 
100 Business Insights from Fortune 500, Startup CEOs, Venture Capitalists, an...
100 Business Insights from Fortune 500, Startup CEOs, Venture Capitalists, an...100 Business Insights from Fortune 500, Startup CEOs, Venture Capitalists, an...
100 Business Insights from Fortune 500, Startup CEOs, Venture Capitalists, an...
 
Learn 90% of Python in 90 Minutes
Learn 90% of Python in 90 MinutesLearn 90% of Python in 90 Minutes
Learn 90% of Python in 90 Minutes
 
Introduction to Python
Introduction to PythonIntroduction to Python
Introduction to Python
 

Similaire à Enterprise 2.0 information technology for business

A data-centric program
A data-centric program A data-centric program
A data-centric program
at MicroFocus Italy ❖✔
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdata
Online Business
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education Conferance
Tommy Riggins
 

Similaire à Enterprise 2.0 information technology for business (20)

A data-centric program
A data-centric program A data-centric program
A data-centric program
 
Everything You Need to Know About Enterprise IT in Three Slides
Everything You Need to Know About Enterprise IT in Three SlidesEverything You Need to Know About Enterprise IT in Three Slides
Everything You Need to Know About Enterprise IT in Three Slides
 
Shadow IT
Shadow ITShadow IT
Shadow IT
 
5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekko5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekko
 
Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.
 
Ten Top Tips on Keeping Your Business Secure
Ten Top Tips on Keeping Your Business SecureTen Top Tips on Keeping Your Business Secure
Ten Top Tips on Keeping Your Business Secure
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdata
 
Mobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementMobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk Management
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
 
Account Takeover: The Best Practices for Full Protection
Account Takeover: The Best Practices for Full ProtectionAccount Takeover: The Best Practices for Full Protection
Account Takeover: The Best Practices for Full Protection
 
Ten top tips on keeping your business secure
Ten top tips on keeping your business secureTen top tips on keeping your business secure
Ten top tips on keeping your business secure
 
INFRAGARD 2014: Back to basics security
INFRAGARD 2014: Back to basics securityINFRAGARD 2014: Back to basics security
INFRAGARD 2014: Back to basics security
 
5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...
 
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSIMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
 
Symantec Data Loss Prevention- From Adoption to Maturity
Symantec Data Loss Prevention- From Adoption to MaturitySymantec Data Loss Prevention- From Adoption to Maturity
Symantec Data Loss Prevention- From Adoption to Maturity
 
Corona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat ManagementCorona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat Management
 
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfJust-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education Conferance
 

Dernier

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Dernier (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 

Enterprise 2.0 information technology for business

  • 1. ENTERPRISE 2.0 INFORMATION TECHNOLOGY FOR BUSINESS By: Ugochukwu Ezeagwula TREM Int’l Headquarters Sunday 4th August, 2013
  • 2. ENTERPRISE 2.0 OUTLINE • Opening • IT in Business Operations • General Purpose Application Software in Business Operations • Case Study: Wave Accounting • Marketing 2.0: Online Marketing • Cyber Safety Tips • Malicious Codes • Avoid Inappropriate Materials • Escaping a Mousetrap • Social Media Privacy & Geo Location
  • 3. Same Product. Times have changed. Opening//
  • 4. “Information technology and business are becoming inextricably interwoven. I don't think anybody can talk meaningfully about one without the talking about the other.” - Bill Gates Opening//
  • 5. IT in Business Operations// Management, Accounting, Finance, Legal Human Resource Management Research & Development Purchasing Make Product/ Service Market Product/ Service Deliver Product/ Service Value Add Value Chain Support Activities Primary Activities
  • 6. General Purpose Application Software In Business Operations // •Spreadsheet software allow manipulation of data (figures) in rows and columns. Useful for charting and graphing. Can also be used for basic database functions. Example is Microsoft Excel •Data management software supports the storage, retrieval, and manipulation of data. There are two basic types of data management software: - Simple filing programs e.g. Microsoft Access - Database management systems (DBMSs) e.g. Oracle
  • 7. General Purpose Application Software In Business Operations // •Word processing software allows the user to manipulate text, rather than just numbers, e.g. Microsoft Word. •Graphics software allows the user to create, store, and display or print charts, graphs, maps, and drawings. The three main types of graphic software are; - Presentation Graphics - Analysis Graphics - Engineering Graphics
  • 8. General Purpose Application Software In Business Operations // •Multimedia Software • Communications Software. To share, relate or exchange information. e.g. Microsoft Outlook or web email programs. •Workgroup software, helps teams work together by sharing information and by controlling workflow within the group. •Accounting Software such as Quickbooks or Peachtree or SAGE [Case Study: Wave Accounting]
  • 9. General Purpose Application Software In Business Operations // •Enterprise Resource Planning software (ERP) consists of programs that manage a company’s vital operations, from order taking to manufacturing to accounting, e.g. SAP Business One •Customer Relationship Management (CRM) Software Chances of selling a product to an existing customer far exceed those of selling to a new customer Examples of CRM Software include: - Microsoft Dynamics CRM (might be too big for SMEs) - SalesForce •A peep into the Google App Marketplace will surprise you!
  • 10. Case Study: Wave Accounting //
  • 11. Marketing 2.0: Online Marketing// • Websites • SMS • E-mail • Web Adverts • Social Media
  • 13. Any Malicious Codes// Any software created to cause damage, Steal information, or use up resources on a computer or a network. • Viruses • Worms • Trojan Horses • Spyware Security Precaution Turn on Firewall, update OS &
  • 14. Avoid Inappropriate Materials// Apply caution in clicking on • Advertisements • Keyword Searches • Typo Squatting • E-mail Spam • Phishing • Steganography Spam e-mails are harmful nuisance that can lead To identity theft. To minimize identity theft, examine a company’s Privacy policy before shopping online. Look out for the padlock sign or the HTTPS in the URL.
  • 15. Escaping a Mousetrap// Never click “Ok” on popup windows When mouse trapped. Instead, follow The keyboard shortcuts: • Ctrl+W or Apple+W = Close Active Window • Alt+F4, Ctrl+Alt+Delete or Apple Q will close the application • On a Mac, Apple+Option+Esc will allow you to force quit. • Apple+period, should unfreeze your computer
  • 16. Social Media Privacy & Geo Location// Be sure that you do not compromise your personal details such as you address, telephone number and other personal information on Social Networking Sites. You don’t have to put up all your personal details on your profile, but even if you do, make sure privacy settings do not expose such details to the public. Also ensure your geo location feature on Facebook and Twitter are always turned off.
  • 17. Thank You // Ugochukwu Ezeagwula Chief Imagination Officer Identita Brand Concepts Telephone: +234 01 844 3816 +234 806 665 4702 E-mail me@ugochukwuezeagwula.com ugochukwu2001@yahoo.com Website www.ugochukwuezeagwula.com www.identitanigeria.com Facebook: www.facebook.com/ugochukwuezeagwul a www.facebook.com/identitabrand Twitter: @ugosanchez