Successfully reported this slideshow.
Your SlideShare is downloading. ×

Topic 12 Miscellaneous Concepts in IT.pptx

Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Loading in …3
×

Check these out next

1 of 20 Ad

More Related Content

Similar to Topic 12 Miscellaneous Concepts in IT.pptx (20)

More from CallplanetsDeveloper (20)

Advertisement

Recently uploaded (20)

Topic 12 Miscellaneous Concepts in IT.pptx

  1. 1. Topics 1. Market Basket Analysis 2. Global Information Systems 3. Prototyping 4. Change Management 5. Optimization 6. Competitive Advantages in Business 7. Change Management 8. Electronic Data Interchange 9. BPM 10. Cyber Security
  2. 2. What is meant by Market Basket Analysis? Market basket analysis is a data mining technique used by retailers to increase sales by better understanding customer purchasing patterns. It involves analyzing large data sets, such as purchase history, to reveal product groupings, as well as products that are likely to be purchased together.
  3. 3. Why market basket analysis? Retailers use analytics methods like market basket analysis (MBA) to comprehend the purchasing patterns of their customers. It is used to find out which products customers usually buy together or put in the same basket. This purchasing data is used to increase the efficiency of sales and marketing.
  4. 4. Global Information Systems What are global information systems used for? A global information system (GIS) is an information system which is developed and / or used in a global context. A global information system (GIS) is any information system which attempts to deliver the totality of measurable data worldwide within a defined context. Some examples of GIS are SAP, The Global Learning Objects Brokered Exchange and other systems.
  5. 5. Key components of a global information system A working GIS integrates five key components: hardware, software, data, people, and methods. Hardware is the computer on which a GIS operates. Today, GIS software runs on a wide range of hardware types, from centralized computer servers to desktop computers used in stand-alone or networked configurations.
  6. 6. Prototyping Prototyping is an experimental process where design teams implement ideas into tangible forms from paper to digital. Teams build prototypes of varying degrees of fidelity to capture design concepts and test on users. With prototypes, you can refine and validate your designs so your brand can release the right products. Some of the examples of prototypes are wireframes, slides, landing pages, working models, an interactive frontend, and videos.
  7. 7. types of prototyping The 4 types of project prototyping are feasibility prototypes, low-fidelity user prototypes, high-fidelity user prototypes and live-data prototypes.
  8. 8. Benefits of prototyping Estimation of production costs, manufacturing time and material requirements. Select machinery required for production. Testing to determine fit and durability. Receive feedback from customers and end users. Advantages of using Prototype Model : • This model is flexible in design. • It is easy to detect errors. • We can find missing functionality easily. • There is scope of refinement, it means new requirements can be easily accommodated. • It can be reused by the developer for more complicated projects in the future.
  9. 9. Change Management Change management is a systematic approach to dealing with the transition or transformation of an organization's goals, processes or technologies. The purpose of change management is to implement strategies for effecting change, controlling change and helping people to adapt to change.
  10. 10. 5 key elements of change management • Prepare the Organization for Change. • Craft a Vision and Plan for Change. • Implement the Changes. • Embed Changes Within Company Culture and Practices. • Review Progress and Analyze Results.
  11. 11. Optimization Optimization analysis is a process through which a firm estimates or determines the output level and maximizes its total profits. There are basically two approaches followed for optimization − Total revenue and total cost approach. Marginal revenue and Marginal cost approach.
  12. 12. Types of Optimization We can distinguish between two different types of optimization methods: Exact optimization methods that guarantee finding an optimal solution and heuristic optimization methods where we have no guarantee that an optimal solution is found.
  13. 13. Competitive Advantage in Business A competitive advantage is anything that gives a company an edge over its competitors, helping it attract more customers and grow its market share. A competitive advantage can take three primary forms: Cost advantage– producing a product or providing a service at a lower cost than competitors.
  14. 14. Sources of Competitive Advantage • Product Attribute Differentiation. One way to gain an advantage over competitors is by differentiating your product from theirs. • Customers' Willingness to Pay. • Price Discrimination. • Bundled Pricing. • Human Capital.
  15. 15. Electronic Data Interchange Electronic Data Interchange (EDI) is the computer-to-computer exchange of business documents in a standard electronic format between business partners. Electronic Data Interchange (EDI) is the electronic interchange of business information using a standardized format; a process which allows one company to send information to another company electronically rather than with paper. Business entities conducting business electronically are called trading partners. Examples of EDI include Purchase orders, invoices, shipping statuses, payment information, and so on.
  16. 16. Components of EDI The 4 major components of EDI are: standard document format, translation and mapping, preferred communication method and communication network to send and receive documents.
  17. 17. BPM Lifecycle The BPM lifecycle standardizes the process of implementing and managing business processes inside an organization as a series of cyclical stages. It consists of five phases including design, model, execute, monitor, and optimize.
  18. 18. Steps of BPM Business Process Management (BPM) is a way to improve and standardize processes in an organization. BPM Lifecycle: The 5 Steps in Business Process Management Step 1: Design. Step 2: Model. Step 3: Execute. Step 4: Monitor. Step 5: Optimize.
  19. 19. Bank cyber security Cyber security refers to the organization of technologies, procedures, and methods designed to prevent networks, devices, programs, and data from attack, damage, malware, viruses, hacking, data thefts or unauthorized access.
  20. 20. Why is cyber security important in banking? Protecting the user's assets is the primary goal of cybersecurity in banking. As more people become cashless, additional acts or transactions go online. People conduct transactions using digital payment methods like debit and credit cards, which must be protected by cybersecurity. Cybersecurity can be categorized into five distinct types: • Critical infrastructure security. • Application security. • Network security. • Cloud security. • Internet of Things (IoT) security.

×