Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.


  • Login to see the comments

  • Be the first to like this


  1. 1. David WilsonAngela DevenneyBrittany Matheny Brien Mccoy
  2. 2.  IT is used as communication tool to:  Share information between staff, suppliers, and consumers. 1970’s Information Technology was know as DP. Data VS. Information. 1980’s Business Tech (BT) introduced tools like atm’s and voicemail Then after the 1980’s (BT) was know as (IT) information tech. CIO helps businesses use tech for communication
  3. 3.  Allows for online paying and ordering How it changed the entertainment industry:  40 year ago you had to go to a movie theater  Allows for video ordering  Allows for downloading on computer, iPod, or cell phone Broke time and location barrier  NASDAQ
  4. 4.  Knowledge makes info useful Business Intelligence – software applications that analyze an organization’s raw data BI changes traditional flow of info:  Used to train workers  Provides insights
  5. 5.  Business process information Physical world Observation Biological data Public data Data that indicates personal references or intention
  6. 6.  Tips for organizing E-mail and electron files  Use your e-mail program’s organizing tools  Use consistent file names  Use online backup services  Use desktop search software
  7. 7.  Data Warehouse:  Stores data on a single subject over time  Purpose is to get data out Data Mining:  Looking for hidden patterns and relationships among data
  8. 8.  The road to knowledge Network of computer networks Was a one to one communication tool Now it is a one to many broadcast tool
  9. 9.  Companywide network, closed to public access Keeps unwanted sources out Uses firewalls Allows for interactive apps
  10. 10.  Broader version of an Intranet Allows for data sharing which encourages collaboration between companies Good for:  Same information access  Processing orders  Invoices  payments
  11. 11.  Secure system used with extranets Reserved solely for the network Issues with Dedicated lines:  Expensive  limit extranet use  Often too time consuming
  12. 12.  Private data network Creates secure connections or tunnels Advantages of (VPNs):  Same capabilities as extranets  Cheaper than extranets  Allows for on-demand networking  Keeps corporate networks secure
  13. 13.  Make information available in one place Gives users access to their area of the intranet Advantages:  Centralizes information  Serves as entry point  Allows access according to one’s role
  14. 14.  Allows a continuous connect to the internet Sends and receives:  Video  Voice  Data files
  15. 15.  Runs 22000 times faster than today’s internet Supports heavy duty apps Key element  very-high-speed backbone network service vBNS Helps remote medical specialists Over 325 member universities
  16. 16.  Social Networking  Inexpensive way to get exposure  Tools for collaboration between businesses and consumers Web 2.0  Tools used to build social and business connection  Share information & collaborate on projects online Examples  YouTube, Twitter, My space, facebook
  17. 17.  Hardware includes:  computers  mobile phones  Printer  Scanners  fax’s  PDA’s CUTTING THE CORD  Today most experts would agree that people are moving away from just using their PC’s to connect. Nowadays people are also using Iphones, netbooks, blackberry’s, etc.
  18. 18.  Computer Networks:  Connect people to people and people to data  Allow companies & people to save time & money  Have drawbacks, maintaining a fleet of PC’s is expensive, also you lose productivity every time you update, troubleshoot, or train a new employee how to use it  Some companies are now looking for other options  One option is hybrid of mainframe & network computing
  19. 19.  Thin client networks  Software changes & upgrades need to be made only on the server, so cost can be reduced by 20%  Rent software & hardware access Virtualization & Cloud Computing  Process that allows networked computer to run multiple operating systems & programs through one central computer at the same time  Allows for virtualization but helps with limiting amount of data share  Often sold for a monthly fee
  20. 20.  Turn Technology off when not in use Buy programs like surveyor, which shut down computers in a office at the push of a button
  21. 21.  Computer software tells the computer what to do Shareware  Copyrighted  Distributed free of charge but user usually sends a fee to he developer if the program meets their needs Public Domain Software  Free for the taking without any fees Business people use software for writing  Word processors  Spread sheets  Filing and retrieving data  graphics
  22. 22.  Human Resource Issues  Telecommuting has many different advantages:  The company can save resources  Easy of use for the employee  Often increases productivity  Great for parents that have children or people with disabilities  Disadvantages:  Less personal contact and confrontation  Don’t know when to turn off work  Sometimes part time alternative
  23. 23.  Nanobots  People who are given the freedom to meet the organization’s goals on their own time and schedule  Often given a project with a certain budget and time deadline, and are left alone to take the task on  Biggest difficulty is finding the right person for the job
  24. 24.  Security Issues  Viruses  Pieces of programming code inserted into other programming that usually lies dormant until triggered to cause some unexpected event  Antivirus protection is essential  Phishing  Scammers often embellish an e-mail message with a stolen logo for a well-recognized brand such as eBay, PayPal, or Citibank  Scammers use phrases such as “Account Activation Required”, or “Your account will be cancelled if you do not verify”  When the user clicks on it, the scammer can steal personal and private information
  25. 25.  Other threats include:  Copyright laws being violated  Sexual and racial harassment  Cyber terrorism  Terrorist hackers could shut down the entire communications, money supply, electricity, and transportation systems  In 2002 there was a powerful electronic attack that crippled 9 of the 13 computers that manage internet traffic globally
  26. 26.  Privacy Issues  Many company managers scan employee e-mail regularly (it is legal)  Hackers can trap and read your email  Makes easier to do unnecessary snooping  Cookies:  Pieces of information that the browser sends back to the server whenever you return to that web site  Tracks your movement  Spyware can be installed on your computer without your knowledge
  27. 27.  Stability Issues  Being error free  Hershey company’s $115 million dollar new computer system disrupted shipments one Halloween and caused a 12% deficit that quarter  Combination of human error, computer error, malfunctioning software, and an overly complex marriage of software, hardware, and networking equipment Management must face all of these challenges within the company in order to maintain a strong, growing company