Transcript Devil’s CanyonCMGT582 v8Page 2 of 2Transcript.docxjuliennehar
Transcript: Devil’s Canyon
CMGT/582 v8
Page 2 of 2
Transcript: Devil’s Canyon – A Role-Playing Simulation on Designing the Enterprise Architecture for a Mountain Resort by Patricia Wallace
In this simulation, the learner will understand how to design an enterprise architecture for a Mountain Resort by using the interactive map tools and get a sense of their vision and estimate their expenses.
The simulation will allow the learner to interact with the decision-makers of the enterprise through the following tools: Email, Voicemail, Instant message, Architecture Designer, and Web meeting.
Upon logging in to the application, the learner will have access to the following tools: Email, Voicemail and the documents. These are seen on the home screen of the application.Interaction 1:
The learner will be using various means of interaction in the simulation, which shall be divided into stages as the interaction proceeds.
Email:
Once the learner clicks on the email icon, he/she will be able to see three emails, two are replies to the email sent by Ed, one from Se Jong and the other reply is from Ariane.
The subject of the email from Ed is “Devil’s Canyon ICT”. In the email Dan says that the maps of the resort are ready for the development, he wants to be sure that everything is right before investing on the computers, networks, and software. He plans on having all the cables underground so that people have wireless access throughout the resort. He warns about the storms during which the internet would be down. He says that electricity will not be an issue, as they have their own generators which would make a small data center feasible for them.
Ed informs that he has placed the cost estimates made for the software, data center construction, servers, training, maintenance and other things in the document folder to work out a budget. The budget needs to be around $750K for a year, which should include all the startup costs. He wishes for the costs to be around $1.2 million for three years.
After reading the mail from Ed, the learner then closes the mail and goes to read the reply made by Se Jong to Ed’s email.
Se Jong goes on to say that she has added a map of the resort to the folder and is working on the installation of the Architecture designer software for the user. She says that since they do not have a legacy software to fall upon, it would be of advantage to choose a software that would be suitable for the resort. She wants a thought on the cloud computing and software as a service and thinks of using it, as it would mean that there would be no requirement for the data center. She goes on to say that if they go in as an infrastructure-as-a-service they would not have the need to buy bigger hard drives.
After reading the mail from Se Jong, the learner then closes the mail and goes on to read the reply made by Ariane to Ed’s mail.
Ariane says that she has been thinking about the hardware side. And asks for opinions regarding the usage of optical sca ...
Transcript Devil’s CanyonCMGT582 v8Page 2 of 2Transcri.docxjuliennehar
Transcript: Devil’s Canyon
CMGT/582 v8
Page 2 of 2
Transcript: Devil’s Canyon – A Role-Playing Simulation on Designing the Enterprise Architecture for a Mountain Resort by Patricia Wallace
In this simulation, the learner will understand how to design an enterprise architecture for a Mountain Resort by using the interactive map tools and get a sense of their vision and estimate their expenses.
The simulation will allow the learner to interact with the decision-makers of the enterprise through the following tools: Email, Voicemail, Instant message, Architecture Designer, and Web meeting.
Upon logging in to the application, the learner will have access to the following tools: Email, Voicemail and the documents. These are seen on the home screen of the application.Interaction 1:
The learner will be using various means of interaction in the simulation, which shall be divided into stages as the interaction proceeds.
Email:
Once the learner clicks on the email icon, he/she will be able to see three emails, two are replies to the email sent by Ed, one from Se Jong and the other reply is from Ariane.
The subject of the email from Ed is “Devil’s Canyon ICT”. In the email Dan says that the maps of the resort are ready for the development, he wants to be sure that everything is right before investing on the computers, networks, and software. He plans on having all the cables underground so that people have wireless access throughout the resort. He warns about the storms during which the internet would be down. He says that electricity will not be an issue, as they have their own generators which would make a small data center feasible for them.
Ed informs that he has placed the cost estimates made for the software, data center construction, servers, training, maintenance and other things in the document folder to work out a budget. The budget needs to be around $750K for a year, which should include all the startup costs. He wishes for the costs to be around $1.2 million for three years.
After reading the mail from Ed, the learner then closes the mail and goes to read the reply made by Se Jong to Ed’s email.
Se Jong goes on to say that she has added a map of the resort to the folder and is working on the installation of the Architecture designer software for the user. She says that since they do not have a legacy software to fall upon, it would be of advantage to choose a software that would be suitable for the resort. She wants a thought on the cloud computing and software as a service and thinks of using it, as it would mean that there would be no requirement for the data center. She goes on to say that if they go in as an infrastructure-as-a-service they would not have the need to buy bigger hard drives.
After reading the mail from Se Jong, the learner then closes the mail and goes on to read the reply made by Ariane to Ed’s mail.
Ariane says that she has been thinking about the hardware side. And asks for opinions regarding the usage of optical sc ...
We’re living in the Enterprise 2.0 era and there’s no place for old communication and collaboration tools like email in our lives. Right? Then why does email continue to be the collaboration backbone for over 80% of organizations all over the world? We can hate emails, but we have to face the fact that today email is still the most frequently used tool for business people. Should Enterprise 2.0 fight email? Or is there a possibility to leverage its advantages and popularity? The presentation offers a possible solution for this dilemma.
Facebook News Feed Algorithm: Facebook User AwarenessJakub Ruzicka
Facebook News Feed Algorithm / Facebook User Awareness / Pilot Research
Majority of Facebook users is not aware of the Facebook EdgeRank / News Feed Algorithm (excluding social media managers/specialists).
Facebook users are rather aware of the influence of their their ‘affirmative‘ actions (liking, sharing, commenting befriending, following, subscribing) than the influence of their ‘private‘ interactions with other users (messages, chatting), their ‘private‘ actions (adjusting privacy settings, creating & editing friends lists, sorting Facebook posts) and/or of their ‘negative‘ actions (hiding, reporting & blocking something).
Majority of Facebook users have used at least half of the features affecting their News Feed content shown but more than half of the Facebook users seem to be rather ‘passive‘ consumers of the News Feed content shown (not adjusting it in any way even though they seem to know about some ways of how to do it).
In general, more than half of the users have never reported or blocked anything on Facebook.
People rather subscribe to notifications from a page than from a person.
Majority of Facebook users know about the interest and/or friend list feature but only about 1/3 of them actually use it.
There are still some users (even among University students) who have never adjusted their privacy settings.
Transcript Devil’s CanyonCMGT582 v8Page 2 of 2Transcript.docxjuliennehar
Transcript: Devil’s Canyon
CMGT/582 v8
Page 2 of 2
Transcript: Devil’s Canyon – A Role-Playing Simulation on Designing the Enterprise Architecture for a Mountain Resort by Patricia Wallace
In this simulation, the learner will understand how to design an enterprise architecture for a Mountain Resort by using the interactive map tools and get a sense of their vision and estimate their expenses.
The simulation will allow the learner to interact with the decision-makers of the enterprise through the following tools: Email, Voicemail, Instant message, Architecture Designer, and Web meeting.
Upon logging in to the application, the learner will have access to the following tools: Email, Voicemail and the documents. These are seen on the home screen of the application.Interaction 1:
The learner will be using various means of interaction in the simulation, which shall be divided into stages as the interaction proceeds.
Email:
Once the learner clicks on the email icon, he/she will be able to see three emails, two are replies to the email sent by Ed, one from Se Jong and the other reply is from Ariane.
The subject of the email from Ed is “Devil’s Canyon ICT”. In the email Dan says that the maps of the resort are ready for the development, he wants to be sure that everything is right before investing on the computers, networks, and software. He plans on having all the cables underground so that people have wireless access throughout the resort. He warns about the storms during which the internet would be down. He says that electricity will not be an issue, as they have their own generators which would make a small data center feasible for them.
Ed informs that he has placed the cost estimates made for the software, data center construction, servers, training, maintenance and other things in the document folder to work out a budget. The budget needs to be around $750K for a year, which should include all the startup costs. He wishes for the costs to be around $1.2 million for three years.
After reading the mail from Ed, the learner then closes the mail and goes to read the reply made by Se Jong to Ed’s email.
Se Jong goes on to say that she has added a map of the resort to the folder and is working on the installation of the Architecture designer software for the user. She says that since they do not have a legacy software to fall upon, it would be of advantage to choose a software that would be suitable for the resort. She wants a thought on the cloud computing and software as a service and thinks of using it, as it would mean that there would be no requirement for the data center. She goes on to say that if they go in as an infrastructure-as-a-service they would not have the need to buy bigger hard drives.
After reading the mail from Se Jong, the learner then closes the mail and goes on to read the reply made by Ariane to Ed’s mail.
Ariane says that she has been thinking about the hardware side. And asks for opinions regarding the usage of optical sca ...
Transcript Devil’s CanyonCMGT582 v8Page 2 of 2Transcri.docxjuliennehar
Transcript: Devil’s Canyon
CMGT/582 v8
Page 2 of 2
Transcript: Devil’s Canyon – A Role-Playing Simulation on Designing the Enterprise Architecture for a Mountain Resort by Patricia Wallace
In this simulation, the learner will understand how to design an enterprise architecture for a Mountain Resort by using the interactive map tools and get a sense of their vision and estimate their expenses.
The simulation will allow the learner to interact with the decision-makers of the enterprise through the following tools: Email, Voicemail, Instant message, Architecture Designer, and Web meeting.
Upon logging in to the application, the learner will have access to the following tools: Email, Voicemail and the documents. These are seen on the home screen of the application.Interaction 1:
The learner will be using various means of interaction in the simulation, which shall be divided into stages as the interaction proceeds.
Email:
Once the learner clicks on the email icon, he/she will be able to see three emails, two are replies to the email sent by Ed, one from Se Jong and the other reply is from Ariane.
The subject of the email from Ed is “Devil’s Canyon ICT”. In the email Dan says that the maps of the resort are ready for the development, he wants to be sure that everything is right before investing on the computers, networks, and software. He plans on having all the cables underground so that people have wireless access throughout the resort. He warns about the storms during which the internet would be down. He says that electricity will not be an issue, as they have their own generators which would make a small data center feasible for them.
Ed informs that he has placed the cost estimates made for the software, data center construction, servers, training, maintenance and other things in the document folder to work out a budget. The budget needs to be around $750K for a year, which should include all the startup costs. He wishes for the costs to be around $1.2 million for three years.
After reading the mail from Ed, the learner then closes the mail and goes to read the reply made by Se Jong to Ed’s email.
Se Jong goes on to say that she has added a map of the resort to the folder and is working on the installation of the Architecture designer software for the user. She says that since they do not have a legacy software to fall upon, it would be of advantage to choose a software that would be suitable for the resort. She wants a thought on the cloud computing and software as a service and thinks of using it, as it would mean that there would be no requirement for the data center. She goes on to say that if they go in as an infrastructure-as-a-service they would not have the need to buy bigger hard drives.
After reading the mail from Se Jong, the learner then closes the mail and goes on to read the reply made by Ariane to Ed’s mail.
Ariane says that she has been thinking about the hardware side. And asks for opinions regarding the usage of optical sc ...
We’re living in the Enterprise 2.0 era and there’s no place for old communication and collaboration tools like email in our lives. Right? Then why does email continue to be the collaboration backbone for over 80% of organizations all over the world? We can hate emails, but we have to face the fact that today email is still the most frequently used tool for business people. Should Enterprise 2.0 fight email? Or is there a possibility to leverage its advantages and popularity? The presentation offers a possible solution for this dilemma.
Facebook News Feed Algorithm: Facebook User AwarenessJakub Ruzicka
Facebook News Feed Algorithm / Facebook User Awareness / Pilot Research
Majority of Facebook users is not aware of the Facebook EdgeRank / News Feed Algorithm (excluding social media managers/specialists).
Facebook users are rather aware of the influence of their their ‘affirmative‘ actions (liking, sharing, commenting befriending, following, subscribing) than the influence of their ‘private‘ interactions with other users (messages, chatting), their ‘private‘ actions (adjusting privacy settings, creating & editing friends lists, sorting Facebook posts) and/or of their ‘negative‘ actions (hiding, reporting & blocking something).
Majority of Facebook users have used at least half of the features affecting their News Feed content shown but more than half of the Facebook users seem to be rather ‘passive‘ consumers of the News Feed content shown (not adjusting it in any way even though they seem to know about some ways of how to do it).
In general, more than half of the users have never reported or blocked anything on Facebook.
People rather subscribe to notifications from a page than from a person.
Majority of Facebook users know about the interest and/or friend list feature but only about 1/3 of them actually use it.
There are still some users (even among University students) who have never adjusted their privacy settings.
This deck provides concise User Experience strategies for designing effective emails for mobile and different screen widths. With growing number of mobile devices and the shift to mobile e-commerce, its more than necessary to optimize emails for mobile devices.
I take a look at designing a modular template system. This is simply a group of reusable modules and email patterns, that can be combined together in various ways to generate different templates. Although not a new approach, I've seen a surge of interest in the last few years as everyone grapples with mobile redesigns.
The featured examples vary in scope and industry. Adorama started with just ten modules and have gone onto expand it, whereas Monster’s latest is 35. They also had different design challenges, which I go through along with our process, user testing and internal management.
Click the 'Notes' tab below right, to view the video transcript for each slide. The video shows the live templates and gives a bit more context than the deck. You can watch it here: http://bit.ly/1zumjAd
Consumer mobility is ever changing. As an email marketer, you’re responsible for making design decisions that affect your subscribers’ ability to use and experience your emails. This webinar deck will help you get started, by sharing the top 5 things you need to remember for designing for mobile devices. It also includes an overview of our new mobile optimized templates, developed to help guide you through your mobile design journey.
Rule based messege filtering and blacklist management for online social networkeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Chapter A – From the chapter reading, we learned that e-mail i.docxspoonerneddy
Chapter A
– From the chapter reading, we learned that e-mail is a major area of focus for information governance (IG) efforts, and has become the most common business software application and the backbone of business communications today. In addition, the authors provided details to support their position by providing 2013 survey results from 2,400 corporate e-mail users from a global perspective. The results indicated that two-thirds of the respondents stated that e-mail was their favorite form of business communication which surpassed not only social media but also telephone and in-person contact.
Q1: With this detail in mind,
briefly
state why the e-Mail has become a critical component for IG implementation?
Chapter B
– According to Franks and Smallwood (2013), information has become the lifeblood of every business organization, and that an increasing volume of information today has increased and exchanged through the use of social networks and Web2.0 tools like blogs, microblogs, and wikis. When looking at social media in the enterprise, there is a notable difference in functionality between e-mail and social media, and has been documented by research – “…that social media differ greatly from e-mail use due to its maturity and stability.” (Franks & Smallwood, 2013).
Q2: Please identify and clearly state what the difference is?
.
70% of Candidates Use Mobile Devices to Search for Jobs… Will They Find Yours?Talemetry
View the webinar recording: http://talemetry.com/resources/webinars/70-of-candidates-use-mobile-devices-to-search-for-jobs-will-they-find-yours/
Job seekers are leading the way when it comes to mobile adoption; a recent survey showed 70% of all candidates, including 65% of those already employed, reported using their mobile devices to search for job opportunities, citing convenience and availability as their most common reasons. Employers have struggled to adopt and execute mobile recruiting strategies. Browser incompatibility with recruiting software, difficulty capturing applicant information, and poor candidate experience are just a few of their challenges.
With Talemetry, employers can turn the ATS they already have into a mobile recruiting platform that candidates can really use, making recruiters more effective and efficient to decrease time-to-fill and cost-per-hire.
In this webinar, you will learn how Talemetry can help:
- Create mobile-friendly career sites with consistent brand environment and user experience across devices
- Enable applicants to apply for jobs directly from their mobile devices using their LinkedIn profiles, increasing applicant flow and improving talent pipeline
- Reach more candidates faster in real time
- Provide a scalable platform that integrates with your enterprise applicant tracking system
website: www.talemetry.com
blog: www.talemetrytoday.com
This deck provides concise User Experience strategies for designing effective emails for mobile and different screen widths. With growing number of mobile devices and the shift to mobile e-commerce, its more than necessary to optimize emails for mobile devices.
I take a look at designing a modular template system. This is simply a group of reusable modules and email patterns, that can be combined together in various ways to generate different templates. Although not a new approach, I've seen a surge of interest in the last few years as everyone grapples with mobile redesigns.
The featured examples vary in scope and industry. Adorama started with just ten modules and have gone onto expand it, whereas Monster’s latest is 35. They also had different design challenges, which I go through along with our process, user testing and internal management.
Click the 'Notes' tab below right, to view the video transcript for each slide. The video shows the live templates and gives a bit more context than the deck. You can watch it here: http://bit.ly/1zumjAd
Consumer mobility is ever changing. As an email marketer, you’re responsible for making design decisions that affect your subscribers’ ability to use and experience your emails. This webinar deck will help you get started, by sharing the top 5 things you need to remember for designing for mobile devices. It also includes an overview of our new mobile optimized templates, developed to help guide you through your mobile design journey.
Rule based messege filtering and blacklist management for online social networkeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Chapter A – From the chapter reading, we learned that e-mail i.docxspoonerneddy
Chapter A
– From the chapter reading, we learned that e-mail is a major area of focus for information governance (IG) efforts, and has become the most common business software application and the backbone of business communications today. In addition, the authors provided details to support their position by providing 2013 survey results from 2,400 corporate e-mail users from a global perspective. The results indicated that two-thirds of the respondents stated that e-mail was their favorite form of business communication which surpassed not only social media but also telephone and in-person contact.
Q1: With this detail in mind,
briefly
state why the e-Mail has become a critical component for IG implementation?
Chapter B
– According to Franks and Smallwood (2013), information has become the lifeblood of every business organization, and that an increasing volume of information today has increased and exchanged through the use of social networks and Web2.0 tools like blogs, microblogs, and wikis. When looking at social media in the enterprise, there is a notable difference in functionality between e-mail and social media, and has been documented by research – “…that social media differ greatly from e-mail use due to its maturity and stability.” (Franks & Smallwood, 2013).
Q2: Please identify and clearly state what the difference is?
.
70% of Candidates Use Mobile Devices to Search for Jobs… Will They Find Yours?Talemetry
View the webinar recording: http://talemetry.com/resources/webinars/70-of-candidates-use-mobile-devices-to-search-for-jobs-will-they-find-yours/
Job seekers are leading the way when it comes to mobile adoption; a recent survey showed 70% of all candidates, including 65% of those already employed, reported using their mobile devices to search for job opportunities, citing convenience and availability as their most common reasons. Employers have struggled to adopt and execute mobile recruiting strategies. Browser incompatibility with recruiting software, difficulty capturing applicant information, and poor candidate experience are just a few of their challenges.
With Talemetry, employers can turn the ATS they already have into a mobile recruiting platform that candidates can really use, making recruiters more effective and efficient to decrease time-to-fill and cost-per-hire.
In this webinar, you will learn how Talemetry can help:
- Create mobile-friendly career sites with consistent brand environment and user experience across devices
- Enable applicants to apply for jobs directly from their mobile devices using their LinkedIn profiles, increasing applicant flow and improving talent pipeline
- Reach more candidates faster in real time
- Provide a scalable platform that integrates with your enterprise applicant tracking system
website: www.talemetry.com
blog: www.talemetrytoday.com