Problem: Tough competition and demanding customers.
Solutions: Redesigned order and production processes reduce costs, increase revenue, and improve customer service.
Problem: Tough competition and demanding customers.
Solutions: Redesigned order and production processes reduce costs, increase revenue, and improve customer service.
At the business level of strategy, the key question is, "How can we compete effectively in this particular market?" The market might be light bulbs, utility vehicles, or cable television.
Jonathan ParsonsProf. Andrew Raleigh09102016External Env.docxchristiandean12115
Jonathan Parsons
Prof. Andrew Raleigh
09/10/2016
External Environment Analysis of Riverbed Technology Corporation
1
Introduction
External analysis entails evaluating the external environment under which an organization operates.
An external analysis enables the organizational management to determine its competiveness strength and weakness in the external environment.
Similarly, investors are able to determine if the organization is able to sustain the evolving trends in the market.
Thus, an external analysis of the Riverbed Technology Corporation has been demonstrated in the presentation.
The extent of the external environment in enabling the management of an organization to determine its ability to prevail in the environment it operates is due to its ability to reflect on the chances and threats it faces in the external environment (Hill & Jones, 2014). Consequently, the management is able to determine the strategies to undertake to capitalize on the opportunities and minimize the threats. Similarly, the investors gauge the ability of the organization to penetrate the market competition in enhancing their wealth through the external analysis (Hill & Jones, 2014). Consequently, an external analysis is a critical management tool.
2
Company Overview
Riverbed Technology Incorporation is an IT company that is located in America.
The company is involved in the development of WANs improvement products.
This means the firm produces products that are used in enhancing the performance of WANs called WAN optimization.
Thus, the firm operates under the information technology services industry.
Founded in 2002 May 23.
The current CEO is Jelly M. Kennelly since 2002
Its headquarter is located at San Francisco , California, United States.
Even though Riverbed Technology Corporation was initially publicly traded under sticker RVBD at NASDAQ, it was acquired in 2014 as a private equity. The firm is currently a private entity of the Thomas Bravo firm and the Ontario Teacher’s Pension Plan.
3
Industry Analysis
The information technology services industry is currently facing intense demand due to rapid technology advancement currently.
Similarly the need for efficient data processing is pushing the demand of the industry’s services significantly.
However, the profitability and competitiveness of industry players depend on innovativeness and technical efficiency.
The innovativeness prowess of a firm in the industry determines its competitiveness due to the need by different clients to customize their service application depending on their need.
Similarly, technical ability is essential since it determines the ability to meet the complex needs of the technology the client is demanding.
Thus a firm intending to enter the industry should focus on the two capability dimensions to penetrate the market.
The industry analysis involves evaluating the key factors determining the ability of the players to attract the customers. Accordingly, the.
This PDF details the things that make a company drive innovation by listing the nature and necessary ingredients on innovation for a capital rich to an entrepreneurial setup.
THE JAPANESE TRANSFORMER INDUSTRY A CASE STUDY OF ITS COMPETITIVENESSijcsit
Transformers are one type of magnetic component used in relevant structures like power Switch supplies. Transformers are the necessary parts in all products involving electricity, for the alteration of current voltage during the processes of power generation, transformation, transmission and distribution .Relevant discussions in Japan concerning transformers have centered on power industries and power systems. Transformers for household and business use are mostly categorized under electronics-related industry, one of the ten major consumer electronics industries (most of the mare middle and small-sized firms).Relevant literatures primarily focus on the study of related technology, with little attention paid to the competitive edge and future prospects of transformer-related industries. Case studies indicate that Japanese enterprises are disappointed with the governmental efforts and assistance directed to the improvement of existing technologies. As the executive director of one of the transformer associations in Japan pointed out, no advancement has been shown in this technology for nearly the last 20years.Most companies can improve themselves only in reaction to errors; the lack of specialized knowledge derived from research strongly decreases the industry's progressive power and postpones its development. Japan has lagged considerably behind Europe and the US in this aspect. The transformer companies in Japan will have great difficulty in cultural and language communication if they invest in foreign countries. In this study, experts and scholars in the fields of industry, government and academia are interviewed. Questionnaires are issued to the object companies and a comparative case study is conducted to analyze the influencing factors on the competitive edge and strategies in Japan in the hope that an effective reference for improving industrial competitiveness can be available for the government and the companies
installed manager seeking to develop an IS
strategy would ask:
Which process can we follow to develop an IS
strategy?
How can we ensure that the IS strategy supports the
business strategy?
What analysis tools are available to assess current
use of IS within the organisation and its environment
and formulate IS strategy?
Where should we locate the IS function and to what
extent should some services be outsourced?
Paper presented at the Second Congres International Des Etudes Somaliennes Pour Une Culture De La Paix En Somalie, 25-27 October 1995, Institut du Monde Arab, Paris.
Paper presented at the Second Congres International Des Etudes Somaliennes
Pour Une Culture De La Paix En Somalie, 25-27 October 1995, Institut du Monde Arab, Paris.
Important Managerial Questions:
What is strategy?
What is strategic advantage?
Information Systems as a strategic resource
How do we use Information Systems to achieve some form of strategic advantage over competitors?
Types of information systems?
Function of different types of system
Benefits of information systems
The characteristics of types of Information Systems
Also known as Critical Network Analysis
Developed by Dupont and Remington Rand in the late 1950s for managing plant maintenance projects
Uses one duration estimate for each activity
Provides basic framework for project planning and contro
The Meaning of Process
2.2 Software Process Models
2.3 Tools and Techniques for Process Modeling
2.4 Practical Process Modeling
2.5 Information System Example
2.6 What this Chapter Means for You
Somalis’ national consciousness is based on the shared heritage of Islam, belief in a common
ancestor, language and culture. This notion, which is also called unity, has
preserved Somali-speaking people for centuries.
European exploration opened the door to colonialism.
The opening of the Suez Canal in 1869 created a geopolitical situation which
increased the competition for control of the coast along the Red Sea and the Indian
Ocean among the European colonial powers.
Explain growth and importance of databases
Name limitations of conventional file processing
Identify five categories of databases
Explain advantages of databases
Identify costs and risks of databases
List components of database environment
Describe evolution of database systems
Understand how the database approach is Understand how the database approach is different and superior to earlier data systems different and superior to earlier data systems
Examine how information demand and Examine how information demand and technology explosion drive database systems technology explosion drive database systems
Trace the evolution of data systems and note Trace the evolution of data systems and note how we have arrive at the database approach how we have arrive at the database approach
Comprehend the benefits of database systems Comprehend the benefits of database systems and perceive the need for them and perceive the need for them
Survey briefly various data models, types of Survey briefly various data models, types of databases, and the database industry
The Federal Enterprise Architecture (FEA) is the latest attempt by the US federal government to unite its myriad agencies and functions under a single common and ubiquitous enterprise architecture.
TOGAF divides an enterprise architecture into four categories, as follows:
Business architecture—Describes the processes the business uses to meet its goals
Application architecture—Describes how specific applications are designed and how they interact with each other
Data architecture—Describes how the enterprise data stores are organized and accessed
Technical architecture—Describes the hardware and software infrastructure that supports applications and their interactions
System Development Life Cycle
Data, Function, Network, People, Time, Motivation What constitutes the “enterprise”?
Key enterprise architecture terms Enterprise Architecture Terms
How do you achieve perfect alignment?
Importance of alignment
Lack of Alignment
Nature of Complexity
Architectural Principles
Enterprise Architecture definition
System architecture
The Role of EA
Enterprise Frameworks:
Zachman Framework
The Open Group’s Architecture Framework (TOGAF)
The Foundation for Execution
Business architecture
Information architecture
Application architecture
Technology architecture
Implementation
Defining Innovation
Importance Of Innovation
Misconceptions
Types of Innovations
Information And Communications Technology
The Role of ICT
Rapid Evolution of ICT
Define e-commerce and describe how it differs
from e-business
Identify the unique features of e-commerce
technology and their business significance
Describe the major types of e-commerce
Understand the visions and forces behind the
E-Commerce I era
More from Taibah University, College of Computer Science & Engineering (20)
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
How to Create Map Views in the Odoo 17 ERPCeline George
The map views are useful for providing a geographical representation of data. They allow users to visualize and analyze the data in a more intuitive manner.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
How to Split Bills in the Odoo 17 POS ModuleCeline George
Bills have a main role in point of sale procedure. It will help to track sales, handling payments and giving receipts to customers. Bill splitting also has an important role in POS. For example, If some friends come together for dinner and if they want to divide the bill then it is possible by POS bill splitting. This slide will show how to split bills in odoo 17 POS.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Chapter 3 - Islamic Banking Products and Services.pptx
Lecture 4 (using information technology for competitive advantage)
1. 1
Using Information Technology
for Competitive Advantage
Lecture 4
Abdisalam Issa-Salwe
Department of Computer Science
Faculty of Information Science and Technology
East Africa University
2
Topic list
Porter’s five forces model
Value chain
EDI
Data warehousing
Data mining
Intelligent agents
Value added networks
East Africa University, Faculty of Information Science and Technology, Department of Computer Science
2. 2
Strategic Advantage and IT
Important Managerial Questions:
What is strategy?
What is strategic advantage?
Information Systems as a strategic
resource
How do we use Information Systems to
achieve some form of strategic advantage
over competitors?
East Africa University, Faculty of Information Science and Technology, Department of Computer Science
4
What is Strategy
Definition of strategy
Early 1990s definition:
“A well coordinated set of objectives, policies, and
plans aimed at securing a long-term competitive
advantage. A vision for the organization that is
implemented.”
Webster’s Dictionary
“a careful plan or method”
“the art of devising or employing plans toward a goal”
“the art and science of military command exercised to
meet the enemy in combat under advantageous
circumstances”
East Africa University, Faculty of Information Science and Technology, Department of Computer Science
3. 3
5
What is Strategy?
Strategy
Henry Mintzberg:
Explicitly planned: “Intended Strategy”
Realized: planned and succeed
Unrealized: planned but fail
Implicit, not explicitly planned yet executed:
“Emergent Strategy”
Planned
Strategy
Failed
Strategy
Emergent
Strategy
Executed
Strategy
East Africa University, Faculty of Information Science and Technology, Department of Computer Science
Strategic Advantage and IT
Evolution of Strategy Concepts
Competitive Strategy
Competitive Advantage
Sustainable Competitive Advantage
Temporary (Non-Sustainable)
Competitive Advantage
Strategic Advantage
Temporary Strategic Advantage
Strategy
Speeding Up
East Africa University, Faculty of Information Science and Technology, Department of Computer Science
4. 4
7
Strategic Advantage and IT
Evolution of Strategy Concepts
Three eras of approaches for achieving strategic advantage
Portfolio of Business (1970s)
performance a result of businesses you pick to be in
motivated by economies of scale
Portfolio of Capabilities (mid 1980s)
performance a result of internal processes and routines,
which provide distinctive capabilities
motivated by economies of scale and scope
Portfolio of Relationships (mid 1990s)
performance a result of building a wide array of relationships
with external companies that possess hard-to-imitate
capabilities
motivated by economies of scale, scope, and expertise
East Africa University, Faculty of Information Science and Technology, Department of Computer Science
Information Systems as a Strategic
Resource
Inwardly Strategic
focused on internal
processes
lower costs
increase employee
productivity
improve teamwork
enhance
communication
Outwardly Strategic
aimed at direct
competition
beat competitors
new services
new “knowledge”
that leads to new
services
Inwardly Strategic
focused on internal
processes
lower costs
increase employee
productivity
improve teamwork
enhance
communication
Outwardly Strategic
aimed at direct
competition
beat competitors
new services
new “knowledge”
that leads to new
services
East Africa University, Faculty of Information Science and Technology, Department of Computer Science
5. 5
IS as a Strategic Resource
Hayes and Wheelwright (1985) - operations
effectiveness, applies equally well to ISD effectiveness
Stage 1: Internally Neutral
not seen as a source of process improvement
technology
Minimize negative impact of functional area on
organization
Top management “in control”; tells dept. what to
do
Stage 2: Externally Neutral
not seen as a source of external competitive
advantage
East Africa University, Faculty of Information Science and Technology, Department of Computer Science
10
IS as a Strategic Resource (cont…)
Stage 3: Internally Supportive
source of internally focused competitive
advantages
Stage 4: Externally Supportive
viewed as competitive force in the
business
function drives issues of top-
management strategy making
East Africa University, Faculty of Information Science and Technology, Department of Computer Science
6. 6
IS as a Strategic Resource
Inter-Firm
Strategic
Focus
“Alliance”
Competitive Marketplace
Company A
Internally
Strategic
Company B
Externally
Strategic
Inter-Firm
Strategic
Focus
“Alliance”
Competitive Marketplace
Company A
Internally
Strategic
Company B
Externally
Strategic
Competitive Marketplace
Company A
Internally
Strategic
Company B
Externally
Strategic
East Africa University, Faculty of Information Science and Technology, Department of Computer Science
12
Porter’s five forces model
Professor Michael Porter of Harvard
University maintained that in every
industry, competition depends on the
collective strength of five basic forces
Interacting with these forces are the
generic corporate strategies.
IT can be a powerful agent to change the
balance of power in and between these
forces.
East Africa University, Faculty of Information Science and Technology, Department of Computer Science
7. 7
13
Porter’s five forces model (cont…)
Michael Porter has identified five forces
that are widely used to assess the
structure of any industry. Porter’s five
forces are the:
Bargaining power of suppliers,
Bargaining power of buyers,
Threat of new entrants,
Threat of substitutes, and
Rivalry among competitors.
East Africa University, Faculty of Information Science and Technology, Department of Computer Science
14East Africa University, Faculty of Information Science and Technology, Department of Computer Science
8. 8
15
Porter’s five forces model (cont…)
All organisations operate in one or more
industries.
By the nature of their participation in an
industry, they are affected by existing or
potential uses of information technology
East Africa University, Faculty of Information Science and Technology, Department of Computer Science
16
Porter’s five forces model (cont…)
New entrants can increase overall capacity in the industry,
thereby reducing prices and incumbents' cost advantages.
Market is cornered with product, but success may inspire others
to enter the business and challenge position.
The threat of new entrants is the possibility that new firms will
enter the industry.
New entrants bring a desire to gain market share and often have
significant resources. Their presence may force prices down and
put pressure on profits.
IT can help create or raise barriers to entry by increasing
mandatory investments in hardware and software, facilitating
control over databases, or locking in customers to existing
distribution channels.
There are many types of barriers to entry:
switching costs, economies of scale, high investment in IT,
economies of experience, access to distribution channels,
and government policy
East Africa University, Faculty of Information Science and Technology, Department of Computer Science
9. 9
17
Porter’s five forces model (cont…)
Intensity of industry rivalry depends on
factors beyond the control of the individual
firm,
such as degree of concentration, diversity, or
dependency; rate of industry growth; or switching
costs.
It is critical to understand the strategies of one's
rivals in detail.
For instance, Ford's strategy depends on the
strategies of Toyota, Nissan, GM, and
Volkswagen, and vice versa.
East Africa University, Faculty of Information Science and Technology, Department of Computer Science
18
Porter’s five forces model (cont…)
Threat of substitute products may arise from
products and services in other industries.
Examples:
The products of stock brokers and insurance
companies now compete against banks for the
investment dollar.
The automobile eliminated the horse with
buggy, and the silicon chip eliminated
electromechanical adding machines. The life
cycle of products can be reduced through the
use of IT, such as Computer-Aided Design
(CAD). IT has also provided the basis for
creating new information-intensive products.
East Africa University, Faculty of Information Science and Technology, Department of Computer Science
10. 10
19
Porter’s five forces model (cont…)
Bargaining power of buyers
The power of buyers describes the effect that your
customers have on the profitability of your business.
The transaction between the seller and the buyer
creates value for both parties.
Buyers drives prices down and the quality of products
up.
Buyer power depends on the level of switching costs,
the competitive position of the buyer in the industry
(size, volume), whether the buyer can purchase a
commodity product, or whether the buyer poses a
serious threat of backward integration (i.e., buying out
or merging with its suppliers).
Installing computer terminals at the buyers' site is one
way to raise the buyers' cost of switching to other
suppliers.
East Africa University, Faculty of Information Science and Technology, Department of Computer Science
20
Porter’s five forces model (cont…)
Bargaining power of suppliers
Any business requires inputs—labor, parts, raw materials, and
services. The cost of your inputs can have a significant effect on
your company’s profitability. Whether
It is in some ways the antithesis of buyer power.
The threat of forward integration (i.e., buying out or merging with
its customers) is one determinant of supplier power.
Influential suppliers drive prices up and reduce the quality and
quantity of products and services.
Supplier power also depends on size, volume, and concentration
relative to other firms in the industry.
East Africa University, Faculty of Information Science and Technology, Department of Computer Science
11. 11
21
Porter’s five forces model (cont…)
Together, the strength of the five forces determines
the profit potential in an industry by influencing the
prices, costs, and required investments of
businesses—the elements of return on investment.
Stronger forces are associated with a more
challenging business environment.
To identify the important structural features of your
industry via the five forces, you conduct an industry
analysis that answers the question,
“What are the key factors for competitive success?”
East Africa University, Faculty of Information Science and Technology, Department of Computer Science
22
Value Chain Analysis
The value chain is a systematic approach to
examining the development of competitive
advantage.
The 'margin' depicted in the diagram is the same
as added value.
The organization is split into 'primary activities'
and 'support activities
East Africa University, Faculty of Information Science and Technology, Department of Computer Science
12. 12
23East Africa University, Faculty of Information Science and Technology, Department of Computer Science
24
Value Chain Analysis (cont…)
The value chain begins with the data resource.
Information is developed from the data resource
to support the knowledge environment of an
intelligent learning organisation.
Data is the raw material for information which
is the raw material for the knowledge
environment.
Knowledge is the raw material for business
intelligence that supports business strategies.
East Africa University, Faculty of Information Science and Technology, Department of Computer Science
13. 13
25
Electronic Data Interchange (EDI)
EDI was first developed by the automobile/transportation
industry in the 1970s.
Today,
it is widely used in a variety of industries, including
distribution, finance and accounting, health care,
manufacturing, purchasing, retail, tax form filing, and
shipping.
Early,
EDI packages used rather simple standard forms that
forced companies to convert data to fit the forms.
Newer,
EDI systems allow companies to create custom
systems using simple programming or authoring tools.
East Africa University, Faculty of Information Science and Technology, Department of Computer Science
26
Electronic Data Interchange (EDI) (cont…)
Electronic Data Interchange (EDI) is the electronic
exchange of routine business transactions.
EDI defines the electronic exchange of structured business
data, such as purchase orders, invoices, and shipping
notices, typically between one organization and another.
Typical transactions include such documents as
purchase orders, invoices, advance shipping
notification, payments, etc.
Exchange of electronic data using inter-
organizational information systems
Set of hardware, software, and standards that
accommodate the EDI process
The relationship is usually between a vendor and
customer.
East Africa University, Faculty of Information Science and Technology, Department of Computer Science
14. 14
27
Electronic Data Interchange (EDI) (cont…)
It is important to differentiate between EDI and
electronic commerce (e-commerce).
Electronic commerce encompasses all aspects
of electronic business exchanges, including
person-to-person interaction (collaboration),
money transfers, data sharing and exchange,
Web site merchant systems, and so on.
EDI as a subset of electronic commerce that
encompasses the exchange of business
information in a standardized electronic form.
East Africa University, Faculty of Information Science and Technology, Department of Computer Science
28
Electronic Data Interchange (EDI) (cont…)
EDI can reduce costs, workforce
requirements, and errors associated with
retyping orders, invoices, and other
documents.
With EDI, computer data already entered
by one organization is made available to a
business partner.
EDI is typically handled using store-and-
forward technologies similar to e-mail.
East Africa University, Faculty of Information Science and Technology, Department of Computer Science
15. 15
29
Electronic Data Interchange (EDI) (cont…)
Two approaches in the implementation of
EDI.
Many large organizations acquire or build their
own proprietary systems, often in association with
their business partners.
To work with a value added network provider,
which provides EDI transaction services, security,
document interchange assistance, standard
message formats, communication protocols, and
communication parameters for EDI.
East Africa University, Faculty of Information Science and Technology, Department of Computer Science
30East Africa University, Faculty of Information Science and Technology, Department of Computer Science
16. 16
31
Value Added Network (VAN)
A (VAN) Value Added Network is a third
party who stores the data to be
communicated.
Serves as a middle person, so neither
party can access the other’s private
network.
The main key to a VAN is that the other
partner does not touch your network, as
business partners initiate the sending or
retrieving of the data from the VAN.
East Africa University, Faculty of Information Science and Technology, Department of Computer Science
32
Value Added Network (VAN) (cont…)
With the data being sent to or received
from the VAN by the business partners
initiating the communication, business
partners are insuring a safe method of
data transportation.
The different ways of communicating to
the VAN include dialup as well as FTP
protocols.
East Africa University, Faculty of Information Science and Technology, Department of Computer Science
17. 17
33East Africa University, Faculty of Information Science and Technology, Department of Computer Science
34
Business intelligent agents
Business intelligence represent a popular trend in
many public and private sector organizations.
Ideally, any manager or knowledge worker should be
able to compose information requests without
programmer assistance and achieve answers at the
speed of thought.
Follow-up questions should be immediately asked and
answered in order to maintain continuity of thought on
a particular topic of importance.
East Africa University, Faculty of Information Science and Technology, Department of Computer Science
18. 18
35
Business intelligent agents (cont…)
Intelligent Agents execute tasks on behalf of a
business process, computer application, or an
individual.
For example, corporate use of monitoring software
based on agents can be a key component in
cutting support costs and increase computer
efficiency.
Intelligent agents have been written to search
through e-mail messages for certain keywords or
simple concepts (phrases).
East Africa University, Faculty of Information Science and Technology, Department of Computer Science
36
Business intelligent agents (cont..)
Knowledge-based expert systems, or
simply expert systems, use human
knowledge to solve problems that normally
would require human intelligence.
These expert systems represent the
expertise knowledge as data or rules
within the computer.
East Africa University, Faculty of Information Science and Technology, Department of Computer Science
19. 19
37
Data warehouse, data marts
Data warehouses are computer based information
systems that are home for "secondhand" data that
originated from either another application or from an
external system or source.
Warehouses optimize database query and reporting
tools because of their ability to analyze data, often from
disparate databases and in interesting ways.
They are a way for managers and decision makers to
extract information quickly and easily in order to answer
questions about their business.
In other words, data warehouses are read-only,
integrated databases designed to answer comparative
and "what if" questions.
East Africa University, Faculty of Information Science and Technology, Department of Computer Science
38
Data warehouse, data marts (cont…)
Data Marts:
Data in a data warehouse should be reasonably
current, but not necessarily up to the minute,
although developments in the data warehouse
industry have made frequent and incremental data
dumps more feasible.
Data marts are smaller than data warehouses and
generally contain information from a single
department of a business or organization. The
current trend in data warehousing is to develop a
data warehouse with several smaller related data
marts for specific kinds of queries and reports.
East Africa University, Faculty of Information Science and Technology, Department of Computer Science
20. 20
39
A Data Warehouse Architecture
East Africa University, Faculty of Information Science and Technology, Department of Computer Science
40
Data mining
Data mining is primarily used today by companies with
a strong consumer focus - retail, financial,
communication, and marketing organizations.
It enables these companies to determine relationships
among "internal" factors such as price, product
positioning, or staff skills, and "external" factors such
as economic indicators, competition, and customer
demographics.
East Africa University, Faculty of Information Science and Technology, Department of Computer Science
21. 21
41
Data mining
Data mining, or knowledge discovery, is the
computer-assisted process of digging through and
analyzing enormous sets of data and then extracting
the meaning of the data.
Data mining tools predict behaviors and future
trends, allowing businesses to make proactive,
knowledge-driven decisions.
Data mining tools can answer business questions
that traditionally were too time consuming to resolve.
They scour databases for hidden patterns, finding
predictive information that experts may miss
because it lies outside their expectations.
East Africa University, Faculty of Information Science and Technology, Department of Computer Science
42
Data mining (cont…)
With data mining, a retailer could use
point-of-sale records of customer
purchases to send targeted promotions
based on an individual's purchase history.
By mining demographic data from
comment or warranty cards, the retailer
could develop products and promotions to
appeal to specific customer segments
East Africa University, Faculty of Information Science and Technology, Department of Computer Science
22. 22
43
Data mining (cont…)
Data mining consists of five major
elements:
Extract, transform, and load transaction data onto
the data warehouse system.
Store and manage the data in a multidimensional
database system.
Provide data access to business analysts and
information technology professionals.
Analyze the data by application software.
Present the data in a useful format, such as a
graph or table.
East Africa University, Faculty of Information Science and Technology, Department of Computer Science
44East Africa University, Faculty of Information Science and Technology, Department of Computer Science
23. 23
45
Reference
Laudon, K. & Laudon, J. (2006): Management Information Systems:
Managing the Digital Firm, 9th ed. Prentice Hall
Abdisalam Issa-Salwe, Lecture Notes, Thames Valley University,
2008.
Lachlan M. MacKinnon, Information: Types of Information Systems,
http://www.macs.hw.ac.uk/~lachlan/dbislectures/lectures/types.ppt,
Dave Chaffey, Paul Bocij, Andrew Greasley and Simon Hickies
(eds) (2003): Business Information Systems: Technology,
Development and Management, Pearson Education Limited,
London.
BPP, Information Systems, Study Text, Paper 2.1, BPP Professional
Education, United Kingdom.
46
Group Discussion
Group 1: Discuss using Information
Technology for Competitive
Advantage
Group 2: Porter’s five forces model
Group 3: Discuss the concept of
Value chain (looking at the
systematic approach to examining
the development of competitive
advantage).
East Africa University, Faculty of Information Science and Technology, Department of Computer Science