David Wilson
Angela Devenney
Brittany Matheny
  Brien Mccoy
 IT is used as communication tool to:
     Share information between staff, suppliers, and
       consumers.
    1970’s Information Technology was know as DP.
   Data VS. Information.
   1980’s Business Tech (BT) introduced tools like atm’s
    and voicemail
   Then after the 1980’s (BT) was know as (IT) information
    tech.
   CIO helps businesses use tech for communication
 Allows for online paying and ordering
 How it changed the entertainment
  industry:
    40 year ago you had to go to a movie
     theater
    Allows for video ordering
    Allows for downloading on computer, iPod,
     or cell phone
 Broke time and location barrier
   NASDAQ
 Knowledge makes info useful
 Business Intelligence – software
  applications that analyze an organization’s
  raw data
 BI changes traditional flow of info:
    Used to train workers
    Provides insights
 Business process information
 Physical world Observation
 Biological data
 Public data
 Data that indicates personal references or
 intention
 Tips for organizing E-mail and electron
 files
   Use your e-mail program’s organizing
    tools
   Use consistent file names
   Use online backup services
   Use desktop search software
 Data Warehouse:
  Stores data on a single subject over time
  Purpose is to get data out


 Data Mining:
  Looking for hidden patterns and
   relationships among data
 The road to knowledge


 Network of computer networks


 Was a one to one communication tool


 Now it is a one to many broadcast tool
 Companywide network, closed to public
  access
 Keeps unwanted sources out
 Uses firewalls
 Allows for interactive apps
 Broader version of an Intranet
 Allows for data sharing which encourages
  collaboration between companies
 Good for:
   Same information access
   Processing orders
   Invoices
   payments
 Secure system used with extranets
 Reserved solely for the network
 Issues with Dedicated lines:
   Expensive
   limit extranet use
   Often too time consuming
 Private data network
 Creates secure connections or tunnels
 Advantages of (VPNs):
   Same capabilities as extranets
   Cheaper than extranets
   Allows for on-demand networking
   Keeps corporate networks secure
 Make information available in one place
 Gives users access to their area of the
  intranet
 Advantages:
    Centralizes information
    Serves as entry point
    Allows access according to one’s role
 Allows a continuous connect to the internet
 Sends and receives:
   Video
   Voice
   Data files
 Runs 22000 times faster than today’s
  internet
 Supports heavy duty apps
 Key element
    very-high-speed backbone network
    service vBNS
 Helps remote medical specialists
 Over 325 member universities
 Social Networking
   Inexpensive way to get exposure
   Tools for collaboration between businesses and
    consumers
 Web 2.0
   Tools used to build social and business connection
   Share information & collaborate on projects online
 Examples
   YouTube, Twitter, My space, facebook
 Hardware includes:
      computers
      mobile phones
     Printer
     Scanners
     fax’s
      PDA’s
 CUTTING THE CORD
   Today most experts would agree that people are
      moving away from just using their PC’s to
      connect. Nowadays people are also using Iphones,
      netbooks, blackberry’s, etc.
 Computer Networks:
   Connect people to people and people to data
   Allow companies & people to save time & money
   Have drawbacks, maintaining a fleet of PC’s is
    expensive, also you lose productivity every time you
    update, troubleshoot, or train a new employee how to
    use it
   Some companies are now looking for other options
   One option is hybrid of mainframe & network
    computing
 Thin client networks
      Software changes & upgrades need to be made only on the
       server, so cost can be reduced by 20%
   Rent software & hardware access
 Virtualization & Cloud Computing
   Process that allows networked computer to run
    multiple operating systems & programs through one
    central computer at the same time
   Allows for virtualization but helps with limiting amount
    of data share
   Often sold for a monthly fee
 Turn Technology off when not in use




 Buy programs like surveyor, which shut down
 computers in a office at the push of a button
 Computer software tells the computer what to do
 Shareware
   Copyrighted
   Distributed free of charge but user usually sends a fee to he
      developer if the program meets their needs
 Public Domain Software
   Free for the taking without any fees
 Business people use software for writing
     Word processors
     Spread sheets
     Filing and retrieving data
     graphics
 Human Resource Issues
   Telecommuting has many different advantages:
      The company can save resources
      Easy of use for the employee
      Often increases productivity
      Great for parents that have children or people with
       disabilities
   Disadvantages:
      Less personal contact and confrontation
      Don’t know when to turn off work
      Sometimes part time alternative
 Nanobots
   People who are given the freedom to meet
    the organization’s goals on their own time
    and schedule
   Often given a project with a certain budget
    and time deadline, and are left alone to take
    the task on
   Biggest difficulty is finding the right person
    for the job
 Security Issues
   Viruses
      Pieces of programming code inserted into other programming
       that usually lies dormant until triggered to cause some
       unexpected event
      Antivirus protection is essential
   Phishing
      Scammers often embellish an e-mail message with a stolen logo
       for a well-recognized brand such as eBay, PayPal, or Citibank
      Scammers use phrases such as “Account Activation
       Required”, or “Your account will be cancelled if you do not
       verify”
      When the user clicks on it, the scammer can steal personal and
       private information
 Other threats include:
   Copyright laws being violated
   Sexual and racial harassment
   Cyber terrorism
     Terrorist hackers could shut down the entire
      communications, money supply, electricity, and
      transportation systems
     In 2002 there was a powerful electronic attack
      that crippled 9 of the 13 computers that manage
      internet traffic globally
 Privacy Issues
   Many company managers scan employee e-mail
    regularly (it is legal)
   Hackers can trap and read your email
   Makes easier to do unnecessary snooping
   Cookies:
     Pieces of information that the browser sends back to the
      server whenever you return to that web site
     Tracks your movement
     Spyware can be installed on your computer without your
      knowledge
 Stability Issues
   Being error free
      Hershey company’s $115 million dollar new computer
       system disrupted shipments one Halloween and caused a
       12% deficit that quarter
      Combination of human error, computer error,
       malfunctioning software, and an overly complex marriage of
       software, hardware, and networking equipment


 Management must face all of these challenges
 within the company in order to maintain a strong,
 growing company

Technology

  • 1.
  • 2.
     IT isused as communication tool to:  Share information between staff, suppliers, and consumers.  1970’s Information Technology was know as DP.  Data VS. Information.  1980’s Business Tech (BT) introduced tools like atm’s and voicemail  Then after the 1980’s (BT) was know as (IT) information tech.  CIO helps businesses use tech for communication
  • 3.
     Allows foronline paying and ordering  How it changed the entertainment industry:  40 year ago you had to go to a movie theater  Allows for video ordering  Allows for downloading on computer, iPod, or cell phone  Broke time and location barrier  NASDAQ
  • 4.
     Knowledge makesinfo useful  Business Intelligence – software applications that analyze an organization’s raw data  BI changes traditional flow of info:  Used to train workers  Provides insights
  • 5.
     Business processinformation  Physical world Observation  Biological data  Public data  Data that indicates personal references or intention
  • 7.
     Tips fororganizing E-mail and electron files  Use your e-mail program’s organizing tools  Use consistent file names  Use online backup services  Use desktop search software
  • 8.
     Data Warehouse:  Stores data on a single subject over time  Purpose is to get data out  Data Mining:  Looking for hidden patterns and relationships among data
  • 9.
     The roadto knowledge  Network of computer networks  Was a one to one communication tool  Now it is a one to many broadcast tool
  • 10.
     Companywide network,closed to public access  Keeps unwanted sources out  Uses firewalls  Allows for interactive apps
  • 11.
     Broader versionof an Intranet  Allows for data sharing which encourages collaboration between companies  Good for:  Same information access  Processing orders  Invoices  payments
  • 12.
     Secure systemused with extranets  Reserved solely for the network  Issues with Dedicated lines:  Expensive  limit extranet use  Often too time consuming
  • 13.
     Private datanetwork  Creates secure connections or tunnels  Advantages of (VPNs):  Same capabilities as extranets  Cheaper than extranets  Allows for on-demand networking  Keeps corporate networks secure
  • 14.
     Make informationavailable in one place  Gives users access to their area of the intranet  Advantages:  Centralizes information  Serves as entry point  Allows access according to one’s role
  • 15.
     Allows acontinuous connect to the internet  Sends and receives:  Video  Voice  Data files
  • 16.
     Runs 22000times faster than today’s internet  Supports heavy duty apps  Key element  very-high-speed backbone network service vBNS  Helps remote medical specialists  Over 325 member universities
  • 17.
     Social Networking  Inexpensive way to get exposure  Tools for collaboration between businesses and consumers  Web 2.0  Tools used to build social and business connection  Share information & collaborate on projects online  Examples  YouTube, Twitter, My space, facebook
  • 18.
     Hardware includes:  computers  mobile phones  Printer  Scanners  fax’s  PDA’s  CUTTING THE CORD  Today most experts would agree that people are moving away from just using their PC’s to connect. Nowadays people are also using Iphones, netbooks, blackberry’s, etc.
  • 19.
     Computer Networks:  Connect people to people and people to data  Allow companies & people to save time & money  Have drawbacks, maintaining a fleet of PC’s is expensive, also you lose productivity every time you update, troubleshoot, or train a new employee how to use it  Some companies are now looking for other options  One option is hybrid of mainframe & network computing
  • 20.
     Thin clientnetworks  Software changes & upgrades need to be made only on the server, so cost can be reduced by 20%  Rent software & hardware access  Virtualization & Cloud Computing  Process that allows networked computer to run multiple operating systems & programs through one central computer at the same time  Allows for virtualization but helps with limiting amount of data share  Often sold for a monthly fee
  • 21.
     Turn Technologyoff when not in use  Buy programs like surveyor, which shut down computers in a office at the push of a button
  • 22.
     Computer softwaretells the computer what to do  Shareware  Copyrighted  Distributed free of charge but user usually sends a fee to he developer if the program meets their needs  Public Domain Software  Free for the taking without any fees  Business people use software for writing  Word processors  Spread sheets  Filing and retrieving data  graphics
  • 23.
     Human ResourceIssues  Telecommuting has many different advantages:  The company can save resources  Easy of use for the employee  Often increases productivity  Great for parents that have children or people with disabilities  Disadvantages:  Less personal contact and confrontation  Don’t know when to turn off work  Sometimes part time alternative
  • 24.
     Nanobots  People who are given the freedom to meet the organization’s goals on their own time and schedule  Often given a project with a certain budget and time deadline, and are left alone to take the task on  Biggest difficulty is finding the right person for the job
  • 25.
     Security Issues  Viruses  Pieces of programming code inserted into other programming that usually lies dormant until triggered to cause some unexpected event  Antivirus protection is essential  Phishing  Scammers often embellish an e-mail message with a stolen logo for a well-recognized brand such as eBay, PayPal, or Citibank  Scammers use phrases such as “Account Activation Required”, or “Your account will be cancelled if you do not verify”  When the user clicks on it, the scammer can steal personal and private information
  • 26.
     Other threatsinclude:  Copyright laws being violated  Sexual and racial harassment  Cyber terrorism  Terrorist hackers could shut down the entire communications, money supply, electricity, and transportation systems  In 2002 there was a powerful electronic attack that crippled 9 of the 13 computers that manage internet traffic globally
  • 27.
     Privacy Issues  Many company managers scan employee e-mail regularly (it is legal)  Hackers can trap and read your email  Makes easier to do unnecessary snooping  Cookies:  Pieces of information that the browser sends back to the server whenever you return to that web site  Tracks your movement  Spyware can be installed on your computer without your knowledge
  • 28.
     Stability Issues  Being error free  Hershey company’s $115 million dollar new computer system disrupted shipments one Halloween and caused a 12% deficit that quarter  Combination of human error, computer error, malfunctioning software, and an overly complex marriage of software, hardware, and networking equipment  Management must face all of these challenges within the company in order to maintain a strong, growing company