This presentation is all about the internet basics we need to know before making a website or some other internet related works . This will help you to have a clear idea on What Is Internet.
Thank you
feel free to ask any queries in comment box
This presentation is all about the internet basics we need to know before making a website or some other internet related works . This will help you to have a clear idea on What Is Internet.
Thank you
feel free to ask any queries in comment box
www.elsevier.comlocatecompstrucComputers and Structures .docxjeffevans62972
www.elsevier.com/locate/compstruc
Computers and Structures 85 (2007) 235–243
On the treatment of uncertainties in structural mechanics and analysis q
G.I. Schuëller *
Institute of Engineering Mechanics, Leopold-Franzens University Innsbruck, Technikerstr. 13, 6020 Innsbruck, Austria
Received 9 August 2006; accepted 31 October 2006
Available online 22 December 2006
Abstract
In this paper the need for a rational treatment of uncertainties in structural mechanics and analysis is reasoned. It is shown that the
traditional deterministic conception can be easily extended by applying statistical and probabilistic concepts. The so-called Monte Carlo
simulation procedure is the key for those developments, as it allows the straightforward use of the currently used deterministic analysis
procedures.
A numerical example exemplifies the methodology. It is concluded that uncertainty analysis may ensure robust predictions of vari-
ability, model verification, safety assessment, etc.
� 2006 Elsevier Ltd. All rights reserved.
Keywords: Uncertainty; Monte Carlo simulaton; Finite elements; Response variability; Model verification; Robustness
1. Introduction
Structural mechanics analysis up to this date, generally is
still based on a deterministic conception. Observed varia-
tions in loading conditions, material properties, geometry,
etc. are taken into account by either selecting extremely
high, low or average values, respectively, for representing
the parameters. Hence, this way, uncertainties inherent in
almost every analysis process are considered just intuitively.
Observations and measurements of physical processes,
however, show not only variability, but also random char-
acteristics. Statistical and probabilistic procedures provide
a sound frame work for a rational treatment of analysis
of these uncertainties. Moreover there are various types of
uncertainties to be dealt with. While the uncertainties in
mechanical modeling can be reduced as additional knowl-
edge becomes available, the physical or intrinsic uncertain-
ties, e.g. of environmental loading, can not. Furthermore,
0045-7949/$ - see front matter � 2006 Elsevier Ltd. All rights reserved.
doi:10.1016/j.compstruc.2006.10.009
q Plenary Keynote Lecture presented at the 3rd MIT Conference on
Computational Fluid and Solid Mechanics, Boston, MA, USA, June 14–
17, 2005.
* Tel.: +43 512 507 6841; fax: +43 512 507 2905.
E-mail address: [email protected]
the entire spectrum of uncertainties is also not known. In
reality, neither the true model nor the model parameters
are deterministically known. Assuming that by finite ele-
ment (FE) procedures structures and continua can be repre-
sented reasonably well the question of the effect of the
discretization still remains. It is generally expected, that
an increase in the size of the structural models, in terms of
degrees of freedom, will increase the level of realism of the
model. Comparisons with measurements, however, clearly
show that this expect.
www.ebook3000.comList of Cases by ChapterChapter 1.docxjeffevans62972
www.ebook3000.com
List of Cases by Chapter
Chapter 1
Development Projects in Lagos, Nigeria 2
“Throwing Good Money after Bad”: the BBC’s
Digital Media Initiative 10
MegaTech, Inc. 29
The IT Department at Hamelin Hospital 30
Disney’s Expedition Everest 31
Rescue of Chilean Miners 32
Chapter 2
Tesla’s $5 Billion Gamble 37
Electronic Arts and the Power of Strong Culture
in Design Teams 64
Rolls-Royce Corporation 67
Classic Case: Paradise Lost—The Xerox Alto 68
Project Task Estimation and the Culture of “Gotcha!” 69
Widgets ’R Us 70
Chapter 3
Project Selection Procedures: A Cross-Industry
Sampler 77
Project Selection and Screening at GE: The Tollgate
Process 97
Keflavik Paper Company 111
Project Selection at Nova Western, Inc. 112
Chapter 4
Leading by Example for the London Olympics—
Sir John Armitt 116
Dr. Elattuvalapil Sreedharan, India’s Project
Management Guru 126
The Challenge of Managing Internationally 133
In Search of Effective Project Managers 137
Finding the Emotional Intelligence to Be a Real Leader 137
Problems with John 138
Chapter 5
“We look like fools.”—Oregon’s Failed Rollout
of Its ObamacareWeb Site 145
Statements of Work: Then and Now 151
Defining a Project Work Package 163
Boeing’s Virtual Fence 172
California’s High-Speed Rail Project 173
Project Management at Dotcom.com 175
The Expeditionary Fighting Vehicle 176
Chapter 6
Engineers Without Borders: Project Teams Impacting
Lives 187
Tele-Immersion Technology Eases the Use of Virtual
Teams 203
Columbus Instruments 215
The Bean Counter and the Cowboy 216
Johnson & Rogers Software Engineering, Inc. 217
Chapter 7
The Building that Melted Cars 224
Bank of America Completely Misjudges Its Customers 230
Collapse of Shanghai Apartment Building 239
Classic Case: de Havilland’s Falling Comet 245
The Spanish Navy Pays Nearly $3 Billion for a Submarine
That Will Sink Like a Stone 248
Classic Case: Tacoma Narrows Suspension Bridge 249
Chapter 8
Sochi Olympics—What’s the Cost of National
Prestige? 257
The Hidden Costs of Infrastructure Projects—The Case
of Building Dams 286
Boston’s Central Artery/Tunnel Project 288
Chapter 9
After 20 Years and More Than $50 Billion, Oil is No Closer
to the Surface: The Caspian Kashagan Project 297
Chapter 10
Enlarging the Panama Canal 331
Project Scheduling at Blanque Cheque Construction (A) 360
Project Scheduling at Blanque Cheque Construction (B) 360
Chapter 11
Developing Projects Through Kickstarter—Do Delivery
Dates Mean Anything? 367
Eli Lilly Pharmaceuticals and Its Commitment to Critical
Chain Project Management 385
It’s an Agile World 396
Ramstein Products, Inc. 397
Chapter 12
Hong Kong Connects to the World’s Longest Natural
Gas Pipeline 401
The Problems of Multitasking 427
Chapter 13
New York City’s CityTime Project 432
Earned Value at Northrop Grumman 451
The IT Department at Kimble College 463
The Superconducting Supercollider 464
Boeing’s 787 Dreamliner: Failure to Launch 465
Chapter 14.
www.AEP-Arts.org | @AEP_Arts
EDUCATION TRENDS www.ecs.org | @EdCommission
TUNE IN.
Explore emerging
education developments.
SEPT 2017
ESSA creates
flexibility allowing
states and
schools to more
fully explore and
leverage the arts in
K-12 teaching and
learning.
Research
indicates that
deeper learning
skills contribute
significantly
to a student’s
college, career
and citizenship
readiness.
Thirty years ago, in response to a K-12
public education system defined by
mediocrity1, with low student test scores
and widening gaps in achievement, the
accountability movement was born.
Federal and state education policies
focused on raising standards and
regularly assessing students. However,
over the years, many policymakers
and the public observed a connection
between the accountability movement
and an overemphasis on testing in
core subjects, such as English and
math, a narrowing of curricula and the
elimination of many important subjects,
including the arts.
Arts education
fosters critical deeper
learning skills, such
as collaboration and
perseverance, in
students.
Yet, research consistently shows that
arts education and the integration of
the arts into core subjects can have
dramatic effects on student success
— defined not just by student test
scores, but also critical skills, such as
creativity, teamwork and perseverance.
Research indicates that these skills
can be as effective predictors of long-
term success in college, careers and
citizenship as test scores.2,3
The Every Student Succeeds Act
(ESSA), which passed in late 2015, is
the first major federal law in more than
30 years offering states a significant
degree of flexibility to broaden —
rather than narrow — curricula, and
strongly encourages states to ensure all
students have access to a well-rounded
education, which includes the arts
and music.4 Armed with the evidence
presented in this report highlighting
the impressive effects education in and
through the arts can have on student
Beyond the Core: Advancing
student success through the arts
EMILY WORKMAN
EDUCATION
TRENDS
www.AEP-Arts.org | @AEP_Arts
2
EDUCATION TRENDS www.ecs.org | @EdCommission
success, state policymakers have an opportunity and
incentive to take advantage of the flexibility awarded
under ESSA related to the arts.
“Despite [deeper learning] skills’
central roles in our education and,
more broadly, our lives, education
policy has tended to overlook their
importance.”5
Bolstering Deeper
Learning Through Arts in
Education
Deeper Learning
The arts — including dance, music, theatre, media arts
and visual arts — bolster the development of what are
commonly referred to as deeper learning skills. Deeper
learning is an umbrella term defining the skills and
knowledge students need to attain success in college,
career and citizenship. Students that possess deeper
learning skills6:
1. Master core academic content.
2. Think criti.
wsb.to&NxQXpTHEME Leading with LoveAndreas J. Kӧste.docxjeffevans62972
wsb.to/&NxQXp
THEME: Leading with Love
Andreas J. Kӧstenberger & David Crowther
Introduction
At the outset of this chapter, it should be frankly acknowledged that the Johannine Letters were not originally intended primarily to provide a theology of leadership. Nevertheless, a closer examination of these three letters reveals the way in which the author relates to and provides leadership for the people in the congregations to which the letters are written. The author’s relationship with his recipients in these three letters does not directly correspond to a modern model of leadership because of his unique role in the churches to which he is writing. Yet his faithful and caring relationship can provide an example to Christian leaders in every age. In order to grasp the lessons on leadership in the Johannine Epistles, one must consider the identity of the author of these letters, the source of his authority, his relationship with his audience, and the nature of the conflict addressed in his third letter.
Original Setting
The Authorship of the Letters
The author of 1, 2 and 3 John is never named except for the title “elder” in 2 and 3 John. The early church accepted all three letters into the canon in the belief that John the apostle, the son of Zebedee, was the author.[1] While the author of these letters was doubtless known to his initial readers, the modern reader is indebted to the early church for preserving the tradition of authorship. Sources from the late second and early third centuries, such as the Muratorian Fragment (c. ad 180) and church fathers Tertullian (c. ad 160–215) and Clement of Alexandria (c. ad 155–220), ascribe authorship to John the son of Zebedee.
However, not only the external but also the internal evidence points to Johannine authorship. First, in 1 John 1:1–4 the author claims to be an eyewitness of Jesus. Although the first-person plural reference (“we”) in the author’s description of what he has heard, seen, and touched may include his audience because they share in the tradition that was handed down (alternatively, the reference is to the apostles; cf. John 1:14; 2:11), there is a clear distinction between the author and his recipients with regard to their firsthand knowledge of Jesus (cf.1 John 1:2–3). While the author may use the first-person plural reference to identify with his audience, 1 John 1:1–2 indicates that the author is a personal eyewitness of the incarnate Christ.[2]
Second, all three of the Johannine letters contain similar vocabulary, style, and theology. In fact, the relationship between the letters is so strong that the majority of modern scholars view them as coming from one author—albeit not all agree that their author is the same as the author of the Fourth Gospel.[3] For instance, among the Johannine letters one can identify a common background in which itinerant teachers with competing theological agendas threatened the confession of the Johannine churches.[4] In response to such threa.
WSJ Executive Adviser (A Special Report) TheCase Against .docxjeffevans62972
WSJ Executive Adviser (A Special Report): The
Case Against Corporate Social Responsibility:
The idea that companies have a duty to address
social ills is not just flawed, argues Aneel
Karnani; It also makes it more likely that we'll
ignore the real solutions to these problems
Karnani, Aneel . Wall Street Journal , Eastern edition; New York, N.Y. [New York, N.Y]23 Aug 2010: R.1.
ProQuest document link
ABSTRACT
[...] the fact is that while companies sometimes can do well by doing good, more often they can't. Because in most
cases, doing what's best for society means sacrificing profits.
FULL TEXT
Can companies do well by doing good? Yes -- sometimes.
But the idea that companies have a responsibility to act in the public interest and will profit from doing so is
fundamentally flawed.
Large companies now routinely claim that they aren't in business just for the profits, that they're also intent on
serving some larger social purpose. They trumpet their efforts to produce healthier foods or more fuel-efficient
vehicles, conserve energy and other resources in their operations, or otherwise make the world a better place.
Influential institutions like the Academy of Management and the United Nations, among many others, encourage
companies to pursue such strategies.
It's not surprising that this idea has won over so many people -- it's a very appealing proposition. You can have
your cake and eat it too!
But it's an illusion, and a potentially dangerous one.
Very simply, in cases where private profits and public interests are aligned, the idea of corporate social
responsibility is irrelevant: Companies that simply do everything they can to boost profits will end up increasing
social welfare. In circumstances in which profits and social welfare are in direct opposition, an appeal to corporate
social responsibility will almost always be ineffective, because executives are unlikely to act voluntarily in the
public interest and against shareholder interests.
Irrelevant or ineffective, take your pick. But it's worse than that. The danger is that a focus on social responsibility
will delay or discourage more-effective measures to enhance social welfare in those cases where profits and the
public good are at odds. As society looks to companies to address these problems, the real solutions may be
ignored.
http://ezproxy.library.berkeley.org/login?qurl=https%3A%2F%2Fsearch.proquest.com%2Fdocview%2F746396923%3Faccountid%3D38129
http://ezproxy.library.berkeley.org/login?qurl=https%3A%2F%2Fsearch.proquest.com%2Fdocview%2F746396923%3Faccountid%3D38129
To get a better fix on the irrelevance or ineffectiveness of corporate social responsibility efforts, let's first look at
situations where profits and social welfare are in synch.
Consider the market for healthier food. Fast-food outlets have profited by expanding their offerings to include
salads and other options designed to appeal to health-conscious consu.
WRTG 293 students, Your first writing assignment will be .docxjeffevans62972
WRTG 293 students,
Your first writing assignment will be to rewrite a set of instructions. The scenario for this
assignment is described below.
________________________
You have just taken a position as a student worker for the Communications Arts Department at
Anderson College. You began your job last week.
Anderson College has an enrollment of 10,000 students. Among this student population, 20% of
the students are international students for whom English is not a native language, 10% of the
students are dual-enrollment high school students, 20% of the students are graduate students, and
the remaining 50% of the student population consists of a mixture of adult learners and
traditional students.
Anderson adopted LEO as its learning management system two years ago. Anderson uses LEO
for both its online classes and its hybrid classes.
Since moving to LEO, Dr. Richard Johnson, Dean of the Undergraduate School at Anderson, and
Dr. Lynn Peterson, Dean of the Graduate School at Anderson, have noticed that both students
taking classes at Anderson and instructors teaching at Anderson are often not aware of the
different settings one can choose to view discussions in LEO. This lack of awareness has caused
confusion and frustration as students and faculty members have attempted to navigate through
the discussions in their classes.
Dr. Johnson and Dr. Peterson tried to address this problem two months ago. At that time, they
asked the previous student worker to write instructions on how to change the settings for
discussions in LEO for the optimal viewing arrangement.
The previous student worker wrote some instructions. However, the worker wrote them very
unprofessionally and poorly. They cannot be distributed to students in their current form.
Moreover, shortly after the student worker finished the instructions, he left his position for
another job.
As a result, Anderson College now has a set of poorly designed instructions that it cannot send
out to students and faculty members. Meanwhile, students and faculty members are still
experiencing frustration with the system, and they need a document that guides them through
how to adjust their settings in LEO for viewing discussions.
Dr. Johnson, who is your immediate supervisor, has now asked you, the new student worker, to
rewrite the instructions that the previous student worker wrote. He has asked you to use the
same graphics the previous student worker used. He has also suggested that you use arrows to
point to sections of the graphics if such arrows can help in understanding specific steps in the
instructions.
Keep in mind that potentially 10,000 students will be using the instructions, in addition to
various faculty members. The instructions should be clear, professional, and well designed.
Moreover, you will want to consider the different types of students at Anderson College,
including their backgrounds and their var.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Safalta Digital marketing institute in Noida, provide complete applications that encompass a huge range of virtual advertising and marketing additives, which includes search engine optimization, virtual communication advertising, pay-per-click on marketing, content material advertising, internet analytics, and greater. These university courses are designed for students who possess a comprehensive understanding of virtual marketing strategies and attributes.Safalta Digital Marketing Institute in Noida is a first choice for young individuals or students who are looking to start their careers in the field of digital advertising. The institute gives specialized courses designed and certification.
for beginners, providing thorough training in areas such as SEO, digital communication marketing, and PPC training in Noida. After finishing the program, students receive the certifications recognised by top different universitie, setting a strong foundation for a successful career in digital marketing.
You Name Here1. Name a company that uses data as a source of c.docx
1. You Name Here
1. Name a company that uses data as a source of competitive
advantage. Justify your response.
2. Define dynamic pricing (in your own words) and provide an
example not found in the text.
3. Define the following terms: table, record, field. Provide
another name for each term, as well as an example.
4. Why would a firm use a loyalty card? What is the incentive
for the firm? What is the incentive for consumers to opt in and
use loyalty cards? What kinds of strategic assets can these
system create?
5. Make a list of the kind of data you might give up when using
a cash register, a Web site, or a loyalty card, or when calling a
firm’s customer support line. How might firms leverage this
data to better serve you and improve their performance?
6. What is HIPPA? What industry does it impact?
7. How might information systems impact mergers and
acquisitions? What are the key issues to consider?
8. Find the Web page for your school’s information systems
department. What is the URL that gets you to this page? Label
the host name, domain name, path, and file for this URL. Are
their additional subdomains? If so, indicate them, as well.
9. What is the difference between TCP and UDP? Why would
you use one over the other?
3. Describe certain aspects of the Internet infrastructure that are
fault-tolerant and support load balancing.
Discuss the role of hosts, domains, IP addresses, and the DNS
in making the Internet work.
HOW THE INTERNET WORKS
Internet service provider (ISP): Organization or firm that
provides access to the internet.
Connect to one another, exchanging traffic.
Ensure that messages can get to any other computer that’s
online and willing to communicate.
Uniform Resource Locator (URL)
Protocol: Enables communication by defining the format of data
and rules for exchange.
Hypertext transfer protocol: Application transfer protocol that
allows Web browsers and Web servers to communicate with
each other.
SMTP: Simple mail transfer protocol: server to hold e-mail.
FTP: Application transfer protocol that is used to copy files
from one computer to another.
Identifies resources on the internet along with the application
protocol
Anatomy of a web address
Application Transfer Protocol
Host name
Domain name (top-level domain)
4. Path
File
Case-sensitive
Hosts and Domain Names
Domain name: Represents an organization.
Hosts: Public services offered by that organization.
Load balancing: Distributing a computing or networking
workload across multiple systems in order to avoid congestion
and slow performance.
Fault tolerance: Systems that are capable of continuing
operation even if a component fails.
None of these are case-sensitive.
Owning a Domain
One can register a domain name, paying for a renewable right to
use that domain name.
Web hosting services: Firm that provides hardware and services
to run the Web sites of others.
ICANN (Internet Corporation for Assigning Names and
Numbers): Nonprofit organization responsible for managing the
Internet’s domain and numbering.
Cybersquatting: Acquiring a domain name that refers to a firm,
individual, product, or trademark, with the goal of exploiting it
for financial gain.
Path Name and File Name
Paths map to a folder location where the file is stored on the
server.
Hypertext markup language (HTML): Language used to
compose Web pages.
Both are case sensitive
5. IP Address
Can be used to identify a user’s physical location.
NAT (network address translation): Conserves IP addresses by
mapping devices on a private network to single Internet-
connected devices that acts on their behalf.
Helps delay the impact of the IP address drought.
Value used to identify a device that is connected to the Internet
Domain Name Service (DNS)
Distributed database that looks up host and domain names and
returns the actual IP address for them.
Nameservers: Find Web servers, e-mail servers, and more.
Cache: Temporary storage space used to speed computing tasks.
Internet directory service that allows devices and services to be
named and discoverable
Domain Name Service (DNS)
Learning objectives
Understand the layers that make up the Internet and describe
why each is important.
Discuss the benefits of Internet architecture in general and
TCP/IP in particular.
Name applications that should use TCP and others that might
use UDP.
Understand what a router does and the role these devices play in
networking.
Conduct a traceroute and discuss the output, demonstrating how
6. Internet interconnections work in getting messages from point
to point.
Understand why mastery of Internet infrastructure is critical to
modern finance and be able to discuss the risks in automated
trading systems.
Describe VoIP, and contrast circuit versus packet switching,
along with organizational benefits and limitations of each.
TCP/IP
TCP (Transmission control protocol): Works at both ends of
internet communication to ensure a perfect copy of a message is
sent.
Packets or datagrams: Unit of data forwarded by a network.
All internet transmissions are divided into packets.
IP (Internet protocol): Routing protocol that is in charge of
forwarding packets on the internet.
Routers: Computing device that connects networks and
exchanges data between them.
TCP/ip
Router
Router
Router
Router
Router
TCP
TCP
IP
Web page on a web server
7. Web page on a computer
TCP/IP
UDP (User datagram protocol): Operates instead of a TCP in
applications where delivery speed is important and quality can
be sacrificed.
VoIP (Voice over Internet protocol): Transmission technologies
that enable voice communications to take place over the Internet
and private packet-switched networks.
Router and Computer CONNECTIONS
Routers are connected wirelessly or by cables.
Copper cables with transmissions sent through via electricity.
Fiber-optic lines-glass lined cables that transmit light.
Peering: When separate ISPs link their networks to swap traffic
on the Internet.
Takes place at neutral sites called Internet exchange points
(IXPs).
Colocation Facility (Colo)
8. Provides a place where:
Gear from multiple firms can come together.
Peering of Internet traffic can take place.
Equipment connecting in colos:
High-speed lines from ISPs.
Telecom lines from large private data centers.
Servers hosted in a colo to be closer to high-speed Internet
connections.
Traceroute
Repeatedly sends a cluster of three packets starting at the first
router connected to a computer.
Builds out the path that packets take to their destination.
Built into all major desktop operating systems.
Several Web sites will run it between locations.
Neat way to explore how the Internet works.
Learning Objectives
Understand the last-mile problem and be able to discuss the
pros and cons of various broadband technologies, including
DSL, cable, fiber, and various wireless offerings.
Describe 3G and 4G systems, listing major technologies and
their backers.
Understand the issue of Net neutrality and put forth arguments
supporting or criticizing the concept.
Last Mile
Internet backbone: High-speed data lines that interconnect and
collectively form the core of the Internet.
Amdahl’s Law: System’s speed is determined by its slowest
component.
Last mile problem: Internet connections are the slowest part of
9. the network.
Broadband: High-speed Internet connections.
Bandwidth: Network transmission speeds that are expressed in
some form of bits per second (bps).
Refers to Technologies that connect end users to the Internet
Cable broadband
Uses thick copper wire to offer broadband access.
Coaxial cable: Insulated copper cable used by television
providers.
Has shielding that reduces electrical interference.
Allows cable signals to travel longer distances without
degrading and with less chance of interference.
Limitation: Requires customers to share bandwidth with
neighbors.
Digital Subscriber Line (DSL)
Broadband technology that uses the wires of a local telephone
network.
Speeds vary depending on the technology deployed.
Limitation: uses standard copper telephone wiring that lacks the
shielding used by cable.
Broadband over power line technology has been available for
years.
Deployments are few because it is considered to be pricier and
less practical than alternatives.
Fiber to the Home (FTTH)
10. Broadband service provided via light-transmitting fiber-optic
cables.
Fastest last-mile technology and works easily over long
distances.
Limitations:
Need to build fiber infrastructure from scratch.
Cost of building is enormous.
Wireless
Mobile wireless service from cell phone access providers is
delivered via cell towers.
Providers require a wireless spectrum.
Wireless spectrum: electromagnetic frequencies used for
communication.
Most mobile cell phone services have to license spectrum.
3G
Offer access speeds usually less than 2 Mbps.
3G standards can be narrowed down to:
GSM: Global system for mobile communications
CDMA: Code division multiple access
3G is being replaced by high-bandwidth 4G.
4g
The winner in 4G technologies is:
LTE - Long Term Evolution.
Download speed is 5 to 18 Mbps and upload speed is reaching 2
to 9 Mbps.
Some tests showed download speeds as high as 50 Mbps and
upload speeds as high as 25 Mbps.
11. Satellite Wireless
Terrestrial wireless: provided by earth-bound base stations like
cell phone towers.
Possible via satellite.
First residential satellite services were only used for downloads.
Later some services were based on satellites in geosynchronous
earth orbit (GEO).
O3b hopes to provide fiber-quality wireless service to more than
150 countries, specifically targeting underserved nations.
Wi-Fi and Other Hotspots
Wi-Fi: Wireless local-area networking devices
Stands for wireless fidelity.
Wi-Fi antennas are built into their chipsets.
To connect to the Internet, a device needs to be within range of
a base station or hotspot.
Wi-Fi base stations used in the home are usually bought by end
users.
They are then connected to a cable, DSL, or fiber provider.
Net Neutrality
Access providers have wanted to offer varying coverage,
depending on the service used and bandwidth consumed.
Internet content providers worry that without strong neutrality
rules, ISPs may block content or favor their own offerings
above rivals.
If network providers move away from flat-rate pricing toward
usage-based pricing, this may limit innovation.
Principle that all Internet traffic should be treated equally
13. Data and Decision Making
Big data: The collections, storage, and analysis of extremely
large, complex, and often unstructured data sets that can be
used by organizations to generate insights that would otherwise
be impossible to make.
The massive amount of data available to today’s managers.
Unstructured, big, and costly to work through conventional
databases.
Made available by new tools for analysis and insight.
Decision making is data-driven, fact-based and enabled by:
Standardized corporate data.
Access to third-party datasets through cheap, fast computing
and easier-to-use software.
Data and decision making
Business intelligence (BI): Combines aspects of reporting, data
exploration and ad hoc queries, and sophisticated data modeling
and analysis.
Analytics: Driving decisions and actions through extensive use
of:
Data
Statistical and quantitative analysis
Explanatory and predictive models
Fact-based management
Enterprises that Have Benefited from Data Mastery
Walmart: Moved to the top of the Fortune 500 list.
Caesars Entertainment: Grew to be twice as profitable as rivals
and rich enough to acquire them.
Capital One: Found valuable customers that competitors were
14. ignoring.
Its ten-year financial performance was ten times greater than the
S&P 500 average.
Learning Objectives
Understand the difference between data and information.
Know the key terms and technologies associated with data
organization and management.
Organizing Data - Key Terms and Technology
Database: Single table or a collection of related tables
Database management systems (DBMS): Software for creating,
maintaining, and manipulating data
Known as database software
Structured query language (SQL): Used to create and
manipulate databases
Database administrator (DBA): Job focused on directing,
performing, or overseeing activities associated with a database
or set of databases
Database design and creation
Implementation
Maintenance
Backup and recovery
Policy setting and enforcement
Security
Key terms associated with database systems
TABLE OR FILE
15. List of data, arranged in columns or fields and rows or records.
COLUMN OR FIELD
Column in a database table.
Represents each category of data contained in a record.
ROW OR RECORD
Row in a database table.
Represents a single instance of the data in the table.
Key terms associated with database systems
KEY
16. Field or fields used to uniquely identify a record, and to relate
separate tables in a database, like a social security number.
RELATIONAL DATABASE
Most common standard for expressing databases.
Tables or files are related based on common keys.
Learning objectives
Understand various internal and external sources for enterprise
data.
Recognize the function and role of data aggregators, the
potential for leveraging third-party data, the strategic
implications of relying on externally purchased data, and key
issues associated with aggregators and firms that leverage
externally sourced data.
Transaction Processing Systems
Transaction: Any kind of business exchange.
Loyalty card: System that provides rewards in exchange for
consumers , allowing tracking and recording of their activities.
Enhances data collection and represents a significant switching
17. cost.
Record a transaction or some form of business-related
exchange, such as a cash register sale, ATM withdrawal,
or product return
Enterprise Software
Firms set up systems to gather additional data beyond
conventional purchase transactions or Website monitoring.
Customer relationship management systems (CRM) - Empower
employees to track and record data at nearly every point of
customer contact.
Includes other aspects that touch every aspect of the value
chain, including SCM and ERP.
Surveys
Firms supplement operational data with additional input from
surveys and focus groups.
Direct surveys can give better information than a cash register.
Many CRM products have survey capabilities that allow for
additional data gathering at all points of customer contact.
External Sources
Organizations can have their products sold by partners and can
rely heavily on data collected by others.
Data from external sources might not yield competitive
advantage on its own:
Can provide operational insight for increased efficiency and
cost savings.
May give firms a high-impact edge.
18. Data Aggregators
One has to be aware of the digital tracking of individuals.
Made possible by the availability of personal information
online.
Firms that collect and resell data
Learning objectives
Know and be able to list the reasons why many organizations
have data that can’t be converted to actionable information.
Understand why transactional databases can’t always be queried
and what needs to be done to facilitate effective data use for
analytics and business intelligence.
Recognize key issues surrounding data and privacy legislation.
Reasons for Poor Information
Incompatible systems:
Legacy systems: Older information systems that are
incompatible with other systems, technologies, and ways of
conducting business.
Operational data cannot always be queried:
Most transactional databases are not set up to be simultaneously
accessed for reporting and analysis.
Database analysis requires significant processing .
Learning Objectives
Understand what data warehouses and data marts are and the
purpose they serve.
Know the issues that need to be addressed in order to design,
develop, deploy, and maintain data warehouses and data marts.
Recognize and understand technologies behind “Big Data,” how
they differ from conventional data management approaches, and
19. how they are currently being used for organizational benefit.
Data Warehouses and Data Marts
Structured for fast online queries and exploration.
Collects data from many different operational systems.
Data mart: Database or databases focused on addressing the
concerns of a specific problem or business unit.
Set of databases designed to support decision making in an
organization
Data Warehouses and Data Marts
Marts and warehouses may contain huge volumes of data.
Building large data warehouses can be expensive and time
consuming.
Large-scale data analytics projects should build on visions with
business-focused objectives.
Information Systems Supporting Operations
Maintaining Data Warehouses and Data Marts
Firms can address the broader issues needed to design, develop,
deploy, and maintain its system through data:
Relevance
Sourcing
Quantity and quality
Hosting
Governance
20. Insights from Unstructured Big Data
Hadoop: Made up of half-dozen separate software pieces and
requires the integration of these pieces to work
Advantages:
Flexibility
Scalability
Cost effectiveness
Fault tolerance
E-discovery
Firm should account for it in its archiving and data storage
plans.
Data can be used later and therefore should be stored in order.
Identifying and retrieving relevant electronic information to
support litigation efforts
Learning Objectives
Know the tools that are available to turn data into information.
Identify the key areas where businesses leverage data mining.
Understand some of the conditions under which analytical
models can fail.
Recognize major categories of artificial intelligence and
understand how organizations are leveraging this technology.
Business Intelligence Toolkit
CANNED REPORTS
21. Provide regular summaries of information in a predetermined
format.
AD HOC REPORTING TOOLS
Puts users in control so that they can create custom reports on
an as-needed basis by selecting fields, ranges, summary
conditions, and other parameters.
DASHBOARDS
Heads-up display of critical indicators that allows managers to
get a graphical glance at key performance metrics.
ONLINE ANALYTICAL PROCESSING (OLAP)
Takes data from standard relational databases, calculates and
summarizes the data, and then stores the data in a special
database called a data cube.
Data cube: Stores data in OLAP report
22. Data mining
Models based on:
Customer segmentation and market basket analysis.
Marketing and promotion targeting.
Collaborative filtering and customer churn.
Fraud detection, financial modeling, hiring and promotion.
Prerequisites
Organization must have clean, consistent data.
Events in that data should reflect trends.
Using computers to identify hidden patterns in large data sets
and to build models from this data
Problems in Data Mining
Using bad data can give wrong estimates, thus exposing the firm
to risk.
When the market does not behave as it has in the past,
computer-driven investment models are not effective.
Overengineering: Building a model with so many variables that
the solution arrived at might only work on the subset of data
used to create it.
Skills for data mining
INFORMATION TECHNOLOGY
23. STATISTICS
BUSINESS KNOWLEDGE
ARTIFICIAL INTELLIGENCE
Data mining has its roots in AI.
Neural network: Examines data and hunts down and exposes
patterns, in order to build models to exploit findings.
Expert systems: Leverages rules or examples to perform a task
in a way that mimics applied human expertise.
Genetic algorithms: Model building techniques where computers
examine many potential solutions to a problem.
Modifies various mathematical models that have to be searched
for a best alternative.
Computer software that seeks to reproduce or mimic human
thought, decision making, or brain functions
Learning objectives
Understand how Walmart has leveraged information technology
to become the world’s largest retailer.
Be aware of the challenges that face Walmart in the years
ahead.
Walmart: Data-Driven Value Chain
24. Largest retailer in the world.
Source of competitive advantage is scale.
Efficiency starts with a proprietary system called Retail Link.
Retail Link: Records a sale and automatically triggers inventory
reordering, scheduling, and delivery.
Inventory turnover ratio: Ratio of a company’s annual sales to
its inventory.
Back-office scanners keep track of inventory as supplier
shipments come in.
Data mining prowess
Gets data from varying environmental conditions.
Protects the firm from a retailer’s twin nightmares:
Too much inventory
Too little inventory
Helps the firm tighten operational forecasts.
Enables prediction.
Data drives the organization.
Reports form the basis of sales meetings and executive strategy
sessions.
Sharing data and keeping secrets
Walmart shares sales data only with relevant suppliers:
Stopped sharing data with information brokers.
Custom-builds large portions of its information systems to keep
competitors off its trail.
Other aspects of the firm’s technology remain confidential.
Challenges
Finding huge markets or dramatic cost savings to boost profits
25. and continue to move its stock price higher.
Criticisms:
Accusations of sub-par wages draw union activists.
Poor labor conditions at some of the firm’s contract
manufacturers.
Demand prices so aggressively low that suppliers end up
cannibalizing their own sales at other retailers.
Learning Objectives
Understand how Caesars has used IT to move from an also-ran
chain of casinos to become the largest gaming company based
on revenue.
Name some of the technology innovations that Caesars is using
to help it gather more data, and help push service quality and
marketing program success.
Caesars’ Solid Gold CRM for the Service Sector
Caesars Entertainment provides an example of exceptional data
asset leverage in the service sector.
Focus on how this technology enables world-class service
through customer relationship management.
Leveraged its data-powered prowess to move from a chain of
casinos to the largest gaming company by revenue.
Collecting Data
Caesars’ collects customer data on all activities on their
properties.
Used to track preferences and see if a customer is worth
pursuing.
Total Rewards loyalty card system.
26. Opt-in: Marketing effort that requires customer consent.
Opt-out programs: Enroll all customers by default.
Most Valuable Customers
Customer lifetime value (CLV): Present value of the likely
future income stream generated by an individual purchaser.
Tracks over ninety demographic segments:
Each responds differently to different approaches.
Iterative model of mining the data to identify patterns.
Creates and tests a hypothesis against a control group.
Analyzes to statistically verify the outcome.
Profits come from locals and people aged 45 years and older.
Data-driven service
Identifies high-value customers and gives them special
attention.
Customers can obtain reserved tables and special offers.
Tracks gamblers suffering unusual losses and provides feel-
good offers to them.
CRM effort monitors any customer behavior changes.
Customers come back because they feel that the company treats
them well.
Focuses on service quality and customer satisfaction.
Embedded in its information systems and operational
procedures.
Employees are measured on metrics that include speed and
friendliness.
Compensated based on guest satisfaction ratings.
Changed the corporate culture at Caesars from an every
property-for-itself mentality to a collaborative, customer-
focused enterprise.
27. Innovation and strategyINNOVATIONSTRATEGYHas new
innovations that help it gather more data
Push service quality and marketing program success
Interactive billboards
RFID-enabled poker chips and under-table RFID readers
Incorporation of drink ordering to gaming machines
Data advantage creates intelligence for a high-quality and
highly personal customer experience
Data gives the firm a service differentiation edge
Loyalty program represents a switching cost
Firm’s technology is unique and holds many patents
CHALLENGES
Gaming is a discretionary spending item, and when the economy
tanks, gambling is one of the first things consumers will cut.
Taken private: Publicly held company has its outstanding shares
purchased by an individual or by a small group of individuals
who wish to obtain complete ownership and control.
Has been through a risky overly optimistic buyout.