SlideShare a Scribd company logo
1 of 21
MGT 540
Managing Technology For Organizations




           October 27, 2010
              Nicholas Davis
Activity One - Today
        MGT 540 – Managing Technology For Organizations

• Data management tactics and strategies
• Strategies for creating a database environment
• Trends in telecommunications, networking and
  the Internet
• Opportunities presented by wireless technology
• Wireless applications and decision making
• Securing and controlling information
  technologies
Activity Two
       MGT 540 – Managing Technology For Organizations

• Homework papers return
• Questions, comments concerns
Activity Three
         MGT 540 – Managing Technology For Organizations

• File management
• Is a DBMS really necessary?
• Is end user involvement important?
ons

      • What
        constitutes
        information?
• Silo data management- Good or bad?
Activity Four
        MGT 540 – Managing Technology For Organizations

• Analyze the database approach
  to data management
• Define database - a
  systematized collection of data
  that can be accessed
  immediately and manipulated by
  a data-processing system for a
  specific purpose
• In what ways does data
  management support business
  processes?
Activity Five
       MGT 540 – Managing Technology For Organizations

• Database trends, batch
  vs. real time
• Challenges of database
  management – speed,
  actions which can be
  performed, security,
  backup, accessibility
Activity Six
        MGT 540 – Managing Technology For Organizations

• Discuss networking and communications trends,
  connectivity, speed, devices, standards, unified
  networks
• TCP/IP packets travel on switched networks vs
  dedicated lines...What is the advantage of this?
Activity Six
         MGT 540 – Managing Technology For Organizations

•   LAN, WAN, MAN, what is the difference?
•   Twisted Pair
•   Coaxial Cable
•   Fiber Optics
•   DNS
Activity Seven
          MGT 540 – Managing Technology For Organizations

•   Discuss Google vs Microsoft (Page 289-291)
•   Competitive forces
•   Strategy
•   Effective technology deployment
Activity Eight
        MGT 540 – Managing Technology For Organizations

• Wireless revolution class discussion
Activity Nine
             MGT 540 – Managing Technology For Organizations

•   RFID
•   To what extent does it threaten privacy
•   Costs of RFID
•   Benefits of RFID
Activity Ten
         MGT 540 – Managing Technology For Organizations

• Systems vulnerability, class discussion
• What causes computer systems to become
  vulnerable?
• How do you address these vulnerabilities?
• Why do vulnerabilities still exist?
• Hacking vulnerabilities – Internal vs. External
Activity Eleven
        MGT 540 – Managing Technology For Organizations

• Chapter 8 case study
• Which concepts in the chapter are
  illustrated?
• Describe the control weaknesses
• Who is ultimately responsible?
• How could it have been prevented?
Activity Twelve
       MGT 540 – Managing Technology For Organizations

• As a group, review questions 2 and 3 on
  page 329
Activity Thirteen
       MGT 540 – Managing Technology For Organizations

• What would you include in a plan for
  controlling information systems and
  security your company’s IT assets?
Activity Fourteen
       MGT 540 – Managing Technology For Organizations

• Discussion: What have you learned so far
  in the course?
• Is everything going OK?
• What do you like and dislike
• Is Kit Kat the best chocolate bar ever
  invented?
Activity Fifteen
       MGT 540 – Managing Technology For Organizations

• Discuss next week’s assignments
Drive Carefully
       MGT 540 – Managing Technology For Organizations

• Nicholas Davis
• Tel: 608-347-2486
• Email: cow@chartermi.net
P
      MGT 540 – Managing Technology For Organizations

• P

More Related Content

Similar to Data Management Tactics And Strategies

Managing It Security For Organizations Mgt 540 Lecture 1 March 24 2011
Managing It Security For Organizations Mgt 540 Lecture 1 March 24 2011Managing It Security For Organizations Mgt 540 Lecture 1 March 24 2011
Managing It Security For Organizations Mgt 540 Lecture 1 March 24 2011Nicholas Davis
 
Managing it security_for_organizations_mgt_540_lecture_1_march_24_2011
Managing it security_for_organizations_mgt_540_lecture_1_march_24_2011Managing it security_for_organizations_mgt_540_lecture_1_march_24_2011
Managing it security_for_organizations_mgt_540_lecture_1_march_24_2011Nicholas Davis
 
Methods of integrating it into business processes
Methods of integrating it into business processesMethods of integrating it into business processes
Methods of integrating it into business processesNicholas Davis
 
How it supports e commerce
How it supports e commerceHow it supports e commerce
How it supports e commerceNicholas Davis
 
How It Supports E Commerce
How It Supports E CommerceHow It Supports E Commerce
How It Supports E CommerceNicholas Davis
 
Building and redisigning it systems
Building and redisigning it systemsBuilding and redisigning it systems
Building and redisigning it systemsNicholas Davis
 
Building And Redisigning It Systems
Building And Redisigning It SystemsBuilding And Redisigning It Systems
Building And Redisigning It SystemsNicholas Davis
 
Powered by TCPDF (www.tcpdf.org)httpwww.tcpdf.org.docx
Powered by TCPDF (www.tcpdf.org)httpwww.tcpdf.org.docxPowered by TCPDF (www.tcpdf.org)httpwww.tcpdf.org.docx
Powered by TCPDF (www.tcpdf.org)httpwww.tcpdf.org.docxstilliegeorgiana
 
IT OT Integration_Vishnu_Murali_05262016_UPDATED
IT OT Integration_Vishnu_Murali_05262016_UPDATEDIT OT Integration_Vishnu_Murali_05262016_UPDATED
IT OT Integration_Vishnu_Murali_05262016_UPDATEDVishnu Murali
 
Why Metadata Matters in SharePoint Search and Information Governance Webinar
Why Metadata Matters in SharePoint Search and Information Governance WebinarWhy Metadata Matters in SharePoint Search and Information Governance Webinar
Why Metadata Matters in SharePoint Search and Information Governance WebinarConcept Searching, Inc
 
Data Systems Integration & Business Value Pt. 1: Metadata
Data Systems Integration & Business Value Pt. 1: MetadataData Systems Integration & Business Value Pt. 1: Metadata
Data Systems Integration & Business Value Pt. 1: MetadataDATAVERSITY
 
Data-Ed: Data Systems Integration & Business Value PT. 1: Metadata
Data-Ed: Data Systems Integration & Business Value PT. 1: MetadataData-Ed: Data Systems Integration & Business Value PT. 1: Metadata
Data-Ed: Data Systems Integration & Business Value PT. 1: MetadataData Blueprint
 
DataEd Slides: Data Management versus Data Strategy
DataEd Slides:  Data Management versus Data StrategyDataEd Slides:  Data Management versus Data Strategy
DataEd Slides: Data Management versus Data StrategyDATAVERSITY
 
Metadata Strategies
Metadata StrategiesMetadata Strategies
Metadata StrategiesDATAVERSITY
 
Data-Ed Online Webinar: Metadata Strategies
Data-Ed Online Webinar: Metadata StrategiesData-Ed Online Webinar: Metadata Strategies
Data-Ed Online Webinar: Metadata StrategiesDATAVERSITY
 
Managers & global information technology
Managers & global information technologyManagers & global information technology
Managers & global information technologyOnline
 
DataEd Slides: Data Modeling is Fundamental
DataEd Slides:  Data Modeling is FundamentalDataEd Slides:  Data Modeling is Fundamental
DataEd Slides: Data Modeling is FundamentalDATAVERSITY
 
Data Systems Integration & Business Value Pt. 2: Cloud
Data Systems Integration & Business Value Pt. 2: CloudData Systems Integration & Business Value Pt. 2: Cloud
Data Systems Integration & Business Value Pt. 2: CloudData Blueprint
 

Similar to Data Management Tactics And Strategies (20)

Managing It Security For Organizations Mgt 540 Lecture 1 March 24 2011
Managing It Security For Organizations Mgt 540 Lecture 1 March 24 2011Managing It Security For Organizations Mgt 540 Lecture 1 March 24 2011
Managing It Security For Organizations Mgt 540 Lecture 1 March 24 2011
 
Managing it security_for_organizations_mgt_540_lecture_1_march_24_2011
Managing it security_for_organizations_mgt_540_lecture_1_march_24_2011Managing it security_for_organizations_mgt_540_lecture_1_march_24_2011
Managing it security_for_organizations_mgt_540_lecture_1_march_24_2011
 
Methods of integrating it into business processes
Methods of integrating it into business processesMethods of integrating it into business processes
Methods of integrating it into business processes
 
How it supports e commerce
How it supports e commerceHow it supports e commerce
How it supports e commerce
 
How It Supports E Commerce
How It Supports E CommerceHow It Supports E Commerce
How It Supports E Commerce
 
Building and redisigning it systems
Building and redisigning it systemsBuilding and redisigning it systems
Building and redisigning it systems
 
Building And Redisigning It Systems
Building And Redisigning It SystemsBuilding And Redisigning It Systems
Building And Redisigning It Systems
 
IISME_Fellowship_2015_JFS
IISME_Fellowship_2015_JFSIISME_Fellowship_2015_JFS
IISME_Fellowship_2015_JFS
 
Powered by TCPDF (www.tcpdf.org)httpwww.tcpdf.org.docx
Powered by TCPDF (www.tcpdf.org)httpwww.tcpdf.org.docxPowered by TCPDF (www.tcpdf.org)httpwww.tcpdf.org.docx
Powered by TCPDF (www.tcpdf.org)httpwww.tcpdf.org.docx
 
IT OT Integration_Vishnu_Murali_05262016_UPDATED
IT OT Integration_Vishnu_Murali_05262016_UPDATEDIT OT Integration_Vishnu_Murali_05262016_UPDATED
IT OT Integration_Vishnu_Murali_05262016_UPDATED
 
Why Metadata Matters in SharePoint Search and Information Governance Webinar
Why Metadata Matters in SharePoint Search and Information Governance WebinarWhy Metadata Matters in SharePoint Search and Information Governance Webinar
Why Metadata Matters in SharePoint Search and Information Governance Webinar
 
Chap001
Chap001Chap001
Chap001
 
Data Systems Integration & Business Value Pt. 1: Metadata
Data Systems Integration & Business Value Pt. 1: MetadataData Systems Integration & Business Value Pt. 1: Metadata
Data Systems Integration & Business Value Pt. 1: Metadata
 
Data-Ed: Data Systems Integration & Business Value PT. 1: Metadata
Data-Ed: Data Systems Integration & Business Value PT. 1: MetadataData-Ed: Data Systems Integration & Business Value PT. 1: Metadata
Data-Ed: Data Systems Integration & Business Value PT. 1: Metadata
 
DataEd Slides: Data Management versus Data Strategy
DataEd Slides:  Data Management versus Data StrategyDataEd Slides:  Data Management versus Data Strategy
DataEd Slides: Data Management versus Data Strategy
 
Metadata Strategies
Metadata StrategiesMetadata Strategies
Metadata Strategies
 
Data-Ed Online Webinar: Metadata Strategies
Data-Ed Online Webinar: Metadata StrategiesData-Ed Online Webinar: Metadata Strategies
Data-Ed Online Webinar: Metadata Strategies
 
Managers & global information technology
Managers & global information technologyManagers & global information technology
Managers & global information technology
 
DataEd Slides: Data Modeling is Fundamental
DataEd Slides:  Data Modeling is FundamentalDataEd Slides:  Data Modeling is Fundamental
DataEd Slides: Data Modeling is Fundamental
 
Data Systems Integration & Business Value Pt. 2: Cloud
Data Systems Integration & Business Value Pt. 2: CloudData Systems Integration & Business Value Pt. 2: Cloud
Data Systems Integration & Business Value Pt. 2: Cloud
 

More from Nicholas Davis

Conducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) AssessmentConducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) AssessmentNicholas Davis
 
Top Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessTop Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessNicholas Davis
 
UW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support SystemsUW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support SystemsNicholas Davis
 
Software Development Methodologies
Software Development MethodologiesSoftware Development Methodologies
Software Development MethodologiesNicholas Davis
 
Information systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD SecurityInformation systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD SecurityNicholas Davis
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Nicholas Davis
 
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...Nicholas Davis
 
Information Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things OverviewInformation Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things OverviewNicholas Davis
 
Cyberwar Gets Personal
Cyberwar Gets PersonalCyberwar Gets Personal
Cyberwar Gets PersonalNicholas Davis
 
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...Nicholas Davis
 
Bringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team ProjectBringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team ProjectNicholas Davis
 
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...Nicholas Davis
 
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Nicholas Davis
 
Information Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up SummaryInformation Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up SummaryNicholas Davis
 
Organizational Phishing Education
Organizational Phishing EducationOrganizational Phishing Education
Organizational Phishing EducationNicholas Davis
 
Security Operations -- An Overview
Security Operations -- An OverviewSecurity Operations -- An Overview
Security Operations -- An OverviewNicholas Davis
 
Network Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security ImplicationsNetwork Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security ImplicationsNicholas Davis
 
Survey Presentation About Application Security
Survey Presentation About Application SecuritySurvey Presentation About Application Security
Survey Presentation About Application SecurityNicholas Davis
 
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...Nicholas Davis
 

More from Nicholas Davis (20)

Conducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) AssessmentConducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) Assessment
 
Top Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessTop Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your Business
 
UW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support SystemsUW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support Systems
 
Lecture blockchain
Lecture blockchainLecture blockchain
Lecture blockchain
 
Software Development Methodologies
Software Development MethodologiesSoftware Development Methodologies
Software Development Methodologies
 
Information systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD SecurityInformation systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD Security
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids
 
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
 
Information Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things OverviewInformation Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things Overview
 
Cyberwar Gets Personal
Cyberwar Gets PersonalCyberwar Gets Personal
Cyberwar Gets Personal
 
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
 
Bringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team ProjectBringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team Project
 
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
 
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
 
Information Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up SummaryInformation Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up Summary
 
Organizational Phishing Education
Organizational Phishing EducationOrganizational Phishing Education
Organizational Phishing Education
 
Security Operations -- An Overview
Security Operations -- An OverviewSecurity Operations -- An Overview
Security Operations -- An Overview
 
Network Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security ImplicationsNetwork Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security Implications
 
Survey Presentation About Application Security
Survey Presentation About Application SecuritySurvey Presentation About Application Security
Survey Presentation About Application Security
 
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...
 

Data Management Tactics And Strategies

  • 1. MGT 540 Managing Technology For Organizations October 27, 2010 Nicholas Davis
  • 2. Activity One - Today MGT 540 – Managing Technology For Organizations • Data management tactics and strategies • Strategies for creating a database environment • Trends in telecommunications, networking and the Internet • Opportunities presented by wireless technology • Wireless applications and decision making • Securing and controlling information technologies
  • 3. Activity Two MGT 540 – Managing Technology For Organizations • Homework papers return • Questions, comments concerns
  • 4. Activity Three MGT 540 – Managing Technology For Organizations • File management • Is a DBMS really necessary? • Is end user involvement important?
  • 5. ons • What constitutes information?
  • 6. • Silo data management- Good or bad?
  • 7. Activity Four MGT 540 – Managing Technology For Organizations • Analyze the database approach to data management • Define database - a systematized collection of data that can be accessed immediately and manipulated by a data-processing system for a specific purpose • In what ways does data management support business processes?
  • 8. Activity Five MGT 540 – Managing Technology For Organizations • Database trends, batch vs. real time • Challenges of database management – speed, actions which can be performed, security, backup, accessibility
  • 9. Activity Six MGT 540 – Managing Technology For Organizations • Discuss networking and communications trends, connectivity, speed, devices, standards, unified networks • TCP/IP packets travel on switched networks vs dedicated lines...What is the advantage of this?
  • 10. Activity Six MGT 540 – Managing Technology For Organizations • LAN, WAN, MAN, what is the difference? • Twisted Pair • Coaxial Cable • Fiber Optics • DNS
  • 11. Activity Seven MGT 540 – Managing Technology For Organizations • Discuss Google vs Microsoft (Page 289-291) • Competitive forces • Strategy • Effective technology deployment
  • 12. Activity Eight MGT 540 – Managing Technology For Organizations • Wireless revolution class discussion
  • 13. Activity Nine MGT 540 – Managing Technology For Organizations • RFID • To what extent does it threaten privacy • Costs of RFID • Benefits of RFID
  • 14. Activity Ten MGT 540 – Managing Technology For Organizations • Systems vulnerability, class discussion • What causes computer systems to become vulnerable? • How do you address these vulnerabilities? • Why do vulnerabilities still exist? • Hacking vulnerabilities – Internal vs. External
  • 15. Activity Eleven MGT 540 – Managing Technology For Organizations • Chapter 8 case study • Which concepts in the chapter are illustrated? • Describe the control weaknesses • Who is ultimately responsible? • How could it have been prevented?
  • 16. Activity Twelve MGT 540 – Managing Technology For Organizations • As a group, review questions 2 and 3 on page 329
  • 17. Activity Thirteen MGT 540 – Managing Technology For Organizations • What would you include in a plan for controlling information systems and security your company’s IT assets?
  • 18. Activity Fourteen MGT 540 – Managing Technology For Organizations • Discussion: What have you learned so far in the course? • Is everything going OK? • What do you like and dislike • Is Kit Kat the best chocolate bar ever invented?
  • 19. Activity Fifteen MGT 540 – Managing Technology For Organizations • Discuss next week’s assignments
  • 20. Drive Carefully MGT 540 – Managing Technology For Organizations • Nicholas Davis • Tel: 608-347-2486 • Email: cow@chartermi.net
  • 21. P MGT 540 – Managing Technology For Organizations • P