978-0078023163 Chapter B Part 2

subject Type Homework Help
subject Pages 9
subject Words 2382
subject Authors James McHugh, Susan McHugh, William Nickels

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
Bonus B - Using Technology to Manage Information
B-16
PPT B-16
Four Characteristics That Make
Information Useful
FOUR CHARACTERISTICS that
MAKE INFORMATION USEFUL
B-16
LO B-2
1. Quality
2. Completeness
3. Timeliness
4. Relevance
PPT B-17
Top Sites to Keep You Connected
TOP SITES to
KEEP YOU CONNECTED
B-17
LO B-2
Skype
Google Docs
SurveyMonkey
GoToMeeting
TEXT FIGURE B.3
Taming Electronic Communication
Interruptions
This text figure shows a few of the ways workers can reduce the
number of e-mail distractions.
PPT B-18
Effectively Using Your Electronic
Files
EFFECTIVELY USING YOUR
ELECTRONIC FILES
B-18
LO B-2
Use your e-mail
programs organizing
tools.
Use consistent file
names.
Use online backup
services.
Use desktop search
software.
lecture enhancer B-3
E-MAIL RULES
Writing an e-mail is not like writing a lettersome suggestions
for better electronic communication. (See the complete lecture
enhancer on page B.62 of this manual.)
Bonus B - Using Technology to Manage Information
B-17
2. Use consistent file names.
3. Use online backup services.
4. Use desktop search software, such as Google
Desktop.
D. BIG DATA AND DATA ANALYTICS
1. Information is COLLECTED with nearly every
movement you make.
2. Many companies use DATA ANALYTICS, to
collect, organize, store, and analyze large sets
of data.
3. DATA MINING, looking for hidden patterns in a
data warehouse, has led to a new science of
tracking what’s selling where and who’s buying
it.
4. The text uses the example of Walmarts suc-
cessful data mining to customize its store offer-
ings with a couple examples of failures, too.
learning objective 3
Compare the scope of the Internet, intranets, extranets, and virtual private net-
works and explain how broadband technology enabled the evolution to Web 2.0 and
3.0.
III. THE HEART OF KNOWLEDGE MANAGEMENT:
THE INTERNET
A. The INTERNET is a network of computer networks.
1. It has evolved into a one-to-many broadcast
communication tool and is the heart of
KNOWLEDGE MANAGEMENT.
Bonus B - Using Technology to Manage Information
B-18
PPT B-19
Big Data and Data Analytics
BIG DATA and DATA ANALYTICS
B-19
LO B-2
Data is collected from everything we do.
Data Analytics -- The process of collecting,
organizing, storing, and analyzing large sets of
data (“big data”) in order to identify patterns and
other information that is most useful to the
business now and for making future decisions.
Data mining is a technique for looking for hidden
patterns and unknown relationships in the data.
PPT B-20
Who Benefits from Big Data and
Data Analytics?
TEXT FIGURE B.4
Examples of Sectors that Benefit
from Big Data and Data Analytics
WHO BENEFITS from
BIG DATA and DATA ANALYTICS?
B-20
LO B-2
lecture enhancer B-4
THE ELITE WORLD OF DATA
MINNG
Data mining is big business. Palantir is quickly becoming Sili-
con Valley’s most exclusive employers. (See the complete
lecture enhancer on page B.63 of this manual.)
test
prep
PPT B-21
Test Prep
TEST PREP
B-21
What types of information are available to
businesses today?
What are the four characteristics of information
that make it useful?
What is data mining and how do businesses use
it?
Bonus B - Using Technology to Manage Information
B-19
2. An INTRANET is a companywide network
closed to public access, that uses Internet-type
technology.
a. To prevent unauthorized access by outsid-
ers, companies use a FIREWALL consisting
of hardware, software, or both, that allows
only authorized users to access the intranet.
b. Some companies use intranets only to pub-
lish information for employees.
c. Others create interactive intranets, allowing
employees to input information.
3. An EXTRANET is a semiprivate network that
uses Internet technology and allows more than
one company to access the same information or
allows people on different servers to collaborate.
a. Extending an intranet to outside customers
is a common use of extranets.
b. Almost all companies can use extranets for
ELECTRONIC DATA INTERCHANGE (EDI)
to share data and process orders.
4. Since an extranet does use public lines, HACK-
ERS can gain unauthorized access.
a. One solution is to use DEDICATED LINES,
but this is expensive and limits use to com-
puters directly to those lines.
b. This solution is expensive and limits use of
computers.
5. A VIRTUAL PRIVATE NETWORK (VPN) is a
private data network that creates secure con-
nections, or “tunnels,” over regular Internet lines.
Bonus B - Using Technology to Manage Information
B-20
PPT B-22
Beyond the Internet
BEYOND the INTERNET
B-22
LO B-3
Intranet -- A companywide network closed to public
access that uses Internet-type technology.
Extranet -- A semiprivate network that lets more than
one company access the same information or allows
people on different servers to collaborate.
Virtual Private Network (VPN) -- A private data
network that creates secure connections, or tunnels,
over regular Internet lines.
Bonus B - Using Technology to Manage Information
B-21
a. Companies no longer need dedicated lines,
but can use the public lines securely.
b. VPNs make sharing of public resources for
data more secure.
6. An ENTERPRISE PORTAL serves as entry
point to a variety of resources.
a. Portals identify users and allow them access
to areas of the intranet according to their
roles.
b. The challenge is to integrate resources so
that they appear seamless to the user.
B. BROADBAND TECHNOLOGY
1. As traffic on the Internet increases, the connec-
tion becomes slower.
2. BROADBAND TECHNOLOGY is a technology
that offers users a continuous connection to the
Internet and allows them to send and receive
mammoth files that include voice, video, and da-
ta much faster than ever before.
3. As people use more and more bandwidth, ISPs
have been placing caps on how much consum-
ers can use.
a. NET NEUTRALITY is a hot topic right now.
Debate over how the existing broadband
should be distributed and who should regu-
late it could go on a while.
4. The TRAFFIC ON THE INTERNET has become
so intense that some users like scientists and
Bonus B - Using Technology to Manage Information
B-22
PPT B-23
Increasing Internet Power
Broadband Technology -- Provides a continuous
connection to the Internet that allows users to send
and receive mammoth video, voice, and data files
faster.
INCREASING INTERNET POWER
B-23
LO B-3
Internet2 Private
Internet reserved for
research purposes; runs
more that 22,000 times
faster than today
s public
infrastructure.
PPT B-24
Broadband Caps
BROADBAND CAPS
B-24
LO B-3
As people use more
bandwidth to stream
media, ISPs have been
placing caps on how much
a customer can use.
Average usage is well
below caps.
Bonus B - Using Technology to Manage Information
B-23
scholars need a faster solution.
a. One answer is to create another Internet, re-
served for research purposes only.
b. INTERNET2 is the private Internet system
that links government supercomputer cen-
ters and a select group of universities; it runs
more than 22,000 times faster than today’s
public infrastructure and supports heavy-
duty applications.
c. A key element is a network called vBNS, or
VERY HIGH SPEED BACKBONE NET-
WORK SERVICE, set up in 1995 to link
government supercomputer centers and a
select group of universities.
d. There are more than 500 member universi-
ties.
e. Users who pay more can use more band-
width.
f. The designers of Internet2 are planning to
filter out Internet2 technology in such a way
that there is plenty of room for everyone.
C. SOCIAL MEDIA AND WEB 2.0
1. Social media are providing opportunities and
challenges to today’s businesses.
a. Companies can collaborate with customers
on products, service, and promotion.
b. Its believed that if businesses don’t have a
social media presence in the next three to
Bonus B - Using Technology to Manage Information
B-24
PPT B-25
Social Media
SOCIAL MEDIA
B-25
LO B-3
Millions have developed online profiles on social
networking sites like Facebook and Twitter.
Social media is thought to be the future of
successful businesses.
Manhattans 4food relies on social media as
customers create products and use their phones
to save their creations in the restaurants
database.
Bonus B - Using Technology to Manage Information
B-25
five years, they won’t survive.
c. Employees’ productivity may go down as
they use social media.
d. Also, the company cannot control all the
content.
3. WEB 2.0 is the set of tools that allow people to
build social and business connections, share in-
formation, and collaborate on projects online (in-
cluding blogs, wikis, social networking sites, and
other online communities, and virtual worlds).
a. YouTube and Twitter are among the largest
Web 2.0 businesses.
D. WEB 3.0
1. The Internet is evolving into a new generation
that learns about you and pushes information it
“thinks” you might like.
2. WEB 3.0 is a combination of technologies that
adds intelligence and changes how people in-
teract with the Web; includes the semantic Web,
mobile Web, and immersive Internet.
a. The semantic web refers to powerful intelli-
gent decision-making applications.
b. The mobile web allows users to use the In-
ternet wherever they want.
c. The immersive Internet includes virtual
worlds, augmented reality, and 3-D environ-
ments.
d. The Internet of Things includes technology
that enables ordinary objects to be connect-
ed to the Internet.
Bonus B - Using Technology to Manage Information
B-26
PPT B-26
Web 2.0
WEB 2.0
B-26
LO B-3
Web 2.0 -- The set of
tools that allow people
to build social and
business connections,
share information and
collaborate on projects
online.
YouTube and Twitter
are among the largest
Web 2.0 companies.
PPT B-27
Americans and Social Networks
AMERICANS and
SOCIAL NETWORKS
Percentage of Americans with Profiles by Year
Source: Statista, www.statista.com, accessed November 2014.
B-27
LO B-3
PPT B-28
Americans and Social Networks
AMERICANS and
SOCIAL NETWORKS
Number of Americans with Profiles by Age
B-28
Source: Investors Business Daily, www.investors.com, accessed November 2014.
LO B-3
PPT B-29
Using Social Media to Reach Cus-
tomers
TEXT FIGURE B.5
Tips for Using Social Media to
Partner with Customers
USING SOCIAL MEDIA to
REACH CUSTOMERS
B-29
LO B-3
PPT B-30
Web 3.0
WEB 3.0
B-30
LO B-3
Web 3.0 -- A combination of
technologies that adds
intelligence and changes how
people interact with the Web
and vice versa.
As you pull data, the system
learns about you and your
interests and pushes
information you may like to
you.
PPT B-31
Components of Web 3.0
COMPONENTS of WEB 3.0
B-31
LO B-3
1) Semantic Web
2) Mobile Web
3) Immersive Internet
PPT B-32
The Intelligence of Apps
The INTELLIGENCE of APPs
What App Developers Dont Tell You
B-32
LO B-4
1. Were still learning.
2. We track your every move.
3. Some apps can cause
security headaches.
4. You dont need a lot of apps.
5. You cant use many apps at
work!
PPT B-32
The Internet of Things
INTERNET of THINGS
B-33
LO B-3
Its not just computers, phones, and tablets that
are connected online now.
The Internet of Things refers to technology that
enables ordinary objects to be connected to the
Internet.
There are Wi-Fi-based home networks that can
secure, light, and control the climate of your
home.
Bonus B - Using Technology to Manage Information
B-27
learning objective 4
Explain virtual networking and discuss the benefits and drawbacks for cloud
computing.
IV. VIRTUAL NETWORKING AND CLOUD COMPUTING
1. VIRTUAL NETWORKING is a process that al-
lows software-based computers to run multiple
operating systems and programs, and share
storage.
a. Virtual networking can be either external or
internal.
i. External networking treats the network
as a single pool of resources that can be
accessed regardless of its physical com-
ponents.
ii. Internal networking shares the resources
of one central computer.
b. This gives companies ready access to up-
date system software and fix problems.
2. CLOUD COMPUTING is a form of virtualization
in which a company’s data and applications are
stored at offsite data centers that are accessed
over the Internet (the CLOUD).
a. The data aren’t necessarily stored in a single
data center; portions could be in a series of
centers anywhere.
b. The data are easily accessible from any
computer with an Internet connection.
Bonus B - Using Technology to Manage Information
B-28
test
prep
PPT B-33
Test Prep
TEST PREP
B-34
How do computer networks change the way
employees gather information?
What is the Internet of Things?
PPT B-34
Virtual Networking and Cloud
Computing
VIRTUAL NETWORKING
and CLOUD COMPUTING
B-35
LO B-4
Virtual Networking -- A process that allows
software-based networked computers to run multiple
operating systems and programs, and share storage.
Cloud Computing -- A form of virtualization which
stores a company
s data and applications at off-site
data centers accessed over the Internet.
page-pfe
Bonus B - Using Technology to Manage Information
B-29
c. The text uses the example of storing a
school project on a cloud to work on it at
multiple locations.
3. There are THREE TYPES OF CLOUD COM-
PUTING: (1) private, (2) public, and (3) hybrid
clouds.
4 The ADVANTAGES of cloud computing are:
a. Reduced software costs
e. Access
V. EFFECTS OF INFORMATION TECHNOLOGY
ON MANAGEMENT
A. HUMAN RESOURCE ISSUES
1. Because it replaces many bureaucratic func-
tions, technology makes the work process more
efficient.
a. One challenge for human resource manag-
ers is to RECRUIT EMPLOYEES who know
how to use the new technology or TRAIN
those who already work in the company.
b. Some companies OUTSOURCE technical
training.
page-pff
Bonus B - Using Technology to Manage Information
B-30
lecture enhancer B-7
SHARING IN SILICON VALLEY
In most industries, competitors don’t share their intel. That’s
what makes Silicon Valley a bit differentbut not everyone is
willing to release their information. (See the complete lecture
enhancer on page B.65 of this manual.)
PPT B-35
Advantages of Cloud Computing
ADVANTAGES of
CLOUD COMPUTING
B-36
LO B-4
1) Reduced software
costs
2) Improved security
3) Flexible capacity
4) Lower equipment costs
5) Easier access
PPT B-36
Disadvantages of Cloud Computing
DISADVANTAGES of
CLOUD COMPUTING
B-37
PhotoCredit:PeterBaer
LO B-4
1) Security breaches
2) Stability
3) Control of Data
PPT B-37
Top Cloud Applications
TOP CLOUD APPLICATIONS
B-38
Source: Investors Business Daily, www.investors.com, accessed November 2014.
LO B-4
test
prep
PPT B-38
Test Prep
TEST PREP
B-39
How do computer networks change the way
employees manage information?
What are the benefits and drawbacks of cloud
computing?
PPT B-39
Contemporary Issues in
Technology
CONTEMPORARY ISSUES in
TECHNOLOGY
B-40
LO B-6
HR managers need to
recruit workers who are tech
savvy and can train others.
Technology makes
telecommuting available to
almost all companies.
TEXT FIGURE B.6
When Information Technology Al-
ters the Workplace
This text figure illustrates how information technology changes
the way managers and workers interact.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.