SlideShare ist ein Scribd-Unternehmen logo
1 von 28
David Wilson
Angela Devenney
Brittany Matheny
  Brien Mccoy
 IT is used as communication tool to:
     Share information between staff, suppliers, and
       consumers.
    1970’s Information Technology was know as DP.
   Data VS. Information.
   1980’s Business Tech (BT) introduced tools like atm’s
    and voicemail
   Then after the 1980’s (BT) was know as (IT) information
    tech.
   CIO helps businesses use tech for communication
 Allows for online paying and ordering
 How it changed the entertainment
  industry:
    40 year ago you had to go to a movie
     theater
    Allows for video ordering
    Allows for downloading on computer, iPod,
     or cell phone
 Broke time and location barrier
   NASDAQ
 Knowledge makes info useful
 Business Intelligence – software
  applications that analyze an organization’s
  raw data
 BI changes traditional flow of info:
    Used to train workers
    Provides insights
 Business process information
 Physical world Observation
 Biological data
 Public data
 Data that indicates personal references or
 intention
 Tips for organizing E-mail and electron
 files
   Use your e-mail program’s organizing
    tools
   Use consistent file names
   Use online backup services
   Use desktop search software
 Data Warehouse:
  Stores data on a single subject over time
  Purpose is to get data out


 Data Mining:
  Looking for hidden patterns and
   relationships among data
 The road to knowledge


 Network of computer networks


 Was a one to one communication tool


 Now it is a one to many broadcast tool
 Companywide network, closed to public
  access
 Keeps unwanted sources out
 Uses firewalls
 Allows for interactive apps
 Broader version of an Intranet
 Allows for data sharing which encourages
  collaboration between companies
 Good for:
   Same information access
   Processing orders
   Invoices
   payments
 Secure system used with extranets
 Reserved solely for the network
 Issues with Dedicated lines:
   Expensive
   limit extranet use
   Often too time consuming
 Private data network
 Creates secure connections or tunnels
 Advantages of (VPNs):
   Same capabilities as extranets
   Cheaper than extranets
   Allows for on-demand networking
   Keeps corporate networks secure
 Make information available in one place
 Gives users access to their area of the
  intranet
 Advantages:
    Centralizes information
    Serves as entry point
    Allows access according to one’s role
 Allows a continuous connect to the internet
 Sends and receives:
   Video
   Voice
   Data files
 Runs 22000 times faster than today’s
  internet
 Supports heavy duty apps
 Key element
    very-high-speed backbone network
    service vBNS
 Helps remote medical specialists
 Over 325 member universities
 Social Networking
   Inexpensive way to get exposure
   Tools for collaboration between businesses and
    consumers
 Web 2.0
   Tools used to build social and business connection
   Share information & collaborate on projects online
 Examples
   YouTube, Twitter, My space, facebook
 Hardware includes:
      computers
      mobile phones
     Printer
     Scanners
     fax’s
      PDA’s
 CUTTING THE CORD
   Today most experts would agree that people are
      moving away from just using their PC’s to
      connect. Nowadays people are also using Iphones,
      netbooks, blackberry’s, etc.
 Computer Networks:
   Connect people to people and people to data
   Allow companies & people to save time & money
   Have drawbacks, maintaining a fleet of PC’s is
    expensive, also you lose productivity every time you
    update, troubleshoot, or train a new employee how to
    use it
   Some companies are now looking for other options
   One option is hybrid of mainframe & network
    computing
 Thin client networks
      Software changes & upgrades need to be made only on the
       server, so cost can be reduced by 20%
   Rent software & hardware access
 Virtualization & Cloud Computing
   Process that allows networked computer to run
    multiple operating systems & programs through one
    central computer at the same time
   Allows for virtualization but helps with limiting amount
    of data share
   Often sold for a monthly fee
 Turn Technology off when not in use




 Buy programs like surveyor, which shut down
 computers in a office at the push of a button
 Computer software tells the computer what to do
 Shareware
   Copyrighted
   Distributed free of charge but user usually sends a fee to he
      developer if the program meets their needs
 Public Domain Software
   Free for the taking without any fees
 Business people use software for writing
     Word processors
     Spread sheets
     Filing and retrieving data
     graphics
 Human Resource Issues
   Telecommuting has many different advantages:
      The company can save resources
      Easy of use for the employee
      Often increases productivity
      Great for parents that have children or people with
       disabilities
   Disadvantages:
      Less personal contact and confrontation
      Don’t know when to turn off work
      Sometimes part time alternative
 Nanobots
   People who are given the freedom to meet
    the organization’s goals on their own time
    and schedule
   Often given a project with a certain budget
    and time deadline, and are left alone to take
    the task on
   Biggest difficulty is finding the right person
    for the job
 Security Issues
   Viruses
      Pieces of programming code inserted into other programming
       that usually lies dormant until triggered to cause some
       unexpected event
      Antivirus protection is essential
   Phishing
      Scammers often embellish an e-mail message with a stolen logo
       for a well-recognized brand such as eBay, PayPal, or Citibank
      Scammers use phrases such as “Account Activation
       Required”, or “Your account will be cancelled if you do not
       verify”
      When the user clicks on it, the scammer can steal personal and
       private information
 Other threats include:
   Copyright laws being violated
   Sexual and racial harassment
   Cyber terrorism
     Terrorist hackers could shut down the entire
      communications, money supply, electricity, and
      transportation systems
     In 2002 there was a powerful electronic attack
      that crippled 9 of the 13 computers that manage
      internet traffic globally
 Privacy Issues
   Many company managers scan employee e-mail
    regularly (it is legal)
   Hackers can trap and read your email
   Makes easier to do unnecessary snooping
   Cookies:
     Pieces of information that the browser sends back to the
      server whenever you return to that web site
     Tracks your movement
     Spyware can be installed on your computer without your
      knowledge
 Stability Issues
   Being error free
      Hershey company’s $115 million dollar new computer
       system disrupted shipments one Halloween and caused a
       12% deficit that quarter
      Combination of human error, computer error,
       malfunctioning software, and an overly complex marriage of
       software, hardware, and networking equipment


 Management must face all of these challenges
 within the company in order to maintain a strong,
 growing company

Weitere ähnliche Inhalte

Was ist angesagt?

Foundation Course: Information Technology UNIT 4
Foundation Course: Information Technology UNIT 4Foundation Course: Information Technology UNIT 4
Foundation Course: Information Technology UNIT 4
University of Delhi
 
Foundation Course: Information Technology UNIT 2
Foundation Course: Information Technology UNIT 2Foundation Course: Information Technology UNIT 2
Foundation Course: Information Technology UNIT 2
University of Delhi
 
Using Digital Certificates To Secure Sensitive Communications At Uw Madison
Using Digital Certificates To Secure Sensitive Communications At Uw MadisonUsing Digital Certificates To Secure Sensitive Communications At Uw Madison
Using Digital Certificates To Secure Sensitive Communications At Uw Madison
Nicholas Davis
 
Internet and pc concepts
Internet and pc conceptsInternet and pc concepts
Internet and pc concepts
honeynut67
 
The Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD WorldThe Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD World
mkeane
 
Information communication technology (ict)
Information communication technology (ict)Information communication technology (ict)
Information communication technology (ict)
NILISSL
 

Was ist angesagt? (20)

Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
 
Societal impacts PART2
Societal impacts PART2Societal impacts PART2
Societal impacts PART2
 
Impact of ict on society
Impact of ict on societyImpact of ict on society
Impact of ict on society
 
Foundation Course: Information Technology UNIT 4
Foundation Course: Information Technology UNIT 4Foundation Course: Information Technology UNIT 4
Foundation Course: Information Technology UNIT 4
 
Foundation Course: Information Technology UNIT 2
Foundation Course: Information Technology UNIT 2Foundation Course: Information Technology UNIT 2
Foundation Course: Information Technology UNIT 2
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Using Digital Certificates To Secure Sensitive Communications At Uw Madison
Using Digital Certificates To Secure Sensitive Communications At Uw MadisonUsing Digital Certificates To Secure Sensitive Communications At Uw Madison
Using Digital Certificates To Secure Sensitive Communications At Uw Madison
 
Ch # 5, CISM
Ch # 5, CISMCh # 5, CISM
Ch # 5, CISM
 
Internet and pc concepts
Internet and pc conceptsInternet and pc concepts
Internet and pc concepts
 
Its cabinet jan24_2011
Its cabinet jan24_2011Its cabinet jan24_2011
Its cabinet jan24_2011
 
Modern ICT environment and secretaries
Modern ICT environment and secretariesModern ICT environment and secretaries
Modern ICT environment and secretaries
 
INTERNET AND E-COMMERCE
INTERNET AND E-COMMERCEINTERNET AND E-COMMERCE
INTERNET AND E-COMMERCE
 
Digital Natives: University Migration
Digital Natives: University MigrationDigital Natives: University Migration
Digital Natives: University Migration
 
Relevancy of ict to secretaries and reporters2
Relevancy of ict to secretaries and reporters2Relevancy of ict to secretaries and reporters2
Relevancy of ict to secretaries and reporters2
 
10 security concerns cloud computing
10 security concerns cloud computing10 security concerns cloud computing
10 security concerns cloud computing
 
Modern Technology
Modern TechnologyModern Technology
Modern Technology
 
Cyber Security and GDPR Made Easy
Cyber Security and GDPR Made EasyCyber Security and GDPR Made Easy
Cyber Security and GDPR Made Easy
 
Unit 3 activity 11 by zaw htoo aung
Unit 3 activity 11 by zaw htoo aung Unit 3 activity 11 by zaw htoo aung
Unit 3 activity 11 by zaw htoo aung
 
The Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD WorldThe Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD World
 
Information communication technology (ict)
Information communication technology (ict)Information communication technology (ict)
Information communication technology (ict)
 

Andere mochten auch (20)

BUS137 Chapter 14
BUS137 Chapter 14 BUS137 Chapter 14
BUS137 Chapter 14
 
How to bring a product to market, Part 2
How to bring a product to market, Part 2How to bring a product to market, Part 2
How to bring a product to market, Part 2
 
Chapter 02 MKT120 Strategies and Plan
Chapter 02 MKT120 Strategies and PlanChapter 02 MKT120 Strategies and Plan
Chapter 02 MKT120 Strategies and Plan
 
Chap008 BUS137
Chap008 BUS137Chap008 BUS137
Chap008 BUS137
 
Personal Finance
Personal FinancePersonal Finance
Personal Finance
 
Chapter 18 MKT120 Sales & Sales Mgmt
Chapter 18 MKT120 Sales & Sales MgmtChapter 18 MKT120 Sales & Sales Mgmt
Chapter 18 MKT120 Sales & Sales Mgmt
 
Chap005 BUS137
Chap005 BUS137Chap005 BUS137
Chap005 BUS137
 
Chap011 BUS137
Chap011 BUS137Chap011 BUS137
Chap011 BUS137
 
Chapter 15 MKT120 Retail
Chapter 15 MKT120 RetailChapter 15 MKT120 Retail
Chapter 15 MKT120 Retail
 
BUS137 Chapter 13
BUS137 Chapter 13BUS137 Chapter 13
BUS137 Chapter 13
 
Chap007 BUS137
Chap007 BUS137Chap007 BUS137
Chap007 BUS137
 
How to close an angel round
How to close an angel roundHow to close an angel round
How to close an angel round
 
Chap004 BUS137
Chap004 BUS137Chap004 BUS137
Chap004 BUS137
 
Legal Environment
Legal EnvironmentLegal Environment
Legal Environment
 
Bodeman personal finance_presentation1-1
Bodeman personal finance_presentation1-1Bodeman personal finance_presentation1-1
Bodeman personal finance_presentation1-1
 
The rise of the angels
The rise of the angelsThe rise of the angels
The rise of the angels
 
Chapter 13 MKT120 Pricing
Chapter 13 MKT120 PricingChapter 13 MKT120 Pricing
Chapter 13 MKT120 Pricing
 
Chap001 BUS137
Chap001 BUS137Chap001 BUS137
Chap001 BUS137
 
Chap006 BUS137
Chap006 BUS137Chap006 BUS137
Chap006 BUS137
 
Customer Development 1: Introduction
Customer Development 1: IntroductionCustomer Development 1: Introduction
Customer Development 1: Introduction
 

Ähnlich wie Technology

L25 network fundamentals
L25   network fundamentalsL25   network fundamentals
L25 network fundamentals
heidirobison
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProject
Kaley Hair
 
Introduction to internet, intranet and Extranet . Myths about internet
Introduction to internet, intranet and Extranet . Myths about internet  Introduction to internet, intranet and Extranet . Myths about internet
Introduction to internet, intranet and Extranet . Myths about internet
AyushJadon5
 
Cb12e basic ppt ch15
Cb12e basic ppt ch15Cb12e basic ppt ch15
Cb12e basic ppt ch15
Eric
 
iPads and other tablets for Legal Aid
iPads and other tablets for Legal AidiPads and other tablets for Legal Aid
iPads and other tablets for Legal Aid
Jane Ribadeneyra
 
Software. intranet. e crime
Software. intranet. e crimeSoftware. intranet. e crime
Software. intranet. e crime
juliakad84
 
Web tehnology
Web tehnologyWeb tehnology
Web tehnology
gurchet
 
Chapter 3 E Business
Chapter 3 E BusinessChapter 3 E Business
Chapter 3 E Business
UMaine
 

Ähnlich wie Technology (20)

Services and Products
Services and ProductsServices and Products
Services and Products
 
L25 network fundamentals
L25   network fundamentalsL25   network fundamentals
L25 network fundamentals
 
internet intranet and extranet
internet intranet and extranetinternet intranet and extranet
internet intranet and extranet
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProject
 
Introduction to internet, intranet and Extranet . Myths about internet
Introduction to internet, intranet and Extranet . Myths about internet  Introduction to internet, intranet and Extranet . Myths about internet
Introduction to internet, intranet and Extranet . Myths about internet
 
Cb12e basic ppt ch15
Cb12e basic ppt ch15Cb12e basic ppt ch15
Cb12e basic ppt ch15
 
202160902-Internet-Intranet-Extranet.ppt
202160902-Internet-Intranet-Extranet.ppt202160902-Internet-Intranet-Extranet.ppt
202160902-Internet-Intranet-Extranet.ppt
 
computer network technology in modern universe.
computer network technology in modern universe.        computer network technology in modern universe.
computer network technology in modern universe.
 
Computer network introduction
Computer network introductionComputer network introduction
Computer network introduction
 
When Worlds Collide: Ethics and Technology for Lawyers
When Worlds Collide: Ethics and Technology for LawyersWhen Worlds Collide: Ethics and Technology for Lawyers
When Worlds Collide: Ethics and Technology for Lawyers
 
iPads and other tablets for Legal Aid
iPads and other tablets for Legal AidiPads and other tablets for Legal Aid
iPads and other tablets for Legal Aid
 
Guard Era Security Overview Preso (Draft)
Guard Era Security Overview Preso (Draft)Guard Era Security Overview Preso (Draft)
Guard Era Security Overview Preso (Draft)
 
Network fundamentals
Network fundamentalsNetwork fundamentals
Network fundamentals
 
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
 
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
 
Software. intranet. e crime
Software. intranet. e crimeSoftware. intranet. e crime
Software. intranet. e crime
 
Web tehnology
Web tehnologyWeb tehnology
Web tehnology
 
Chapter 3 E Business
Chapter 3 E BusinessChapter 3 E Business
Chapter 3 E Business
 
Beekman5 std ppt_11
Beekman5 std ppt_11Beekman5 std ppt_11
Beekman5 std ppt_11
 
PC 106 Slide 1.pptx
PC 106 Slide 1.pptxPC 106 Slide 1.pptx
PC 106 Slide 1.pptx
 

Mehr von Deborah Oronzio (19)

Chapter 06 MKT120 B2B MKT
Chapter 06 MKT120 B2B MKTChapter 06 MKT120 B2B MKT
Chapter 06 MKT120 B2B MKT
 
Chapter 17 MKT120 Advertising, PR & Sales
Chapter 17 MKT120 Advertising, PR & SalesChapter 17 MKT120 Advertising, PR & Sales
Chapter 17 MKT120 Advertising, PR & Sales
 
Chapter 16 MKT120 IMC
Chapter 16 MKT120 IMCChapter 16 MKT120 IMC
Chapter 16 MKT120 IMC
 
Chapter 14 MKT120 Supply Chain Mgmt.
Chapter 14 MKT120 Supply Chain Mgmt.Chapter 14 MKT120 Supply Chain Mgmt.
Chapter 14 MKT120 Supply Chain Mgmt.
 
Chapter 12 MKT120 Services
Chapter 12 MKT120 ServicesChapter 12 MKT120 Services
Chapter 12 MKT120 Services
 
Chapter 11 MKT120 Product Development
Chapter 11 MKT120 Product DevelopmentChapter 11 MKT120 Product Development
Chapter 11 MKT120 Product Development
 
Chapter 10 MKT120 Branding and Pkg
Chapter 10 MKT120 Branding and PkgChapter 10 MKT120 Branding and Pkg
Chapter 10 MKT120 Branding and Pkg
 
Chapter 09 MKT120 MKT Research
Chapter 09 MKT120 MKT ResearchChapter 09 MKT120 MKT Research
Chapter 09 MKT120 MKT Research
 
Chapter 08 MKT120 STP
Chapter 08 MKT120 STPChapter 08 MKT120 STP
Chapter 08 MKT120 STP
 
Chapter 07 MKT120 Global MKT
Chapter 07 MKT120 Global MKTChapter 07 MKT120 Global MKT
Chapter 07 MKT120 Global MKT
 
Chapter 05 MKT120 Consumer Behavior
Chapter 05 MKT120 Consumer BehaviorChapter 05 MKT120 Consumer Behavior
Chapter 05 MKT120 Consumer Behavior
 
Chapter 04 MKT120 Mkt Environment
Chapter 04 MKT120 Mkt EnvironmentChapter 04 MKT120 Mkt Environment
Chapter 04 MKT120 Mkt Environment
 
Chapter 03 MKT120 Ethics
Chapter 03 MKT120 EthicsChapter 03 MKT120 Ethics
Chapter 03 MKT120 Ethics
 
Chapter 01 MKT120 Overview
Chapter 01 MKT120 OverviewChapter 01 MKT120 Overview
Chapter 01 MKT120 Overview
 
Chap010 BUS137
Chap010 BUS137Chap010 BUS137
Chap010 BUS137
 
Chap009 BUS137
Chap009 BUS137Chap009 BUS137
Chap009 BUS137
 
Chap003 BUS137
Chap003 BUS137Chap003 BUS137
Chap003 BUS137
 
Chap002 BUS137
Chap002 BUS137Chap002 BUS137
Chap002 BUS137
 
Personal Finance
Personal FinancePersonal Finance
Personal Finance
 

Kürzlich hochgeladen

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Kürzlich hochgeladen (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

Technology

  • 2.  IT is used as communication tool to:  Share information between staff, suppliers, and consumers.  1970’s Information Technology was know as DP.  Data VS. Information.  1980’s Business Tech (BT) introduced tools like atm’s and voicemail  Then after the 1980’s (BT) was know as (IT) information tech.  CIO helps businesses use tech for communication
  • 3.  Allows for online paying and ordering  How it changed the entertainment industry:  40 year ago you had to go to a movie theater  Allows for video ordering  Allows for downloading on computer, iPod, or cell phone  Broke time and location barrier  NASDAQ
  • 4.  Knowledge makes info useful  Business Intelligence – software applications that analyze an organization’s raw data  BI changes traditional flow of info:  Used to train workers  Provides insights
  • 5.  Business process information  Physical world Observation  Biological data  Public data  Data that indicates personal references or intention
  • 6.
  • 7.  Tips for organizing E-mail and electron files  Use your e-mail program’s organizing tools  Use consistent file names  Use online backup services  Use desktop search software
  • 8.  Data Warehouse:  Stores data on a single subject over time  Purpose is to get data out  Data Mining:  Looking for hidden patterns and relationships among data
  • 9.  The road to knowledge  Network of computer networks  Was a one to one communication tool  Now it is a one to many broadcast tool
  • 10.  Companywide network, closed to public access  Keeps unwanted sources out  Uses firewalls  Allows for interactive apps
  • 11.  Broader version of an Intranet  Allows for data sharing which encourages collaboration between companies  Good for:  Same information access  Processing orders  Invoices  payments
  • 12.  Secure system used with extranets  Reserved solely for the network  Issues with Dedicated lines:  Expensive  limit extranet use  Often too time consuming
  • 13.  Private data network  Creates secure connections or tunnels  Advantages of (VPNs):  Same capabilities as extranets  Cheaper than extranets  Allows for on-demand networking  Keeps corporate networks secure
  • 14.  Make information available in one place  Gives users access to their area of the intranet  Advantages:  Centralizes information  Serves as entry point  Allows access according to one’s role
  • 15.  Allows a continuous connect to the internet  Sends and receives:  Video  Voice  Data files
  • 16.  Runs 22000 times faster than today’s internet  Supports heavy duty apps  Key element  very-high-speed backbone network service vBNS  Helps remote medical specialists  Over 325 member universities
  • 17.  Social Networking  Inexpensive way to get exposure  Tools for collaboration between businesses and consumers  Web 2.0  Tools used to build social and business connection  Share information & collaborate on projects online  Examples  YouTube, Twitter, My space, facebook
  • 18.  Hardware includes:  computers  mobile phones  Printer  Scanners  fax’s  PDA’s  CUTTING THE CORD  Today most experts would agree that people are moving away from just using their PC’s to connect. Nowadays people are also using Iphones, netbooks, blackberry’s, etc.
  • 19.  Computer Networks:  Connect people to people and people to data  Allow companies & people to save time & money  Have drawbacks, maintaining a fleet of PC’s is expensive, also you lose productivity every time you update, troubleshoot, or train a new employee how to use it  Some companies are now looking for other options  One option is hybrid of mainframe & network computing
  • 20.  Thin client networks  Software changes & upgrades need to be made only on the server, so cost can be reduced by 20%  Rent software & hardware access  Virtualization & Cloud Computing  Process that allows networked computer to run multiple operating systems & programs through one central computer at the same time  Allows for virtualization but helps with limiting amount of data share  Often sold for a monthly fee
  • 21.  Turn Technology off when not in use  Buy programs like surveyor, which shut down computers in a office at the push of a button
  • 22.  Computer software tells the computer what to do  Shareware  Copyrighted  Distributed free of charge but user usually sends a fee to he developer if the program meets their needs  Public Domain Software  Free for the taking without any fees  Business people use software for writing  Word processors  Spread sheets  Filing and retrieving data  graphics
  • 23.  Human Resource Issues  Telecommuting has many different advantages:  The company can save resources  Easy of use for the employee  Often increases productivity  Great for parents that have children or people with disabilities  Disadvantages:  Less personal contact and confrontation  Don’t know when to turn off work  Sometimes part time alternative
  • 24.  Nanobots  People who are given the freedom to meet the organization’s goals on their own time and schedule  Often given a project with a certain budget and time deadline, and are left alone to take the task on  Biggest difficulty is finding the right person for the job
  • 25.  Security Issues  Viruses  Pieces of programming code inserted into other programming that usually lies dormant until triggered to cause some unexpected event  Antivirus protection is essential  Phishing  Scammers often embellish an e-mail message with a stolen logo for a well-recognized brand such as eBay, PayPal, or Citibank  Scammers use phrases such as “Account Activation Required”, or “Your account will be cancelled if you do not verify”  When the user clicks on it, the scammer can steal personal and private information
  • 26.  Other threats include:  Copyright laws being violated  Sexual and racial harassment  Cyber terrorism  Terrorist hackers could shut down the entire communications, money supply, electricity, and transportation systems  In 2002 there was a powerful electronic attack that crippled 9 of the 13 computers that manage internet traffic globally
  • 27.  Privacy Issues  Many company managers scan employee e-mail regularly (it is legal)  Hackers can trap and read your email  Makes easier to do unnecessary snooping  Cookies:  Pieces of information that the browser sends back to the server whenever you return to that web site  Tracks your movement  Spyware can be installed on your computer without your knowledge
  • 28.  Stability Issues  Being error free  Hershey company’s $115 million dollar new computer system disrupted shipments one Halloween and caused a 12% deficit that quarter  Combination of human error, computer error, malfunctioning software, and an overly complex marriage of software, hardware, and networking equipment  Management must face all of these challenges within the company in order to maintain a strong, growing company