Bonus Chapter B Using Technology to Manage Information McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Bonus Chapter B LEARNING GOALS 1. Outline the changing role of business technology. 2. List the types of business information, identify the characteristics of useful information, and discuss how data are stored and mined. 3. Compare the scope of the Internet, intranets, extranets, and virtual private networks and explain how broadband technology enabled the evolution to Web 2.0 and 3.0. B-2 Bonus Chapter B LEARNING GOALS 4. Review the computer hardware most frequently used in business. 5. Classify the types of computer software most frequently used in business. 6. Evaluate the human resource, security, privacy, and stability issues affected by information technology. B-3 Profile CHRIS HUGHES Facebook • Hughes attached to two of the biggest recent tech triumphs — Facebook and the social media arm of President Barack Obama’s campaign. • Had an ability to detect the features that could develop Facebook as a brand. • Launched Jumo to connect nonprofits and charities with prospective donors. B-4 Bonus Chapter B NAME that COMPANY This company used social media to build its business. Its customers design new products, name them, and enter them in the company’s database. Customers may even make YouTube commercials that are featured on the company’s video wall. If other customers buy the new product, the creator gets a small store credit. Name that company! B-5 Evolution from Data Processing to Business Intelligence TECHNOLOGY in the 1970s LG1 • Data Processing (DP) -- Name for business technology in the 1970s; primarily used to improve the flow of financial information. • Data are the raw, unanalyzed and unorganized facts and figures. • Information is processed and organized data that managers can use for decision-making. B-6 Evolution from Data Processing to Business Intelligence TECHNOLOGY in the 1980s LG1 • Information Systems (IS) -- Technology that helps a company do business (i.e. ATMs and voicemail). • In the late 1980s, business technology became known as information technology. • Information Technology (IT) -- Technology that helps change business by allowing companies to use new methods. B-7 Evolution from Data Processing to Business Intelligence LG1 TECHNOLOGY in the EARLY 2000s • Business Intelligence (BI) -Any variety of software applications that analyze an organization’s raw data and take useful insights from it. • BI helps businesspeople focus on what’s important in the organization such as deciding how to react to problems and opportunities. B-8 Evolution from Data Processing to Business Intelligence LG1 FURTHER EVOLUTION What’s in Store for BI 1. Advanced tools will be mainstream. 2. Mobile BI will be recharged. 3. Facebook will change how teams collaborate. 4. Economic recovery causes BI budget growth. 5. Upgrade fever! Source: Information Week, January 31, 2011. B-9 How Information Technology Changes Businesses LG1 TECHNOLOGY BRINGS CHANGE • IT allows a business to serve the customer whenever and wherever they want. • As IT broke time and location barriers, it created new organizations and services that are independent of location. B-10 Evolution from Data Processing to Business Intelligence LG1 TOP U.S. CITIES by HIGH-TECH EMPLOYMENT City # of People Employed by High-Tech Firms New York 310,000 Washington, D.C. 295,000 San Jose/Silicon Valley 225,000 Boston 190,000 Dallas-Fort Worth 175,000 B-11 Progress Assessment PROGRESS ASSESSMENT • How has the role of information technology changed since the days when it was known as data processing? • How has information technology changed the way we do business? B-12 Types of Information LG2 KEY TYPES of BUSINESS INFORMATION AVAILABLE • Business process information • Physical-world observations • Biological data • Public data • Data that indicate personal preferences or intentions B-13 Managing Information LG2 FOUR CHARACTERISTICS that MAKE INFORMATION USEFUL 1. Quality 2. Completeness 3. Timeliness 4. Relevance B-14 Managing Information TOP SITES to KEEP YOU CONNECTED LG2 • Skype • Google Docs • Basecamp • SurveyMonkey Source: Entrepreneur, July 2010. B-15 Organizing E-Mail and Electronic Files LG2 EFFECTIVELY USING YOUR ELECTRONIC FILES • Use your e-mail program’s organizing tools. • Use consistent file names. • Use online backup services. • Use desktop search software. B-16 Storing and Mining Data LG2 HOW DO YOU ORGANIZE DATA GLUT? • A data warehouse stores data on a single subject for a firm over a specific period. • Data mining is a technique for looking for hidden patterns and unknown relationships in the data. • Tools include Yahoo Pipes that can help companies mine the web to get correct data. B-17 Progress Assessment PROGRESS ASSESSMENT • What types of information are available to businesses today? • What are the four characteristics of information that make it useful? • What is data mining and how do businesses use it? B-18 The Road to Knowledge: The Internet BEYOND the INTERNET LG3 • Intranet -- A companywide network closed to public access that uses Internet-type technology. • Extranet -- A semiprivate network that lets more than one company access the same information or allows people on different servers to collaborate. • Virtual Private Network (VPN) -- A private data network that creates secure connections, or tunnels, over regular Internet lines. B-19 Broadband Technology INCREASING INTERNET POWER LG3 • Broadband Technology -- Provides a continuous connection to the Internet that allows users to send and receive mammoth video, voice, and data files faster. • Internet2 – Private Internet reserved for research purposes; runs more that 22,000 times faster than today’s public infrastructure. B-20 Broadband Technology BROADBAND CAPS LG3 • As people use more bandwidth to stream media, ISPs have been placing caps on how much a customer can use. • Average usage is well below caps. B-21 Social Media and Web 2.0 SOCIAL MEDIA LG3 • Millions have developed online profiles on social networking sites like Facebook and Twitter. • Social media is thought to be the future of successful businesses. • Manhattan’s 4food relies on social media as customers create products and use their phones to save their creations in the restaurant’s database. B-22 Social Media and Web 2.0 WEB 2.0 LG3 • Web 2.0 -- The set of tools that allow people to build social and business connections, share information and collaborate on projects online. • YouTube and Twitter are among the largest Web 2.0 companies. B-23 Social Media and Web 2.0 LG3 AMERICANS and SOCIAL NETWORKS Number of Americans with Profiles by Year Source: Investors Business Daily, June 17, 2011. B-24 Social Media and Web 2.0 LG3 AMERICANS and SOCIAL NETWORKS Number of Americans with Profiles by Age Source: Investors Business Daily, June 17, 2011. B-25 Web 3.0 WEB 3.0 LG3 • Web 3.0 -- A combination of technologies that adds intelligence and changes how people interact with the Web and vice versa. • As you pull data, the system learns about you and your interests and pushes information you may like to you. B-26 Web 3.0 COMPONENTS of WEB 3.0 LG3 1) Semantic Web 2) Mobile Web 3) Immersive Internet B-27 Progress Assessment PROGRESS ASSESSMENT • How do computer networks change the way employees gather information? • What is an enterprise portal? B-28 Mobile Devices LG4 MOVING from a COMPUTERDOMINANT ENVIRONMENT • We are moving to post-PC applications designed to connect users to the Internet. Devices include: - Smart phones: iPhone - Notebooks and in-dash computers in cars - iPads and other tablets B-29 Mobile Devices LG4 FASTEST-GROWING CELL PHONE ACTIVITIES • Using downloaded applications • Accessing social networking sites • Accessing news • Listening to music • Using e-mail B-30 Mobile Devices LG4 The INTELLIGENCE of APPs What App Developers Don’t Tell You 1. We’re still learning. 2. We track your every move. 3. Some apps can cause security headaches. 4. You don’t need a lot of apps. 5. You can’t use many apps at work! B-31 Computer Networks COMPUTER NETWORKS LG4 • Network Computing System -- Computer systems that allow personal computers (clients) to obtain needed information from databases on a central computer (server). • Networks can be expensive. B-32 Virtualization and Cloud Computing LG4 VIRTUALIZATION and CLOUD COMPUTING • Virtualization -- A process that allows networked computers to run multiple operating systems and programs through a central computer at the same time. • Cloud Computing -- A form of virtualization which stores a company’s data and applications at off-site data centers accessed over the Internet. B-33 Virtualization and Cloud Computing LG4 ADVANTAGES of CLOUD COMPUTING 1) Reduced software costs 2) Improved security 3) Capacity 4) Equipment 5) Access B-34 Virtualization and Cloud Computing LG4 DISADVANTAGES of CLOUD COMPUTING 1) Security breaches 2) Stability 3) Control of Data Photo Courtesy of: Peter Baer B-35 Virtualization and Cloud Computing LG4 CLOUDS in the OFFICE Companies Using Cloud Computing Source: Investors Business Daily, June 3, 2011. B-36 Virtualization and Cloud Computing TOP CLOUD APPLICATIONS LG4 Source: Investors Business Daily, June 3, 2011. B-37 Software LG5 SOFTWARE: TELLING the COMPUTER WHAT to DO • Shareware -- Is copyrighted, but is distributed free of charge with a request that users send a specific fee to the developer if they decide to use it. • Public Domain Software (Freeware) -- Software that is free for the taking. • SharewareJunkies lists popular programs. B-38 Progress Assessment PROGRESS ASSESSMENT • How do computer networks change the way employees gather information? • What are the major types of computer software used in business? B-39 Human Resource Issues LG6 CONTEMPORARY ISSUES in TECHNOLOGY • HR managers need to recruit workers who are tech savvy and can train others. • Technology makes telecommuting available to almost all companies. • Nanobots are mobile workers who are nearly autonomous. B-40 Security Issues VIRUSES and PHISHING LG6 • Virus -- A piece of programming code inserted into other programming that usually lies dormant until triggered; then causes unexpected, undesired events. • Phishing attempts to trick victims into giving important information to a bogus website. B-41 Security Issues LG6 HOW to PROTECT YOURSELF AGAINST PHISHING • Don’t respond to emails requesting personal information. • Keep your computer updated with anti-virus software. • Never provide or verify personal information. • Never send sensitive personal information over e-mail. • Check your monthly statements. Source: Entrepreneur, May 2010. B-42 Security Issues LAWS and the INTERNET LG6 • Legal issues surrounding Internet use: - Copyright - Pornography - Harassment - Use of Internet for scams • Cybercrimes cost the U.S billions each year. B-43 Security Issues CYBERTERRORISM LG6 • Cyberterrorism is the idea that terrorist hackers could shut down: - Entire communications - Money supply - Electricity - Transportation B-44 Privacy Issues LG6 PRIVACY ISSUES in TECHNOLOGY • E-mail can be snooped or information stolen. • Personal information stored can be stolen. • Site owners can share your information without your permission. • Cookies can track your movement around the web. B-45 Progress Assessment PROGRESS ASSESSMENT • How has information technology changed the way people work? • What management issues have been affected by the growth of information technology? B-46