...Preface Initiated in 1995 by Secretary of Defense, Dr. William Perry, and continued today by Secretary Rumsfeld, the SECDEF Corporate Fellows Program (SDCFP) is a long-term investment in transforming the DoD’s forces and capabilities. Annually, two senior officers with highly successful operational command and staff backgrounds from each Service are selected to receive their senior service college credit by training with Corporate America. The program’s intent is to allow officers to spend a year outside their traditional career paths to glean the best of change, innovation, and leading-edge business practices that could potentially transform DoD business and operational practices. To date, 65 corporate fellows have gone on to form a cadre of Service leaders, knowledgeable in the organizational and operational opportunities made possible by revolutionary changes in information and other technologies. To prepare for the fellowship, the fellows spend four weeks in training. Specifically, participating in lectures on current political and military topics such as strategies, technologies, and process improvement methodologies; meeting with senior DoD officials, Congressional delegates, business executives, etc; as well as taking part in a one-week graduate-level business overview provided by the University of Virginia’s Darden Graduate School of Business Administration. Following the fellows’ corporate assignment, formal outbriefs are provided to approximately forty senior...
Words: 13774 - Pages: 56
...NT 1210 M1 Case studies # 9 Dear Mr. Sheehan: I would like to thank you for agreement regarding my recommendations to the company about deploying a SAN at each branch office, since each office uses data, audio, video and graphic files that are shared by staff at each location. The SAN may incorporate NAS devices which we have evaluated with different vendors. As we conducted a further research in order to provide you with more detail specifications on SAN and NAS solutions, we were able to come up with the following information design in a form of questions and answers. What is required to implement a SAN and /or NAS? Storage-area networks (SANs) are composed of computers and remote storage devices. The computers are typically connected to the remote storage devices using SCSI over Fibre Channel (see Figure 1). Other implementations of SAN exist, but this is the most common. In a SAN, all the storage appears local, just as if the remote disk were directly connected to the computer and physically located inside the computer chassis. Network-attached storage (NAS) devices appear to the user as a remote drive letter or are named remote storage device. Typically, the operating system employs a protocol such as Network File System (NFS) or Common Internet File System (CIFS) to discover, log in, and transfer content to and from a storage device. NFS and CIFS both communicate over Ethernet. The user typically enters a username and password, and then is granted access to a particular...
Words: 7132 - Pages: 29
...of change ……………………………………………..……… 8 3. Future Orientation ……………………………………………………..…. 10 4. Industry analysis …………………………………………..………………. 12 5. Importance of Convergence in Telecoms Industry ……………. 16 6. Irish Telecom Industry Lifecycle ………………………………….…. 19 7. Strategic Alliances within Irish Telecom Market …………….… 23 Part 2: Analysis of Eircom’s Strategic Capabilities …………………...….…… 25 2.1 Resources and Competences …………………………………….……. 26 2.2 Eircom’s Cost efficiency …………………………………………….….. 30 2.3 Eircom’s Sustained Competitive Advantage …………………..… 31 2.4 Usage drivers: Innovation ………………………………………….….. 33 2.5 Importance of Knowledge Management ………………………..… 36 2.6 Benchmarking ………………………………………………………...……. 38 2.7 Advertising campaigns of Eircom ……………………………………. 39 2.8 Appraising Eircom’s Resources and Capabilities …………...….. 40 Part 3: Key Internal and External Factors …………………………...…………… 42 Part 4: Organisational purposes ……………………………………………………… 43 Part 5: Portfolio Analysis & Strategic Choices …………………………………… 45 Conclusion and Recommendations ……………………………………..…… 49 Appendix 1 Oliver Wyman Company’s Outline Appendix 2 Fixed Line, Mobile and Broadband Usage Appendix 3...
Words: 8366 - Pages: 34
...Roman G. Fall 2012 bsat 303: Final Exam Study Guide Note: The study guide should be used along with the classroom lectures I posted to Moodle, your personal notes from my lectures, and the information found within the chapters. HTML (Basic knowledge and example code) o Tags, Hyperlinks, Emails, Images o o Hyperlink Visit MTV o HTML – the language you use to create a Web site To insert an image Steps in Decision Support Systems o Decision support system (DSS) – a highly flexible and interactive system that is designed to support decision making when the problem is not structured o Decision support systems help you analyze, but you must know how to solve the problem, and how to use the results of the analysis o o Model management component – consists of both the DSS models and the model management system o Data management component – stores and maintains the information that you want your DSS to use o User interface management component – allows you to communicate with the DSS Types of Decisions (Structured, Nonstructured, Recurring, Nonrecurring) o Structured decision – processing a certain information in a specified way so that you will always get the right answer o Nonstructured decision – one for which there may be several “right” answers, without a sure way to get the right answer o Recurring decision – happens repeatedly o Nonrecurring (ad hoc) decision – one you make infrequently Artificial Intelligence, Geographic...
Words: 4354 - Pages: 18
...In a computer network evaluation it is important to cover various areas to determine which are satisfactory and which are in need of improvement. The following 15 evaluations will be used to access the current state of the network: 1. Evaluation of Client Computer Hardware In the evaluation of client computer hardware, this evaluation seeks to identify all client computer assets owned by the company. All laptops and desktops owned by the company should be made available as needed in order for the evaluation to be as accurate as possible. It will be necessary to perform a review of all client computers that connect to the company assets. These machines will be analyzed for speed, performance, and reliability. I will look for variations in hardware manufacturers. Depending on the circumstance, it can result in better TCO (Total Cost of Ownership) if client computers are limited to one or two manufacturers. In addition, machines that are broken, out of warranty, or outdated will be recommended for repair or replacement. 1. 2. Evaluation of Client Computer Software In the evaluation of client computer software, I will seek to identify all software that is installed on client computers and being used in the workplace. This evaluation can be performed using software metering in software such as Microsoft System Center Configuration Manager, if installed. If not installed, this information will be collected manually by viewing the installed software on each machine. ...
Words: 2399 - Pages: 10
...Chapter 1: Introduction to Computer Networks and Data Communications TRUE/FALSE 1. Data is information that has been translated into a form that is more conducive to storage, transmission, and calculation. ANS: T 2. ANS: F PTS: 1 Some people call computer terminals thick-client workstations. PTS: 1 3. A type of microcomputer-to-local area network connection that is growing in popularity is the wireless connection. ANS: T PTS: 1 4. To communicate with the Internet using a dial-up modem, a user’s computer must connect to another computer that is already communicating with the Internet. ANS: T PTS: 1 5. It is not possible to connect two local area networks so that they can share peripherals as well as software. ANS: F PTS: 1 6. Metropolitan area networks can transfer data at fast, LAN speeds but over smaller geographic regions than typically associated with a local area network. ANS: F 7. ANS: T 8. networks. ANS: T 9. ANS: F PTS: 1 The Internet is not a single network but a collection of thousands of networks. PTS: 1 One of the most explosive areas of growth in recent years has been cellular phone PTS: 1 By the 1970s, telephone systems carried more computer data than voice. PTS: 1 10. Network architectures are cohesive layers of protocols defining a set of communication services. ANS: T PTS: 1 11. The OSI model tells us what kind of wire or what kind of connector to use to connect the pieces of a network...
Words: 46505 - Pages: 187
...Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States SEVENTH EDITION Data Communications and Computer Networks A Business User’s Approach Curt M. White DePaul University Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States Data Communications and Computer Networks: A Business User’s Approach, Seventh Edition Curt M. White Editor-In-Chief: Joe Sabatino Senior Acquisitions Editor: Charles McCormick, Jr. Senior Product Manager: Kate Mason Editorial Assistant: Courtney Bavaro Marketing Director: Keri Witman Marketing Manager: Adam Marsh Senior Marketing Communications Manager: Libby Shipp Marketing Coordinator: Suellen Ruttkay Media Editor: Chris Valentine Art and Cover Direction, Production Management, and Composition: PreMediaGlobal Cover Credit: © Masterfile Royalty Free Manufacturing Coordinator: Julio Esperas © 2013 Course Technology, Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored or used in any form or by any means—graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information networks, or information storage and retrieval systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act—without the prior written permission of the publisher. For product information and technology assistance...
Words: 234459 - Pages: 938
...COURSE MODULE ABI 204 / ECOMM INTRODUCTION TO E-COMMERCE Unit 1) Introduction to E-Commerce Objectives In this chapter, you will learn about: • The basic elements of electronic commerce • Differences between electronic commerce and traditional commerce • Advantages and Disadvantages of E-Commerce • Business Process Suitability for E-Commerce • Economic forces that have created a business environment that fosters electronic commerce • The ways in which businesses use value chains to identify electronic commerce opportunities Traditional Commerce and Electronic Commerce To many people, the term electronic commerce means shopping on the part of the Internet called the World Wide Web. But it is much broader and encompasses many more business activities than just Web shopping. Electronic commerce refers to business activities conducted using electronic data transmission via the Internet and the World Wide Web. The three main elements of e-commerce are: • Business-to-consumer • Business-to-business • The transactions and business processes that support selling and purchasing activities on the Web Other categories include: consumer-to-consumer and consumer-to-government. Electronic Commerce Electronic Funds Transfers (EFTs) have been used by banks for many years. Electronic Data Interchange (EDI) occurs when one business transmits computer-readable data in a standard format to another business. Businesses who engage in EDI with each other are called trading...
Words: 8797 - Pages: 36
...Exam Name___________________________________ MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. 1. A characteristic or quality describing an entity is called a(n): 1. _______ A) attribute. B) key field. C) tuple. D) field. Answer: A Diff: 1 Page Ref: 230 2. The data hierarchy goes from bits and bytes to: 2. _______ A) fields, records, files, and databases. B) entities, attributes, fields, and records. C) records, entities, fields, and databases. D) fields, attributes, entities, and records. Answer: A Diff: 1 Page Ref: 230 3. In a ________ database, parts of the database are stored and maintained physically in one location and other parts are stored and maintained in other locations. 3. _______ A) fragmented B) contiguous C) split D) partitioned Answer: D Diff: 1 Page Ref: 242 4. The type of logical database model that treats data as if they were stored in two-dimensional tables is the: 4. _______ A) network DBMS. B) hybrid DBMS. C) relational DBMS. D) hierarchical DBMS. Answer: C Diff: 1 Page Ref: 236 5. Activities for detecting and correcting data in a database or file that are incorrect, incomplete, improperly formatted, or redundant are called: 5. _______ A) data cleansing...
Words: 7242 - Pages: 29
...Second Year - Third Semester 3.0.1 International Business - University Assessment 100 Marks Course Content 1. Overview of the International Business Process 2. PEST factors affecting International Business 3. Government influence on trade 4. International Trade Theories 5. FDI 6. Country Evaluation and Selection 7. Collaborative Strategies 8. International Marketing 9. International Trade Agreements 10. International Trade Organizations 11. Forex 12. International HR Strategies 13. International Diplomacy Reference Text 1. International Business – Daniels and Radebough 2. International Business – Sundaram and Black 3. International Business – Roebuck and Simon 4. International Business – Charles Hill 5. International Business – Subba Rao 3.0.2 Strategic management 100 Marks Course Content 1. Strategic Management Process: Vision, Mission, Goal, Philosophy, Policies of an Organization. 2. Strategy, Strategy as planned action, Its importance, Process and advantages of planning Strategic v/s Operational Planning. 3. Decision making and problem solving, Categories of problems, Problem solving skill, Group decision making, Phases indecision making. 4. Communication, Commitment and performance, Role of the leader, Manager v/s Leader, Leadership styles. 5. Conventional Strategic Management v/s Unconventional Strategic Management, The differences, Changed Circumstance 6. Growth Accelerators: Business Web, Market Power, Learning based. 7. Management Control, Elements,...
Words: 13742 - Pages: 55
...1. An IS auditor is reviewing access to an application to determine whether the 10 most recent "new user" forms were correctly authorized. This is an example of: A. variable sampling. B. substantive testing. C. compliance testing. D. stop-or-go sampling. The correct answer is: C. compliance testing. Explanation: Compliance testing determines whether controls are being applied in compliance with policy. This includes tests to determine whether new accounts were appropriately authorized. Variable sampling is used to estimate numerical values, such as dollar values. Substantive testing substantiates the integrity of actual processing, such as balances on financial statements. The development of substantive tests is often dependent on the outcome of compliance tests. If compliance tests indicate that there are adequate internal controls, then substantive tests can be minimized. Stop-or-go sampling allows a test to be stopped as early as possible and is not appropriate for checking whether procedures have been followed. 2. The decisions and actions of an IS auditor are MOST likely to affect which of the following risks? A. Inherent B. Detection C. Control D. Business The correct answer is: B. Detection Explanation: Detection risks are directly affected by the auditor's selection of audit procedures and techniques. Inherent risks usually are not affected by the IS auditor. Control risks are controlled by the actions of the company's management. Business...
Words: 97238 - Pages: 389
...MARKETING RESEARCH PROJECT [UAMM0091] By: UAMMOO91 (Samuel Poku-Bonsu) Course title: MARKETING Institution: University of Applied Management Lecturer: MR. SHANI BASHIRU Date of submission: 10TH JANUARY 2012 1|Page Table of Contents SECTION A ........................................................................................................................ 4 COMPANY INTRODUCTION ......................................................................................... 4 VODAFONE GHANA LTD .......................................................................................... 4 MICRO-ENVIRONMENT AUDIT ................................................................................... 5 MARKETING MIX ........................................................................................................ 5 PRODUCT .................................................................................................................. 5 PRICE ......................................................................................................................... 6 PLACE ........................................................................................................................ 9 PROMOTION ............................................................................................................. 9 PROCESS ................................................................................................................. 10 PEOPLE ..............................
Words: 11087 - Pages: 45
...Exam Name___________________________________ MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. 1) The six important business objectives of information technology are new products, services, and business models; customer and supplier intimacy; survival; competitive advantage; operational excellence; and: 1) _______ A) improved decision making. B) improved business practices. C) improved efficiency. D) improved flexibility. 2) Which of the following choices may lead to competitive advantage (1) new products, services, and business models; (2) charging less for superior products; (3) responding to customers in real time? 2) _______ A) 1 only B) 1 and 2 C) 2 and 3 D) 1, 2, and 3 3) An information system can be defined technically as a set of interrelated components that collect (or retrieve), process, store, and distribute information to support: 3) _______ A) decision making and control in an organization. B) the creation of new products and services. C) communications and data flow. D) managers analyzing the organization's raw data. 4) The three activities in an information system that produce the information organizations use to control operations are: 4) _______ A) information retrieval, research, and analysis. B) input, processing, and output. C) input, output, and feedback...
Words: 6583 - Pages: 27
...Intel Final Paper MGMT 480- Frankforter Executive Summary As the world’s “foremost semiconductor maker,” Intel Corporation has a reputation to uphold and a future to build. Founded in 1968, Intel has grown to a company of over 90,000 employees who operate Intel’s facilities in nearly fifty countries. Intel produces processors, motherboards, chipsets, network adapters, flash memory, software, storage devices, and wireless products. Many of us are the end-users of a wide variety of Intel’s products, but the Intel’s numerous other customers are primarily OEM manufacturers who utilize Intel’s components, end-user consumers (which includes individuals, large and small businesses, and service providers), and “other manufacturers, including makers of a wide range of industrial and communications equipment.” Intel has capitalized on its ability to lead the semiconductor industry by continuous innovation. Gordon Moore, one of Intel’s founders, introduced a principle that continues to guide Intel which states that “the number of transistors on a chip roughly doubles every two years.” In keeping with Moore’s Law, Intel’s key to success in the semiconductor industry has been constant innovation. Such a strategy has allowed Intel to remain a leader among competitors such as Texas Instruments, Advanced Micro Devices, International Business Machines, and Freescale Semiconductor, among others. The semiconductor industry is extremely competitive, but...
Words: 11699 - Pages: 47
...Essential of MIS (9th edition) Chapter 1 1) As discussed in the chapter opening case, the Yankees' use of information systems in their new stadium can be seen as an effort to achieve which of the primary business objectives? A) Operational excellence B) Survival C) Customer and supplier intimacy D) Improved decision making 2) Journalist Thomas Friedman's description of the world as "flat" referred to: A) the flattening of economic and cultural advantages of developed countries. B) the use of the Internet and technology for instantaneous communication. C) the reduction in travel times and the ubiquity of global exchange and travel. D) the growth of globalization. 3) The six important business objectives of information technology are: new products, services, and business models; customer and supplier intimacy; improved decision-making; competitive advantage; operational excellence, and: A) flexibility. B) survival. C) improved business practices. D) improved efficiency. 4) The use of information systems because of necessity describes the business objective of: A) survival. B) improved business practices. C) competitive advantage. D) improved flexibility. 5) Which of the following choices may lead to competitive advantage (1) new products, services, and business models; (2) charging less for superior products; (3) responding to customers in real-time? A) 1 only B) 1 and 2 C) 2 and 3 D) 1, 2, and 3 6) Verizon's implementation of a Web-based...
Words: 23003 - Pages: 93