• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/73

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

73 Cards in this Set

  • Front
  • Back

operational effectiveness

perfoming same task better than rivals

strategic positioning

performing different tasks than rivals, or same tasks in a different way

operational effectiveness vs strategic positioning?

OE means lower cost, SP means higher value

competitive advantage

firm can outperform rivals financially

sustainable competitive advantage

firm consistently financially outperforms industry averages

resource view of competitive advantage?

V(aluable resources)


R(are)


hard to I(mimitate)


hard to S(ubstitute)

8 ways to sustain competitive advantage?

differentiation, brand, imitation-resistant


scale, switching costs, network effects


distribution channels, patents

what does VCA stand for?

value chain analysis

VCA Model

pinpoint critical points within the primary and support activities within a firm, and determines how to implement IT to improve them, in order to help a firm have competitive advantage

how many primary activities are in the VCA model and what are they?

5! inbound logistics, outbound logistics, operations, marketing/sales, service activities

how many support activities are in VCA and what are they?

4, admin, HR, procurement, tech development

Competitive Forces (5 Forces) Model

buyer power, supplier power, threat of new entrants, threat of subtitutes, intensity of rivalry

straddling?

When a firm tries toadopt the business model of a successful rival while still maintaining itsexisting model.

What are Netflixsources of competitive advantage?


strong brand,their huge long tail, their collaborative filtering data (Cinematch),and their scale of operations (huge consumer base and distribution)


What is Netflix's churnrate?


Netflix’s churn rateis 4%,


Innovator’s Dilemma


managers can listen to consumers,invest in existing successful business, and build upon those aspects, but thismay ultimately bite them in the ass, because it means that they mightaccidentally ignore a rival with a “DISTRUPTIVE INNOVATION.”


Two Characteristics of Disruptive Tech:


1. Theyhave a set of performance attributes that existing customers don’t value yet


2. Overtime, they will invade established markets


Metcalfe’s Law:


o moreusers = more value



Three Main Sources of Network Effect Benefits in story form.


Users exchange info whichattracts even more users -> more users attract other firms who offer complimentarybenefits and add-ons -> the network grows larger, and increases your stayingpower because it’s more difficult for rivals to square up on you


What is TCO?

An economic measure of the full costof owning a product (usually used in terms of hardware and software), includingdirect costs (purchase price) + indirect costs of training, support, andmaintenance.



How much of TCO is hardware/software?

20%, the rest being indirect costs like maintenance and upgrades

§ What is Web 2.0?


Internetservices that foster collaboration and information sharing. Differs from Web1.0 specifically in that it has a focus on sharing, rather than Web 1.0’s focuson transactions and static activity.


Why is Wikipedia of increasing importance to firms?


Organizationscan seek to harness the collective intelligence (wisdom of crowds) of onlinecommunities. The openness of wikis also acts as a mechanism for promotingorganizational transparency and accountability.


What is the most important part of the social network?

the FEED.

What are the main things you must refer to when training employees about social media use?

“Three R’s.” Respect,Responsibility, Representation


Three V's of Big Data?

Variety, Velocity, Volume


What are the main reasons we've starting shifting to a sharing economy?

§ We have gotten comfortabletransacting through digital interfaces. We’re used to the idea of digitaltransactions.




§ Consumerization of digital. Shift toconsumers, wherein big technologies are developed for consumers first,and then afterwards being adapted for big business.




§ Infrastructure of trust, upon which we can layer a platform.Reviews, real world social capital, digitized trust.


What is IT infrastructure's function?

ITInfrastructure provides a platform for supportingall information systems in the business.


6 components of IT infrastructure?

hardware, software, data management tech,networking/telecomm, PEOPLE, procedures


Moore’s Law

microprocessing power! computer power doubles after every 18 months. this is leading to rise of nanotechnology, because we can now store data in much smaller physical chips

Law of Mass Digital Storage

amountof data being stored each year doubles. there is so much stored datadude


3 technology drivers?

[network economics, declining telecommcosts, tech standards]


7 Current Hardware Trends?

[mobile,nano, grid, virtualization, cloud, autonomic, green]


Grid Computing?

connectinggeographically remote computers into a single network, combine computing powerand create a virtual supercomputer. :) cost savings, speed, agility


Virtualization

singlephysical resource can act as multiple resources. think: Smith VMWare! runningmultiple OS’s one one physical asset


autonomic computing

developingsystems that can heal and configure themselves, for example: self-updatingantivirus software


2 Current Software Trends?

[OSS, Cloud]


What is Hadoop, and what can it do?

Hadoop is a type of OSS (open source software). It can analyze massive amounts of raw information better than traditional, highlystructured databases.


What are the benefits of cloud computing?

veryscalable, because it’s “on demand” computing. able to increase or decreaseamount of users depending on your needs. SERVICE BASED, SCALABLE, SHARED POOLOF RESOURCES.


What are current disadvantages of cloud computing?

management (TCO, who controls IT infrastructure?, how should departmentbe organized? how are costs allocated?), monitoring, security.


SaaS

software as a service – themost restrictive because you have no control over anything. but it’s theeasiest to use. only need a thin client and access to the internet and thirdparty provider.


PaaS

you’ll beable to go on the provider’s site and use their application packages todevelop your own models. they have their own software and programs that you canuse to develop your own apps with.


IaaS

use thirdparty provider only as infrastructure, i.e. HARDWARE and SOFTWARE and DATABASETECH and NETWORKING. deploy your own applications onto the third partyinfrastructure.


Deployment Models for the Cloud?

[Public, Private,Hybrid, Community]


Hybrid Cloud

combinationof two or more clouds (private, public, community) that remain unique entitiesbut are bound together


Community/vertical


shared byseveral organizations that supports a specific community with shared concerns(mission, security requirements).


DBMS?

this is what creates, maintains, and manipulates databases

What is the most common language used for creating and maintaining databases?

SQL

What is the data hierarchy, from smallest to largest?

field/column > row/record > table/file > database

challenges with traditional data file environment?

data redundancy, data inconsistency, poor security, lack of "sharing" capabilities

Relational Databases

Multipletables related by common keys, representedby a two-dimensional table called a relation or file.


What are the three main capabilities of a DBMS?

[Data Definition Language, Data Dictionary, Data ManipulationLanguage]


DDL?

data definition language: DDL creates skeleton of entities, creates structure of database


Data Dictionary?

DataDictionary contains description of each aspect, store definitions of dataelements


Database Manipulation Language

o DML helpcreate, retrieve, update, delete. DML = CRUD


What is CRUD?

the things that DML can do. Create, Retrieve, Update, Delete

Primary Key VS Foreign Key?

o primarykey is the key that differentiates/uniquely identifies a table of data, andthat primary key is called a….


o foreignkey when it is used in a different table as lookup field to identify recordsfrom original table


Data warehouses?

o STOREcurrent and historical data from many! transactional systems


o consolidatesand standardizes info, but once data is added to the data warehouse, it cannotbe updated or altered at all


o datawarehouses will provide queries and analysis and reporting tools


Data marts?

o summarizedor highly focused portion of firm’s data for very specific use by a limitedpopulation of users

o morefocused, used by specific department, because it focuses on a single subject orline of business

Does a collection of data marts make up a data warehouse?

NO, because data warehouses have extra data that doesn't necessarily have to exist within a data mart.

Data mining vs data analytics?

Data Mining is DISCOVERY DRIVEN. determines unknown properties aboutdata. data mining helps users find hiddenpatterns, relationships in large databases and infers rules to predict dafuture. different from analytics because analystics looks at data to find an answer to a hypothesis, whereas mining has no hypothesis and seeks out hidden patterns.

Why are info security risks on the rise?

current interconnectedness


computers more available


hacking skills easier to acquire now


organized cyber crime, CYBER GANGS!!!


lack of management support

What are the types of malicious software?

Virus / Worm / Spyware / Key Loggers

Computer Crimes

DoS, DDoS, Identity Theft, Phishing, Pharming, Zero-Day Attacks

DoS vs DDoS?

Denial of Service (DoS): floodingserver with hella false requests, which ultimately crash the network.


DDoS is just DoS on steroids, because it uses multiple computers to launch more than one attack at once.


Phishing

setting up fake websites or sending emails that look legitimate, askingfor confidential personal data. remember what happened to your account onneopets?? they tricked you out of your password


Pharming

o phishingon steroids. even when you put in aspecific website, it will take you to a bogus website.


What are the three types of data analytics?

[descriptive,predictive, prescriptive]

Ecommerce vs ebusiness?

Ecommerce involves transactions, while ebusiness does not.

What are the revenue models of ecommerce?

Subscription, Advertising, Sales, Free or Freemium, Transaction Fees, Affiliate

What are trojans?

Trojans are types of viruses that auser downloads willingly, because they think it’s something else. It’sdisguised! Like the Trojan horse


Virus vs Worm? Which is worse?

worms are much worse than a virus because it travels through the network, goingfrom one system to another. these can’t be quarantined like viruses. they canscan and install themselves into your system


What is WISP?

written information security policy.determines AUP, acceptable use policy. only 1/3rd of all UScompanies have a WISP. companies are paying more attention to data governancebecause a lot of databases are getting hacked.