Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
82 Cards in this Set
- Front
- Back
Value Chain |
A high-level model of how businesses receive raw materials as input, addvalue to the raw materials through various processes, and sell finished products to customers. |
|
SCM |
is supply chain management, represents an effort by suppliers to develop andimplement supply chains that are as efficient and economical as possible -part of the upstream process |
|
upstream process |
(Vendor-facing Management) finding and extractsthe raw material, information, orders, payments, returns |
|
CRM |
is customer relationship management, a system for managing a company'sinteractions with current and future customers -part of the downstream process |
|
downstream process |
(Customer Relationship Management)processing the materials collected during the upstream stage into a finished product. The downstream stage further includes the actual sale of that product, Information, Products, and Services |
|
ERP |
is business process management, software that allows an organization to use asystem of integrated applications to manage the business and automate many back office functions related to technology, services and human resources. -“Inside the walls” Management |
|
Collaboration Metrics |
1. Effectiveness- the degree to which a goal is achieved 2. Efficiency- the relationship between resources expended and benefits gained in achieving a goal 3. Productivity-efficiency of the human resources expended when achieving a goal |
|
Bull Whip Effect |
(SCM issue) Inefficiency and Variability in the supply chain, a trendof larger and larger swings in inventory in response to changes in customer demand, as one looks at firms further back in the supply chain for a product. |
|
Causes of Bull Whip |
Price promotions Batch Purchasing (discounts for consolidated orders) forecasting/trending analysis shortage gaming (knowing shortages encourage customers to inflate order quantities) |
|
Impact of Bull Whip |
Excessive inventory poor customer service ineffective transportationuse misused manufacturing capacity lost revenues |
|
CFAR |
collaborative planning, forecasting and replenishment. A business practice thatcombines the intelligence of multiple trading partners in the planning and fulfillment of customer demand |
|
SCOR |
Supply Chain Operations Reference This reference model enables users toaddress, improve, and communicate supply chain management practices within and between all interested parties in the extended enterprise. -Strategy (Plan, Source, Make, Deliver, Return) |
|
Lean Manufacturing |
a systemic method for the elimination of waste within amanufacturing process - management philosophy derived mostly from the Toyota Production System - Efficiency: Single-Minute Exchange of Die (SMED) |
|
Six Sigma |
data-driven approach for eliminating defects (driving toward six standarddeviations between the mean and the nearest specification limit) in any process – from manufacturing to transactional and from product to service. -quality control and improvement |
|
Sigma |
statistical standard deviation (Define, Measure, Analyze, Improve, and Control |
|
SMED |
one of the many lean production methods for reducing waste in a manufacturing process. It provides a rapid and efficient way of converting a manufacturing process from running the current product to running the next product |
|
CSFs |
(Critical Success Factors) are the cause of your success |
|
KPIs |
(Key Performance Indicators) are the effects of your actions |
|
Increasing use of smartphones for ____ instead of ___ calls |
applications, voice |
|
User focus on _____ and ______ |
privacy, personalization |
|
Semantic web |
Web as a whole can be made more intelligent and perhaps even intuitiveabout how to serve a user's needs -Identity, Metadata, Relationships |
|
Increasing use of smartphone for information _____ |
transparency |
|
location based services |
computer program-level services that use location data to control -entertainment/security (value proposition and revenue model) ex. Smartreck app |
|
mobile marketing |
advertising delivered over other electronic channels, reachingcustomers at the time and place of a purchasing decision |
|
Data Networking creates strategic advantages for businesses by: |
Creating more efficient and effective business operations Making geographical distance irrelevant (Globalization) Allowing more timely and efficient access to info Enabling a flexible and mobile workforce |
|
Local Equipment: |
Home (Modem/Router, Wireless), Office (Ethernet/Wireless,DNS/Email/Security) |
|
Local Loop/ISP: |
Local Loop (POTS/DSL/Cable, Satellite/PLC/WiMax) ISPs (POPS,DNS/Email/Services) |
|
Backbone and Content Services: |
Connectivity, Content Distribution, Content Providers |
|
Content Providers: |
a person or organization who supplies information for use on awebsite |
|
Packet switching |
a mode of data transmission in which a message is broken into anumber of parts that are sent independently, over whatever route is optimum for each packet, and reassembled at the destination. |
|
Advantages of packet switching |
Bandwidth used to full potential-shared use Not affected by singlepoints of failure during major disaster the public telephone network might become congested but e-mails and texts can still be sent via packet switching |
|
Disadvantages of packet switching |
under heavy use there can be a delay data packets can get lost orbecome corrupted real-time video streams can lose frames when packets arrive out of sequence |
|
tier 1 network |
an Internet Protocol (IP) network that participates in the Internet solelyvia settlement-free interconnection. |
|
tier 2 network |
an Internet service provider who engages in the practice of peering withother networks, but who also purchases IP transit to reach some portion of the Internet. |
|
tier 3 network |
always pay fees to obtain access to the larger backbones - hop count uses distance as its metric for route selection, connection speed decides based on how fast |
|
Protocol |
Method used to interpret the webpage -HTTP -TCP - IP |
|
HTTP |
Hypertext Transfer Protocol |
|
TCP |
enables two hosts to establish a connection and exchange streams of data |
|
IP |
protocol that deals only with packets |
|
Internet addressing |
a numerical label assigned to each device (e.g., computer, printer)participating in a computer network that uses the Internet Protocol for communication. -IP Addressing- unique number well suited for machines (phone number) -URL-Name, descriptive, well suited for humans |
|
Wireless Impairments: |
Attenuation (reduction in signal strength) Interference Multi-path |
|
Wireless Issues: |
privacy monitoring identity theft |
|
Trade offs |
Right-of-way (wired) vs. line of sight (wireless) |
|
Short Range |
Bluetooth RFID Infrared |
|
Mid-Range |
WIFI Cellular (1G-4G) |
|
Long Rance |
Microwave Satelite (LEO, MEO, GEO) |
|
Cell-based design |
spatial frequency reuse |
|
RFID |
radio frequency identification, wireless use of electromagnetic fields to transferdata to automatically identify and track tags attached to objects -Alternative to barcodes -drivesrs/benifits: cost, security, value, Law/Mandates -can be used in: sales/marketing, assets management, healthcare, transportation |
|
Competing rights |
-Freedom of Speech vs. Right to Reputation -Stacy Snyder Case “Drunken Pyrite” |
|
Components of Online Reputation: |
1.Location-based info-address, phone numbers, schools, geo-tagging (puts your exact location) 2.Social networking and media sites-images profiles, comments, and friends actions 3. Blogs, forums, message boards- articles, letters (by you about you) |
|
Employment Background Checking |
63% of applicants are filtered before the interview |
|
Dimensions of Privacy: |
1. Anonymity-tied to interactions with others 2.Confidentiality- control of the us e of their personal info by corporations and government 3. Security- Protection from data loss and identity theft |
|
Website Management Strategies |
Value Proposition of an “Eller” website Business Issues: |
|
Why Web Evolves: |
Social Media: Allows interaction among people in which they create, share,and/or exchange information and ideas in virtual communities and networks (Facebook, Twitter, Tumblr, YouTube…) Content Management: Software that allows publishing, editing, and modifying content from a central interface, providing procedures to manage workflow in a collaborative environment (WordPress, Joomla, Drupal…) Mobile Access: (iPhone, iPad, Android…) Expectations change, browsers and devices change, dynamic vs. static content, data can be shared and manipulated, users now maintain the sites |
|
Website Design Process: |
Phase 1: Define the Project and Site: Team formation, development, test, web surveys, project plan Phase 2: Developing Site Structure: Content analysis, delivery plan, visual design, user roles Phase 3: Visual Design: Content creation/revision, primary theme and site production, site customization Phase 4: Production and QA: Style and user guide, content addition, content addition, phased site launch, project closeout Phase 5: Launch and Beyond: post-launch evaluation, site maintenance, server maintenance, additional feature analysis, planning, creation, other site conversion |
|
Mental Model: |
an explanation of someone’s thought process about howsomething works in the real world |
|
Design Model: |
Gives structure and meaning to an I.D. problem |
|
McGinn Model of Design: |
Perception of what is intuitive and innovative isaffected by Variations in individual experience, context, and culture, *know the five groups in the pyramid |
|
Visibility Constraints Crucial distinctions |
making the right decision limit options, correct rejection restroom signs |
|
Metaphors: |
An image or understanding of an object or action, used todescribe the function of another thing, reduces cognitive load required to complete a task, should be based on an understanding of user’s cultural frame of reference |
|
Causality: |
Users assume that the thing that happens right after an action wascaused by that action resulting in False Causality, or an incorrect relationship |
|
Accessibility is a good product design: |
part of usability, user-centered(universal) design |
|
Categories of Disabilities: |
- Visual - Auditory - Motor - Cognitive |
|
Legal Requirements for Accommodations |
ADA, Section 508: requires Gov. to ensure that the electronic and informationtechnology it develops, maintains, produces or uses, is accessible to persons with disabilities |
|
Distance Learning Characteristics: |
Reduces geographic barriers accessible to broader range of adults attractive medium time flexibility saves travel/living learning outcomes are comparable to face-to-face |
|
New Learning and teaching methods: |
Where instruction occurs: - Online - Offline work places - At home - At work - At school - Hybrid classes - How, where, when instruction occurs |
|
Asynchronous: |
take classes at own schedule, material, assignments,tests are available for you to complete any time, students can contribute whatever they choose (anywhere, anytime involvement but lose immediacy for interaction and feedback) |
|
Synchronous: |
require students and instructors be online at the sametime, presentations at specific hour that you must be online then to participate in |
|
Achievers: |
(10-20%) excellent academic skills, familiar with onlineclasses, highly motivated, self-disciplined, need praise and constant feedback, high computer skills, challenge: doesn’t accommodate theirindividual learning style, (grade: A-B) |
|
Taskers: |
(40-50%) intermediate academic skills, motivated by bottomline (due dates, big grade items), need structure, challenge: tech issues and keeping up with schedule, (grade: A-C) |
|
Ball-Droppers: |
(20-25%) moderate academic skills, first time takingonline course, use excuses and extensions for deadline, poor computer skills, challenge: staying connected, following due dates, understanding grading criteria (grade: B-D) |
|
Ghosts: |
poor academic students, never taken online course,unmotivated, discouraged, poor computer skills, Challenge: lack of communication, and commitment to course, (grade: D-F) |
|
Directing Learning: |
focus on students’ learning efforts, keep them on track,link students to useful resources |
|
Providing Performance Feedback: |
provide specific, personalized, andconstructive feedback, but avoid too much of it |
|
Promoting Content and Understanding: |
Use effective instructionalstrategies, promote understanding dependent upon various online conditions (novice vs. expert/ deep vs. shallow learning) |
|
Creating Structure: |
facilitate course navigation, reinforce courserequirements |
|
Support Leaning: |
Instructor must be available, responsive, and attentive,helps students online, and motivates students to learn |
|
INTERNET OF THINGS (IoT): |
Refers to uniquely identifiable objects (things)and their virtual representation in an internet-like structure, connects all things, Will provide connectivity for anyone, and anything, creating a connection between the physical world and the information world |
|
Interconnection of Both People and Devices |
Used with education, food (tell staff when shelves are empty)(nutritioncalculations), pharmaceuticals (drug usage tracking), logistics, retail, and management |
|
Increased awareness of information that improves decision making andreduces waste in the supply chain (sustainability) |
Prevent overproduction and shortage of food |
|
Information layers: |
- Information Generation (sensing): Sense and Identification Layer - Information Transmission: Network Construction Layer - Information Processing: Management Layer (Search engine, data mining, info. Security) - Information Application: Integrated Application Layer (Green building, smart transportation, environmental monitoring) |
|
Increased access to information, also increases the risks to privacy andsecurity |
Nothing will be private, could be giving away too much of our decisionmaking and freedom choices to machines, identity can be stolen online |