560 Flashcards
Big Data
datasets whose size and speed are beyond the ability of typical database software tools to capture, store, manage, and analyze.
Data Analytics
the use of software and statistics to find meaningful insight in the data, or better understand the data.
Data Visualization
Tools that make it easier to understand data at a glance by displaying data in summarized formats.
Dashboards and maps
Supply Chain
All businesses involved in the production and distribution of a product or service.
Dashboards
data visualizations that display the current status of key performance indicators in easy to understand formats
Internet of Things
a set of capabilities enabled when physical things are connected to the internet via sensors
Machine to Machine technology
enables sensor embedded products to share reliable real time data via radio signals
Unstructured Data
Do not have a predictable format
Data Science
involves managing and analyzing massive sets of data for purposes such as marketing, trends, etc.
Business Processes
Series of steps by which organizations coordinate and organize tasks to get work done.
Formal Processes
documented and have well-established steps. Taking a CC pmt
Standard Operating Procedures
Who performs, What materials, where
Business Process Re-engineering
Methods and efforts to eliminate wasted steps within a process
Agility
being able to respond quickly
Responsiveness
that IT capacity can be easily scaled up or down as needed, which requires cloud computing.
Flexibility
having the ability to quickly integrate new business functions or easily reconfigure software or apps
Rules of SWOT
Be realistic about strengths and weaknesses
Also about size of Ops + Threats
Specific and keep analysis simple
Evaluate strengths + weaknesses
Expect conflicting views, SWOT is subjective
Five Industry Forces
Threat of entry new competitors
Bargaining power of suppliers
Bargaining power of customers or buyers
Threat of substituting products or services
Competitive rivalry among existing firms in the industry
5 Primary Activities
Inbound logistics- acquiring and receiving of raw materials and other inputs
Operations - manufacturing and testing
Outbound Logistics - packaging, storage, delivery, distribution
Marketing and Sales - customers
Services - customer services
Support Activities
Primary Activities rely on them. Infrastructure, accounting, finance HR R&D Procurement or purchasing
Data Governance
is the control of enterprise data through formal policies and procedures
Enterprise Architecture
guides the evolution and expansion of information systems, digital technology, and business processes.
Customer Centeric
best suited for the cutomer
Touchpoint
any influencing action initiated through communication, human contact or physical or sensory interaction
Dirty Data
data of such poor quality that they cannot be trusted or relied upon for decisions
Master Data Management
methods synchronize all business critical data from disparate systems into a master file, which provides a trusted data source
Information management
use of IT tools and methods to collect, process, consolidate, store, and secure data from sources that are often fragmented and inconsistent.
Data Silo
data stores in which their data are not accessible by other ISs that need it or outside of that department
Data Silos Exist When:
there is no overall IT architecture to guide IS investments, data coordination, and communication
Advantages of information management are:
Improves decision quality
Improves the accuracy and reliability of management predictions
Reduces the risk of non compliance
Reduces the time and cost
Problems that Enterprise Architecture is designed to Address
IT systems Complexity
Poor business alignment
Benefits of having the right Enterprise Architecture in place
Cuts IT cost + increases productivity
Determines an organizations competitiveness
align capabilities with strategy
Components of Enterprise Architecture
Business Architecture - The process the business uses to meet its goals
Application architecture - how specific applications are designed and how they interact with each other
Data Architecture - How an enterprise’s data stores are organized and accessed
Technical architecture - the hardware and software infrastructure that supports applications and their instructions.
Database
is a repository or data store that is organized for efficient access, search, retrieval, and update
Information
data that have been processed, organized or put into context so it has meaning
Knowledge
Consists of data and/or information that has been processed, organized, and put in context to be meaningful, and to convey undedstanding
Transaction Processing Systems
designed to process specific types of data input from ongoing transactions
Types of Transactions
Internal - originate within the organization. payroll, purchases
External - originate from outside the organization. customers, suppliers, etc
Batch Processing
TPS in batch mode collects all transactions for a day, shift, or other rime period, then processes the data and updates the data stores
Online Transaction Processing
TPS processes each transaction as it occurs, which is what is meant by the term real time processing. Webiste must be linked via a network to the TPS
Management Information Systems
Their objective is to provide reports to managers for tracking operations, monitoring, and control
Decision support systems (DSS)
INTERACTIVE APPLICATIONS THAT SUPPORT DECISION MAKING.
Unstructured Decision
depend on human intelligence, knowledge, and/or experiences
What if Analysis
refers to changing assumptions or data in the model to observe the impacts of those changes on the outcome.
Data Center
a large number of network servers used for the storage, processing, management, distribution and archiving of data, systems, web traffic, services and enterprise applications
Service Level Agreements
A negotiated agreement between a company and service provider that can be a legally binding contract or an informal contract.
Software as a service(SaaS)
any software that is provided on demand
Google Apps
Salesforce.com
How is Virtualization used to create Virtual Machines
Application Layer
Virtualization Layer
Hardware Layer
What is Virtualization
is a Technique that creates a virtual layer and multiple virtual machines to run on a single physical machine.
PaaS -
set of tools and services that make coding and deploying these apps faster and more efficeint
Iaas- Information as a service
consists of hardware and software that power computing resources servers, storage, os, and networks
Data as a Service (DaaS)
enables data to be shared among clouds, systems, apps, and so on regardless of the data source or where they are stored.
Centralized Databases
Store data at a single location that is accessible from anywhere.
Volatile Data
can change frequently
Data Warehouse
integrate data from multiple databases and data silos, and organize them for complex analysis, knowledge discovery, and to support decision making.
Data Marts
small-scale data warehouses that support a single function or one department
Business Intelligence
tools and techniques process data and do statistical analysis for insight and discovery. discover meaningful relationships
Database management systems (DBMSs)
integrate with data collection systems such as TPS and business applications: store the data in an organized way and provide facilities for accessing and managing that data
Relational database
store data in tables consisting of columns and rows, similar to a spreadsheet
Relational Management Systems (RDBMSs)
provide access to data using a decarative language
Extract, Transform, Load (ETL)
Extracted by designated databases
Transformed by standardizing formats, cleaning the data, and integrating them
Loaded into a datawarehouse
Active Data Warehouse (ADW)
real time data warehousing and analytics
Business Analytics
describes the entire function of applying technologies, algorithms, human expertise, and judgement
Data Mining
software enables users to analyze data from various dimensions or angles, categorize them, and find correlations or patterns among fields in the data warehouse
Text Mining
a broad category that involves interpreting words and concepts in context
Internet Protocol IP -
Basic technology that makes global communication possible
IP address
Each device attached to a network has an IP address that enables it to send and receive files.
Packets
Files are broken down into blocks known as packets in order to be transmitted over a network to their destination, which also has a unique IP address.
Bandwidth
The capacity or throughput per second of a network
Traffic Shaping
The ability to prioritize and throttle network traffic
Protocol
rules and standard that govern how devices on a network exchange data and talk to each other.
Mashup
A general term referring to the integration of two or more technologies
Application program Interface (API)
an interface is the boundary where two separate systems meet. API provides a standard way for different things such as software, content, or websites, to talk to each other in a way they both understand.
Bluetooth
a short-range wireless communications technology
Wi-Fi
the standard way computers connect to wireless networks
Intranets
used for data access, sharing, and collaboration. they are portals or gateways that provide easy and inexpensive browsing and search capabilities.
Extranet
a private, company-owned network that can be logged into remotely via the internet
Virtual private networks (VPNs)
encrypts the packets before they are transferred over the network
Malware
short for malicious software, computer programs whose code causes disruption, destruction, or other devious action.
BlackPOS
is malware designed to be installed on POS devices in order to record data from credit and debit cards swiped through the infected device.
Distributed Denial of Service (DDoS)
attack bombards a network or website with traffic to crash
Critical Infastructure
systems and assets, so vital to the US that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or saftey
Advanced Persistent Threat (APT)
hackers remaining unnoticed so they can continue to steal data
Internal Threats
major challenge largely due to the many ways an employee can carry out malicious activity
Phishing
a deceptive method of stealing confidential information by pretending to be a legitimate organization
Enterprise Risk Management
a risk based approach to managing an enterprise that integrates internal control, the SOX mandates and strategic planning
Control Objectives for Information and Related Technology (CORBIT)
is an internationally accepted IT governance and control framework for aligning IT with business objectives, delivering value, and managing associated risks.
Payment Card Industry Data Security Standard (PCI DSS)
requires merchants and card payment providers to make certain their Web applications are secure
IT Security Model
- Senior management commitment and support
- Acceptable use policies and IT security training
- IT security procedures and enforcement
- Hardware and Software
Remote-Access Trojans (RATS)
create an unprotected backdoor into a system through which a hacker can remotely control that system
Payload
refers to the actions that occur after a system has been infected.
Search Engine Results Page (SERP)
the list of links and other descriptive information about webpages returned by a search engine in response to a search quesry
Keywords
words or phrases that describe the content on a webpage
Search Engine Optimization (SEO)
a collection of strategies and techniques designed to increases the number of visitors to a website as a result of the websites rank on the search engine results page.
Search Engine
an application for locating webpages or other content on a computer network.
Crawler Search Engine
rely on sophisticated computer programs called spiders, crawlers, or bots that surf the internet locating webpages links and other content that are then stored in the search engines page repository.
Web Directories
are categorized listings of webpages created and maintained by humans.
Hybrid Search Engines
combine the results of a directory created by humans and results from a crawler search engine with the goal of providing both accuracy and broad coverage of the internet.
Meta Search engines
combine results from other search
Semantic Search Engines
designed to located information based on the nature and meaning of Web content not simple keywords matches.
Page Repository
a data structure that stores and manages information from a large number of webpages, providing a fast and efficient means for accessing and analyzing the information at a later time
Crawler control module
software program that controls a number of spiders responsible for scanning or crawling through information on the Web.
Petabyte
a unit of measurement for digital data storage = to one million gigabytes
Enterprise Search
tools are used by employees to search for and retrieve information related to their work in a manner that complies with the organization’s information sharing and access control policies.
Structured Data
information with a high degree of organization
Unstructured Data
information that is not organized
Search Engine Marketing (SEM)
a collection of online marketing strategies and tactics that promote brands by increasing their visibility in SERPs through optimization and advertising
Recommendation Engines
anticipate information that a user might be interested in
Pay per click (PPC)
advertisers pay search engines based on how many people click on the ads
Click through rates (CTRs)
the percentage of people who click on a hyperlinked area of a SERP or webpage
Keyword Conversion rates
likelihood that using a particular keyword to optimize a page will result in conversions
Semantic Web
semantics is meaningful computing the application of natural language processing to support information retrieval, analytics and data integration that compass both numerical and unstructured information
Spiders
also known as crawlers web bots or simply bots, are small computer programs designed to perform automated, repetitive tasks over the internet
Dwell Time
Users who stay on a site longer are probably more satisfied
Cost of Customer Acquisition
represents the amount of money spent to attract a paying customer
Spear Fishing
A scam where you receive an email that appears to be from someone you work with, but it is fake
Distributed Denial of Service (DDOS)
bombards network with traffic
Attack Vectors
entry points for malware/hackers
Botnet
A collection of bots (malware infected computers)
Called zombies
can be used to launch DDos
Can steal personal or financial data
Business Continuity Plan
Maintaining business function or restoring them quickly when there is a major disruption
BYOD - Bring your own Device
companies have employees use their own devices for work
Advanced Persistent Threat (APT)
attacker wants to remain unnoticed
profit motivated criminal
Hacker with a personal agenda are not stealthy
Firewall
Software/hardware device that controls access to a private network from a public netowork by analyzing data packets
Bio metrics
method to identify a person, such as a fingerprint
IT governance
supervision, monitoring, and control of an organizations IT assets
Intrusion Prevention Systems (IPS)
defense system designed to take immediate actions
Service Pack
Patches to update and fix vulnerabilities in an O/S
Patches
Fix a vulnerability
Data Tampering
Common means of attack, where someone enters false or fraudulent data, or deletes existing data.
API
Application programming interface (API). APIs facilitate the transfer of data
from one website app to another. APIs can be either proprietary or open source.
Use of a proprietary API requires the developer to pay a fee to gain access to
data.
Crowdfunding
The practice of funding a project or venture by raising monetary contributions from a large number of people.
Crowdsourcing
a model of problem solving and idea generation that marshals the collective talents of a large group of people.
Mashup
A Web application that combines information from two or more sources and presents this information in a way that creates some new benefit or service.
Enterprise mashups
Combine data from internal business sources (e.g., sales records, customer information, etc.) and/or information from external sources for enhanced usefulness and productivity.
Open Source
An application programming interface (API) that anyone can use, usually for free.
Semantic web
An extension of the World Wide Web that utilizes a variety of conventions and technologies and languages developed by the W3C that allow machines to understand the meaning of web content.
Social media
A collection of web applications, based on Web 2.0 technology and culture, that allows people to connect and collaborate with others by creating and sharing digital content.
Social web
The new technologies, often called Web 2.0, that dramatically increase the ability of people to interact with businesses and each other, sharing and finding information, and forming relationships.
Terms of service (TOS) agreement
A formal listing of the policies, liability limits, fees, and user rights and responsibilities associated with using a particular service. Users are typically required to acknowledge they have read, understand and agree to the terms of the TOS before they are allowed to use the service.
Web 2.0
A term used to describe a phase of World Wide Web evolution characterized by dynamic webpages, social media, mashup applications, broadband connectivity, and user-generated content.
Groundswell
The spontaneous effort of people using online tools to obtain information, support, ideas, products, and bargaining power from each other.
Augmented reality
A technology that superimposes a computer-generated image
onto an image of the real world to provide information or entertainment.
Business-to-business (B2B)
Markets in which the buyers, sellers, and transactions involve only organizations, not individual consumers.
Digital dependents
The emerging generation of young people who are growing up in a world of broadband connections, constant connectivity, and related technology and who become uncomfortable if they do not have access to it.
Digital immigrants
Typically, a member of an older age cohort that may be increasingly comfortable with technology but much less likely to incorporate mobile technology into their shopping behavior.
Digital natives
The first generation to have grown up surrounded by digital devices (i.e., computers, smartphones, digital cameras, and video recorders, etc.) and Internet connectivity.
Corporate procurement
Also called corporate purchasing, deals with the transactional elements of buying products and services by an organization for its operational
and functional needs.
E-procurement
It refers to the reengineered procurement process using e-business technologies and strategies.
Mobile commerce or m-commerce
The buying or selling of goods and services using a wireless, handheld device such as a cell phone or tablet (slate) computer.
Micropayments
Transactions involving relatively small sums of money.
Mobile location-based marketing
A marketing strategy that uses information from a mobile device’s GPS or customer’s mobile check-in on a social network to determine the content of marketing communications they receive on the device (e.g., advertisements, coupons, special offers).
Omni-channel retailing
The effort by retailers to fully integrate both traditional and emerging methods to influence consumers.
Showrooming
Using mobile search engine for locating product reviews and price comparisons while shopping in brick-and-mortar stores.
Applications portfolio
A list of major, approved information system projects that are also consistent with the long-range plan. Expectations for sourcing of resources in the project or applications portfolio should be driven by the business strategy.
Cloud services—also referred to as edge services
have to integrate back to core internal systems. That is, edge services have to connect and share data with enterprise systems such as order and inventory management, ERP, CRM, SCM, legacy financial, and HR systems and on mobile and social platforms.
IT strategy
Shapes the direction of IT investments over the next one to five years to maximize business value and shareholder wealth.
Lagging indicators
Confirm what has already happened. They evaluate outcomes and achievements.
Offshoring
Sourcing that is done off-shore.
Onshore sourcing
Work or development that can be sourced to consulting companies or vendors that are within the same country.
Opportunistic repricing
When a client enters into a long-term contract with a vendor, the vendor changes financial terms at some point or overcharges for unanticipated enhancements and contract extensions.
Poaching
The vendor develops a strategic application for a client and then uses it for other clients.
Shirking
The vendor deliberately underperforms while claiming full payment, for example, billing for more hours than were worked and/or providing excellent staff at first and later replacing them with less qualified ones.
The steering committee
A team of managers and staff representing various business units that establish IT priorities and ensure the IT department is meeting the needs of the enterprise.
Value driver
Any activity that enhances the value of a product or service to consumers, thereby creating value for the company. Advanced IT, reliability, and brand reputation are examples.
Baseline
A specification of the project plan that has been formally reviewed and agreed upon. It should be changed only through a formal change control process.
Critical path
The longest path of tasks through a project, as shown on a Gantt chart. A delay of any task on the critical path will delay the project.
Deliverables
The outputs or tangible things that are produced by a business process. Common deliverables are products, services, actions, plans, or decisions, such as approval or denial of a credit application. Deliverables are milestones, produced in order to achieve specific objectives.
Gantt chart
Horizontal bar chart that graphically displays the project schedule.
Milestone
Used to manage the project work effort, monitor results, and report meaningful status to project stakeholders.
Project management
Structured methodology to plan, manage, and control the completion of a project throughout its lifecycle.
Responsibility matrix
A document that lets everyone know who is responsible for completion of tasks.
Scope creep
Refers to the growth of the project, which might seem inconsequential—at least to the person who is requesting that change. Scope creep is the piling up of small changes that by themselves are manageable, but in aggregate are significant.
Statement of work (SOW)
Defines the project plan, but does not offer any options or alternatives in the scope.
The system development life cycle (SDLC)
The traditional system development method for large IT projects, such as IT infrastructure or an enterprise system.
Triple constraint
Three attributes–time, scope, and cost–that must be managed effectively for successful completion and closure of any project.
Work breakdown structure (WBS)
List of tasks in a project shown in sequential order, resources allocated to each task, and schedule.