moore’s law

28
Chapter 17 Copyright ©2007 by South-Western, a division of Thomson Learning. All rights reserved 1 Moore’s Law

Upload: gerodi

Post on 11-Jan-2016

102 views

Category:

Documents


0 download

DESCRIPTION

Moore’s Law. Data versus Information. Raw data = facts + figures Information = useful data that influences choices. First-Mover Advantage. Sustaining a Competitive Advantage. Strategic Importance of Information. 1. First-Mover Advantage - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Moore’s Law

Chapter 17Copyright ©2007 by South-Western, a division of Thomson Learning. All rights reserved 1

Moore’s Law

Page 2: Moore’s Law

Chapter 17Copyright ©2007 by South-Western, a division of Thomson Learning. All rights reserved 2

Data versus Information

Raw data = facts + figures

Information = useful data that influences choices

Page 3: Moore’s Law

Chapter 17Copyright ©2007 by South-Western, a division of Thomson Learning. All rights reserved 3

Strategic Importance of Information

First-MoverAdvantage

Sustaining aCompetitiveAdvantage

11

Page 4: Moore’s Law

Chapter 17Copyright ©2007 by South-Western, a division of Thomson Learning. All rights reserved 4

First-Mover Advantage

1.11.1

First-Mover Advantage

The strategic advantage that companies earn by being the first to use new information technology tolower costs or to differentiate a product

Page 5: Moore’s Law

Chapter 17Copyright ©2007 by South-Western, a division of Thomson Learning. All rights reserved 5

AOL User Interface

Page 6: Moore’s Law

Chapter 17Copyright ©2007 by South-Western, a division of Thomson Learning. All rights reserved 6

MSN Interface

Page 7: Moore’s Law

Chapter 17Copyright ©2007 by South-Western, a division of Thomson Learning. All rights reserved 7

Sustaining a Competitive Advantage

CompetitiveDisadvantage

CompetitiveDisadvantage

CompetitiveParity

CompetitiveParity

SustainedCompetitiveAdvantage

SustainedCompetitiveAdvantage

TemporaryCompetitiveAdvantage

TemporaryCompetitiveAdvantage

Is it difficultfor another firmto create or buy

the IT?

Is it difficultfor another firmto create or buy

the IT?

NO YES

Does the informationtechnology (IT)

createvalue?

Does the informationtechnology (IT)

createvalue?

NO YES

Is the IT differentacross

competing firms?

Is the IT differentacross

competing firms?

NO YES

Adapted from Exhibit 17.2

1.21.2

Page 8: Moore’s Law

Chapter 17Copyright ©2007 by South-Western, a division of Thomson Learning. All rights reserved 8

Accurate Complete Relevant Timely

Characteristics of Useful Information

22

Page 9: Moore’s Law

Chapter 17Copyright ©2007 by South-Western, a division of Thomson Learning. All rights reserved 9

Costs of Useful Information

Acquisition Processing Storage Retrieval Communication Costs

22

Page 10: Moore’s Law

Chapter 17Copyright ©2007 by South-Western, a division of Thomson Learning. All rights reserved 10

Doing the Right Thing

22

Recycling Computer Equipment

• An estimated 250 million computers will bediscarded over the next five years

• Computers and monitors contain hazardous materials, so tossing them in the trash is illegal

• Recycle appropriately, or donate old computersto individuals or charitable organizations

Page 11: Moore’s Law

Chapter 17Copyright ©2007 by South-Western, a division of Thomson Learning. All rights reserved 11

Capturing Information

ElectronicElectronic

ManualManual

Bar CodesBar Codes

Radio FrequencyIdentification Tags

Radio FrequencyIdentification Tags

Electronic ScannersElectronic Scanners

Optical Character Recognition

Optical Character Recognition

3.13.1

Page 12: Moore’s Law

Chapter 17Copyright ©2007 by South-Western, a division of Thomson Learning. All rights reserved 12

RFID Technology

Page 13: Moore’s Law

Chapter 17Copyright ©2007 by South-Western, a division of Thomson Learning. All rights reserved 13

Processing Information: Data Mining

SupervisedData Mining

SupervisedData Mining

Data Warehouse

Data Warehouse

UnsupervisedData Mining

UnsupervisedData Mining

DataClusters

DataClusters

SequencePatterns

SequencePatterns

PredictivePatterns

PredictivePatterns

AffinityPatterns

AffinityPatterns

3.23.2

Page 14: Moore’s Law

Chapter 17Copyright ©2007 by South-Western, a division of Thomson Learning. All rights reserved 14

Unsupervised Data Mining

DataClusters

DataClusters

SequencePatterns

SequencePatterns

PredictivePatterns

PredictivePatterns

AffinityPatterns

AffinityPatterns

Three or more database elementsoccur together

Three or more database elementsoccur together

One of the elements precedes the other

One of the elements precedes the other

Helps identify database elementsthat are different

Helps identify database elementsthat are different

Two or more database elementsoccur together significantly

Two or more database elementsoccur together significantly

3.23.2

Page 15: Moore’s Law

Chapter 17Copyright ©2007 by South-Western, a division of Thomson Learning. All rights reserved 15

Protecting Information

Authentication

Authorization

Two-Factor Authentication

Firewalls

Antivirus software

Data encryption

Virtual private networks

Secure Sockets Layer (SSL) Encryption

3.33.3

Page 16: Moore’s Law

Chapter 17Copyright ©2007 by South-Western, a division of Thomson Learning. All rights reserved 16

Doing the Right Thing

3.23.2

Password Dos and Don’tsPassword Dos and Don’ts

1. Don’t use any public information

2. Don’t use complete words

3. Use eight or more characters; include unique characters

4. Use longer, unique passwords

5. Consider passphrases

6. Don’t write your password

7. Change it every six weeks

8. Don’t reuse old passwords

Page 17: Moore’s Law

Chapter 17Copyright ©2007 by South-Western, a division of Thomson Learning. All rights reserved 17

Accessing and SharingInformation and Knowledge

Internal Accessand

Information Sharing

Internal Accessand

Information Sharing

External Accessand

Information Sharing

External Accessand

Information Sharing

Sharing ofKnowledge and

Expertise

Sharing ofKnowledge and

Expertise44

Page 18: Moore’s Law

Chapter 17Copyright ©2007 by South-Western, a division of Thomson Learning. All rights reserved 18

Executive Information System (EIS)

Uses internal and external data

Used to monitor and analyze organizational performance

Must provide accurate, complete, relevant, andtimely information to managers

4.14.1

Page 19: Moore’s Law

Chapter 17Copyright ©2007 by South-Western, a division of Thomson Learning. All rights reserved 19

Characteristics of Best-Selling EIS

Few commands to learn Important views saved 3-D charts Geographic dimensions

Identification ofProblems and Exceptions

Identification ofProblems and Exceptions

Ease of UseEase of Use

Analysis of InformationAnalysis of Information

Adapted from Exhibit 17.4

Compare to standards Trigger exceptions Drill down Detect & alert newspaper Detect & alert robots

Sales tracking Easy-to-understand displays Time periods

4.14.1

Page 20: Moore’s Law

Chapter 17Copyright ©2007 by South-Western, a division of Thomson Learning. All rights reserved 20

Intranets

Private company networks

Allow employees to access, share, and publish information

A firewall permits only authorized internalaccess

4.14.1

Page 21: Moore’s Law

Chapter 17Copyright ©2007 by South-Western, a division of Thomson Learning. All rights reserved 21

Why Companies Use Intranets

Inexpensive

Increase efficiencies and reduce costs

Intuitive and easy to use

Work across all computer systems

Can be built on top of existing network

Work with software programs that convert to HTML

Software is available at no cost or is less expensive

Adapted from Exhibit 17.5

4.14.1

Page 22: Moore’s Law

Chapter 17Copyright ©2007 by South-Western, a division of Thomson Learning. All rights reserved 22

Corporate Portals

4.14.1

Corporate Portals

A hybrid of executive information systemsand intranets that allow managers andemployees to use a Web browser to gainaccess to customized company information and to complete specialized transactions

Page 23: Moore’s Law

Chapter 17Copyright ©2007 by South-Western, a division of Thomson Learning. All rights reserved 23

External Access and Sharing

Electronic Data InterchangeElectronic Data Interchange

ExtranetsExtranets

Web ServicesWeb Services

InternetInternet

4.24.2

Page 24: Moore’s Law

Chapter 17Copyright ©2007 by South-Western, a division of Thomson Learning. All rights reserved 24

Benefits of External Access and Sharing

Increased productivityIncreased productivity

Reduced data entry errorsReduced data entry errors

Improved customer serviceImproved customer service

Faster communicationsFaster communications

Reduced costsReduced costs

4.24.2

Page 25: Moore’s Law

Chapter 17Copyright ©2007 by South-Western, a division of Thomson Learning. All rights reserved 25

Electronic Data Interchange (EDI)

ElectronicData

Interchange

ElectronicData

Interchange

When two companies convert their purchase and ordering informationto a standardized format to enablethe direct electronic transmission of that information from one computer system to the other.

When two companies convert their purchase and ordering informationto a standardized format to enablethe direct electronic transmission of that information from one computer system to the other.

4.24.2

Page 26: Moore’s Law

Chapter 17Copyright ©2007 by South-Western, a division of Thomson Learning. All rights reserved 26

Web Services

Web ServicesWeb Services

Using standardized protocols to describe data from one company in such a way that those data can automatically be read, understood, transcribed, and processed by different computer systems in another company

Using standardized protocols to describe data from one company in such a way that those data can automatically be read, understood, transcribed, and processed by different computer systems in another company

4.24.2

Page 27: Moore’s Law

Chapter 17Copyright ©2007 by South-Western, a division of Thomson Learning. All rights reserved 27

Extranet

ExtranetExtranet

Allows companies to exchange information and conduct transactions with outsiders by providing them direct, Web-based access to authorized parts of a company’s intranet or information system

Allows companies to exchange information and conduct transactions with outsiders by providing them direct, Web-based access to authorized parts of a company’s intranet or information system

4.24.2

Page 28: Moore’s Law

Chapter 17Copyright ©2007 by South-Western, a division of Thomson Learning. All rights reserved 28

Sharing Knowledge and Expertise

DecisionSupport System

DecisionSupport System

Helps managers to understand specific kinds of problems and potential solutions, and to analyze the impact of different decision options using “what if” scenarios

Helps managers to understand specific kinds of problems and potential solutions, and to analyze the impact of different decision options using “what if” scenarios

Expert SystemExpert System

An information system that contains the specialized knowledge and decision rules used by experts so that nonexperts can draw on this knowledge base to make decisions

An information system that contains the specialized knowledge and decision rules used by experts so that nonexperts can draw on this knowledge base to make decisions

4.34.3