UML Videos and Samples

November 2, 2010 at 13:32 (UML)

Download Here http://bit.ly/UMLVideos
http://bit.ly/UMLSamples

Permalink Leave a Comment

DOTA HOTKEYS

October 31, 2010 at 20:49 (DOTA)

http://www.mediafire.com/?ofcq0pk9g5d7vem

Permalink Leave a Comment

LINQ to Collection of Objects

October 21, 2010 at 07:51 (CSharp) (, , , , )

The term “LINQ to Objects” refers to the use of LINQ queries with any IEnumerable or IEnumerable collection directly, without the use of an intermediate LINQ provider or API such as LINQ to SQL or LINQ to XML. You can use LINQ to query any enumerable collections such as List, Array, or Dictionary. The collection may be user-defined or may be returned by a .NET Framework API.
http://msdn.microsoft.com/en-us/library/bb397919.aspx

In this example, I have use the third party library that let’s you modify any swf file (the *Aspose.Flash). In this particular case, I have queried the list of objects in the swf file in two different ways, and retrieve only a particular type (in this case, FlashBitmap & PlaceObject2)

using Aspose.Flash.Swf;
using System.Collections.Generic;
using System.Collections;
using System.Linq;

FlashContainer linqfc = new FlashContainer(_strPath);

//using OfType to get a particular type of object in list
var fcBitmaps = linqfc.Objects.OfType( );

//using LINQ to retrieve particular objects of type PlaceObject2 and filter only
//with Names not equal to null or string.Empty
var po2 = from obj in linqfc.Objects.ToArray( )
where obj.GetType( ).Name == "PlaceObject2"
let placeobj = (PlaceObject2) obj
where placeobj.Name != string.Empty && placeobj.Name != null
select new { placeobj };

foreach( var item in po2 )
{
MessageBox.Show( item.placeobj.ObjectId.ToString( ) + " " + item.placeobj.Name );
}

*for more information about this third party tool, please visit their website, they got a lot of tools that you can use.
http://www.aspose.com/

Permalink Leave a Comment

Civil Service Reviewer

October 20, 2010 at 20:12 (General)

Vocabulary For Civil Service Tests
LearningExpress, LLC; 1 edition (April 25, 2003) | ISBN: 1576854744 | 224 pages | PDF | 11 Mb

Competition for civil service jobs is tough, so applicants need to be prepared for the qualifying civil service exam. This book is the best resource to improve verbal skills to succeed on any civil service test. Readers will not only learn about the different types of civil service exams, but also about the most effective ways to prepare for any test, including preventing test stress and creating a study plan.

Here’s the link:
http://bit.ly/CivilServiceReview

if the link above is broken, please leave a message…

Permalink Leave a Comment

Nursing NCLEX Review

October 20, 2010 at 19:56 (General) (, , , , )

A collection of programs to help graduating AN/BSN students study/practice for the NCLEX Exam. Items found inside the compressed file are : ATI and Thompson-Delmar cds were created with clonecd, the Kaplan can be burned with any iso program too (clonecd, alcohol, nero, imgburn…)

Here are the links:

http://bit.ly/NursingReviewPart1
http://bit.ly/NursingReviewPart2
http://bit.ly/NursingReviewPart3
http://bit.ly/NursingReviewPart4
http://bit.ly/NursingReviewPart5
http://bit.ly/NursingReviewPart6
http://bit.ly/NursingReviewPart7

If any links were broken, please leave a message…

Permalink Leave a Comment

CASE 3 (to be pass on your blog): Henry Schein Inc.: The Business Value of a Data Warehouse

October 8, 2009 at 20:38 (IT-414 MIS)

Most companies store reams of data about their
customers. The IT challenge has been how to
integrate and massage that information so the
business units can respond immediately to changes in sales
and customer preferences.
Henry Schein Inc. (www.henryschein.com) has it figured
out. The $2.8 billion distributor of health care products designed
and built a data warehouse with an in-house team of
six IS professionals. CIO Jim Harding says he knew that having
the right skills was critical to the data warehouse project,
yet at the time, Schein had zero warehousing experience in its
IT shop. So he and Grace Monahan, vice president of business
systems, hired people for what they call “Team Schein.”
Because Harding had chosen two key tools for the data
warehouse—data extraction software from Informatica Corp.
and user query and reporting software from MicroStrategy
Inc.—the focus was on finding people who had experience
with those tools. So Monahan hired three people from outside:
project director Daryll Kelly, data modeler Christine
Bates, and front-end specialist Rena Levy, who’s responsible
for the user interface and data analysis, as well as user support
and training. Dawen Sun, who handles extract, transform,
and load issues, and database administrator Jamil
Uddin hold two other key positions. Another team member
is rotated in from Schein’s application development group.
Besides having the right skills, the other top priority was
ensuring data quality. “It seems kind of obvious,” says Harding,
“but sometimes these projects forget about quality, and then
the data warehouse ends up being worthless because nobody
trusts it.” So at the outset of the project, the team interviewed
about 175 potential business users to determine the information
they needed to access and the reports they wanted to see.
Plus, the team analyzed the old paper reports and the condition
of the data housed in the company’s core transaction system.
Monahan says those steps brought to light the importance of
cleansing data in a system that’s designed for transactional purposes
but not suitable for a data warehouse. That led to a long
period of standardizing transactional codes in order to produce
the sales reporting that business analysts needed.
“It’s the in-house people who have this gold coin of
knowledge of how their systems really work, which data is really
good and not so good, and how the end users really want
to use the data,” Kimball says. “Data quality is the hardest
part of the project, because it’s very time-consuming and detailed,
and not everyone appreciates it unless they’ve been
through a couple of projects, like Daryll has,” Harding says.
And there was yet another tedious obstacle. The data
warehouse was designed to provide a very granular level of
detail about customers, “so we can slice and dice at will,”
Harding says. But the result was sluggish system performance.
So the team created summary tables to make the
queries work faster, and those tables needed to be tested. It
was a lengthy process, Harding says, but in the end, it
worked very well. The journey has taken well over two years.
The system went live 18 months ago but “really came into its
own” in February, Harding says.
Of course, building a data warehouse is a never-ending
job. New companies are acquired, products are added, customers
come and go, and new features and enhancements
are ongoing. But from an IT standpoint, the data warehouse
is complete and has 85 percent of the data from the
core transactional system. The next major goal is to provide
the European operation with its own data warehouse system
and tie it into the one in the United States.
Harding says his project will surely justify the costs, but
he lacks hard numbers. “We didn’t have a formal ROI that
you could track later. I don’t even know how you would do
it,” he says. “The reason we’re doing the project is because of
the value it brings to the business.”
Lou Ferraro, vice president and general manager of
Schein’s medical group, says the business benefits are outstanding.
He can now figure out who his most profitable customers
are, target customers for certain types of promotions,
and look at the business by product categories or sales territories.
Ferraro says the data warehouse also helps select
customers for direct-mail marketing campaigns that range
“upward of 25 million pieces annually.”
One of the most valuable features of the data warehouse
has been the ability it gives users to add more fields to reports
as they are using the system. “Once you create a basic
report, draw a conclusion, and drill further based on those
assumptions, it allows you to use that data and go even further,
as opposed to creating a new report, and another and
another,” Ferraro says. The IT department used to create,
edit, revise, run, download, reprogram, and print piles of paper
reports—daily, weekly, monthly and quarterly—for the
analysis of sales and market trends. But today, business users
search, sort, and drill down for that information themselves
in a fraction of the time. The data warehouse has become “a
part of our culture,” says Harding. “It’s got that kind of aura
about it within the company.”
Case Study Questions
1. What are some of the key requirements for building a
good data warehouse? Use Henry Schein Inc. as an
example.
2. What are the key software tools needed to construct
and use a data warehouse?
3. What is the business value of a data warehouse to
Henry Schein? To any company?

Permalink Leave a Comment

CASE 2(to be passed on examination day): Harrah’s Entertainment and Others: Protecting the Data Jewels

October 8, 2009 at 20:35 (IT-414 MIS)

In the casino industry, one of the most valuable assets is the
dossier that casinos keep on their affluent customers, the
high rollers. But in 2003, casino operator Harrah’s Entertainment
Inc. filed a lawsuit in Placer County, California,
Superior Court charging that a former employee had copied
the records of up to 450 wealthy customers before leaving
the company to work at competitor Thunder Valley Casino
in Lincoln, California.
The complaint said the employee was seen printing the
list—which included names, contact information, and credit
and account histories—from a Harrah’s database. It also
alleged that he tried to lure those players to Thunder Valley.
The employee denies the charge of stealing Harrah’s trade
secrets, and the case is still pending, but many similar cases
have been filed in the past 20 years, legal experts say.
While savvy companies are using business intelligence
and CRM systems to identify their most profitable customers,
there’s a genuine danger of that information falling into the
wrong hands. Broader access to those applications and the
trend toward employees switching jobs more frequently have
made protecting customer lists an even greater priority.
Fortunately, there are managerial, legal, and technological
steps that can be taken to help prevent, or at least discourage,
departing employees from walking out the door
with this vital information.
Organizations should make sure that certain employees,
particularly those with frequent access to customer information,
sign nondisclosure, noncompete, and nonsolicitation
agreements that specifically mention customer lists, says
Suzanne Labrit, a partner at the law firm of Shutts & Bowen
LLP in West Palm Beach, Florida.
Although most states have enacted trade-secrets laws,
Labrit says they have different attitudes about enforcing
these laws with regard to customer lists. “If you don’t treat it
as confidential information internally,” she says, “the court
will not treat it as confidential information either.”
From a management and process standpoint, organizations
should try to limit access to customer lists only to
employees, such as sales representatives, who need the information
to do their jobs. “If you make it broadly available to
employees, then it’s not considered confidential,” says Labrit.
Physical security should also be considered, Labrit says.
Visitors such as vendors shouldn’t be permitted to roam
freely in the hallways or into conference rooms. And security
policies, such as a requirement that all computer systems
have strong password protection, should be strictly enforced.
Some organizations rely on technology to help prevent
the loss of customer lists and other critical data. Inflow Inc.,
a Denver-based provider of managed Web hosting services,
uses a product from Opsware Inc. in Sunnyvale, California,
that lets managers control access to specific systems, such as
databases, from a central location.
The company also uses an e-mail scanning service that allows
it to analyze messages that it suspects might contain
proprietary files, says Lenny Monsour, general manager of application
hosting and management. Inflow combines the use
of this technology with practices such as monitoring employees
who have access to data considered vital to the company.
A major financial services provider is using a firewall
from San Francisco-based Vontu Inc. that monitors outbound
e-mail, Webmail, Web posts, and instant messages to
ensure that no confidential data leaves the company. The
software includes search algorithms and can be customized
to automatically detect specific types of data such as lists on
a spreadsheet or even something as granular as a customer’s
Social Security number. The firm began using the product
after it went through layoffs in 2000 and 2001.
“Losing customer information was a primary concern of
ours,” says the firm’s chief information security officer, who
asked not to be identified. “We were concerned about people
leaving and sending e-mail to their home accounts.” In fact,
he says, before using the firewall, the company had trouble
with departing employees taking intellectual property and
using it in their new jobs at rival firms, which sometimes led
to lawsuits.
Vijay Sonty, chief technology officer at advertising firm
Foote Cone & Belding Worldwide in New York, says losing
customer information to competitors is a growing concern,
particularly in industries where companies go after many of
the same clients.
He says the firm, which mandates that some employees
sign noncompete agreements, is looking into policies and
guidelines regarding the proper use of customer information,
as well as audit trails to see who’s accessing customer
lists. “I think it makes good business sense to take precautions
and steps to prevent this from happening,” Sonty says.
“We could lose a lot of money if key people leave.”
Case Study Questions
1. Why have developments in IT helped to increase the
value of the data resources of many companies?
2. How have these capabilities increased the security
challenges associated with protecting a company’s
data resources?
3. How can companies use IT to meet the challenges of
data resource security?
Source: Adapted from Bob Violino, “Protecting the Data Jewels:
Valuable Customer Lists,” Computerworld, July 19, 2004. Copyright
© 2004 by Computerworld, Inc., Framingham, MA 01701. All
rights reserved.
I

Permalink Leave a Comment

Chap 4 and Chap 8 MIS 2nd Trinal

August 28, 2009 at 05:40 (IT-414 MIS)

CHAPTER 4 SYSTEM USERS AND DEVELOPERS
Management Information Systems, 9th edition,
By Raymond McLeod, Jr. and George P. Schell
© 2004, Prentice Hall, Inc.
Learning Objectives:
Learn that the organizational context for systems development and use is changing from a physical to a virtual structure.
Recognize the benefits and disadvantages of the virtual office and the virtual organization.
Know who the information specialists are and how they can be integrated into an information services organization.
Be alerted to new directions that the information services organization might take.
Understand what is meant by end-user computing and why it came about.
Learning Objectives (cont.):
Appreciate that users, especially those with an end-user computing capability, are a valuable information resource.
Know the benefits and risks of end-user computing.
Be aware of the types of knowledge and skill that are important to systems development, practiced by both end-users and information specialists.
Understand knowledge management and the challenges that must be addressed for successful implementation.
Be aware of the special constraints that face developers of global information systems.

Introduction
The first office automation applications were mostly designed for secretarial and clerical tasks; but soon spread to managerial and professional ranks, leading eventually to the virtual office
As firms evaluated the advantages and disadvantages of centralized and decentralized IS organizations, three structures were identified: the partner, platform, and scalable models
Systems development is an evolving activity, with the organizational setting and the roles played by the users and information specialists constantly changing
THE BUSINESS ORGANIZATION
Information systems have been developed to support all organizational levels (Figure 4.1)
At the strategic level, executive information systems are used by the firm’s top managers
An MIS is designed to meet the information needs of managers throughout the firm
At the lowest, operational level systems are designed to meet the firm’s day-to-day information needs in those business areas

OFFICE AUTOMATION
OA includes all of the formal and informal electronic systems primarily concerned with the communication of information to and from persons inside and outside the firm
Figure 4.2 shows an OA model of computer- and non computer-based applications used by a firm
Innovations in IT made it possible for many firm activities to be conducted independent of their location
This is called a virtual organization, and evolved out of office automation

A Shift from Clerical to Managerial Problem Solving
The first OA applications supported secretarial and clerical personnel
As managers and professionals became more computer literate they learned to use the computer applications in problems solving
They began using e-mail to communicate, electronic calendaring to schedule meetings, video conferencing to link problem solvers over a wide geographical area, and so on
OA applications have also been extended by such technologies as hand held computers and PDAs

THE VIRTUAL OFFICE
Evidence of the virtual office began to emerge during the 1970s as low-priced microcomputers and communications equipment made it possible for individuals to work at home
At the time, the term teleprocessing was used, later the term telecommuting was introduced to describe how employees could electronically “commute” to work
Advantages and Disadvantages of Telecommuting
Advantages:
Provides employees with scheduling flexibility so that personal tasks can also be accommodated
Firms typically pay more attention to communications needs of telecommuters
Disadvantages:
Employees can develop a sense of not belonging
Employees can get the idea that they are expendable
The division between home and office responsibilities can become blurred
Hoteling
The concept of “hoteling” is for the firm to provide a “sharable” central facility that employees can use as the need for office space and support rises and falls
The guiding principles for hoteling include:
Design the spaces for functional needs
Similar sized offices are built
Centralized storage space is provided
Fewer enclosed office spaces
Assigned offices spaces are eliminated
Advantages and Disadvantages of Telecommuting
Advantages:
Reduced facility cost
Reduced equipment cost
Reduced work stoppages
Social contribution
Disadvantages
Low morale
Fear of security risks
The virtual office demands cooperation by both the firm and the employees if it is to succeed
THE VIRTUAL ORGANIZATION
In a virtual organization, firm operations are designed so they are not tied to physical locations
Industries that are the most attracted to these concepts are those that add value in the form of: information, ideas and intelligence
Such as: education, health care, entertainment, travel, sports, and consulting
Workers in this “3I Economy” need to have the knowledge and skills required to succeed as IT and information systems are included in business processes
THE INFORMATION SERVICES ORGANIZATION
Require
The Information Resources
The Information Specialists
Systems Analysts
Database Administrators
A Webmaster
Network Specialists
Programmers
Operators
A structure that is typical of a centralized operation is illustrated in Figure 4.4
THE INFORMATION SERVICES ORGANIZATION
Information services organizations usually require:
The Information Resources
The Information Specialists
Systems Analysts
Database Administrators
A Webmaster
Network Specialists
Programmers
Operators
Figure 4.4 shows the structure of a typical information services organization

Innovative Organizational Structures
During the 1990s, large firms sought to achieve a “centrally decentralized” organizational structure
Three innovative organizational structures that have since been identified are:
the partner model;
the platform model; and
the scalable model
Whereas the organizational structure in Figure 4.4 illustrates how the information specialists are grouped, the innovative structures show how the IT functions are grouped
Three Innovative Structures
The Partner Model (Figure 4.5): IT coordinates business areas to achieve value innovation and accomplish delivery of solutions
The Platform Model (Figure 4.6): IT provides the networks so that innovation can be accomplished by the business areas
The Scalable Model (Figure 4.7): shows that two sourcing networks are utilized to interface with vendors when engaging in infrastructure management and solutions delivery within a flexible structure

What All Three Models Share
All three models recognize that the IT function is not a self-contained unit, but interfaces with both users and vendors
Responsibilities for certain functions must be allocated to specialists such as divisional information officers and account managers
All three models reflect an effort to make the IT unit a team player in the firm’s use of information resources sharing and delegating functions when it is best for the firm
END-USER COMPUTING
The first Information Systems were developed with IT specialists doing all of the work for the users (Figure 4.8)
In the late 1970s, users began developing their own computer applications
End-user computing evolved out of four main influences
The impact of computer education
The information services backlog
Low-cost hardware
Prewritten software
In Figure 4.9 the end-user relies on the information specialists for some degree of support

USERS AS AN INFORMATION RESOURCE
In deciding how the firm will use its information resources, management must consider how end-user computing will be conducted, so as to maximize the benefits and minimize the risks
Benefits and Risks of End-User Computing
Benefits:
Match Capabilities and Challenges
Reduce Communications Gap  
Risks:
Poorly Aimed Systems  
Poorly Designed and Documented Systems  
Inefficient Use of Information Resources  
Loss of Data Integrity
Loss of Security    
Loss of Control  
SYSTEMS DEVELOPMENT KNOWLEDGE AND SKILL
The development of information systems requires certain knowledge and skills
It is possible to identify not only the types of knowledge and skill needed by information specialists and users, but also how users can be divided into general management and their staff
Table 4.1 identifies the types of knowledge needed and whether they are of major, intermediate, or minor importance
In the same way, we can identify different types of skills and their relative importance (Table 4.2)

Knowledge Management
This knowledge relates to the firm’s processes, technology, management, and interactions with its environmental elements
Firms are embarking on projects to develop knowledge management systems for the purpose of achieving a competitive advantage
Firms typically regard KM as another type of system to be developed as an IS that gathers knowledge, stores it and makes it available to users
Table 4.3 lists the challenges that must be faced by firms in developing KM systems

A Successful KM Development Project at Nortel Networks
Nortel Networks (using knowledge management software from Excalibur Technologies) credits its pilot KM project with enabling its transformation from a technology-focused company to one that is opportunity/customer-focused
The old new product development system illustrated in Figure 4.10 consisted of a five-phase process
The new project involved an NPD system that enabled Nortel to:
leverage multidisciplinary NPD knowledge assets;
improve NPD decision making; and
facilitate learning and knowledge exchange

CHALLENGES IN DEVELOPING GLOBAL INFORMATION SYSTEMS
GIS describes the information system used by multinational companies (MNC)
GIS developers must address the following constraints:
Politically Imposed Constraints
Cultural and Communications Barriers
Restrictions on Hardware Purchases and Imports  
Restrictions on Data Processing
Restrictions on Data Communications  
Technological Problems
Lack of Support from Subsidiary Managers
PUTTING THE SYSTEM USERS AND INFORMATION SPECIALISTS IN PERSPECTIVE
Early systems development was accomplished solely by information specialists, but over time the users have played increasingly important roles
Not only has systems development work changed, but the setting in which the work is performed has changed as well
Electronic communication networks enable firms to become virtual organizations, so now their development work can be done almost anywhere
END OF CHAPTER 4

===================================================

CHAPTER 8 INFORMATION IN ACTION
Management Information Systems, 9th edition,
By Raymond McLeod, Jr. and George P. Schell
© 2004, Prentice Hall, Inc.
Learning Objectives
Recognize that the transaction processing system processes data that describes the firm’s basic daily operations.
Become familiar with the processes performed by a transaction processing system for a distribution firm.
Recognize that organizational information systems have been developed for business areas and organizational levels.
Understand the processes performed by a marketing information system.
Understand the processes performed by a human resources information system.
Know the basic architecture of an executive information system.

Learning Objectives (cont.)
Know what customer relationship management is and why it requires a large computer storage capability.
Know how a data warehouse differs from a database.
Know the basic architecture of a data warehouse system.
Know how data is stored in a data warehouse.
Know how a user navigates through a warehouse data repository.
Know what on-line application processing is.
Know the two basic ways to engage in data mining.
Introduction
This chapter gives examples of how information is used in today’s firms
Transaction Processing Systems process data that describe the firm’s daily operations and produce a database used by other firm systems
A related application is Customer Relationship Management (CRM)
CRM uses data warehousing, meaning data accumulates over time and can retrieved for use in decision making
THE TRANSACTION PROCESSING SYSTEM
This term TPS is used to describe the IS that gathers data describing the firm’s activities, transforms the data into information, and makes the information available to users both inside and outside the firm
Figure 8.1 is a model of a TPS where data is gathered from the firm’s physical system and environment, and entered into a database
Data processing software transforms the data into information for the firm’s management and for individuals and organizations in the firm’s environment

System Overview
Data flow diagrams (DFDs) are used to document the system in a hierarchical manner
The diagram in Figure 8.2 represents the highest level, called a context diagram because it presents the system in the context of its environment
The data flowing from the distribution system to management consists of the standard accounting reports

The Major Subsystems of the Distribution System
While context diagrams define the system boundary, other DFDs are used to describe the major subsystems in the firms data processes
When a series of DFDs are used in a hierarchy, they are called leveled DFDs
Figure 8.3 which is a Figure 0 diagram showing three major subsystems
These subsystems are identified by the numbered upright rectangles in Figure 8.3

Systems That Fill Customer Orders
Figure 8.4 shows the four main systems involved in filling customer orders:
The order entry system enters customer orders into the system
The inventory system maintains the inventory records
The billing system prepares the customer invoices, and
The accounts receivable system collects the money from the customers
Figure 8.4 expands Process 1 shown in the Figure 0 diagram, and is called a Figure 1 diagram

Systems That Order Replenishment Stock
The subsystems concerned with ordering replenishment stock from suppliers are shown in Figure 8.5, which is called a Figure 2 diagram since it explodes Process 2 of the Figure 0 diagram
The purchasing system issues purchase orders to suppliers for the needed stock
The receiving system receives the stock, and
The accounts payable system makes payment

Systems That Perform General Ledger Processes
Figure 8.6 shows the detail for the last of the three processes in the Figure 0 diagram
The general ledger system is the part of the accounting system that combines data from other accounting systems to present a composite financial picture of the firm. Two subsystems are involved:
The update general ledger system posts records that describe the various actions and transactions to the general ledger
The prepare management reports system uses the contents of the general ledger to prepare the balance sheet and income statement

ORGANIZATIONAL INFORMATION SYSTEMS
Other specialized information systems used in a firm include the marketing information system (MKIS) and the human resources information system (HRIS)
Another IS that is implemented at the organizational level is the executive information systems (EIS), used by upper level managers in an organization
The MKIS, HRIS, and EIS are described below.
The Marketing Information System
An MKIS is made up of input and output subsystems connected by a database (Figure 8.7)
The Input Subsystems are:
Transaction processing system
The marketing research subsystem
The marketing intelligence subsystem
Each output subsystem provides information about four critical elements in the marketing mix:
The product subsystem
The place subsystem
The promotion subsystem
The price subsystem

The Human Resources Information System
Figure 8.8 illustrates the human resources information system (HRIS)
The figure shows three main HRIS input subsystems:
The transaction processing system provides input data
The human resources research subsystem used for gathering specialized research information
The human resources intelligence subsystem that gathers environmental data that bears on HR issues

The Executive Information System
The executive information system (EIS) provides information to top-level managers on overall firm performance.
A firm’s EIS usually includes executive workstations networked to a central server (shown in Figure 8.9)
Some executives prefer more detail, so EIS designers build in flexibility so their systems fit the preferences of all executives, whatever they are
One approach is to provide a drill-down capability, giving executives the ability to bring up a summary display and then display successively greater levels of detail (Figure 8.10)

CUSTOMER RELATIONSHIP MANAGEMENT (CRM)
CRM systems are used to manage relationships between a firm and its customers so both can receive maximum value from the relationship
Using more effort to cultivate long-term client relationships makes good marketing sense since its usually cheaper to keep existing customers than to obtain new ones
The CRM system accumulates customer data over a long period and uses the data to produce information for users. A CRM system’s central element is the data warehouse
DATA WAREHOUSING
Until recently, computer technology could not support a system with such large-scale data demands
The term data warehouse was coined to describe a data store with the following characteristics:
Very large scale storage capacity
The data is accumulated into new records instead of updating existing records with new information
The data is easily retrievable.
The data is used for decision making, not for the firm’s daily operations
The Data Warehousing System
A data warehousing system (Figure 8.11) enters data into the warehouse, transforms the data into information, and makes the information available to users
Data is gathered from data sources and goes through a staging area before being entered in the warehouse data repository
An information delivery system obtains data from the warehouse data repository and transforms it into information for the users
The data warehousing system also includes a management and control components

How Data Is Stored in the Warehouse Data Repository
The warehouse data repository stores two types of data in separate tables, which are combined to produce an information package
Identifying and descriptive data are stored in dimension tables (Figure 8.12)
Fact tables contain the quantitative measures of an entity, object, or activity (Fig. 8.13)
An information package identifies all of the dimensions that will be used in analyzing a particular activity. Figure 8.14 shows the format and Figure 8.15 includes some sample data

The Star Schema
The key that identifies the dimension and provides the link to connect the dimension tables to the fact table is called a star schema
Figure 8.16 shows how the keys in four dimension tables are related to keys in the information package in the center
Fig. 8.17 is an example using the four dimension tables: customer, time, salesperson, and product
The warehouse data repository contains multiple star schemas – one for each activity type to be analyzed

INFORMATION DELIVERY
The final element in the data warehousing system is the information delivery system
Information is obtained from the data repository, transformed into information, and made available to users
Figure 8.18 shows how the user can navigate the data repository to produce summary information, detailed information, and detailed data
Figure 8.19 shows the results of a drill-across navigation, producing outputs in different hierarchies

ONLINE ANALYTCAL PROCESSING
OLAP is a type of software especially developed for data warehouses
Using OLAP, users can communicate with the data warehouse either through a GUI or Web interface, and quickly produce information in a variety of forms, including graphics
There are two approaches to OLAP (Figure 8.20):
ROLAP (for relational online analytical processing) that utilizes a standard relational DBMS
MOLAP (for multidimensional online analytical processing) that utilizes a special multidimensional DBMS

ROLAP and MOLAP
Both OLAP types include a data warehouse server and a second server that houses OLAP software
A major difference is that the MOLAP workstation includes a downloaded multidimensional database
The data in this database has already been formatted in various dimensions so that it may be made available quickly rather than go through time-consuming analyses
Figure 8.21 illustrates a report that is the type that ROLAP can easily prepare
MOLAP can produce information in many dimensions
Figure 8.22 illustrates a summary report in four dimensions: store type, product, age, and gender

DATA MINING
Data mining is the process of finding relationships in data previously unknown to the user
Data mining helps users discover relationships and present them in an understandable way so the relationships can be used in decision making
The two basic data mining techniques are:
Hypothesis Verification where data is used to test theories
Knowledge Discovery in which users search for common characteristics within the data
END OF CHAPTER 8

Permalink Leave a Comment

IT-414 – MIS – Case 4

July 30, 2009 at 19:29 (IT-414 MIS)

GE, Dell, Intel, and Others: The Competitive Advantage of Information Technology

There’s nothing like a punchy headline to get an article
some attention. A recent piece in the Harvard
Business Review (May 2003), shockingly labeled “IT
Doesn’t Matter,” has garnered the magazine more buzz than
at any time since the Jack Welch affair. The article has been
approvingly cited in The New York Times, analyzed in Wall
Street reports, and e-mailed around the world. But without
such a dramatic and reckless title, I doubt the article would
have been much noticed. It’s a sloppy mix of ersatz history,
conventional wisdom, moderate insight, and unsupportable
assertions. And it is dangerously wrong.
Author Nicholas Carr’s main point is that information
technology is nothing more than the infrastructure of modern
business, similar to railroads, electricity, or the internal combustion
engineering advances that have become too commonplace
for any company to wangle a strategic advantage from
them. Once-innovative applications of information technology
have now become merely a necessary cost. Thus Carr thinks
today’s main risk is not underusing IT but overspending on it.
But before we get any further, let’s have a reality check.
First, let’s ask Jeff Immelt, the CEO of General Electric Co.,
one of the premier business corporations in the world, this
question: “How important is information technology to GE?”
Here’s his answer: “It’s a business imperative. We’re primarily a
service-oriented company, and the lifeblood for productivity is
more about tech than it is about investing in plants and equipment.
We tend to get a 20 percent return on tech investments,
and we tend to invest about $2.5 billion to $3 billion a year.”
Then let’s ask Dell Corporation CEO, Michael Dell:
“What’s your take on Nick Carr’s thesis that technology no
longer gives corporate buyers a competitive advantage?” Here’s
his answer: “Just about anything in business can be either a
sinkhole or a competitive advantage if you do it really, really
bad or you do it really, really well. And information technology
is an often misunderstood field. You’ve got a lot of people who
don’t know what they’re doing and don’t do it very well. For us,
IT is a huge advantage. For Wal-Mart, GE, and many other
companies, technology is a huge advantage and will continue
to be. Does that mean that you just pour money in and gold
comes out? No, you can screw it up really bad.”
Finally, let’s ask Andy Grove, former CEO and now
Chairman of Intel Corporation, a direct question about IT:
“Nicholas Carr’s recent Harvard Business Review article says:
‘IT Doesn’t Matter.’ Is information technology so pervasive
that it no longer offers companies a competitive advantage?”
Andy says: “In any field, you can find segments that are close
to maturation and draw a conclusion that the field is homogeneous.
Carr is saying commercial-transaction processing
in the United States and some parts of Europe has reached
the top parts of an S-curve. But instead of talking about that
segment, he put a provocative spin on it—that information
technology doesn’t matter—and suddenly the statement is
grossly wrong. It couldn’t be further from the truth. It’s like
saying: I have an old three-speed bike, and Lance Armstrong
has a bike. So why should he have a competitive advantage?”
So, basically, Carr misunderstands what information
technology is. He thinks it’s merely a bunch of networks and
computers. He notes, properly, that the price of those has
plummeted and that companies bought way too much in recent
years. He’s also right that the hardware infrastructure of
business is rapidly becoming commoditized and, even more
important, standardized. Computers and networks per se are
just infrastructure. However, one of the article’s most glaring
flaws is its complete disregard for the centrality of software
and the fact that human knowledge or information can be
mediated and managed by software.
Charles Fitzgerald, Microsoft’s general manager for platform
strategy, says that Carr doesn’t put enough emphasis on
the “I” in IT. “The source of competitive advantage in business
is what you do with the information that technology
gives you access to. How do you apply that to some particular
business problem? To say IT doesn’t matter is tantamount
to saying that companies have enough information
about their operations, customers, and employees. I have
never heard a company make such a claim.”
Paul Strassman who has spent 42 years as a CIO—at
General Foods, Xerox, the Pentagon, and most recently
NASA—was more emphatic. “The hardware—the stuff
everybody’s fascinated with—isn’t worth a damn,” he says.
“It’s just disposable. Information technology today is a
knowledge-capital issue. It’s basically a huge amount of labor
and software.” Says he: “Look at the business powers—most
of all Wal-Mart, but also companies like Pfizer or FedEx.
They’re all waging information warfare.”

Case Study Questions

1. Do you agree with the argument made by Nick Carr to
support his position that IT no longer gives companies
a competitive advantage? Why or why not?

2. Do you agree with the argument made by the business
leaders in this case in support of the competitive advantage
that IT can provide to a business? Why or why not?

3. What are several ways that IT could provide a competitive
advantage to a business? Use some of the companies
mentioned in this case as examples. Visit their websites
to gather more information to help you answer.

Source: Adapted from David Kirkpatrick, “Stupid-Journal Alert:
Why HBR’s View of Tech Is Dangerous,” Fortune, June 9, 2003,
p. 190; Robert Hoff, “Andy Grove: We Can’t Even Glimpse the
Potential,” BusinessWeek, August 25, 2003, pp. 86–88; and “Speaking
Out: View from the Top,” BusinessWeek, August 25, 2003,
pp. 108–13.

Permalink Leave a Comment

IT-414 – MIS – Case 3

July 16, 2009 at 11:28 (My Posts)

Aviall Inc.: From Failure to Success
with Information Technology

Joseph Lacik, Jr., doesn’t try to measure the return on investment
of his company’s e-business website. The fact
that Dallas-based Aviall Inc. (www.aviall.com) was saved
from financial disaster by a controversial multimillion-dollar
IT project that included developing the website as one key
element is all the return he needs to see. That investment, in
the words of Larry DeBoever, chief strategy officer at the IT
consulting firm Experio Solutions Corp. in Dallas, “turned
Aviall from a catalog business into a full-scale logistics business”
that hundreds of aviation parts manufacturers and
airlines large and small depend on for ordering, inventory
control, and demand forecasting. He says the new approach
ties Aviall more tightly to customers such as Rolls-Royce
PLC. “Aviall is now the logistics back end for the aviation
firms,” says DeBoever, whose company was retained to help
with portions of Aviall’s systems integration work. “And they
did it even though the airline industry shrank over the last
three years.”
In early 2000, with quarterly sales dropping and Aviall
on the ropes, “We invested $30 million to $40 million to
build this infrastructure,” says Lacik, vice president of information
services at Aviall Services, a unit of Aviall. “Our
competitors thought we were insane. Some investors asked
for my resignation.” But the results of the project have
been extremely successful and represent a huge comeback
from Aviall’s recent business/IT problems, which sprang
from a failed enterprise resource planning (ERP) system
that had been designed to automate and integrate the
company’s order processing, inventory control, financial
accounting, and human resources business systems. However,
there were major problems in implementing the new
ERP system that resulted in Aviall’s inventory getting out
of control.
Lacik joined the company in early 2000. “You couldn’t
properly order or ship things. My job was to bring back
operational stability,” he says. To do so, he implemented
the CEO’s vision of transforming Aviall into a provider of
supply chain management services through the integration
of a range of Web-enabled e-business software systems.
Aviall bought and installed a BroadVision online purchasing
system, Siebel Systems sales force automation and order entry
software, a Lawson Software financial system, a Catalyst
Manufacturing Services inventory control and warehouse
management system, and Xelus product allocation, inventory
management, and purchasing forecasting software. All
of these systems were integrated by using common business
databases managed by database software from Sybase, Inc.
Of course, even with planning, some of the systems integration
was more difficult than expected. One major reason
was the sheer size of the project. The new combined
system has to properly access and deal with customized
pricing charts for 17,000 customers who receive various
types of discounts, and it has to deal with an inventory of
380,000 different aerospace parts.
The development of Aviall.com was one of the least expensive
parts of the project, at a cost of about $3 million,
Lacik says. But it provides big benefits. When customers order
products on the Aviall website, it costs the company
about 39 cents per order, compared with $9 per transaction
if an Aviall employee takes the order over the phone. New
supply chain functions are also possible, such as the ability
for customers to transfer their orders from an Excel spreadsheet
directly to the website. Customers can also receive
price and availability information on aerospace parts in less
than five seconds—a real-time feature that hadn’t been available
before the BroadVision system was installed, Lacik says.
The process also frees the company’s sales force from
routine order taking and follow-up, thus allowing them to
spend more time developing relationships with customers.
What’s more, the website helps Aviall build relationships
with suppliers by providing them with customer ordering
data that enables them to better match production with
demand. The website now generates $60 million of the
company’s $800 million in annual revenue, or 7.5 percent,
up from less than 2 percent a year ago. “Over the next three
to five years, it could become more than 30 percent.”
Lacik says.
Case Study Questions
1. Why do you think that Aviall failed in their implementation
of an enterprise resource planning system? What
could they have done differently?
2. How has information technology brought new business
success to Aviall? How did IT change Aviall’s business
model?
3. How could other companies use Aviall’s approach to
the use of IT to improve their business success? Give
several examples.
Source: Adapted from Steve Alexander, “Website Adds Inventory
Control and Forecasting,” Computerworld, February 24, 2003,
p. 45. Copyright © 2003 by Computerworld, Inc., Framingham,
MA 01701. All rights reserved.

Permalink Leave a Comment

Next page »