This week we discussed chapter 10 which was over E-commerce, selling and buying goods online. We discussed this on Tuesday in class. Then on Thursday we went a little more in-depth with a case study over online groceries. We also took a clicker quiz over the chapter on Thursday which I did decent on. Ever since Thursday, our group has been trying to straighten things out with Google on our funds for our AdWords account since I put in the wrong CID thinking we were supposed to make our own CID up and stick with it. I was wrong and now we're in a big mess. Hopefully that will get worked out fairly soon so we can get our campaign up and running to meet our deadline or at least close to it. That was basically what I did this week. Hopefully the week after spring break runs a bit more smoothly.
This week we learned about E-commerce. The main thing that I learned myself was the different business models businesses can take. I also learned that my groups business does not employ any of these models (information broker, portal, social networking, etc.) and that they don't really need to since it is more of a B2B, business to business, model and there is not a lot of interactivity needed other than a phone number. Also since it's B2B there's not a lot of need for information density on the site since the other business probably already knows what they need/want. That is basically a wrap up of what I have learned this week in CIST 3100. Have a great spring break!
Saturday, March 19, 2011
Saturday, March 12, 2011
Week 9
The biggest challenge a company faces when implementing an enterprise system is it's compatibility with their existing business processes. Enterprise systems take a long time to integrate into a company and they must be able to make a swift change in this long process. They have to be able to continue their services while moving into new processes for completing these services. Doing this change without any stalls in service can be crucial for the company as it has been shown that if there are any major hiccups in the implementation, it could mean loss of customers, profits, efficiency, or even complete failure of the company. This risk makes implementing any enterprise system into a company a very serious challenge and should be taken into account in the decision of using an enterprise system or not.
This week I read Chapter 9. We went over customer relationship management systems on Tuesday in class. I aced the "quiz" we had on Tuesday by just showing up and writing my name on a paper. Then on Thursday we went over the other part of the section dealing with supply chain management. Now today I am collaborating with Justin Jones on the assessment over comparing two enterprise system software from two companies. We chose Oracle's Siebel Systems CRM 8.0 and Saleforce.com's CRM. Today I am also finishing up my blog for the week.
This week I read Chapter 9 which was about enterprise systems, systems that span across multiple departments in a company. It was then broken down into supply chain management and customer relationship management systems. I learned that supply chain management systems include a company's upstream chain including their suppliers, their secondary suppliers (suppliers' suppliers), and their tertiary suppliers (suppliers' suppliers' suppliers). The company's downstream chain may include their distributors, retailers, and customers. These supply chains can be big or small depending on the kind of business a company does and how they approach that business. Supply chain management systems analyzes the date that flows through this chain and provides solutions to keep costs down, inventory not too high or too low, and keep the demands of the customers met. I also learned that customer relationship management systems look at the relationship with the companies customers and devises solutions on how to gain a higher intimacy with that customer and how to push products to the right people to raise profits. Overall I learned from this chapter that enterprise systems can be very helpful to companies. However, I also learned that they are often expensive, hard to implement, and only useful for certain business. That was my ninth week in Organizations, Applications, and Technology. It was a very hard week for me with all this midterm preparation at the same time but I believe I did my best and that my efforts were satisfactory for not only the class but for myself as well. I hope you enjoyed the reading!
This week I read Chapter 9. We went over customer relationship management systems on Tuesday in class. I aced the "quiz" we had on Tuesday by just showing up and writing my name on a paper. Then on Thursday we went over the other part of the section dealing with supply chain management. Now today I am collaborating with Justin Jones on the assessment over comparing two enterprise system software from two companies. We chose Oracle's Siebel Systems CRM 8.0 and Saleforce.com's CRM. Today I am also finishing up my blog for the week.
This week I read Chapter 9 which was about enterprise systems, systems that span across multiple departments in a company. It was then broken down into supply chain management and customer relationship management systems. I learned that supply chain management systems include a company's upstream chain including their suppliers, their secondary suppliers (suppliers' suppliers), and their tertiary suppliers (suppliers' suppliers' suppliers). The company's downstream chain may include their distributors, retailers, and customers. These supply chains can be big or small depending on the kind of business a company does and how they approach that business. Supply chain management systems analyzes the date that flows through this chain and provides solutions to keep costs down, inventory not too high or too low, and keep the demands of the customers met. I also learned that customer relationship management systems look at the relationship with the companies customers and devises solutions on how to gain a higher intimacy with that customer and how to push products to the right people to raise profits. Overall I learned from this chapter that enterprise systems can be very helpful to companies. However, I also learned that they are often expensive, hard to implement, and only useful for certain business. That was my ninth week in Organizations, Applications, and Technology. It was a very hard week for me with all this midterm preparation at the same time but I believe I did my best and that my efforts were satisfactory for not only the class but for myself as well. I hope you enjoyed the reading!
Saturday, March 5, 2011
Chapter 8
After going over my past blogs, I'm glad to see they show how I am learning. I believe I have learned so much and gained an understanding of how businesses work and the systems that allow those businesses to operate. I have learned some technical things such as the components of networking and computing. For the most part I don't think theres anything about the way I am studying or completing assignments that needs to change. The one thing that I may want to change is getting my assignments done a little bit earlier. So far I haven't had any late assignments but they do get close sometimes.
This week I read Chapter 8. We talked about the chapter and took a quiz over it on Tuesday. Then on Thursday we went over the Case Study in this chapter which was about one of the biggest data theft in history. Some guys hacked into TJX networks outside TJX stores who didn't have firewalls set, no encryption, and sent financial information over the wireless network. They were able to gain 45 million credit and debit card numbers. We also went over commonly missed questions on the midterm and how the grading was done. Along with all that, I worked with my group to get our Precampaign Report done for our Google AdWords challenge and submitted that on the student dashboard and on Blackboard.
This week I read the chapter over network security. I learned that every network can be unsecure and has a potential to be hacked or tapped into. Hackers/Crackers use all sorts of programs to obtain information, stop a system, or slow down a system until it is no longer useful. They can do this through the use of viruses, sniffer programs, and worms along with some other means of access into networks. I learned that a very unsecure network is a wireless network because of the ease of being in range to connect to the router and being able to gain access more easily than hard line networks. I also learned that there are plenty of countermeasures for these risks. Firewalls, encryption, and password protocols such as WPA all can stop unauthorized access into a network. That wraps up this blog, like always I hope you enjoyed.
This week I read Chapter 8. We talked about the chapter and took a quiz over it on Tuesday. Then on Thursday we went over the Case Study in this chapter which was about one of the biggest data theft in history. Some guys hacked into TJX networks outside TJX stores who didn't have firewalls set, no encryption, and sent financial information over the wireless network. They were able to gain 45 million credit and debit card numbers. We also went over commonly missed questions on the midterm and how the grading was done. Along with all that, I worked with my group to get our Precampaign Report done for our Google AdWords challenge and submitted that on the student dashboard and on Blackboard.
This week I read the chapter over network security. I learned that every network can be unsecure and has a potential to be hacked or tapped into. Hackers/Crackers use all sorts of programs to obtain information, stop a system, or slow down a system until it is no longer useful. They can do this through the use of viruses, sniffer programs, and worms along with some other means of access into networks. I learned that a very unsecure network is a wireless network because of the ease of being in range to connect to the router and being able to gain access more easily than hard line networks. I also learned that there are plenty of countermeasures for these risks. Firewalls, encryption, and password protocols such as WPA all can stop unauthorized access into a network. That wraps up this blog, like always I hope you enjoyed.
Subscribe to:
Comments (Atom)