Language Preference
Thursday, July 25, 2013
Online Shopping
Online shopping has skyrocketed in the networking realm. Amazan, EBay, Netflix, and E-book businesses are only a few of many businesses that have relied on the network for their businesses to strive. Since networks have become so popular, online shopping is often preferred nowadays to traditional shopping. Even for this course, transactions were made online to register for INFO 224 that would have been much less convenient to rely on with mail or in-person measures.
In the era of e-commerce, Netflix has become so successful. “Netflix is prospering while Blockbuster is bankrupt” [1]. Before this era, blockbuster was a popular method to rent videos. Now, however, Netflix has catered to the priorities if this new era. “As far as the consumers go, Netflix thinks that busy people see downloading a movie through Netflix as a less expensive -- at $8.99 per month for unlimited rentals -- and more time efficient way to see a movie than making a trip to a movie theater.”[1] Netflix is continuously moving towards online streaming as this society continuously moves toward online shopping and networking.
E-books have also become a popular item people shop for online. Pretty soon, I predict that libraries will become obsolete. E-books allow people to read more easily on-the-go, shipping hassles are cut, and inventory costs are eliminated. Now, E-books are simply downloaded and users can read their desired book within minutes [2]. Waiting for books to arrive, just like videos, is becoming history. As online shopping is becoming more prevalent, the convenience of reading novels and textbooks online is becoming more preferable.
Amazon and EBay have been popular websites for online shopping and continue to attract more customers. When compared to physical stores, online stores have risen in profit more rapidly. “According to eMarketer, B2C (business to consumer) e-commerce sales in the Asia-Pacific region grew by more than 33% in 2012, amounting to $332 billion. The figure is expected to grow by more than 30% this year amounting to $433 billion and accounting for more than one-third of the global B2C e-commerce sales” [3]. That said, online shopping through many websites is on the rise.
It is understandable how online shopping is more preferable nowadays than traditional shopping. Online shopping is less time-consuming and in many ways less expensive. Travel costs are eliminated and people can buy their products without physically leaving their home. People now have the ability to purchase items while they are working or doing any other activity at the same time.
http://www.dailyfinance.com/2010/09/23/why-blockbuster-went-bust-while-netflix-flourished/
http://www.bookswealth
http://www.forbes.com/fdc/welcome_mjx.shtml.com/
Cloud Computing Threats and Solutions
While cloud computing has been beneficial to expand businesses and increase productivity, security issues remain a threat. When cloud computing is used to store crucial data for organizations, the information is stored in a data center, a central location where IT professionals secure the data with encryption policies and the security of the data in a business is in the hands of the supervisors of that data center. Cloud computing heightens the speed of research and access to information that allow businesses to survive. In addition, that speed allows information to be reliably accessed and secured over the internet, so it can be seen regardless of which information system is in use.
The security concerns of the information in the cloud are on the rise. For example, personal data and crucial business information can be exposed and even stolen. First of all, the information is in a central location of a data center, a location that can attract various hackers and potential theft [1]. Also, the increased reliance on cloud computing increases the vulnerability to problems when network outages occur, such as the recent outage in hurricane Sandy [2]. For instance, if patient health records need to be accessed and is stored at the cloud, his/her life can be at risk if such an outage occurs [2]. Statistically, only thirty-eight percent of businesses have adequate protection in place over their information on the cloud [3]. While these risks of cloud computing can be scary, proper precautions can increase the safety of this activity and companies can continue to enjoy the benefits of it while securing their private data.
To protect sensitive data, companies need to know exactly who has access to it and ensure that the only people with that access are users of their company. Encryption is necessary so that all information becomes gibberish to any unauthorized users who attempt to read it as soon as the information leaves that organization [4]. Even if the information is stored in a third-party data center, the access of that data must involve the owner of the organization [4]. Also, the data should be protected according to its level of sensitivity, as the costs can add up. Still, these regulations must be enforced as the outcome of leakage of any information in a business can easily exceed the costs of preventing them at great lengths. Despite all of the concerns for the security in cloud computing, such as unauthorized access, excessive reliance during network outages, and information exposure, the benefits of increased productivity and increase of security regarding the IT advances have limitless advantages.
[1]http://blogs.cisco.com/smallbusiness/the-top-5-security-risks-of-cloud-computing/
[2]http://healthitsecurity.com/2013/07/25/does-cloud-computing-threaten-patient-privacy-data-security/
[3]http://cloudcomputing.sys-con.com/node/2747305
[4]http://www.siliconrepublic.com/reports/partner/26-ibm/report/390-predictive-threat-and-risk/
Monday, July 22, 2013
About Me
Hi, I'm Marni.
1) I am majoring in Information Technology Management.
2) My operating system on my computer is Windows 7.
3) I have the right to upgrade the software on my computer.
4) I have taken a course in C++ programming, and I normally use the internet for social networking, watching movies and TV shows, and reading the news.
5) I am currently taking Business Statistics online as well.
6) I currently have the 2007 version of Microsoft Office. I know.. I am a bit behind.
7) I currently work as Easy Technology Associate at Staples on average of 35-40 hours a week, and I love it!
8) I am not positive when I am going to graduate since I am practically working full-time as well as taking classes part-time at Ramapo.
9) As I progress with my education and experience with technology, I hope to advance my career in the IT field. I am proudly working my first IT job as an easy tech, where I recommend various products (printers, shredders, computers, tablets, routers, etc. etc.) and troubleshoot/fix minor PC problems customers happen to have. This hands-on experience has been invaluable to me as I am learning so much and enjoying every minute of it!
10) During my leisure time, I enjoy running and often participate in races (so far some 5k events). Otherwise, I like to work out at the gym and when time allows it, I always love hanging out with my friends.
Well...that is me in a nutshell. I look forward to reading the summaries about my online classmates. smile
My "Translate" Gadget
I chose to add the "Translate" gadget to my blog. I clicked "dashboard" in my personal settings, clicked "layout", and clicked "add a gadget" to accomplish this task. This particular gadget allows users to view my blog in the language of his/her choice. That gadget will add value since the content of my blog will be accessible to anybody, regardless of his/her fluent tongue.
How Social Networking Drives Businesses
Social media monitoring companies can benefit businesses that are trying to increase their knowledge of customer preferences. When keywords that relate to those businesses’ products are searched, results can reveal valuable feedback regarding consumers’ opinions about those products. Technology companies that regularly release new versions of equipment and software are examples of prime potential beneficiaries of this type of insight. In addition, companies such as TV networks rely heavily on the approval of their audience, and can benefit from viewing online conversations regarding their services. These types of businesses can then respond to feedback shown on social networks to raise customer satisfaction and increase profits.
Microsoft is one company that probably uses and benefits from this service from social networking monitoring companies. Windows 8 was released last year and has received negative feedback from customers, which resulted in a significant response by Microsoft. Since most customers are used to the standard start menu, rather than the start screen in Windows 8, many customers have experienced frustration with adjusting to the new layout. As a result, many customers have opted to stick with Windows 7 or earlier versions, rather than upgrading to Windows 8. This negative response caused Microsoft to increase the price of the Windows 7 operating system to encourage more purchases of Windows 8. In addition, Microsoft has already developed Windows 8.1 after barely one year since the release of Windows 8. Complaints regarding the Windows 8 operating system can easily be found on social networking sites and other online chat rooms. This online tactic has allowed Microsoft to gain access to such information about the overall satisfaction with their product, and thus the company became aware very quickly and has already taken action to improve their current state.
Television networks also rely heavily on social media to attract more viewers. For instance, many people use Facebook, Twitter, and other forms of networking to discuss their opinions on various issues regarding particular shows. Often, people who write the plots of the shows will choose the resolutions that the majority of viewers seem to want. If there is a love triangle on a show, the two people that end up together are usually the ones who will make most of the viewers happy. If viewers express enthusiasm over a particular character, the odds are higher that the character will be seen on more episodes or future seasons. Since the goal of a company that produces television shows is to achieve high ratings, the story-lines, characters, and conclusions will be based on reaching that goal. Opinions on all kinds of shows are posted all over social media since people generally enjoy having conversations and debates with others who watch the same shows as them. Therefore, the services social media monitoring companies can provide to TV networks are invaluable.
Through monitoring social media, companies can gain significant feedback regarding their customers’ preferences. Technology companies such as Microsoft that strive to improve product perception and Television networks that try to improve ratings represent examples of likely beneficiaries of this type of monitoring. Any social media forum, whether it is Twitter or simply a site with product or TV reviews, will provide helpful information for any company that aims to increase customer satisfaction and achieve greater profits.
The Digestive System: A Powerful Information System
The digestive system in the human body is a system that responds powerfully to our actions (input) with output and feedback. It is no wonder that a person’s diet is such a huge factor in his/her appearance. The feedback of the digestive system says it all; when a person’s diet is poor, the output is normally a body with low muscle tone or extra fat storage; when a person’s diet is healthy, however, he/she receives positive feedback with a healthier-looking body.
When a person eats anything, the food they initially consume is useless for bodily functions [1]. The digestive system’s key purpose is to break down these foods into smaller molecules, so that these molecules can be used to help the body survive. The digestive system communicates with the nervous system by outputting two signals; Ghrelin and Peptide YY [1]. Ghrelin is message to the nervous system of hunger, telling the person that the digestive system needs more food to absorb more nutrition. The way that person responds to that feedback, by choosing what to input when they consume food, will then result in new bodily processing in the digestive system and thus more feedback afterwards.
When a person consumes food with high amounts of sugar, their digestive system cannot process it for any nutrients, so the sugar is then stored as fat. Due to the lack of nutrition in sugar, the digestive system will output Ghrelin, thus causing a person to overeat [2]. On the other hand, nutritious foods such as vegetables and protein will cause the digestive system to output Peptide YY to signify fullness, since adequate minerals are being processed for bodily health and survival. The body needs adequate protein, carbohydrates and healthy fats. Good carbohydrates are found in vegetables, fruits, and whole grains. Protein sources include fish, poultry, and nuts. Healthy fats are found in avocados, nuts, and olive oil [3]. Sugary foods cannot provide these essential nutrients, and the digestive system cannot process those molecules to output it into anything useful for the body. The more sugar a person consumes, the more fat storage is created, and the popularity of such foods is the culprit of the rise of obesity.
When a person lacks energy or notices fat gains, this is the body’s negative feedback of the input it has received. In a sense, weight gain and the reproduction of Ghrelin after an unhealthy meal can be a good thing. A person’s desire for an attractive appearance and adequate energy will give him/her a powerful incentive to input the correct nutrients into the body and be rewarded with positive feedback. The digestive system can then have the right nutrients to feed the cells and in the long run, the system is successful. A person with an efficient digestive system with healthy nutrients will have increased confidence due to a healthy-looking body, as well as the energy to be productive and earn more money.
[1] http://digestive.niddk.nih.gov/ddiseases/pubs/yrdd/
[2] http://www.examiner.com/article/the-junk-food-cycle-eating-junk-food-just-makes-you-crave-more-junk-food
[3] http://fcs.okstate.edu/documents/nutrition/T-3156%20Vitamins.pdf
Music CD E-Business Proposal
I have decided to open an internet site to buy and sell music CDs to other students. The quality of my internet site is my raw material for allowing this business to begin. First, I will add a gadget to the site that allow users to switch the language to his/her choice. My site will be accessible to people of all languages and enhance business. My inbound logistics will require users to create accounts on my website and add the CDs and music to their profiles. The accounts will allow users to communicate with one another and the music lists will enable users to decide who they want to buy from. Of course, I will need to have a raw material inventory control system where I deal with website maintenance and verification that all of the the CD and music links are valid to prevent viruses and scams. This stage in turn leads to the production stage, where all of the links are indeed safe and customers can be rest assured that the files they click on match the seller’s indication of its contents. Then, the customer service stage feature will have 24/7 accessible emails and phone numbers of the staff of the site, so that customers can address any issues or concerns. Marketing and sales will also be used as ads through social networking sites such as Facebook and Twitter, where a large number of potential customers will be informed to the business and prompted to join the website. The outbound logistics will be similar to other E-commerce businesses, such as Amazon and Ebay, where the buyer will exchange credit card and address details through a secure, encryption enabled process, and then the CDs will be shipped to his/her choice of location. The buyer will receive a confirmation email that their CD was shipped and will arrive in a certain number of business days. Notifications will be sent regarding the items until the buyer confirms he/she received them in good condition. The last stage of the finished product storage is confirmed through that method, and the customer must sign a release form that once the transaction is completed and after the 14-day return period, we bear no responsibility in that matter.
Ramapo GEEK RUNNERS Link
https://docs.zoho.com/sheet/published.do?rid=ulvpz43d68105bd3e488aa054b4b348f17be7&mode=embed
I described some hardware and software geared for mobile devices and showed the features, costs, and relative costs ( the formula was the cost of individual device/total costs). To illustrate further, I created a real life scenario of a small business where my spreadsheet depicts a "Ramapo version" of Geek Squad and shows how they use these items for their business when they travel through Bergen County to fix customers' PCs. For example, they use a laptop as well as a laptop vehicle charger, a mobile printer to print customer files on-the-go, and Carbonite online backup so their files are completely secured through the cloud. To complete this lab, I created an account on Zoho.com, created this spreadsheet, and researched all the features and costs on manufacturer websites. Then I added some images to enhance it. When I finished the spreadsheet, I clicked "Share", then "Publish" and allowed the public viewing option. Then I copied the link of the project, and pasted it into the Java/HTML gadget I created in my blogger. Then I adjusted the width and height of the spreadsheet so it would be easily visible for viewers.
Hardware and Software In Mobile Computing
When hardware and software is selected in the mobile area of business, special considerations need to be made for portability requirements, enhanced security, easy access to WiFi, as well as convenient methods of communication during travel. The Dell Moon Silver Inspiron laptop can benefit this kind of business through its portability and its inclusion of 802.11b/g/n WiFi connectivity. The internet is heavily relied on in business to check email, to research business solutions, and to retain important records. In addition, a laptop adapter for car usage is also beneficial so that the laptop can charge while the worker travels, and will be ensured safe from battery outage and potential loss of productivity. A third hardware device that would help workers succeed in the mobile field of business would be a mobile printer. Now that it is so common to have smart phones and other mini-mobile devices at all times, it would be convenient for people to be able to print what they need for their jobs no matter what device they have access to at any given time. The Platronics H41 Mirage headset is another hardware device that can not only increase productivity with communication with its attached microphone, but it can also be a safety benefit. This headset is used for phone calls and is conveniently attached to a person’s ear. Also, this particular headset has a special feature where the phone connection automatically turns on if co-workers or bosses call, and driving and conference calls become much safer.
In addition to hardware devices that add to the mobile experience in business, two specific software devices, including Carbonite online backup and Microsoft Office 365 Small Business Premium are also valuable products for this objective. Since people often switch form laptops, to Android phones, and to various tablets, online backup has become very practical. Specifically, Carbonite, has advanced encryption and can store unlimited data online, and thus that data can be accessed from any device with the correct user name and password for that particular account. Also, online data is never lost because the data is stored in a data center, while external hard drives or USB flash drives can be misplaced or experience mechanical failure. Microsoft Office 365 Small Business Premium is also useful for business in the mobile field because there is convenient access to databases and calendars to stay organized. The continuous need for mobile computing is growing quickly, and businesses need the latest, fastest devices to increase and maintain competitive advantages.
Thursday, July 11, 2013
Blog Assignment
A cash register is an example of an E-commerce information system. In a retail environment, the cash register provides value with its ability to be secure, verifiable, and flexible. The cash register has the employee numbers for the company in the system so that no unauthorized users have access to the register. Also, the cash register records the privileges of all of the workers. For example, the only workers who can open the cash register when there is no transaction taking place are the managers. This policy prevents both customers and dishonest cashiers from stealing any money. Also, the cash register records all of the transactions that take place, so that any suspicious activity can be exposed when managers view the records. When a customer makes a purchase, the register always requests a verification of the price of the items multiple times to prevent any mistakes. Also, the cashier is required to request identification and receipts for returns to ensure that the transaction is valid and honest. Third, a cash register is flexible with its multiple functionality. Not only does a cash register complete transactions, but a cash register contains other valuable information, such as the databases on the store’s inventory and prices for each item, the time records for the workers’ attendance, and sometimes internet access.
The cash register contains each stage of inputting, processing, outputting, and feedback that all information systems possess. When a cashier scans the bar code on each item to complete a transaction or logs into the system once they arrive, the information of transaction and attendance is inputted into the system. Then, the register processes this information by adding up the total price of an entire transaction after each item is scanned while computing the change a customer needs, and adding the total number of hours of the employee after his/her time is recorded. In both examples, the information is outputted through the presentation of a customer’s total cost and also the appropriate paycheck for an employee based on his/her hours at work. Finally, feedback is provided in each situation. At times, a cashier may input a customer’s credit card, and the register will display a message box that the card was declined. The customer will need to choose to input a different method of payment and thus change the input until the register sends feedback of approval by allowing completion of that transaction. Also, the payroll system will provide feedback to indicate a wrong employee number or password, and thus the input will need to be changed for the desired output. The cash register is a valuable information system to retail companies because of its records of every transaction and conformation of accuracy, its security functions to prevent theft, and its versatile benefits.
Subscribe to:
Posts (Atom)