Wednesday, June 6, 2007

The Aftermath of MIS







Wednesday, May 30, 2007…



Management Information Systems…


Final Exam…



My Preparation:

Chapters read – 3 times
Chapter Review Questions
Online True & False Question
Online Multiple Choice Question

My Results:

Unsure! Not Posted Yet.

I felt better last exam, and my results were extremely unfavourable. I hope this time will be a change for the better.

I have memory issues! I can’t seem to remember terminology. I can remember the basic concepts. I can work the system, create a LAN connect, manipulate reports systems, work the supply chain from start to finish and back again, give me a day and I can figure out management software and their functions. But, ask me what the title is for a management process or a system process and I struggle.
Sunday, 5 days after the exam it hit me! Customer Relation Management and Partner Relation Management...See I couldn’t remember it on the exam and I had refused to check the text book. I wanted to force my brain to do the work.

In my defence there is some major term to put to memory.

Chapter Five – 37 terms
Chapter Ten – 68 terms
Chapter Eleven – 26 terms
Chapter Twelve – 39 terms
Chapter Thirteen – 23 terms
Chapter Fourteen – 41 terms




Total - 234...




Too much for one small brain to accomplish…Does anyone agree?



Thursday, May 24, 2007

“An appreciation of the experience of creating and maintaining a blog”

"An appreciation of the experience of creating and maintaining a blog”

It appears that this will be my last blog entry for “Management Information Systems” and the likely hood of maintaining my blog is, well, good…I guess. I don’t think that I will have the time to make daily or even weekly entries; however, I do intend to maintain this journal for my educational experience. I guess my title depicts a journey that I have just commenced and I will let the masses; if they are interested, know how it plays out.




An Atlantic Canadian’s Journey to Higher Education




My Blog, well, I have grown attached to it…Enjoyed the experience of creating and maintaining it…Grew increasingly frustrated in the beginning...Search the assistance of my Geekiest friends…Still do not understand some things that I completed…lost stuff…got pissed off…spent three nights in a row up until 1:00 AM…calmed down…found my happy place…DRANK!...stumbled to bed…woke up Grumpy.

The most appealing aspect of my blog assignment is how it creates a global community. My blog has been hit from all over the world…from Las Vegas to Israel to Hong Kong and, today it was hit by someone in Shemogue, New Brunswick! “Big City Lights” HAHAHA! How do they find me? What brings them to my blog? Can someone answer? I don’t have the answer.

It appears that I am not blogging expert but now that I have the ball rolling, I will continue its existence until have finished my MBA.

Tuesday, May 22, 2007

http://www.blogtv.ca/


While watching SpongeBob Square Pants the other evening, an advertisement for BlogTV was televised.

Officially launched in March 2007, the interactive, multimedia website is dedicated to Canadian audiences only.

BlogTv.ca enables users that have an Internet connection, a personal computer, and a webcam to broadcast over the Internet video feed to allow audiences to view into their lives. Where a blog is an online journal, BlogTv.ca is a live, real-time depiction of someone’s life. Dubbed as the first social network, it allows participants to show their talents, voice their opinions, and to openly discuss and debate with their audience, it is completely interactive.

The website allows for four main functions; to provide a live broadcasts, a user’s ability to record and store their broadcasts, audience interaction, and the audience’s ability to search and browse storage of video feeds.

In a society that is increasingly becoming introverted, perhaps this will become an avenue to new interactions.

Blogtv.ca has been advertising on television, youtube.com, and google.


Just because this is one of my favorite websites:




STAY THE HACKER OUT OF MY PC!

OK…something weird is happening!

I am studying at the Champlain Library on campus, AGAIN! And, my internet connection has locked up on me twice! I had to reboot my system again!

As I am sitting here waiting for the applications to load, in hopes that it will solve the error. I peer over to another student working on his notebook and I witness that he is using a calculator!!!!!!!!!!!!!!!!!!

This brings me to this video clip...

Do you think?

CUSTOMERS FOR LIFE

Global companies are turning to highly sophisticated Enterprise computer systems to manage their business processes and improve customer relations. Systems known as Enterprise Resource Planning Systems have an infrastructure of a central databank and software that accumulates, stores and produces data to all the major business functions of an organization; Sales & Marketing, Finance & Accounting, Manufacturing & Production, and Human Resource Departments. Companies implementing enterprise systems become more consistent in their business applications; they become more synchronized with customer demands for product, and they improve their firm’s performance.

Supply Chain Management is a systematic process of buying, making, and moving a product. The supply chain is a network of processes for purchasing material to produce a product that is sellable to a customer. The chain moves in both directions when taken in considerations of product returns processes.

Supply Chain Operations Reference Model (SCOR)
1. Plan
2. Source
3. Make
4. Deliver
5. Return

The “Bull Whip Effect” occurs when an unnatural demand increases for a product that creates a domino effect to the other sectors of the supply chain. This occurrence was apparent at General Motors during seasonal promotions, such as AcDelco batteries in the fall and winter seasons. If organization knew exactly what customers required and organization would be able to implement a “just-in-time” strategy of production.

One slogan used by the General Motors Corporation was “Customers for Life”.

Customer Relation Management (CRM) uses applications to maximize relations with customers. Improved relations with customers will increase customer satisfaction, retention, a firm’s profits, and revenues. CRM software has application directed towards; sales, customer service, and marketing

Partner Relationship management runs on a parallel system with CRM; however it focuses on the relationship between an organization and its selling partners.

Terms of interest:
· Operational CRM
· Analytical CRM
· Customer Lifetime Value
· Service Platform
· Business Process Management

WORKING OUTSIDE THE BOX

Just a quick blog of interest…

I discovered this article in the newest edition of Wired Magazine.

Investigators of a stabbing at a hip hop concert posted this video of a suspect on the YouTube website. After two weeks and numerous viewings the suspect turned himself into authorities.

Monday, May 21, 2007

TEHCNOLOGY ETHICAL & SOCIAL ISSUES – AGREE OR DISAGREE? AFFECTED OR UNAFFECTED?

Unfortunately, I am struggling gravely in Management Information Systems. I am not sure why! It appears that I am unable to retain the information that I read…and I read a lot! I hope that it is not foreshadowing “Al’s Big Hammer”! The objective of my next few blog entries will be to aid in the preservation the information presented in class and my countless hours spent at the Champlain Library on campus….

Non-obvious relationship awareness or NORA is new technology that analysis data for profiling of an individuals. Information is extracted from many different sources; “watch” lists, Incident and Arrest Systems, Customer Transaction Systems, Telephone Records, Human Resource Systems, and is used by government departments and the public sector. Although it may be beneficial for the discovery of terrorist and personality flaws, it does bring about awareness of privacy issues.

Basic concepts of Ethics in an Information System are:
Responsibility
Accountability
Liability

Fair Information Practices are rules and regulations that regulate how information on individuals is compiled.
There are 5 basic principles:
1. Notice/Awareness – websites must indicate their policies on data collection prior to collecting.
2. Choice/Consent – Individuals must be notified and given the choice on how their personal data is to be distributed.
3. Access/Participation – Individuals should be permitted to review their information profile and allow for changes.
4. Security – Organizations that collect data must safe guard their information from unauthorized usage.
5. Enforcement – There must be an organization to control the governing of the FIP practices.


Safe Harbor is a policy and procedure device that meets government standards without the government’s involvement in the usage of extracted personal information from European countries.

American companies have consistently gathered information on individuals without their knowledge and consent; this information has been used to serve marketing purposes. Many e-commerce organizations have started using an “opt-out” model that gathers information until a user specifies that they do not want their personal information gathered. An opt-in model works on the premises that information is not gathered until and individual approves the process.

Intellectual property is very difficult to regulate on the Internet. There are systems to protect your rights. However, it very easy for website users to copy and paste documents, files, and photographs. Trades Secrets are intellectual works that have not been published on the public domain. Copyrighting an intellectual property protects individuals from having their work duplicated for their lifetime and 70 years after their death. A patent provides exclusive rights to an invention for 20 years.



Any advancement in society has had its advantages and disadvantages. There have been many negative social costs that have developed from technology advancements. With the invention of wireless networks, individuals are able to use notebooks and cellular phone at almost any location around the globe. It is increasingly more difficult to separate work from leisure when an organization is able to contact an employee at anytime. Companies are becoming more and more dependent on technology and are left dead in the water in the event of systems failure. Computer Crimes in the form of Identity theft and Spamming; to name a few, are consistently growing in popularity. The cost of technology is defining social classes and some groups are unable to advance into a new digital age.

Sunday, May 20, 2007

IS CANADIAN IT INSTITUES FAILING?

In 1985, after graduating from I school; I set my sights on higher education and entered the Commerce program at the University of New Brunswick. Two years into the program, and through some influential connections, I was offered employment with the General Motors Corporation Atlantic Zone offices. During my last 21 years of service I had entered into many evening classes in hopes to finishes my under-graduate…Well, Sam and Lauren arrived into my life, and studies unfortunately, became increasingly lower on the priority list. How was I to know that in November 2006, my position would be moved to Montreal and my career would suddenly come to a halt?

Now with the free time available, I again looked forward to higher education and finishing my degree. I researched many different programs available and finally decided to obtaining my MBA through UdeM.



After, two weeks into Human Resource Management it became very apparent that I was not going to survive on my old desktop PC and called and purchased Dell (You’re getting a Dell Dude!).



AUGH!

I have not had the greatest experience with my new computer so far…most of the software sent from Dell was not compatible with the new Window’s Vista operating system and it required me to install new drivers prior to installation just to get the applications to function. I had to save all my assignments in older versions of software applications just so the professor would be capable of opening them when emailed. In the first days I spent many hours on the phone with Dell’s helpdesk to resolve my issues.

Dell’s helpdesk is in India, not in North America where I would have thought. It makes me wonder, that with the shortage of employees in Canada and the government’s incentive programs to allure foreign talent to Canada to fill jobs. Why would they outsource call centers to differencing countries?

Countries and services provided:

India – Provides a full range of employment
China – Programming
Russia – Programming and Research & Development
Pakistan – Programming and Customer Support
Nepal – Programming and Customer Support
Bangladesh – Web & Software programming, IT Support, Game development, Network solutions
Bulgaria - Programming and Research & Development
Philippines – Programming, Research & Development, Data Entry, and Customer Support

WHAT DA HACKER!

Most Famous Hackers

1. Jonathan James – First juvenile to be sent to prison at age 16. Hacked into NASA, Department of Defense and the Department of Justice
2. Adrian Lamo – Dubbed the "Homeless Hacker" he used coffee shop hotspost as locations to perform his hacking. Hacked into The New York Times and Microsoft.
3. Kevin Mitnick – Went on a coast-to-coast hacking spree. Spent 5 years in prison, 8 months in confinement and is now a computer security consultant, author and speaker.
4. Kevin Poulsen – Dubbed as the “Hannibal Lecter of computer crimes”. When his profile appeared on the TV show “Unsolved Mysteries”, all their 1-800 lines became dysfunctional.
5. Robert Tappan Morris – Creator of the “Morris Worm” which is the first worm to be unleashed on the Internet.



Dam IT!

My computer I slowing down again…time to scan!

I am not a serious internet user; I leave that up to my son. I do spend quite a bit of time on MSN speaking with friends around the world. Buds that I can’t call up and hit Starbuck’s with for a coffee...to me MSN has been the greatest personal aspect of the internet. My Internet history, if viewed would probably read something like this:

http://mbacanuck.blogspot.com/
http://www.philippegauthier.info/
http://youtube.com/
http://www.mls.ca/
http://bodybuilding.com/
http://www.nbpfa.com/
http://www.cnn.com/

My son Sam, upon arrival at home after school, is permitted a half hour on the PC to play games and visit the sites that he has accumulated over the years for his entertainment. It actually gives me time to start supper for the guys before we run off to Tak Kwon Do. Sam’s introduction to a computer came at a very early age. We had purchased him many educational software packages at a young age and he was surfing when he still had dimples in his hands.

Weekly I scan the PCs in my house for Spyware and Viruses. I don’t understand why organizations want information on an 8 year old kid who plays games inline. His profile might show that he is interested in Pokémon or Sony PS2. He still does not have the financial resources to follow his interests and NO, I am not raising his allowance to $50.00 a week.

I guess pumping out Internet ads on addictedtogames.com serves the same purpose of the twenty plus commercials that they view on YTV when they are watching TV.

I just wish these ad companies would turn towards marketing programs that benefit a healthier lifestyle. Why would they not promote ads that tell children to go out and play road hockey, eat your veggies, and study hard to get good grades? I guess that is up to us as parents. As a Generation Xer, I have enrolled my kids into as many activities as possible; Hockey, soccer, ballet & jazz, Baseball this summer and hopefully football this fall.

CNNMoney.com says to do these steps to warn off potential hackers that might be your neighbour across the street.

· Keep your computer up to date
· Use security software
· But don’t rely on it (security software) – security software is usually not up to date of new viruses
· Take away your PC’s superpowers
· Get a router and lock it down
· Be careful at the coffee shop
· Get smart – and get real – about passwords
· Know how your computer watches you
· Shred or Smash.

By typing in “how to hack a computer” on youtube search provides over 6000 different video clips that will teach procedures on how to search and destroy someone’s PC system.

Parental advisory warning - Strong Language

Friday, May 18, 2007

GENERAL MOTOR'S ONSTAR SYSTEM

What happened on August 21, 1897?

The General Motor Corporation was founded, although at the time it was called "Olds Motor Vehicle Company Inc. Founded father, Samuel L. Smith produced the first Oldsmobile named the Curveu Dash Oldsmobile which sold for a sticker price of $650.00. Since that time, The General Motors Corporation has made some serious advancement in vehicle design, performance and technology.

In 2006, General Motors was ranked by Fortune 500 as being the world’s fifth largest corporation, with revenues exceeding $192 million.

1. Exxon Mobil
2. Wal-Mart Stores
3. Royal Dutch Shell
4. BP
5. General Motors
6. Chevron
7. DaimlerChrysler
8. Toyota Motor
9. Ford Motor
10. ConocoPhillips


OnStar's in-vehicle safety, security, and information services use Global Positioning System (GPS) satellite and cellular technology to link the vehicle and driver to the OnStar Center. At the OnStar Center, advisors offer real-time, personalized help 24 hours a day, 365 days a year.

One of OnStar’s many features is the vehicle emergency safety response option, where communications between the vehicle’s operator and the OnStar communication center is established upon vehicle impact. A gentleman and his wife from Truro Nova Scotia indicated that when their vehicle was struck in an intersection, the vehicle’s airbag was deployed and an OnStar agent was communicating with them before the vehicle came to a resting position. Luckily no one was injured during the accident. Stories of rescues initiated by the OnStar communications center were frequent in the office of General Motors. In California, a vehicles airbag was deployed and the communication’s center attempted contact with the occupant. When communications failed, the OnStar employee utilized the vehicle’s GPS system and located the vehicle in the Ocean. The Coast Guard was immediately contacted and rescued the occupant.

GM Advanced Automatic Crash Notification System (AACN)




Figure 1: The GM advanced automatic crash notification (AACN) system uses front and side sensors as well as the sensing capabilities of the Sensing and Diagnostic Module (SDM) itself. The accelerometer located within the SDM measures the crash severity.







Figure 2: In the event of a moderate to severe frontal or side-impact crash, data is transmitted from the affected sensors to the SDM. The SDM sensor also can identify a rear impact of sufficient severity. Regardless of whether the air bags deploy, the SDM transmits crash information to the vehicle's OnStar module.







Figure 3: Within seconds of a moderate to severe crash, the OnStar module will send a message to the OnStar Call Center (OCC) through a cellular connection, informing the advisor that a crash has occurred. A voice connection between the advisor and the vehicle occupants is established. The advisor then can conference in 911 dispatch or a public safety answering point (PSAP), which determines if emergency services are necessary. If there is no response from the occupants, the advisor can provide the emergency dispatcher with the crash information from the SDM that reveals the severity of the crash. The dispatcher can identify what emergency services may be appropriate. Using the Global Positioning System (GPS) satellite, OnStar advisors are able to tell emergency workers the location of the vehicle.
Number and location of sensors and SDM may vary depending on vehicle model.




These are the features of the new generation of the OnStar systems. Which won OnStar the Popular Science’s “2006 Best of What’s New Award”

The Directions & Connections plan provides OnStar’s safety, security, and convenience services including:

· OnStar Turn-by-Turn Navigation
· OnStar Vehicle Diagnostics
· Information and Convenience Services
· Automatic Notification of Air Bag Deployment
· Advanced Automatic Crash Notification
· Emergency Services
· OnStar Hands-Free Calling
· Remote Door Unlock
· Stolen Vehicle Location Assistance
· Roadside Assistance
· Accident Assist
· Remote Horn and Lights

I have personally only used the OnStar system once in my life. I had one of GM’s distributors call me in a panic because our warehouse facility had shorted them on product that was desperately needed. Apparently they had a customer at their counter requiring the product ASAP. If GM used an RDIF system in the warehousing operations, I would have been able to check our systems for the error and availability of the product. As it was, I went to the warehouse grabbed the missing product and headed out to the distributor’s facility. I was not aware that the customer had constructed a new building and had moved locations. I established communications with an OnStar representative and she was able to direct me to the customer, she actually stayed in contact with me until I reached my destination and indicated every time I was to turn, in which direction, and told me when I was going to cross a railway track.