• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/82

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

82 Cards in this Set

  • Front
  • Back

Value Chain

A high-level model of how businesses receive raw materials as input, addvalue to the raw materials through various processes, and sell finished products to customers.

SCM

is supply chain management, represents an effort by suppliers to develop andimplement supply chains that are as efficient and economical as possible


-part of the upstream process

upstream process

(Vendor-facing Management) finding and extractsthe raw material, information, orders, payments, returns

CRM

is customer relationship management, a system for managing a company'sinteractions with current and future customers


-part of the downstream process

downstream process

(Customer Relationship Management)processing the materials collected during the upstream stage into a finished product. The downstream stage further includes the actual sale of that product, Information, Products, and Services

ERP

is business process management, software that allows an organization to use asystem of integrated applications to manage the business and automate many back office functions related to technology, services and human resources.


-“Inside the walls” Management

Collaboration Metrics

1. Effectiveness- the degree to which a goal is achieved


2. Efficiency- the relationship between resources expended and benefits gained in achieving a goal


3. Productivity-efficiency of the human resources expended when achieving a goal

Bull Whip Effect

(SCM issue) Inefficiency and Variability in the supply chain, a trendof larger and larger swings in inventory in response to changes in customer demand, as one looks at firms further back in the supply chain for a product.

Causes of Bull Whip

Price promotions


Batch Purchasing (discounts for consolidated orders)


forecasting/trending analysis


shortage gaming (knowing shortages encourage customers to inflate order quantities)

Impact of Bull Whip

Excessive inventory


poor customer service


ineffective transportationuse


misused manufacturing capacity


lost revenues

CFAR

collaborative planning, forecasting and replenishment. A business practice thatcombines the intelligence of multiple trading partners in the planning and fulfillment of customer demand

SCOR

Supply Chain Operations Reference


This reference model enables users toaddress, improve, and communicate supply chain management practices within and between all interested parties in the extended enterprise.


-Strategy (Plan, Source, Make, Deliver, Return)

Lean Manufacturing

a systemic method for the elimination of waste within amanufacturing process


- management philosophy derived mostly from the Toyota Production System


- Efficiency: Single-Minute Exchange of Die (SMED)

Six Sigma

data-driven approach for eliminating defects (driving toward six standarddeviations between the mean and the nearest specification limit) in any process – from manufacturing to transactional and from product to service.


-quality control and improvement

Sigma

statistical standard deviation (Define, Measure, Analyze, Improve, and Control

SMED

one of the many lean production methods for reducing waste in a manufacturing process. It provides a rapid and efficient way of converting a manufacturing process from running the current product to running the next product

CSFs

(Critical Success Factors) are the cause of your success

KPIs

(Key Performance Indicators) are the effects of your actions

Increasing use of smartphones for ____ instead of ___ calls

applications, voice

User focus on _____ and ______

privacy, personalization

Semantic web

Web as a whole can be made more intelligent and perhaps even intuitiveabout how to serve a user's needs


-Identity, Metadata, Relationships

Increasing use of smartphone for information _____

transparency

location based services

computer program-level services that use location data to control


-entertainment/security (value proposition and revenue model) ex. Smartreck app

mobile marketing

advertising delivered over other electronic channels, reachingcustomers at the time and place of a purchasing decision

Data Networking creates strategic advantages for businesses by:

Creating more efficient and effective business operations


Making geographical distance irrelevant (Globalization)


Allowing more timely and efficient access to info


Enabling a flexible and mobile workforce

Local Equipment:

Home (Modem/Router, Wireless), Office (Ethernet/Wireless,DNS/Email/Security)

Local Loop/ISP:

Local Loop (POTS/DSL/Cable, Satellite/PLC/WiMax) ISPs (POPS,DNS/Email/Services)

Backbone and Content Services:

Connectivity, Content Distribution, Content Providers

Content Providers:

a person or organization who supplies information for use on awebsite

Packet switching

a mode of data transmission in which a message is broken into anumber of parts that are sent independently, over whatever route is optimum for each packet, and reassembled at the destination.

Advantages of packet switching

Bandwidth used to full potential-shared use


Not affected by singlepoints of failure


during major disaster the public telephone network might become congested but e-mails and texts can still be sent via packet switching

Disadvantages of packet switching

under heavy use there can be a delay


data packets can get lost orbecome corrupted


real-time video streams can lose frames when packets arrive out of sequence

tier 1 network

an Internet Protocol (IP) network that participates in the Internet solelyvia settlement-free interconnection.

tier 2 network

an Internet service provider who engages in the practice of peering withother networks, but who also purchases IP transit to reach some portion of the Internet.

tier 3 network

always pay fees to obtain access to the larger backbones


- hop count uses distance as its metric for route selection, connection speed decides based on how fast

Protocol

Method used to interpret the webpage


-HTTP


-TCP


- IP

HTTP

Hypertext Transfer Protocol

TCP

enables two hosts to establish a connection and exchange streams of data

IP

protocol that deals only with packets

Internet addressing

a numerical label assigned to each device (e.g., computer, printer)participating in a computer network that uses the Internet Protocol for communication.


-IP Addressing- unique number well suited for machines (phone number)


-URL-Name, descriptive, well suited for humans

Wireless Impairments:

Attenuation (reduction in signal strength)


Interference


Multi-path

Wireless Issues:

privacy monitoring


identity theft

Trade offs

Right-of-way (wired) vs. line of sight (wireless)

Short Range

Bluetooth


RFID


Infrared

Mid-Range

WIFI


Cellular (1G-4G)

Long Rance

Microwave


Satelite (LEO, MEO, GEO)

Cell-based design

spatial frequency reuse

RFID

radio frequency identification, wireless use of electromagnetic fields to transferdata to automatically identify and track tags attached to objects


-Alternative to barcodes


-drivesrs/benifits: cost, security, value, Law/Mandates


-can be used in: sales/marketing, assets management, healthcare, transportation

Competing rights

-Freedom of Speech vs. Right to Reputation


-Stacy Snyder Case “Drunken Pyrite”

Components of Online Reputation:

1.Location-based info-address, phone numbers, schools, geo-tagging (puts your exact location)


2.Social networking and media sites-images profiles, comments, and friends actions


3. Blogs, forums, message boards- articles, letters (by you about you)

Employment Background Checking

63% of applicants are filtered before the interview

Dimensions of Privacy:

1. Anonymity-tied to interactions with others


2.Confidentiality- control of the us e of their personal info by corporations and government


3. Security- Protection from data loss and identity theft

Website Management Strategies

Value Proposition of an “Eller” website


Business Issues:

Why Web Evolves:

Social Media: Allows interaction among people in which they create, share,and/or exchange information and ideas in virtual communities and networks (Facebook, Twitter, Tumblr, YouTube…)


Content Management: Software that allows publishing, editing, and modifying content from a central interface, providing procedures to manage workflow in a collaborative environment (WordPress, Joomla, Drupal…)


Mobile Access: (iPhone, iPad, Android…)


Expectations change, browsers and devices change, dynamic vs. static content, data can be shared and manipulated, users now maintain the sites

Website Design Process:

Phase 1: Define the Project and Site: Team formation, development, test, web surveys, project plan


Phase 2: Developing Site Structure: Content analysis, delivery plan, visual design, user roles


Phase 3: Visual Design: Content creation/revision, primary theme and site production, site customization


Phase 4: Production and QA: Style and user guide, content addition, content addition, phased site launch, project closeout


Phase 5: Launch and Beyond: post-launch evaluation, site maintenance, server maintenance, additional feature analysis, planning, creation, other site conversion

Mental Model:

an explanation of someone’s thought process about howsomething works in the real world

Design Model:

Gives structure and meaning to an I.D. problem

McGinn Model of Design:

Perception of what is intuitive and innovative isaffected by Variations in individual experience, context, and culture, *know the five groups in the pyramid

Visibility


Constraints


Crucial distinctions

making the right decision


limit options, correct rejection


restroom signs

Metaphors:

An image or understanding of an object or action, used todescribe the function of another thing, reduces cognitive load required to complete a task, should be based on an understanding of user’s cultural frame of reference

Causality:

Users assume that the thing that happens right after an action wascaused by that action resulting in False Causality, or an incorrect relationship

Accessibility is a good product design:

part of usability, user-centered(universal) design

Categories of Disabilities:

- Visual


- Auditory


- Motor


- Cognitive

Legal Requirements for Accommodations

ADA, Section 508: requires Gov. to ensure that the electronic and informationtechnology it develops, maintains, produces or uses, is accessible to persons with disabilities

Distance Learning Characteristics:

Reduces geographic barriers


accessible to broader range of adults


attractive medium


time flexibility


saves travel/living


learning outcomes are comparable to face-to-face

New Learning and teaching methods:

Where instruction occurs:


- Online


- Offline work places


- At home


- At work


- At school


- Hybrid classes




- How, where, when instruction occurs

Asynchronous:

take classes at own schedule, material, assignments,tests are available for you to complete any time, students can contribute whatever they choose (anywhere, anytime involvement but lose immediacy for interaction and feedback)

Synchronous:

require students and instructors be online at the sametime, presentations at specific hour that you must be online then to participate in

Achievers:

(10-20%) excellent academic skills, familiar with onlineclasses, highly motivated, self-disciplined, need praise and constant feedback, high computer skills, challenge: doesn’t accommodate theirindividual learning style, (grade: A-B)

Taskers:

(40-50%) intermediate academic skills, motivated by bottomline (due dates, big grade items), need structure, challenge: tech issues and keeping up with schedule, (grade: A-C)

Ball-Droppers:

(20-25%) moderate academic skills, first time takingonline course, use excuses and extensions for deadline, poor computer skills, challenge: staying connected, following due dates, understanding grading criteria (grade: B-D)

Ghosts:

poor academic students, never taken online course,unmotivated, discouraged, poor computer skills, Challenge: lack of communication, and commitment to course, (grade: D-F)

Directing Learning:

focus on students’ learning efforts, keep them on track,link students to useful resources

Providing Performance Feedback:

provide specific, personalized, andconstructive feedback, but avoid too much of it

Promoting Content and Understanding:

Use effective instructionalstrategies, promote understanding dependent upon various online conditions (novice vs. expert/ deep vs. shallow learning)

Creating Structure:

facilitate course navigation, reinforce courserequirements

Support Leaning:

Instructor must be available, responsive, and attentive,helps students online, and motivates students to learn

INTERNET OF THINGS (IoT):

Refers to uniquely identifiable objects (things)and their virtual representation in an internet-like structure, connects all things, Will provide connectivity for anyone, and anything, creating a connection between the physical world and the information world

Interconnection of Both People and Devices

Used with education, food (tell staff when shelves are empty)(nutritioncalculations), pharmaceuticals (drug usage tracking), logistics, retail, and management

Increased awareness of information that improves decision making andreduces waste in the supply chain (sustainability)

Prevent overproduction and shortage of food

Information layers:

- Information Generation (sensing): Sense and Identification Layer


- Information Transmission: Network Construction Layer


- Information Processing: Management Layer (Search engine, data mining, info. Security)


- Information Application: Integrated Application Layer (Green building, smart transportation, environmental monitoring)

Increased access to information, also increases the risks to privacy andsecurity

Nothing will be private, could be giving away too much of our decisionmaking and freedom choices to machines, identity can be stolen online