This chapter talks about Customer Management Relationship Software. This software collectes customer data to know how much a customer purchases along with what they purchase. This helps companies to get people to purchase other thingsalong the same line or to inform them of sales they are having in that area. To check out a company on how they use this to better them go to http:// www.siebel.com/downloads/case_studies/
The most part of the night we went over sample questions for the mid-term.
Things like operating systems, you know the software that tell the hardware what to do. Kinda the brain of your computer. Here is the one I still don't get centralized architecture risking other servers. Hello, I Don't Get It!!!! Okay if the central srever or computer goes out the others still work but to me they are at risk on not being able to communicate together anymore. Isn't that a risk? I think so. I really think risk should not have been part of the question but maybe something like this; In centralized architecture, damage would happen to all computers or servers if the central unit went out. This I understand to be false, but risk true, because the entire system failes to work together without the central connection. They cannot communicate within the group. The risk is a company risk not a computer risk, but still a risk. Isn't it?
Friday, October 31, 2008
Thursday, October 23, 2008
Crime over the internet
this week we learned about the laws and crimes on the internet. The crimes on the internet, for the most part are the same as in every other area of life. People steal, sell illegeally and gamble. Even more they can target children much easier than in the past. Therefore, if you have children you should place restrictions on you computer. You can learn more about this at Children's Online Privacy Protection Act of 1998 (Coppa).
It can be very difficult to go after people who do crimes over the internet. One of the biggest issues in fighting crime over the internet is, Who has jurisdiction? Even more, most of our laws deal with the phyiscal and not cyber space or a virtural world. So how do fight these kind of crimes? We all need to you our most powerful weapon which is, our Voice. We need to let our government know that we want laws passed in this area to protect us. The US Government has a website that you can learn more about these crimes and jurisdiction at US Department Of Justice Cybercrime.
It can be very difficult to go after people who do crimes over the internet. One of the biggest issues in fighting crime over the internet is, Who has jurisdiction? Even more, most of our laws deal with the phyiscal and not cyber space or a virtural world. So how do fight these kind of crimes? We all need to you our most powerful weapon which is, our Voice. We need to let our government know that we want laws passed in this area to protect us. The US Government has a website that you can learn more about these crimes and jurisdiction at US Department Of Justice Cybercrime.
Friday, October 17, 2008
week 2
Some insteresting facts from this weeks lesson. Defense department starting using something called ARPANET in 1069 ofcourse, now it is known as the internet. I had no idea the internet had been around that long. In 1972 Ray Tomlinson created a way to send messages to one another. Which we now call e-mail. Then how to write in HTML. How work and time go into it.
When reading over this chapter, I really felt like I was reading in a forgien language. Mainly because I could not understand the termalogy being used. Professor Johnson took this information and helped me to understandwhat I was really reading. The lesson actually became a bit interesting once we started talking about it in class.
For more info go to: http://www.pretext.com/mar98/features/story2.htm
When reading over this chapter, I really felt like I was reading in a forgien language. Mainly because I could not understand the termalogy being used. Professor Johnson took this information and helped me to understandwhat I was really reading. The lesson actually became a bit interesting once we started talking about it in class.
For more info go to: http://www.pretext.com/mar98/features/story2.htm
Thursday, October 9, 2008
In the first wave companies thought that they could use the first mover advantage to be at the top of the industry by marketing the same products and services on the internet, before the large corporations did. In most cases this failed because consumers had already grown to know the companies that were on top of the market. As these companies started using e-commerce on the internet, consumers stayed with them. The larger more known companies had the resources to overtake any company that did not have the tools, skills or finances to compete. A few companies did make it through the first wave such as E-bay, because they marketed something that had not been done this way in the past.
In the second wave businesses do not rely on the first mover advantage for success. Now they’re focusing on expanding their products and services into the global market. They have learned to customize e-mail, increase advertising and use multiple languages to connect with consumers at a global level. The businesses that did grow in the first wave by using the first mover advantage are increasing their business in the second wave in the same manner by perfecting their site so that it can also reach the global market.
For more information click below:
www.hbsp.harvard.edu/hbrol/en/search/saSearchResults.jhtml;jsessionid...?sid=null&N=4294961096 - 35k
In the second wave businesses do not rely on the first mover advantage for success. Now they’re focusing on expanding their products and services into the global market. They have learned to customize e-mail, increase advertising and use multiple languages to connect with consumers at a global level. The businesses that did grow in the first wave by using the first mover advantage are increasing their business in the second wave in the same manner by perfecting their site so that it can also reach the global market.
For more information click below:
www.hbsp.harvard.edu/hbrol/en/search/saSearchResults.jhtml;jsessionid...?sid=null&N=4294961096 - 35k
Subscribe to:
Posts (Atom)
