1. Why data quality has become more important?
2. Why IT is important to your career? What do you want to get by studying this subject?
3. What is your plan when you finish your study?
4. What are the main functions of data centres, how do they operate? Give three examples.
5. What are the problems associated with cloud computing
6. Define and explain concept for the terminologies:
7. How does “data and text mining” create business value?
8. What are the problems associated with cloud computing? Give two examples and provide some solutions. Explain your answers.
9. Why was an EIS designed and implemented?
10. What problems did executives have with the EIS?
11. What were the two reasons for those EIS problems?
12. How did the CIO improve the EIS?
13. What are the benefits of the new IT architecture?
14. What are the benefits of data governance?
15. Why is it important for Coca-Cola to be able to process POS data in near real time?
16. How does Coca-Cola attempt to create favorable customer experiences?
17. What is the importance of having a trusted view of the data?
18. What is the Black Book model?
19. What mistakes did AstraZeneca make?
20. What mistakes did IBM make?
21. Why are outsourcing contracts for five or more years?
22. Why do you think two major corporations could make such mistakes?
23. Do you think the 2007 SLA was doomed to fail? Explain your answer.
24. What provisions in the 2012 SLAs protect AstraZeneca and the vendors?
25. Why would parties prefer to use an arbitrator instead of filing a lawsuit in court?
This is because we need accurate as well as timely information in order to manage services as well as accountability (Larose, 2014). Good information help to manage the services effectiveness and it helps to prioritize and ensure the best use of the resources.
It is thought to be the list of activities that is needed for the systematically controlling the creation , distribution along with disposition of recorded data which are maintained as evidence of the activities of the business and transactions (Sotomayor, Montero, Llorente & Foster, 2009).
Business intelligence refers to the technology driven process for the purpose of analyzing data as well as presenting an actionable data in order to help executives, managers as well as other corporate end users to make decision that are informed for the business (Fukuda, Hisazumi, Ishida, Mine, Nakanishi, Furusho Kong, 2016). On the other hand, business analytics refers to practice of iterative, methodical exploration of the data of organization with emphasis to the statistical analysis.
Text mining refers to the set of the processes which are essential to turn text document that is unstructured into valuable structured information (Fukuda, Hisazumi, Ishida, Mine, Nakanishi, Furusho Kong, 2016). When it comes to data mining it regards to the process that is based on the algorithms aimed at analyzing as well as extracting useful information from the data (Wixom, Ariyachandra, Douglas, Goul, Gupta, Iyer & Turetken, 2014).
Big data discovery bring together the techniques of data discovery as well as the behavioral analysis on the big data (Larson & Chang, 2016). On the hand, big data analytic refers to the process of examining of large as well as the varied set of data to discover the unhidden patterns.
It is the blueprint that shows the structure as well as the operation of an organization.
It refers to the computerized databases of the financial information that is organized as well as programmed in order to produce regular reports to operations to each level of the management in organization (Larson & Chang, 2016).
Data life cycle refers to the policy based method to manage the flow of the information system data throughout on its cycle (Larson & Chang, 2016). Data principles are the code of good practice for processing of the personal data.
The delivery of the on demand computing resources over the internet on the pay for the use basis (Chu, Han & Shyr, 2016).
The businesses utilize them in analyzing the customer as well as the competitors’ data in order to improve on the competitiveness (Chu, Han & Shyr, 2016).
It was designed and implemented in order to offer the senior managers internal and external data as well as the major performance indicators which are crucial to various needs (Redlich & Nemzow, 2015).
They discovered that half of the data which was generated from their EIS that it was irrelevant to the decision of the corporate in regards to their SBU which had crucial to the timely data.
The architecture of the application was not designed for the purpose of customization to generate reports. The user interface was complex to get required information, thus, analyst had to extract on the KPL related data (Sook-Ling, Ismail & Yee-Yen, 2015).
There put in place a team that was dedicated in order to help design as well as develop the new system. This was business driven architecture rather than the financial reporting driven architecture (Business Intelligence, 2017).
The system offered a reliable KPI reports in regards to the inventory turns, profit margins and cycle times of all the SBUs. There was reduction in the resources that were required to maintain the system (Business Intelligence, 2017).
There is improved quality of the data which bring forth accurate sales forecasting, increase in the growth of the sales, greater loyalty of the customers and better customer experience (Weick & Sutcliffe, 2015).
This is because they support the plans, replenishment process as well as the forecasts. Data analysis is usually significant for supply chain because it supports vital decisions of the production, products as well as marketing (Business Intelligence, 2017).
Coca-Cola organization usually creates a favorable client experience via usage of the big data, data warehousing, data modeling as well as through the social media so as to respond on the changes within the society as well as the market (Business Intelligence, 2017). They usually utilize these aspects in order to adjust the preferences of the clients by formulating their products in advance in order to respond to these changes.
It is important for the aspect of accuracy. Data in most cases is utilized to provide insights. When the business is armed with this they are able to improve every day decision they make. This is not a management issue; it is applicable from the ground up. Additionally, it is important since it provide integrity to the data (Business Intelligence, 2017). There is no getting fact that the data comes from everywhere now days. There is need to have data governance which needs to be a priority in order to prevent the disparity which are caused by set of unique issues and even makes the data to be useless.
The black book model is regarded as the big data which stores the algorithm of the Coca cola business success (Stelzner, 2014). This model helps the Coke managers as well as the workers to be at the top their game plan particularly in decision making process as it is consists to over five hundred flavors in their calculation which are much far more than the normal human brain could process. Explain the strategic benefit of the Black Book model.
The black book signifies the decision making process for the managers while at the same time making it more powerful as a result of the amount of data that is used. Some of the data that are included in the big data includes the weather pattern for supervising the growing season, yields of the crop as well as other cost pressure. The Black Book model helps the managers to blend batches of juices and also tweak recipes (Business Intelligence, 2017). Each year the evolution of technology has been getting better and some technological achievement has gotten way beyond the human capabilities.
The organization did not consider their business could change drastically than the contract could have accommodated (Getz & Page, 2016). The organization was dependent to their IT capabilities, and they failed to cover on all the details related to the eventuality and critical aspect part in the contract such as its termination.
The organization knew from the beginning that large term IT outsourcing contracts at times they are difficult when it comes to change and how they could accrue the profit through making of the major investment in first 2 years, since the services are usually set up and at the same time customized and then making their profit margin in the last 2-3 years. They needed to have covered all these details for in the termination of the contract (Witten, Frank, Hall & Pal, 2016).
The reason is that the vendors usually make major investment in the initial 2 years as the services are set up and the same time customized (Getz & Page, 2016). The vendor expects that they would make profit margins in the last 2-3 years which is why large deals usually deal to five or perhaps more years.
Why do you think two major corporations could make such mistakes?
The reason could have been due to poor assumptions; they could have also overlooked the crucial details in rush to close the deal; there could have been lack of outsourcing knowledge as well as preparation by the client (Getz & Page, 2016).
Do you think the 2007 SLA was doomed to fail? Explain your answer.
Yes, I think it was doomed to fail. Regardless to the termination of the contract, it was bound to end eventually. The vague provision for the services as well as fees related to the contract end could have arisen (Laudon & Laudon, 2015).
The contract covered on the standards provisions of the Information service deals which is the SLAs and the pricing, along with the cooperation policy. This policy consisted of thirteen principles which specified the terms of the collaboration (Laudon & Laudon, 2015). One such principle is that of the fix, then pay later. This therefore means, in case of an urgent information technology issue occurs, the vendors and AstraZeneca should cooperate in order to fix it as soon as possible without asking any questions in regards to the cost (Moss & Marvin, 2016). In case there was conflict in the contract, both of these parties had to deal with an independent arbiter who oversees cooperation policy.
Through use of an arbitrator it is much less expensive as compared to filing of the lawsuit. Moreover, with an arbitrator they consume less time, and they might confront less the parties since they have agreed in advance arbitration process (Ibrahim, Hamlyn-Harris & Grundy, 2016).
Over the past decade , the numerous the internet users have increased considerably replacing bygone type of the media and entertainment with skyrocketing developments among all the ages of the social media ( Fuchs , 2017 ). There has been social media websites that have numerous end users allowing them to share videos, text messages as well as photos on a regular basis (Gerbaudo, 2018). There have been numerous advantages as well as disadvantages of utilizing these sites, which have left the researchers to wonder if we are much better without them (Fuchs, 2017). In this research, it will explore the advantage and disadvantage the social media to determine if it has improved or perhaps damaged the way in which people connect.
One merit associated to the social media it has enabled people to correspond with one another in their local neighborhood and speak to others in other countries concurrently (Gerbaudo, 2018). There are situations that have been observed individuals forming online communities which have enabled them to get support, learn about news what is happening across the globe and even get education. In case one does not want to talk on the phone or lack time to meet someone, you could connect through the social media at any given time (Duggan, Ellison, Lampe, Lenhart & Madden, 2015). It has also been possible to have a list of contacts that is maintained through the social media platform.
Social media has made a positive effect on the society by offering a canvas to ravish a masterpiece. Many people are discovering it much easier to express their self identities in environment which desolate their anxiety in a real life circumstance (Gerbaudo, 2018). Social media has offered society a unique opportunity when it comes to creation of our image through the means of the digital museum (Duggan, Ellison, Lampe, Lenhart & Madden, 2015). There have been many routes that are available in the social media. It is possible for one to mask their identity via the social media simply because that the social media allows one more control, especially when it comes to customizing the layout of one’s profile. As opposed to this a person might reveal their personality without necessary having any anxiety from their peers.
Social media has made it possible for the businesses to promote their products to many individuals across the globe (Gerbaudo, 2018). Whether one has an offline business or online, it is possible to promote the enterprises to the largest audience around the world. The whole world is available to you, and you have the opportunity to promote it. This would make the businesses to be more profitable and less expensive, simply because that most of the expenses are created over the business are for advertising as well as promotion (Duggan, Ellison, Lampe, Lenhart & Madden, 2015). This might be reduced by constantly as well as regularly involving the social media to interact with the right audience. It may also be observed that the social media help build up on the reputation of the business (Duggan, Ellison, Lampe, Lenhart & Madden, 2015). Just as it can ruin the reputation of the business reputation, it can develop on the sales and the reputation. In the social media individuals are free to share anything they want in the social media, and this can have positive effect when good news is shared about the business.
On the upside, social media has some disadvantages. One of the disadvantages is that it can leads to addiction. The addictive section of the social media is extremely bad and it might disturb a person personal live (Duggan, Ellison, Lampe, Lenhart & Madden, 2015). The teenagers are the most influenced by the habit of social media. They turn out to be extensively and consequently these are cut off from the society. It may also waste ones time that could have been used in undertaking more effective tasks .Another disadvantage of social media it leads to fraud and scams. Each and every day individuals are getting scammed through social media. There are numerous examples where people have scammed and committed fraud via social media. Additionally, social media could be a security issues (Duggan, Ellison, Lampe, Lenhart & Madden, 2015). There are many security agencies that have had access to individual’s personal accounts. This makes their privacy to be compromised. One might not know when they are visited by investigation officer in regards to an issue which they had mistakenly discussed over the internet.
Social media has been found to cause health problems. The lack of the social interaction could result in individual suffering from much more stress related to the disorders and the disease than previously (Duggan, Ellison, Lampe, Lenhart & Madden, 2015). According to Dr. Aric Sigman his research highlights there is a link which exist between the reduced human interaction time and the problems which are related to blood pressure, dementia, stroke and the cognitive issues.
Social media has been found to cause lack of emotional connection (Duggan, Ellison, Lampe, Lenhart & Madden, 2015). The quality of a conversation utilizing the social media is much awful since one does not sense any kind of emotional or enthusiasm from the other individuals. It might take one to wonder if they could actual mean what they say when one is conversing with another. Moreover it could lead to diminishing understanding and thoughtfulness (Duggan, Ellison, Lampe, Lenhart & Madden, 2015). Ever since the beginning of the social media, the quality of the conversation has dropped significantly. Individuals are more often spending their time online in the sense that they do not always understand the feeling, emotion as well as character of individuals they are talking to (Duggan, Ellison, Lampe, Lenhart & Madden, 2015). When one talks to a person through a message or even a voice, you could understand them fully. The aspect of the social media has ruined thoughtfulness of the individuals’ even saying hello to others.
Conclusion
Social media offered merits and also demerits. It has promising features which could make individuals to think twice about how they use the platform. It is therefore important to think twice on what you post or what you might say to someone because you could ruin their life or relationship and the social media keeps a record that you cannot delete.
References
Borgman, C. L. (2010). Scholarship in the digital age: Information, infrastructure, and the Internet. MIT press.
Business Intelligence. (2017). Coca-Cola’s Juicy Approach To Big Data – BI Insight – Business Intelligence. [ONLINE] Available at: https://businessintelligence.com/bi-insights/coca- colas-juicy-approach-to-big-data/. [Accessed 18 March 2018].
Fuchs, C. (2017). Social media: A critical introduction. Sage.
Fukuda, A., Hisazumi, K., Ishida, S., Mine, T., Nakanishi, T., Furusho, H., …& Kong, W. (2016, July). Towards sustainable information infrastructure platform for smart mobility-project overview. In Advanced Applied Informatics (IIAI-AAI), 2016 5th IIAI International Congress on (pp. 211-214). IEEE.
Chu, Y. J., Han, S., & Shyr, J. Y. (2016). U.S. Patent Application No. 14/715,378.
Duggan, M., Ellison, N. B., Lampe, C., Lenhart, A., & Madden, M. (2015). Social media update 2014. Pew research center, 19.
Gerbudo, P. (2018). Tweets and the streets: Social media and contemporary activism. Press.
Getz, D., & Page, S. J. (2016). Event studies: Theory, research and policy for planned events. Routledge.
Ibrahim, A. S., Hamlyn-Harris, J., & Grundy, J. (2016). Emerging security challenges of cloud virtual infrastructure. arXiv preprint arXiv:1612.09059.
Larose, D. T. (2014). Discovering knowledge in data: an introduction to data mining. John Wiley & Sons.
Larson, D., & Chang, V. (2016). A review and future direction of agile, business intelligence, analytics and data science. International Journal of Information Management, 36(5), 700-710.
Laudon, K. C., & Laudon, J. P. (2015). Management Information Systems: Managing the Digital Firm Plus MyMISLab with Pearson eText–Access Card Package. Prentice Hall Press
Luo, F., Zhao, J., Dong, Z. Y., Chen, Y., Xu, Y., Zhang, X., & Wong, K. P. (2016). Cloud-based information infrastructure for next-generation power grid: Conception, architecture, and applications. IEEE Transactions on Smart Grid, 7(4), 1896-1912.
Moss, T., & Marvin, S. (2016). Urban infrastructure in transition: networks, buildings and plans. Routledge.
Paul, P. K., Kumar, K., & Chatterjee, D. (2013). Cloud computing emphasizing emerging possibilities to the entire Information Infrastructure. Trends in Information Management,
Redlich, R. M., &Nemzow, M. A. (2015). U.S. Patent Application No. 14/597,323.
Stelzner, M. (2014). 2014 Social Media Marketing Industry Report. Social media examiner, 1- 52.
Sook-Ling, L., Ismail, M. A., & Yee-Yen, Y. (2015). Information infrastructure capability and organisational competitive advantage: framework. International Journal of Operations & Production Management, 35(7), 1032-1055.
Sotomayor, B., Montero, R. S., Llorente, I. M., & Foster, I. (2009). Virtual infrastructure management in private and hybrid clouds. IEEE Internet computing, 13(5).
Weick, K. E., & Sutcliffe, K. M. (2015). Managing the unexpected: Sustained performance in acomplex world. John Wiley & Sons.
Wilson, C. (2014). Cyber threats to critical information infrastructure. In Cyberterrorism (pp. 123-136). Springer New York.
Witten, I. H., Frank, E., Hall, M. A., & Pal, C. J. (2016). Data Mining: Practical machine learning tools and techniques. Morgan Kaufmann.
Wixom, B., Ariyachandra, T., Douglas, D. E., Goul, M., Gupta, B., Iyer, L. S., … & Turetken, O(2014). The current state of business intelligence in academia: The arrival of big data. CAIS, 34, 1.
Wu, X., Zhu, X., Wu, G. Q., & Ding, W. (2014). Data mining with big data. IEEE transactions on knowledge and data engineering, 26(1), 97-107.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download