Thursday, February 25, 2010

Ch. 4 - Application Software

Tonight, we learned about SaaS (Software-As-A-Service), which is the way in which companies lease its software. For example, Chapman contracts with Gmail to provide an e-mail service for students - this e-mail is a SaaS. However, Chapman's website software is owned by Chapman and cannot be modified or changed by anyone besides Chapman because the website is mission critical - Chapman needs the website to be properly functioning in order to provide information to prospective and current students, staff and faculty.

Software is defined as, "the detailed instructions to control behavior of computer and its peripherals." A program is the set of instructions to the computer, and it has three critical features: (1) must be in primary storage, (2) instructions must be processed one at a time, and (3) only understands binary code.

There are two different types of software: Application Software, which is the stuff that we (as end users) use, and System Software, which controls the computer and its resources and is primarily used by IT specialists. It was interesting to learn the technical names for the different types of softwares, such as Custom vs. COTS, Software Suites vs. Integrated Packages, and Groupware vs. Cloud Computing. I'm really enjoying learning this unit and I didn't find today's lecture difficult to understand at all, but I'm guessing Section II will be more challenging.

Please see post below for my blog on Ch. 3 from our Tuesday night class.

Ch. 3 - Computer Peripherals

On Tuesday, we learned about computer peripherals, which is a generic name for all input, output, and secondary storage devices that are part of the computer system but are not part of the CPU. Some common input devices include the keyboard, mouse, touchpad and touchscreen. We learned about the Graphical User Interface (GUI) versus the Command Line Interface. I am extremely grateful that someone created WIMP because I think I would have gone crazy trying to remember the exact names of all my files and subfolders under CLI. I wonder how long it took to create WIMP and how technologically immersed the team must have been to be able to come up with something like that. I wouldn't even know where to start.

We also learned about computer storage fundamentals, such as the difference between the bit (smallest element of data) and the byte (group of eight bits). Prof. Tuggle gave a few examples of the differences in representation between EBCDIC and ASCII, which was pretty mind-boggling. I think I will have to spend more time trying to understand that. We also spent a lot of time talking about storage options, such as magnetic tape, floppy disks, semiconductor memory, and solid state devices. Tonight we are going to start learning about software, and so far I am actually finding these discussions pretty interesting because I like learning about computers and finding out how they operate.

Saturday, February 20, 2010

Exam #1 - Intro, Ch. 1 & Ch. 2

On Thursday, we had our first mid-term exam for MGSC 300. I spent quite a few hours studying for the exam and making sure I understood all the powerpoint notes and case studies, and skimming through the textbook to elaborate more on details I wasn't sure about. I thought the exam was pretty easy because the questions were pretty basic and easy to understand. There were one or two T/F questions and multiple choice questions that I wasn't completely sure about because a few of the answers seemed right, and I spent a lot of time trying to decide between them. There was one multiple choice question that asked what the serious problem with a competitive advantage was, and I couldn't decide between the choices. (I later found the discussion about competitive advantage in our textbook, and saw the answer was All of the Above - which I got wrong). The short answer questions were very simple, so I wish I had remembered more details and examples to put into my answer instead of just the definition.

Professor Tuggle already posted our grades on Blackboard, and I saw I got a 96%, so I'm happy with my grade. I think for the next exam, I will spend more time making sure I really understand all of the concepts because I know this unit will be a lot more technical and difficult to just memorize definitions without understanding. Also, I will spend more time reading through the book in case we get a few questions where the answers are actually IN the book - so hopefully I will get them right next time.

Please see post below for my blog on Ch. 3 from our Tuesday night class.

Ch. 3 - Computer Hardware

Last Tuesday, we started learning about computer hardware. As I learned from Ch. 1, computer hardware is one of the six elements of an information system (the other five elements are: people, software, communications/networking, data resources, and policies & procedures).

A computer is a system with input in the form of keyboards, mice, and scanners, processing in the form of a CPU (Central Processing Unit), output in the form of video display units and printers, storage in the form of primary (RAM and ROM) and secondary storage units, and control. CPU's consist of a control unit and an arithmetic logic unit (ALU). The control unit controls and coordinates the computer's components and moves data in and out of storage. It also instructs the ALU which command to execute and sends output to the printer or screen. On the other hand, the ALU performs arithmetic and logical operations on data - it adds, subtracts, multiplies, and compares. It was interesting to learn about the functions of CPU's, because I've always heard about them in technological conversations, but I never really understood what they did.

We also learned about microcomputer systems, such as personal computers, laptops, workstations and network services, and terminals such as dumb and intelligent terminals.

Overall, this chapter does seem more difficult to understand just because it is so technical and explains complex systems in more detail. But I think it will be useful for me to learn because I've always been kind of ignorant about the technicalities of how computers and other hardware systems work, and now I will at least have a basic understanding of what people are talking about when they mention CPU's, ALU's, ROM, RAM and terminals.

Sunday, February 14, 2010

Ch. 2 - Competing with Information Technology

Last Thursday, we learned about five competitive strategies companies should use to become successful.
  • Cost Leadership: become low-cost producers, help suppliers and customers reduce costs, and increase costs to competitors.
  • Differentiation Strategy: develop ways to differentiate a firm's product from its competitors.
  • Innovation Strategy: find new ways of doing business (unique products/services or unique markets).
  • Growth Strategy: expand into global markets and diversify into new products or services.
  • Alliance Strategy: establish alliances with customers, suppliers, competitors and consultants.

Successful organizatons use one, some or all of these strategies, while unsuccessful organizations tend to aim for a middle of the road approach. For example, businesses such as Wal-Mart, Target and Saks 5th Avenue are successful because they focus on producing quality fashion at low prices, or providing high-quality fashion at higher prices. Businesses such as Sears and JC Penny are less successful because they are stuck in the middle - they provide clothes that are not as fashionable as Saks 5th Avenue but not as cheap as Wal-Mart or Target.

I thought it was interesting how similar these competitive strategies were to some of the marketing strategies we learned about in Principles of Marketing. Similar to the Differentiation Strategy, marketing strategy is the marketing logic by which the business unit hopes to create customer value and achieve profitable customer relationships. The company decides which customers to serve (through segmentation and targeting) and how (through differentiation and positioning). Differentiation is actually differentiating the market offering to create superior customer value.

The innovation strategy also relates to the marketing concept of New-product Development - the development of original products, product improvements, product modifications, and new brands through the firm’s own product-development efforts.

Tuesday, February 9, 2010

Ch. 1 - The Components of Information Systems

Tonight we learned about systems and cybernetic systems. The technical definition of a system is: a set of interrelated components with a clearly defined boundary, working together to achieve a common set of objectives by accepting inputs and producing outputs in an organized transformation process. A cybernetic system is a bit more advanced because it has five elements: input, processing, and output (similar to a system), but it also has elements of feedback and control.

Professor Tuggle used the example of how a palm tree is a system. A palm tree has three components: the root, trunk, and leaves, and these components work together to keep the tree alive and allow the tree to reproduce. The palm tree accepts inputs in the form of nutrients, water, and sunlight, and produces outputs in the form of sap. This example was really interesting to me, because when I think of a "system," I just naturally think of something technological or a database information system, for example. I never realized how things like palm trees are systems as well.

I started thinking about this example of how a palm tree is a system, and I decided to try to figure out another example of a system that I wouldn't have thought of before tonight. I was wondering if something like a lightbulb could also be considered a system. A lightbulb is made up of three components: the tungsten filament, glass, and screw cap, and these components work together to produce light. The lightbulb accepts inputs in the form of energy, electrons and electrical currents to produce outputs in the form of light!

Friday, February 5, 2010

Ch. 1 - Foundations of Info Systems in Business

Yesterday we touched on a lot of the topics that we will be covering for the entire semester. We also had our first day of technology reports, which, like Professor Tuggle said, were actually one of the most interesting parts of the class. The tech reports were really informative and I was surprised that I was able to understand some of the more complicated reports.

One of the main topics in Ch. 1 that stood out to me was the mention of career opportunities in Information Systems. Professor Tuggle emphasized the fact that employment opportunities in IT are very strong, with new jobs emerging daily because of frequent shortages of IT personnel. Because the technology landscape is constantly changing and evolving, there is always a need for business professionals well-educated in management information systems. Although the economic downturn has affected the IT job sector, and although rising labor costs have caused many jobs to be outsourced to areas such as India and the Middle East, the long-term job outlook for IT careers is still very positive and exciting.

One of our powerpoint slides listed several dozen career opportunities in IS - including Project Manager, which caught my eye because my dad actually works as a Sr. Project Manager for a company that is one of the world's leading providers of management, engineering and construction services. My dad has worked in this same career for 30 years, and I realized that I never really understood what his job actually entails. So, I decided to take this opportunity to ask him about his job description. He told me that his main duty is to manage projects to implement, upgrade and add functionality to various information systems. The project manager is responsible for gathering requirements, documenting and estimating costs, developing schedules, identifying resources, and executing projects according to the schedule. The project manager has to be ready to execute changes in order to meet changing needs or unplanned issues. The whole purpose of doing these projects is to help the company become more efficient, profitable, and competitive. His job sounds interesting, but not really something I think I would want to pursue myself!

Wednesday, February 3, 2010

History of the Internet & Information Age

Yesterday was the first day of MGSC 300. I think this will be an interesting class, although it might be a bit repetitive since I just finished ACTG 439 (Accounting Info Systems) over Interterm. I'm glad that I already have experience with using MS Access and Excel so hopefully the projects and cases we do in class won't be that difficult for me. I'm a little bit worried about the technology reports and the fact that I have to be prepared to present everyday, but I guess I'll just have to try my best.

We started talking about the history of the Internet and the Information Age. I have never really researched the Internet, even though I use it for several hours everyday. Prof. Tuggle talked about Packet Switching Networks - he used an example that when you send an e-mail from one place to another, your message is split up into tiny packets and sent separately on the Internet. The packets are put together and the e-mail is received; although packets may travel different paths. This was extremely interesting to me. E-mail is used so widely and frequently these days that no one really considers how their message is actually transmitted. I know that I take for granted how much work goes into creating an e-mail network. Technology has improved so much over the last few decades that this complicated process can be completed in just a few seconds.

Prof. Tuggle also talked about the birth of the Internet in 1969. One interesting fact that I picked up was that the first Internet connected only to a four-node network based within UCLA, Stanford Research Institute, UCSB and the University of Utah. Almost 30 years later, in 1996, there were over 6.5 million nodes and 100,000 websites! I still remember the days of dial-up connections and the early days of high-speed Internet, back when I was in elementary school! Today, the Internet is everywhere and people can connect to the Internet instantaneously through WiFi.