Sunday 27 January 2013

# chapter8: Assessing Organizational Information -Data Warehouse


1). Describe the role and purpose of data warehouses and data marts in the organization.

Data warehouse- A data warehouse is a collection of data, usually current and historical, from multiple databases that the organization can use for analysis and decision making. The purpose, of course, is to bring key sets of data about or used by the organization into one place.-

Data mart- Data marts are related sets of data that are grouped together and separated out from the main body of data in the data warehouse.



source from google

The purpose of data warehouse is to aggregate information throughout an organization into a single repository in such way that employee can make decision and undertake business analysis activities.
besides that, database store all the transaction such as sales of product.

The roles of data mart is easily to employee to access the data information. Other than that, data marts as having focuses information subsets particular to the needs of a given business unit such as finance or production and operations.
2). Explain the relationship between business intelligence and a data warehouse.

Business intelligence usually refers to the information that is available for the enterprise to make decisions on. A data warehousing (or data mart) system is the backed  or the infrastructural, component for achieving business intelligence. Business intelligence also includes the insight gained from doing data mining analysis, as well as unstructured data (thus the need of content management systems). 
Let me give the path of Data warehousing. All the source data from disparate sources are used to load/Stage data. Different sources can be flat files, another database or some other process. The starting point of the Data warehouse should extract the data in order to load into its environment.This is extracting. This data may not be the expected format or size. your business demands are different or your organization business requirements are different. So the business process has to modify the data or better word is to transform the incoming data to meet requirements and objectives. This is called Transformation. Once every slicing and dicing of the data is done along with applied business rules, this data is ready for loading into the target tables. This process is called Loading. So overall till now we have done Extraction, Transformation and Loading. In short we call this ETL. There are lot of tools available in today's market which does help in achieving the ETL process. Once this data is loaded in to the database, this is ready for next processing. We call that database as Data warehouse database. The next process could be building of datamarts or directly reporting from it. There are lot of tools/software available for reporting/analysis. Some call it business reporting or analysis tool. But if you see the whole process has intelligence involved in business. we can call this or the gurus call it Data warehousing and the system involved from end to end is called business intelligence system.

# Chapter 7 | Storing Organizational Information-databases

https://d763b71c-a-62cb3a1a-s-sites.googlegroups.com/site/qcclpamplona/unit-2/chapter-7-storing-organizational-information-databases/chapter%207.png?attachauth=ANoY7cpqcWfzC8iQ8ERPwxzfTAMNgUVNQF14kgJPWsBqziR0PaK_TwmqekznSZJZnQVBCdopzp05UvU5lZoDKBiennQttfIHInGChAH0QCNTcWS5f0ipzwcnNj23PWn9Ixya1QxUvogLAfLH2AhMVT6FDFuCawFENVqqHRrcMtEKFz8fHPEnu1TKHXfzA6PuMtqKBS42CEXQAmXc9YTTRIkeYrPslfcPSWFQ4uHSXurKIcC4ST6yFOTcf7amtbjs5-RzokFMmgy3vsYqQY24VxThUbY-3e20thxKsx0Ez-3khf67I9fJjsY%3D&attredirects=0
1. Define the fundamental concept of the relational database model ?
 A database maintain information about the various types of objects (inventory), events (transaction),     people (employees) and places (ware houses)


  • Hierarchical database model - information is organized into a tree-like structure that allows repeating information using parents or child relationship in such a way that it cannot have too many relationship. It will were widely used in the first mainframe databases managements systems. 
  • Network database model - is a flexibility way of representing objects and their relationship. 
  • Relational databases model - is a type of databases that store information in the form of logically related two dimensional tables. Two dimensional means that in one web or network we can know many things in many way not just focus in one section. For example, Facebook social network is not focus only in one function but in Facebook if we click in other function the pages will proceed to other function in the same time without need to open new tab. 
cube is one way to illustrate relations among data as it helps to visualize data intersections. While it is easiest for us to picture a three-dimensional cube, a relational database stores data in many dimensions. 


We can think of dimensions as the entry points into the data or those business concepts we will use to slice and dice our data. In some organizations, dimensions are referred to as entities.


Many customers will buy many products in many stores at many times. We will call this type of data relationship a many-to-many relationship. In many-to-many relationships we use dimensional keys to organize the data. Look for the keys in the dimensional model at above.
  • PrimaryKey..................................................................................................................................... 
  • The primary key is unique to each row or record in our database and its value should not change over time.
  • A primary key is often a consecutive or random number assigned to the record as it enters the database. 
  • A primary key can also be made up of components of other fields in the table.
  • The primary key is used for indexing the table to make it more efficient to search, sort, link and perform other operations on the data. 
  • If we review the market dimension we find that each store key is unique. no two stores can have the same store key. Although it might seem that we could use store name as a unique means of identifying each store, we have  different stores with different addresses, states, regions, etc.
  •  ForeignKeys..................................................................................................................................
  • So the foreign keys in the fact table must have counterparts in the dimension tables to which it refers. This requirement of relational databases is called referential integrity.
  •  If you spend a great deal of time talking with data modellers you may come across a few more terms having to do with keys, such as composite keys and concatenated keys. Every fact table in a relational database has a composite key. 
  • This is the primary key for the fact table and it is usually made up of a combination of the foreign keys maintained in the fact table. These foreign keys are concatenated (linked together into a single entry) into a primary key for the fact table.
2. Evaluation the advantages of the relation databases model.

  • Increased flexibility - can manipulated the information or present in many way and in the different shape.
  • Increased scalability and performance - it will be happened in the organisation
  • Reduced information redundancy - the information will be sharing for many other people e.g, in university condition, information about student need to shared with other lecturer and staff about university.
  • Increase information integrity (quality) - information that get a similar source to spread the information without the information will void from fraud and quality information is liable.
  • Increase information security - information that have quality and the security.
3.  Define a databases management system and its relationship to a website
A databases management system is a software through which users and application programs interact with a databases. The user send request and performs the actual manipulation of the information in the databases. Two primary ways can interact with databases management system in terms of : a) directly b) indirectly
4. Explain why an organisation would to integrate its databases
Data integration refers to the organization’s inventory of data and information assets as well as the tools, strategies and philosophies by which fragmented data assets are aligned to support business goals.

company want to integrate its database because they will connect,communicate,dealing and having relation with its customer everyday. Everyday its customers will open the webpage and search anything appear on the page. Therefore, if the product still available or not available the supplier must inform the customers immediately.Publish the information on the web page to make the customers realize that the product exist or not in the market. Then, when the customers got information they will not too disappointed and not waiting too long. Customers satisfy, the business relationship between sellers and customers will be good

Effectiveness of facebook advertising

Facebook Ads effectiveness

Do Facebook Ads work? Let’s find out how to measure the effectiveness of Facebook Ads and what you can do to make your ads more effective.
Keeping your Facebook campaign budget under control is easy when you understand how much Facebook Ads cost. Sometimes you realize that your CPC campaign is costing zero: If you get tons of impressions but no clicks, and your ad is relevant to the target audience, it can be a good idea to experiment with different versions of the ad: Use a new picture, or make changes in the title or body text.
We will see how to optimize Facebook Ads more in detail, but for now let’s say you have an effective ad when your CTR is high.
Your ad is effective also when you manage to spend less, with a low CPC or CPM, and still get clicks.

 

 

 Effective Facebook Ads CTR and CPC

The chart below shows that on Facebook you can expect different performances depending on ad categories: A very effective Facebook Ad related to Health Care products or pages, can have lower CTR and higher CPC compared to the average Automotive related ad, and still be considered successful.

Advertisements related to leisure topics can be more successful because Facebook as a platform is used to consume and share fun content with friends.

organizationlal structures that support strategic initiatives

  CHIEF INFORMATION OFFICER (CIO)
  • This person will responsible for overseeing for the uses of information technology
  • It ensuring the strategic alignment of IT with business goals and objectives
  • The jobs will reports all the activities in organization directly to the CEO
  • CTO also must be a person that have understanding of every aspect of an organization
  • The capability in IT must be the main power to be a CTO
  • Other function of CTO:- 
    • MANAGER - Ensure the delivery of all IT  projects, on time and within budget
    • LEADER - Ensure the strategic vision of IT is in line with the strategic vision of the organization
    • COMMUNICATOR- Advance and communication the IT strategy by building and maintaining strong executive relationship
  • CTO also need to enhance customer satisfaction ahead of their concern of any specific aspects of IT
CHIEF TECHNOLOGY OFFICER (CTO)
  • Responsible for ensuring the through, speed, accuracy, availability, and reliability of an organization in IT
  • Direct responsibilities for ensuring the efficiency of IT system 
  • CTO will posses well-rounded knowledge of all aspects of IT
  • Runs the organization’s engineering group
  • Uses technology to enhance the company’s product offerings
  • Focuses on external customers (buyers)
  • Collaborates and manages vendors that supply solutions to enhance the company’s product(s)
  • Aligns the company’s product architecture with business priorities
  • Develops strategies to increase the company’s top line (revenue)
  • Has to be a creative and innovative technologist to be successful
CHIEF SECUARITY OFFICER (CSO).
  • To ensuring the security of IT systems
  • Developing strategies in IT
  • Make sure the IT safeguards against attacks from hackers and viruses
  • EXAMPLE OF THE RESPONSIBILITIES CSO:-
  • Lead operational risk management activities to enhance the value of the company and brand.
  • Oversee a network of security directors and vendors who safeguard the company's assets, intellectual property and computer systems, as well as the physical safety of employees and visitors.
  • Identify protection goals, objectives and metrics consistent with corporate strategic plan.
  • Manage the development and implementation of global security policy, standards, guidelines and procedures to ensure ongoing maintenance of security. Physical protection responsibilities will include asset protection, workplace violence prevention, access control systems, video surveillance, and more. Information protection responsibilities will include network security architecture, network access and monitoring policies, employee education and awareness, and more.
  • Work with other executives to prioritize security initiatives and spending based on appropriate risk management and/or financial methodology.
  • Maintain relationships with local, state and federal law enforcement and other related government agencies.
  • Oversee incident response planning as well as the investigation of security breaches, and assist with disciplinary and legal matters associated with such breaches as necessary.
  • Work with outside consultants as appropriate for independent security audits.
CHIEF PRIVACY OFFICER (CPO)

  • Responsibility for ensuring the ethical and legal use of information within an organization
  •  Created to respond to both consumer concern over the use of personal information, including medical data and financial information, and laws and regulations.
  • Evaluating legislative and regulatory proposals involving collection, use, and disclosure of personal information by the Federal Government. 
  • Conducting a privacy impact assessment of proposed rules of the Department or that of the Department on the privacy of personal information, including the type of personal information collected and the number of people affected.
  • Coordinating with the Officer for Civil Rights and Civil Liberties.
CHIEF KNOWLEDGE OFFICER (CKO)

  • (CKO) is an organizational leader, responsible for ensuring that the organization maximizes the value it achieves through "knowledge". 
  • The CKO is responsible for managing intellectual capital and the custodian of Knowledge Management practices in an organization. 
  • CKO role is much broader, that can help an organization maximize the returns on investment in knowledge (people, processes and intellectual capital), exploit their intangible assets (know-how, patents, customer relationships), repeat successes, share best practices, improve innovation, and avoid knowledge loss after organizational restructuring.
  • CKO must have skills across a wide variety of areas. 
  • They must be good at developing/understanding the big picture, advocacy (articulation, promotion and justification of the knowledge agenda, sometimes against cynicism or even open hostility), project and people management (oversight of a variety of activities, attention to detail, ability to motivate), communications (communicating clearly the knowledge agenda, have good listening skills and be sensitive to organizational opportunities and obstacles), leadershipteamwork, influencing, and interpersonal skills
  • The CKO who successfully combines these skills is well equipped as an excellent agent of change for their organization.

Sunday 30 December 2012

#supply chain management



 






Supply chain management (SCM) is the management of a network of interconnected businesses involved in the provision of product and service packages required by the end customers in a supply chain. Supply chain management spans all movement and storage of raw materials, work-in-process inventory, and finished goods from point of origin to point of consumption.

Another definition is provided by the APICS Dictionary when it defines SCM as the "design, planning, execution, control, and monitoring of supply chain activities with the objective of creating net value, building a competitive infrastructure, leveraging worldwide logistics, synchronizing supply with demand and measuring performance globally."







Sunday 16 December 2012

#chap2case: Say 'Charge It' with your cell phone



 *Question 1
Do you view this technology as a potential threat to traditional telephone companies? If so, what counter strategies could traditional telephone companies adopt to prepare for this technology?

It is a potential threat to the company because this new technology can make the existence company loss their customer. So, the existence company have to use Differentiation  strategy to adapt to this new changes that happen in the world today. By doing that,company create competitive advantages by differentiate their cell phone on 1 or more important features to the customer. These specials features also may give them price advantages and stimulate demand.



*Question 2
Using Porter's Five Forces describe the barriers to entry for this new technology.

Barriers to entry is the threat of substitute products or services. Customer might think that these new modern telephone company may have more expertise in this new technology. So, easily they can change to new cell phone, and the old fashion technology can loss customer.


*Question 3
Which of Porter's three generic strategies is the new technology following?


The Three Generics Strategies in the new technology is Differentiation. This strategies may allow the company to put a higher price because of the special features they have in their products. Based on this case, as the traditional company already have name, so, they just need to step up their game by putting this new technologies into their new coming product.


 *Question 4 
Describe the value chain of the business of using cell phones as a payment method.

For example, a girl buy a new shoes from ZALORA using direct debit transaction. So, the bank will directly deduct the money from our account and pay Zalora that  certain amount of money. The bank may charges a few ringgit for the service provided to the customer. from that, they can gain some profit through online payment. Once Zalora get the money, they will deliver the products to the customer.

*Question 5
What types of regulatory issues might occur due to this type of technology?

Fraud can happen from internet payment is fraud by the customer and by the company itself. customer may use others account to do payment or use different identity. So, if no payment is made, the company can't trace them.