NetWorksAndBusinessApplications

NetWorksAndBusinessApplications - ISM3630...

Info iconThis preview shows pages 1–15. Sign up to view the full content.

View Full Document Right Arrow Icon
1 ISM 3630  Business Information Systems IT for Business Operations Dr. Dave Huff
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
2 Network Infrastructure “75% of all IT Dollars go into  Infrastructure” IBM – WSJ, 2001
Background image of page 2
Two Key Roles in Value Chain Producer Product Service Sell, Support or Support OEM or Tier Distributor Connect Buyer and Seller May or may not take physical control
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Networked Business Roles Network Characteristics Internet  Dedicated Networks Role Infrastructure  Product/Service Service Focused Portal 
Background image of page 4
Revenues in a Networked Model Scale and Market Exposure Page Rank Double Edged Sword Revenue Stream Advertising Sales Fees Commissions
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Nothing new?  Or is there? Are these challenges new to  businesses? Are we the first “age” to: Innovate? Seek profits? Expand? Leverage? So what is new here?
Background image of page 6
Metcalf’s Law The value of a network is equal to the  square of the number of users Exponential growth Critical mass Internetworking Social Networking # of users Valu e
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Hardware Requirements Infrastructure Cabling/Media Routing Hub, Switch, Routers Servers Application Web FTP/Email/Administrative Clients
Background image of page 8
Software Requirements Server File/Resource Sharing Authentication Application Networking protocols OSI 7-layer  Client General or specific
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
The OSI Reference Model 
Background image of page 10
Example – Send a Letter Language System Language System Written in Cursive Written in Cursive Certified Mail Certified Mail USPS USPS Truck/Air Truck/Air ICC/Laws/Rules ICC/Laws/Rules DOT/Roads/Maint DOT/Roads/Maint Read Cursive Write in Cursive Language System USPS - Internal Sorting/Routing Mail Carrier Roads/Mailbox
Background image of page 11

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Data Encapsulation 
Background image of page 12
Enterprise Application Architecture Source: Adapted from Mohan Sawhney and Jeff Zabin, Seven Steps to Nirvana: Strategic Insights into e-Business Transformation (New York: McGraw-Hill,2001), p. 175.
Background image of page 13

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Customer Relationship Management  (CRM) CRM uses technology to Create a cross-functional enterprise  system That integrates and automates many of the  processes in sales, marketing and 
Background image of page 14
Image of page 15
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 50

NetWorksAndBusinessApplications - ISM3630...

This preview shows document pages 1 - 15. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online