Sunday, June 8, 2008
switch
A network switch is a small hardware device that joins multiple computers together within one local area network (LAN). Technically, network switches operate at layer two of the OSI model.
HUB
RING
RING TOPOLOGY
Focused Differentiation
•Choice to be made between focused differentiation and broad differentiation if growth required
•Difficult when the focus strategy is only part of an organisation’s overall strategy
•Possible conflict with stakeholder expectations
•New ventures start off focused, but need to grow
•Market situation may change, reducing differences between segments
•Difficult when the focus strategy is only part of an organisation’s overall strategy
•Possible conflict with stakeholder expectations
•New ventures start off focused, but need to grow
•Market situation may change, reducing differences between segments
Hybrid Strategy
Differentiation Strategies
Low Price Strategy
“No Frills” Strategy
SWOT
Problems of SWOT analysis
Benchmarking Strategic Capability
–Historical – performance compared to previous years
–Industry/sector – comparative performance of other organisations
–Best in class – wider search for best practice
•Increased expectations due to improved performance in another sector
•Breaking the frame about performance standards to be achieved
•Spot opportunities to outperform incumbents in other markets – stretch core competences
–Industry/sector – comparative performance of other organisations
–Best in class – wider search for best practice
•Increased expectations due to improved performance in another sector
•Breaking the frame about performance standards to be achieved
•Spot opportunities to outperform incumbents in other markets – stretch core competences
Core competences
Strategic Gaps
Strategic Groups
The Five Forces Framework
FIVE FORCES ANALYSIS
The threat of entry ...
Dependent on barriers to entry such as:
•economies of scale
•capital requirements of entry
•access to supply or distribution channels
•customer or supplier loyalty
•experience
•expected retaliation
•legislation or government action
•differentiation
The threat of entry ...
Dependent on barriers to entry such as:
•economies of scale
•capital requirements of entry
•access to supply or distribution channels
•customer or supplier loyalty
•experience
•expected retaliation
•legislation or government action
•differentiation
Threat of substitutes
Reduction in demand for products as customers switch to alternatives:
•Product for product substitution
–e.g. email for post
•substitution of need
–e.g. reliable and cheap appliances reduce need for maintenance services
•generic substitution
–competition for household income, e.g. cars versus holidays
–doing without
Buyer power
buyer power is likely to be high where there is:
•a concentration of buyers
•many small operators in the supplying industry
•alternative sources of supply
•low switching costs
•components/materials that are a high percentage of cost to the buyer leading to “shopping around”
•a threat of backward integration
Supplier power is likely to be high where there is:
•a concentration of suppliers
•customers that are fragmented and bargaining power low
•high switching costs
•powerful supplier brand
•possible integration forward by the supplier
Competitive Rivalry is likely to be high when:
•competitors are in balance
•there is slow market growth (product life cycle)
•there are high fixed costs in an industry
•there are high exit barriers
•markets are undifferentiated
Key Aspects of 5-Forces Analysis
•Use at level of strategic business units (SBU)
•Define the industry/market/sector
•Don’t just list the forces: derive implications for industry/organisation
•Note connections between competitive forces and key drivers in macroenvironment
•Establish interconnections between the five forces
•Competition may disrupt the forces rather than accommodate them
RING
The ring topology is a type of computer network arrangement where each network computer and device are connected to each other forming a big circle (or similar shape). Each packet is sent around the ring until it reaches its final destination. Today, the ring topology is not often used.
ADVANTAGES
Can create much larger network using Token Ring
Does not require network server to manage the connectivity between the computers
Very orderly network where every device has access to the token and the opportunity to transmit
Performs better than a star topology under heavy network load
Does not require network server to manage the connectivity between the computers
Very orderly network where every device has access to the token and the opportunity to transmit
Performs better than a star topology under heavy network load
DISADVANTAGES
Challenges of Strategic Management
•Prevent strategic drift
–Progressive failure to address strategic position
–Deterioration of performance
•Understand and address contemporary issues
–Internationalisation
–E-Commerce
–Changing purposes
–Knowledge and learning
•View strategy in more than one way
–Three strategy lenses – Design, Experience, Ideas
–Progressive failure to address strategic position
–Deterioration of performance
•Understand and address contemporary issues
–Internationalisation
–E-Commerce
–Changing purposes
–Knowledge and learning
•View strategy in more than one way
–Three strategy lenses – Design, Experience, Ideas
Strategy into Action
Saturday, June 7, 2008
Strategic Choices
Strategic Position
•The Organisation’s Environment
–Political Economic Social Technological Legal Environmental
–Sources of Competition
–Opportunities and Threats
•Strategic Capability of the Organisation
–Resources and Competences
–Strengths and Weaknesses
•Expectations and Purposes
–Corporate Governance, Stakeholders, Ethics and Culture
–Sources of Power and Influence
–Communication of Purpose: Mission and Objectives
–Political Economic Social Technological Legal Environmental
–Sources of Competition
–Opportunities and Threats
•Strategic Capability of the Organisation
–Resources and Competences
–Strengths and Weaknesses
•Expectations and Purposes
–Corporate Governance, Stakeholders, Ethics and Culture
–Sources of Power and Influence
–Communication of Purpose: Mission and Objectives
The Vocabulary of Strategy
•Mission – overriding purpose
•Vision/strategic intent – desired future state
•Goal – general statement of aim or purpose
•Objective – quantification or more precise statement of goal
•Strategic capability – resources, activities and processes
•Business model – how product, service and information flow
•Control – monitoring of action steps
•Vision/strategic intent – desired future state
•Goal – general statement of aim or purpose
•Objective – quantification or more precise statement of goal
•Strategic capability – resources, activities and processes
•Business model – how product, service and information flow
•Control – monitoring of action steps
LEVELS OF STRATEGY
Strategic Decisions are About
Strategic Business Unit (SBU)
STAR TOPOLOGY
In a star topology all nodes connect to one central device. That device may be a file server, or a network hub. When the node wants to transmit to another node, the communication is managed by , and transmitted through, the central device, which contains the communication software.
Advantage
It is easy to determine the source of a network problem, such as a cable failure.
Disadvantage
The main disadvantage is the central device; if the central device is not working the entire network is down. Another disadvantage is adding computers can be costly.
Advantage
It is easy to determine the source of a network problem, such as a cable failure.
Disadvantage
The main disadvantage is the central device; if the central device is not working the entire network is down. Another disadvantage is adding computers can be costly.
Definition of Strategy
Database Application
Data Independence
Physical representation and location of data and the use of that data are separated
•The application doesn’t need to know how or where the database has stored the data, but just how to ask for it.
•Moving a database from one DBMS to another should not have a material effect on application program
•Recoding, adding fields, etc. in the database should not affect applications
•The application doesn’t need to know how or where the database has stored the data, but just how to ask for it.
•Moving a database from one DBMS to another should not have a material effect on application program
•Recoding, adding fields, etc. in the database should not affect applications
Data Independence
Physical representation and location of data and the use of that data are separated
•The application doesn’t need to know how or where the database has stored the data, but just how to ask for it.
•Moving a database from one DBMS to another should not have a material effect on application program
•Recoding, adding fields, etc. in the database should not affect applications
•The application doesn’t need to know how or where the database has stored the data, but just how to ask for it.
•Moving a database from one DBMS to another should not have a material effect on application program
•Recoding, adding fields, etc. in the database should not affect applications
DBMS Benefits
From File Systems to DBMS
Metadata
Repository
Terms and Concepts
Database
A Database is a collection of stored operational data used by the application systems of some particular enterprise. (C.J. Date)
–Paper “Databases”
•Still contain a large portion of the world’s knowledge
–File-Based Data Processing Systems
•Early batch processing of (primarily) business data
–Database Management Systems (DBMS)
–Paper “Databases”
•Still contain a large portion of the world’s knowledge
–File-Based Data Processing Systems
•Early batch processing of (primarily) business data
–Database Management Systems (DBMS)
Database
File
Friday, June 6, 2008
WANS
A network that crosses organizational boundaries, or in the case of a multisite organization, reaches outside the immediate environment of local offices and factory facilities, is called a wide area network (WAN). WANs can be public or private. The internet is an example of a public network. The Extranet and the Intranet are private networks.
NETWORK TOPOLOGY
LOCAL AREA NETWORKA
A computer network within a building, or a campus of adjacent buildings, is called a local area network, or LAN. No specific distance classifies a network as local, but usually as long as it is confined to a radius of three to four miles, it is called a LAN. Local area networks can be hardwired of wireless or a combination of the two, are the most common way to let users share software and hardware resources and to enhance communication among workers.In LANs, one computer is used as a central repository of programs and files that all connected computers can use; this computer is called a server. Connected computers can store documents on their own disks or on the server, can share hardware such as printers, and can exchange e-mail. The server usually has centralized control of communications among the connected computers and between the computers and the server itself.
What is a system?
You have probably used the word ‘”system” many times. Simply put, a system is an array of components that work together to achieve a common goal, or multiple goals, by accepting input, and producing it, and producing output in an organized manner. Consider the following examples:
A sound system consists of many electronic and mechanical parts, such as a laser head, an amplifier, an equalizer, and so on. This system uses input in the form of electrical power and sound recorded on tape or CD, and processes the input to reproduce music and other sounds. The components work together to achieve this goal.
A sound system consists of many electronic and mechanical parts, such as a laser head, an amplifier, an equalizer, and so on. This system uses input in the form of electrical power and sound recorded on tape or CD, and processes the input to reproduce music and other sounds. The components work together to achieve this goal.
NETWORKS
In the context of data communications, a network is a communication of devices or nodes connected to each other through one of the communication channels just discussed. Networks in which a single host computer serves only dumb terminals are becoming obsolete as prices of microcomputers have plummeted.There are two basic types of networks: LANs (local area networks), which serve an office or several adjacent offices; and WANs (wide area networks), which are larger, national or global networks use the same type of layout, also called topology, and the same types of protocols for signal transmission and reception. In such cases, the only difference between LANs and WANs is the distance between the networked computers.
COOKIES
If you have ever suffered the Web, your computer probably contains cookies. A cookie is a sample file that a Web site place on a visitor’s hard disk so that the Web site can remember something about the surfer later. Typically, a cookie records the surfer’s ID of some other unique identifier. Cookies have an important function in Web-based e-commerce, especially between business and customers. They provide convenience to customers. If the cookie contains your name and password for accessing a certain resource at the site, you do not have reentered the information. Cookies often help ensure that a user dose not receive the same unsolicited information multiple times. For instant, cookies are commonly used to rotate banner ads.Some cookies are temporary; they are installed only for that session, and are removed when the user leaves the site. Others are persistent and stay on the hard disk unless the user deletes them. Many cookies are installed to serve only first parties, which are the businesses with which the user interacts directly. Others serve third parties, which are organizations that collect information about the user whenever the user visits a site that subscribes to the service of these organizations.
learn more http://www.w3schools.com/PHP/php_cookies.asp
learn more http://www.w3schools.com/PHP/php_cookies.asp
Common Gateway Interface (CGI)
HOW THE INTERNET WORKS
A simplified explanation of how the Internet works is that every computer and device that accesses the Internet has a unique label or Internet “address.”Internet software and protocols (rules of communication) enable a device to locate another device. For an instant, if you are on the web, you are familiar process of entering a Web address or Uniform Resource Locator (URL) such as www.lankasri.com to access a web site. But what do these letters mean, and where do they come from?
FILE TRANSFER PROTOCOL (FTP)
MULTIMEDIA ON THE WEB
Multimedia is referred to sound, video, animation, and 3D interactive video. Sometimes you’ll be required to download the multimedia files, web pages, or sites. Most of the time multimedia files require that your browser use a plug-in programme. Plug-ins are little software programmes. They enhance your browser so you could listen to sound and video clips. They automatically decompress large files you download. If you don’t have a plug-in programme, you could download it off websites.
DATA COMMUNICATION
Data communication is transfer of data within a computer, between a computer and another device, or between two computers. This type of communication is accomplished through the computer bus. A bus is a system of wires, or strings of conductive material, etched on the surface of a computer board. It is a communication channel that allows the transmission of whole byte or more in one pass.
DATA
Data Access Storage Device (DASD)
Wednesday, June 4, 2008
Data
What is TELNET
The TELNET protocol makes TELNET or remote login possible on the Internet. TELNET to host is all about establishing a connection accross the Internet from one host to another. Quite often, you will need to have an account on the remote host to login once you have made connection. Certain hosts offering white page directories, provide public services that don't require a personal account.
WHAT IS THE DOMAIN NAME SYSTEM
How do i download files
you can download a file by simply clicking on the link. your browse (Netscape or Explorer) will then display the file in your browser window if it is an image or text, or ask you what action to take with the file if it is another type. If you choose the SAVE option, you will then have to choose where you want to save it (choosing the location). A status bar will be displayed once you select this option, telling you how far along the tranfer has gone. Once this task is done, the window will either disappear, or display a message to tell you that the download has been completed.
Tuesday, June 3, 2008
What can you do on the internet
The Internet is a bank of information can be used for a lot of things. for example, you can shop in another continent, sample music, send messages or documents across the world, check out the stock market, listen and download music, play games, chat, catch the latest news in any part of the world, manage your bank account. the Internet became popular after the invention of the file transfer protocol (FTP)
what is an Internet?
what is an Iternet Service Provider (ISP)
Sunday, June 1, 2008
database
DATA
Data are the facts about people, other objects, and events. May be manipulated and processed to produce information.DATA COMMUNICATION
Data communication is transfer of data within a computer, between a computer and another device, or between two computers. This type of communication is accomplished through the computer bus. A bus is a system of wires, or strings of conductive material, etched on the surface of a computer board. It is a communication channel that allows the transmission of whole byte or more in one pass.Database
A collection of similar records with relationships between the records. (Rowley)–bibliographic, statistical, business data, images, etc.
next page