Edudorm Facebook

Introduction to Information Systems and Technologies

 

Introduction to Information Systems and Technologies

Journal Entry 1: Keyboard

Nowadays, keyboards appear to be slightly obsolete input devices since work has been made easier through voice technology. There are different types of keyboards, but the Qwerty keyboard seems to be the most popular.  Despite Qwerty being the most popular keyboard used, the Dvorak keyboard is more efficient since it is more comfortable and can type quickly with less pain. However, in situations where congenitally blind individuals are involved, the Qwerty keyboard is preferred to ensure equality. Qwerty keyboard was initially designed for typewriters though being used in the digital age. Individuals can be at risk of getting carpal tunnel syndrome using the Qwerty keyboard, which often requires more finger efforts than necessary. If we keenly observe the Qwerty keyboard, we can agree that an individual can type the word "typewriter" only using the letters in the fourth row from the bottom. Therefore, every individual should be keen when interacting with different types of keyboards.

Journal Entry 2: Tesla Automotive

Under Michael Porter's three generic strategies, Tesla automotive usually relies on a product differentiation strategy. Buyers often look for Tesla commodities due to their unique image and design, sharp edge built-in technology, and relatively hassle-free purchasing and possessing experience. Tesla cars have the giant screen ever seen in vehicles and were the first to provide semi-autonomous driving. Therefore, product differentiation can be achieved through many ways, for example, by offering unique merchandise design, having technological power over all others, and providing outstanding services.

Journal Entry 3: Tesla’s Perception About Bitcoins

Tesla CEO Elon Musk has raised a concern about buying and accepting bitcoins whereby he says Tesla will no longer accept bitcoin due to climate change issues. He also said that Tesla would not sell even a single bitcoin. Tesla disposed of information that they had bought bitcoin worth 1.5 billion use dollars before accepting it as a payment for cars. One of the research leaders at broker Pepperstone argued that Musk's step was a blow to bitcoin uses.   

Journal Entry 4: COVID-19 Personal Experience

Within the COVID-19 pandemic period, many of us have undergone difficult situations. Despite experiencing complex problems, some good things have happened during this period. Students in the infected areas ranging from pre-primary level to university level have been entirely affected by the closure of schools. But this has not stopped learning since many of us are still learning from home. Information systems and technology have made schooling continue through electronic textbooks and various online courses. Hence, information and communication technology have made it possible for many learners to continue learning despite the challenges posed by the COVID-19 pandemic.

Journal Entry 5: Michael Dell and SCM

To succeed and gain a more competitive advantage in business, Dell decided to sell PCs to consumers directly. Dell also came up with its channel for manufacturing and selling PCs. This channel helped him do away with an increase in prices in the reselling process and significant stock expenses. Hence, Dell operated under low costs compared to anyone else in the industry. The cost-effective strategy of Dell disregarded the threats of Moore’s Law and only concentrated on operational efficiency. Therefore, Dell had to acquire EMC since the deal was to bring together the dominant server makers, personal computers and servers, and the frontline providers of essential computer storage products.

Journal Entry 6: Data- Rich, Information Poor

Technology nowadays provides data to many organization manufacturers in abundance. But it does not mean that an organization having much data should also have quality information required by other organizational systems and people. Unfortunately, the opposite seems true, whereby innovations are designed to limit organizations' communications with third-party quality systems. Therefore, despite heavy investment by organizations in technology, manufacturers may sometimes not have ideas about the amount of data they have or how it can assist them.

Journal Entry 7: Tesla Sustained or Disruptive Technology?

There are very few arguments about Tesla being a wildly innovative organization. The most generous act Tesla did upon introducing Roadster is that it did not bother competing within the limits of the industry that was already in the market nor try to take away customers from already established automobile enemies. Instead, it came up with an uncontested market environment which made the competition irrelevant. This made lenders and investors firmly believe that Tesla can take over in the future, and if the potential is not discovered, the money will go away. Under Clayton Christensen's model, a participant in the market usually offers substitute commodities using cheaper technology that seemed inferior to old participants. When the disrupter comes, he will try to improve its performance and overcome the industry. Therefore, Tesla should not be defined as a disruptive innovator; instead, it should be described as a sustaining innovator.

  

Journal Entry 8: Slack and The Stewart Butterfield Story

From failed business, Slack came up with new business ideas whereby he emphasizes that one should prioritize the unique features of his or her products. Before his second trial to develop an online game, he had already failed in his eight-year project. While Slack was trying to recover from food poisoning at night after taking his meal in a hotel, he came with the idea that suggested the aspect of sharing photos with other people. Fortunately, he had built this feature within the game. Therefore, it was good to go as it only required a few adjustments. Lucky enough, his online photo-sharing platform became increasingly popular with time and was adopted by companies with extensive internet services a year later after being launched. After managing to go through his new successful product, Slack did not give up again on his dream of coming up with an online role-playing game that had to involve many players. Therefore, it is upon every individual to be open to such thinking while starting their own business.

Journal Entry 9: Emotional Intelligence (El)

Upon application of principles of Emotional Intelligence, the business climate has changed without alteration, and project results have been optimized. Businesses have to create an environment whereby team members, clients, sponsors, and management can share information with clarity, deal with challenges effectively and act swiftly and strategically by making appropriate choices. For businesses to optimize climate effects, they need to increase Emotional Intelligence. Project managers must understand and accommodate the different needs of today’s workforce relating to fulfillment and values. Therefore, high Emotional Intelligence leads to project success through enhanced performance.

Journal Entry 10: Agile-Based IT Projects vs. Traditional SDLC Waterfall Projects

Agile-based IT projects have a higher success rate of 64% than traditional SDLC waterfall projects, which have a success rate of 49% as per Ambysoft's 2013 Project Success Rates Survey. The research considered the extent to which constraints are attained, showing that agile methodologies always yield more successful projects than waterfall methodologies. The study carried out by PWC in 2017 also indicates that agile-based IT projects are more successful than waterfall projects by 28%. Agile methodologies usually embrace risks because they cannot avoid them as much as they can try. Contrary, waterfall projects are strongly biased to risk aversion and typically have fixed goals in mind through which they organize themselves. The aspect of risk-taking is the main reason why agile-based IT projects tend to be more successful than traditional SDLC waterfall projects.

Journal Entry 11: Data Rich, Information Poor

 Technology nowadays provides data to many organization manufacturers in abundance. But it does not mean that an organization having much data should also have quality information required by other organizational systems and people. Unfortunately, the opposite seems true, whereby innovations are designed to limit organizations' communications with third-party quality systems. Therefore, despite heavy investment by organizations in technology, manufacturers may sometimes not have ideas about the amount of data they have or how it can assist them.

 

Journal Entry 12: Information and Cyber Security and IoT

Cybersecurity is among the critical aspects that individuals require to consider while they work over the internet. Therefore, cybersecurity is vital as it helps to protect individuals' workstations from harmful spyware. In the world we live today, cybersecurity threats have evolved in the information security industry. The industry continues to have challenges regarding the scarcity of cybersecurity experts, and this increases cybersecurity threats. Colonial Pipeline shut its entire network after a cyberattack that involved ransomware. It said that the attack affected its IT systems, although it did not say if any of its operational technology systems were affected directly. A prolonged shutdown would lead to a rapid increase in gasoline and oil prices in the United States ahead of peak summer driving season, a big problem for the U.S economy and consumers.  

Cyberattack on Colonial Pipeline poses a question of what will happen in the future to the health care metrics, too, with Teladoc and IoT. The cyberattack has caused many threats not only on Colonial Pipeline but also on other industries. In the health sector, cybersecurity seems more critical than ever, according to the recent research carried out in 2020. Hence, the more we digitalize healthcare, the more we increase the risks of cybercrime.  In 2019 alone, cybercrime on IoT devices increased by 300%, accounting for more than 2.9 billion activities. Cyberattacks on connected medical devices are recently growing. Therefore, the cyberattack on the Colonial Pipeline emphasizes how it is vital to come up with the IoMT industry for cybercrimes.  

 

.

        

 

1568 Words  5 Pages
Get in Touch

If you have any questions or suggestions, please feel free to inform us and we will gladly take care of it.

Email us at support@edudorm.com Discounts

LOGIN
Busy loading action
  Working. Please Wait...