SlideShare uma empresa Scribd logo
1 de 64
41
3
TeChnology as a
vaRiable anD Responsive
oRganizaTional Dynamism
Introduction
This chapter focuses on defining the components of technology
and
how they affect corporate organizations. In other words, if we
step
back momentarily from the specific challenges that information
tech-
nology (IT) poses, we might ask the following: What are the
generic
aspects of technology that have made it an integral part of
strategic and
competitive advantage for many organizations? How do
organizations
respond to these generic aspects as catalysts of change?
Furthermore,
how do we objectively view the role of technology in this
context, and
how should organizations adjust to its short- and long-term
impacts?
Technological Dynamism
To begin, technology can be regarded as a variable, independent
of others, that contributes to the life of a business operation. It
is
capable of producing an overall, totalizing, yet distinctive,
effect on
organizations— it has the unique capacity to create
accelerations of
corporate events in an unpredictable way. Technology, in its
aspect of
unpredictability, is necessarily a variable, and in its capacity as
accel-
erator— its tendency to produce change or advance— it is
dynamic.
My contention is that, as a dynamic kind of variable,
technology, via
responsive handling or management, can be tapped to play a
special
role in organizational development. It can be pressed into
service as
the dynamic catalyst that helps bring organizations to maturity
in
dealing not only with new technological quandaries, but also
with
other agents of change. Change generates new knowledge,
which in
turn requires a structure of learning that should, if managed
properly,
42 INFORMATION TECHNOLOGY
result in transformative behavior, supporting the continued
evolution
of organizational culture. Specifically, technology speeds up
events,
such as the expectation of getting a response to an e-mail, and
requires
organizations to respond to them in ever-quickening time
frames.
Such events are not as predictable as those experienced by
individuals
in organizations prior to the advent of new technologies—
particu-
larly with the meteoric advance of the Internet. In viewing
technology
then as a dynamic variable, and one that requires systemic and
cul-
tural organizational change, we may regard it as an inherent,
internal
driving force— a form of technological dynamism.
Dynamism is defined as a process or mechanism responsible for
the
development or motion of a system. Technological dynamism
charac-
terizes the unpredictable and accelerated ways in which
technology,
specifically, can change strategic planning and organizational
behav-
ior/culture. This change is based on the acceleration of events
and
interactions within organizations, which in turn create the need
to
better empower individuals and departments. Another way of
under-
standing technological dynamism is to think of it as an internal
drive
recognized by the symptoms it produces. The new events and
interac-
tions brought about by technology are symptoms of the
dynamism
that technology manifests. The next section discusses how
organiza-
tions can begin to make this inherent dynamism work in their
favor
on different levels.
Responsive Organizational Dynamism
The technological dynamism at work in organizations has the
power
to disrupt any antecedent sense of comfortable equilibrium or an
unwelcome sense of stasis. It also upsets the balance among the
vari-
ous factors and relationships that pertain to the question of how
we
might integrate new technologies into the business— a question
of
what we will call strategic integration— and how we assimilate
the cul-
tural changes they bring about organizationally— a question of
what
we call cultural assimilation. Managing the dynamism,
therefore, is a
way of managing the effects of technology. I propose that these
orga-
nizational ripples, these precipitous events and interactions, can
be
addressed in specific ways at the organizational management
level.
The set of integrative responses to the challenges raised by
technology
43teChnoloGY As A vArIAble And responsIve
is what I am calling responsive organizational dynamism,
which will
also receive further explication in the next few chapters. For
now, we
need to elaborate the two distinct categories that present
themselves
in response to technological dynamism: strategic integration and
cul-
tural assimilation. Figure 3.1 diagrams the relationships.
Strategic Integration
Strategic integration is a process that addresses the business-
strategic
impact of technology on organizational processes. That is, the
business-strategic impact of technology requires immediate
orga-
nizational responses and in some instances zero latency.
Strategic
integration recognizes the need to scale resources across
traditional
business– geographic boundaries, to redefine the value chain in
the
life cycle of a product or service line, and generally to foster
more
agile business processes (Murphy, 2002). Strategic integration,
then,
Technology as an
independent
variable
Creates
Organizational
dynamism
Acceleration of events that
require different
infrastructures and
organizational processes
Requires
Strategic
integration
Cultural
assimilation
Symptoms and
implications
Figure 3.1 Responsive organizational dynamism.
44 INFORMATION TECHNOLOGY
is a way to address the changing requirements of business
processes
caused by the sharp increases in uses of technology. Evolving
tech-
nologies have become catalysts for competitive initiatives that
create
new and different ways to determine successful business
investment.
Thus, there is a dynamic business variable that drives the need
for
technology infrastructures capable of greater flexibility and of
exhib-
iting greater integration with all business operations.
Historically, organizational experiences with IT investment
have
resulted in two phases of measured returns. The first phase
often
shows negative or declining productivity as a result of the
investment;
in the second phase, we often see a lagging of, although
eventual
return to, productivity. The lack of returns in the first phase has
been
attributed to the nature of the early stages of technology
exploration
and experimentation, which tend to slow the process of
organizational
adaptation to technology. The production phase then lags behind
the ability of the organization to integrate new technologies
with
its existing processes. Another complication posed by
technological
dynamism via the process of strategic integration is a
phenomenon we
can call factors of multiplicity — essentially, what happens
when several
new technology opportunities overlap and create myriad
projects that
are in various phases of their developmental life cycle.
Furthermore,
the problem is compounded by lagging returns in productivity,
which
are complicated to track and to represent to management. Thus,
it is
important that organizations find ways to shorten the period
between
investment and technology’ s effective deployment. Murphy
(2002)
identifies several factors that are critical to bridging this delta:
1. Identifying the processes that can provide acceptable
business
returns from new technological investments
2. Establishing methodologies that can determine these
processes
3. Finding ways to actually perform and realize expected
benefits
4. Integrating IT projects with other projects
5. Adjusting project objectives when changes in the business
require them
Technology complicates these actions, making them more
difficult
to resolve; hence the need to manage the complications. To
tackle
these compounded concerns, strategic integration can shorten
life
cycle maturation by focusing on the following integrating
factors:
45teChnoloGY As A vArIAble And responsIve
• Addressing the weaknesses in management organizations in
terms of how to deal with new technologies, and how to bet-
ter realize business benefits
• Providing a mechanism that both enables organizations to
deal with accelerated change caused by technological innova-
tions and integrates them into a new cycle of processing and
handling change
• Providing a strategic learning framework by which every new
technology variable adds to organizational knowledge, par-
ticularly using reflective practices (see Chapter 4)
• Establishing an integrated approach that ties technology
accountability to other measurable outcomes using organiza-
tional learning techniques and theories
To realize these objectives, organizations must be able to
• Create dynamic internal processes that can function on a
daily basis to deal with understanding the potential fit of new
technologies and their overall value to the business
• Provide the discourse to bridge the gaps between IT- and
non-IT-related investments and uses into an integrated system
• Monitor investments and determine modifications to the life
cycle
• Implement various organizational learning practices, includ-
ing learning organization, knowledge management, change
management, and communities of practice, all of which help
foster strategic thinking and learning that can be linked to
performance (Gephardt & Marsick, 2003)
Another important aspect of strategic integration is what
Murphy
(2002) calls “ consequential interoperability,” in which “ the
conse-
quences of a business process” are understood to “ dynamically
trigger
integration” (p. 31). This integration occurs in what he calls
the five
pillars of benefits realization:
1. Strategic alignment: The alignment of IT strategically with
business goals and objectives.
2. Business process impact: The impact on the need for the
organi-
zation to redesign business processes and integrate them with
new technologies.
46 INFORMATION TECHNOLOGY
3. Architecture: The actual technological integration of appli-
cations, databases, and networks to facilitate and support
implementation.
4. Payback: The basis for computing return on investment
(ROI)
from both direct and indirect perspectives.
5. Risk: Identifying the exposure for underachievement or fail-
ure in the technology investment.
Murphy’ s (2002) pillars are useful in helping us understand
how
technology can engender the need for responsive organizational
dyna-
mism (ROD), especially as it bears on issues of strategic
integration.
They also help us understand what becomes the strategic
integration
component of ROD. His theory on strategic alignment and
business
process impact supports the notion that IT will increasingly
serve as an
undergirding force, one that will drive enterprise growth by
identify-
ing the initiators (such as e-business on the Internet) that best
fit busi-
ness goals. Many of these initiators will be accelerated by the
growing
use of e-business, which becomes the very driver of many new
market
realignments. This e-business realignment will require the
ongoing
involvement of executives, business managers, and IT
managers. In
fact, the Gartner Group forecasted that 70% of new software
applica-
tion investments and 5% of new infrastructure expenditures by
2005
would be driven by e-business. Indeed, this has occurred and
contin-
ues to expand.
The combination of evolving business drivers with accelerated
and
changing customer demands has created a business revolution
that
best defines the imperative of the strategic integration
component of
ROD. The changing and accelerated way businesses deal with
their
customers and vendors requires a new strategic integration to
become
a reality rather than remain a concept discussed but affecting
little
action. Without action directed toward new strategic
integration,
organizations would lose competitive advantage, which would
affect
profits. Most experts see e-business as the mechanism that will
ulti-
mately require the integrated business processes to be realigned,
thus
providing value to customers and modifying the customer–
vendor
relationship. The driving force behind this realignment
emanates from
the Internet, which serves as the principle accelerator of the
change
in transactions across all businesses. The general need to
optimize
47teChnoloGY As A vArIAble And responsIve
resources forces organizations to rethink and to realign business
pro-
cesses to gain access to new business markets.
Murphy’ s (2002) pillar of architecture brings out yet another
aspect
of ROD. By architecture we mean the focus on the effects that
technol-
ogy has on existing computer applications or legacy systems
(old exist-
ing systems). Technology requires existing IT systems to be
modified
or replacement systems to be created that will mirror the new
busi-
ness realignments. These changes respond to the forces of
strategic
integration and require business process reengineering (BPR)
activi-
ties, which represent the reevaluation of existing systems based
on
changing business requirements. It is important to keep in mind
the
acceleration factors of technology and to recognize the amount
of
organizational effort and time that such projects take to
complete. We
must ask the following question: How might organizations
respond to
these continual requirements to modify existing processes? I
discuss
in other chapters how ROD represents the answer to this
question.
Murphy’ s (2002) pillar of direct return is somewhat limited and
nar-
row because not all IT value can be associated with direct
returns, but
it is important to discuss. Technology acceleration is forcing
organiza-
tions to deal with broader issues surrounding what represents a
return
from an investment. The value of strategic integration relies
heavily on
the ability of technology to encapsulate itself within other
departments
where it ultimately provides the value. We show in Chapter 4
that
this issue also has significance in organizational formation.
What this
means is simply that value can be best determined within
individual
business units at the microlevel and that these appropriate-level
busi-
ness units also need to make the case for why certain
investments need
to be pursued. There are also paybacks that are indirect; for
example,
Lucas (1999) demonstrates that many technology investments
are non-
monetary. The IT department (among others) becomes
susceptible to
great scrutiny and subject to budgetary cutbacks during
economically
difficult times. This does not suggest that IT “ hide” itself but
rather
that its investment be integrated within the unit where it
provides the
most benefit. Notwithstanding the challenge to map IT
expenditures
to their related unit, there are always expenses that are central
to all
departments, such as e-mail and network infrastructure. These
types
of expenses can rarely provide direct returns and are typically
allocated
across departments as a cost of doing business.
48 INFORMATION TECHNOLOGY
Because of the increased number of technology opportuni-
ties, Murphy’ s (2002) risk pillar must be a key part of strategic
integration. The concept of risk assessment is not new to an
organiza-
tion; however, it is somewhat misunderstood as it relates to
technology
assessment. Technology assessment, because of the acceleration
factor,
must be embedded within the strategic decision-making process.
This
can only be accomplished by having an understanding of how to
align
technology opportunities for business change and by
understanding
the cost of forgoing the opportunity as well as the cost of delays
in
delivery. Many organizations use risk assessment in an
unstructured
way, which does not provide a consistent framework to
dynamically
deal with emerging technologies. Furthermore, such assessment
needs
to be managed at all levels in the organization as opposed to
being an
event-driven activity controlled only by executives.
Summary
Strategic integration represents the objective of dealing with
emerg-
ing technologies on a regular basis. It is an outcome of ROD,
and it
requires organizations to deal with a variable, that forces
acceleration
of decisions in an unpredictable fashion. Strategic integration
would
require businesses to realign the ways in which they include
technol-
ogy in strategic decision making.
Cultural Assimilation
Cultural assimilation is a process that focuses on the
organizational
aspects of how technology is internally organized, including the
role
of the IT department, and how it is assimilated within the
organiza-
tion as a whole. The inherent, contemporary reality of
technologi-
cal dynamism requires not only strategic but also cultural
change.
This reality demands that IT organizations connect to all aspects
of
the business. Such affiliation would foster a more interactive
culture
rather than one that is regimented and linear, as is too often the
case.
An interactive culture is one that can respond to emerging
technology
decisions in an optimally informed way, and one that
understands the
impact on business performance.
49teChnoloGY As A vArIAble And responsIve
The kind of cultural assimilation elicited by technological dyna-
mism and formalized in ROD is divided into two subcategories:
the
study of how the IT organization relates and communicates with
“ others,” and the actual displacement or movement of
traditional
IT staff from an isolated “ core” structure to a firm-wide,
integrated
framework.
IT Organization Communications with “ Others”
The Ravell case study shows us the limitations and
consequences of
an isolated IT department operating within an organization. The
case
study shows that the isolation of a group can lead to
marginalization,
which results in the kind of organization in which not all
individuals
can participate in decision making and implementation, even
though
such individuals have important knowledge and value.
Technological
dynamism is forcing IT departments to rethink their strategic
posi-
tion within the organizational structure of their firm. No longer
can
IT be a stand-alone unit designed just to service outside
departments
while maintaining its separate identity. The acceleration factors
of
technology require more dynamic activity within and among
depart-
ments, which cannot be accomplished through discrete
communica-
tions between groups. Instead, the need for diverse groups to
engage
in more integrated discourse, and to share varying levels of
techno-
logical knowledge, as well as business-end perspectives,
requires new
organizational structures that will of necessity give birth to a
new
and evolving business— social culture. Indeed, the need to
assimilate
technology creates a transformative effect on organizational
cultures,
the way they are formed and re-formed, and what they will need
from
IT personnel.
Movement of Traditional IT Staff
To facilitate cultural assimilation from an IT perspective, IT
must
become better integrated with non-IT personnel. This form of
inte-
gration can require the actual movement of IT staff into other
depart-
ments, which begins the process of a true assimilation of
resources
among business units. While this may seem like the elimination
of
50 INFORMATION TECHNOLOGY
the integrity or identity of IT, such a loss is far from the case.
The
elimination of the IT department is not at all what is called for
here;
on the contrary, the IT department is critical to the function of
cul-
tural assimilation. However, the IT department may need to be
struc-
tured differently from the way it has been so that it can deal
primarily
with generic infrastructure and support issues, such as e-mail,
net-
work architecture, and security. IT personnel who focus on
business-
specific issues need to become closely aligned with the
appropriate
units so that ROD can be successfully implemented.
Furthermore, we must acknowledge that, given the wide range
of
available knowledge about technology, not all technological
knowl-
edge emanates from the IT department. The question becomes
one of finding the best structure to support a broad assimilation
of
knowledge about any given technology; then, we should ask
how that
knowledge can best be utilized by the organization. There is a
pitfall
in attempting to find a “ standard” IT organizational structure
that
will address the cultural assimilation of technology. Sampler’ s
(1996)
research, and my recent research with chief executives,
confirms that
no such standard structure exists. It is my position that
organizations
must find their own unique blend, using organizational learning
con-
structs. This simply means that the cultural assimilation of IT
may
be unique to the organization. What is then more important for
the
success of organizational development is the process of
assimilation as
opposed to the transplanting of the structure itself.
Today, many departments still operate within “ silos” where
they
are unable to meet the requirements of the dynamic and
unpredictable
nature of technology in the business environment. Traditional
orga-
nizations do not often support the necessary communications
needed
to implement cultural assimilation across business units.
However,
business managers can no longer make decisions without
considering
technology; they will find themselves needing to include IT
staff in
their decision-making processes. On the other hand, IT
departments
can no longer make technology-based decisions without
concerted
efforts toward assimilation (in contrast to occasional partnering
or
project-driven participation) with other business units. This
assimi-
lation becomes mature when new cultures evolve synergistically
as
opposed to just having multiple cultures that attempt to work in
con-
junction with each other. The important lesson from Ravell to
keep
51teChnoloGY As A vArIAble And responsIve
in mind here is that the process of assimilating IT can create
new
cultures that in turn evolve to better support the requirements
estab-
lished by the dynamism of technology.
Eventually, these new cultural formations will not perceive
them-
selves as functioning within an IT or non-IT decision
framework
but rather as operating within a more central business operation
that
understands how to incorporate varying degrees of IT
involvement
as necessary. Thus, organizational cultures will need to fuse
together
to respond to new business opportunities and requirements
brought
about by the ongoing acceleration of technological innovation.
This
was also best evidenced by subsequent events at Ravell. Three
years
after the original case study, it became necessary at Ravell to
inte-
grate one of its business operations with a particular group of
IT staff
members. The IT personnel actually transferred to the business
unit
to maximize the benefits of merging both business and technical
cul-
tures. Interestingly, this business unit is currently undergoing
cultural
assimilation and is developing its own behavioral norms
influenced by
the new IT staff. However, technology decisions within such
groups
are not limited to the IT transferred personnel. IT and non-IT
staff
need to formulate decisions using various organizational
learning
techniques. These techniques are discussed in the next chapter.
Summary
Without appropriate cultural assimilation, organizations tend to
have
staff that “ take shortcuts, [then] the loudest voice will win the
day, ad
hoc decisions will be made, accountabilities lost, and lessons
from suc-
cesses and failures will not become part of ... wisdom”
(Murphy, 2002,
p. 152). As in the case of Ravell Corporation, it is essential,
then, to
provide for consistent governance that fits the profile of the
existing cul-
ture or can establish the need for a new culture. While many
scholars
and managers suggest the need to have a specific entity
responsible for
IT governance, one that is to be placed within the operating
structure
of the organization, such an approach creates a fundamental
problem.
It does not allow staff and managers the opportunity to
assimilate tech-
nologically driven change and understand how to design a
culture that
can operate under ROD. In other words, the issue of governance
is
misinterpreted as a problem of structural positioning or
hierarchy when
52 INFORMATION TECHNOLOGY
it is really one of cultural assimilation. As a result, many
business solu-
tions to technology issues often lean toward the prescriptive,
instead of
the analytical, in addressing the real problem.
Murphy’ s (2002) risk pillar theory offers us another important
component relevant to cultural assimilation. This approach
addresses
the concerns that relate to the creation of risk cultures formed
to deal
with the impact of new systems. New technologies can actually
cause
changes in cultural assimilation by establishing the need to
make cer-
tain changes in job descriptions, power structures, career
prospects,
degree of job security, departmental influence, or ownership of
data.
Each of these potential risks needs to be factored in as an
important
part of considering how best to organize and assimilate
technology
through ROD.
Technology Business Cycle
To better understand technology dynamism, or how technology
acts as
a dynamic variable, it is necessary to define the specific steps
that occur
during its evolution in an organization. The evolution or
business cycle
depicts the sequential steps during the maturation of a new
technology
from feasibility to implementation and through subsequent
evolution.
Table 3.1 shows the five components that comprise the cycle:
feasibil-
ity, measurement, planning, implementation, and evolution.
Table 3.1 Technology Business Cycle
CYCLE COMPONENT COMPONENT DESCRIPTION
Feasibility Understanding how to view and evaluate emerging
technologies, from a
technical and business perspective.
Measurement Dealing with both the direct monetary returns and
indirect nonmonetary
returns; establishing driver and support life cycles.
Planning Understanding how to set up projects, establishing
participation across
multiple layers of management, including operations and
departments.
Implementation Working with the realities of project
management; operating with political
factions, constraints; meeting milestones; dealing with
setbacks; having
the ability to go live with new systems.
Evolution Understanding how acceptance of new technologies
affects cultural
change, and how uses of technology will change as individuals
and
organizations become more knowledgeable about technology,
and
generate new ideas about how it can be used; objective is
established
through organizational dynamism, creating new knowledge and
an
evolving organization.
53teChnoloGY As A vArIAble And responsIve
Feasibility
The stage of feasibility focuses on a number of issues
surrounding
the practicality of implementing a specific technology.
Feasibility
addresses the ability to deliver a product when it is needed in
com-
parison to the time it takes to develop it. Risk also plays a role
in
feasibility assessment; of specific concern is the question of
whether
it is possible or probable that the product will become obsolete
before
completion. Cost is certainly a huge factor, but viewed at a “
high
level” (i.e., at a general cost range), and it is usually geared
toward
meeting the expected ROI of a firm. The feasibility process
must be
one that incorporates individuals in a way that allows them to
respond
to the accelerated and dynamic process brought forth by
technological
innovations.
Measurement
Measurement is the process of understanding how an investment
in
technology is calculated, particularly in relation to the ROI of
an
organization. The complication with technology and
measurement
is that it is simply not that easy to determine how to calculate
such
a return. This problem comes up in many of the issues discussed
by
Lucas (1999) in his book Information Technology and the
Productivity
Paradox. His work addresses many comprehensive issues,
surround-
ing both monetary and nonmonetary ROI, as well as direct ver-
sus indirect allocation of IT costs. Aside from these issues,
there
is the fact that for many investments in technology the attempt
to
compute ROI may be an inappropriate approach. As stated,
Lucas
offered a “ garbage can” model that advocates trust in the
operational
management of the business and the formation of IT
representatives
into productive teams that can assess new technologies as a
regu-
lar part of business operations. The garbage can is an abstract
con-
cept for allowing individuals a place to suggest innovations
brought
about by technology. The inventory of technology opportunities
needs regular evaluation. Lucas does not really offer an
explana-
tion of exactly how this process should work internally. ROD,
how-
ever, provides the strategic processes and organizational–
cultural
needs that can provide the infrastructure to better understand
and
54 INFORMATION TECHNOLOGY
evaluate the potential benefits from technological innovations
using
the garbage can model. The graphic depiction of the model is
shown
in Figure 3.2.
Planning
Planning requires a defined team of user and IT representatives.
This
appears to be a simple task, but it is more challenging to
understand
how such teams should operate, from whom they need support,
and
what resources they require. Let me be specific. …
Chapter 3: Software
Learning Objectives
Upon successful completion of this chapter, you will be
able to:
• define the term software;
• identify and describe the two primary categories of
software;
• describe the role ERP software plays in an
organization;
• describe cloud computing and its advantages and
disadvantages for use in an organization; and
• define the term open-source and identify its
primary characteristics.
Introduction
The second component of an information system is software, the
set of instructions that tells the hardware what to do. Software
is created by developers through the process of programming
(covered in more detail in Chapter 10). Without software, the
hardware would not be functional.
54 | Chapter 3: Software
Types of Software
Software can be broadly divided into two categories: operating
systems and application software. Operating systems manage
the
hardware and create the interface between the hardware and the
user. Application software performs specific tasks such as word
processing, accounting, database management, video games, or
browsing the web.
Operating Systems
An operating system is first loaded into the computer by the
boot program, then it manages all of the programs in the
computer,
including both programs native to the operating system such as
file and memory management and application software.
Operating
systems provide you with these key functions:
1. managing the hardware resources of the computer;
2. providing the user-interface components;
Chapter 3: Software | 55
Linux Ubuntu desktop
3. providing a platform for software developers to write
applications.
All computing devices require an operating system. The most
popular operating systems for personal computers are:
Microsoft
Windows, Apple’s Mac OS, and various versions of Linux.
Smartphones and tablets run operating systems as well, such as
iOS (Apple), Android (Google), Windows Mobile (Microsoft),
and
Blackberry.
Microsoft provided the first operating system for the IBM-PC,
released in 1981. Their initial venture into a Graphical User
Interface
(GUI) operating system, known as Windows, occurred in 1985.
Today’s Windows 10 supports the 64-bit Intel CPU. Recall that
“64-bit” indicates the size of data that can be moved within the
computer.
Apple introduced the Macintosh computer 1984 with the first
commercially successful GUI. Apple’s operating system for the
Macintosh is known as “Mac OS ” and also uses an Intel CPU
supporting 64-bit processing. Mac OS versions have been
named
after mountains such as El Capitan, Sierra, and High Sierra.
Multitasking, virtual memory, and voice input have become
standard features of both operating systems.
The Linux operating system
is open source, meaning
individual developers are
allowed to make modifications
to the programming code.
Linux is a version of the Unix
operating. Unix runs on large
and expensive minicomputers.
Linux developer Linus Torvalds,
a professor in Finland and the creator of Linux, wanted to find a
way
to make Unix run on less expensive personal computers. Linux
has
many variations and now powers a large percentage of web
servers
in the world.
56 | Information Systems for Business and Beyond (2019)
Sidebar: Why Is Microsoft Software So
Dominant in the Business World?
If you’ve worked in business, you may have noticed that almost
all computers in business run a version of Microsoft Windows.
However, in classrooms from elementary to college, there is
almost
a balance between Macs and PCs. Why has this not extended
into
the business world?
As discussed in Chapter 1, many businesses used IBM
mainframe
computers back in the 1960s and 1970s. When businesses
migrated
to the microcomputer (personal computer) market, they elected
to
stay with IBM and chose the PC. Companies took the safe route,
invested in the Microsoft operating system and in Microsoft
software/applications.
Microsoft soon found itself with the dominant personal
computer
operating system for businesses. As the networked PC began to
replace the mainframe computer, Microsoft developed a network
operating system along with a complete suite of programs
focused
on business users. Today Microsoft Office in its various forms
controls 85% of the market.
1
Application Software
The second major category of software is application software.
1. [1]
Chapter 3: Software | 57
Image of Microsoft Excel
Application software is utilized directly today to accomplish a
specific goal such as word processing, calculations on a
spreadsheet, or surfing the Internet using your favorite browser.
The “Killer” App
When a new type of digital
device is invented, there are
generally a small group of
technology enthusiasts who
will purchase it just for the joy
of figuring out how it works. A
“killer” application is one that
becomes so essential that large
numbers of people will buy a
device just to run that application. For the personal computer,
the
killer application was the spreadsheet.
The first spreadsheet was created by an MBA student at Harvard
University who tired of making repeated calculations to
determine
the optimal result on a problem and decided to create a tool that
allowed the user to easily change values and recalculate
formulas.
The result was the spreadsheet. Today’s dominant spreadsheet is
Microsoft Excel which still retains the basic functionality of the
first
spreadsheet.
Productivity Software
Along with the spreadsheet, several other software applications
have become standard tools for the workplace. Known as
productivity software, these programs allow office employees to
complete their daily work efficiently. Many times these
applications
58 | Information Systems for Business and Beyond (2019)
come packaged together, such as in Microsoft’s Office suite.
Here is
a list of some of these applications and their basic functions:
• Word processing Users can create and edit documents using
this class of software. Functions include the ability to type and
edit text, format fonts and paragraphs, as well as add, move,
and delete text throughout the document. Tables and images
can be inserted. Documents can be saved in a variety of
electronic file formats with Microsoft Word’s DOCX being the
most popular. Documents can also be converted to other
formats such as Adobe’s PDF (Portable Document Format) or a
.TXT file.
• Spreadsheet This class of software provides a way to do
numeric calculations and analysis, displaying the result in
charts and graphs. The working area is divided into rows and
columns, where users can enter numbers, text, or formulas. It
is the formulas that make a spreadsheet powerful, allowing the
user to develop complex calculations that can change based on
the numbers entered. The most popular spreadsheet package
is Microsoft Excel, which saves its files in the XLSX format.
• Presentation Users can create slideshow presentations using
this class of software. The slides can be projected, printed, or
distributed to interested parties. Text, images, audio, and
visual can all be added to the slides. Microsoft’s PowerPoint is
the most popular software right now, saving its files in PPTX
format.
• Some office suites include other types of software. For
example, Microsoft Office includes Outlook, its e-mail
package, and OneNote, an information-gathering collaboration
tool. The professional version of Office also includes Microsoft
Access, a database package. (Databases are covered more in
Chapter 4.)
Microsoft popularized the idea of the office-software
productivity
Chapter 3: Software | 59
bundle with their release of the Microsoft Office Suite. This
package
continues to dominate the market and most businesses expect
employees to know how to use this software. However, many
competitors to Microsoft Office do exist and are compatible
with
the file formats used by Microsoft (see table below). Microsoft
also
offers a cloud-based version of their office suite named
Microsoft
Office 365. Similar to Google Drive, this suite allows users to
edit
and share documents online utilizing cloud-computing
technology.
Utility Software and Programming Software
Utility software includes programs that allow you to fix or
modify
your computer in some way. Examples include anti-malware
software and programs that totally remove software you no
longer
want installed. These types of software packages were created
to
fill shortcomings in operating systems. Many times a
subsequent
release of an operating system will include these utility
functions as
part of the operating system itself.
Programming software’s purpose is to produce software. Most
of
60 | Information Systems for Business and Beyond (2019)
https://commons.wikimedia.org/wiki/User:Wgsimon
Screen shot of Tableau (click to
enlarge)
these programs provide developers with an environment in
which
they can write the code, test it, and convert/compile it into the
format that can then be run on a computer. This software is
typically
identified as the Integrated Development Environment (IDE)
and is
provided free from the corporation that developed the
programming language that will be used to write the code.
Sidebar: “PowerPointed” to Death
As presentation software has
gained acceptance as the
primary method to formally
present information to a group
or class, the art of giving an
engaging presentation is
becoming rare. Many
presenters now just read the
bullet points in the
presentation and immediately bore those in attendance, who can
already read it for themselves. The real problem is not with
PowerPoint as much as it is with the person creating and
presenting.
Author and chief evangelist Guy Kawasaki has developed the
10/20/
30 rule for Powerpoint users. Just remember: 10 slides, 20
minutes,
30 point font.”
2
If you are determined to improve your PowerPoint
skills, read Presentation Zen by Garr Reynolds.
New digital presentation technologies are being developed that
go beyond Powerpoint. For example, Prezi uses a single canvas
for
the presentation, allowing presenters to place text, images, and
2. [2]
Chapter 3: Software | 61
https://opentextbook.site/informationsystems2019/wp-
content/uploads/sites/3/2018/07/TABLUE.png
https://opentextbook.site/informationsystems2019/wp-
content/uploads/sites/3/2018/07/TABLUE.png
http://www.amazon.com/gp/product/0321811984
other media on the canvas, and then navigate between these
objects
as they present. Tools such as Tableau allow users to analyze
data in
depth and create engaging interactive visualizations.
Sidebar: I Own This Software, Right?
Well…
When you purchase software and install it on your computer,
are
you the owner of that software? Technically, you are not! When
you
install software, you are actually just being given a license to
use it.
When you first install a package, you are asked to agree to the
terms
of service or the license agreement. In that agreement, you will
find
that your rights to use the software are limited. For example, in
the terms of the Microsoft Office software license, you will find
the following statement: “This software is licensed, not sold.
This
agreement only gives you some rights to use the features
included
in the software edition you licensed.”
For the most part, these restrictions are what you would expect.
You cannot make illegal copies of the software and you may not
use
it to do anything illegal. However, there are other, more
unexpected
terms in these software agreements. For example, many
software
agreements ask you to agree to a limit on liability. Again, from
Microsoft: “Limitation on and exclusion of damages. You can
recover from Microsoft and its suppliers only direct damages up
to
the amount you paid for the software. You cannot recover any
other
damages, including consequential, lost profits, special, indirect
or
incidental damages.” This means if a problem with the software
causes harm to your business, you cannot hold Microsoft or the
supplier responsible for damages.
62 | Information Systems for Business and Beyond (2019)
Applications for the Enterprise
As the personal computer proliferated inside organizations,
control
over the information generated by the organization began
splintering. For instance, the customer service department
creates
a customer database to keep track of calls and problem reports,
and the sales department also creates a database to keep track of
customer information. Which one should be used as the master
list of customers? Or perhaps someone in sales might create a
spreadsheet to calculate sales revenue, while someone in
finance
creates a different revenue document that meets the needs of
their
department, but calculates revenue differently. The two
spreadsheets will report different revenue totals. Which one is
correct? And who is managing all of this information?
Enterprise Resource Planning
In the 1990s
the need to bring an organization’s information back under
centralized control became more apparent. The Enterprise
Resource Planning (ERP) system (sometimes just called
enterprise
software) was developed to bring together an entire
organization
within one program. ERP software utilizes a central database
that
is implemented throughout the entire organization. Here are
some
key points about ERP.
• A software application. ERP is an application that is used by
Chapter 3: Software | 63
many of an organization’s employees.
• Utilizes a central database. All users of the ERP edit and save
their information from the same data source. For example, this
means there is only one customer table in the database, there
is only one sales (revenue) table in the database, etc.
• Implemented organization-wide. ERP systems include
functionality that covers all of the essential components of a
business. An organization can purchase modules for its ERP
system that match specific needs such as order entry,
manufacturing, or planning.
ERP systems were originally marketed to large corporations.
However, as more and more large companies began installing
them,
ERP vendors began targeting mid-sized and even smaller
businesses. Some of the more well-known ERP systems include
those from SAP, Oracle, and Microsoft.
In order to effectively implement an ERP system in an
organization, the organization must be ready to make a full
commitment. All aspects of the organization are affected as old
systems are replaced by the ERP system. In general,
implementing
an ERP system can take two to three years and cost several
million
dollars.
So why implement an ERP system? If done properly, an ERP
system can bring an organization a good return on their
investment.
By consolidating information systems across the enterprise and
using the software to enforce best practices, most organizations
see an overall improvement after implementing an ERP.
Business
processes as a form of competitive advantage will be covered in
Chapter 9.
64 | Information Systems for Business and Beyond (2019)
Customer Relationship Management
A Customer Relationship Management (CRM) system manages
an
organization’s customers. In today’s environment, it is
important to
develop relationships with your customers, and the use of a
well-
designed CRM can allow a business to personalize its
relationship
with each of its customers. Some ERP software systems include
CRM modules. An example of a well-known CRM package is
Salesforce.
Supply Chain Management
Supply Chain
Many organizations must deal with the complex task of
managing
their supply chains. At its simplest, a supply chain is the
linkage
between an organization’s suppliers, its manufacturing
facilities,
and the distributors of its products. Each link in the chain has a
multiplying effect on the complexity of the process. For
example,
if there are two suppliers, one manufacturing facility, and two
distributors, then the number of links to manage = 4 ( 2 x 1 x
2 ). However, if two more suppliers are added, plus another
manufacturing facility, and two more distributors, then the
number
of links to manage = 32 ( 4 x 2 x 4 ). Also, notice in the above
illustration that all arrows have two heads, indicating that
information flows in both directions. Suppliers are part of a
business’s supply chain. They provide information such as
price,
size, quantity, etc. to the business. In turn, the business
provides
information such as quantity on hand at every store to the
supplier.
The key to successful supply chain management is the
information
system.
Chapter 3: Software | 65
https://commons.wikimedia.org/wiki/Category:Supply_chain#/m
edia/File:A_company%27s_supply_chain_(en).png
A Supply Chain Management (SCM) system handles the
interconnection between these links as well as the inventory of
the products in their various stages of development. As
discussed
previously much of Walmart’s success has come from its ability
to identify and control the supply chain for its products.
Walmart
invested heavily in their information system so they could
communicate with their suppliers and manage the thousands of
products they sell.
Walmart realized in the 1980s that the key to their success was
information systems. Specifically, they needed to manage their
complex supply chain with its thousands of suppliers, thousands
of retail outlets, and millions of customers. Their success came
from being able to integrate information systems to every entity
(suppliers, warehouses, retail stores) through the sharing of
sales
and inventory data. Take a moment to study the diagram
above…look for the double-headed arrow. Notice that data
flows
down the supply chain from suppliers to retail stores. But it also
flows up the supply chain, back to the suppliers so they can be
up to
date regarding production and shipping.
Mobile Applications
Just as with the personal computer, mobile devices such as
66 | Information Systems for Business and Beyond (2019)
smartphones and electronic tablets also have operating systems
and
application software. These mobile devices are in many ways
just
smaller versions of personal computers. A mobile app is a
software
application designed to run specifically on a mobile device.
As shown in Chapter 2, smartphones are becoming a dominant
form of computing, with more smartphones being sold than
personal computers. A greater discussion of PC and smartphone
sales appears in Chapter 13, along with statistics regarding the
decline in tablet sales. Businesses have adjusted to this trend by
increasing their investment in the development of apps for
mobile
devices. The number of mobile apps in the Apple App Store has
increased from zero in 2008 to over 2 million in 2017.
3
Building a mobile app will will be covered in Chapter 10.
Cloud Computing
Historically, for software to run on a computer an individual
copy
of the software had to be installed on the computer. The concept
of
“cloud” computing changes this.
Cloud Computing
The “cloud” refers to applications, services, and data storage
located on the Internet. Cloud service providers rely on giant
server
farms and massive storage devices that are connected via the
Internet. Cloud computing allows users to access software and
data
storage services on the Internet.
You probably already use cloud computing in some form. For
example, if you access your e-mail via your web browser, you
are
3. [3]
Chapter 3: Software | 67
using a form of cloud computing if you are using Google
Drive’s
applications. While these are free versions of cloud computing,
there is big business in providing applications and data storage
over
the web. Cloud computing is not limited to web applications. It
can
also be used for services such as audio or video streaming.
Advantages of Cloud Computing
• No software to install or upgrades to maintain.
• Available from any computer that has access to the Internet.
• Can scale to a large number of users easily.
• New applications can be up and running very quickly.
• Services can be leased for a limited time on an as-needed
basis.
• Your information is not lost if your hard disk crashes or your
laptop is lost or stolen.
• You are not limited by the available memory or disk space on
your computer.
Disadvantages of Cloud Computing
• Your information is stored on someone else’s computer.
• You must have Internet access to use it.
• You are relying on a third-party to provide these services.
Cloud computing has the ability to really impact how
organizations manage technology. For example, why is an IT
department needed to purchase, configure, and manage personal
computers and software when all that is really needed is an
Internet
connection?
68 | Information Systems for Business and Beyond (2019)
Using a Private Cloud
Many organizations are understandably nervous about giving up
control of their data and some of their applications by using
cloud
computing. But they also see the value in reducing the need for
installing software and adding disk storage to local computers.
A
solution to this problem lies in the concept of a private cloud.
While
there are various models of a private cloud, the basic idea is for
the cloud service provider to section off web server space for a
specific organization. The organization has full control over
that
server space while still gaining some of the benefits of cloud
computing.
Virtualization
Virtualization is the process of using software to simulate a
computer or some other device. For example, using
virtualization
a single physical computer can perform the functions of several
virtual computers, usually referred to as Virtual Machines
(VMs).
Organizations implement virtual machines in an effort to reduce
the number of physical servers needed to provide the necessary
services to users. This reduction in the number of physical
servers
also reduces the demand for electricity to run and cool the
physical
servers. For more detail on how virtualization works, see this
informational page from VMWare.
Chapter 3: Software | 69
http://www.vmware.com/virtualization/virtualization-
basics/how-virtualization-works.html
http://www.vmware.com/virtualization/virtualization-
basics/how-virtualization-works.html
Example program “Hello World”
written in Java
Software Creation
Modern software applications
are written using a
programming language such as
Java, Visual C, C++, Python, etc.
A programming language
consists of a set of commands
and syntax that can be
organized logically to execute
specific functions. Using this language a programmer writes a
program (known as source code) that can then be compiled into
machine-readable form, the ones and zeroes necessary to be
executed by the CPU. Languages such as HTML and Javascript
are
used to develop web pages.
Open-Source Software
When the personal computer was first released, computer
enthusiasts banded together to build applications and solve
problems. These computer enthusiasts were motivated to share
any
programs they built and solutions to problems they found. This
collaboration enabled them to more quickly innovate and fix
problems.
As software began to become a business, however, this idea of
sharing everything fell out of favor with many developers.
When a
program takes hundreds of hours to develop, it is
understandable
that the programmers do not want to just give it away. This led
to a
new business model of restrictive software licensing which
required
payment for software, a model that is still dominant today. This
model is sometimes referred to as closed source, as the source
code
is not made available to others.
70 | Information Systems for Business and Beyond (2019)
There are many, however, who feel that software should not be
restricted. Just as with those early hobbyists in the 1970s, they
feel
that innovation and progress can be made much more rapidly if
they share what has been learned. In the 1990s, with Internet
access
connecting more people together, the open-source movement
gained steam.
Open Office Suite
Open-source software makes the source code available for
anyone to copy and use. For most people having access to the
source code of a program does little good since it is challenging
to
modify existing programming code. However, open-source
software
is also available in a compiled format that can be downloaded
and
installed. The open-source movement has led to the
development
of some of the most used software in the world such as the
Firefox
browser, the Linux operating system, and the Apache web
server.
Many businesses are wary of open-source software precisely
because the code is available for anyone to see. They feel that
this
increases the risk of an attack. Others counter that this openness
actually decreases the risk because the code is exposed to
thousands of programmers who can incorporate code changes to
quickly patch vulnerabilities.
There are thousands of open-source applications available for
download. For example, you can get the productivity suite from
Chapter 3: Software | 71
Open Office. One good place to search for open-source software
is
sourceforge.net, where thousands of programs are available for
free
download.
Summary
Software gives the instructions that tell the hardware what to
do.
There are two basic categories of software: operating systems
and
applications. Operating systems interface with the computer
hardware and make system resources available. Application
software allows users to accomplish specific tasks such as word
processing, presentations, or databases. This group is also
referred
to as productivity software. An ERP system stores all data in a
centralized database that is made accessible to all programs and
departments across the organization. Cloud computing provides
access to software and databases from the Internet via a web
browser. Developers use various programming languages to
develop
software.
Study Questions
1. Develop your own definition of software being certain to
explain the key terms.
2. What are the primary functions of an operating system?
3. Which of the following are operating systems and which are
applications: Microsoft Excel, Google Chrome, iTunes,
Windows, Android, Angry Birds.
4. What is your favorite software application? What tasks does
it
help you accomplish?
72 | Information Systems for Business and Beyond (2019)
http://sourceforge.net/
5. How would you categorize the software that runs on mobile
devices? Break down these apps into at least three basic
categories and give an example of each.
6. What does an ERP system do?
7. What is open-source software? How does it differ from
closed-
source software? Give an example of each.
8. What does a software license grant to the purchaser of the
software?
Exercises
1. Find a case study online about the implementation of an ERP
system. Was it successful? How long did it take? Does the case
study tell you how much money the organization spent?
2. If you were running a small business with limited funds for
information technology, would you consider using cloud
computing? Find some web-based resources that support your
decision.
3. Go to sourceforge.net and review their most downloaded
software applications. Report on the variety of applications you
find. Then pick one that interests you and report back on what
it does, the kind of technical support offered, and the user
reviews.
4. Review this article on the security risks of open-source
software. Write a short analysis giving your opinion on the
different risks discussed.
5. List three examples of programming languages? What
features
in each language makes it useful to developers?
Chapter 3: Software | 73
http://sourceforge.net/
http://www.zdnet.com/six-open-source-security-myths-
debunked-and-eight-real-challenges-to-consider-7000014225
Lab
1. Download Apache Open Office and create a document. Note:
If
your computer does not have Java Runtime Environment (JRE)
32-bit (x86) installed, you will need to download it first from
this site.Open Office runs only in 32-bit (x86) mode. Here is a
link to the Getting Started documentation for Open Office.
How does it compare to Microsoft Office? Does the fact that
you got it for free make it feel less valuable?
1. Statista. (2017). Microsoft – Statistics & Facts. Retrieved
from
https://www.statista.com/topics/823/microsoft/
2. Kawasaki, G. (n.d.). The 10/20/30 Rules for PowerPoint.
Retrieved from https://guykawasaki.com/the_102030_rule/.↵
3. Statista. (2018). Number of apps in Apple App Store July
2008 to
January 2017. Retrieved from …
Assignment 1
Textbook:Information Systems for Business and Beyond
Please answer the following
From Chapter 3 – Answer Study questions 1-8 and Exercise 2
From Chapter 2 – Answer Study questions 1-13 and Exercise 5
All the above questions should be submitted in one Word
document
Please understand that Plagiarism will not be tolerated and will
result in a zero grade.
Submission Requirements
Font: Times New Roman, size 12, double-space
Citation Style: APA
Length: At least six Pages
References: Please use citations and references where
appropriate
No Plagiarism
Assignment 2
Textbook:Information Technology and Organizational Learning
Please answer the Following
From Chapter 3 – Complete the two essay assignments noted
below:
1. Review the strategic integration section. Note what strategic
integration is and how it ties to the implementation of
technology within an organization.
2. Review the information technology roles and responsibilities
section. Note how IT is divided based on operations and why
this is important to understand within an organization.
Submission Requirements
Font: Times New Roman, size 12, double-space
Length: At least two Pages
Citation Style: APA
References: Please use citations and references where
appropriate
No Plagiarism
The above submission should adhere to APA formatting
standards. Remember the page length does not include the APA
cover page or any references. Please understand that Plagiarism
will not be tolerated and will result in a zero grade.
413TeChnology as a vaRiable anD Responsive oRganiz.docx

Mais conteúdo relacionado

Semelhante a 413TeChnology as a vaRiable anD Responsive oRganiz.docx

CHAPTER-1 Discussion 11) DiscussionCOLLAPSEIT value Infor.docx
CHAPTER-1 Discussion 11) DiscussionCOLLAPSEIT value Infor.docxCHAPTER-1 Discussion 11) DiscussionCOLLAPSEIT value Infor.docx
CHAPTER-1 Discussion 11) DiscussionCOLLAPSEIT value Infor.docxmccormicknadine86
 
In Chapter 8.4 of the text, the author lays out several action items.docx
In Chapter 8.4 of the text, the author lays out several action items.docxIn Chapter 8.4 of the text, the author lays out several action items.docx
In Chapter 8.4 of the text, the author lays out several action items.docxrochellscroop
 
Ch 7 and ch 8 tech mgt and tech and culture
Ch 7 and ch 8 tech mgt and tech and cultureCh 7 and ch 8 tech mgt and tech and culture
Ch 7 and ch 8 tech mgt and tech and cultureCharan Singh
 
Research Paper on Project Management and IT Governance
Research Paper on Project Management and IT GovernanceResearch Paper on Project Management and IT Governance
Research Paper on Project Management and IT Governanceguest7db01d
 
Research Paper on "Project Management and IT Governance"
Research Paper on "Project Management and IT Governance"Research Paper on "Project Management and IT Governance"
Research Paper on "Project Management and IT Governance"guest1c7740
 
305C h a p t e r19 Technology Roadmap Benefits, Eleme.docx
305C h a p t e r19 Technology Roadmap Benefits, Eleme.docx305C h a p t e r19 Technology Roadmap Benefits, Eleme.docx
305C h a p t e r19 Technology Roadmap Benefits, Eleme.docxdomenicacullison
 
305C h a p t e r19 Technology Roadmap Benefits, Eleme.docx
305C h a p t e r19 Technology Roadmap Benefits, Eleme.docx305C h a p t e r19 Technology Roadmap Benefits, Eleme.docx
305C h a p t e r19 Technology Roadmap Benefits, Eleme.docxlorainedeserre
 
The Organic IT Department: Strategic Cost Analysis to Unlock a Sustainable Co...
The Organic IT Department: Strategic Cost Analysis to Unlock a Sustainable Co...The Organic IT Department: Strategic Cost Analysis to Unlock a Sustainable Co...
The Organic IT Department: Strategic Cost Analysis to Unlock a Sustainable Co...Juan Carbonell
 
AUDIT EXERCISEWhen trying to determine the ability of the organi.docx
AUDIT EXERCISEWhen trying to determine the ability of the organi.docxAUDIT EXERCISEWhen trying to determine the ability of the organi.docx
AUDIT EXERCISEWhen trying to determine the ability of the organi.docxikirkton
 
Pm And It Governance
Pm And It GovernancePm And It Governance
Pm And It Governancesundong
 
CHANGE MANAGEMENT: IMPLEMENTATION AND BENEFITS OF THE CHANGE CONTROL IN THE I...
CHANGE MANAGEMENT: IMPLEMENTATION AND BENEFITS OF THE CHANGE CONTROL IN THE I...CHANGE MANAGEMENT: IMPLEMENTATION AND BENEFITS OF THE CHANGE CONTROL IN THE I...
CHANGE MANAGEMENT: IMPLEMENTATION AND BENEFITS OF THE CHANGE CONTROL IN THE I...ijait
 
Planned Organizational Change Consequent to Advanced Manufacturing Technology...
Planned Organizational Change Consequent to Advanced Manufacturing Technology...Planned Organizational Change Consequent to Advanced Manufacturing Technology...
Planned Organizational Change Consequent to Advanced Manufacturing Technology...paperpublications3
 
The Relationships Between IT Flexibility, IT-Business Strategic Alignment and...
The Relationships Between IT Flexibility, IT-Business Strategic Alignment and...The Relationships Between IT Flexibility, IT-Business Strategic Alignment and...
The Relationships Between IT Flexibility, IT-Business Strategic Alignment and...IJMIT JOURNAL
 
Business process reengineering module 2
Business process reengineering module 2Business process reengineering module 2
Business process reengineering module 2POOJA UDAYAN
 
Enterprise Architecture – A Tool for Business Innovation Realization in the E...
Enterprise Architecture – A Tool for Business Innovation Realization in the E...Enterprise Architecture – A Tool for Business Innovation Realization in the E...
Enterprise Architecture – A Tool for Business Innovation Realization in the E...theijes
 
EA_More_Than_Just_Standards
EA_More_Than_Just_StandardsEA_More_Than_Just_Standards
EA_More_Than_Just_StandardsDavid Rudawitz
 
Succeeding with Transformational Initiatives: Practical Approaches for Managi...
Succeeding with Transformational Initiatives: Practical Approaches for Managi...Succeeding with Transformational Initiatives: Practical Approaches for Managi...
Succeeding with Transformational Initiatives: Practical Approaches for Managi...Arab Federation for Digital Economy
 

Semelhante a 413TeChnology as a vaRiable anD Responsive oRganiz.docx (20)

CHAPTER-1 Discussion 11) DiscussionCOLLAPSEIT value Infor.docx
CHAPTER-1 Discussion 11) DiscussionCOLLAPSEIT value Infor.docxCHAPTER-1 Discussion 11) DiscussionCOLLAPSEIT value Infor.docx
CHAPTER-1 Discussion 11) DiscussionCOLLAPSEIT value Infor.docx
 
In Chapter 8.4 of the text, the author lays out several action items.docx
In Chapter 8.4 of the text, the author lays out several action items.docxIn Chapter 8.4 of the text, the author lays out several action items.docx
In Chapter 8.4 of the text, the author lays out several action items.docx
 
Ch 7 and ch 8 tech mgt and tech and culture
Ch 7 and ch 8 tech mgt and tech and cultureCh 7 and ch 8 tech mgt and tech and culture
Ch 7 and ch 8 tech mgt and tech and culture
 
Porter1985
Porter1985Porter1985
Porter1985
 
Research Paper on Project Management and IT Governance
Research Paper on Project Management and IT GovernanceResearch Paper on Project Management and IT Governance
Research Paper on Project Management and IT Governance
 
Research Paper on "Project Management and IT Governance"
Research Paper on "Project Management and IT Governance"Research Paper on "Project Management and IT Governance"
Research Paper on "Project Management and IT Governance"
 
305C h a p t e r19 Technology Roadmap Benefits, Eleme.docx
305C h a p t e r19 Technology Roadmap Benefits, Eleme.docx305C h a p t e r19 Technology Roadmap Benefits, Eleme.docx
305C h a p t e r19 Technology Roadmap Benefits, Eleme.docx
 
305C h a p t e r19 Technology Roadmap Benefits, Eleme.docx
305C h a p t e r19 Technology Roadmap Benefits, Eleme.docx305C h a p t e r19 Technology Roadmap Benefits, Eleme.docx
305C h a p t e r19 Technology Roadmap Benefits, Eleme.docx
 
The Organic IT Department: Strategic Cost Analysis to Unlock a Sustainable Co...
The Organic IT Department: Strategic Cost Analysis to Unlock a Sustainable Co...The Organic IT Department: Strategic Cost Analysis to Unlock a Sustainable Co...
The Organic IT Department: Strategic Cost Analysis to Unlock a Sustainable Co...
 
AUDIT EXERCISEWhen trying to determine the ability of the organi.docx
AUDIT EXERCISEWhen trying to determine the ability of the organi.docxAUDIT EXERCISEWhen trying to determine the ability of the organi.docx
AUDIT EXERCISEWhen trying to determine the ability of the organi.docx
 
Pm And It Governance
Pm And It GovernancePm And It Governance
Pm And It Governance
 
CHANGE MANAGEMENT: IMPLEMENTATION AND BENEFITS OF THE CHANGE CONTROL IN THE I...
CHANGE MANAGEMENT: IMPLEMENTATION AND BENEFITS OF THE CHANGE CONTROL IN THE I...CHANGE MANAGEMENT: IMPLEMENTATION AND BENEFITS OF THE CHANGE CONTROL IN THE I...
CHANGE MANAGEMENT: IMPLEMENTATION AND BENEFITS OF THE CHANGE CONTROL IN THE I...
 
Planned Organizational Change Consequent to Advanced Manufacturing Technology...
Planned Organizational Change Consequent to Advanced Manufacturing Technology...Planned Organizational Change Consequent to Advanced Manufacturing Technology...
Planned Organizational Change Consequent to Advanced Manufacturing Technology...
 
Role of IT
Role of ITRole of IT
Role of IT
 
The Relationships Between IT Flexibility, IT-Business Strategic Alignment and...
The Relationships Between IT Flexibility, IT-Business Strategic Alignment and...The Relationships Between IT Flexibility, IT-Business Strategic Alignment and...
The Relationships Between IT Flexibility, IT-Business Strategic Alignment and...
 
Business process reengineering module 2
Business process reengineering module 2Business process reengineering module 2
Business process reengineering module 2
 
Togaf notes
Togaf notesTogaf notes
Togaf notes
 
Enterprise Architecture – A Tool for Business Innovation Realization in the E...
Enterprise Architecture – A Tool for Business Innovation Realization in the E...Enterprise Architecture – A Tool for Business Innovation Realization in the E...
Enterprise Architecture – A Tool for Business Innovation Realization in the E...
 
EA_More_Than_Just_Standards
EA_More_Than_Just_StandardsEA_More_Than_Just_Standards
EA_More_Than_Just_Standards
 
Succeeding with Transformational Initiatives: Practical Approaches for Managi...
Succeeding with Transformational Initiatives: Practical Approaches for Managi...Succeeding with Transformational Initiatives: Practical Approaches for Managi...
Succeeding with Transformational Initiatives: Practical Approaches for Managi...
 

Mais de taishao1

9.1 Give examples of applications of IPsec.9.2 What servic.docx
9.1 Give examples of applications of IPsec.9.2 What servic.docx9.1 Give examples of applications of IPsec.9.2 What servic.docx
9.1 Give examples of applications of IPsec.9.2 What servic.docxtaishao1
 
a brief description of two roles that a forensic psychology professi.docx
a brief description of two roles that a forensic psychology professi.docxa brief description of two roles that a forensic psychology professi.docx
a brief description of two roles that a forensic psychology professi.docxtaishao1
 
A 65-year-old obese African American male patient presents to hi.docx
A 65-year-old obese African American male patient presents to hi.docxA 65-year-old obese African American male patient presents to hi.docx
A 65-year-old obese African American male patient presents to hi.docxtaishao1
 
A case study assessing risk and proposing security for some chosen o.docx
A case study assessing risk and proposing security for some chosen o.docxA case study assessing risk and proposing security for some chosen o.docx
A case study assessing risk and proposing security for some chosen o.docxtaishao1
 
A 3-4-page single-spaced essay that draws on materials posted in m.docx
A 3-4-page single-spaced essay that draws on materials posted in m.docxA 3-4-page single-spaced essay that draws on materials posted in m.docx
A 3-4-page single-spaced essay that draws on materials posted in m.docxtaishao1
 
a 350+ word summary based on Malinowski’s writings that answers the .docx
a 350+ word summary based on Malinowski’s writings that answers the .docxa 350+ word summary based on Malinowski’s writings that answers the .docx
a 350+ word summary based on Malinowski’s writings that answers the .docxtaishao1
 
A - Historian Marybeth Hamilton characterizes the mainstreams obses.docx
A - Historian Marybeth Hamilton characterizes the mainstreams obses.docxA - Historian Marybeth Hamilton characterizes the mainstreams obses.docx
A - Historian Marybeth Hamilton characterizes the mainstreams obses.docxtaishao1
 
918 Riders to the Sea CATHLEEN (slowly and clearly) An Id.docx
918 Riders to the Sea CATHLEEN (slowly and clearly) An Id.docx918 Riders to the Sea CATHLEEN (slowly and clearly) An Id.docx
918 Riders to the Sea CATHLEEN (slowly and clearly) An Id.docxtaishao1
 
8B20M017 Teaching Note SOBEYS—PROJECT SUNRIS.docx
8B20M017  Teaching Note  SOBEYS—PROJECT SUNRIS.docx8B20M017  Teaching Note  SOBEYS—PROJECT SUNRIS.docx
8B20M017 Teaching Note SOBEYS—PROJECT SUNRIS.docxtaishao1
 
875 words Include citations for all unoriginal ideas, .docx
875 words Include citations for all unoriginal ideas, .docx875 words Include citations for all unoriginal ideas, .docx
875 words Include citations for all unoriginal ideas, .docxtaishao1
 
81Journal of International Studies© Foundation .docx
81Journal of International Studies© Foundation .docx81Journal of International Studies© Foundation .docx
81Journal of International Studies© Foundation .docxtaishao1
 
82916 f_ch02.docx 45 Chapter 2 From Public Regulat.docx
82916 f_ch02.docx  45 Chapter 2 From Public Regulat.docx82916 f_ch02.docx  45 Chapter 2 From Public Regulat.docx
82916 f_ch02.docx 45 Chapter 2 From Public Regulat.docxtaishao1
 
8.1 What is the difference between RFC 5321 and RFC 53228.docx
8.1 What is the difference between RFC 5321 and RFC 53228.docx8.1 What is the difference between RFC 5321 and RFC 53228.docx
8.1 What is the difference between RFC 5321 and RFC 53228.docxtaishao1
 
8. On the likely aftermath and long term effects of the coronavi.docx
8. On the likely aftermath and long term effects of the coronavi.docx8. On the likely aftermath and long term effects of the coronavi.docx
8. On the likely aftermath and long term effects of the coronavi.docxtaishao1
 
8 pagesSelect an agency of the US government and a specific pu.docx
8 pagesSelect an agency of the US government and a specific pu.docx8 pagesSelect an agency of the US government and a specific pu.docx
8 pagesSelect an agency of the US government and a specific pu.docxtaishao1
 
8 pages Select an agency of the US government and a specific p.docx
8 pages Select an agency of the US government and a specific p.docx8 pages Select an agency of the US government and a specific p.docx
8 pages Select an agency of the US government and a specific p.docxtaishao1
 
8-1 Discussion Immigration LawsIt is a violation of the immigra.docx
8-1 Discussion Immigration LawsIt is a violation of the immigra.docx8-1 Discussion Immigration LawsIt is a violation of the immigra.docx
8-1 Discussion Immigration LawsIt is a violation of the immigra.docxtaishao1
 
776! CHAPTER 26 Rococo to Neoclassicism The 18th Century in E.docx
776! CHAPTER 26 Rococo to Neoclassicism The 18th Century in E.docx776! CHAPTER 26 Rococo to Neoclassicism The 18th Century in E.docx
776! CHAPTER 26 Rococo to Neoclassicism The 18th Century in E.docxtaishao1
 
8 New Scientist 4 January 2020THE tropics are the most.docx
8  New Scientist  4 January 2020THE tropics are the most.docx8  New Scientist  4 January 2020THE tropics are the most.docx
8 New Scientist 4 January 2020THE tropics are the most.docxtaishao1
 
7 HYPOTHETICALS AND YOU TESTING YOUR QUESTIONS7 MEDIA LIBRARY.docx
7 HYPOTHETICALS AND YOU TESTING YOUR QUESTIONS7 MEDIA LIBRARY.docx7 HYPOTHETICALS AND YOU TESTING YOUR QUESTIONS7 MEDIA LIBRARY.docx
7 HYPOTHETICALS AND YOU TESTING YOUR QUESTIONS7 MEDIA LIBRARY.docxtaishao1
 

Mais de taishao1 (20)

9.1 Give examples of applications of IPsec.9.2 What servic.docx
9.1 Give examples of applications of IPsec.9.2 What servic.docx9.1 Give examples of applications of IPsec.9.2 What servic.docx
9.1 Give examples of applications of IPsec.9.2 What servic.docx
 
a brief description of two roles that a forensic psychology professi.docx
a brief description of two roles that a forensic psychology professi.docxa brief description of two roles that a forensic psychology professi.docx
a brief description of two roles that a forensic psychology professi.docx
 
A 65-year-old obese African American male patient presents to hi.docx
A 65-year-old obese African American male patient presents to hi.docxA 65-year-old obese African American male patient presents to hi.docx
A 65-year-old obese African American male patient presents to hi.docx
 
A case study assessing risk and proposing security for some chosen o.docx
A case study assessing risk and proposing security for some chosen o.docxA case study assessing risk and proposing security for some chosen o.docx
A case study assessing risk and proposing security for some chosen o.docx
 
A 3-4-page single-spaced essay that draws on materials posted in m.docx
A 3-4-page single-spaced essay that draws on materials posted in m.docxA 3-4-page single-spaced essay that draws on materials posted in m.docx
A 3-4-page single-spaced essay that draws on materials posted in m.docx
 
a 350+ word summary based on Malinowski’s writings that answers the .docx
a 350+ word summary based on Malinowski’s writings that answers the .docxa 350+ word summary based on Malinowski’s writings that answers the .docx
a 350+ word summary based on Malinowski’s writings that answers the .docx
 
A - Historian Marybeth Hamilton characterizes the mainstreams obses.docx
A - Historian Marybeth Hamilton characterizes the mainstreams obses.docxA - Historian Marybeth Hamilton characterizes the mainstreams obses.docx
A - Historian Marybeth Hamilton characterizes the mainstreams obses.docx
 
918 Riders to the Sea CATHLEEN (slowly and clearly) An Id.docx
918 Riders to the Sea CATHLEEN (slowly and clearly) An Id.docx918 Riders to the Sea CATHLEEN (slowly and clearly) An Id.docx
918 Riders to the Sea CATHLEEN (slowly and clearly) An Id.docx
 
8B20M017 Teaching Note SOBEYS—PROJECT SUNRIS.docx
8B20M017  Teaching Note  SOBEYS—PROJECT SUNRIS.docx8B20M017  Teaching Note  SOBEYS—PROJECT SUNRIS.docx
8B20M017 Teaching Note SOBEYS—PROJECT SUNRIS.docx
 
875 words Include citations for all unoriginal ideas, .docx
875 words Include citations for all unoriginal ideas, .docx875 words Include citations for all unoriginal ideas, .docx
875 words Include citations for all unoriginal ideas, .docx
 
81Journal of International Studies© Foundation .docx
81Journal of International Studies© Foundation .docx81Journal of International Studies© Foundation .docx
81Journal of International Studies© Foundation .docx
 
82916 f_ch02.docx 45 Chapter 2 From Public Regulat.docx
82916 f_ch02.docx  45 Chapter 2 From Public Regulat.docx82916 f_ch02.docx  45 Chapter 2 From Public Regulat.docx
82916 f_ch02.docx 45 Chapter 2 From Public Regulat.docx
 
8.1 What is the difference between RFC 5321 and RFC 53228.docx
8.1 What is the difference between RFC 5321 and RFC 53228.docx8.1 What is the difference between RFC 5321 and RFC 53228.docx
8.1 What is the difference between RFC 5321 and RFC 53228.docx
 
8. On the likely aftermath and long term effects of the coronavi.docx
8. On the likely aftermath and long term effects of the coronavi.docx8. On the likely aftermath and long term effects of the coronavi.docx
8. On the likely aftermath and long term effects of the coronavi.docx
 
8 pagesSelect an agency of the US government and a specific pu.docx
8 pagesSelect an agency of the US government and a specific pu.docx8 pagesSelect an agency of the US government and a specific pu.docx
8 pagesSelect an agency of the US government and a specific pu.docx
 
8 pages Select an agency of the US government and a specific p.docx
8 pages Select an agency of the US government and a specific p.docx8 pages Select an agency of the US government and a specific p.docx
8 pages Select an agency of the US government and a specific p.docx
 
8-1 Discussion Immigration LawsIt is a violation of the immigra.docx
8-1 Discussion Immigration LawsIt is a violation of the immigra.docx8-1 Discussion Immigration LawsIt is a violation of the immigra.docx
8-1 Discussion Immigration LawsIt is a violation of the immigra.docx
 
776! CHAPTER 26 Rococo to Neoclassicism The 18th Century in E.docx
776! CHAPTER 26 Rococo to Neoclassicism The 18th Century in E.docx776! CHAPTER 26 Rococo to Neoclassicism The 18th Century in E.docx
776! CHAPTER 26 Rococo to Neoclassicism The 18th Century in E.docx
 
8 New Scientist 4 January 2020THE tropics are the most.docx
8  New Scientist  4 January 2020THE tropics are the most.docx8  New Scientist  4 January 2020THE tropics are the most.docx
8 New Scientist 4 January 2020THE tropics are the most.docx
 
7 HYPOTHETICALS AND YOU TESTING YOUR QUESTIONS7 MEDIA LIBRARY.docx
7 HYPOTHETICALS AND YOU TESTING YOUR QUESTIONS7 MEDIA LIBRARY.docx7 HYPOTHETICALS AND YOU TESTING YOUR QUESTIONS7 MEDIA LIBRARY.docx
7 HYPOTHETICALS AND YOU TESTING YOUR QUESTIONS7 MEDIA LIBRARY.docx
 

Último

Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 

Último (20)

Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 

413TeChnology as a vaRiable anD Responsive oRganiz.docx

  • 1. 41 3 TeChnology as a vaRiable anD Responsive oRganizaTional Dynamism Introduction This chapter focuses on defining the components of technology and how they affect corporate organizations. In other words, if we step back momentarily from the specific challenges that information tech- nology (IT) poses, we might ask the following: What are the generic aspects of technology that have made it an integral part of strategic and competitive advantage for many organizations? How do organizations respond to these generic aspects as catalysts of change? Furthermore, how do we objectively view the role of technology in this context, and how should organizations adjust to its short- and long-term impacts? Technological Dynamism To begin, technology can be regarded as a variable, independent
  • 2. of others, that contributes to the life of a business operation. It is capable of producing an overall, totalizing, yet distinctive, effect on organizations— it has the unique capacity to create accelerations of corporate events in an unpredictable way. Technology, in its aspect of unpredictability, is necessarily a variable, and in its capacity as accel- erator— its tendency to produce change or advance— it is dynamic. My contention is that, as a dynamic kind of variable, technology, via responsive handling or management, can be tapped to play a special role in organizational development. It can be pressed into service as the dynamic catalyst that helps bring organizations to maturity in dealing not only with new technological quandaries, but also with other agents of change. Change generates new knowledge, which in turn requires a structure of learning that should, if managed properly, 42 INFORMATION TECHNOLOGY result in transformative behavior, supporting the continued evolution of organizational culture. Specifically, technology speeds up events, such as the expectation of getting a response to an e-mail, and
  • 3. requires organizations to respond to them in ever-quickening time frames. Such events are not as predictable as those experienced by individuals in organizations prior to the advent of new technologies— particu- larly with the meteoric advance of the Internet. In viewing technology then as a dynamic variable, and one that requires systemic and cul- tural organizational change, we may regard it as an inherent, internal driving force— a form of technological dynamism. Dynamism is defined as a process or mechanism responsible for the development or motion of a system. Technological dynamism charac- terizes the unpredictable and accelerated ways in which technology, specifically, can change strategic planning and organizational behav- ior/culture. This change is based on the acceleration of events and interactions within organizations, which in turn create the need to better empower individuals and departments. Another way of under- standing technological dynamism is to think of it as an internal drive recognized by the symptoms it produces. The new events and interac- tions brought about by technology are symptoms of the dynamism that technology manifests. The next section discusses how
  • 4. organiza- tions can begin to make this inherent dynamism work in their favor on different levels. Responsive Organizational Dynamism The technological dynamism at work in organizations has the power to disrupt any antecedent sense of comfortable equilibrium or an unwelcome sense of stasis. It also upsets the balance among the vari- ous factors and relationships that pertain to the question of how we might integrate new technologies into the business— a question of what we will call strategic integration— and how we assimilate the cul- tural changes they bring about organizationally— a question of what we call cultural assimilation. Managing the dynamism, therefore, is a way of managing the effects of technology. I propose that these orga- nizational ripples, these precipitous events and interactions, can be addressed in specific ways at the organizational management level. The set of integrative responses to the challenges raised by technology 43teChnoloGY As A vArIAble And responsIve is what I am calling responsive organizational dynamism,
  • 5. which will also receive further explication in the next few chapters. For now, we need to elaborate the two distinct categories that present themselves in response to technological dynamism: strategic integration and cul- tural assimilation. Figure 3.1 diagrams the relationships. Strategic Integration Strategic integration is a process that addresses the business- strategic impact of technology on organizational processes. That is, the business-strategic impact of technology requires immediate orga- nizational responses and in some instances zero latency. Strategic integration recognizes the need to scale resources across traditional business– geographic boundaries, to redefine the value chain in the life cycle of a product or service line, and generally to foster more agile business processes (Murphy, 2002). Strategic integration, then, Technology as an independent variable Creates Organizational dynamism
  • 6. Acceleration of events that require different infrastructures and organizational processes Requires Strategic integration Cultural assimilation Symptoms and implications Figure 3.1 Responsive organizational dynamism. 44 INFORMATION TECHNOLOGY is a way to address the changing requirements of business processes caused by the sharp increases in uses of technology. Evolving tech- nologies have become catalysts for competitive initiatives that create new and different ways to determine successful business investment. Thus, there is a dynamic business variable that drives the need for technology infrastructures capable of greater flexibility and of exhib-
  • 7. iting greater integration with all business operations. Historically, organizational experiences with IT investment have resulted in two phases of measured returns. The first phase often shows negative or declining productivity as a result of the investment; in the second phase, we often see a lagging of, although eventual return to, productivity. The lack of returns in the first phase has been attributed to the nature of the early stages of technology exploration and experimentation, which tend to slow the process of organizational adaptation to technology. The production phase then lags behind the ability of the organization to integrate new technologies with its existing processes. Another complication posed by technological dynamism via the process of strategic integration is a phenomenon we can call factors of multiplicity — essentially, what happens when several new technology opportunities overlap and create myriad projects that are in various phases of their developmental life cycle. Furthermore, the problem is compounded by lagging returns in productivity, which are complicated to track and to represent to management. Thus, it is important that organizations find ways to shorten the period between investment and technology’ s effective deployment. Murphy
  • 8. (2002) identifies several factors that are critical to bridging this delta: 1. Identifying the processes that can provide acceptable business returns from new technological investments 2. Establishing methodologies that can determine these processes 3. Finding ways to actually perform and realize expected benefits 4. Integrating IT projects with other projects 5. Adjusting project objectives when changes in the business require them Technology complicates these actions, making them more difficult to resolve; hence the need to manage the complications. To tackle these compounded concerns, strategic integration can shorten life cycle maturation by focusing on the following integrating factors: 45teChnoloGY As A vArIAble And responsIve • Addressing the weaknesses in management organizations in terms of how to deal with new technologies, and how to bet- ter realize business benefits • Providing a mechanism that both enables organizations to deal with accelerated change caused by technological innova- tions and integrates them into a new cycle of processing and
  • 9. handling change • Providing a strategic learning framework by which every new technology variable adds to organizational knowledge, par- ticularly using reflective practices (see Chapter 4) • Establishing an integrated approach that ties technology accountability to other measurable outcomes using organiza- tional learning techniques and theories To realize these objectives, organizations must be able to • Create dynamic internal processes that can function on a daily basis to deal with understanding the potential fit of new technologies and their overall value to the business • Provide the discourse to bridge the gaps between IT- and non-IT-related investments and uses into an integrated system • Monitor investments and determine modifications to the life cycle • Implement various organizational learning practices, includ- ing learning organization, knowledge management, change management, and communities of practice, all of which help foster strategic thinking and learning that can be linked to performance (Gephardt & Marsick, 2003) Another important aspect of strategic integration is what Murphy (2002) calls “ consequential interoperability,” in which “ the conse- quences of a business process” are understood to “ dynamically trigger integration” (p. 31). This integration occurs in what he calls the five
  • 10. pillars of benefits realization: 1. Strategic alignment: The alignment of IT strategically with business goals and objectives. 2. Business process impact: The impact on the need for the organi- zation to redesign business processes and integrate them with new technologies. 46 INFORMATION TECHNOLOGY 3. Architecture: The actual technological integration of appli- cations, databases, and networks to facilitate and support implementation. 4. Payback: The basis for computing return on investment (ROI) from both direct and indirect perspectives. 5. Risk: Identifying the exposure for underachievement or fail- ure in the technology investment. Murphy’ s (2002) pillars are useful in helping us understand how technology can engender the need for responsive organizational dyna- mism (ROD), especially as it bears on issues of strategic integration. They also help us understand what becomes the strategic integration component of ROD. His theory on strategic alignment and business process impact supports the notion that IT will increasingly
  • 11. serve as an undergirding force, one that will drive enterprise growth by identify- ing the initiators (such as e-business on the Internet) that best fit busi- ness goals. Many of these initiators will be accelerated by the growing use of e-business, which becomes the very driver of many new market realignments. This e-business realignment will require the ongoing involvement of executives, business managers, and IT managers. In fact, the Gartner Group forecasted that 70% of new software applica- tion investments and 5% of new infrastructure expenditures by 2005 would be driven by e-business. Indeed, this has occurred and contin- ues to expand. The combination of evolving business drivers with accelerated and changing customer demands has created a business revolution that best defines the imperative of the strategic integration component of ROD. The changing and accelerated way businesses deal with their customers and vendors requires a new strategic integration to become a reality rather than remain a concept discussed but affecting little action. Without action directed toward new strategic integration, organizations would lose competitive advantage, which would
  • 12. affect profits. Most experts see e-business as the mechanism that will ulti- mately require the integrated business processes to be realigned, thus providing value to customers and modifying the customer– vendor relationship. The driving force behind this realignment emanates from the Internet, which serves as the principle accelerator of the change in transactions across all businesses. The general need to optimize 47teChnoloGY As A vArIAble And responsIve resources forces organizations to rethink and to realign business pro- cesses to gain access to new business markets. Murphy’ s (2002) pillar of architecture brings out yet another aspect of ROD. By architecture we mean the focus on the effects that technol- ogy has on existing computer applications or legacy systems (old exist- ing systems). Technology requires existing IT systems to be modified or replacement systems to be created that will mirror the new busi- ness realignments. These changes respond to the forces of strategic integration and require business process reengineering (BPR) activi-
  • 13. ties, which represent the reevaluation of existing systems based on changing business requirements. It is important to keep in mind the acceleration factors of technology and to recognize the amount of organizational effort and time that such projects take to complete. We must ask the following question: How might organizations respond to these continual requirements to modify existing processes? I discuss in other chapters how ROD represents the answer to this question. Murphy’ s (2002) pillar of direct return is somewhat limited and nar- row because not all IT value can be associated with direct returns, but it is important to discuss. Technology acceleration is forcing organiza- tions to deal with broader issues surrounding what represents a return from an investment. The value of strategic integration relies heavily on the ability of technology to encapsulate itself within other departments where it ultimately provides the value. We show in Chapter 4 that this issue also has significance in organizational formation. What this means is simply that value can be best determined within individual business units at the microlevel and that these appropriate-level busi- ness units also need to make the case for why certain
  • 14. investments need to be pursued. There are also paybacks that are indirect; for example, Lucas (1999) demonstrates that many technology investments are non- monetary. The IT department (among others) becomes susceptible to great scrutiny and subject to budgetary cutbacks during economically difficult times. This does not suggest that IT “ hide” itself but rather that its investment be integrated within the unit where it provides the most benefit. Notwithstanding the challenge to map IT expenditures to their related unit, there are always expenses that are central to all departments, such as e-mail and network infrastructure. These types of expenses can rarely provide direct returns and are typically allocated across departments as a cost of doing business. 48 INFORMATION TECHNOLOGY Because of the increased number of technology opportuni- ties, Murphy’ s (2002) risk pillar must be a key part of strategic integration. The concept of risk assessment is not new to an organiza- tion; however, it is somewhat misunderstood as it relates to technology assessment. Technology assessment, because of the acceleration factor, must be embedded within the strategic decision-making process.
  • 15. This can only be accomplished by having an understanding of how to align technology opportunities for business change and by understanding the cost of forgoing the opportunity as well as the cost of delays in delivery. Many organizations use risk assessment in an unstructured way, which does not provide a consistent framework to dynamically deal with emerging technologies. Furthermore, such assessment needs to be managed at all levels in the organization as opposed to being an event-driven activity controlled only by executives. Summary Strategic integration represents the objective of dealing with emerg- ing technologies on a regular basis. It is an outcome of ROD, and it requires organizations to deal with a variable, that forces acceleration of decisions in an unpredictable fashion. Strategic integration would require businesses to realign the ways in which they include technol- ogy in strategic decision making. Cultural Assimilation Cultural assimilation is a process that focuses on the organizational aspects of how technology is internally organized, including the
  • 16. role of the IT department, and how it is assimilated within the organiza- tion as a whole. The inherent, contemporary reality of technologi- cal dynamism requires not only strategic but also cultural change. This reality demands that IT organizations connect to all aspects of the business. Such affiliation would foster a more interactive culture rather than one that is regimented and linear, as is too often the case. An interactive culture is one that can respond to emerging technology decisions in an optimally informed way, and one that understands the impact on business performance. 49teChnoloGY As A vArIAble And responsIve The kind of cultural assimilation elicited by technological dyna- mism and formalized in ROD is divided into two subcategories: the study of how the IT organization relates and communicates with “ others,” and the actual displacement or movement of traditional IT staff from an isolated “ core” structure to a firm-wide, integrated framework. IT Organization Communications with “ Others” The Ravell case study shows us the limitations and
  • 17. consequences of an isolated IT department operating within an organization. The case study shows that the isolation of a group can lead to marginalization, which results in the kind of organization in which not all individuals can participate in decision making and implementation, even though such individuals have important knowledge and value. Technological dynamism is forcing IT departments to rethink their strategic posi- tion within the organizational structure of their firm. No longer can IT be a stand-alone unit designed just to service outside departments while maintaining its separate identity. The acceleration factors of technology require more dynamic activity within and among depart- ments, which cannot be accomplished through discrete communica- tions between groups. Instead, the need for diverse groups to engage in more integrated discourse, and to share varying levels of techno- logical knowledge, as well as business-end perspectives, requires new organizational structures that will of necessity give birth to a new and evolving business— social culture. Indeed, the need to assimilate technology creates a transformative effect on organizational cultures, the way they are formed and re-formed, and what they will need
  • 18. from IT personnel. Movement of Traditional IT Staff To facilitate cultural assimilation from an IT perspective, IT must become better integrated with non-IT personnel. This form of inte- gration can require the actual movement of IT staff into other depart- ments, which begins the process of a true assimilation of resources among business units. While this may seem like the elimination of 50 INFORMATION TECHNOLOGY the integrity or identity of IT, such a loss is far from the case. The elimination of the IT department is not at all what is called for here; on the contrary, the IT department is critical to the function of cul- tural assimilation. However, the IT department may need to be struc- tured differently from the way it has been so that it can deal primarily with generic infrastructure and support issues, such as e-mail, net- work architecture, and security. IT personnel who focus on business- specific issues need to become closely aligned with the appropriate
  • 19. units so that ROD can be successfully implemented. Furthermore, we must acknowledge that, given the wide range of available knowledge about technology, not all technological knowl- edge emanates from the IT department. The question becomes one of finding the best structure to support a broad assimilation of knowledge about any given technology; then, we should ask how that knowledge can best be utilized by the organization. There is a pitfall in attempting to find a “ standard” IT organizational structure that will address the cultural assimilation of technology. Sampler’ s (1996) research, and my recent research with chief executives, confirms that no such standard structure exists. It is my position that organizations must find their own unique blend, using organizational learning con- structs. This simply means that the cultural assimilation of IT may be unique to the organization. What is then more important for the success of organizational development is the process of assimilation as opposed to the transplanting of the structure itself. Today, many departments still operate within “ silos” where they are unable to meet the requirements of the dynamic and unpredictable nature of technology in the business environment. Traditional
  • 20. orga- nizations do not often support the necessary communications needed to implement cultural assimilation across business units. However, business managers can no longer make decisions without considering technology; they will find themselves needing to include IT staff in their decision-making processes. On the other hand, IT departments can no longer make technology-based decisions without concerted efforts toward assimilation (in contrast to occasional partnering or project-driven participation) with other business units. This assimi- lation becomes mature when new cultures evolve synergistically as opposed to just having multiple cultures that attempt to work in con- junction with each other. The important lesson from Ravell to keep 51teChnoloGY As A vArIAble And responsIve in mind here is that the process of assimilating IT can create new cultures that in turn evolve to better support the requirements estab- lished by the dynamism of technology. Eventually, these new cultural formations will not perceive them-
  • 21. selves as functioning within an IT or non-IT decision framework but rather as operating within a more central business operation that understands how to incorporate varying degrees of IT involvement as necessary. Thus, organizational cultures will need to fuse together to respond to new business opportunities and requirements brought about by the ongoing acceleration of technological innovation. This was also best evidenced by subsequent events at Ravell. Three years after the original case study, it became necessary at Ravell to inte- grate one of its business operations with a particular group of IT staff members. The IT personnel actually transferred to the business unit to maximize the benefits of merging both business and technical cul- tures. Interestingly, this business unit is currently undergoing cultural assimilation and is developing its own behavioral norms influenced by the new IT staff. However, technology decisions within such groups are not limited to the IT transferred personnel. IT and non-IT staff need to formulate decisions using various organizational learning techniques. These techniques are discussed in the next chapter. Summary
  • 22. Without appropriate cultural assimilation, organizations tend to have staff that “ take shortcuts, [then] the loudest voice will win the day, ad hoc decisions will be made, accountabilities lost, and lessons from suc- cesses and failures will not become part of ... wisdom” (Murphy, 2002, p. 152). As in the case of Ravell Corporation, it is essential, then, to provide for consistent governance that fits the profile of the existing cul- ture or can establish the need for a new culture. While many scholars and managers suggest the need to have a specific entity responsible for IT governance, one that is to be placed within the operating structure of the organization, such an approach creates a fundamental problem. It does not allow staff and managers the opportunity to assimilate tech- nologically driven change and understand how to design a culture that can operate under ROD. In other words, the issue of governance is misinterpreted as a problem of structural positioning or hierarchy when 52 INFORMATION TECHNOLOGY it is really one of cultural assimilation. As a result, many business solu- tions to technology issues often lean toward the prescriptive,
  • 23. instead of the analytical, in addressing the real problem. Murphy’ s (2002) risk pillar theory offers us another important component relevant to cultural assimilation. This approach addresses the concerns that relate to the creation of risk cultures formed to deal with the impact of new systems. New technologies can actually cause changes in cultural assimilation by establishing the need to make cer- tain changes in job descriptions, power structures, career prospects, degree of job security, departmental influence, or ownership of data. Each of these potential risks needs to be factored in as an important part of considering how best to organize and assimilate technology through ROD. Technology Business Cycle To better understand technology dynamism, or how technology acts as a dynamic variable, it is necessary to define the specific steps that occur during its evolution in an organization. The evolution or business cycle depicts the sequential steps during the maturation of a new technology from feasibility to implementation and through subsequent evolution. Table 3.1 shows the five components that comprise the cycle: feasibil-
  • 24. ity, measurement, planning, implementation, and evolution. Table 3.1 Technology Business Cycle CYCLE COMPONENT COMPONENT DESCRIPTION Feasibility Understanding how to view and evaluate emerging technologies, from a technical and business perspective. Measurement Dealing with both the direct monetary returns and indirect nonmonetary returns; establishing driver and support life cycles. Planning Understanding how to set up projects, establishing participation across multiple layers of management, including operations and departments. Implementation Working with the realities of project management; operating with political factions, constraints; meeting milestones; dealing with setbacks; having the ability to go live with new systems. Evolution Understanding how acceptance of new technologies affects cultural change, and how uses of technology will change as individuals and organizations become more knowledgeable about technology, and generate new ideas about how it can be used; objective is established through organizational dynamism, creating new knowledge and an evolving organization.
  • 25. 53teChnoloGY As A vArIAble And responsIve Feasibility The stage of feasibility focuses on a number of issues surrounding the practicality of implementing a specific technology. Feasibility addresses the ability to deliver a product when it is needed in com- parison to the time it takes to develop it. Risk also plays a role in feasibility assessment; of specific concern is the question of whether it is possible or probable that the product will become obsolete before completion. Cost is certainly a huge factor, but viewed at a “ high level” (i.e., at a general cost range), and it is usually geared toward meeting the expected ROI of a firm. The feasibility process must be one that incorporates individuals in a way that allows them to respond to the accelerated and dynamic process brought forth by technological innovations. Measurement Measurement is the process of understanding how an investment in technology is calculated, particularly in relation to the ROI of
  • 26. an organization. The complication with technology and measurement is that it is simply not that easy to determine how to calculate such a return. This problem comes up in many of the issues discussed by Lucas (1999) in his book Information Technology and the Productivity Paradox. His work addresses many comprehensive issues, surround- ing both monetary and nonmonetary ROI, as well as direct ver- sus indirect allocation of IT costs. Aside from these issues, there is the fact that for many investments in technology the attempt to compute ROI may be an inappropriate approach. As stated, Lucas offered a “ garbage can” model that advocates trust in the operational management of the business and the formation of IT representatives into productive teams that can assess new technologies as a regu- lar part of business operations. The garbage can is an abstract con- cept for allowing individuals a place to suggest innovations brought about by technology. The inventory of technology opportunities needs regular evaluation. Lucas does not really offer an explana- tion of exactly how this process should work internally. ROD, how- ever, provides the strategic processes and organizational– cultural needs that can provide the infrastructure to better understand
  • 27. and 54 INFORMATION TECHNOLOGY evaluate the potential benefits from technological innovations using the garbage can model. The graphic depiction of the model is shown in Figure 3.2. Planning Planning requires a defined team of user and IT representatives. This appears to be a simple task, but it is more challenging to understand how such teams should operate, from whom they need support, and what resources they require. Let me be specific. … Chapter 3: Software Learning Objectives Upon successful completion of this chapter, you will be able to: • define the term software; • identify and describe the two primary categories of
  • 28. software; • describe the role ERP software plays in an organization; • describe cloud computing and its advantages and disadvantages for use in an organization; and • define the term open-source and identify its primary characteristics. Introduction The second component of an information system is software, the set of instructions that tells the hardware what to do. Software is created by developers through the process of programming (covered in more detail in Chapter 10). Without software, the hardware would not be functional. 54 | Chapter 3: Software Types of Software Software can be broadly divided into two categories: operating systems and application software. Operating systems manage
  • 29. the hardware and create the interface between the hardware and the user. Application software performs specific tasks such as word processing, accounting, database management, video games, or browsing the web. Operating Systems An operating system is first loaded into the computer by the boot program, then it manages all of the programs in the computer, including both programs native to the operating system such as file and memory management and application software. Operating systems provide you with these key functions: 1. managing the hardware resources of the computer; 2. providing the user-interface components; Chapter 3: Software | 55 Linux Ubuntu desktop 3. providing a platform for software developers to write
  • 30. applications. All computing devices require an operating system. The most popular operating systems for personal computers are: Microsoft Windows, Apple’s Mac OS, and various versions of Linux. Smartphones and tablets run operating systems as well, such as iOS (Apple), Android (Google), Windows Mobile (Microsoft), and Blackberry. Microsoft provided the first operating system for the IBM-PC, released in 1981. Their initial venture into a Graphical User Interface (GUI) operating system, known as Windows, occurred in 1985. Today’s Windows 10 supports the 64-bit Intel CPU. Recall that “64-bit” indicates the size of data that can be moved within the computer. Apple introduced the Macintosh computer 1984 with the first commercially successful GUI. Apple’s operating system for the Macintosh is known as “Mac OS ” and also uses an Intel CPU
  • 31. supporting 64-bit processing. Mac OS versions have been named after mountains such as El Capitan, Sierra, and High Sierra. Multitasking, virtual memory, and voice input have become standard features of both operating systems. The Linux operating system is open source, meaning individual developers are allowed to make modifications to the programming code. Linux is a version of the Unix operating. Unix runs on large and expensive minicomputers. Linux developer Linus Torvalds, a professor in Finland and the creator of Linux, wanted to find a way to make Unix run on less expensive personal computers. Linux has many variations and now powers a large percentage of web servers
  • 32. in the world. 56 | Information Systems for Business and Beyond (2019) Sidebar: Why Is Microsoft Software So Dominant in the Business World? If you’ve worked in business, you may have noticed that almost all computers in business run a version of Microsoft Windows. However, in classrooms from elementary to college, there is almost a balance between Macs and PCs. Why has this not extended into the business world? As discussed in Chapter 1, many businesses used IBM mainframe computers back in the 1960s and 1970s. When businesses migrated to the microcomputer (personal computer) market, they elected to stay with IBM and chose the PC. Companies took the safe route, invested in the Microsoft operating system and in Microsoft software/applications.
  • 33. Microsoft soon found itself with the dominant personal computer operating system for businesses. As the networked PC began to replace the mainframe computer, Microsoft developed a network operating system along with a complete suite of programs focused on business users. Today Microsoft Office in its various forms controls 85% of the market. 1 Application Software The second major category of software is application software. 1. [1] Chapter 3: Software | 57 Image of Microsoft Excel Application software is utilized directly today to accomplish a specific goal such as word processing, calculations on a spreadsheet, or surfing the Internet using your favorite browser. The “Killer” App When a new type of digital
  • 34. device is invented, there are generally a small group of technology enthusiasts who will purchase it just for the joy of figuring out how it works. A “killer” application is one that becomes so essential that large numbers of people will buy a device just to run that application. For the personal computer, the killer application was the spreadsheet. The first spreadsheet was created by an MBA student at Harvard University who tired of making repeated calculations to determine the optimal result on a problem and decided to create a tool that allowed the user to easily change values and recalculate formulas. The result was the spreadsheet. Today’s dominant spreadsheet is Microsoft Excel which still retains the basic functionality of the first
  • 35. spreadsheet. Productivity Software Along with the spreadsheet, several other software applications have become standard tools for the workplace. Known as productivity software, these programs allow office employees to complete their daily work efficiently. Many times these applications 58 | Information Systems for Business and Beyond (2019) come packaged together, such as in Microsoft’s Office suite. Here is a list of some of these applications and their basic functions: • Word processing Users can create and edit documents using this class of software. Functions include the ability to type and edit text, format fonts and paragraphs, as well as add, move, and delete text throughout the document. Tables and images can be inserted. Documents can be saved in a variety of electronic file formats with Microsoft Word’s DOCX being the most popular. Documents can also be converted to other
  • 36. formats such as Adobe’s PDF (Portable Document Format) or a .TXT file. • Spreadsheet This class of software provides a way to do numeric calculations and analysis, displaying the result in charts and graphs. The working area is divided into rows and columns, where users can enter numbers, text, or formulas. It is the formulas that make a spreadsheet powerful, allowing the user to develop complex calculations that can change based on the numbers entered. The most popular spreadsheet package is Microsoft Excel, which saves its files in the XLSX format. • Presentation Users can create slideshow presentations using this class of software. The slides can be projected, printed, or distributed to interested parties. Text, images, audio, and visual can all be added to the slides. Microsoft’s PowerPoint is the most popular software right now, saving its files in PPTX format. • Some office suites include other types of software. For example, Microsoft Office includes Outlook, its e-mail package, and OneNote, an information-gathering collaboration
  • 37. tool. The professional version of Office also includes Microsoft Access, a database package. (Databases are covered more in Chapter 4.) Microsoft popularized the idea of the office-software productivity Chapter 3: Software | 59 bundle with their release of the Microsoft Office Suite. This package continues to dominate the market and most businesses expect employees to know how to use this software. However, many competitors to Microsoft Office do exist and are compatible with the file formats used by Microsoft (see table below). Microsoft also offers a cloud-based version of their office suite named Microsoft Office 365. Similar to Google Drive, this suite allows users to edit and share documents online utilizing cloud-computing technology.
  • 38. Utility Software and Programming Software Utility software includes programs that allow you to fix or modify your computer in some way. Examples include anti-malware software and programs that totally remove software you no longer want installed. These types of software packages were created to fill shortcomings in operating systems. Many times a subsequent release of an operating system will include these utility functions as part of the operating system itself. Programming software’s purpose is to produce software. Most of 60 | Information Systems for Business and Beyond (2019) https://commons.wikimedia.org/wiki/User:Wgsimon Screen shot of Tableau (click to enlarge) these programs provide developers with an environment in which they can write the code, test it, and convert/compile it into the
  • 39. format that can then be run on a computer. This software is typically identified as the Integrated Development Environment (IDE) and is provided free from the corporation that developed the programming language that will be used to write the code. Sidebar: “PowerPointed” to Death As presentation software has gained acceptance as the primary method to formally present information to a group or class, the art of giving an engaging presentation is becoming rare. Many presenters now just read the bullet points in the presentation and immediately bore those in attendance, who can already read it for themselves. The real problem is not with PowerPoint as much as it is with the person creating and
  • 40. presenting. Author and chief evangelist Guy Kawasaki has developed the 10/20/ 30 rule for Powerpoint users. Just remember: 10 slides, 20 minutes, 30 point font.” 2 If you are determined to improve your PowerPoint skills, read Presentation Zen by Garr Reynolds. New digital presentation technologies are being developed that go beyond Powerpoint. For example, Prezi uses a single canvas for the presentation, allowing presenters to place text, images, and 2. [2] Chapter 3: Software | 61 https://opentextbook.site/informationsystems2019/wp- content/uploads/sites/3/2018/07/TABLUE.png https://opentextbook.site/informationsystems2019/wp- content/uploads/sites/3/2018/07/TABLUE.png http://www.amazon.com/gp/product/0321811984 other media on the canvas, and then navigate between these objects as they present. Tools such as Tableau allow users to analyze
  • 41. data in depth and create engaging interactive visualizations. Sidebar: I Own This Software, Right? Well… When you purchase software and install it on your computer, are you the owner of that software? Technically, you are not! When you install software, you are actually just being given a license to use it. When you first install a package, you are asked to agree to the terms of service or the license agreement. In that agreement, you will find that your rights to use the software are limited. For example, in the terms of the Microsoft Office software license, you will find the following statement: “This software is licensed, not sold. This agreement only gives you some rights to use the features included in the software edition you licensed.” For the most part, these restrictions are what you would expect.
  • 42. You cannot make illegal copies of the software and you may not use it to do anything illegal. However, there are other, more unexpected terms in these software agreements. For example, many software agreements ask you to agree to a limit on liability. Again, from Microsoft: “Limitation on and exclusion of damages. You can recover from Microsoft and its suppliers only direct damages up to the amount you paid for the software. You cannot recover any other damages, including consequential, lost profits, special, indirect or incidental damages.” This means if a problem with the software causes harm to your business, you cannot hold Microsoft or the supplier responsible for damages. 62 | Information Systems for Business and Beyond (2019) Applications for the Enterprise As the personal computer proliferated inside organizations, control
  • 43. over the information generated by the organization began splintering. For instance, the customer service department creates a customer database to keep track of calls and problem reports, and the sales department also creates a database to keep track of customer information. Which one should be used as the master list of customers? Or perhaps someone in sales might create a spreadsheet to calculate sales revenue, while someone in finance creates a different revenue document that meets the needs of their department, but calculates revenue differently. The two spreadsheets will report different revenue totals. Which one is correct? And who is managing all of this information? Enterprise Resource Planning In the 1990s the need to bring an organization’s information back under centralized control became more apparent. The Enterprise Resource Planning (ERP) system (sometimes just called enterprise
  • 44. software) was developed to bring together an entire organization within one program. ERP software utilizes a central database that is implemented throughout the entire organization. Here are some key points about ERP. • A software application. ERP is an application that is used by Chapter 3: Software | 63 many of an organization’s employees. • Utilizes a central database. All users of the ERP edit and save their information from the same data source. For example, this means there is only one customer table in the database, there is only one sales (revenue) table in the database, etc. • Implemented organization-wide. ERP systems include functionality that covers all of the essential components of a business. An organization can purchase modules for its ERP system that match specific needs such as order entry, manufacturing, or planning.
  • 45. ERP systems were originally marketed to large corporations. However, as more and more large companies began installing them, ERP vendors began targeting mid-sized and even smaller businesses. Some of the more well-known ERP systems include those from SAP, Oracle, and Microsoft. In order to effectively implement an ERP system in an organization, the organization must be ready to make a full commitment. All aspects of the organization are affected as old systems are replaced by the ERP system. In general, implementing an ERP system can take two to three years and cost several million dollars. So why implement an ERP system? If done properly, an ERP system can bring an organization a good return on their investment. By consolidating information systems across the enterprise and using the software to enforce best practices, most organizations see an overall improvement after implementing an ERP. Business
  • 46. processes as a form of competitive advantage will be covered in Chapter 9. 64 | Information Systems for Business and Beyond (2019) Customer Relationship Management A Customer Relationship Management (CRM) system manages an organization’s customers. In today’s environment, it is important to develop relationships with your customers, and the use of a well- designed CRM can allow a business to personalize its relationship with each of its customers. Some ERP software systems include CRM modules. An example of a well-known CRM package is Salesforce. Supply Chain Management Supply Chain
  • 47. Many organizations must deal with the complex task of managing their supply chains. At its simplest, a supply chain is the linkage between an organization’s suppliers, its manufacturing facilities, and the distributors of its products. Each link in the chain has a multiplying effect on the complexity of the process. For example, if there are two suppliers, one manufacturing facility, and two distributors, then the number of links to manage = 4 ( 2 x 1 x 2 ). However, if two more suppliers are added, plus another manufacturing facility, and two more distributors, then the number of links to manage = 32 ( 4 x 2 x 4 ). Also, notice in the above illustration that all arrows have two heads, indicating that information flows in both directions. Suppliers are part of a business’s supply chain. They provide information such as price, size, quantity, etc. to the business. In turn, the business provides information such as quantity on hand at every store to the
  • 48. supplier. The key to successful supply chain management is the information system. Chapter 3: Software | 65 https://commons.wikimedia.org/wiki/Category:Supply_chain#/m edia/File:A_company%27s_supply_chain_(en).png A Supply Chain Management (SCM) system handles the interconnection between these links as well as the inventory of the products in their various stages of development. As discussed previously much of Walmart’s success has come from its ability to identify and control the supply chain for its products. Walmart invested heavily in their information system so they could communicate with their suppliers and manage the thousands of products they sell. Walmart realized in the 1980s that the key to their success was information systems. Specifically, they needed to manage their complex supply chain with its thousands of suppliers, thousands
  • 49. of retail outlets, and millions of customers. Their success came from being able to integrate information systems to every entity (suppliers, warehouses, retail stores) through the sharing of sales and inventory data. Take a moment to study the diagram above…look for the double-headed arrow. Notice that data flows down the supply chain from suppliers to retail stores. But it also flows up the supply chain, back to the suppliers so they can be up to date regarding production and shipping. Mobile Applications Just as with the personal computer, mobile devices such as 66 | Information Systems for Business and Beyond (2019) smartphones and electronic tablets also have operating systems and application software. These mobile devices are in many ways just smaller versions of personal computers. A mobile app is a
  • 50. software application designed to run specifically on a mobile device. As shown in Chapter 2, smartphones are becoming a dominant form of computing, with more smartphones being sold than personal computers. A greater discussion of PC and smartphone sales appears in Chapter 13, along with statistics regarding the decline in tablet sales. Businesses have adjusted to this trend by increasing their investment in the development of apps for mobile devices. The number of mobile apps in the Apple App Store has increased from zero in 2008 to over 2 million in 2017. 3 Building a mobile app will will be covered in Chapter 10. Cloud Computing Historically, for software to run on a computer an individual copy of the software had to be installed on the computer. The concept of “cloud” computing changes this. Cloud Computing
  • 51. The “cloud” refers to applications, services, and data storage located on the Internet. Cloud service providers rely on giant server farms and massive storage devices that are connected via the Internet. Cloud computing allows users to access software and data storage services on the Internet. You probably already use cloud computing in some form. For example, if you access your e-mail via your web browser, you are 3. [3] Chapter 3: Software | 67 using a form of cloud computing if you are using Google Drive’s applications. While these are free versions of cloud computing, there is big business in providing applications and data storage over the web. Cloud computing is not limited to web applications. It can also be used for services such as audio or video streaming.
  • 52. Advantages of Cloud Computing • No software to install or upgrades to maintain. • Available from any computer that has access to the Internet. • Can scale to a large number of users easily. • New applications can be up and running very quickly. • Services can be leased for a limited time on an as-needed basis. • Your information is not lost if your hard disk crashes or your laptop is lost or stolen. • You are not limited by the available memory or disk space on your computer. Disadvantages of Cloud Computing • Your information is stored on someone else’s computer. • You must have Internet access to use it. • You are relying on a third-party to provide these services. Cloud computing has the ability to really impact how organizations manage technology. For example, why is an IT department needed to purchase, configure, and manage personal
  • 53. computers and software when all that is really needed is an Internet connection? 68 | Information Systems for Business and Beyond (2019) Using a Private Cloud Many organizations are understandably nervous about giving up control of their data and some of their applications by using cloud computing. But they also see the value in reducing the need for installing software and adding disk storage to local computers. A solution to this problem lies in the concept of a private cloud. While there are various models of a private cloud, the basic idea is for the cloud service provider to section off web server space for a specific organization. The organization has full control over that server space while still gaining some of the benefits of cloud computing.
  • 54. Virtualization Virtualization is the process of using software to simulate a computer or some other device. For example, using virtualization a single physical computer can perform the functions of several virtual computers, usually referred to as Virtual Machines (VMs). Organizations implement virtual machines in an effort to reduce the number of physical servers needed to provide the necessary services to users. This reduction in the number of physical servers also reduces the demand for electricity to run and cool the physical servers. For more detail on how virtualization works, see this informational page from VMWare. Chapter 3: Software | 69 http://www.vmware.com/virtualization/virtualization- basics/how-virtualization-works.html http://www.vmware.com/virtualization/virtualization- basics/how-virtualization-works.html Example program “Hello World”
  • 55. written in Java Software Creation Modern software applications are written using a programming language such as Java, Visual C, C++, Python, etc. A programming language consists of a set of commands and syntax that can be organized logically to execute specific functions. Using this language a programmer writes a program (known as source code) that can then be compiled into machine-readable form, the ones and zeroes necessary to be executed by the CPU. Languages such as HTML and Javascript are used to develop web pages. Open-Source Software When the personal computer was first released, computer enthusiasts banded together to build applications and solve
  • 56. problems. These computer enthusiasts were motivated to share any programs they built and solutions to problems they found. This collaboration enabled them to more quickly innovate and fix problems. As software began to become a business, however, this idea of sharing everything fell out of favor with many developers. When a program takes hundreds of hours to develop, it is understandable that the programmers do not want to just give it away. This led to a new business model of restrictive software licensing which required payment for software, a model that is still dominant today. This model is sometimes referred to as closed source, as the source code is not made available to others. 70 | Information Systems for Business and Beyond (2019) There are many, however, who feel that software should not be
  • 57. restricted. Just as with those early hobbyists in the 1970s, they feel that innovation and progress can be made much more rapidly if they share what has been learned. In the 1990s, with Internet access connecting more people together, the open-source movement gained steam. Open Office Suite Open-source software makes the source code available for anyone to copy and use. For most people having access to the source code of a program does little good since it is challenging to modify existing programming code. However, open-source software is also available in a compiled format that can be downloaded and installed. The open-source movement has led to the development of some of the most used software in the world such as the Firefox browser, the Linux operating system, and the Apache web
  • 58. server. Many businesses are wary of open-source software precisely because the code is available for anyone to see. They feel that this increases the risk of an attack. Others counter that this openness actually decreases the risk because the code is exposed to thousands of programmers who can incorporate code changes to quickly patch vulnerabilities. There are thousands of open-source applications available for download. For example, you can get the productivity suite from Chapter 3: Software | 71 Open Office. One good place to search for open-source software is sourceforge.net, where thousands of programs are available for free download. Summary Software gives the instructions that tell the hardware what to do.
  • 59. There are two basic categories of software: operating systems and applications. Operating systems interface with the computer hardware and make system resources available. Application software allows users to accomplish specific tasks such as word processing, presentations, or databases. This group is also referred to as productivity software. An ERP system stores all data in a centralized database that is made accessible to all programs and departments across the organization. Cloud computing provides access to software and databases from the Internet via a web browser. Developers use various programming languages to develop software. Study Questions 1. Develop your own definition of software being certain to explain the key terms. 2. What are the primary functions of an operating system? 3. Which of the following are operating systems and which are applications: Microsoft Excel, Google Chrome, iTunes,
  • 60. Windows, Android, Angry Birds. 4. What is your favorite software application? What tasks does it help you accomplish? 72 | Information Systems for Business and Beyond (2019) http://sourceforge.net/ 5. How would you categorize the software that runs on mobile devices? Break down these apps into at least three basic categories and give an example of each. 6. What does an ERP system do? 7. What is open-source software? How does it differ from closed- source software? Give an example of each. 8. What does a software license grant to the purchaser of the software? Exercises 1. Find a case study online about the implementation of an ERP system. Was it successful? How long did it take? Does the case
  • 61. study tell you how much money the organization spent? 2. If you were running a small business with limited funds for information technology, would you consider using cloud computing? Find some web-based resources that support your decision. 3. Go to sourceforge.net and review their most downloaded software applications. Report on the variety of applications you find. Then pick one that interests you and report back on what it does, the kind of technical support offered, and the user reviews. 4. Review this article on the security risks of open-source software. Write a short analysis giving your opinion on the different risks discussed. 5. List three examples of programming languages? What features in each language makes it useful to developers? Chapter 3: Software | 73 http://sourceforge.net/ http://www.zdnet.com/six-open-source-security-myths- debunked-and-eight-real-challenges-to-consider-7000014225
  • 62. Lab 1. Download Apache Open Office and create a document. Note: If your computer does not have Java Runtime Environment (JRE) 32-bit (x86) installed, you will need to download it first from this site.Open Office runs only in 32-bit (x86) mode. Here is a link to the Getting Started documentation for Open Office. How does it compare to Microsoft Office? Does the fact that you got it for free make it feel less valuable? 1. Statista. (2017). Microsoft – Statistics & Facts. Retrieved from https://www.statista.com/topics/823/microsoft/ 2. Kawasaki, G. (n.d.). The 10/20/30 Rules for PowerPoint. Retrieved from https://guykawasaki.com/the_102030_rule/.↵ 3. Statista. (2018). Number of apps in Apple App Store July 2008 to January 2017. Retrieved from … Assignment 1 Textbook:Information Systems for Business and Beyond Please answer the following
  • 63. From Chapter 3 – Answer Study questions 1-8 and Exercise 2 From Chapter 2 – Answer Study questions 1-13 and Exercise 5 All the above questions should be submitted in one Word document Please understand that Plagiarism will not be tolerated and will result in a zero grade. Submission Requirements Font: Times New Roman, size 12, double-space Citation Style: APA Length: At least six Pages References: Please use citations and references where appropriate No Plagiarism Assignment 2 Textbook:Information Technology and Organizational Learning Please answer the Following From Chapter 3 – Complete the two essay assignments noted below: 1. Review the strategic integration section. Note what strategic integration is and how it ties to the implementation of technology within an organization. 2. Review the information technology roles and responsibilities section. Note how IT is divided based on operations and why this is important to understand within an organization. Submission Requirements Font: Times New Roman, size 12, double-space Length: At least two Pages Citation Style: APA References: Please use citations and references where appropriate No Plagiarism The above submission should adhere to APA formatting standards. Remember the page length does not include the APA cover page or any references. Please understand that Plagiarism will not be tolerated and will result in a zero grade.