DOC PREVIEW
SIU MGMT 345 - Final Exam Study Guide

This preview shows page 1-2 out of 5 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 5 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 5 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 5 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

MGMT 345 1st EditionFinal Exam Study Guide Bonus Question:Fully homomorphic encryption: use unbreakable encryption, but you can analyze the data whileit is still encrypted. GENTRYLab Questions:1 question will involve everything that you can learn about customer from page 83 in the lab manual.For the other, know everything you can about the 2 finished products. Use SAP Lab #2 to find out more about NRG-A. (possibly how many cases of NRG-A)DSPQ, know your supply chain. This will be question 53 from an overhead slide. Chalkboard Notes:Supplier: Internal: Customer:Supply chain  ERP Core (financial)  CRMGraph Theory?  Supply chain- River Rough Plant- model T plant, they put iron ore in one end and model Ts came out the other. 35000 companies do supplies for GM. - Today we do away with EDI and replace with XML (EDI from the web)- Alibaba.com  Jack Moi, electronic place that sells “stuff” (supplies, products, etc. ) thatis manufactured in China.- Fox Comm- assembles iPhones in China, have seen 26 suicides by employees. (Does Steve Jobs know?) Apple has $140 billion in offshore accounts- Boeing- Sweden?- Just-in-Time was founded in Japan- MIT Beer Game: in there are delays in information then the product flow is interrupted too. (bullwhip effect)- Fully integrated global supply chain one of the main things- F Lynn, Huro Et. Al. 2010, researched whether supply chain really does have an effect on operational performance (efficiency) and financial performance (sales, sales growth, profit, profit growth)- Fukushima, Japan: Tsunami destroyed the power plant- Salesforce.com: 65,000 corporate- Zoho: CRM (cloud based), experience on how to use CRM- Location 300 SLOC is a storage location- Avon Products- Tried to implement SAP and spent $125 million before scrapping it- UK Health Project in 2002-2012 for standardized electronic medical record  spent $18.7 billion before pulling the plug- New York City Payroll was estimated to cost $63 million, but cost $760 million before giving up- JP Morgan had a London Trader called “the London Whale”- he lost $6 billion in 60 days using Microsoft Excel- San Francisco Federal Reserve Bank looked at IT over the long-term on productivity. From 1972-1995 it increased. National impact 1% per year. ($1=$.60 increase) 1995-2004 IT productivity went to 3.5% per year, 2004-? Back to 1% per year (productivity paradox)- Diane Strong and Olga Volkoff looked at what makes software a bad fit for the companies. Published in 2010- the company was ACRO services and they were trying to implement SAP. They used the grounded theory method of research. They found 4 misfits: Usability, functionality, physical technology, and latent structures (organizational culture, roles, and control.) - FirstCellular of Southern Illinois RFP wanted to be able to view 24 months of billing- Request for Proposal (RFP) is created by the customer, it is responded to by the provider in a Proposal (including statement of work - SOW)- PRTC- Puerto Rico Telecomm Corporation: Under item 8 there is a module called “packaging” and Marketing handles that.- Kodak became the first company to completely outsource their IT department to IBM in 1989. By doing that, they missed out on digital cameras. - Eastern Europe  computer gang has stolen $1 billion in USD from banks in 30+ countries- More than 680,000 corporate IT accounts had the password “Password1”- Vladmir Vetrov (a KGB colonel) brought the Cold War to an end by leaking to the US through France that the KGB was going to steal pipeline software from Canada (1980s). So the US planted a “logic bomb” (destructive code) into the Canadian software and then let the KGB steal it. When the logic bomb detonated it caused the pumps on the new Soviet natural gas line in Siberia to reverse against themselves and eventually burst and ignite, causing the largest non-nuclear explosion ever. - Adobe Flash is a giant cookie creator/ tracker. - 94% of all viruses and malware enter the computer through a phishing attack (via email) - Snopes.com- Chris Rouland- FBI offered him 15 years in prison or instead he could come to work for them. After he finished working for the FBI in 2008 he started his own company called “End Game.” They do “zero-day exploits” (fixing vulnerabilities before they are even found)- 365 days is 2014- 370,000,000 new malware created in 2014 alone- STUXNET Worm  developed between US and Israeli governments to shut down the Iranian nuclear program. They inserted the stuxnet worm into a flash-drive that was given to one of the Iranian officials involved in the nuclear facility. It caused thecentrifuges to speed up which in turn melted the bearings and destroyed the centrifuges.- NSA Tailored Access Operations- intercept shipments destined for oversees and insert their own special hardware into the system to send info back to the NSA. CISCO (make routers for the internet) is now having to ship their products in farm implement boxes to try and trick the NSA because of the money it is costing them. - “Operation Ivy Bells”  this was an NSA operation during the Cold War. They fitted a submarine, the “USS Halibut” with special feet to find a fiber optic cable to intercept Soviet


View Full Document

SIU MGMT 345 - Final Exam Study Guide

Download Final Exam Study Guide
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Final Exam Study Guide and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Final Exam Study Guide 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?