Tuesday, September 30, 2008

blog#3.5

As what i have researh, I think AYALA CORPORATION which is also considered as the oldest business house in the Philippines. The Ayala Corporation provides Globe Telecom local operating and project development expertise and financial muscle. With diversified interests in real estate, hotels, banking, insurance, telecommunications, food, electronics, information technology, automotive, infrastructure and international operations, the Ayala Corporation resulted in "stable earnings as well as leadership status in these sectors"
And I think Ayala Corporation use MIS in order to them to become productive and competitive.As we know now Ayala Corporation is very productive and profitable.

blog#3.4 knowlegde-based system

1.A knowledge-based system is a program for extending and querying a knowledge base.The Computer User High-Tech Dictionary defines a knowledge-based system as a computer system that is programmed to imitate human problem-solving by means of artificial intelligence and reference to a database of knowledge on a particular subject.


2.I distinguish the KBS from MIS that the knowledge-based system is just also one of the part ot Management Information System.And eventhough this must be part of process of solving a problem by artificial inteligence but it helps a lot in a certain company to solve problem.

3. Some examples of KBS:

a. Cyc is a very large and one of the example of KBS. It multi-contextual knowledge base and inference engine, the development of which started at the Microelectronics and Computer Technology Corporation (MCC) in Austin, Texas during the early 1980s. Over the past eleven years the members of the Cyc team, lead by Doug Lenat, have added to the knowledge base a huge amount of fundamental human knowledge: facts, rules of thumb, and heuristics for reasoning about the objects and events of modern everyday life.

A Company who has KBS can be more compepitive because it has software that attempts to reproduce the performance of one or more human experts, most commonly in a specific problem domain, and is a traditional application and subfield of artificial intelligence. A wide variety of methods can be used to simulate the performance of the expert however common to most or all are the creation of a so-called "knowledgebase" which uses some knowledge representation formalism to capture the subject matter experts (SME) knowledge and a process of gathering that knowledge from the SME and codifying it according to the formalism, which is called knowledge engineering. Expert systems may or may not have learning components but a third common element is that once the system is developed it is proven by being placed in the same real world problem solving situation as the human SME, typically as an aid to human workers or a supplement to some information system.
As a premiere application of computing and artificial intelligence, the topic of expert systems has many points of contact with general systems theory, operations research, business process reengineering and various topics in applied mathematics and management science.
Two illustrations of actual expert systems can give an idea of how they work. In one real world case at a chemical refinery a senior employee was about to retire and the company was concerned that the loss of his expertise in managing a fractionating tower would severely impact operations of the plant. A knowledge engineer was assigned to produce an expert system reproducing his expertise saving the company the loss of the valued knowledge asset. Similarly a system called Mycin was developed from the expertise of best diagnosticians of bacterial infections whose performance was found to be as good or better than the average clinician. An early commercial success and illustration of another typical application was an expert system fielded by DEC in the 1980s to quality check the configurations of their computers prior to delivery. The eighties were the time of greatest popularity of expert systems and interest lagged after the onset of the AI Winter.




http.cyc.com
knowlegdebased.net

Wednesday, September 24, 2008

blog#3.3 VIRTUAL OFFICE


1. Virtual Office
- this is place where in co-workers run a business efficiently by using nothing other than online communication technologies. It is also a common term for shared office services, which normally includes business address, mail & courier services, phone services, fax services, answering services, web-hosting services, and meeting & conference facilities.But sometimes virtual office services will provide other in-house or outsourced services such as corporate secretarial services, accounting services, legal services, serviced office services and etc. In terms of professional firms such as law firms and accounting firms often provide registered address services as part of their service offerings.

2.I distinguish that the virtual office is place where in the management information system are made.All transaction to be made are made in virtual office

3. These are some example of companies :

a.Habbo,is formerly Habbo Hotel,which is one of the social networking website owned and operated by Sulake Corporation. Aimed at teenagers, Habbo features chat rooms rendered by isometric projection in the form of virtual hotel rooms. User pages on the website are linked to these rooms and allow users to share content and create groups with discussion forums. Each user, called a Habbo, has a customizable avatar to represent him or herself. The service gains revenue from credits bought with real-life currency. Credits are used to buy products such as virtual furniture for the virtual hotel rooms and stickers for user pages.

A Virtual Office Service helps the present company’s best image to a prospective clients and current customers by providing a complete unified suite of telephone answering , fax and mail services. Our services are available to any company who desire a professional and polished New York image.
All virtual office service companies, answering services and mailbox companies are not alike.If there is a losing sales because of some potential clients have been unable to reach because of current virtual office service company is unreliable, there will call of competition. Many telephone answering and mail services have the unfortunate reputation of hiring unskilled workers who lack experience in providing their clients with professional customer service. Complaints abound about virtual office service workers, specifically telephone operators and mail retrieval personnel who are rude to customers and under perform. At A Virtual Office Service, are only hire telephone attendants who have demonstrated successful experience in providing professional customer service in a wide variety of industries and fields. Mailroom staff must have experience in providing corporate mailroom services.The screenall the job applicants to find the best employees in the industry and hiring only individuals who share our commitment to providing you, your clients and customers with the highest levels of customer care.



http//www.avirtualoffice.net/

Monday, September 22, 2008

blog#3.2 DECISION SUPPORT SYSTEM


1 .Decision Support Systems (DSS) - are a specific class of computerized information system that supports business and organizational decision-making activities. A properly-designed DSS is an interactive software-based system intended to help decision makers compile useful information from raw data, documents, personal knowledge, and/or business models to identify and solve problems and make decisions.
It also a set of manual or computer-based tools that assist in some decision-making activity. In today's business environment, however, decision support systems (DSS) are commonly understood to be computerized management information systems designed to help business owners, executives, and managers resolve complicated business problems and/or questions. Good decision support systems can help business people perform a wide variety of functions, including cash flow analysis, concept ranking, multistage fore-casting, product performance improvement, and resource allocation analysis. Previously regarded as primarily a tool for big companies, DSS has in recent years come to be recognized as a potentially valuable tool for small business enterprises as well.

2. As what I search the Management Information System (MIS) are provides answers to the problems and that integrates the decision maker into the system as a component.And also the system utilizes such quantitative techniques as
regression, linear programming, and financial planning modeling while the Decision Support System (DSS) software furnishes support to the accountant in the decision-making process. It also analyzes a specific situation and can be modified as the practitioner wishes. Models are constructed and decisions analyzed. Planning and forecasting are facilitated.

3. Some examples of DSS:

a. Clinical decision support sysytem for medical diagnosis

b. A bank loan officer for verifying the credit of a loan applicant

c. An engineering firm that has bids on several projects and wants to know if they can be competitive with their costs.

DSS is extensively used in business and management.It support for decision makers in semistructured and unstructured problems. It also support for interdependent or sequential decisions.DSS is the intellectual resources of individuals with the capabilities of the computer to improve the quality of decisions. DSS are computer-based support for management decision makers who are dealing with semi-structured problems.
A DSS can take many different forms. In general, we can say that a DSS is a computerized system that helps making decisions. A decision is a choice between alternatives based on estimates of the values of those alternatives. Supporting a decision means helping people working alone or in a group gather intelligence, generate alternatives and make choices. Supporting the choice making process involves supporting the estimation, the evaluation and the comparison of alternatives. In practice, references to DSS are usually references to computer applications that perform such a supporting role.
So, if the company apply this DSS, theres a possibility they can make a better decision.



http://www.answer.com

Monday, September 8, 2008

blog#3.1The Strategic Plan of Indiana University

Information Technology Strategic Plan (ITSP) is the primarily responsibility of the Telecommunications Division of University Information Technology Services (UITS). Major initiatives in this plan for evolving and building upon a sound telecommunications infrastructure that has been in place at the University for more than a decade. Indiana University has a reputation as one of the nation's most-wired institutions of higher education. The initiatives will guarantee the continuation of that tradition and our reputation through the beginning of this next millennium.
Telecommunications Division is also uniquely able to leverage our expertise and reputation in national and international networking communities. The focus of the ITSP is certainly well placed in addressing the needs of Indiana University. The network of institutions, enterprises, and individuals that make up the Internet(s) are truly an extension of the IU community both in terms of potential resources to be used by the IU community, and potential users of resources made available by the IU community. As such, we must maintain and even increase our participation and leadership in many national and international advanced networking initiatives. We have the unique challenge of needing to juggle internal and external focus. Our priority must certainly be the services most valued by the IU community; but that same community benefits tremendously from our involvement in the broader networking environment

Indiana University must implement an effective strategic plan for the use of information technology in research and academic computing, teaching and learning, and administrative support. This plan must recognize the inevitability and ubiquity, but also the unpredictability, of the spreading use of information technology in higher education.
Information technology is in a state of rapid change. No one would have predicted where we are now five years ago, and there is no reason to suppose we can predict with certainty where technology will be in another five years. For this reason, flexibility and experimentation should guide every phase of information technology planning and implementation. Throughout this process, IU must stay light on its feet! Indeed, flexibility and experimentation are so important that these might well be guiding principles for this entire plan
.
The plan is not just a plan for University Information Technology Services, but rather a strategic plan for information technology for all of Indiana University. Full implementation of this plan will need more than increased activity and funding for UITS. Much of the implementation will by necessity take place at the school and departmental level, calling for increased activity and funding there too. This fits the distributed nature of information, and is consonant with flexibility and experimentation. But as individual units make their own plans for information technology there should be an institutional expectation that these plans will be shared for review and comment with the UITC who, along with the Campus Computing Center Directors and the campus Information Technology Councils at IUB and IUPUI, can provide an important advisory and review function.
They recognize that this plan implies expenditures well beyond the historic norm, and that full implementation of this plan may be seen as competing with other University needs. The University should continue its efforts to increase revenue streams for information technology. Achieving fully the vision outlined in this plan may depend on increased state and federal funding, and on external partnerships, both national and international, with government, industry, and others in higher education which can help IU advance to a position of leadership in the application and use of information technology.



http://www.indiana.edu/~ovpit/strategic/b_.html

Friday, August 22, 2008

blog#2.3MSN USES DOTMOBI MOBILE DATABASE

I researh that MSN Mobile group will use dotMobi's DeviceAtlas mobile device database to help develop and deliver mobile-aware content to its customers.
DeviceAtlas offers a set of existing mobile device databases which contain attribute information for more than 5,500 devices around the world, including mobile devices such as the Apple iPhone, RIM Blackberry, Nintendo DS Lite and Amazon Kindle.
dotMobi offers DeviceAtlas for free to mobile Web content developers worldwide, as well as low-cost versions for enterprise use.
In striving towards its goal to meet the needs of its mobile Web users, MSN Mobile plans to use DeviceAtlas to better understand the mobile capabilities of its customers and deliver content based on those needs.
International call provider Morodo has also adopted DeviceAtlas as its in-house standard. Morodo required a solution to handle the thousands of different phones and operators around the world in order to promote and provision MO-Call, a software-based service that offers low-cost international calls direct from a mobile phone.The company decided to use DeviceAtlas to provide its users with a seamless experience for its MO-Call service.

Wednesday, August 20, 2008

blog#2.2How company protect from nternet risk?

As what i have reseach MercuryInsurance and its affiliated companies appreciate the trust place in them when the costumer ask to help protect thier assets. the costumer must trust them with thier private, personal information when they purchase insurance from them, and they are committed to protecting this information. Mercury does not sell information about them to others.
Mercury uses secure technology, which encrypts information as it crosses the Internet. They can tell if you are visiting a secure area by looking at the padlock symbol on your browser screen. If it is "locked," you have a secure session.
Mercury has security measures in place to protect the loss, misuse, and alteration of your personal information. Our servers are located in the United States of America and are designed to prevent unauthorized acces.
MercuryInsurance.com contains links to other Web sites. These other Web sites are not under Mercury's direct control, and they may collect information about you that Mercury does not. We are not responsible for the privacy practices or the content of linked Web sitesProtecting Your Mercury Insurance protect Personal Information from Unauthorized Access bylimiting employee access to customer information to those employees with a legitimate business reason for such access. They maintain physical, electronic and procedural safeguards to protect your personal information from being accessed by unauthorized persons. They also conduct regular risk assessment, risk management and control, and oversight of our service providers to assure the effectiveness of these safeguards