Friday

Data Mining

     Data mining, the extraction of hidden predictive information from large databases, is a powerful new technology with great potential to help companies focus on the most important information in their data warehouses.

Data mining tools predict future trends and behaviors, allowing businesses to make proactive, knowledge-driven decisions. The automated, prospective analyses offered by data mining move beyond the analyses of past events provided by retrospective tools typical of decision support systems. Data mining tools can answer business questions that traditionally were too time consuming to resolve. They scour databases for hidden patterns, finding predictive information that experts may miss because it lies outside their expectations.

Most companies already collect and refine massive quantities of data. Data mining techniques can be implemented rapidly on existing software and hardware platforms to enhance the value of existing information resources, and can be integrated with new products and systems as they are brought on-line. When implemented on high performance client/server or parallel processing computers, data mining tools can analyze massive databases to deliver answers to questions such as, "Which clients are most likely to respond to my next promotional mailing, and why?"

This white paper provides an introduction to the basic technologies of data mining. Examples of profitable applications illustrate its relevance to today’s business environment as well as a basic description of how data warehouse architectures can evolve to deliver the value of data mining to end users.

What can data mining do? 

Data mining is primarily used today by companies with a strong consumer focus - retail, financial, communication, and marketing organizations. It enables these companies to determine relationships among "internal" factors such as price, product positioning, or staff skills, and "external" factors such as economic indicators, competition, and customer demographics. And, it enables them to determine the impact on sales, customer satisfaction, and corporate profits. Finally, it enables them to "drill down" into summary information to view detail transactional data.

With data mining, a retailer could use point-of-sale records of customer purchases to send targeted promotions based on an individual's purchase history. By mining demographic data from comment or warranty cards, the retailer could develop products and promotions to appeal to specific customer segments.
For example, Blockbuster Entertainment mines its video rental history database to recommend rentals to individual customers. American Express can suggest products to its cardholders based on analysis of their monthly expenditures.

WalMart is pioneering massive data mining to transform its supplier relationships. WalMart captures point-of-sale transactions from over 2,900 stores in 6 countries and continuously transmits this data to its massive 7.5 terabyte Teradata data warehouse. WalMart allows more than 3,500 suppliers, to access data on their products and perform data analyses. These suppliers use this data to identify customer buying patterns at the store display level. They use this information to manage local store inventory and identify new merchandising opportunities. In 1995, WalMart computers processed over 1 million complex data queries.

The National Basketball Association (NBA) is exploring a data mining application that can be used in conjunction with image recordings of basketball games. The Advanced Scout software analyzes the movements of players to help coaches orchestrate plays and strategies. For example, an analysis of the play-by-play sheet of the game played between the New York Knicks and the Cleveland Cavaliers on January 6, 1995 reveals that when Mark Price played the Guard position, John Williams attempted four jump shots and made each one! Advanced Scout not only finds this pattern, but explains that it is interesting because it differs considerably from the average shooting percentage of 49.30% for the Cavaliers during that game.

By using the NBA universal clock, a coach can automatically bring up the video clips showing each of the jump shots attempted by Williams with Price on the floor, without needing to comb through hours of video footage. Those clips show a very successful pick-and-roll play in which Price draws the Knick's defense and then finds Williams for an open jump shot.

How does data mining work? 

While large-scale information technology has been evolving separate transaction and analytical systems, data mining provides the link between the two. Data mining software analyzes relationships and patterns in stored transaction data based on open-ended user queries. Several types of analytical software are available: statistical, machine learning, and neural networks. Generally, any of four types of relationships are sought:

• Classes: Stored data is used to locate data in predetermined groups. For example, a restaurant chain could mine customer purchase data to determine when customers visit and what they typically order. This information could be used to increase traffic by having daily specials.

• Clusters: Data items are grouped according to logical relationships or consumer preferences. For example, data can be mined to identify market segments or consumer affinities.

• Associations: Data can be mined to identify associations. The beer-diaper example is an example of associative mining.

• Sequential patterns: Data is mined to anticipate behavior patterns and trends. For example, an outdoor equipment retailer could predict the likelihood of a backpack being purchased based on a consumer's purchase of sleeping bags and hiking shoes.

Data mining consists of five major elements:
• Extract, transform, and load transaction data onto the data warehouse system.
• Store and manage the data in a multidimensional database system.
• Provide data access to business analysts and information technology professionals.
• Analyze the data by application software.
• Present the data in a useful format, such as a graph or table.

Different levels of analysis are available:
• Artificial neural networks: Non-linear predictive models that learn through training and resemble biological neural networks in structure.

• Genetic algorithms: Optimization techniques that use process such as genetic combination, mutation, and natural selection in a design based on the concepts of natural evolution.

• Decision trees: Tree-




Reference:
http://www.anderson.ucla.edu/faculty/jason.frand/teacher/technologies/palace/datamining.htm
http://www.thearling.com/text/dmwhite/dmwhite.htm
http://www.google.com.my/imglanding?q=Data+mining&um=1&hl=en&sa=N&tbs=isch:1&tbnid=tA3K6cEcyXl3gM:&imgrefurl=http://www.datapult.com/Data_Mining.htm&imgurl=http://www.datapult.com/images/DiagramDataMining.jpg&ei=RQ2MTdj_OsvxrQeepezkDQ&zoom=1&w=620&h=526&biw=1280&bih=617

Structured Query Language (SQL) - Basic Concepts

Structured Query Language (SQL) 
It is a non procedural language and it is a database language.

Categories in SQL commands 

There are 3 broad categories in SQL commands. They are namely
• Data Definition language (DDL)
• Data Manipulation Language (DML)
• Transaction Control Commands

Under each category there are many SQL commands. Let us see each in brief.

Commands under Data Definition language (DDL)
This category include creating, dropping and altering table commands

CREATE TABLE is used in creation of table(s).
SYNTAX: CREATE TABLE tablename (colname col definition, colname col definition…);
ALTER TABLE: If you want to modify a table definition we can use this command. This command is used to alter column definition in table.
SYNTAX: ALTER TABLE tablename MODIFY (Column definition);
DROP TABLE: This command is used to remove an existing table permanently from database.
SYNTAX: DROP TABLE tablename;

Commands under Data Manipulation Language (DML)
INSERT: This command is used to insert rows into the table.
SYNTAX: INSERT INTO tablename VALUES (value,value,….);

SELECT: This is used to select values or data from table
SYNTAX: SELECT column name1, column name2, …. FROM tablename;

If we want to select all column values from a table then SQL command use is
SELECT * from tablename ;

DELETE: In order to delete rows from a table we use this command
SYNTAX: DELETE FROM tablename WHERE condition;

Based on the condition specified the rows gets fetched from the table and gets deleted in table. Here the WHERE clause is optional.

UPDATE: This SQL command is used to modify the values in an existing table.
SYNTAX: UPDATE tablename SET columnname = value, columnname = value,….. WHERE condition;

The rows which satisfies the WHERE condition are fetched and for these rows the column values we placed in command above in SET statement gets updated.

Commands under Transaction Control Statements
ROLLBACK – This SQL command is used to undo the current transaction

SYNTAX: ROLLBACK;

SAVEPOINT: This is used to identify a point in a transaction to which we can later rollback.

SYNTAX: SAVEPOINT savepoint_identifier;

COMMIT: This command is used to make all changes permanent in database and also marks the end of transaction.

SYNTAX: COMMIT;

Always it is better to commit changes to database at regular intervals since it will help loss of data or loss of work done when computer shuts due to unavoidable reasons.

Having known about the broad categories of SQL commands let us see some more SQL important terminologies.

Constraints Handling in SQL: 

Constraint Handling can be done in two levels namely:
• Column Level
• Table Level

Some of the Constraints used in SQL are:

The keyword NOT NULL marks a column that the particular column cannot contain null. By default column contains null unless we define the constraint NOT NULL. This is a column level constraint as it can be defined for columns only.


PRIMARY KEY
A column or a group of columns together can be defined as PRIMARY KERY. If a column or a group of columns are defined as a PRIMARY KEYS then the value of the primary key cannot appear more than once in the table. Also those columns defined as primary keys cannot have null values in it.

A table requires a key which uniquely identifies each row in the table. This is entity integrity. The key could have one column, or it could use all the columns. It should not use more columns than necessary. A key with more than one column is called a composite key.

A table may have several possible keys, the candidate keys, from which one is chosen as the primary key. If the rows of the data are not unique, it is necessary to generate an artificial primary key.


REFERENTIAL INTEGRITY
The table on which the column or a combination of columns is defined by this constraint is called the foreign key is called child table. When this constraint is defined a relation is defined between this table which has the foreign key and a table that has the primary key in relationship with this. This is called as referenced key. The table which has the primary key or in other words the referenced key is called as parent table.

SQL Functions to Handle Arithmetic Operations
All these SQL arithmetic functions described below operate on numerical values only and are used to get data as per users required format.

Some of the functions are:

• To find the absolute value of a number we can use the SQL function ABS (number);
• To round a number to a specified number of decimal places SQL command used is
   ROUND (number, number of decimal places to be rounded);
• To convert a char to a number SQL function used is TO_NUMBER (char value);

VIEW
This is an important concept in SQL. A View is nothing but a window of an existing table. In other words it is a logical representation that is created from one or existing base table. After creation of view it can be used just as a base table. That is one can query or select values of data’s from views and it also possible to update a view.
Views are created by suing CREATE VIEW command in SQL
SYNTAX: CREATE VIEW viewname AS SELECT statement

One of the important points to consider while a user uses views is that we have seen that vies are created from a base table and if suppose the base table is deleted after which if a user tries to use or access the view error will occur.

SYNONYMS:
It is possible to refer a table with a different name and this done by using CREATE SYNONYM. It is possible to create synonym for tables as well as views.

SYNTAX: CREATE synonym name FOR username.tablename;

GROUP Functions
We have seen before arithmetic functions which operated on numerical value and returned a single value for each single row taken ass input. But there may be occasions where one might require several rows to be grouped and the result of the grouped rows might be needed. To handle such situations GROUP functions in SQL helps. There are number of group functions available in SQL. Let us see some of them:

Average:
To calculate the average of a group of values SQL defines the function AVG (column name)

Counting number of values:
If we want to count the number of values in a particular column then we can use the SQL function COUNT (column name)

Maximum:
To find the maximum among the column values SQL function MAX (column name) can be used

Minimum:
To find the minimum among the column values SQL function MIN (column name) can be used
There are many more SQL commands and terminologies in SQL but the above gives only an overview of the basics of SQL.








Refence:
http://www.exforsys.com/tutorials/programming-concepts/sql-basic-concepts.html
http://db.grussell.org/sql1.html

Thursday

TRANSACTION PROCESSING SYSTEM (TPS)

Transaction Processing Systems were the exclusive domain of mainframe computers. Typical examples of such systems would be Airline Reservation Systems, Banking Systems, or the Accounting System of almost any large company. Because of this, Transaction Processing Systems are mostly unknown to the world of personal computers.

But all of this is about to change drastically, and it's all because of the Internet. Today, many small companies, non-commercial organizations, and even private individuals are discovering applications that can benefit from a Transaction Processing System.

The main problems addressed by Transaction Processing Systems are:

  • the need to handle hundreds, even thousands of simultaneous Users
  • the need to allow many Users to work on the same set of data, with immediate updating
  • the need to handle errors in a safe and consistent manner

Transaction processing systems provide three functional areas:

System runtime functions


Transaction processing systems provide an execution environment that ensures the integrity, availability, and security of data. It also ensures fast response time and high transaction throughput.

System administration functions


Transaction processing systems provide administrative support that lets users configure, monitor, and manage their transaction systems.

Application development functions


Transaction processing systems provide functions for use in custom business applications, including functions to access data, to perform intercomputer communications, and to design and manage the user interface.


The services of a transaction processing system runtime environment include the following:

  • Scheduling and load balancing. Controlling the rate and order in which tasks are processed to give higher-priority tasks the best response times and to adapt to the availability of application servers and other system resources.
  • Managing system resources. Maintaining a pool of operating system resources to be used for transaction processing, loading application programs, and acquiring and releasing storage.
  • Monitoring. Monitoring the progress of tasks, suspending those waiting for input, adjusting task priorities, and resolving problems.
  • Managing data. Obtaining required data needed by tasks, coordinating resource managers (such as file servers and database managers), locking data for update, and logging changes.
  • Managing communications. Monitoring communications with users and between servers and other systems, starting communications sessions as needed, managing data handling and conversion, and routing data to the right destination.
  • Time management. Managing transaction processing in relation to the passage of time, starting tasks at predefined times, logging the date and time of events onto disk, and regularly controlling part of the business system to provide degrees of automation.

Services for systems administration and application development are described in subsequent sections.

Operations Research (O.R.)


In the last lecture, madam has mention about operating research (OR). So this time i would like to learn together with you all what actually the operating research are and what is the functions of using operating research.

Operations research (O.R.) is the discipline of applying advanced analytical methods to help make better decisions. OR will use the mathematical modeling to analyze complex situations, operations research gives executives the power to make more effective decisions and build more productive systems based on:
  • More complete data
  • Consideration of all available options
  • Careful predictions of outcomes and estimates of risk
  • The latest decision tools and technique

To achieve these results, O.R. professionals draw upon the latest analytical technologies, including:

  • Simulation==>Giving you the ability to try out approaches and test ideas for improvement
  • Optimization==>Narrowing the choices to the very best when there are virtually innumerable feasible options and comparing them is difficult
  • Probability and Statistics==> Helping to measure risk, mine data to find valuable connections and insights, test conclusions, and make reliable forecasts


There are several advantages when we are using OR to analyze:

  • Better Control: The management of large organizations recognize that it is a difficult and costly affair to provide continuous executive supervision to every routine work. An O.R. approach may provide the executive with an analytical and quantitative basis to identify the problem area. The most frequently adopted applications in this category deal with production scheduling and inventory replenishment.
  • Better Systems: Often, an O.R. approach is initiated to analyze a particular problem of decision making such as best location for factories, whether to open a new warehouse, etc. It also helps in selecting economical means of transportation, jobs sequencing, production scheduling, replacement of old machinery, etc.
  • Better Decisions: O.R. models help in improved decision making and reduce the risk of making erroneous decisions. O.R. approach gives the executive an improved insight into how he makes his decisions.

Besides of the advantages offer by OR, there is also a limitation of OR:
  • Dependence on an Electronic Computer: O.R. techniques try to find out an optimal solution taking into account all the factors. In the modern society, these factors are enormous and expressing them in quantity and establishing relationships among these require voluminous calculations that can only be handled by computers.
  • Non-Quantifiable Factors: O.R. techniques provide a solution only when all the elements related to a problem can be quantified. All relevant variables do not lend themselves to quantification. Factors that cannot be quantified find no place in O.R. models.
  • Distance between Manager and Operations Researcher: O.R. being specialist's job requires a mathematician or a statistician, who might not be aware of the business problems. Similarly, a manager fails to understand the complex working of O.R. Thus, there is a gap between the two.
  • Money and Time Costs: When the basic data are subjected to frequent changes, incorporating them into the O.R. models is a costly affair. Moreover, a fairly good solution at present may be more desirable than a perfect O.R. solution available after sometime.
  • Implementation: Implementation of decisions is a delicate task. It must take into account the complexities of human relations and behavior.




OR have a different functions according to a particular field, such as finance, marketing, purchasing, production, human resources and also R&D department.

1. Finance, Budgeting and Investments

  • Credit policy analysis.
  • Cash flow analysis.
  • Dividend policies.
  • Investment portfolios.

2. Marketing

  • Product selection, timing, etc.
  • Advertising media, budget allocation.
  • Number of salesman required.
  • Selection of product mix.

3. Purchasing, Procurement and Exploration

  • Optimal buying and reordering.
  • Replacement policies

4. Production Management

  • Location and size of warehouses, factories, retail outlets, etc.
  • Distribution policy.
  • Loading and unloading facilities for trucks, etc.
  • Production scheduling.
  • Optimum product mix.
  • Project scheduling and allocation of resources.

5. Personnel Management

  • Selection of suitable personnel.
  • Recruitment of employees.
  • Assignment of jobs.
  • Skills balancing.

6. Research and Development

  • Project selection.
  • Control of R&D projects.
  • Reliability and alternative design.
After understand (a bit only actually) i feel that OR is an uniquely powerful approach to decision making . Furthermore, it's able to use for every department in an organization. In my opinion, it would help the organization to save more money in term of purchase a different software to different department. Not only that, using one type of analytical software will make the organization to manage their data in more consistence way. It’s powerful, using advanced tools and technologies to provide analytical power that no ordinary software or spreadsheet can deliver out of the box.


Sources retrieved from:
http://www.scienceofbetter.org/what/index.htm
http://www.universalteacherpublications.com/univ/ebooks/or/Ch1/advlim.htm

Knowledge workers






Knowledge workers

Alternatively termed knowledge entrepreneurs, free agents, or human capital, constitute the fastest growing sector of the workforce in the world. Knowledge workers are those who acquire, manipulate, interpret, and apply information in order to perform multidisciplinary, complex and unpredictable work.

They analyze information and apply expertise in a variety of areas to solve problems, generate ideas, or create new products and services. Examples of knowledge workers include professionals, scientists, educators, and information system designers. Knowledge work is characterized by the use of information, by unique work situations, and by creativity and autonomy. Knowledge workers make decisions rather than physical items and work with ideas rather than with objects. Their work focuses on mental rather than muscle power and is characterized by non-repetitive tasks.


Characteristics

They are possessing factual and theoritical knowledge. Knowledge workers are conversant with specific factual and theoretical information. Schoolteachers possess information regarding specialized subject matter, teaching strategies, and learning theories.

They are able to find and access the information. Knowledge workers must therefore know how to independently identify and find such material. Such employees need to know which sources provide the information they need and how to use these sources in order to locate information successfully.


They have the ability to apply information. They use information to answer questions, solve problems, complete writing assignments, and generate ideas. Use of analogical reasoning and relevance judgment enables employees to address successfully personal and customer service-related issues.


They have strong commucation skills. Knowledge work is characterized by close contact with customers, supervisors, subordinates, and team mates. Successful knowledge workers present clearly, in spoken and written word, both factual and theoretical information. These employees listen with understanding and ask for clarification when they do not understand what is being said to them.


They are highly motivated. Because new technological developments call on knowledge workers to change continuously the way they accomplish their work, these individuals must maintain a desire to apply their talents toward incorporating new information and new technologies into their work.

Employer Perspective on Knowledge Worker

The shortage of knowledge workers makes employers concerned with attracting and retaining these employees. In order to hire and retain knowledge workers, employers may offer higher salaries, attractive work environments, and continuing educational opportunities. Employers take actions designed to attract and retain knowledge workers by creating a free-agent community, respecting knowledge workers as new bosses, and providing growth opportunities.


Conclusion

In competitive working environment, employees have the freedom to choose their work methods and work in the environments in which they function best. Treating knowledge workers as the new bosses means that management operates as a facilitator rather than as a controller of work. This gives knowledge workers the autonomy they need to complete their work as they see fit. Employers make work attractive and rewarding by providing growth opportunities, such as those that are associated with ongoing training and development, special assignments, and rotation of jobs and job responsibilities. In such ways, employers attempt to address the knowledge worker shortage.
Additionally, there are still lot more information regarding knowledge workers. I would like to provide the links so that you are able to read more on this topic :)



This article tell the stories of "How to think like knowledge worker?"
http://unpan1.un.org/intradoc/groups/public/documents/unpan/unpan031277.pdf

"Are All Employees Knowledge Workers?"
http://blogs.hbr.org/bigshift/2010/04/are-all-employees-knowledge-wo.html

"Knowledge Workers and Knowledge Work"

Types of Decision Support Systems (DSS)

What is Decision Support System?

Decision Support System is an information system that was created to support organization decision-making activities. It help the users to make decision by enable them to utilize communication technologies, data, documents and knowledge. In most situation, it may be aimed at business executives or knowledge worker.

What kind of Information Made up from Decision Support System?

Different information system consist of different information. In Decision Support System it including the information like:
  • Information on organization inventory
  • Comparative data figures
  • Projected figures based on new data or assumption
  • Consequences of different decision alternatives based on past experience

What Types of Decision Support System?

Commonly, there are five decision support system:

1. Communication-driven DSS
This kind of DSS are to help conduct a meeting, or for a group of users to collaborate. The most common technology used to deploy the DSS is a web or client server. The examples are charts and instant messaging software and online collaboration.

2. Data-driven DSS
It is mostly used by managers, staff and also suppliers. It is used to query a database or data warehouse to seek specific answers for specific purposes. It is deployed via a main frame system, client?server link. Examples: computer-based databases that have a query system to check (including the incorporation of data to add value to existing databases.

3. Document-driven DSS
This is the most common type of DSS and targeted at a broad base of users. It is useful when search web pages and find documents on a specific keywords.

4. Knowledge-driven DSS
Broad range of systems covering users within the organization seting it up, but may also include others interacting with the organization - for example, consumers of a business. Marketing usually use it to provide management advice or to choose products/services was covered.

5. Model-driven DSS
This is the complex DSS, because it help the users to analyze decisions or choose between different options. Managers and staff members use it to provide solutions to queries or problems.

Author: Dan Power
Retrieved from http://www.gdrc.org/decision/dss-types.html



SPSS Software




Do you realize that around one month ago there are a lot of SPSS workshop poster around the UTM? Actually SPSS stand for Statistical Package for the Social Sciences and released in its first version in 1968, and is among the most widely used programs for statistical analysis in social science. It has a wide variety of functions you can use for creating and recoding variables. It is used by market researchers, health researchers, survey companies, government, education researchers, and others. In addition to statistical analysis, data management (case selection, file reshaping, creating derived data) and data documentation (a metadata dictionary is stored with the data) are features of the base software.And now i would like to share with you how these functions will us or employees.

Nowadays, competitive in the market become more intense. To make sure your firm can gain more competitive advantage in the future you will need to doing a forecasting. So, organizations in virtually every industry around the globe are realizing the benefits of using data to align their current actions with their future objectives. By incorporating predictive analytic s into their daily operations, these organizations have gained control over the decisions they make every day, so that they can successfully meet their business goals. Then, SPSS is a suitable software that is able to help you.

Actually, SPSS and Microsoft Excel is same. But why i suggest that SPSS to you? Even Microsoft Excel also can be use to analyze, manipulate, provide visual comparison data and so on but it's still have something missing compare with SPSS software. By the help of the function on SPSS, it would able to enhance the function of Excel. The following example is focus on IBM SPSS.

For decades, analysts have relied on IBM SPSS Statistics to help them guide decision-making through data analysis. IBM SPSS Advantage for Excel 2007 provides selected IBM SPSS Statistics techniques, plus the ability to access, manage and analyze enormous amounts of data.

This means you can discover information in your data even if you don’t have a detailed knowledge of statistics. IBM SPSS Advantage for Microsoft Excel includes 10 procedures specifically chosen to enable business users to use advanced data preparation and analysis tools within Excel. In particular, it features procedures for conducting recency, frequency and monetary value (RFM) analysis. Wizards guide you through the steps to help you manage and explore data, find value in your large datasets and perform analysis.

  • Conduct RFM analysis
  • Easily identify groups
  • Find unusual data
  • Prepare and transform data
  • Save Excel tables to native IBM SPSS data files
SPSS offers quite a bit as a general statistics program, and is freely and widely available to everyone on campus via the labs, and if qualified, faculty or staff for personal use. There are three basic files to work with (though others are available), and SPSS has done a lot to develop its graphical user interface. If you are partial to GUI approaches SPSS is certainly ahead of some, but not all, others in that department, but that is about the only thing it has over others that would likely appeal to the applied academic researcher. I personally believe that by learned the knowledge of SPSS software, it would able to help you in your career.




Information retrieved from:
http://www.spss.com/software/statistics/
http://ittraining.iu.edu/ematerials/samples/SPSBAv8.0.0.TRUNC.pdf
http://www.youtube.com

Monday

Management Information System


DEFINITION
Management Information Systems (MIS) is the term given to the discipline focused on the integration of computer systems with the aims and objectives on an organisation.


The development and management of information technology tools assists executives and the general workforce in performing any tasks related to the processing of information. MIS and business systems are especially useful in the collation of business data and the production of reports to be used as tools for decision making.

APPLICATION OF MIS

With computers being as ubiquitous as they are today, there's hardly any large business that does not rely extensively on their IT systems.

However, there are several specific fields in which MIS has become invaluable.

* Strategy Support

While computers cannot create business strategies by themselves they can assist management in understanding the effects of their strategies, and help enable effective decision-making.

MIS systems can be used to transform data into information useful for decision making. Computers can provide financial statements and performance reports to assist in the planning, monitoring and implementation of strategy.

MIS systems provide a valuable function in that they can collate into coherent reports unmanageable volumes of data that would otherwise be broadly useless to decision makers. By studying these reports decision-makers can identify patterns and trends that would have remained unseen if the raw data were consulted manually.

MIS systems can also use these raw data to run simulations – hypothetical scenarios that answer a range of ‘what if’ questions regarding alterations in strategy. For instance, MIS systems can provide predictions about the effect on sales that an alteration in price would have on a product. These Decision Support Systems (DSS) enable more informed decision making within an enterprise than would be possible without MIS systems.

* Data Processing

Not only do MIS systems allow for the collation of vast amounts of business data, but they also provide a valuable time saving benefit to the workforce. Where in the past business information had to be manually processed for filing and analysis it can now be entered quickly and easily onto a computer by a data processor, allowing for faster decision making and quicker reflexes for the enterprise as a whole.

BENEFITS OF MIS

The field of MIS can deliver a great many benefits to enterprises in every industry. Expert organisations such as the Institute of MIS along with peer reviewed journals such as MIS Quarterly continue to find and report new ways to use MIS to achieve business objectives.


Saturday

Innovation on New Information System for Blind and Visually Impaired Inviduals

The artificial intelligence group at Freie Universität Berlin, under the direction of the computer science professor Raúl Rojas, has developed a new type of information system for blind and visually impaired individuals. Field trials are being carried out to optimize the device for future users. During the next six months it will be tested by 25 persons. The artificial intelligence group at Freie Universität is collaborating with a research group at the Telekom Laboratories headed by Dr. Pablo Vidales and the Berlin Association for the Education of the Blind and Visually Impaired e.V. The joint project is called InformA.

"InformA" is a small computer that is connected wirelessly to the Internet. The device is operated like a radio. The user can choose between different information channels. By pressing a button, the time or the weather will be announced, but there are also current newspapers available as audio files.

In addition, e-mails can be read aloud by the device. The user can answer e-mails by dictating a message. An integrated camera makes it possible to have printed documents such as letters or package information leaflets read aloud fully automatically. In more complicated cases - such as a statement of account for a heating bill - the user of the device can take a photo of the document and send it to a call center. Persons doing community service instead of military service who work for the Berlin Association for the Education of the Blind and Visually Impaired e.V. then provide further assistance. "Through the wealth of information provided by InformA, the device can also be of interest for older people without previous experience with computers, who until now have not had access to information offered through the Internet," according to the project leader, Raúl Rojas.


InformA is an example of an information appliance. Even in the age of the Internet, it is not always necessary to use a fully equipped computer for online communications. Specialized equipment, such as internet radios, can cover specific needs, if the equipment is small, portable, and easy to use.

This is the link to the research university (Freie Universität Berlin)
http://www.fu-berlin.de/en/

Importance of Information System

Information system is a set of interrelated component that collect, process, store, and disseminate information to support companies’ managerial team in decision making, coordinating, controlling, and analyzing.

It is important for companies that use an up-to-date information system to gather, assimilate, and evaluate internal as well as external information to gain competitive advantage over other firms.

A sophisticated computer information system enables companies to monitor employees, to keep managers and employees informed, to coordinate activities among divisions, or even to sell their products to customers via the internet. Moreover, in the era of information technology like this, information has become valuable organizational asset just like human resources and inventories.

Furthermore, a good information system can facilitate direct communication between firm and suppliers, manufacturers, dealers, and marketers. Together, they can create a value chain as though they were in one organization. For example, when there is an customer orders, the orders would automatically appeared on the site of suppliers. This approach can achieve "just-in-time".

However, there are also unwelcome threats in information system. Today, companies are threaten by hackers, competitors, thieves, spies, hired agents, or even from existing employees. Therefore, firms have taken measures to safeguard their system such as installing complex computer firewalls to detect hackers or purchasing expensive and advance encryption software. Also, the special units are created to manage information system in organizations.


In conclusion, information system enables companies to react, respond, cater, store, retrieve, disseminate, and control their new valuable asset that is information. Nowadays, a good information system within a company will be no longer an option; it will become a compulsory in determining success.


Group Decision Support System (GDSS)

     A Group Decision Support System (GDSS) is an interactive, computer-based system that helps a team of decision-makers solve problems and make choices. They are designed to enable a group of participants to work interactively in an electronic environment. GDSS systems help users to solve complex problems, prepare detailed plans and proposals, resolve conflicts, and analyze and prioritize issues effectively. They are excellent in situations involving visioning, planning, conflict resolution, team building, and evaluation.

GDSS are targeted to supporting groups in analyzing problem situations and in performing group decision-making tasks (cf., DeSanctis and Gallupe, 1987; Huber, 1984). 

     The name is very descriptive. A GDSS is a hybrid system that uses an elaborate communications infrastructure and heuristic and quantitative models to support decision-making.

A typical GDSS session includes four phases:

• Idea Generation
• Idea Consolidation
• Idea Evaluation
• Implementation Planning 

Applications

• Strategic Planning - Analyze the environment, develop a vision, identify objectives, and build action plans.
• Project Evaluation - Assess objectives achievement, impacts, relevance, cost effectiveness, and future directions.
• Focus Groups and Expert Panels - Elicit opinions and understand needs.
• Conflict Resolution - Compare points-of-view, understand differences, and seek common ground.
• Problem Solving - Identify causes, suggest alternatives, choose solutions, and develop implementation plans.

     The GDSS started originally from the Management Information System at University of Arizona. Some kind of problems has always been observed that are associated more with large meetings than with small meetings. By large meetings we mean meetings with generally more than 15 participants, but can go much beyond that, e.g. 40 or even 50. Some of the identified problems are: 

• time consuming;
• dominance over the meeting; and
• honesty and participation.

     The more details about these problems can be found here. However, it is important to realize that we are not therefore trying to say that small meetings do not have these above problems; these problems mentioned exist in any kind of meetings, but we are just trying to stress that they are more commonly found in large meetings. Small meetings tend to be more easily controlled than large meetings. 

     In a GDSS environment, there is usually a big room with something like 40 seats, which means that 40 people can be at the meeting at any one time. There are not only 40 seats but also 40 microcomputers. This enables every participant to have the use of one microcomputer during the course of the meeting. The reason why each participant needs a microcomputer depends on how GDSS works. 

     In the GDSS, with special computer software, the facilitator of each meeting will first make the agenda of the meeting, which will be projected onto a big screen that everyone can see. Then the participants will type simultaneously in their ideas of the topic of discussion on the individual microcomputers next to them. Then the computer will sort the ideas, and then the participants will then vote or comment on which ideas they like or they dislike. In the course of the whole meeting, GDSS stores, categorizes and prints out all the ideas, comments and vote tallies, so that each of the meeting participants will get a summary of the meeting when it ends.

     What so special about GDSS is that it enables meeting participants to simultaneously "talk", when the computer sorts and sends ideas to each of the terminal, all at the same time. That saves a tremendous amount of time, because all these are done electronically instead of manually, and the time saved will enable participants to spend more time manipulating and expressing their ideas. This can consequently increase the productivity and efficiency of the group. The time-consuming benefit also has an added bonus: when productivity and efficiency in meetings increase, it is likely that the team spirit can be consolidated, resulting in an increase of the strength of binding among team members. 

     Besides, under this GDSS, no one can dominate the meeting. This is because of another feature of GDSS. GDSS provides an anonymous scheme, so that whatever you type in the terminal (i.e. your opinion) will be protected. Under this circumstance, no one really knows who is typing what. Because of this, not a single person can dominate the meetings. In the worst case, we might say "some ideas" are dominating the meeting, but this is perfectly fine because this is as a matter of fact an aim of the GDSS: to help meeting participants voice their opinions from an idea-oriented mindset. For example, simply because you have a prejudice against person A does not mean that you are going to reject the idea being proposed in the meeting, because you do not know who is proposing that idea!! 

     Besides, this anonymity scheme will also help those team members who are shy to voice opinions. And with the anonymity, people are likely to be more honest, just as you'll say more, and more honestly on the professor's evaluation form if you know whatever you write will not affect your final grade on the course. This, of course, is because you know you don't have to worry about the consequences.

     However, whether this anonymity is good or not can be very controversial. The success of meetings supported by GDSS depends largely on the conduct of the participants. If people are taking advantage of the anonymity system by typing obscene words or foul languages, this system may be banned for the good of the organization.


Reference:

Monday

How to remove a Virus / .exe file Easey guide

Sunday

"New Folder.Exe" Virus

Regarding on the topic related to computer virus, I have one experience want to share with you. Few months ago, i copied documents into my pendrive while using computers in PSZ. Then after i went back to hostel, i opened the pendrive in my laptop. Oh my gosh, i realized that my pendrive get infected by virus. The virus then spread all over in my laptop. This virus hurt badly on my laptop. All the documents and files that i have saved in folder could not open. So i scanned my computers, but the virus is not detected.

All folders appeared as 'new folder.exe'. Other than that, it disabled the task manager. The worst is that it copies itself to all exe files and when the file is deleted another new folder.exe files are created. Not only that, i also realized that my system was running slow, this is because it had occupied my hard drive in terms of exe files. At first, i was not sure what virus it is. But, i tried to types all its criteria and search on Internet.

Finally, I found out it is a virus named 'new folder.exe'. I was so worry that all my files, documents, folders, photos and musics will be gone. The next day, i go to CICT, hope that they could help me to scan my computer and remove the virus. But the staff told me that,they only provide this service to UTM staff. I was helpless. So, i immediately seek help from some of my friends who are expert in computer. Finally, thanks god. One of my friend manage to help me to get rid of it. After this experience, i have learn a lesson that everyone should have an original antivirus tools in computers. Before this, i was using the AVG free antivirus. After this incident, I had bought myself Norton Internet Security 2011. It support three users, so me and my friend share together. It sold at RM150.

Now, i would like to share some information on the 'new folder.exe' virus. Lastly, i advise everyone should get an original antivirus programme, do not let your computer be naked and exposed to harms. :)

These are the virus removal tools and solutions:
http://www.prevx.com/filenames/X2444923814383592792-X1/NEW+FOLDER.EXE.html
http://amiworks.co.in/talk/how-to-remove-new-folderexe-or-regsvrexr-or-autoruninf-virus/
http://www.technize.com/newfolderexe-removal-tool-25/

This site contained forum or discussion on this virus.
http://in.answers.yahoo.com/question/index?qid=20091105215219AAkvojS

This is the antivirus that i am using now. You may review its specification and functionality.
http://us.norton.com/internet-security/

What do you know about Virus?


What do you understand about virus? Just a dangerous element in the computer? Element that will cost you lost your information or finance problems only? Let me share some information about virus with you today^^

Computer virus is a computer program that can copy itself and infect your computer automatically. Virus can come from every way. It does not mean if you are not connecting to internet your computer will not affected by virus. For examples, when you are using your pendrive, mp3 or anything that enable you to copy something from one computer to your computer, that mean your computer have a probability to be affected by virus. However, in my opinion, email is a medium that is more easily make your computer affected by virus.

As stated above, the term "computer virus" is sometimes used as a catch-all phrase to include all types of malware, even those that do not have the reproductive ability. Malware includes computer viruses, computer worms, Trojan horses, spyware, other malicious and unwanted software, including true viruses.

Viruses are sometimes confused with worms and Trojan horses, which are technically different. Let me tell you what is the different between them^^

Worms it can exploit security exposures to spread itself automatically to other computers through networks.

Trojan horse is a program that appears harmless but hides malicious functions.

Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious or simply do nothing to call attention to them. Some viruses do nothing beyond reproducing themselves.

I believe that everyone hate with the existing of virus in your computer. In here I recommend some of the antivirus programs that I think it’s very good to preventing the virus come to find you~~

Norton Anti-Virus (i am currently using NAV and i think this is the most user friendliness and able to help me to fight with virus that is trying to visit to my computer. Most satisfied anti-virus program^^)














AVG











Kaspersky











Attention: all of you must beware of the attachments that come together with your email. Don’t try to open the attachments that you are not expecting because virus will come with some very nasty messages to trick you to open the attachment.

For example, “your Google account is going to expire, please see the attachment for details.”

Even worse, the virus looks like it comes from an email address you recognise e.g. from admin@yourDomain.com (where 'your domain' is the domain name that you use). Virus attachments can have the following 'file extension': .exe, .pif. If you receive a .zip attachment and open it - make sure it doesn't contain a file with one of those extensions. Do not open attachments you haven't requested, even if they appear to be from people you know.

Now, you may ask, “How the viruses spoof the from-address in my email?” after you read this situation, it will help you to understand how the viruses spoof the from-address your email.

  • You have effective anti-virus software, so your computer is clean,
  • You send an email to Fred,
  • Now your email address is in Freds address book in his email software,
  • Fred does not have effective anti-virus software, and his computer has a virus,
  • The virus on Freds computer scans his address book for all of the email addresses on it,
  • The virus sends email to every address on Freds address book,
  • The virus emails do not say they are from Fred!, The virus pic another addresses from Fred's address book and puts it in the 'From field' in the outgoing email. The virus may combine the name from one address and the domain from another, creating a 'from address' that does not exist.
  • These emails are received by other computers, which detect the virus (because they have good anti-virus software) and reject the email,
  • When the receiving computer rejects the viruses email it sends an 'Undeliverable' to the sender e.g. something like 'Subject: /Delivery Notification: Delivery has failed'.
  • But! The 'Undeliverable' note goes to the spoofed from address (not to Fred) e.g. the 'Undeliverable' note could be sent to you.
  • Often there is no trace of Freds real address in the virus email or the 'Undeliverable' note, so you cannot tell whose infected computer is sending these emails.

As a conclusion, if you don’t want the virus give any trouble for you, please purchase and use the ORIGINAL anti-virus software. However, with original anti-virus it’s still not enough for you to fight with virus but you need to update your antivirus frequently^^

Thanks You~~

Information retrieved from:

http://www.news-medical.net/health/What-is-a-Virus.aspx

http://wordsandpeople.com/security/tips-to-prevent-computer-viruses.htm


I made this widget at MyFlashFetish.com.