.

Monday, April 15, 2019

IT Professional Presentation Essay Example for Free

IT Professional Presentation EssayPresentations atomic f any 18 meant to be professional with a lot of cause required in the structuring of speech and the assurance of lay crossways the right capacity. Professionals in any field or walk of life penury to bring a good speech which would make them better donationers and whence a mark come toable organism among either the disparatewise employees. An organic law has hundreds and thousand and some clips even much than that employee in number. To make i self noticeable in the eyes of the one that matter, makes a lot of difference in the c beer growth. Hard work is something that everyone does nevertheless few argon those who argon able to present it in a manner that enables the top officials to notice you. in that respect be some(prenominal) ways to present and presentations argon becoming increasingly common in todays beingness. PowerPoint and Flash be the most utilized of solely simply written manner of a ssistance and even plain verbal speech is also presentation. All these means of presenting are reassert depending on the situations and the matter to be presented. Hence, it is not the material that matters to a large extent precisely its what you say right at the right time is what matters. IntroductionInformation system dirty dog be any organised combination of hatful, hardware, software, communication networks, and data resources that collects, transforms, and disseminates information in an organisation. Like any other system operates within an environs, information system and engineering science are very authoritative in modern-day problem organization, beca drug abuse they contrive become a significant component for success in any organisation, such(prenominal) as university, healthcare centre and family. However these are the most important and vital in profits transmission line area because it cannot be managed without information system and engine room.In addi tion internet business can amplification their sales and profits by implicating efficient and effective e-commerce which is one of major parts of information system. There are big names that are involved with the IT industry such as the Amazon. com which is solely an internet found company. Other multinationals such as McDonalds are also involved in it despite being a fast food organization. Brief information asking the two organizations are as follows. Critical summary of the Presentations Things they are Achangin-1 talk around the computer and Information engineering science details.It starts off with telling the memory cognitive content of a computer. The antithetical memories and the capacities that a computer and its hardware has, is explained in the presentation. Along with that it talks about the computer networking and the usage of broadband. It had become increasingly famous and popular in the current years and most of the people in the world accept it. Things the y are Achangin-2 on the other hand talks about other energy sources such as batteries and cars and how their mechanism works.These two mentioned sources pose also become increasingly important all every sic their years for day to day life. Along with that it has compared their mechanical sources with human body and head teacher and has talked about the structure of a robotic body. Delivery Channel Strategy Delivery Channel Strategy defines the objective of pitching channel which are Projecting and representing the brand defending and developing the active consumer base, obtaining new clients and meeting inborn service needs. It also talks about the benefits of branches, which branches are used more for financial go and why.It explains self servicing and explains the benefits of automated machines which empower the customers. It schools into storey the different product used by the financial institutions and their usage. secern Implications of Delivery Strategies In order to have an effective suffery strategy, one needs to take into account all the aspects that come onwards that as vigorous in order to execute the plan in the most effective manner practical. The following delivery handle is explained with an example of Amazon. com, the online trading place. a) Goods, products, ecommerce solutionIt started off as a book store with an online presence but later on it kept on adding products in its portfolio and nowadays they have different categories in which they divide their products into such as Books, Music and Movies, wearable and Accessories, Computer Office, Consumer Electronics, Food and Household, Health and Beauty, Home and Garden, Kids and Toys, Sports and Fitness, Tools and Automotives, Bargains and Gifts and inclination of an orbit. There are further bifurcations within these categories as well which fractures further variety to the customers.There services are divided into the categories of Make Money, For the Community, For Deve lopers, For Advertisers and Partner run. .A9. com caters to the information content requirement which is a search engine present instantaneously on the Amazon. com. (Amazon, 2007). b) Performance and services The existence of the web pose over this long period of time indicates its force and the level of customer satisfaction. The website is very well put in concert so that the customer can easily find their way through to their desired destination. Amazon. com, BN. com, and Half.com arent acquiring any complaints at all because they are very simple to use and to understand. Each of these web sites are made for the computer illiterate or notwithstanding plain lazy (B2C e-commerce forge and performance for Amazon. com, BN. com, Half. com, n. d. ). c) Personalization The site lay out of the website is also user friendly and it takes no time to find where one wants to go unlike the complicated sites which are hard to browse. It offers the customer to personalize by offering a sho p cart just like an actual shopping mall to create a sense of personalization.They have many products and services and different categories of all their items. They also have the option to make Your Store, this is where they store all the information that you like the best and what products you are most interested in (B2C e-commerce design and performance for Amazon. com, BN. com, Half. com, n. d. ). This gives a sense of individuality to the customers wanting them to come back for a reprimand. d) Communities and Look and Feel Amazon. com also offers see forums for the customers in order to discuss their views and opinions.This is also one reason for the customers to visit the website. Internet Chat Headset fabrication is one of the examples of their chat forums and virtual customer online communities. The storefront of Amazon. com has been rated high as it offers a number of varieties on the page and also provides clear layout for the customer to assess where they are required to go. e) Incentives Amazon. com offers different incentives to the customers such as bargains of Friday Sales, Todays Deals and many more.It offers auctions and personal accounts to give the customers a sense of individuality and personalization encouraging them to visit more often. f) Security Reliability For such sites security is utmost important and in that respectfore it can be said that Security and Privacy Policy for these are very well put unneurotic and are very private and one has to go through various checks and double checks for e-mail and parole verifications. This visits that the website company and you have the right passwords and e-mail addresses for your privacy and protection.They also have protects programming on their sites to ensure that no one can get you password, e-mail address, and most important your honorable mention post-horse number (B2C e-commerce design and performance for Amazon. com, BN. com, Half. com, n. d. ). g) Successful achievement One of the many highlighted features of the website is that very recently Amazon. com is to Webcast Investor Conference Presentation Morgan Stanley Technology Conference ( production line News, 2007) which is considered to be a enormous achievement for the organization along with earning million of dollars of revenue.Another one of its achievements could be the introduction of software called the Amazon S3 which is a simple storage service that offers software developers a highly scalable, reliable, and low-latency data storage infrastructure at very low costs (Amazon Web Services Launches Amazon S3, a Simple Storage Service for kookyware Developers, 2005). ethics and Professionalism in the ICT discipline morals and Professionalism in the ICT discipline talks about the immenseness of the code of ethics in the professional environment not for ones career but for the sustainability of its moral observes.It describes Ethics as Doing good, not doing bad, Not screwing people, Only scr ewing the competition, Letting the competition screw you, Doing things right, Doing the right thing. list Implications These key implications of Ethics in IT are explained with respect to the example of Amazon. com. For such sites security is utmost important and thusly it can be said that Security and Privacy Policy for these are very well put together and are very private and one has to go through various checks and double checks for e-mail and password verifications.This ensures that the website company and you have the right passwords and e-mail addresses for your privacy and protection. They also have protects programming on their sites to ensure that no one can get you password, e-mail address, and most important your credit card number (B2C e-commerce design and performance for Amazon. com, BN. com, Half. com, n. d. ). run a risk Assessment of Ethics in IT Despite the existence of internet over the years, it has still not been able to gain want regarding the transactions online. Amazon.com along with other organization based online for merchandiseing face the challenge of assurance of security to its customers. As for Amazon. com, it failed to provide trust in regard of security to e-commerce project because they did not concern about adept risks. Despite the presence of a huge customer base, a lot of potential customers are hesitant to buy from amazon. com because of this particular reason. However, there is a long procedure regarding the security of credit cards and its personal information which is utilized by many websites present today.Many sites that accept credit cards claim they are secure when they have an encoding certificate. This is where you can see the padlock symbol at the bottom of the screen. The encryption certificate encodes the message with the credit card details when it is sent and the organization issuing the certificate (e,g, Thawte or Verisign) verify the business earlier they issue it. (E-commerce Security, n. d. ). Ama zon. com follows the same long procedure of ensuring that the customer feels safe but even therefore there is a lot of chance of stealth of the information and its misutilization mightiness lead to disastrous losses to an individual.This is the idolise that stops the potential customers from entering into the market of internet. If credit card numbers are stored on a server they are still potential targets for a hacking attack. Afferent Media protects its server with anti virus and firewall systems. Its crowning(prenominal) defense though is that it does not store any credit card numbers (E-commerce Security, n. d. ). Hence, despite the effort, collectible to adept risk involved Amazon. com is facing the same threat as many other online retailers. Although Amazon.com has electropositive a trustworthy image over the years but when it comes to monetary losses people are hesitant to take risk as the loss incurred might get too huge to counter. This proficient risk can however be countered in order to gain the potential customers that are waffle at the moment. This can be countered if transactions are carried out in real time, in just the same way as an EFTPOS machine. The message is encoded and sent to the bank, if the card passes the checks then funds are transferred directly to the vendor. This is just like when you buy petrol or shop in a supermarket.The vendor swipes your card in and EFTPOS machine, they do not store the card details. (E-commerce Security, n. d. ). Like every weakness, if this factor is also address in its early stages it might not even classify as a problem and may be included in one of the challenges but the more Amazon. com delays it, the more it might lead to accident and reduction of customer base. It has the advantage that the solution has already been identified, therefore the company just needs to in corporeal this procedure in its security e-commerce procedure and keep proper checks and balances over a period of time an d the job is done.Once the authenticity of the procedure is verified, it would not be hard for customer to develop trust in the online services. Despite the overall success of the organization, there are still factors that it needs to counter before the issues convert into real threat to the existence of the organization. The security factor is always vital in e-commerce as no customers would want to risk their monetary gains for shopping online. Lean Thinking Lean Thinking is a presentation which defines the importance of customers with the help of practical examples taken from different scenarios.It also takes into account the impact of repute on customers choice and the importance of value in a product. Key Implications McDonalds is a world wide known brand and hence it is famous and loved all around the world for its customer hospitality. A fast food chain, so customer friendly has also made use of the IT sources which is explained as further. The company is a fast food chain across the world known by the name of McDonalds. It is world renowned and is among the top most fast food chains across the globe. It has different kinds of fast foods in its menu ranging from rapid on-the-go burgers to healthy breakfasts and other food items.The organization is known for its character reference and variety in food across the globe along with paying its full due to the corporate and social responsibility to the members of the society. Our organization not only is concerned about regular people who are health or weight conscious but also make sure that people with veritable individual problems are also given attention to. The stainless nutrition information is available on its website and can be completely relied on as it is taken from from testing conducted in accredited laboratories, create resources, or from information provided from McDonalds suppliers.The nutrition information is based on standard product formulations and parcel sizes. All nutrition informa tion is based on average values for ingredients from McDonalds suppliers throughout the U. S. and is round to meet current US FDA NLEA guidelines (McDonalds USA, 2006). Despite of enjoying the top most notches in most of the countries we are present in it is made sure that the organization does not lag in its due responsibility towards its customers, employees or the society it caters to which is evident by the brochure of Corporate Responsibility by McDonalds.This brochure is known as The McDonalds USA Corporate Responsibility Brochure and another terce worldwide corporate responsibility history has been published recently in 2006. It has the ability to adapt to sylvan to country environment and culture. It pays utmost importance to kids and their meals and therefore because of that reason we have specialized meal for children as well. These meals are set with kids preferences in mind and offers incentive such as toy gifts which children can enjoy along with their respective m eals. Capabilities and Potential with Risk AssessmentMcDonalds is known for its customer service and for increasing indulgence in the technology sector as well. McDonalds has some of Information technology involved in its procedures as well as to offer to the customers. As a Manager it is very important to be well equipped and well informed regarding the experience of the on-going dynamics in the information technology sector of the country. The advancement of the organization in the information technology sector is indicated by the fact that it offers one of the most novel technologies of the information system which is the McDonalds radio receiver Connectivity.It offers Wi-Fi service to its customers so that they can even bring their work to McDonalds along with enjoying a good meal. Its not just limited to United States which is one of the most technologically equipped country of the world but 7,000 outlets around the globe. We believe in giving the best to our customers and Wi- Fi is a part of it as We believe in bringing you innovative and convenient services that enhance your McDonalds restaurant visit, and Wi-Fi is a perfect example.As McDonalds continues to deliver fast and friendly food service at more than 30,000 convenient locations around the world, you can now enjoy the possibility of staying connected with friends, family and co-workers (McDonalds Wireless Connectivity, 2006). Apart from this, our organization has even stepped in introducing a technology that would bring into use the real time network used by huge and well-known places such as Wal-Mart. In order to manage its hardware and software in different location across the globe, it took help of the Fujitsu Philippines Incorporation to implement a system the system.The system is called Help Desk which enables in the monitoring of the stemma system and the circumspection of the SMS and documents. Due to Help Desk the technical support service now take half(prenominal) the time it previou sly did. (McDonalds Philippines remediates customer service via technology, 2007). Due to high volume of sales of McDonalds around the globe, the manual(a) or low level storing data system is not anymore a product of efficiency for the organization. Therefore, it has moved a step forwards and The PC POS system replaced proprietary computer registers that delivered information to in-store processors.These computers are a McDonalds restaurants black box, recording information on operations such as an individual stores chalk up sales for the day, and the number of patties, buns, cups and other products used, and delivering it back to the McDonalds mainframe systems in Oak Brook each nighttime over a modem connection (Food, Folks and Forecasting, 2006). We as Managers also make use of this technology to place orders to the suppliers for replacement as well, hence making tasks easier for everyone of storing the large bulks of information everyday.The Future of Business Information f ormation The Future of Business Information administration talks about the consultancy by Dennis Keeling. It takes into account the trends in business cycle, the types of business applications and the industry changes. It talks about different operating systems and system designs and data file structure. Key Implications of The Future of Business Information System The most upcoming trend in the in store(predicate) is outsourcing. Outsourcing is a trend that has recently become very popular among the multi-million and multi-billion organizations around the world.Outsourcing often refers to the delegation of non-core operations from knowledgeable production to an external entity specializing in the management of that operation (Wikipedia, n. d. ). There are various functions of an organization that are not the main operations and therefore can be sourced to other parties such as Business segments typically outsourced include information technology, human resources, facilities and real estate management, and accounting. Many companies also outsource customer support and call center functions, manufacturing and engineering (Wikipedia, n. d. ).There are several reasons why one would outsource their operations to an outside party, which might include the get of exploiting specious labor in case of triad world countries or utilizing the efficiency of specialized expertise in a particular field of work. Outsourcing might also involve reducing the cost even it effects their flavor to a slight extent. IT outsourcing helps improve the efficiency of IT department as after outsourcing there is special attention given by an entire group people to only one operation, hence in return increasing its importance and therefore its efficiency.IT outsourcing might also be done due to cost reduction by utilizing brains that are unstrained to work for less as compared to the human resource that is present domestically. Along with a lot of benefits in outsourcing, there come s a bucket full of criticism as well. The critics believe that outsourcing reduces the quality of the operation outsourced hence reducing the overall performance of the organization. Hence, it is believed that organizations reduce their cost by compromising on their quality and exploiting cheap labor by outsourcing.On the other hand proponents of outsourcing believe that arguing that outsourcing leads to lower product quality is pointless because if it were true, consumer demand will force firms to shift back to producing the good or service in-firm rather than out-firm (Wikipedia, n. d. ). Risk Assessment regarding Future of IT With respect to outsourcing, the possible risk or problems that IT could face in the future are as explained further. There are different outsourcers depending to where they are located.They include three kinds that are outsourcing, onshore outsourcing and offshoring. Although these terms are used as a replacement of the other but their meaning is differen t from one another. Outsourcing is the allocation of an organizations operation to another responsible party. Now the difference lies in the presence of this third party, that is, if the third party is located outside the soldiery country, it is known as onshore outsourcing.While on the other hand, offshoring is when an operation of an organization is taken to another country without transferring control to the third party. Hence the difference is of transfer of control to another party, that is, the power remains within the organization in case of offshoring while in offshore outsourcing it is transferred to the third party. In case of IT offshore outsourcing, the main country that receives the majority deals is India due to its IT success in recent years with able IT graduates and world-renowned IT universities present in India. varied problems might occur due to the location of the outsourcer, that is, in case of offshore outsourcing, the cost of checks and balances, transporta tion, dealing across distances might end up being equal or surpassing the cost cut that is the purpose of outsourcing. Hence, nullifying the effect of outsourcing with the cost incurred for distant dealing. One issue offshoring of technical services has brought more attention to is the value of education as an alleged solution to trade-related displacements (Wikipedia, n. d. ).The foreign location of the outsources in case of offshore outsourcing and the exapanding of business globally in case of offshoring might also be subject to crticism due to the reason that it causes the host country to suffer with opportunities travelling to other countries rather than being available to others. Hence, along with certain positive outcomes, outsources is subjected to a sufficient amount of criticism as well. In order to counter the crticism, it would have to scrutinze itself and sequester such drawbacks. Weaknesses in Current Information Technology CapabilitiesHowever, the McDonalds journey m ay be chop-chop piteous towards the success ladder but there are several pitfalls that have occurred in its Information System and its capabilities. For us as managers, it is very important to identify those pitfalls and rectify them as soon as possible in order to avoid any forthcoming problems or issues. The technological world is an extremely rapidly evolving environment, with information becoming obsolete after a certain period of time. Hence, it is very important for the Managers to take that into account and be on the constant guards to protect their image.Wi-Fi is a very innovative and healthy technology but in those countries that are well equipped to support this kind of technology and the citizens prefer to have it in a restaurant. As per a managements perspective, to implement it in a country like Bangladesh or Pakistan, where there isnt much knowledge of technology among the masses, would not only be unfeasible but also irrelevant expenditure. As for the PC POS System implemented, it does save time but being a Manager it is very important to receive the detailed information to further process it for other uses which it failed to do.The data that is batch-dumped to the McDonalds mainframe system in Oak Brook every night doesnt offer the detail McDonalds executives needed and, worse, took as long as a week to be compiled analyzed and distributed to managers who would then order more patties, buns, etc. from McDonalds vendors. Hence, it needs to take that into account as well. Professional Presentations Requirement of Soft Skills All the organization of such calibre are required to have high aptitude military group in it with the presence of hard skills as well as soft skills.In order to sell your product, one has to make sure that its presentation and the its communication is up to the mark. The more the people are convinces the more is the popularity of the product or service meant to be. It is very important for a professional to possess the sk ills of speaking well and hiring such professional can be a tedious process but all the effort is worth it. Hiring is a very difficult process it takes a lot of time, patience, and money. Gone were the days when management only looks for technical skills alone, now, they are more focused with soft skills referring to non technical skills of an individual.What are soft skills? accord to Mannering (1998) they are considered to be harder to identify, to distinguish. Ironically, for many managers, the soft skills are the hard skills. Ask anyone who has had to manage change, deal with organisational politics, or build a disparate group of people into an effective team (Holbeche, 2006). Platinum skills are developed through training and delegation, active listening, giving and receiving feedback, and creating a motivational environment. (Topchik, 2004). Companies Who Values Soft Skills Fujitsu hithers an excerpt from an article Hi-tech soft skills IT Training Jan2007Fujitsu Services has set up an international Management Academy, headed by Paula Graham (right), to help IT professionals brush up on their interpersonal skills As they procession up the career ladder, many IT professionals could find themselves at a crunch point. They have been hired and value primarily for their technical and engineering abilities, but as they become more senior they will be expected to adopt more custodial and managerial responsibility over junior colleagues. But where, along the way, were they supposed to have picked up these managerial and interpersonal skills?IT giant Fujitsu Services is tackling the problem of helping the technical person be a better people manager with a new company-wide experiment in delivering soft skills training at leadership level. This programme is about raising the bar on the organizations people management skills, adds Jeremy Hill, London-based managing director of training partner DIEU. Fujitsu employees are comprised mostly of IT professionals, yes they have all the various technical skills that needed to become one of their programmers, and they keep on giving other technical trainings in order to stay competitive and knowledgeable on diverse IT trends.And yet, management feels they lack something, they need to brush up with communication skills. Employees needed to be more effective communicators they need to get their message across clearly with the people they are dealing with. Communication is very essential and powerful woodpecker not everybody has the knock off communication skills, and essentially improvement on this part will have a big impact both for employees and their company.

No comments:

Post a Comment