SlideShare una empresa de Scribd logo
1 de 17
ENTERPRISE 2.0
INFORMATION TECHNOLOGY
FOR BUSINESS
By:
Ugochukwu Ezeagwula
TREM Int’l Headquarters
Sunday 4th August, 2013
ENTERPRISE 2.0
OUTLINE
• Opening
• IT in Business Operations
• General Purpose Application Software
in Business Operations
• Case Study: Wave Accounting
• Marketing 2.0: Online Marketing
• Cyber Safety Tips
• Malicious Codes
• Avoid Inappropriate Materials
• Escaping a Mousetrap
• Social Media Privacy & Geo Location
Same Product. Times have changed.
Opening//
“Information technology and business are becoming
inextricably interwoven. I don't think anybody can
talk meaningfully about one without the talking
about the other.”
- Bill Gates
Opening//
IT in Business Operations//
Management, Accounting, Finance, Legal
Human Resource Management
Research & Development
Purchasing
Make
Product/
Service
Market
Product/
Service
Deliver
Product/
Service
Value
Add
Value Chain
Support
Activities
Primary
Activities
General Purpose Application Software
In Business Operations //
•Spreadsheet software allow manipulation of data
(figures) in rows and columns. Useful for charting
and graphing. Can also be used for basic database
functions. Example is Microsoft Excel
•Data management software supports the storage,
retrieval, and manipulation of data.
There are two basic types of data management
software:
- Simple filing programs e.g. Microsoft Access
- Database management systems (DBMSs)
e.g. Oracle
General Purpose Application Software
In Business Operations //
•Word processing software allows the user to
manipulate text, rather than just numbers,
e.g. Microsoft Word.
•Graphics software allows the user to create, store,
and display or print charts, graphs, maps, and
drawings. The three main types of graphic
software are;
- Presentation Graphics
- Analysis Graphics
- Engineering Graphics
General Purpose Application Software
In Business Operations //
•Multimedia Software
• Communications Software. To share, relate or
exchange information. e.g. Microsoft Outlook or
web email programs.
•Workgroup software, helps teams work together
by sharing information and by controlling
workflow within the group.
•Accounting Software such as
Quickbooks or Peachtree or SAGE
[Case Study: Wave Accounting]
General Purpose Application Software
In Business Operations //
•Enterprise Resource Planning software (ERP)
consists of programs that manage a company’s
vital operations, from order taking to manufacturing
to accounting, e.g. SAP Business One
•Customer Relationship Management (CRM)
Software
Chances of selling a product to an existing customer
far exceed those of selling to a new customer
Examples of CRM Software include:
- Microsoft Dynamics CRM (might be too big for SMEs)
- SalesForce
•A peep into the Google App Marketplace will
surprise you!
Case Study: Wave Accounting //
Marketing 2.0: Online Marketing//
• Websites
• SMS
• E-mail
• Web Adverts
• Social Media
Cyber Safety Tips//
Any
Malicious Codes//
Any software created
to cause damage,
Steal information, or
use up resources on a
computer or a
network.
• Viruses
• Worms
• Trojan Horses
• Spyware
Security Precaution
Turn on Firewall, update
OS &
Avoid Inappropriate Materials//
Apply caution in clicking on
• Advertisements
• Keyword Searches
• Typo Squatting
• E-mail Spam
• Phishing
• Steganography
Spam e-mails are harmful nuisance that can
lead
To identity theft.
To minimize identity theft, examine a
company’s
Privacy policy before shopping online. Look
out for the padlock sign or the HTTPS in the
URL.
Escaping a Mousetrap//
Never click “Ok” on popup windows
When mouse trapped. Instead, follow
The keyboard shortcuts:
• Ctrl+W or Apple+W = Close Active Window
• Alt+F4, Ctrl+Alt+Delete or Apple Q will close the
application
• On a Mac, Apple+Option+Esc will allow you to force
quit.
• Apple+period, should unfreeze your computer
Social Media Privacy & Geo Location//
Be sure that you do not compromise your
personal details such as you address,
telephone number and other personal
information on Social Networking Sites.
You don’t have to put up all your personal
details on your profile, but even if you do,
make sure privacy settings do not expose
such details to the public.
Also ensure your geo location feature on
Facebook and Twitter are always turned
off.
Thank You //
Ugochukwu Ezeagwula
Chief Imagination Officer
Identita Brand Concepts
Telephone:
+234 01 844 3816
+234 806 665 4702
E-mail
me@ugochukwuezeagwula.com
ugochukwu2001@yahoo.com
Website
www.ugochukwuezeagwula.com
www.identitanigeria.com
Facebook:
www.facebook.com/ugochukwuezeagwul
a
www.facebook.com/identitabrand
Twitter:
@ugosanchez

Más contenido relacionado

Destacado

Cloud Computing CIO Summit 2010
Cloud Computing CIO Summit 2010Cloud Computing CIO Summit 2010
Cloud Computing CIO Summit 2010Jitscale
 
Enterprise business systems - Information technology
Enterprise business systems - Information technologyEnterprise business systems - Information technology
Enterprise business systems - Information technologyHallelujah Kasimbazi
 
Camanho & Consultore - CIO as a Service
Camanho & Consultore - CIO as a ServiceCamanho & Consultore - CIO as a Service
Camanho & Consultore - CIO as a ServiceAntonio Camanho
 
The CIO & CMO – Adversaries No More
The CIO & CMO – Adversaries No MoreThe CIO & CMO – Adversaries No More
The CIO & CMO – Adversaries No MoreVala Afshar
 
CIO-CTO 90 day plan 2017
CIO-CTO 90 day plan 2017CIO-CTO 90 day plan 2017
CIO-CTO 90 day plan 2017Allie Gentry
 
100 Most Social CIOs on Twitter 2015
100 Most Social CIOs on Twitter 2015100 Most Social CIOs on Twitter 2015
100 Most Social CIOs on Twitter 2015Vala Afshar
 
100 Business Insights from Fortune 500, Startup CEOs, Venture Capitalists, an...
100 Business Insights from Fortune 500, Startup CEOs, Venture Capitalists, an...100 Business Insights from Fortune 500, Startup CEOs, Venture Capitalists, an...
100 Business Insights from Fortune 500, Startup CEOs, Venture Capitalists, an...Vala Afshar
 
Learn 90% of Python in 90 Minutes
Learn 90% of Python in 90 MinutesLearn 90% of Python in 90 Minutes
Learn 90% of Python in 90 MinutesMatt Harrison
 
Introduction to Python
Introduction to PythonIntroduction to Python
Introduction to PythonNowell Strite
 

Destacado (12)

Cloud Computing CIO Summit 2010
Cloud Computing CIO Summit 2010Cloud Computing CIO Summit 2010
Cloud Computing CIO Summit 2010
 
Enterprise business systems - Information technology
Enterprise business systems - Information technologyEnterprise business systems - Information technology
Enterprise business systems - Information technology
 
Robert Carey, Principal Deputy CIO, DOD Insight session
Robert Carey, Principal Deputy CIO, DOD Insight sessionRobert Carey, Principal Deputy CIO, DOD Insight session
Robert Carey, Principal Deputy CIO, DOD Insight session
 
The Internet And The Arts: How new technology affects old aesthetics
The Internet And The Arts: How new technology affects old aestheticsThe Internet And The Arts: How new technology affects old aesthetics
The Internet And The Arts: How new technology affects old aesthetics
 
Camanho & Consultore - CIO as a Service
Camanho & Consultore - CIO as a ServiceCamanho & Consultore - CIO as a Service
Camanho & Consultore - CIO as a Service
 
The CIO & CMO – Adversaries No More
The CIO & CMO – Adversaries No MoreThe CIO & CMO – Adversaries No More
The CIO & CMO – Adversaries No More
 
Ruby on Rails for beginners
Ruby on Rails for beginnersRuby on Rails for beginners
Ruby on Rails for beginners
 
CIO-CTO 90 day plan 2017
CIO-CTO 90 day plan 2017CIO-CTO 90 day plan 2017
CIO-CTO 90 day plan 2017
 
100 Most Social CIOs on Twitter 2015
100 Most Social CIOs on Twitter 2015100 Most Social CIOs on Twitter 2015
100 Most Social CIOs on Twitter 2015
 
100 Business Insights from Fortune 500, Startup CEOs, Venture Capitalists, an...
100 Business Insights from Fortune 500, Startup CEOs, Venture Capitalists, an...100 Business Insights from Fortune 500, Startup CEOs, Venture Capitalists, an...
100 Business Insights from Fortune 500, Startup CEOs, Venture Capitalists, an...
 
Learn 90% of Python in 90 Minutes
Learn 90% of Python in 90 MinutesLearn 90% of Python in 90 Minutes
Learn 90% of Python in 90 Minutes
 
Introduction to Python
Introduction to PythonIntroduction to Python
Introduction to Python
 

Similar a Enterprise 2.0 information technology for business

Everything You Need to Know About Enterprise IT in Three Slides
Everything You Need to Know About Enterprise IT in Three SlidesEverything You Need to Know About Enterprise IT in Three Slides
Everything You Need to Know About Enterprise IT in Three SlidesJohn Mancini
 
5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekko5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekkoDMI
 
Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.jayceewong1
 
Ten Top Tips on Keeping Your Business Secure
Ten Top Tips on Keeping Your Business SecureTen Top Tips on Keeping Your Business Secure
Ten Top Tips on Keeping Your Business SecureBurCom Consulting Ltd.
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataOnline Business
 
Mobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementMobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementDMIMarketing
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber securityAnimesh Roy
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksHokme
 
Account Takeover: The Best Practices for Full Protection
Account Takeover: The Best Practices for Full ProtectionAccount Takeover: The Best Practices for Full Protection
Account Takeover: The Best Practices for Full ProtectionKalin Hitrov
 
Ten top tips on keeping your business secure
Ten top tips on keeping your business secureTen top tips on keeping your business secure
Ten top tips on keeping your business secureBurCom Consulting Ltd.
 
INFRAGARD 2014: Back to basics security
INFRAGARD 2014: Back to basics securityINFRAGARD 2014: Back to basics security
INFRAGARD 2014: Back to basics securityJoel Cardella
 
5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management5 Steps to Mobile Risk Management
5 Steps to Mobile Risk ManagementDMIMarketing
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Bala Guntipalli ♦ MBA
 
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSIMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSPreetiDevidas
 
Symantec Data Loss Prevention- From Adoption to Maturity
Symantec Data Loss Prevention- From Adoption to MaturitySymantec Data Loss Prevention- From Adoption to Maturity
Symantec Data Loss Prevention- From Adoption to MaturitySymantec
 
Corona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat ManagementCorona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat ManagementRedZone Technologies
 
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfJust-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfInfinityGroup5
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education ConferanceTommy Riggins
 

Similar a Enterprise 2.0 information technology for business (20)

A data-centric program
A data-centric program A data-centric program
A data-centric program
 
Everything You Need to Know About Enterprise IT in Three Slides
Everything You Need to Know About Enterprise IT in Three SlidesEverything You Need to Know About Enterprise IT in Three Slides
Everything You Need to Know About Enterprise IT in Three Slides
 
Shadow IT
Shadow ITShadow IT
Shadow IT
 
5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekko5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekko
 
Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.
 
Ten Top Tips on Keeping Your Business Secure
Ten Top Tips on Keeping Your Business SecureTen Top Tips on Keeping Your Business Secure
Ten Top Tips on Keeping Your Business Secure
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdata
 
Mobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementMobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk Management
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
 
Account Takeover: The Best Practices for Full Protection
Account Takeover: The Best Practices for Full ProtectionAccount Takeover: The Best Practices for Full Protection
Account Takeover: The Best Practices for Full Protection
 
Ten top tips on keeping your business secure
Ten top tips on keeping your business secureTen top tips on keeping your business secure
Ten top tips on keeping your business secure
 
INFRAGARD 2014: Back to basics security
INFRAGARD 2014: Back to basics securityINFRAGARD 2014: Back to basics security
INFRAGARD 2014: Back to basics security
 
5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...
 
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSIMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
 
Symantec Data Loss Prevention- From Adoption to Maturity
Symantec Data Loss Prevention- From Adoption to MaturitySymantec Data Loss Prevention- From Adoption to Maturity
Symantec Data Loss Prevention- From Adoption to Maturity
 
Corona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat ManagementCorona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat Management
 
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfJust-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education Conferance
 

Último

FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 

Último (20)

FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

Enterprise 2.0 information technology for business

  • 1. ENTERPRISE 2.0 INFORMATION TECHNOLOGY FOR BUSINESS By: Ugochukwu Ezeagwula TREM Int’l Headquarters Sunday 4th August, 2013
  • 2. ENTERPRISE 2.0 OUTLINE • Opening • IT in Business Operations • General Purpose Application Software in Business Operations • Case Study: Wave Accounting • Marketing 2.0: Online Marketing • Cyber Safety Tips • Malicious Codes • Avoid Inappropriate Materials • Escaping a Mousetrap • Social Media Privacy & Geo Location
  • 3. Same Product. Times have changed. Opening//
  • 4. “Information technology and business are becoming inextricably interwoven. I don't think anybody can talk meaningfully about one without the talking about the other.” - Bill Gates Opening//
  • 5. IT in Business Operations// Management, Accounting, Finance, Legal Human Resource Management Research & Development Purchasing Make Product/ Service Market Product/ Service Deliver Product/ Service Value Add Value Chain Support Activities Primary Activities
  • 6. General Purpose Application Software In Business Operations // •Spreadsheet software allow manipulation of data (figures) in rows and columns. Useful for charting and graphing. Can also be used for basic database functions. Example is Microsoft Excel •Data management software supports the storage, retrieval, and manipulation of data. There are two basic types of data management software: - Simple filing programs e.g. Microsoft Access - Database management systems (DBMSs) e.g. Oracle
  • 7. General Purpose Application Software In Business Operations // •Word processing software allows the user to manipulate text, rather than just numbers, e.g. Microsoft Word. •Graphics software allows the user to create, store, and display or print charts, graphs, maps, and drawings. The three main types of graphic software are; - Presentation Graphics - Analysis Graphics - Engineering Graphics
  • 8. General Purpose Application Software In Business Operations // •Multimedia Software • Communications Software. To share, relate or exchange information. e.g. Microsoft Outlook or web email programs. •Workgroup software, helps teams work together by sharing information and by controlling workflow within the group. •Accounting Software such as Quickbooks or Peachtree or SAGE [Case Study: Wave Accounting]
  • 9. General Purpose Application Software In Business Operations // •Enterprise Resource Planning software (ERP) consists of programs that manage a company’s vital operations, from order taking to manufacturing to accounting, e.g. SAP Business One •Customer Relationship Management (CRM) Software Chances of selling a product to an existing customer far exceed those of selling to a new customer Examples of CRM Software include: - Microsoft Dynamics CRM (might be too big for SMEs) - SalesForce •A peep into the Google App Marketplace will surprise you!
  • 10. Case Study: Wave Accounting //
  • 11. Marketing 2.0: Online Marketing// • Websites • SMS • E-mail • Web Adverts • Social Media
  • 13. Any Malicious Codes// Any software created to cause damage, Steal information, or use up resources on a computer or a network. • Viruses • Worms • Trojan Horses • Spyware Security Precaution Turn on Firewall, update OS &
  • 14. Avoid Inappropriate Materials// Apply caution in clicking on • Advertisements • Keyword Searches • Typo Squatting • E-mail Spam • Phishing • Steganography Spam e-mails are harmful nuisance that can lead To identity theft. To minimize identity theft, examine a company’s Privacy policy before shopping online. Look out for the padlock sign or the HTTPS in the URL.
  • 15. Escaping a Mousetrap// Never click “Ok” on popup windows When mouse trapped. Instead, follow The keyboard shortcuts: • Ctrl+W or Apple+W = Close Active Window • Alt+F4, Ctrl+Alt+Delete or Apple Q will close the application • On a Mac, Apple+Option+Esc will allow you to force quit. • Apple+period, should unfreeze your computer
  • 16. Social Media Privacy & Geo Location// Be sure that you do not compromise your personal details such as you address, telephone number and other personal information on Social Networking Sites. You don’t have to put up all your personal details on your profile, but even if you do, make sure privacy settings do not expose such details to the public. Also ensure your geo location feature on Facebook and Twitter are always turned off.
  • 17. Thank You // Ugochukwu Ezeagwula Chief Imagination Officer Identita Brand Concepts Telephone: +234 01 844 3816 +234 806 665 4702 E-mail me@ugochukwuezeagwula.com ugochukwu2001@yahoo.com Website www.ugochukwuezeagwula.com www.identitanigeria.com Facebook: www.facebook.com/ugochukwuezeagwul a www.facebook.com/identitabrand Twitter: @ugosanchez