An Executive's Guide to Information Technology: Principles, Business Models, and Terminology
Assessing the most valuable technology for an organization is becoming a growing challenge for business professionals confronted with an expanding array of options. This 2007 book is an A-Z compendium of technological terms written for the non-technical executive, allowing quick identification of what the term is and why it is significant. This is more than a dictionary - it is a concise review of the most important aspects of information technology from a business perspective: the major advantages, disadvantages and business value propositions of each term are discussed, as well as sources for further reading, and cross-referencing with other terms where applicable. The essential elements of each concept are covered in a succinct manner so the reader can quickly obtain the required knowledge without wading through exhaustive descriptions. With over 200 terms, this is a valuable reference for non- and semi-technical managers, executives and graduate students in business and technology management.
Other editions - View all
algorithms allows applications artiﬁcial Associated terminology backup bandwidth browser Business valueproposition Businessvalueproposition bytes cable certiﬁcate client Cobol communications companies complex computer system conﬁgured connection corporate cost created customers data warehouse database deﬁned Deﬁnition devices difﬁcult digital cash document domain name efﬁcient electronic encryption ensure ERP systems ﬁle ﬁnd ﬁrst ﬂexible Formal methods Fortran Foundation concept hardware human implementation interact interface Internet protocol IP addresses Java known memory ment normal ofﬁce OLAP operating system organization Overview password perform phishing problem programming language protocol puter References reliable RFID server signiﬁcant simple solution speciﬁc spyware standard storage Summary ofpositiveissues Summary ofpotentiallynegativeissues Summaryofpotentially negativeissues task TCP/IP techniques tems tion trafﬁc Unix users variety vendors virtual virus ware waterfall model wide