Recent orders
Distributed information management
Distributed information management
Name
Institution
Course
date
Distributed Information Management; Explain Mass Customization, and illustrate it With an Example.Mass customization refers to the demand heterogeneities among different clientele not as a risk, but, as an innovative prospect, for profits. In order to capture the value, however, a company has to acquire a specific set of abilities to deal with the challenges of such an industry. Mass customization is the innovative paradigm that substitutes mass production (Haag & Cummings, 2010). The concept proactively manages the product diversity in the environment of speedily evolving products and markets, numerous niche markets, as well as individually customized commodities sold over the internet or through stores. Mass customization customizes commodities rapidly for individual clients or for specific niche markets at superior speed and efficiency than mass production (Feitzinger & Lee, 1997).
A case in point would be the case of mass customization option in the production of apparel. This example illustrates the points at which the customers participate in the process of production as illustrated in the model below.
In the model above, retailers and consumers participate in the design process by choosing fabrics, garment details, or the size dimensions for the clothing items. In this case, mass customization requires facilitative technologies for information, communication, and production (Fralix, 2001).
Patterns StageIn the patterns stage, custom fit and design take place. Patterns are developed for individual clients, according to specifications. Mass customization in this stage is made done through facilitative technologies like digital printing, computer-aided design (CAD), automated cutting, single ply, and body scanning pictures. The client provides dimensions and defines styling details and fabric prints (Fralix, 2001).
Design StageIn this stage, components are selected by the retailer or client from limited sizes, garment styles, as well as fabric options. For instance, retailers may add their store logo or ask for specific colors in the design stage.
Production PlanningMass customization at the production planning phase as well as at the Point-of-Sale (POS) phase is facilitated by electronic links. These electronic links are found among the apparel producer’s departments and between the clientele and the producer. Major retailers in the industry employ electronic data interchange (EDI) for the purposes of ordering, invoicing, as well as shipping. The Internet and EDI links are used to gather consumer procurement data as well as to establish production plans on the data Drucker, 2002).
Assembly StageApparel clientele participate in mass customization at the assembly stage if they desire to repeat a particular order in small quantities or with other fabrics. The order is cyclical by use of CAD equipment and subsequently sent directly to the assembly line. Supple manufacturing strategies like modular manufacturing enhance the effectiveness of small order productions.
DistributionWith the introduction of bar codes and EDI, clients’ Point-of-sale (POS) data are accessible to the retailer as well as the apparel producer. This data introduces the opportunity to deliver apparel to retail clientele based on the relevant sales as well as, inventory needs (Zhang, 2005).
Post PurchaseAdjustments in post-purchase are built into the products for customers to make any adjustments themselves. Sneakers with the options of different colors of laces, un-hemmed pants, air inflation in sports shoes, and gel placed in ski boots, are examples of creative forms of post-purchase adjustments.
Scalability
Improving database management system
A Database management system (DBMS) refers to the software that facilitates a computer to execute database functions of storage, retrieval, addition, deleting and modification of data. A database is comparable to a workbook or a document because they hold information. While spreadsheet and word processing are the software tools utilized to work with workbooks and documents, database management system software is employed to work with databases (Haag & Cummings, 2010). A DBMS comprises of five vital software components namely; DBMS engine, data manipulation subsystem, data definition subsystem, data administration subsystem, and application generation subsystem (Howard, 2004).
Data Manipulation SubsystemThe data manipulation subsystems assist in changing and deleting data in a database as well as query it for important data. Software tools in the data manipulation subsystem are often the chief interface between the data contained in the database and the user. Therefore, while the DBM system engine handles information demands from the physical perspective, it is the data manipulation tools in a DBM system that facilitates in specifying the logical information demands. The logical information demands are subsequently utilized by the DBM system engine in accessing the information needed from a physical perspective. In most DBM systems a range of data manipulation tools that include views structured query language, query-by-example tools, and report generators are found.
References
References
Dhar, V., & Stein. R. (2001). Seven Methods for Transforming Corporate Data into Business Intelligence. Upper Saddle River, NJ: Prentice Hall.Drucker, D. (2002) Internet Marketing Gets More Analytical, Internetweek, 7(1), 22.
Feitzinger, E. & Lee, H. L. (1997). Mass Customization at Hewlett-Packard: The Power of Postponement. Harvard Business Review. 75(1), 116-121.
Fralix, M. T. (2001): “From Mass Production to Mass Customization”, Journal of Textile and Apparel, Technology and Management. 1(2), 1-7
Haag, S., & Cummings, M. (2010). Management Information Systems for the Information Age, (8th Ed.). New York: McGraw-Hill Irwin.Howard, T. (2004). Query Evaluation: Strategies & Optimizations. Information Processing & Management, 31(6), 831.
Norvig, P., & Russell. S. (2009). Artificial Intelligence: A Modern Approach. Upper Saddle River, NJ: Prentice Hall.Owen, P. (2002). Artificial Intelligence Techniques Enhance Business Forecasts: Computer-Based Analysis Increases Accuracy. Graziadio Business Review, 5 (2). 6.
Turban, E. (2006). Decision Support Systems & Intelligent Systems. Upper Saddle River, NJ: Prentice Hall. Zhang, G. (2005). Neural Networks in Business Forecasting. Information Science Publishing, 7 (2). 6.
Distributed database is a collection of data which are connected in a system
Database management systems
Name
Professor
Institution
Course
Date
Database management systems
Q#1)What are the advantages and disadvantages of implementing distributed and centralized databases? Does the size and location of the organization dictate if the database is centralized or distributed? Why?
Distributed database is a collection of data which are connected in a system through a simple logical network. They are managed through a distributed database management system in a single network. In the system, each part has its own dat6abse and an operating system. On the other Hand, a centralized database management has all the data stored in a single place fined as collection of logically distributed database which are connected with each other through a network.
The advantages of a centralized database are that all the data can be mined from the same network, this enhance the efficiency of the system and data recovery. This is also advantageous as the systems can be maintained from a central place in well contained manner. Centralized database is limited to those at central place, any downtime in the system leads to lose as the system is completely locked down
The distributed database is advantageous because the data can be accesses by geographically distributed clients without slowing down the system. This system is also advantageous because of the location transparency (Korth, & Silberschatz, 1998).
The size and location of the organization does not determine if the database is distributed because distribution of the database depends on the storage facilities and the computers in use. In a distributed system the remote databases have their own local autonomies over their data as they can take responsibility for the security of the data, the backup and recovery. They also control the concurrency of the database as well.
Q#2) what are some of the important considerations regarding DBMS/Database design? Explain why these considerations are important.
1) Security – DBMS is a very important part of any setting that takes care of the data stored in the database, security of the system should be given the highest priority. This does NOT only apply to the data in the data base but also to the [possible breaches. Therefore security of the dbms also concerns the hardware, software, people, and data. THIS requires the implementation of a superior mission objectives for the whole debase management systems. This increasing interest in the security of then database is as results of the reliance on the computer for the storage of data. The main concepts in ensuring the security of a DBMS include authorization, Views, backup and recovery, integrity, encryption and RAID (Elmasri, &Navathe, 2004).
2) Transaction rate: the kind of traffics to the data base. A debase is supposed to be scalable to allow for future un-predetermined database accesses. This will ensure that the number of systems downtimes is reduced and the throughput is increased thereby enabling the organization to realize their database design objectives. The designer should know whether the system is read only or both. Determination of the usage patterns also helps in determining if the system can work at peak times or even if the usage patterns are evenly distributed
3) The nature of the uptime- uptimes is also another important factor to consider as it determines the number of downtimes s set is supposed to register to [prepare for the possibilities of failures. The uptimes range from the normal 16×5 and the 24×7. But it is imperative to know that the 24×7 does not allow for downtimes when then systems can be maintained
4) The nature of database administration- according to Elmasri, &Navathe, (2004), it is important to consider the way the database will be administered, as it helps in reducing the number of system downtimes when administering the database. If the administration is to be carried every day at a central point or if the administrations to be carried at different remote points. DB administration may include backups, transfers to other systems, systems integrations, data loading etc are much more important to consider especially if the database is used for commercial purposes (Korth, &Silberschatz, 1998).
Q#3) Does MS Access support all nine DBMS functions identified listed in chapter service? Why or Why not? Describe how MS Access implements these functions.
Teorey, Lightsome &, Nadeau, (2006), states that the main functions of database management systems are: indexing, Views, Security, Integrity, Concurrency, Backup/Recovery, Design, Documentation and Update/Query. Ms Access can support a number of this function, but cannot support some functions due to incompatibility between the systems. For example, access has a number of query performance problems based on the resource mamanement systems used in the latest version of the databases. This was dues to the incompatibility and causes delays in returning the delays. However, Ms Access uses the hot fixes KB2553029 to speed up the query performance. On the other hand, ms access does not function in a number of operating systems like the Mac Os, Linux, BSD, and Amiga etc. this is due to the configuration systems used in the systems (Raghu, & Gehrke, 2000).
There are a number of functionalities such as connectivity and interactions that the ms access does not support. The ms access is a native PHP; it is therefore not easy for their connectivity to offer high indexing functionality and query / update. Ms can only achieve this by using the open database management system for direct access. Then reason form thins is that ms Access is a low end natively DBMS with a poor middle-tier PHP script. Ms can also reverse engineer the script to work sufficiently.
Ms Access has a limited support for the storage functionality. This is achieved but importing database for Ms Access jet 4. By conecting ms access to live databases through the ODBC, one can easily imports the database schemas into any standard UML model. This also enhances the level of synchronization between the data models and the live databases (Teorey, Lightsome, & Nadeau, 2006).
References
Elmasri, R. Navathe, S. (2004). Fundamentals of Database Systems. 4th ed., Pearson Addison Wesley,
Korth, H.; Silberschatz. (1998). Database Systems. Third Edition. Makron Books.
Raghu R., & J. Gehrke., (2000). Database Management Systems, Second Edition, McGraw-Hill,
Teorey, T.J., Lighstone S., Nadeau, (2006). Database Modeling and Design, 4th. ed., Morgan Kaufmann Publishers, Inc, San Francisco
distinguish terrorist from other types of criminals
Terrorism
Name
Tutor
Date
Terrorism
The definition of terrorism is controversial. Various government agencies and legal systems use different definitions of terrorism in their different national legislations. The international community on the other hand has been slow to come up with a universally agreed definition of terrorism. This is because terrorism is emotionally and politically charged.
To distinguish terrorist from other types of criminals and also terrorism from other types of crime, we need to appreciate that terrorism is first and foremost ineluctably political in motive and aims, while other criminal activities are not political at all. Like writing a letter or protesting, terrorism is a political tactic which is used by the activists when they believe that no other means can be used to see to the kind of change that they want. The need for this change is so bad that they perceive the failure to achieve it even worse than outcome deaths of the civilians. This is where the relationship between terrorism and religion occurs (Cliff 2003). It happens when apolitical struggle has been integrated into the framework of a cosmic or a religious struggle such as over the control of an ancestral land or a holy land. Examples of this are Jerusalem and Israel. Failing in the political goal is taken as spiritual failure which is worse than the deaths of the people that will be involved or the death of the perpetrators. Thus where other criminal activities may be aimed economically for example robbery and stealing terrorism is purely noneconomic but rather political. This is so clear in the case of suicide bombers who even neglect their own lives and are prepared to die so as to pursue the political goal on behalf of their state. The motive of other criminal activities like stealing is entirely personal and is especially done for personal gain.
Different legislations have defined what includes criminal activities and in most of the cases the criminals engage in those activities for personal reasons. Another aspect of terrorism that is not found in other criminal activities is violence or threats of violence. It is true that some criminal activities may show violence but not all activities which are criminal which depict violence. For example smoking of cigarettes in non smoking zones has been criminalized yet there is no violence that is involved in such an activity. On the other hand for any act to be termed as terrorism, it must have the aspect of violence or threatened violence. Another thing that differentiates terrorism from other criminal activities is that it has far reaching psychological repercussions which are beyond the immediate victim. Most of the times, the terrorist target is to frustrate a state in one way or another. It may be that they have targeted to revenge or hit back but when they do things like bombing embassies of that state in other states, then those who are adversely affected may not be members of the targeted state but members of the other state where the embassies were situated. For example on seventh of august 1997 a terrorist attack that hit the American embassies in two African states namely Tanzania and Kenya was recorded. Many of the people who died in those two attacks were Kenyans and Tanzanians and most of them of course were innocent citizens. The target of the terrorist here was United States but the consequences of the violent attacks were felt even by the innocent citizens who were not American. The destruction that was caused was not felt by the United States as it was felt by the two African countries.
The other thing that distinguishes criminal activities from terrorist attacks is that the terrorist attacks are conducted by an organization with a chain of command that is identifiable or has a conspiratorial cell structure where members don’t have an identifying insignia and wear no uniforms (McCollum 2002). This is so different from criminal activities. For example taking illicit brew in some countries is criminalized and such an activity can not be perpetrated through an organization with a chain of command. Only organizational acts which have been perpetrated by individuals at different levels in leadership of the organization can be said o be criminal. Some criminal activities may too be perpetrated by organizations which are mostly illegal groups and sects but when this is the case the members of the outlawed group have an identifying insignia. For example some sect members may prefer to keep long hair as their identifying insignia. But it should be noted that most criminal activities are done individually and for individual gains. The organizational crimes which exist don’t have a political purpose but aim towards fulfilling the goals of the organization they work for. If such an outlawed group has a political goal, then they are not between a state and another state but they are targeted to help a candidate of their choice represent them in their government. This is usually during election periods. They may also be targeted to fight against another group in the same country. Lastly the terrorism is differentiated from other criminal activities by the fact that it is perpetrated by a sub national group or a non state entity which is at the top of the chain of command in the organization that designs the act of terrorism.
The other criminal activities are not in any way perpetrated by the sub national groups which are representatives of their states but are acts which the state in the specific legislations have specified as criminal activities and have provided a penalty for engaging in such activities. Their perpetration is not in any way linked to the state but the state is the entity that prohibits such acts from being committed.
A definition of terrorism that was made by Carsten Bockstette underlines the tactical and psychological aspects of terrorism. He defined terrorism as political violence that is an asymmetrical conflict designed to induce psychic fear or terror through the acts of violent of victimization and destruction of the noncombatant targets. These acts are meant to send a message from the illicit clandestine organization. The terrorists aim at exploiting the media in order to achieve the maximum publicity that can be attained which they use as an amplifying force multiplier so as to influence the audience that they have targeted and thus manage to reach their short term and midterm political goals or the long term state goals. Thus it is wrong perception that terrorism and criminal violence is the same type of crime and that they have commonalties. (Goldstein 2007) Goldstein has explained the intricate differences that are found between terrorists and criminals. He asserts that the terrorists are most of the times well trained and are state supported. They have a specific goal which is more of a symbol than opportunistic as it is usually in the case of other criminal activities. The ordinary criminal is the one who seeks opportunistic targets and has very little backing, lacks discipline, is selfish and may be deterred easily.
The opportunistic nature of crimes is mostly for economic gains which is not the case with the terrorist activities. In general the terrorist is assumed to be well trained as opposed to the regular criminal. Because of this, the propensity of violence and the destruction levels are much greater when it comes to terrorist activities. Terrorist believe in their cause at such a great extent that they are even willing to die for the cause. This is unlike the violence that is caused by criminal activities where for example the criminal runs for cover when being chased by police while the terrorist may even confront the policemen with a bomb that is strapped on the chest. Criminals will go into hiding after they commit the crimes. Terrorist on the other hand want to take credit for their actions. This brings out the psychological difference in their thinking. While a criminal is doing something that is termed as bad and wrong in the eyes of the societies, the terrorist is doing something good and right and indeed so good that the society is going to credit him for it.
Another factor that differentiates the criminal activity and terrorist activities is the span of attacks by terrorist and the regular criminals. Most of the criminal activities are operated within the proximity of the hide outs while the terrorist activities are operated within the entire country and internationally (White 2006.)
References
HYPERLINK “http://www.google.co.ke/search?tbo=p&tbm=bks&q=+inauthor:%22Cliff+Mariani%22&source=gbs_metadata_r&cad=6” Cliff, M. (2003). Terrorism Prevention and Response: The Definitive Law Enforcement Guide
to Prepare for Terrorist Activity. United States. Loose leaf Law Publications.
Goldstein, D. (2007). Religion and Todern Terrorism. Boston. Boston University Press.
HYPERLINK “http://www.google.co.ke/search?tbo=p&tbm=bks&q=+inauthor:%22Bill+McCollum%22&source=gbs_metadata_r&cad=8” McCollum, B. (2002) Threat Posed by the Convergence of Organized Crime, Drug Trafficking,
and Terrorism. United States. DIANE Publishing
White, J. (2006). Terrorism and Homeland Security 5th ED. Belmont. Thomson-Wadsworth
