Premium Essay

Reasons Why Managers Need to Be Acquainted with Programming, Web Source Code, and Technology.

In:

Submitted By benboccio
Words 490
Pages 2
In some situations a manager should be familiar with programming. I think it really depends on what’s being managed. If you are a manager of a software company, then you should know how to code and have a programming background. Depending on the size of his or her department, a manager will spend time between coding and doing things that those who code cannot do. A manager who is good at coding, may not necessarily be good at managing projects. The best project managers do not have to understand all of the technical jargon and syntax of a programming language but rather be aware of simple programming concepts such as input/output, decision-making, repetition, and file handling. (Ebrahimi, 2005) A good manager can be in situations where they are not the expert; thus, they rely on experts who know much more (Berkun, 2010). It is important for a manager to understand the context of the problem or situation in order to help make a good decision. In this day and age, it is also important for a manager to be knowledgeable about his or her company’s web presence. The web is a platform that most if not every business should strive to maintain (Ebrahimi, 2005). A manager may wish to be involved with such things as creating web content and marketing. Knowledge of how database and source code relate can help a manager understand the job responsibilities of the business’s web development department. With this information, he or she might be more realistic about deadlines and what company objectives can be reasonably accomplished within a particular timeframe. As a secondary benefit, one might expect to establish improved relations with employees, who recognize that their superiors are making an effort to understand the nature of their work. Familiarity with information technology is very important for a manager in most organizations. It is hard to imagine

Similar Documents

Premium Essay

Sap Netweaver for Dummies

...SAP NetWeaver ® ™ FOR DUMmIES ‰ by Dan Woods and Jeff Word SAP NetWeaver ® ™ FOR DUMmIES ‰ by Dan Woods and Jeff Word SAP® NetWeaver™ For Dummies® Published by Wiley Publishing, Inc. 111 River Street Hoboken, NJ 07030-5774 Copyright © 2004 by Wiley Publishing, Inc., Indianapolis, Indiana Published by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4447, e-mail: permcoordinator@ wiley.com. Trademarks: Wiley, the Wiley Publishing logo, For Dummies, the Dummies Man logo, A Reference for the Rest of Us!, The Dummies Way, Dummies Daily, The Fun and Easy Way, Dummies.com, and related trade dress are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates in the United States...

Words: 135708 - Pages: 543

Premium Essay

Adaptation of Agile Practices: a Systematic Review and Survey

...School of Computing Blekinge Institute of Technology SE-371 79 Karlskrona Sweden This thesis is submitted to the School of Engineering at Blekinge Institute of Technology in partial fulfillment of the requirements for the degree of Master of Science in Software Engineering. The thesis is equivalent to 40 weeks of full time studies. Contact Information: Author(s): Budsadee Kongyai Address: Kungsmarksvägen 43 Karlskrona 371 44, Sweden E-mail: nune.budsadee@gmail.com Edi Edi Address: Kungsmarksvägen 57 Karlskrona 371 44, Sweden E-mail: edi198@gmail.com University advisor(s): Dr. Jürgen Börstler School of Computing EMSE Co-supervisors: Prof. Dr. Dr. h.c. H. Dieter Rombach (TU Kaiserslautern) Dr. Ove Armbrust (Fraunhofer IESE, Germany) School of Computing Blekinge Institute of Technology SE-371 79 Karlskrona Sweden Internet: www.bth.se/com Phone : +46 455 38 50 00 Fax : +46 455 38 50 57 Abstract Context. Due to the uniqueness of software projects there is no single Agile development approach that ideally fits all project contexts. Each software project is unique, whether in its subject area, development team, or project size. Because of this, adapting Agile practices according to project circumstances is a must. There has been a number of literature published discussing Agile practices adaptation topic. However, it is still unclear how to adapt Agile practices. Therefore, researchers as well as practitioners need to find out the knowledge of how the Agile...

Words: 49494 - Pages: 198

Premium Essay

Human Resoucre

...HR THE INTERNATIONAL UNIVERSITY OF MANAGEMENT WINDHOEK-NAMIBIA STUDY MANUAL INFORMATION MANAGEMENT SYSTEMS CODE: BIS - 3315 TABLE OF CONTENTS CHAPTER PAGE NUMBER 1. WHY INFORMATION SYSTEMS………………………………………….6 2. Strategic role of information systems…………………..21 3. Information systems in organizations…………………..26 4. Computer and information processing…………………42 5. Managing data resources………………………………………..60 6. Networking and information systems…………………..81 7. Systems development…………………………………………………90 8. Implementation of information systems……………….97 9. Managing knowledge……………………………………………….106 10. Decision support systems………………………………………….129 THE STRUCTURE OF THIS STUDY MODULE The Module has margin icons that show the student the objectives, activities, in-text questions, feedback, further reading, key words and terms, stop and reflex signs. Chapter One covers the importance of Information Systems in running today’s organizations. Chapter Two looks at the strategic role played by information systems in today’s organizations. Chapter Three focuses on the impact of Information Systems on the organizational structure and how information systems help managers improve their decision making. Chapter Four looks at the hardware and software requirements for organizations to be able to implement information systems structures Chapter Five looks at the traditional file environments and the rise of the database...

Words: 43854 - Pages: 176

Free Essay

Ethical Hacking

...This page was intentionally left blank This page was intentionally left blank Hands-On Ethical Hacking and Network Defense Second Edition Michael T. Simpson, Kent Backman, and James E. Corley ———————————————————————— Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. This is an electronic version of the print textbook. Due to electronic rights restrictions, some third party content may be suppressed. Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. The publisher reserves the right to remove content from this title at any time if subsequent rights restrictions require it. For valuable information on pricing, previous editions, changes to current editions, and alternate formats, please visit www.cengage.com/highered to search by ISBN#, author, title, or keyword for materials in your areas of interest. Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated...

Words: 185373 - Pages: 742

Free Essay

Strategy

...1. What Is Strategy and Why Is It Important? chapter one © The McGraw−Hill Companies, 2008 1 What Is Strategy and Why Is It Important? Strategy means making clear-cut choices about how to compete. —Jack Welch Former CEO, General Electric A strategy is a commitment to undertake one set of actions rather than another. —Sharon Oster Professor, Yale University The process of developing superior strategies is part planning, part trial and error, until you hit upon something that works. —Costas Markides Professor, London Business School Without a strategy the organization is like a ship without a rudder. —Joel Ross and Michael Kami Authors and Consultants Thompson−Strickland−Gamble: Crafting and Executing Strategy: Concepts and Cases, 16th Edition M I. Concepts and Techniques for Crafting and Executing Strategy 1. What Is Strategy and Why Is It Important? © The McGraw−Hill Companies, 2008 anagers face three central questions in evaluating their company’s business prospects: What’s the company’s present situation? Where does the company need to go from here? How should it get there? Arriving at a probing answer to the question “What’s the company’s present situation?” prompts managers to evaluate industry conditions and competitive pressures, the company’s current performance and market standing, its resource strengths and capabilities, and its competitive weaknesses. The question “Where does the company need to go from here?” pushes managers to make choices about the...

Words: 9278 - Pages: 38

Free Essay

Software Export Bd

...Bangladesh Software Industry Chapter One Introduction Software industry is labor-intensive, has relatively low-entry barriers and few economies of scale and so offers lucrative opportunities for developing countries to join the ranks of the developed world. The scale and pace of growth in this sector is faster than in any other industry, and a number of developing countries having cheap, talented labor are attempting to emulate the success enjoyed by countries such as China, Thailand and India. The government in 1997 identified the software sector as a thrust sector for the overall economic growth of the country. Accordingly, a commission was formed under the ministry of commerce (later called JRC commission) to formulate some recommendations for the rapid growth of the software industry in Bangladesh. The commission identified four problematic functional areas namely: fiscal, human resource, infrastructure, and marketing, and provided some recommendations to overcome the barriers in software development in our country. By accepting these recommendations (however, some of these recommendations are yet to be implemented), the government had set a target to export yearly software worth two billion dollar (Tk 14,000 crore) by the year 2006. However the statistics (BCIT) reveal that the total earning from software sector during 2004-2005 was approximately Tk 88.34 crore. No doubt, this achievement lies far behind as it has been envisaged. In this research the main...

Words: 11826 - Pages: 48

Premium Essay

Managing Information Technology (7th Edition)

...(A): The Role of the Operating Manager in Information Systems CASE STUDY I-1 IMT Custom Machine Company, Inc.: Selection of an Information Technology Platform CASE STUDY I-2 VoIP2.biz, Inc.: Deciding on the Next Steps for a VoIP Supplier CASE STUDY I-3 The VoIP Adoption at Butler University CASE STUDY I-4 Supporting Mobile Health Clinics: The Children’s Health Fund of New York City CASE STUDY I-5 Data Governance at InsuraCorp CASE STUDY I-6 H.H. Gregg’s Appliances, Inc.: Deciding on a New Information Technology Platform CASE STUDY I-7 Midsouth Chamber of Commerce (B): Cleaning Up an Information Systems Debacle CASE STUDY II-1 Vendor-Managed Inventory at NIBCO CASE STUDY II-2 Real-Time Business Intelligence at Continental Airlines CASE STUDY II-3 Norfolk Southern Railway: The Business Intelligence Journey CASE STUDY II-4 Mining Data to Increase State Tax Revenues in California CASE STUDY II-5 The Cliptomania™ Web Store: An E-Tailing Start-up Survival Story CASE STUDY II-6 Rock Island Chocolate Company, Inc.: Building a Social Networking Strategy CASE STUDY III-1 Managing a Systems Development Project at Consumer and Industrial Products, Inc. CASE STUDY III-2 A Make-or-Buy Decision at Baxter Manufacturing Company CASE STUDY III-3 ERP Purchase Decision at Benton Manufacturing Company, Inc. CASE STUDY III-4 The Kuali Financial System: An Open-Source Project CASE STUDY III-5 ...

Words: 239887 - Pages: 960

Premium Essay

Java for Dummies

...Programming Languages/Java ™ Jumpin’ Java! The bestselling Java beginner’s book is now fully updated for Java 7! Open the book and find: ava J • Definitions of the many terms you’ll encounter ® • The grammar of Java • How to save time by reusing code • All about if, for, switch, and while statements • An overview of object-oriented programming • Building blocks — learn to work with Java classes and methods and add comments • Hints about handling exceptions • How to write Java applets ® • The Java scoop — get an overview of Java, the enhancements in Java 7, and the software tools you need • Get loopy — understand the value of variables and learn to control program flow with loops or decision-making statements 5th Edition 5th Edition Java Java, the object-oriented programming language that works on almost any computer, is what powers many of those cool multimedia applications. Thousands have learned Java programming from previous editions of this book — now it’s your turn! Whether you’re new to programming or already know a little Visual Basic or C++, you’ll be doing Java in a jiffy. g Easier! Making Everythin • Ten ways to avoid mistakes • Class it up — explore classes and objects, constructors, and subclasses, and see how to reuse your code • A click ahead — experiment with variables and methods, use arrays and collections to juggle values, and create programs that respond to mouse clicks Learn...

Words: 34460 - Pages: 138

Premium Essay

Strategy

...Confirming Pages PART 1 SA M PL E C H AP TE R Concepts and Techniques for Crafting and Executing Strategy tho29503_ch01_001-017.indd 1 12/10/12 4:52 PM Confirming Pages WHAT IS STRATEGY AND WHY IS IT IMPORTANT? AP Learning Objectives TE R CHAPTER 1 Learn what we mean by a company’s strategy. LO 2 Grasp the concept of a sustainable competitive advantage. LO 3 Develop an awareness of the four most basic strategic approaches for winning a sustainable competitive advantage. LO 4 Understand that a company’s strategy tends to evolve over time because of changing circumstances and ongoing management efforts to improve the company’s strategy. LO 5 Learn why it is important for a company to have a viable business model that outlines the company’s customer value proposition and its profit formula. LO 6 Learn the three tests of a winning strategy. M PL E C H LO 1 SA Strategy means making clear-cut choices about how to compete. Jack Welch  – Former CEO of General Electric If your firm’s strategy can be applied to any other firm, you don’t have a very good one. David J. Collis and Michael G. Rukstad  – Consultants and professors One must have strategies to execute dreams. Azim Premji  – CEO Wipro Technologies and one of the world’s richest people tho29503_ch01_001-017.indd 2 12/10/12 4:52 PM AP Many factors enter into a full explanation of a company’s performance, of course. Some come from the external environment; others are internal to the firm...

Words: 7702 - Pages: 31

Premium Essay

Java

...topics such as "servlets" and "Swing." As before, there's help with Java Beans and migrating from C++ to Java. A special chapter gives networking basics and breaks out networking-related classes. This book helps you master techniques by doing as well as reading. Projects include a multi-player word game with attention paid to network security. The book is updated where appropriate throughout, and the rhythm of text, code, tables, and illustrations is superb. It's a valuable resource for the developer who is elbow-deep in demanding projects. Table of Contents Java 2 Preface - 7 Part l The Java Language - The Complete Reference - 4 Chapter 1 Chapter 2 Chapter 3 Chapter 4 Chapter 5 Chapter 6 Chapter 7 Chapter 8 Chapter 9 hapter 10 - The Genesis of Java - 9 - An Overview of Java - 20 - Data Types, Variables, and Arrays - 36 - Operators - 57 - Control Statements - 75 - Introducing Classes - 94 - A Closer Look at Methods and Classes - 111 - Inheritance - 134 - Packages and Interfaces - 156 - Exception Handling - 174 Chapter 11 - Multithreaded Programming - 188 Chapter 12 - I/O, Applets, and Other Topics - 214 Part ll The Java Library Chapter 13 - String Handling - 235 Chapter 14 - Exploring java.lang - 255 Chapter 15 - java.util Part 1: The Collections Framework - 297 Chapter 16 - java.util Part 2: More Utility Classes - 343 -2- Chapter 17 - Input/Output: Exploring java.io - 362 Chapter 18 - Networking - 397 Chapter 19 - The Applet...

Words: 78285 - Pages: 314

Premium Essay

Database Management System

...Management, Ninth Edition Carlos Coronel, Steven Morris, and Peter Rob Vice President of Editorial, Business: Jack W. Calhoun Publisher: Joe Sabatino Senior Acquisitions Editor: Charles McCormick, Jr. Senior Product Manager: Kate Mason Development Editor: Deb Kaufmann Editorial Assistant: Nora Heink Senior Marketing Communications Manager: Libby Shipp Marketing Coordinator: Suellen Ruttkay Content Product Manager: Matthew Hutchinson Senior Art Director: Stacy Jenkins Shirley Cover Designer: Itzhack Shelomi Cover Image: iStock Images Media Editor: Chris Valentine Manufacturing Coordinator: Julio Esperas Copyeditor: Andrea Schein Proofreader: Foxxe Editorial Indexer: Elizabeth Cunningham Composition: GEX Publishing Services © 2011 Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information networks, or information storage and retrieval systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without the prior written permission of the publisher. For product information and technology assistance, contact us at Cengage Learning Customer & Sales Support, 1-800-354-9706 For permission to use material from this text or product, submit all requests online at www.cengage.com/permissions Further permissions...

Words: 189848 - Pages: 760

Premium Essay

Itsc 2439 Ch.1-12 Study Guides

...personal use. 2. The first computers used widely in businesses were available during the 1940s. 3. The goal of transaction processing on early computers was to replace as much manual processing of business information as possible with automated processing. 4. Among the reasons for the growth in decentralized computing was the availability of inexpensive personal computer hardware and productivity software. 5. The applications development backlog was due to the inability of computer professionals to design and write programs fast enough to keep up with the demand for new applications. 6. All knowledge workers are computer professionals. 7. A knowledge worker is another name for a computer user. 8. Use of a computer’s graphical user interface means that users no longer have to remember which command to enter to perform a task. 9. To operate a graphical user interface, a user types keyboard commands to tell a computer which tasks to perform. ____ ____ ____ ____ ____ ____ ____ 10. The Information Technology department is a modern name for the Data Processing department. ____ 11. Distributed computing links large-scale systems and personal computers to meet both organizational and individual worker needs. ____ 12. Computer departments in most organizations today are called data processing departments. ____ 13. One way to classify end users is by whether they use a computer occasionally, frequently, or extensively in their work. ____ 14. A computer professional in an organization...

Words: 28017 - Pages: 113

Premium Essay

Class Notes - Networking

...will be prosecuted. ESSENTIAL LINUX ® ADMINISTRATION: A COMPREHENSIVE GUIDE FOR BEGINNERS i CHUCK EASTTOM WITH SERGE PALLADINO Course Technology PTR A part of Cengage Learning 9781133795308 i ii Essential Linux Administration: A Comprehensive Guide for Beginners Chuck Easttom with Serge Palladino Publisher and General Manager, Course Technology PTR: Stacy L. Hiquet Associate Director of Marketing: Sarah Panella Manager of Editorial Services: Heather Talbot Marketing Manager: Mark Hughes Acquisitions Editor: Heather Hurley Project and Copy Editor: Marta Justak Technical Reviewer: Danielle Shaw Interior Layout Tech: MPS Limited, a Macmillan Company Cover Designer: Mike Tanamachi Indexer: Sharon Shock Proofreader: Kelly Talbot © 2012 Course Technology, a part of Cengage Learning. ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored, or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information networks, or information storage and retrieval systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without the prior written permission of the publisher. ® For product information and technology assistance, contact us at Cengage Learning Customer & Sales Support, 1-800-354-9706 For...

Words: 34239 - Pages: 137

Premium Essay

Customer Relationship Management

...CHAPTER 1 1.0 INTRODUCTION The Consumer Council of Zimbabwe has its origins deeply rooted in the great and noble cause of protecting and empowering consumers by monitoring product quality and service to ensure total adherence to reasonably accepted standards. It all began in 1955 when the first positive steps were taken to institute the formation of the vigilance committee, aimed at meeting protective needs of the consumer and to produce better understanding between producers and consumers. It was in 1975 when this committee was merged to form the present day Consumer Council Zimbabwe. Over the years the organisation has expanded its membership base and restructured its policies to meet the needs of today's consumers. The Consumer Council of Zimbabwe (CCZ) is responsible for overlooking products and services in Zimbabwe. At the moment complains are handled manually and thus they are documented in the order that they are reported such that they are to be attended to in the same order. When a consumer (customer) has a complaint he or she wishes to report to the body there is currently two ways to do so. The first one and the most common is that the complainant phones the Consumer Council of Zimbabwe to report his or her problem. The recipient then listens to the complaint and documents it for action to be taken. The complaints are attended to at a first come first served basis. The other way or method is that of complaint and suggestion boxes which are mounted on the premises...

Words: 13685 - Pages: 55

Premium Essay

Information Technology

...rain_c03_070-121hr.qxd 28-09-2009 11:25 Page 70 CHAPTER 3 1. Describe the major ethical issues related to information technology and identify situations in which they occur. 2. Identify the many threats to information security. 3. Understand the various defense mechanisms used to protect information systems. 4. Explain IT auditing and planning for disaster recovery. Ethics, Privacy, and Information Security LEARNING OBJECTIVES rain_c03_070-121hr.qxd 28-09-2009 11:25 Page 71 WEB RESOURCES Student Web site www.wiley.com/college/rainer • Web quizzes • Lecture slides in PowerPoint • Author podcasts • Interactive Case: Ruby’s Club assignments WileyPLUS • All of the above and... • E-book • Manager Videos • Vocabulary flash cards • Pre- and post-lecture quizzes • Microsoft Office 2007 lab manual and projects • How-to animations for Microsoft Office • Additional cases CHAPTER OUTLINE 3.1 Ethical Issues 3.2 Threats to Information Security 3.3 Protecting Information Resources What’s in IT for me? ACC FIN MKT OM HRM MIS rain_c03_070-121hr.qxd 28-09-2009 11:25 Page 72 72 Chapter 3 Ethics, Privacy, and Information Security Opening Case NASA Loses Secret Information for Years The Business Problem Over the past decade, U.S. government agencies have been the victims of an unprecedented number of cyber-attacks. One government official noted, “It is espionage on a massive scale.” Government agencies reported almost 13,000 security...

Words: 25389 - Pages: 102