Free Essay

Information Tec

In: Business and Management

Submitted By thembanim
Words 2820
Pages 12
8

Management Services
Spring 2012

Efficiency

nformation 5S
By Dan Markovitz. llison is an anaesthesiologist at a major hospital in New
York. Real estate prices being what they are in the country's most expensive city, her office is only slightly bigger than a broom closet.
Every horizontal surface of
Allison's office (except for her chair) is covered - no, buried
- in paper: printed-out emails, regular mail, departmental memos, receipts from the last conference she attended, a decade's worth of professional journals...well, you get the idea. The place is a monument to the paper products industry.
Now, given that Allison does her clinical work in the operating room and doesn't see patients in her office, you might think that the mess is without consequence. After all, it only affects her, not the surgeons or the patients.
Moreover, it only interferes with the administrative aspects of her job, not critical patient care issues.
But you'd be wrong.
Allison's hospital is also a teaching hospital, which means that she's expected to write grants to bring in funds for academic research and she's supposed to publish her findings. Want to guess how many

A

papers Allison has published in the past two years? Zero.
She justifies her lack of academic productivity by explaining that her clinical responsibilities are so onerous that she has no time to find available grants and apply for them. To be fair, she does work a long day and she doesn't get as much academic time as she'd like. But when you watch her for a while, you see that's not the whole story.

Paper shuffling
It turns out that on days
Allison works in her office, she's awfully busy. She spends time moving paper from the left side of the desk to the right side. She spends time looking for articles and print-outs. She spends time looking for basic office supplies. She spends time searching for and printing out journal articles that she's already printed out - two or three times before. She even spends time feeling bad about herself, embarrassed by her office's appearance and struggling to focus on her projects for the day.
Allison isn't alone, even if her story is dramatic. The
Wall Street Journal reported in 2007 that Chevron was investing tens of millions

of dollars in an IT system upgrade because employees were spending between oneand-a-half to three days per month just searching for the information they needed to do their jobs'. Studies by the
Delphi Group and the Butler
Group found that employees spend one quarter of their time looking for information and estimated that searching accounted for 10% of labour costs. Independent internal studies at Intel and Cisco found that their employees spend one day per week searching for information^
Taiichi Ohno, the father of lean production at Toyota, is famous for his 'seven wastes'' and although he never talked about the waste of 'looking for', surely he would see that as one of the causes of unnecessary waiting which is one of the seven wastes.
Certainly, he would classify the shuffling of piles of paper and the continual sorting and re-sorting of email by sender/ date/attachment as wasted motion. Effect of chaos
In a manufacturing setting with a conveyer belt, the cost of these wastes is generally more obvious: workers struggle to find the right

Management Services
Spring 2012

Efficiency

To be sure, applying 5S yields time savings fram not having to search for information, but the more significant benefit comes from surfacing abnormalities and waste in processes so they can be fixed wrench before the piece moves past them or people in an assembly area stand around waiting for a part to arrive. But the cost is no less significant in an office. If you have to put on a pith helmet, like Howard Carter searching for King Tut, every time you need a document, you're not likely to get a lot done.
In Allison's case, the chaos of her office prevents her from focusing on her academic work, allocating time to it and working efficiently on it.
In Chevron's case, the overwhelming bulk of electronic data reduces productivity by as much as
15%, as measured by the number of days each month lost to searching.
Probably the last thing you wanted or expected when you started reading this article was to be hectored about keeping your office neat and tidy, like your mother yelling at you to pick your socks up off the floor. You've got enough going on without some clown doing a white glove test on your desk.
However, just as organisation and cleanliness on the plant floor are essential elements of a true lean transformation, it's also an essential element of a

lean transformation in the office. As Ohno once said:
"Eliminating waste is not the problem. Identifying it is."

Your work is invisible
Knowledge workers face a daunting task identifying their value-added work.
People working on an assembly line or in an operating room can easily see the work: it's that piece of metal right there on the conveyer belt or the patient lying there on the table.
But for knowledge workers, the job inputs arrive in a variety of formats emails, electronic document attachments, pieces of paper, voicemail, conversations in an office, a hallway or the breakroom - and much of it is intangible.
Also, the incoming flow of work is 'lumpy'. There's often no clear rhythm or cadence to the work as it comes in, so you can't even predict when it will arrive.
Even worse, sometimes it becomes obsolete even before you've had a chance to address it. Just think of the last time 14 budget revisions crossed your desk in the space of three days.
For all these reasons, knowledge workers struggle to keep value visible. It gets buried in waste. Take a tour of

your colleagues' offices - look at the piles of paper on the desk, the hundreds of emails stacked up in their email inboxes, the Post-it notes stuck to any clear horizontal or vertical surface - and you've got a clear image of the waste I'm talking about.

This is where 5S comes in
In some respects, 5S is the foundation of lean. It's not just about 'cleaning your room' or being faster at finding your stapler, with all the triviality that implies.
In reality, the decisions that
5S forces you to make - and the discipline it imposes - is the basis for spotting waste, for creating systems that enable work to flow more efficiently and for helping to clarify 'standard work"* in the complex, highly variable offic environment. To be sure, applying 5S yields time savings from not having to search for information, but the more significant benefit comes from surfacing abnormalities and waste in processes so they can be fixed.
Some people will claim that
5S isn't really important for knowledge workers unless they're sharing an office space or a desk with someone else.
Drawing a parallel to shadow boards for tools.

9

10

Management Services
Spring 2012

they'll say that an engineer or an art director has never lost their computer mouse or stapler on their desk.
Or they'll think of the inane 5S policies that Kyocera
Corporation has in place which, as The Wali Street
Journai reports: "Not only calls for organisation in the workplace, but aesthetic uniformity. Sweaters can't hang on the backs of chairs, personal items can't be stowed

Efficiency

beneath desks and the only decorations allowed on cabinets are official company plaques or certificates."^
But that's not what
I'm talking about. 5S for knowledge workers means
5S for the information you manage, not rules about where you can hang your sweater. Individual information 5S
It's easy to picture 5S in a manufacturing setting: clean machines, tape outlines around equipment, shadow boards for tools, a garbage-free floor etc.
In some respects 5S for manufacturing is easy because the work at each station is done exactly the same way, every time, by each person.
It's easy to define the 'right' set up and layout.
But what does 5S look like in an office? Knowledge workers do dozens of different types of jobs each day - reading and writing emails, preparing spreadsheets, analysing large budget binders, calling customers. Moreover, each person does it a bit differently
- there's no 'right' way to prepare a sales presentation.
How can you bring 5S to a fundamentally variable environment? Information 5S in an office frees you from the waste of looking for the things you need. Those things are both the tools of your trade - the computer, a stapler, pens, printer paper etc - along with the information you're working on - a budget, the draft of a speech, a new aurchasing policy.
A good 5S system makes it fast and easy to access those
¡jngs so you can do the srtant work you're being said to do. But that's just the eginning. liri (sort) means aking decisions about

each individual piece of information that has accumulated over time emails, files, reports, journals, presentations, links to websites etc. Whether you choose to actually use it for a project this week, move it to a file for future reference or toss it, the simple act of deciding what to do with each item can reveal systemic (or personal) problems by forcing you to assess how you work.
For example, if you're a medical assistant, a sloppy pile of patient charts on your desk might indicate that there's something wrong with the system of retrieving, reviewing, signing and filing essential patient information.
You can also be sure that whatever is wrong with the system will lead to lost charts, missing information and wasted time in looking for it.
Notice, though, that the charts wouldn't be visible without cleaning up the information flotsam and jetsam that wash up on your desk. Seiton (set in order) ensures that critical information can be found quickly and easily.
This is the wisdom behind a surgeon's instrument tray being laid out precisely the same way every time and a chef's mise-en-place being set up and ready. When there's an emergency or at 8pm on a Saturday night with every table full, neither the surgeon nor the chef can afford the time to hunt for something in a panic.
But even if you don't work in an operating room or run a restaurant kitchen, what happens when you or your boss go on holiday?
If activity slows down or grinds to a halt because the necessary information can't be found, there's a real problem with the system: Daily work should flow in your absence as smoothly as if you were there.

Management Services
Spring 2012

Efficiency

The concept of preventative maintenance embedded within seiso (shine) is another aspect of 5S that elevates it above simple desktop or office organisation. Regular attention to the information coming into your office ensures that you'll know if projects are in danger of falling behind schedule or if invoices are at risk of not being paid on time - and enables you to act before the situation becomes critical.
Seiketsu (standardise) demands the development of a precise routine for the most easily controlled element in a chaotic environment cleaning and organising a workspace. At first blush, this may seem unnecessarily anal - I mean, do you really need a system for cleaning out your email inbox and processing the papers that piled up during your holiday? Nevertheless, there's wisdom in the concept.
Having a system for processing and cleaning up all the information in your office means that you'll get through the activity faster and with a lower risk of missing something important. The deeper value of developing a system for a task like 5S, however, is that it acts as a springboard for the development of standard work for other areas of your job. Allison did embark on a rigorous 5S programme, throwing out the stuff that she didn't need and organising her paper and electronic files according to frequency of use.
This simple change provided her with the ability to actually see what needed her attention and to stay focused on it.
As a result, she reduced the cognitive distractions that kept her from really focusing on her writing. 'Shining' her work provided her a regular status update on her research

paper and helped define a plan for her to get the work done. Finally, standardising her
5S activities helped her to develop the discipline to do her academic research more frequently instead of allowing it to sink, literally and metaphorically, below the piles of trash in her office, or get pushed aside by other competing commitments.
To be sure, the rigour of
5S isn't a panacea for all her problems, but she now regularly spends two to three hours per week on her research and is hoping to publish a paper before the end of the year.

Systemic information 5S
As I mentioned earlier, 5S applies to both physical and electronic information and, so far, I've been talking about using it for personal information management.
But applying it to the information flows within an organisation is perhaps an even more powerful use of the tool.
Think of the reports that you produce or read: how many of them show similar or even identical information? How many of those reports do you really need? I know of one IT department that produced more than 350 reports per month for the company's managers and executives.
As part of a 5S initiative, they analysed all the reports, spoke to their customers (ie the executives) and eliminated the obsolete reports, the redundant reports and the non-user friendly reports. They reduced the volume to 37.
Similarly, a nursing team at
Covenant Health System in
Lubbock, Texas took the 5S chainsaw to the overwhelming paperwork burden that threatened to crush them daily. Before they deployed
5S, nurses spent an average of

6.1 hours per 12-hour shift on documentation. Collectively, they handled over 2.2 million forms each year. Even worse, documentation errors often weren't detected for three to five weeks after patient dismissal. A comprehensive 5S initiative involved simplifying, combining and standardising forms, leading to a 40% reduction in paperwork and a
48% reduction in time spent filling out documentation*".
Each nurse recaptured three hours per shift to spend with patients - the activity that they not only love, but which also creates the real value for the patients/customers.
In these two examples, the
5S principles of seiri (sort) and seiton (set in order) were used to reduce systemic waste
- of time, effort and energy
- and helped workers spend more time doing something important for customers.
This broader application of 5S to the management of information is just as important in reducing waste as the individual application, but has greater impact on both individual and group productivity. 1
1

References
1 Cutting Files Down to Size, by PuiWlng Tarn, The Wall Street Journal, 8
May, 2007.
2 Socialtext Enterpiise Micmblogging
White Paper, Ross Mayfield, updated
September 2009, www.socialtext.com/ offers/lmages/Microblogging_whitepaperpdf. 3 Although Ohno didn't state explicitly that these are the only wastes to be eliminated, most people consider them to be the 'classic' wastes to be avoided:
( 1 ) overproduction; (2) waiting; (3) transporting; (4) ovi?r-processing; (5) unnecessary inventory; (6) unnecessary motion; and (7) defects. Many people add an eighth waste; unused employee creativity. 4 Standard work is the safest, highest quality and most efficient way known to perform a particular process or task.
5 Neatness Counts c)f Kyocera and at
Others in the 5S Club, by Julie Jargon,
The Wall Street Journal, 27 October,
2008,
5 All data is from the presentation Breakthroughs in Reducing Nurse Documentation Time, at the Institute for Healthcare
Improvement's 22nd Annual National
Forum on Ouality Improvement in Health
Care, 7 December, ;'O1O.

ABOUT THE AUTHOR
Dan Markovitz is the
President of TimeBack
Management and the

author of A Factory of
Remember, it's a means to an end
Let's be honest: there's something about 5S and organisation in general that feels trivial at best and remedial at worst. But that's only because you're thinking about the process and not the objective.
What you're really trying to do here is make it easier to spot abnormalities and waste, allowing you to focus on creating value for your customers. From this perspective, you can view 5S as a fundamental building block, rather than remediation: it's the foundation of the cathedral of value that you're erecting.

One (Productivity Press,
December 2011). Follow him on his blog at www. timebackmanagement, com or on Twitter at
@timeback.

Copyright of Management Services is the property of Institute of Management Services and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use.

Similar Documents

Free Essay

The Game

...PLR-16 Pistol KEL-TEC CNC INDUSTRIES INC. 1475 COX ROAD COCOA FL 32926 32 1-631-0068 www. kel-tec-cnc-corn "THE USE UF A O L OK SAFE l Y LOCK IS ONLY ONE ASPECT OF RESPONSIBLE FIREARM STORAGE. FIREARMS SHOULD B E STORED UNLOADED AND LOCKED IN A LOCATIOP THAT IS BOTH SEPARATE FRC" THEIF AMMUNITION ANC ACCESSIBLE TO ILDREh ZED PE CIWNED MADE PARTS' ( SAFErV, INSTRUCTION, AND DARTS MANUAL READAND CAREFULLY FOLLOW THESE WARNINGSAND INSTRUCTIONS Make sure your "audience" is always 5 feet behind you, not next to you when firing. Keep your firearm unloaded when not in use. SAFE GUN HANDLINGIS YOUR RESPON- SlBlUM The PLR-16 pistol is designed and chambered for the 5.56mm NATO (.223Remington) cartridge. The type of ammunition is also stated on the right side of the receiver. Do not use any other ammunition. Only use commercially manufactured ammunition, clean, dry, and in good condition. Never use non-standard, reloaded or damaged cartridges. Never use ammunition where the pressure levels exceed industry standards. Kel-Tec guns are manufactured from high quality materials. They will provide extended service life. However, all warranties, expressed or implied, are voided and Kel-Tec will not be liable for property damage or personal injury and consequential damages, if faulty ammunition is used in Kel-Tec centetfire firearms. Discharging firearms in poorly ventilated areas, cleaning firearms, or handling ammunition may result in exposure to lead and...

Words: 4275 - Pages: 18

Free Essay

Information Flow Within an Organization

...Information Flow in an Organization , information is created for meaning, decision making and sharing of knowledge. Just like a river flowing information flows from one place to another, into every house, school or organization. The flow begins with the creation of the data at a terminal; this is the beginning of the information flow. From there the information flows down the pipeline through the network which is like a pipeline. Within this network of pipes you have the switching and routing of the information flow, like the valves used to push water from one location to another. From there the information flows to storage facilities like large storage facilities, these facilities in a data network are the servers, mainframes are used in conjunction with software to store, collate, and share the data just waiting to be accessed and shared. Once a person turns on the faucet or access the information the flow starts again, from the storage facility to another set of switches/routers or valves. This information is accessed like getting a drink of water. Information flow within an organization is an ever evolving process; it is circular in nature according to its activities. Chesapeake Energy’s information flow starts with the design of the information network or pipeline, network circuits include cell modems, T1 and fiber circuits. From here the routers and switches are put in place to send the information to the right storage facility or server. Software is created to determine...

Words: 729 - Pages: 3

Premium Essay

Communication Self Assessment

...Home Page »Business and Management Communications Self-Assessment In: Business and Management Communications Self-Assessment Communication style can be summed up as, the way one is perceived by others vs. how one perceives themselves and the way one interacts with others. The text “Interpersonal skills in Organizations” talks about how behaviour, personality and attitude are key factors in determining communication style. Before reading chapter 1 of the above text, I would have said that my communication skills could be heavily worked on. I am generally very shy and nervous when it comes to talking to people I don’t know and am worried about what others will think about my own thoughts and ideas. Although I am very open to others ideas and am able to see how one idea would work the same as another would, I tend to be afraid of how one might take my own interpretation. After reading the text and doing exercise 1-A and 1-B I realised that my self- evaluation of myself was not far off at all. Scoring moderately in “emotional stability” and “extroversion” shows that, although I am rather shy I am also able to work with others, even if I prefer to do solo work and am well rounded when it comes to my opinions and the options of others. My high ratings in “open to experience” and “agreeableness,” back up my theory that I am much more reserved, although I like to learn new things and look at situations from many perspectives. Having a more low or “flexible” score in “conscientiousness”...

Words: 376 - Pages: 2

Premium Essay

Check Point Information System Business Problem Dimensions

...are lack of training, difficulties of evaluating performance, compliance, work environment, lack of overall company support, indecisive and poor management. In order to have a successful business, I believe that finding solutions to these problems will improve the practice is important. What I have seen in the company I work for now is not everyone is vested in the tasks at hand so the attitudes of some people are poor. If the company can get involvement and interest in the Information System by all members of the company that will eliminate some of the problems and possible create ideas on how to financial fund a good system. 2. What is the difference between IT and information systems? Describe some functions of the information system. Information Technology or IT is the actually hardware and the software that is used for the information system that is utilized by a company. This includes everything from the computer to MS Office applications that will increase the productivity of staff. Information systems can be described as a link that brings people, business data, and computers together. Some of the functions that are noted in the text are the...

Words: 387 - Pages: 2

Free Essay

Communication Plan

...Monthly Status Meeting | -Will be face-to-face or conference call-Report the status to upper management-Well occur monthly | Monthly Reports Meeting | -Channel will be thru email, fax, or memos-Will go over reports such as; cost, issues, and progress | 2. Identify the potential barriers to effective communication and strategies for overcoming the barriers. Potential Communication Barriers | Strategies to Overcoming Barriers | Information Overload | -Listed above are a lot of meetings and employees will get overwhelmed with information that is important? - A solution for this is to have an employee take notes for each department and send them in an email for referencing. | Communication Apprehension | -Some employees may not be comfortable in a face-to-face or with written information. -A solution for this barrier would be to have a mixture of face-to-face, conference calls, and emails. This will allow for everyone to communicate their thoughts and ideas. | Filtering Information | -There will be employees that will filter information to fit the needs of the organization or team.-This will be minimized by reviewing data monthly and holding everyone accountable for their work.-Also keeping...

Words: 389 - Pages: 2

Premium Essay

Chip Positioning

...A Potato Chip Brand Positioning Exercise Frito-Lay, a division of PepsiCo, based in Dallas, Texas, plans to reposition its brand. You, as the marketing director, are responsible for such endeavour. Please present your plan. To facilitate your analysis, the results of the attitudinal survey based on an assumed representative sample of 30 kids has been stored in sheet Chip Preference.xls. These data consists of observations on the following four variables: Crunchy: Crunchiness perception (1-5 scale: 1=Low and 5=High) Salty: Saltiness perception (1-5 scale: 1=Low and 5=High Fun: Fun of eating perception (1-5 scale: 1=Low and 5=High Brand: Index of company brand (1=Brand 1, 2=Brand 2) Pref: Overall preference (1-5 scale: 1=Low and 5=High) a) First use the data to establish the relative importance and significance of each perceptual variable in explaining overall brand preference. Which two variables are the most important? (Explain). b) Develop a perceptual map by plotting the mean perceptions for both Brand 1 and Brand 2 on a two-dimensional map defined by the two independent variables found most important in your analysis in a) above). c) It is known that the Ideal point has average coordinates of 3 and 5 on the dimensions of Crunchiness and Fun of Eating respectively. Based on the ideal point perceptual values, which brand (Brand 1 or Brand 2) is closest to consumer Ideal perceptions? d) Based on your analysis, suggest how you would...

Words: 277 - Pages: 2

Premium Essay

Ups Information System

...Case summary: UPS has created its own information system with Delivery Information Acquisition Device (DIAD) and Web-based Post-Sales Order Management System (OMS) globally by using developed information technology. These special systems help the company to reduce the cost of transaction greatly. By building its efficient order information management system, UPS can make optimal routing strategy, place orders online, and track shipments to meet customer needs. These information systems guarantee the possibility of two-day delivery nationwide as well as lower warehousing and inventory costs for the company. Questions: 1. What are the inputs, processing and outputs of UPS’s package tracking system? Inputs: the inputs include package information, customer signatures, pickups, delivery and timecard information, and locations on each route. Processing: in the process of transactions, the data is transmitted to the information center and stored for retrieval. During the whole process, the data of shipped packages is available to be checked by drivers and tracked by customers. Outputs: mostly the same data as the inputs, including pickups, delivery times, locations of routes and package recipients. In addition, the outputs also include calculations of shipping rates to enable UPS customers to embed UPS functions, such as cost calculations, to their own websites. 2. What technologies are used by UPS? How are these technologies related to UPS’s business strategy? Technologies include...

Words: 494 - Pages: 2

Free Essay

3rai

...Protection Act controls how your personal information is used by organisations, business or the government. Everyone who is responsible for using data has to follow strict rules called ‘data protection principals’. They must make sure the information is: * used fairly and lawfully * used for limited, specifically stated purposes * used in a way that is adequate, relevant and not excessive * accurate * kept for no longer than is absolutely necessary * handled according to people’s data protection rights * kept safe and secure * not transferred outside the UK without adequate protection There is stronger legal protection for more sensitive information, such as: * ethnic background * political opinions * religious beliefs * health * sexual health * criminal records Source: https://www.gov.uk/data-protection/the-data-protection-act Freedom of Information Act 2000 The Freedom of Information Act gives you a wide-ranging right to see all kinds of information held by the government and public authorities. You can use the Act to find out about a problem affecting your local community and to check whether an authority is doing enough to deal with it; to see how effective a policy has been; to find out about the authorities spending; to check whether an authority is doing what it says and to learn more about reasonable decisions. Authorities will only be able to withhold information if an exemption in the Act allows them...

Words: 572 - Pages: 3

Premium Essay

Perception

...Perception The literal meaning of perception is ‘Perception is the organization, identification, and interpretation of sensory information in order to fabricate a mental representation’. The best personal encounter I had was between my newly appointed Manager & Team Lead. We used to take daily calls with our client for gathering the requirement for a new banking project. Their followed a systematic way of approach towards gathering, analyzing, and constantly discussing on the issues at hand and finally documenting and getting a written sign off on the requirement. This process was to be completed in a span of 3 months. Around the third month, the client started pushing and rushing with more requirements and there was less time to already accommodate the existing assignments at hand and on top more was coming in. As the manager was new to the project and he also wanted to establish himself, he compromised employees excessive workload by accepting and saying ‘Yes’ to whatever the client was demanding. He missed the fact that he can’t infer or perceive even without knowing what the employees had difficulties about. And secondly all this were falling into a process where the Quality of output was being compromised. The process was falling apart, then my Team Lead stepped in and had a discussion about this with the manger and made him realize that saying ‘yes’ to all what client is saying would further aggravate the issue. Accepting the requirement now and unable to cater...

Words: 366 - Pages: 2

Free Essay

Business

...and demerits. The investigator has to choose a particular method to collect the information. The choice to a large extent depends on the preliminaries to data collection some of the commonly used methods are discussed below. 1. Direct Personal observation: This is a very general method of collecting primary data. Here the investigator directly contacts the informants, solicits their cooperation and enumerates the data. The information are collected by direct personal interviews. The novelty of this method is its simplicity. It is neither difficult for the enumerator nor the informants. Because both are present at the spot of data collection. This method provides most accurate information as the investigator collects them personally. But as the investigator alone is involved in the process, his personal bias may influence the accuracy of the data. So it is necessary that the investigator should be honest, unbiased and experienced. In such cases the data collected may be fairly accurate. However, the method is quite costly and time-consuming. So the method should be used when the scope of enquiry is small. 2. Indirect Oral Interviews : This is an indirect method of collecting primary data. Here information are not collected directly from the source but by interviewing persons closely related with the problem. This method is applied to apprehend culprits in case of theft, murder etc. The informations relating to one's personal life...

Words: 1115 - Pages: 5

Premium Essay

Transforming Data Into Information

...into Information What is Data? What is information? Data is facts; numbers; statistics; readings from a device or machine. It depends on what the context is. Data is what is used to make up information. Information could be considered to be the same characteristics I just described as data. In the context of transforming data into information, you could assume data is needed to produce information. So information there for is the meaningful translation of a set of or clusters of data that’s produces an output of meaningful information. So data is a bunch of meaningless pieces of information that needs to be composed; analyzed; formed; and so forth to form a meaningful piece of information. Transforming Data Let’s pick a context such as computer programming. You need pieces of data to be structured and formed into something that will result in an output of something; a message, a graph, or a process, in which a machine can perform some sort of action. Well now we could say that information is used to make a product, make a computer produce something, or present statistical information. That would be the output of that data. The data would be numbers, words, or symbols. The information would be a message, a graph, or a process, in which a machine can perform some sort of action. Information Information could be looked at as data as well. Let’s say we need a chart showing the cost of a business expenses in relation to employee salaries. The data for showing the information is...

Words: 315 - Pages: 2

Premium Essay

Petrie's Electronic Week 3

...Petrie's Electronics Case, Chapter 5, Questions 1, 3, and 5. 1. What do you think are the sources of the information Jim and his team collected? How do you think they collected all of that information? Jim collected informations by having interviews inside the company with stakeholders. He also worked with the marketing department to get some information from loyal customers. Jim and his team gathered some information about the current system. 3. If you were looking for alternative approaches for Petrie’s customer loyalty program, where would you look for information? Where would you start? How would you know when you were done? An alternative approach could be researching many different sources. If it were me I would do my research through the internet and compare what I find to the current system used by the customers. I guess the obvious reason to know when you are done is because you can’t find or come up with any new information about the loyalty systems. 5. Why shouldn’t Petrie’s staff build their own unique system in-house? I think it would cost much more and will be much more time consuming. The better thing to do is use an outsource instead of building in-house, that way they are saving money and getting what they want a lot faster. Petrie's Electronics Case, Chapter 6, Questions 1 and 5 1. Are the DFDs in PE Figures 6-1 and 6-2 balanced? Show that they are, or are not. If they are not balanced, how can they be fixed? It looks like they are balanced...

Words: 338 - Pages: 2

Premium Essay

Storing Information

...updating the old data storage system with the new storage procedures that should be put in place in the laboratories of the new build. You need to justify why the funds from the budget should be given to implement the new data storage system. Grading Criteria * P4:Describe the procedure for storing scientific information in a laboratory information management system * M4:Explain the processes involved in storing information in a scientific workplace * D3: Discuss the advantages gained by keeping data and records on a laboratory management information system * Grading Criteria * P4:Describe the procedure for storing scientific information in a laboratory information management system * M4:Explain the processes involved in storing information in a scientific workplace * D3: Discuss the advantages gained by keeping data and records on a laboratory management information system * How Do I Do It? 1. For P4, learners must describe the procedures for storing scientific information in a laboratory information management system (LIMS). A prepared list of scientific data is provided below. Learners must decide which sets of information could be stored on a workplace record system. 2. For M4, learners must explain how scientific data and records are stored....

Words: 1219 - Pages: 5

Premium Essay

Meredith Knows Women - Case Study

...Chapter 4 Case Study Meredith: Thanks to Good Marketing Information, Meredith Knows Women 1. Meredith’s marketing information system really focuses on women. Their target market is women and it is obvious in the way they cater towards women. Some of their strengths include they cater to a woman’s progression throughout life, they have studied their customers so greatly that they have over 700 data points on each one, and they have even segmented each individuals interests in order to better serve them. Not only that, but they have so much data on their customers that they can now sell their information to other businesses. As print is a declining business, Meredith has also ventured into the online and television world and is making their presence known. They are not simply looking at the present but are also setting themselves up for the future. A weakness of Meredith is that preferences can change over time. They need to keep up with the changing interests of their customers and make sure their data points are not just a storage bin full of outdated information. Another weakness is that it is only providing to women through magazines and television shows. With all of the information they have gathered, they should be able to reach out to women in other forms such as clothing, exercise equipment, gardening tools, or even cookware. The information that they have accumulated could be used for another business venture. 2.Through impersonal...

Words: 330 - Pages: 2

Free Essay

Data

...Data & Information Define Data: Data is just raw facts and figures it does not have any meaning until it is processed into information turning it into something useful. DATA Information 01237444444 Telephone Number 1739 Pin Number A,C,D,B,A* Grades Achieved At GCSE Define Information: Information is data that has been processed in a way that is meaningful to a person who receives it. There is an equation for Information which is: INFORMATION= DATA + CONTEXT + MEANING DATA 14101066 Has no meaning or context. CONTEXT A British Date (D/M/YEAR) We now know it says 14th of October 1066. Unfortunately we don’t know it’s meaning so it’s still not information yet. MEANING The Battle Of Hastings We now know everything so it can now be defined as information. How Is Data Protected? You’re data is protected by a law called the Data Protection Act this controls how your personal information is used by organisations, businesses or the government. This means legally everyone responsible for using data has to follow strict rules called ‘data protection principles’ there are eight principles. How Your Data Is Protected Use strong an multiple passwords. Too many of us use simple passwords that are easy for hackers to guess. When we have complicated passwords, a simple “brute force attack”—an attack by a hacker using an automated tool that uses a combination of dictionary words and numbers to crack passwords using strong passwords doesn’t mean this can’t happen it just means...

Words: 904 - Pages: 4