The Macroeconomic Benefits of Intelligent Enterprise

Author(s):  
Thomas F. Siems

New information technologies, including e-commerce and the Internet, have brought fundamental changes to 21s t century businesses by making more and better information available quickly and inexpensively. Intelligent enterprises are those firms that make the most from new information technologies and Internet business solutions to increase revenue and productivity, hold down costs, and expand markets and opportunities. In this chapter, the macroeconomic benefits that intelligent enterprises can have on the U.S. economy are explored. We find that the U.S. economy has become less volatile, with demand volatility nearly matching sales volatility, particularly in the durable goods sector. Evidence also suggests that firms are utilizing new information technologies to lower inventory levels relative to sales, leading to higher productivity growth, lower prices, and more competitive markets.

Author(s):  
Thomas F. Siems

New information technologies, including e-commerce and the Internet, have brought fundamental changes to 21st century businesses by making more and better information available quickly and inexpensively. Intelligent enterprises are those firms that make the most from new information technologies and Internet business solutions to increase revenue and productivity, hold down costs, and expand markets and opportunities. In this chapter, the macroeconomic benefits that intelligent enterprises can have on the U.S. economy are explored. We find that the U.S. economy has become less volatile, with demand volatility nearly matching sales volatility, particularly in the durable goods sector. Evidence also suggests that firms are utilizing new information technologies to lower inventory levels relative to sales, leading to higher productivity growth, lower prices, and more competitive markets.


2019 ◽  
Vol 5 (4) ◽  
pp. 448-451
Author(s):  
L. Aripzhanova ◽  
M. Mukhitdinova

The article deals with the use of the Internet in teaching a foreign language. With the advent of the information age, both the scheme of knowledge transfer and the model of the learning process are changing sharply, which requires the improvement of professional training from the position of activation of cognitive processes.


Author(s):  
Iulian Marius COMAN

Technology has become the Intelligence Community’s new reliability, as well as its new challenge. The new transnational adversaries – international terrorists foremost among them – the flood of new information technologies, the easing of export controls on encryption technology and global access to the Internet, has led the security agencies to charting new directions in identifying, gaining access to and successfully exploiting target communications, through cooperation with all related bodies.


Author(s):  
Abdulrahman R. Alazemi ◽  
Abdulaziz R. Alazemi

The advent of information technologies brought with it the availability of huge amounts of data to be utilized by enterprises. Data mining technologies are used to search vast amounts of data for vital insight regarding business. Data mining is used to acquire business intelligence and to acquire hidden knowledge in large databases or the Internet. Business intelligence can find hidden relations, predict future outcomes, and speculate and allocate resources. This uncovered knowledge helps in gaining competitive advantages, better customer relationships, and even fraud detection. In this chapter, the authors describe how data mining is used to achieve business intelligence. Furthermore, they look into some of the challenges in achieving business intelligence.


Author(s):  
Gerardo Reyes Ruiz ◽  
Samuel Olmos Peña ◽  
Marisol Hernández Hernández

New technologies have changed the way today's own label products are being offered. Today the Internet and even more the so-called social networks have played key roles in dispersing any particular product in a more efficient and dynamic sense. Also, having a smartphone and a wireless high-speed network are no longer a luxury or a temporary fad, but rather a necessity for the new generations. These technological advances and new marketing trends have not gone unnoticed by the medium and large stores. The augmented reality applied to interactive catalogs is a new technology that supports the adding of virtual reality to a real environment which in turn makes it a tool for discovering new uses, forms, and in this case, spending habits. The challenge for companies with their private labels in achieving their business objectives, is providing customers with products and services of the highest quality, thus promoting the efficient and streamlined use of all resources that are accounted for and at the same time promoting the use of new information technologies as a strategic competitive.


Author(s):  
Rasoul Namazi

This chapter studies the influence of the Internet and new Web 2.0 technologies on the process of democratization in authoritarian regimes. The objective is to show that the new information technologies are not necessarily helpful to dissident movements and have even some negative impacts on the process of democratization. The author questions the capacity of Internet to transmit political information discusses how the new technologies contribute to the depoliticization of societies by creating passive citizens in authoritarian regimes. This chapter also shows how authoritarian regimes use new information technologies as instruments of control and repression and questions the effectiveness of the new cyber-activism by explaining the structure of the Internet and discussing the capacity of the new technologies in creating political community.


2016 ◽  
pp. 49-72 ◽  
Author(s):  
Abdulrahman R. Alazemi ◽  
Abdulaziz R. Alazemi

The advent of information technologies brought with it the availability of huge amounts of data to be utilized by enterprises. Data mining technologies are used to search vast amounts of data for vital insight regarding business. Data mining is used to acquire business intelligence and to acquire hidden knowledge in large databases or the Internet. Business intelligence can find hidden relations, predict future outcomes, and speculate and allocate resources. This uncovered knowledge helps in gaining competitive advantages, better customer relationships, and even fraud detection. In this chapter, the authors describe how data mining is used to achieve business intelligence. Furthermore, they look into some of the challenges in achieving business intelligence.


2011 ◽  
pp. 42-87
Author(s):  
Ashutosh Deshmukh

The Internet spins a vast web of information across the globe. Data and information flow freely — available to anyone for learning, understanding and analysis. Organizations can cooperate across departments, regions and countries. ERP II and ECM herald the era of intra- and inter-business collaboration. Sounds wonderful – what is the problem? The problem is as old as mainframe vs. PC and Windows vs. Macintosh. Data can move freely but are not standardized. Data streams have no universal meanings; consequently, data are not understood by all systems, analyzed easily, translated across different languages and human readable, among other things. Specialized hardware and software is needed for data decoding, and if the required tools are not available, then you are out of luck. This problem is not only confined to the Internet. A great deal of money (by one estimate, almost 20% of the U.S. gross national product) is spent on generating new information, and more than 90% of this information is in documents, not in databases. Businesses in the U.S. produce approximately 100 billion documents per year. This information is stored in various formats across a range of computer systems. These disparate storage formats cause severe problems in accessing, searching and distributing this information. Any solution (a combination of information technology products and services) that manages information across diverse software and hardware platforms must address a few key requirements. First, these solutions should be transparent to users. The technical details should not be handled by users. Second, users should be able to save data and information in the desired format; for example, databases, text files or proprietary formats. Third, a solution must intelligently retrieve data and information. This solution should be knowledgeable regarding meaning of the information itself. Finally, such solution should be capable of providing the desired output — print, screen, Web or CD/DVD format.


2010 ◽  
Vol 1 (1) ◽  
pp. 73-87 ◽  
Author(s):  
Andrea Calderaro

The Internet has largely been greeted as a technology able to create new spaces of political debate. In order to investigate the issue, scholars have paid attention to how transnational social movements use new information technologies. This has been done mainly exploring the use of the World Wide Web (WWW). However, new political spaces do not take place just on the WWW, and by consequence, research in this field cannot solely carry out Web analysis to explore the role played by the Internet in creating political debate. In looking at other areas of the Internet to understand the creation of new political space, other analytical approaches need to be adopted. The Internet also includes tools other than the WWW, such as E-Mailing Lists, collaborative on-line software, Peer-to-Peer Networks, Instant Messaging tools, and so forth. This paper explores the role that E-Mailing Lists play in creating new political spaces. To explore if and how this happens, I illustrate this crucial point with an analysis of the use of E-Mailing Lists by social movements. The case I will use is that of the organization of the protest during the G8 Summit held in Genoa in July 2001.


Sign in / Sign up

Export Citation Format

Share Document