1/46
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
Technology's Role in the Sharing Economy
Enabler of sharing economy through digital platforms connecting users.
Uber's Data Analysis
Analyzes customer behavior, traffic patterns, and demand for optimization.
Sharing Economy
Economic model of resource sharing through digital platforms.
Challenges Faced by Uber and Airbnb
Competition, regulation, and labor classification issues.
Efficient Markets Hypothesis
Financial markets fully reflecting available information, no consistent higher returns.
Facebook/Meta's Culture, Revenue Model, Growth Engines, and Competitive Advantages
Innovation-driven culture, ad revenue, user base growth, network effects, data analytics.
Facebook's Rebrand to Meta
Strategic shift towards building the online 'metaverse'.
Shift in Product/Service Mix for Facebook
Developing new products and services beyond social media.
Financial Impact of Facebook's Rebrand
Investment in new technologies, potential resource diversion for future growth.
Cambridge Analytica Scandal
Data privacy scandal involving unauthorized use of Facebook user data.
Facebook's Efforts to Earn/Regain/Maintain Consumer Trust
Transparency, data privacy practices, user control over personal information.
Facebook's 'Walled Garden'
Control over user experience and data within its ecosystem.
Technology Startups' Capital Sources
Angel investors, venture capital firms, crowdfunding, government grants/loans.
Key Drivers of Outside Criticism of Facebook
Data privacy, advertising model, dominant position in social media.
Rent the Runway's Inventory/Supplier Management Approach
Data analytics, designer partnerships for efficient rental clothing management.
Comparison of Rent the Runway to Other Apparel Companies
Focus on rentals, influencing inventory, customer relationship, sustainability practices.
Rent the Runway's Use of Data for Strategic Advantage
Demand forecasting, personalized recommendations, inventory management.
Rent the Runway's Financial Performance and Goals
Profitability through high inventory utilization, customer retention.
Customer Acquisition Costs & Customer Lifetime Value
Cost of acquiring new customers, revenue from a customer over time.
Rent the Runway's Software Development Approach
Agile development, rapid iteration, responsiveness to customer feedback.
Rent the Runway's Marketing Techniques
Targeted digital marketing, partnerships, word-of-mouth for customer acquisition/retention.
Rent the Runway's COVID-19 Pivot
Strategic shift in response to the pandemic, operational model changes.
Minimum Viable Product (MVP)
Product with enough features to attract early adopters and validate an idea.
Components of Rent the Runway's Value Chain
Design selection, inventory management, customer service, logistics, digital platform.
Components of Hardware
Central processing unit (CPU), storage devices, input/output devices.
Software Types and Their Functions
Operating systems manage hardware, applications perform specific tasks.
SQL
Structured Query Language for managing and manipulating databases.
Healthcare.gov Rollout Mistakes
Technical issues, poor user experience, inadequate testing during launch.
Database Management Software
Software for creating, retrieving, updating, and managing databases.
Firmware
Low-level control software for specific hardware devices.
ERP Applications
Large-scale software for managing and automating core business processes.
APIs
Sets of definitions and protocols for building and integrating software.
EDI
Electronic Data Interchange for exchanging business documents electronically.
Integrated Development Environments (IDEs)
Software suites for software development, including code editing, debugging.
LAMP Stack
Open-source web development software stack: Linux, Apache, MySQL, PHP.
Heartbleed Bug and Apache Log4j Security Incidents
Security vulnerabilities leading to widespread issues on the internet.
SaaS, PaaS, and IaaS
Software, Platform, and Infrastructure as a Service in cloud computing.
Fixed vs. Marginal Costs
Fixed costs don't change with production volume, marginal costs for additional units.
Open Source Software
Software with accessible source code for inspection, modification, enhancement.
Total Cost of Ownership
Assessment of IT or other costs across enterprise boundaries over time.
Virtualization
Creating virtual versions of computer hardware, storage, network resources.
Shadow IT
Unapproved IT systems and solutions within organizations, leading to inefficiencies, risks.
Categories of Cyber Threat Actors
State-Sponsored, Cybercriminals, Hacktivists, Insiders, Terrorist Groups.
3 Core Principles of Cybersecurity Programs
Confidentiality, Integrity, Availability of information and systems.
Forms of Cyber Attacks
Malware, Phishing, Man-in-the-Middle Attacks, DoS/DDoS Attacks, SQL Injection.
Your Role in Upholding Cybersecurity
Awareness, Vigilance, Compliance with best practices and policies.
Red Flags Associated with Phishing Scams
Unusual sender, urgency, attachments/links, request for sensitive information, spelling/grammar mistakes.