博文

目前显示的是 2018的博文

CASE: WHAT DOES IT TAKE TO GO MOBILE?

1: What management, organization, and technology issues need to be addresses when building mobile applications? Management Issues Mobile strategy in selecting mobile devices, operating system, applications. Mobile platform, operating system and applications which suitable with capability and business needs. The skill and capability of users by conducting training and so on. Resarch and studying customers mobile behaviour How they use their mobile devices while shopping and researching brands What information do they wanat about the brand, product features, product reviews, or retail store locations. Organization Issues Change of business objective and business process The firm needs to change their business objective and business process. It’s important to understand how, why and where customers use mobile devices and how these mobile experience change business interactions with customers. Change of employees working culture By changing business objective and new busine

CASE: Knowledge Management and Collaboration at Tata Consulting Services

1. Analyse the knowledge management efforts at TCS using the knowledge management value chain model. Which tools or activities were used for managing tacit knowledge and which ones are used for explicit knowledge?   Using the value chain model, the knowledge management efforts at TCS can be divided into the following activities: Knowledge Acquisition Over the years, TCS had acquired a vast body of knowledge and experience in several fields through on-shore and off-shore projects for its clients across the globe including GE Insurance, GE Health, Hewlett Packard, Prudential, Standard Chartered Bank etc. In addition, TCS regularly rotated people across various functions and within other Tata Group companies to gain cross-industry experience. Employees were also encouraged to be part of outside bodies like the IEEE, and go in for certifications. Knowledge Storage TCS had developed various repositories and databases for knowledge storage such as KBases, Process Asset Librari

CASE:WILL MOBILE TECHNOLOGY PUT ORBITZ IN THE LEAD?

1. How important is mobile technology in Orbitz’s business strategy ? Why ? Based on the case study given, the mobile technology is very important for Orbitz’s business strategy. Why ? This can be explain by the beginning of Orbitz company established, Orbitz distinguished itself as a leader in mobile technology. With the mobile technology as their important business strategy, Orbitz can reduce significantly their cost thus it also brings a lot of benefits to their customers. The number of people who book the hotel with mobile devices is growing every day. Mobile booking nowadays, is a booking through special applications or mobile versions of the sites. Today that kind of reservation is especially in great demand among business traveler. Travelers very appreciate the mobility and the ability to solve problems “here and now”. With mobile applications Orbitz.com and mobile version of the site, they can easily book a room, rent a car or buy an airplane ticket, regardless of location,

CASE:WIM Industries: From MRP to ERP

1: Why did WIM feel the need to implement an ERP system? Before implementing an ERP system, WIM was using a materials resource planning (MRP) system, but this system, while a large advance over paper-based management techniques, nevertheless created many problems as the company’s operations expanded. MRP systems do not integrated information from various divisions within a company, but instead automate processes and information within departments. For WIM this meant there was no platform with which to integrate data from different departments, there was a prevalence of data duplication and redundancy, and inconsistent data were supplied to managers. In addition to this, the departments within the company were acting as separate entities and information was not being shared. The growing size of the firm and the corresponding increase in the sizes of departments also bogged down the flow of information. There were also no predefined standards for data communications and information

CASE:CUSTOMER RELATIONSHIP MANAGEMENT HEADS TO THE CLOUD

1: What types of companies are most likely to adopt cloud-based CRM software services? Why? What companies might not be well-suited for this type of software?  Types of companies that may want to adopt cloud may be any company wanting to consolidate multiple services or applications into one, mainly to reduce electricity, personal or operating costs. Companies that need a Service level agreement or sense of data security would not want to invest into a cloud system. Companies who struggling with a lot of data to be store also prefer to use this. Cutting cost companies are also recommended to use this system. Cloud-based CRM would help these companies to achieve operational excellent and customer intimacy and released from fixed and operational cost. Not only that, it also allow them to subscribe and cancel without losing large up-front software license and hardware investment. Some companies are not suit with this software services. Those companies made large investment on

CASE:DP WORLD TAKES PORT MANAGEMENT TO THE NEXT LEVEL

1: HOW DID IDENTEC SOLUTION’S RFID-BASED TECHNOLOGY HELP DP WORLD INCREASE THE EFFICIENCY AND EFFECTIVENESS OF ITS CUSTOMER’S SUPPLY CHAINS? RFID has enabled DP World to increase the productivity of container hand offs, speed the entry and exit of trucks through terminal gates, and increase fuel efficiency.  Identecs’s   RFID-based solution has also enabled DP world to improve customer satisfaction by enhancing the efficiency of customer’s supply chains through smoother, faster, and more effective delivery of their containers at terminal gates.     2:DESCRIBE TWO IMPROVEMENTS THAT RESULTED FROM IMPLEMENTING THE IDENTEC RFID-BASED SOLUTION.         RFID has helped it to tighten security by providing better accuracy on inbound and outbound truck movements through the terminals. For instance, the system can automatically check whether a truck has a booking and weather it is authorized to enter the port. It also helps the elimination of lengthy paper transaction and manual i

CASE :MWEB BUSINESS: HACKED

1.   What technology issues led to the security breach at MWEB? The technology issues are compromised subscribers account details, published logon and password details that were published on the internet by hackers and MWEB previous web based self-service management system outsource to Internet Solution not yet migrate to the new MWEB network. So the reason is hackers gained access to Web based Internet Solutions self-service management system and it led to security breach that MWEB don’t have total control. 2. What is the possible business impact of this security breach for both MWEB and its customers? Possible business impacts for MWEB are: 1.They have to notifying all customers and find fast solution like contacting these customers to reset their passwords, as an added security measure. 2.They have to work together with Internet Solution to solve this issue. They need to determine reason for breach and this leads to interruption of business processes. 3.They will lose tru

CASE STUDY :STUXNET AND THE CHANGING FACE OF CYBERWARFARE

1. Is cyberwarfare a serious problem? Why or why not?  Cyberwarfare is a serious problem that should be addressed.  With technology being utilized world wide to control missiles and warfare, having a cyber threat is as serious if not more serious than a physical threat.  Cyberwarfare can also act as a catalyst and induce an all out strike of terror on other countries 2. Assess the management, organization, and technology factors that have created this problem.  From a management standpoint, until recently there hasn’t been an increase focus on ensuring that policies are in place to prevent cyberwarfare attacks from occurring in an organization.  An increased focus has to be in place to prevent this.  The organization is left vulnerable and potential physical harm to users and workers becomes a social issue that has to be addressed by the organization.  The advancement of technology and being readily available to the public has made cyberwarfare more likely to occur.  Technology

CASE:-RFID Propels the ANGKASA Library Management System

Q1: How can RFID technology simplify basic library processes like the lending and returns of books? RFID technology has simplified the basic library processes like the lending and returns of books. Borrowers just need to simply place books and other material they want to borrow on the touch screen, and hand over their cards to the library staff. The screen will automatically reads RFID tags, while the card reader opens up a member’s profile on the system for the staff to view. After that the receipt will be generated, and with the date of return clearly. This system eliminates the need for physical records, stamping, and other time-consuming activities involved in the process of checking a book out of a library. In addition, the system also minimizes human error. Besides, returning books is also much easier now by using RFID technology, the borrowers just need to simply dropping their books at any time into a specially designed “drop box” machine in the library. There is a scann

CASE:MONITORING EMPLOYEES ON NETWORKS: UNETHICAL OR GOOD BUSINESS?

1.Should managers monitor employee e-mail and Internet usage? Why or why not? I believe that it is smart for managers to monitor their employees activities on the Internet while they are at work. Employees are paid for their company work and not their personal work. If an employee is violating the companies policies, harmful and embarrassing information could be leaked to outsiders. However, I believe that managers should make their policies clear about what websites/e-mail/messages employees are allowed to access. Furthermore, If a manager is going to monitor employee activity they should warn the employees first . 2.Describe an effective e-mail and Web use policy for a company. The all the policies and an effective email and a web use policy must be designed very carefully so the employees can understand and use it for corporate resources. There are many policies that exist in the companies like all the companies have their different policies some of them do not allow any

CASE:THE BATTLE OVER NET NEUTRALITY

1.        What is network neutrality? Why has the Internet operated under net neutrality  up to this point in time?  Network neutrality is the idea that Internet service providers must allow customers equal  access to content and applications, regardless of the source or nature of the content.  The  Internet has operated under net neutrality up to this point because prior to this point there  was not as many users and content available on the Internet.  Prior to now there really  was not a concern to what was done on the Internet because Internet speed and reliability  was not efficient. 2.        Who’s in favor of net neutrality? Who’s opposed? Why? I believe that there should be net neutrality however to give a competitive edge to  specific Internet providers many ISP are opposed to net neutrality.  Net neutrality gives  the users a unified experience without having to be concerned with whether or not they  are getting the same service and content that someone who uses a diffe

CASE STUDY:Lego: Embracing Change by Combining BI with a Flexible Information System

1.Explain the role of the database in sap three-tier system There was a need for a flexible and robust IT infrastructure with business excellence and capabilities that could help management better forecast and plan. Lego implemented a SAP’s business suite which is based on a flexible three-tier client-server. Three Tier System: THE FIRST TIER (Presentation Layer) This is the software component with a client interface browser type graphic user interface (GUI). The graphic user interface is between an SAP system and the user. It gets the user input, sends it to application server for processing receives data, formats and output it. The presentation layer resides on a user’s PC, desktop or mobile device. THE SECOND TIER (Application Layer) This is where SAP software runs; it consists of at least one or more application server (one computer system) which offers the services to users and a message server responsible for communication between the application servers. In th