...Chapter 9 Achieving Operational Excellence and Customer Intimacy: Enterprise Applications Video Cases Video Case 1a: What Is Workday: Enterprise Software as a Service (Saas) Video Case 1b: Workday: Mobile Solutions for iPad Video Case 2: Evolution Homecare Manages Patients with Microsoft CRM (2011) Video Case 3: Sinosteel Strengthens Business Management with ERP Applications (2008) Instructional Video 1: Zara’s: Wearing Today’s Fashions with Supply Chain Management 6.1 Copyright © 2014 Pearson Education publishing as Prentice Hall Management Information Systems, Global Edition Chapter 9: Achieving Operational Excellence and Customer Intimacy: Enterprise Applications LEARNING OBJECTIVES • Describe how businesses use enterprise systems to achieve operational excellence. • Explain how supply chain management systems coordinate planning, production, and logistics with suppliers. • Describe how customers relationship management systems help firms achieve customer intimacy. • Explain the challenges posed by enterprise applications. • Describe the new technologies used by enterprise applications. 9.2 Copyright © 2014 Pearson Education Management Information Systems, Global Edition Chapter 9: Achieving Operational Excellence and Customer Intimacy: Enterprise Applications Enterprise Systems • Enterprise Systems – Enterprise resource planning (ERP) systems – Suite of integrated software modules and a common central database – Collects ...
Words: 2000 - Pages: 8
...Enterprise Risk Management: Non-Linear Pro Learning Team C LAW531 18 April 2013 Professor Tiffeny Young In the Instructor’s Resource Video, Quick Takes Video (QTV), a video editing firm, leased or purchased equipment from Non-Linear Pro (NLP), a manufacturer of video editing equipment. The manager at QTV had been expressly told by a representative of Non-Linear Pro that if his editors were “computer savvy” they would be able to learn the software in “a day or a day and a half, tops”; however, although the editors at Quick Takes Video had taken a one day course to learn how to use the equipment, watched a video tutorial, and read the manual, they had been unable to operate the equipment effectively enough in order to reach Non-Linear Pros claims that QTV would “be twice as fast” . They had been making efforts to make progress for two weeks, but had only found that the equipment had a great number of bugs in it. In addition, in the course of attempting to operate the equipment, one of the editors at QTV injured her hand on a sharp piece of metal on or near one of the drives. The area did not contain a warning label. It is clear that Non-Linear Pro has “misrepresented the quality of the product” and can be sued for the tort of misrepresentation. There was an expressed warranty from the representative of Non-Linear Pro, which included a specific statement of fact that the editors at QTV would be “up and running in a day and a half” and that they would be “twice as fast”...
Words: 1666 - Pages: 7
...when you consider that an overwhelming majority of projects do not meet this criteria. To put a figure to that, Claudia Vandermitt in her 2011 article on Managing Scope Creep makes a note to mention that only 32% of all projects were successful in completing on time and on budget. That is quite a shocking percentage, but when you think about how fast IT technology is advancing and creating solutions that encompass the whole enterprise then you can start to get a better picture of the internal and external factors that a project manager needs to plan for to make things not spiral out of control. This is what is going to set the backdrop of this assignment and here I will expand upon and analyze these concepts. For this assignment I’ll start out by discussing the challenges faced in IT systems planning and things the project manager will need to do initially to ensure they have a firm grasp of the project’s scope. Then I’ll introduce the term scope creep and define how this comes about. I’ll finish this discussion by discussing how using some best practices and methodologies, specifically Strategic Systems Planning (SSP), can help mitigate the effects of scope creep to get and keep your project back on track. With that let’s...
Words: 2477 - Pages: 10
...Enterprise Risk Management Lowell Adkins, Garry Hardison Jr, Rickie Morgan, Tracy Ramos 531/Law July 11, 2012 Michael J. Mills, J.D. Enterprise Risk Management Non-Linear Pro is an organization that sells and leases video editing equipment. The company claims by using their editing system it will reduce work hours on a variety of projects. Non-Linear Pro recently leased its equipment on a trial basis to Quick Takes Video; a company that edits documentaries, sports, and various events. However, during the trial the employees of Quick Takes Video, along with management, claim the product did not function properly under the agreed leasing arrangement. Nonetheless, Non-Linear Pro has taken legal action against Quick Takes Video stating they are liable for $5,000 for the use of its editing system. Quick Takes Video may countersue Non-Linear Pro under section 2A-201 of the Uniform Commercial Code (UCC) that is the basic Statute of Frauds provision for contracts for the leasing of goods (Cheeseman, 2010). In this paper the authors will identify the potential tort risk of Product Liability that has escalated between the two companies. The authors will also discuss how the proper design and execution of an Enterprise Risk Management (ERM) system would help Non-Linear Pro avoid accusations that its sales team is misrepresenting the product and using fraudulent tactics to influence customers to purchase its equipment. Management Commitment to ERM The ability to manage...
Words: 1586 - Pages: 7
...Enterprise-wide knowledge management systems are firm-wide efforts to collect, store, distribute, and apply digital content and knowledge. A vast array of technologies for storing structured and unstructured content, locating employee expertise, searching for information, disseminating knowledge, and using data from key corporate systems are used. Companies have to work with many different kinds of knowledge and knowledge issues. The three major categories of enterprise-wide knowledge management systems for dealing with these different kinds of knowledge are: #1. Structured knowledge systems #2. Semi-structured knowledge systems #3. Knowledge network systems Some knowledge exists already somewhere in the firm in the form of structured text documents and reports or presentations, and the central problem is organizing this existing structured knowledge into a library and making it accessible throughout the firm. Managers may also need information that may exist somewhere inside the firm in the form of less-structured documents, such as e-mail, voice mail, chat room exchanges, videos, digital pictures, brochures, or bulletin boards. This is considered semi-structured knowledge or digital asset systems. Systems for structured and semi-structured knowledge are known as knowledge repositories. A knowledge repository is a collection of internal and external knowledge in a single location for more efficient management and utilization by the organization. Selecting and implementing...
Words: 1096 - Pages: 5
...ERM 7-Step Process ERM 7-Step Process According to Harb, Enterprise Risk Management is people, systems and processes working together across the organizations to systematically think about and manage a wide range of risks that could impede achieving organizational objectives/opportunities. In this paper we will discuss the potential tort risk that arose as a result of Non-Linear Pro leasing unsatisfactory equipment to Quick Takes, and how to effectively apply the 7-Step Enterprise Risk Management process in evaluating the violation that was imposed upon Quick Takes by Non-Linear Pro, when they failed to supply equipment that performed as advertised it to perform. In the Product Liability Video, Non-Linear Pro leased hardware to Quick Takes. The equipment was leased to Quick Takes with the understanding that it would speed up editing time. Quick Takes soon discovered that the equipment did not have enough memory to get the job done, which caused their competent editors to work tirelessly for two weeks with little results. From the video we gather that Non Linear Pro has committed several tort violations in the dealings with Quick Takes such as: 1. Misrepresenting the quality of the product. 2. Express Warranties – Non Linear Pro made the express warranty as to the way a product would perform, guaranteeing the product would in fact perform that way. 3. Breach of Contract – Product did not perform the way it is intended to. 4. Damages: Benefit of the Bargain- Employees...
Words: 1439 - Pages: 6
...In the video, I watched are about mentor students such as Hanna Carney is a mentor program coordinator for the MNBLN and her role is to invite college students with disabilities and recruit mentors to help other people in the program. Anastasia is in the mentorship program and plans to work in community development she meets with her mentor Dawn Kirchener who works as a mentor with the MNBLN, and meets Anastasia every 2 weeks she helps students shows great great energy and improvement easy engagement to be connected with the advocates. Anastasia comments that she is excited to find resources from advocates and help herself as well. Dawn Kirchener recommends people to be part in the MNBLN program because there are many opportunities to help students to...
Words: 1828 - Pages: 8
...Recruitment and Selection in developing nations China Introduction As a developing country, China’s science and technology and economy has been developing steadily. Human resources management is no longer a patent of the Western countries. Chinese companies are also having realized the importance of human resource for an enterprise. To solve this problem, not only to raise awareness, but also to constantly improve human resource management system, staff motivation, staffing and corporate culture construction efforts, especially in the Recruitment and Selection. But compared to western countries, Chinese enterprises' human resources system still exist many shortcomings and difficulties. The development of the Chinese Human Resource Management System From 1978 to 1995, human resource management is made under the red tape of labor personnel management system. According to the actual situation of the company, make a labor personnel management system that make all staff operating activities standardized, institutionalized, coordinated, and to ensure the normal work. From 1995 to 2008, human resources management system makes under the Labor Law. “This Law is hereby formulated in accordance with the Constitution in order to protect the legitimate rights and interests of laborers, readjust labor relationship, establish and safeguard the labor system suiting the socialist market economy, and promote economic development and social progress.”( Baker & MCKenzie, 2008) After 2008...
Words: 1800 - Pages: 8
...Knowledge Management using Enterprise Content Management System Knowledge Management is increasingly becoming an important area for every enterprise. Today the knowledge is in the form of content generated and used within an organization. Organizations face challenges in collating, tagging, identifying, storing, retrieval, reuse, archival and disposal of this content. Enterprise Content Management (ECM) aims at managing all of the unstructured information or content in an enterprise. ECM manages content or information that exist in an enterprise in different digital formats viz., text documents, spreadsheets, still images, audio and video files, and many other file types and formats. About the Author Anand Rao Anand is the Global KM Practice Head in TCS. He has worked in IT industry for last 25+ years on various technologies and has 18+ years of experience in ECM technologies. Enterprise Content Management System 1 TATA CONSULTANCY SERVICES Table of Contents 1. Introduction 2. Enterprise Content Management Components 3. Document Management Systems 4. Workflow 5. Forms Management 6. Web Content Management 7. Digital Asset Management 8. Enterprise Reports Management 9. Records Management 10. Collaboration 11. Search 12. Knowledge Maturity-5ikm3 13. Need For A Maturity Model 3 4 4 5 5 6 6 6 7 7 7 8 8 Enterprise Content Management System 2 TATA CONSULTANCY SERVICES Introduction Enterprises generate content as part of their day-to-day operations. This content is about their...
Words: 4213 - Pages: 17
...Phoenix. All rights reserved. University of Phoenix© is a registered trademark of Apollo Group, Inc. in the United States and/or other countries. Microsoft©, Windows©, and Windows NT© are registered trademarks of Microsoft Corporation in the United States and/or other countries. All other company and product names are trademarks or registered trademarks of their respective companies. Use of these marks is not intended to imply endorsement, sponsorship, or affiliation. Edited in accordance with University of Phoenix© editorial standards and practices. Course Description This course prepares students to evaluate the legal risks associated with business activity. Students create proposals to manage an organization’s legal exposure. Other topics include the legal system, alternative dispute resolution, enterprise liability, product liability, international law, business risks, intellectual property, legal forms of business, and governance. Policies Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents: • University policies: You must be logged into the student website to view this document. • Instructor policies:...
Words: 2508 - Pages: 11
...successful e-transformation journey. National Drilling Company (NDC) basically is the largest drilling contractors in the Middle East, providing its customers with quality drilling, work-over and well maintenance services, while maintaining the highest safety, integrity and environment standards and implementing the international best practices in terms of quality and enhancing efficient productivity. Established in 1972, NDC was the first venture among the ADNOC Group of Companies. Today, the company operates a huge fleet (over 60 nos.) of land, offshore drilling rigs, island rigs, Multi-Purpose Service Vessel, as well as water well rigs. Since Rig ND-1 began work in 1973, NDC has drilled over 6,000 wells land, offshore and island. Although NDC has celebrated its 40 years in 2012, IT and its involvement in NDC throughout that have only been felt and appreciated in the last 10 to 15 years. Many IT related projects, step-change initiatives, and high profile implementations occurred during the said period and I’m going to mention four main ones, namely: SAP ERP implementation, VSAT connectivity of the remote sites, corporate intranet portal and video conferencing. SAP ERP implementation Prior to the introduction of an ERP platform into the organization, most of the legacy applications that NDC was using were built in-house, not scalable, and lacked proper and adequate integration. Moreover, the hardware and software to support those applications were old, perform as silos, and...
Words: 1411 - Pages: 6
...Introduction: This essay serves as a guide to my Enterprise Market Stall Short Course. This is a Six-week course with the purpose of providing learners with the experience of forming, planning and then running their own business. This guide will begin with an overview of the course, its structure, aims and objectives. Next, the need for the course will be examined alongside the significance of the environment that has created the need for such a course. The curriculum approach will be discussed in order to determine the validity of the course. Finally, the feasibility of the course will be revealed, bringing the essay to an end with a conclusion that will confirm the future of such a course. Experiential Learning will be recurring theme throughout this guide, as the emphasis on the need for practical learning will be promoted. About The Course My proposed course is called, the Enterprise Market Stall Short Course. The aim of this course is to equip learners with the skills needed to contribute to the running of a project, including the planning, delivery and review phases. The course will cover resource planning for a project, communication with stakeholders along with individual and overall project performance review. Students will be challenged and will develop transferrable skills by engaging in real time live business opportunities and in most cases experience the realities of planning and launching their own enterprise. The course starts with students grouping...
Words: 4623 - Pages: 19
...have admission to, and may learn from, experiences of each other. Knowledge Management (KM) is the method in which a corporate like BP can take the knowledge of its experts and employees across the world and carry it all together to form a competitive advantage and best practice. BP began using of KM principles in the mid-1990s when Lord Browne was CEO (under his leadership) and has sustained until now with the implementation and development of KM Guidelines for Production and Exploration. "The simple minimum for Knowledge Management is to make KM strategy a actuality: to confirm that people are out there relating the best knowledge which BP has, in a constant manner all over the world," says Houston- BP consultant Wendy C Valot. "Knowledge Management holds all disciplines connected to E&P, from engineering to drilling to task management, with the creation of the best performs." According to E&P, best training is available as either technical or drilling practices (industrial) or regulation notes (task management) for all the 100 or more sub-categories and disciplines of work which BP assumes. Groups of practice are, then, key for confirming that KM is effective and survives. Groups of practice allow persons across a...
Words: 3625 - Pages: 15
...Subject Outline Subject Name: Managing Entrepreneurial Enterprises Code: LB5207:03 Study Period: SP21, 2014 Study Mode: Internal Campus: Brisbane Subject Coordinator: Dr. Boaz Bernstein Pre-requisites: If pre-requisites apply to your subject, provide link to subject in Studyfinder <https://secure.jcu.edu.au/app/studyfinder/index.cfm> e.g., For prerequisites for EV3010, see https://secure.jcu.edu.au/app/studyfinder/index.cfm?subject=EV3010&year=2013&transform=subjectwebview.xslt Note that where a subject is offered across different campuses and/or modes and/or teaching periods within the one calendar year, the learning outcomes will be the same and, other than in exceptional circumstances, there will be no variation in assessment type or weighting. Any minor variation in assessment type or weighting will be authorised through relevant School/Faculty processes and by Head of School, and documented in the subject outline/s, prior to the commencement of the subject. The design of course content and learning experiences across different campuses and/or modes and/or teaching periods within the one calendar year will ensure equivalent opportunity for students to achieve learning outcomes. This subject outline has been prepared by the School of Business, Faculty of Law, Business and the Creative Arts, James Cook University. Updated 20 March 2014. Q1. This subject is offered across more than one campus and/or mode and/or teaching...
Words: 6085 - Pages: 25
...Assignment 1: Identifying Potential Malicious Attacks, Threats, and Vulnerabilities Shauna Video games have been around for many years. As technology progresses unfortunately so does the security risks that come with online gaming. “The number of American households which play video games is a roughly 65%.” (Source 2) With any network organization you want to make sure that you keep on top of vulnerabilities of anything that reaches out to the internet. Computers and servers that touch the internet are ones that must be scanned. As a company you have to make sure that you configure the security settings for the operating system, internet browser and security software. As a company you also want to set personal security policies for online behavior. There also needs to be an antivirus installed on the network like Norton or Symantec which blocks threats targeting the vulnerabilities. “With the firewalls you want to configure them in the reputable internet security program to block unsolicited request communication.” (Source 1) Email server needs to be sure that spam doesn’t get through the network. The ways that spam works is unwanted email messages get solicited to a large number of recipients. “Spam should be a major concern in your infrastructure since it can be used to deliver email which can include Trojan horses, viruses, worms’ spyware and targeted attacks aimed specifically in obtaining sensitive and personal identification information...
Words: 1027 - Pages: 5