Free Essay

Essentials of Management Information Systems Kenneth C. Laudon and Jane P. Laudon

In:

Submitted By Nirob
Words 666
Pages 3
“For the past 25 years, Maruti Suzuki has been the industry leader in India’s passenger car market, the fastest growing in world. Since 1995, Maruti Suzuki has built its IT infrastructure on Oracle database and technologies including Oracle Real Application Clusters, Oracle Fusion Middleware Application Server and Weblogic. Maruti Suzuki has built its Enterprise Resource Planning (ERP) system on Oracle E-Business Suite and added Hyperion Enterprise to further enhance financial consolidation and reporting efficiency.” L= 5:30.
URL http://www.youtube.com/watch?v=aZWAzbRm-ms
CASE “Oracle Corporation (NASDAQ: ORCL) specializes in developing and marketing enterprise software products particularly database management systems. Through organic growth and a number of high-profile acquisitions, Oracle enlarged its share of the software market. By 2007 Oracle ranked third on the list of largest software companies in the world, after
Chapter 5 Case 1 Maruti Suzuki Business Intelligence and Enterprise Databases 2 continued Microsoft and IBM. Subsequently it became larger than IBM after its acquisition of Hyperion and BEA.
The corporation has arguably become best-known due to association with its flagship Oracle database. The company also builds tools for database development, middle-tier software, enterprise resource planning software (ERP), customer relationship management software (CRM) and supply chain management (SCM) software.
The founder and CEO of Oracle Corporation, Larry Ellison, has served as Oracle’s CEO throughout the company’s history. Ellison also served as the Chairman of the Board until his replacement by Jeffrey O. Henley in 2004. Ellison retains his role as CEO.
Ellison took inspiration from the 1970 paper written by Edgar F. Codd on relational database systems named “A Relational Model of Data for Large Shared Data Banks.” He had heard about the IBM System R database from an article in the IBM Research Journal provided by Ed Oates (a future co-founder of Oracle Corporation). System R also derived from Codd’s theories, and Ellison wanted to make his Oracle product compatible with System R, but IBM stopped this by keeping the error codes for their DBMS secret.
Ellison co-founded Oracle Corporation in 1977 under the name Software Development Laboratories (SDL). In 1979 SDL changed its name to Relational Software, Inc. (RSI). In 1982, RSI renamed itself as Oracle Systems to align itself more closely with its flagship product Oracle Database.”
You may find some of the terms used in the video are new and refer to specific elements of Oracle’s suite. Oracle’s Real Application Clusters (Oracle RAC), is an option to Oracle Database 11g Enterprise Edition. RAC supports the deployment of a single database across a cluster of servers located throughout the firm providing fault tolerance, performance and scalability with no application changes necessary.
“Oracle’s Fusion Middleware is a set of software services (applications) that enable multiple applications in a firm (often from different vendors) to work together by sharing information. So-called “middleware” can be purchased from many large vendors like IBM, HP, Microsoft as well as from thousands of smaller suppliers. The software consists of a set of enabling services that allow multiple processes running on one or more machines to interact across a network. This technology evolved to provide for interoperability in support of the move to coherent distributed architectures, which are used most often to support and simplify complex, distributed applications. It includes web servers, application servers, and similar tools that support application development and delivery. Middleware is especially integral to modern information technology based on XML, SOAP, Web services,
1.
What were the business challenges facing Maruti Suzuki management prior to adopting the Oracle suite?
2.
What advantages does Maruti Suzuki derive from working with a single vendor, Oracle? What are the possible risks of working with a single vendor?
3.
What were the important business factors which management used to evaluate Oracle’s database offerings?
4.
Why was it important that a vendor’s products be able to integrate with “legacy systems?”
5.
What are the business benefits reported by management to using the Oracle suite of products?

Similar Documents

Premium Essay

Infrastructure Hardware

...Information Technology Infrastructure P A R T II 4 IT Infrastructure: Hardware and Software 5 Foundations of Business Intelligence: Databases and Information Management 6 Telecommunications, the Internet, and Wireless Technology 7 Securing Information Systems Part II provides the technical foundation for understanding information systems by examining hardware, software, databases, networking technologies, and tools and techniques for security and control. This part answers questions such as these: What technologies and tools do businesses today need to accomplish their work? What do I need to know about these technologies to make sure they enhance the performance of my firm? How are ISBN 1-269-41688-X these technologies likely to change in the future? 107 Essentials of Management Information Systems, Tenth Edition, by Kenneth C. Laudon and Jane P. Laudon. Published by Prentice Hall. Copyright © 2013 by Pearson Education, Inc. IT Infrastructure: Hardware and Software LEARNING OBJECTIVES C H A P T E R 4 STUDENT LEARNING OBJECTIVES After completing this chapter, you will be able to answer the following questions: 1. 2. What are the components of IT infrastructure? What are the major computer hardware, data storage, input, and output technologies used in business? What are the major types of computer software used in business? What are the most important contemporary hardware and software trends? What are the principal issues in...

Words: 21212 - Pages: 85

Premium Essay

Essentials of Management Information Systems

...Securing Information Systems LEARNING OBJECTIVES C H A P T E R 7 STUDENT LEARNING OBJECTIVES After completing this chapter, you will be able to answer the following questions: 1. Why are information systems vulnerable to destruction, error, and abuse? What is the business value of security and control? What are the components of an organizational framework for security and control? What are the most important tools and technologies for safeguarding information resources? 2. 3. 4. ISBN 1-256-42913-9 232 Essentials of MIS, Ninth Edition, by Kenneth C. Laudon and Jane P. Laudon. Published by Prentice Hall. Copyright © 2011 by Pearson Education, Inc. C HAPTER O UTLINE Chapter-Opening Case: Boston Celtics Score Big Points Against Spyware 7.1 System Vulnerability and Abuse 7.2 Business Value of Security and Control 7.3 Establishing a Framework for Security and Control 7.4 Technologies and Tools for Protecting Information Resources 7.5 Hands-on MIS Projects Business Problem-Solving Case: Are We Ready for Cyberwarfare? BOSTON CELTICS SCORE BIG POINTS AGAINST SPYWARE While the Boston Celtics were fighting for a spot in the playoffs several years ago, another fierce battle was being waged by its information systems. Jay Wessel, the team’s vice president of technology, was trying to score points against computer spyware. Wessel and his IT staff manage about 100 laptops issued to coaches and scouts, and sales, marketing, and finance employees, and these...

Words: 21009 - Pages: 85

Premium Essay

Prescribed Texts for Mba

...BUSINESS ADMINISTRATION - BOOK LIST MBA YEAR 1 MODULE Management and Organisational Behaviour Management and Organisational Behaviour Managerial Economics TEXTBOOK Prescribed Book: Contemporary Management 4th Edition Recommended Book: Management and Organisational Behaviuor Prescribed Book: Managerial Economics - An Analysis of Business Issues 3rd Edition AUTHOR / EDITOR Garett Jones PUBLISHER McGrawHill Laurie J.Mullins Prentice Hall Howard Davies & Pun-Lee Lam Prentice Hall Managerial Economics Recommended Book: Economics for South African Mohr P, Faurie and Associates Students 3rd Edition Prescribed Book: Applied Business Statistics: Methods Trevor Wegner and Applications Recommended Book: Quantitative Methods for Decision Makers 4th Edition Van Schalk Managerial Statistics Juta Managerial Statistics Mike Wisniewski Prentice Hall Prescribed Book: Management Management Information Information Systems Systems - Managing the Digital Firm 9th Edition Recommended Book: Management Essentials of Business Information Systems Information Systems 7th Edition Prescribed Book: Accounting for NonFinancial and Accounting Students 6th Managerial Edition Accounting Recommended Book: Fundamentals of Cost and Financial and Management Accounting 5th Managerial Edition Accounting Marketing Management Marketing Management Kenneth C Laudon, Jane P Laudon Prentice Hall Kenneth C Laudon, Jane P Laudon Prentice Hall Dyson JR Prentice Hall ...

Words: 377 - Pages: 2

Premium Essay

Monitoring Employees

...Networks William C. Bridges IT/205 February 28, 2014 Professor Song Tang   The e-mail process benefits organizations by allowing for inter-company communications faster and more direct. . Email benefits an organization in speed of communication between its employees as well as management and also the decreased cost of this method of instant communication. Using e-mail lets employees communicate with each other and management immediately for purposes of meetings, lunch’s, and other activities within and on company time. Instead of having a messenger walk the meeting notice over to the employee, or having to read it on a board. Having an e-mail system in place also saves on the expense of paper products and ink. Limiting e-mail usage to certain content and delivary allows organizations to control the information that is going in, around and out of the company. It would be safe to say that, that control dis-allows for breach of sensitive information about the company. For instance when an e-mail is sent outside of the company it goes through several check points and filters to authenticate its destination. During that transmission several layers are compared and sequenced to keep the message in place and verify its contents so nothing is lost or corrupted during the transmission and receipt. Though it is possible if being transmitted over the internet it is vulnerable to hackers and others with malicious intent. Also, the risk of sensitive organization information, client information...

Words: 626 - Pages: 3

Premium Essay

Information Use

...In today’s society most business are reliant on information systems to perform everyday activities. These activities range from inventory to customer relations to employee files. An example of this is information technology in the healthcare system. Healthcare systems such as the EPIC system which is what most healthcare establishments have upgraded to in order to handle everything from physicians notes to patents protected health information and test results. Many companies have done away with the old methods of file keeping such as paper files and now store all of their business information such as contact information, suppliers, employee files and other information on an electronic database. By using an electronic database companies are able to better relate customers, suppliers, and parts. For example a company might use a relational database table system. This would mean that the organization would first make a table with all of the suppliers assigning each unique supplier a personal number to identify them by in case of multiple suppliers having the same name. The company would then have a list of all of the parts they acquire from all of the suppliers. Each part would be assigned a specific part number and the table would include the supplier number for the part. By organizing information like this it is much easier for a company to be able to order more parts from a supplier because the supplier is connected to the part verses having to look through an entire category...

Words: 789 - Pages: 4

Premium Essay

Essay

...Dirt Bike Management Kendric D. Bryant IT/205 December- twenty-second, 2013 Sharon Allsopp Dirt Bike Management Dirt bikes management I’m proud that your company has chosen me (Kendric Bryant) to offer my services as an Information Technology consultant. During this formal research, I will analyze your existing system and provide feedback to your business based on my findings. Besides, I’ll give you the very best soft and hardware technology that money can buy. In addition, this hardware and software upgrade will increase productivity within your business possibly earning more money for a larger bottom-line. As you already know, it is very important that peer-to-peer communication within the business is found. We can look into integrating an intranet system that will give employees access that own personal information while at work or home. After the research, I will meet with you all to go over the tools that are needed for the group’s success. The intranet will offer an array of benefits for companies that want their own In-house system. I can provide these solutions that will give your employees more convenience at work and complete business or personal tasks on or off the job. The results help with increasing productivity by reducing time away from work. However, a standing information policy must be established to ensure the continuity of digital information laws that may affect clients and employees alike. With the proper Information policy...

Words: 1241 - Pages: 5

Premium Essay

Yyj Gfhfghjg Ereegrhtr

...Essentials of Management Information Systems Essentials KENNETH C. LAUDON AND JANE P. LAUDON CHAPTER 8 CASE 1 ACHIEVING OPERATIONAL EXCELLENCE AND CUSTOMER INTIMACY: ENTERPRISE APPLICATIONS Sinosteel Strengthens Business Management with ERP Applications VIDEO CASE Systems Systems TAGS SUMMARY URL CASE Coordination of decentralized business units; centralization of business rules; data security; management decision making; real-time “enterprise wide” resource planning (ERP); collaboration; knowledge sharing. China’s state owned strategic resources enterprise Sinosteel Corporation uses Oracle Enterprise Resource Management (ERP) to strengthen its business management and global reach. L= 4:50. http://www.youtube.com/watch?v=j5rBGljckjw “Sinosteel Corporation (abbreviated as Sinosteel) is a central enterprise under the administration of the State-Owned Assets Supervision and Administration Commission. There are 76 subsidiaries under the administration of Sinosteel, among which 53 are in China and 23 abroad. The revenue from core businesses reaches RMB 111 billion in 2008. Chinese currency is called the Renminbi (RMB), and it is currently trading at .146 US dollars in 2009. Sinosteel is mainly engaged in developing and processing of metallurgical mineral resources, trading and logistics of metallurgical raw materials and products, and related engineering technical service and equipment manufacture. It is a large multicontinued CHAPTER...

Words: 810 - Pages: 4

Free Essay

Password Security

...Password Management 5 Public Key Infrastructure 6 Single Sign-On (SSO) 6 One-Time Password (OTP) Tokens 7 Biometrics 7 Fingerprints 7 Face Scans 7 Retina Scans 7 Iris Scans 7 Palm Scans 8 Hand Geometry 8 Heart Patterns 8 Voice Pattern Recognition 8 Signature Dynamics 8 Keystroke Patterns 8 Password Managers 8 Conclusion 9 Bibliography 10 Introduction Human beings are arguably the weakest link in computer and information security. People pose such a significant threat to their own computer networks and personal information simply because they don’t keep password security in the forefront of their mind. This is one of the reasons passwords are considered a poor security mechanism. Still, passwords are the most common method for user authentication on computer systems and websites. Passwords are so easily hacked and used to steal personal information such as bank account credentials, credit card numbers, etcetera, contributing to the significant growth of identity theft, most of which could be prevented by using strong passwords and not writing them down. End user education on more secure authentication methods such as strong password creations and two factor authentication can help to improve cyber security for all organizations. User Accounts One of the key tasks to administering a network is managing user accounts. User accounts have two main functions according to the Guide to Networking Essentials: 1. To...

Words: 2777 - Pages: 12

Premium Essay

Individual-Internet Tools at Dirt Bikes

...Individual-Internet Tools at Dirt Bikes IT / 205 – Management of Information Systems The management at Dirt Bikes is concerned with how much is being spent on communication with people regarding the developments in the motorcycle industry and global economy. A potential alternative to how they are communicating today is making the internet their primary source of how they research, communicate and market their business. The assessment will conclude what would be more of a savings for the company, provide a recommendation of how Dirt Bikes can benefit from what the proposal, provide at least two tools that would be helpful and provide the benefit to the organization of wireless access to employees. Today Dirt Bikes may be losing potential customers and not obtaining the up to date information because the internet is not their primary source of data. Based on my assessment using the internet will help Dirt Bikes find information about the global economy and the motor cycle industry on a global scale. This assessment discovered problems already existing in Dirt Bike's communications and information retrieval systems, the proposal will provide the best solutions. It will analyze the kind of internet tools and technologies that best benefit both the company, its employees, and meet all of their stated current and projected future needs. This paper will attempt to go over intranet systems, as well as other methods that the company can use to meets...

Words: 871 - Pages: 4

Premium Essay

It205 Week 8 Assignment

...investigated so more members of the organization have a better understanding of the problem. Coming up with and evaluating alternatives then possibly selecting the best option would come next. The final stage of implementing a hardware replacement would involve replacing a system, testing it, introducing the new system to the organization, and refining the overall process over time. One also needs to look at the five major variables of project management - scope, time, cost, quality, and risk involved in the process. The five major variables of project management need to be evaluated and applied to this particular situation. First of those variables we will look at is the scope of the project. Scope is what work is or is not included in a project. An example of this is given in the textbook. The scope of a project for a new order processing system might include new modules for inputting orders and transmitting them to production and accounting but not any changes to related accounts receivable, manufacturing, distribution, or inventory control systems. In a hardware replacement project, this could include what systems are being changed out with new hardware but retaining existing software. The project management defines all the work that is required for a project to be completed successfully and should ensure that the scope does not exceed or expand beyond what was originally intended. The second and one of the more important variables is time. Time is the amount of time required...

Words: 1654 - Pages: 7

Free Essay

Personal Finance

...Introduction to information systems 2e canadian ed rainer cegielski splettstoesser hogeterp sanchez rodriguez instructor manual Introduction to logic, 14e irving m. Copi solutions manual and test bank Introduction to managerial accounting 6e brewer garrison solutions manual and test bank introduction to organic and biochemistry, 8th edition solutions manual and test bank by frederick a. Bettelheim | william h. Brown introduction to personality toward an integrative science of the person 8e walter yuichi ayduk test bank introduction to research in education, 9th edition solutions manual and test bank by donald ary | lucy cheser jacobs | christine k. Sorensen | david a. Walker introduction to sociology, 11th edition solutions manual and test bank by henry l. Tischler Jones - essentials of contemporary management - 5e, solutions manual and test bank 0078029341 juvenile delinquency: the core, 5th edition solutions manual and test bank by larry j. Siegel | brandon c. Welsh irm and tb Kleppner's advertising procedure, 18/e ron lane karen king tom reichert solutions manual and test bank labor relations: striking a balance 4th edition by john budd solutions manual and test bank Machine elements in mechanical design, 4/e robert l. Mott solutions manual Macroeconomics 10e - slavin – solutions manual and test bank for 9780073511429, mcgraw-hill Macroeconomics, 8/e solutions manual and test bank by andrew b. Abel, Management a practical introduction 5e angelo kinicki solutions manual Management information...

Words: 953 - Pages: 4

Premium Essay

It Infrastructure: Hardware and Software

...Essentials of Management Information Systems KENNETH C. LAUDON AND JANE P. LAUDON continued Systems CHAPTER 4 IT INFRASTRUCTURE: HARDWARE AND SOFTWARE CASE 2 Salesforce.com: SFA on the iPhone and iPod Touch VIDEO CASE TAGS Mobile digital platform; iPhone; Salesforce.com; sales force automation; device-based software development platforms; contemporary software application development; SaaS; PaaS; NetSuite. SUMMARY Salesforce.com develops a mobile sales force management application for the iPhone using Apple’s iPhone software development platform (SDK). A striking, contemporary example of the emerging digital platform where most computing will take place by 2015. L= 4:27. URL http://www.youtube.com/watch?v=fwo2VbDA1Io CASE Salesforce.com is a leading provider of software-as-a-service applications delivered over the Internet. The SaaS model is a departure from traditional software bought and installed on machines locally. Salesforce.com has been very successful and has shaken up the software industry with its innovative business model. More information on Salesforce.com is available in Chapter 5 of the text. 1. What are some examples of ‘disruptive’ products created by Apple? How disruptive of a product is the iPhone and why? 2. Describe some of the unique ways Salesforce’s SFA application uses the iPhone’s features, including at least one not mentioned above. 3. What other companies or Web sites that you know of have open development platforms? VIDEO...

Words: 733 - Pages: 3

Premium Essay

Bike Dirt Information Management

...Dirt Bike’s management is concerned about communication expenses and how much money is being spent on obtaining information on the subject of developments in the motorcycle industry and the global economy. In order for this organization to effectively communicate and obtain information efficiently, I will evaluate Dirt Bike’s problems and will provide recommended solutions on what type of Internet tools and technology would be beneficial to both the employees and the organization. An intranet system will be discussed. Two other Internet tools will be introduced to the organization that would be beneficial if utilized. The benefits of wireless technology will be discussed and the impact it would have on the Dirt Bikes organization. A comparison of costs between wireless and wired networks is also included for management’s review. It reveals the benefits of a wireless network. It will also show that installing a wireless network is much cheaper than the installation of a wired network. Internet Tools at Dirt Bikes Recommendations After evaluating the Dirt Bikes organization, I recommend the following solutions: Since the Dirt Bikes organization already provides Internet access to all employees who use desktop computers, it would be beneficial to create a private network by using the existing network infrastructure paired up with Internet connectivity standards and software developed for the World Wide Web (WWW). According to Laudon and Laudon (2009), Internet...

Words: 1073 - Pages: 5

Premium Essay

Solution Accounting

...Advanced Accounting Beams Anthony 11th Edition Solutions Manual Click here to download immediately!!! http://solutionsmanualtestbanks.blogspot.com/2011/10/advanced-accountingbeams-anthony-11th.html ----------------------------------------------------------------------Advanced Advanced Advanced Advanced Accounting Accounting Accounting Accounting Beams Beams Beams Beams Anthony Anthony Anthony Anthony 11th 11th 11th 11th Edition Edition Edition Edition Solutions Solutions Solutions Solutions Manual Manual Manual Manual -------------------------------------------------------------------------***THIS IS NOT THE ACTUAL BOOK. YOU ARE BUYING the Solution Manual in e-version of the following book*** Name: Advanced Accounting Author: Beams Anthony Edition: 11th ISBN-10: 0132568969 Type: Solutions Manual - The file contains solutions and questions to all chapters and all questions. All the files are carefully checked and accuracy is ensured. - The file is either in .doc, .pdf, excel, or zipped in the package and can easily be read on PCs and Macs. - Delivery is INSTANT. You can download the files IMMEDIATELY once payment is done. If you have any questions, please feel free to contact us. Our response is the fastest. All questions will always be answered in 6 hours. This is the quality of service we are providing and we hope to be your helper. Delivery is in the next moment. Solution Manual is accurate. Buy now below and the DOWNLOAD LINK WILL APPEAR IMMEDIATELY once payment is...

Words: 19905 - Pages: 80

Premium Essay

Learning

...Essentials of Management Information Systems KENNETH C. LAUDON AND JANE P. LAUDON CHAPTER 4 IT INFRASTRUCTURE: HARDWARE AND SOFTWARE Hudson’s Bay Company and IBM: Virtual Blade Platform CASE 1 (a) What Is Server Virtualization? TAGS Computer utilization; data center servers; multiple operating systems; virtualization and data center capacity; economic and management results SUMMARY Server virtualization is a technique of optimizing computing resources by dividing individual physical servers into ‘virtual servers’ with their own environments and applications. It is one of the most common methods for companies to consolidate computing power, reduce costs, and become ‘greener’ as a result. The first video is a basic introduction to server virtualization. L=2:35. (b) Hudson’s Bay Company and IBM: Virtual Blade Systems Platform TAGS SUMMARY Strategic alliance with IBM; blade servers; SANS environment; Citrix; reduced “on the fly” maintenance; appliance computing; server consolidation; Director Software; predictive failure analysis; lower management costs Hudson’s Bay Company is a Canadian firm founded in 1670 as a fur trading company. Today Hudson’s Bay operates 500 stores, and is one of the largest retailers in Canada. The company turned to IBM’s virtualization platform to achieve cost savings, greater flexibility, and reliability, as it grew to provide customers with new services and products. L=7:21. First, watch...

Words: 921 - Pages: 4