Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 6

Strategic Capabilities e-Business Example Business Value

Overcome Geographical Use internet and extranets to Provides better customer


barriers: transmit customer orders service by reducing delay
Capture information about from traveling salespeople to in filing orders and
business transaction from a corporate data center for improves cash flow by
remote locations order processing and speeding up the billing of
inventory control customers

Overcome time barriers: Credit authorization at the Credit inquiries can


Provide information to point of sale using online POS be made and
remote locations networks answered in seconds.
immediately after it is Checking Credit History
requested SSN score assessment.

Overcome cost barriers: Desktop videoconferencing with Reduces


Reduce the cost of more business partners using internet, expensive
traditional means of intranet and extranets business trips.
communication Collaboration improves the
quality of decisions
reached.
Overcome structural B2B eCommerce websites for Fast, convenient services
barriers: transactions with suppliers and lock in customers and
Support linkages for customers using Internet & suppliers
competitive extranets IaaS, PaaS, SaaS
advantage
The Internet is the global system of Most popular Internet applications and
interconnected computer networks that uses uses
the Internet protocol suite (TCP/IP) to link E-mail
devices worldwide Instant messaging
Browsing the Web
Newsgroups
Chat rooms
Publish opinions, subject matter,
creative work
Develop new web-based Products Develop Buy and sell
new Markets & channels Downloading (data, software,
Attract new Customers reports, pictures, music, videos)
 
Generate new Revenue sources
 
Reduce Costs of doing business Increase
customer Loyalty & Retention
A network inside an organization that uses internet technologies to
provide an internet-like environment
Many companies have sophisticated and widespread
intranets, offering…
Detailed data retrieval & information sharing
Collaboration & communication
Personalized customer profiles
Support to business processes
Links to the Internet
Intranets are protected by password, encryption, firewall
Customers, suppliers, and other business partners can access an
intranet via extranet links

Communication and Collaboration


Intranet browser can send and receive e-mail, voice mail,
pages and faxes within organization
Use groupware to improve team & project collaboration Business Operations and Management
with services like MS Sharepoint, OneNote, Telepresence Platform for developing and deploying critical business
Discussion group, chat rooms, audio/video applications to support business operations and managerial
conference decision making across the inter-networked enterprise
Web Publishing order processing, inventory control, Database & EAI
Easy and low cost of designing, publishing and accessing Intranet Portal management
multimedia business information internally via enterprise Managing the functions of intranet
intranet portal Maintaining CENTRAL access & control of various
Company newsletter, product catalog, web pages hardware and software components
Intranet web search to locate business information Protection against unauthorized access, computer viruses,
directory management
Network links that use Internet technologies to connect the intranet of
a business with the intranets of another partners and customers
through
Direct private network links,
Private secure Internet links (VPN)
Unsecured Extranet Link between a company and others via
the Internet, relying on encryption of sensitive data and
firewall security systems
Extranet enables customers, suppliers, consultants, subcontractors,
business prospects and others to access selected intranet Website and
other company databases

Customer and supplier access of intranet resources made easier and


faster
Enabling to offer new kinds of interactive web-enabled services to
business partners
Build & strengthen strategic relationships
Consultants : facilitate design of new products
Contractors : provide outsourcing services
Suppliers : ensure optimum stock level
delivery in timely fashion
Customers : self-service functions
Online Ordering, Delivery Status, Payments
RAID (redundant array of independent disks) is a way of
storing the same data in different places on multiple hard RFID is an acronym for “radio-frequency identification”
disks or solid-state drives (SSDs) to protect data in the case and refers to a technology whereby digital data encoded
of a drive failure. There are different RAID levels, however, in RFID tags or smart labels (defined below) are captured
and not all have the goal of providing redundancy. by a reader via radio waves. RFID is similar to barcoding
RAID works by placing data on multiple disks and allowing in that data from a tag or label are captured by a device
input/output (I/O) operations to overlap in a balanced way, that stores the data in a database. RFID, however, has
improving performance. Because using multiple disks several advantages over systems that use barcode asset
increases the mean time between failures, storing data tracking software. The most notable is that RFID tag data
redundantly also increases fault tolerance. can be read outside the line-of-sight, whereas barcodes
RAID arrays appear to the operating system (OS) as a single must be aligned with an optical scanner. If you are
logical drive. considering implementing an RFID solution, take the
RAID employs the techniques of disk mirroring or disk next step and contact the RFID experts at AB&R®
striping. Mirroring will copy identical data onto more than (American Barcode and RFID).
one drive. Striping partitions help spread data over multiple
disk drives. Each drive's storage space is divided into units
ranging from a sector of 512 bytes up to several megabytes.
The stripes of all the disks are interleaved and addressed in RFID belongs to a group of technologies referred to as
order. Disk mirroring and disk striping can also be combined Automatic Identification and Data Capture (AIDC). AIDC
in a RAID array. methods automatically identify objects, collect data about
them, and enter those data directly into computer systems
with little or no human intervention. RFID methods utilize
radio waves to accomplish this. At a simple level, RFID
systems consist of three components: an RFID tag or smart
label, an RFID reader, and an antenna. RFID tags contain an
integrated circuit and an antenna, which are used to transmit
data to the RFID reader (also called an interrogator). The
reader then converts the radio waves to a more usable form
of data. Information collected from the tags is then
transferred through a communications interface to a host
computer system, where the data can be stored in a database
and analyzed at a later time.

You might also like