Strategic Capabilities e-Business Example Business Value
Overcome Geographical Use internet and extranets to Provides better customer
barriers: transmit customer orders service by reducing delay Capture information about from traveling salespeople to in filing orders and business transaction from a corporate data center for improves cash flow by remote locations order processing and speeding up the billing of inventory control customers
Overcome time barriers: Credit authorization at the Credit inquiries can
Provide information to point of sale using online POS be made and remote locations networks answered in seconds. immediately after it is Checking Credit History requested SSN score assessment.
Overcome cost barriers: Desktop videoconferencing with Reduces
Reduce the cost of more business partners using internet, expensive traditional means of intranet and extranets business trips. communication Collaboration improves the quality of decisions reached. Overcome structural B2B eCommerce websites for Fast, convenient services barriers: transactions with suppliers and lock in customers and Support linkages for customers using Internet & suppliers competitive extranets IaaS, PaaS, SaaS advantage The Internet is the global system of Most popular Internet applications and interconnected computer networks that uses uses the Internet protocol suite (TCP/IP) to link E-mail devices worldwide Instant messaging Browsing the Web Newsgroups Chat rooms Publish opinions, subject matter, creative work Develop new web-based Products Develop Buy and sell new Markets & channels Downloading (data, software, Attract new Customers reports, pictures, music, videos)
Generate new Revenue sources
Reduce Costs of doing business Increase customer Loyalty & Retention A network inside an organization that uses internet technologies to provide an internet-like environment Many companies have sophisticated and widespread intranets, offering… Detailed data retrieval & information sharing Collaboration & communication Personalized customer profiles Support to business processes Links to the Internet Intranets are protected by password, encryption, firewall Customers, suppliers, and other business partners can access an intranet via extranet links
Communication and Collaboration
Intranet browser can send and receive e-mail, voice mail, pages and faxes within organization Use groupware to improve team & project collaboration Business Operations and Management with services like MS Sharepoint, OneNote, Telepresence Platform for developing and deploying critical business Discussion group, chat rooms, audio/video applications to support business operations and managerial conference decision making across the inter-networked enterprise Web Publishing order processing, inventory control, Database & EAI Easy and low cost of designing, publishing and accessing Intranet Portal management multimedia business information internally via enterprise Managing the functions of intranet intranet portal Maintaining CENTRAL access & control of various Company newsletter, product catalog, web pages hardware and software components Intranet web search to locate business information Protection against unauthorized access, computer viruses, directory management Network links that use Internet technologies to connect the intranet of a business with the intranets of another partners and customers through Direct private network links, Private secure Internet links (VPN) Unsecured Extranet Link between a company and others via the Internet, relying on encryption of sensitive data and firewall security systems Extranet enables customers, suppliers, consultants, subcontractors, business prospects and others to access selected intranet Website and other company databases
Customer and supplier access of intranet resources made easier and
faster Enabling to offer new kinds of interactive web-enabled services to business partners Build & strengthen strategic relationships Consultants : facilitate design of new products Contractors : provide outsourcing services Suppliers : ensure optimum stock level delivery in timely fashion Customers : self-service functions Online Ordering, Delivery Status, Payments RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard RFID is an acronym for “radio-frequency identification” disks or solid-state drives (SSDs) to protect data in the case and refers to a technology whereby digital data encoded of a drive failure. There are different RAID levels, however, in RFID tags or smart labels (defined below) are captured and not all have the goal of providing redundancy. by a reader via radio waves. RFID is similar to barcoding RAID works by placing data on multiple disks and allowing in that data from a tag or label are captured by a device input/output (I/O) operations to overlap in a balanced way, that stores the data in a database. RFID, however, has improving performance. Because using multiple disks several advantages over systems that use barcode asset increases the mean time between failures, storing data tracking software. The most notable is that RFID tag data redundantly also increases fault tolerance. can be read outside the line-of-sight, whereas barcodes RAID arrays appear to the operating system (OS) as a single must be aligned with an optical scanner. If you are logical drive. considering implementing an RFID solution, take the RAID employs the techniques of disk mirroring or disk next step and contact the RFID experts at AB&R® striping. Mirroring will copy identical data onto more than (American Barcode and RFID). one drive. Striping partitions help spread data over multiple disk drives. Each drive's storage space is divided into units ranging from a sector of 512 bytes up to several megabytes. The stripes of all the disks are interleaved and addressed in RFID belongs to a group of technologies referred to as order. Disk mirroring and disk striping can also be combined Automatic Identification and Data Capture (AIDC). AIDC in a RAID array. methods automatically identify objects, collect data about them, and enter those data directly into computer systems with little or no human intervention. RFID methods utilize radio waves to accomplish this. At a simple level, RFID systems consist of three components: an RFID tag or smart label, an RFID reader, and an antenna. RFID tags contain an integrated circuit and an antenna, which are used to transmit data to the RFID reader (also called an interrogator). The reader then converts the radio waves to a more usable form of data. Information collected from the tags is then transferred through a communications interface to a host computer system, where the data can be stored in a database and analyzed at a later time.