Networked Supply Chain Management

Size: px
Start display at page:

Download "Networked Supply Chain Management"

Transcription

1 1 Networked Supply Chain Management Session 2

2 Agenda Supply-Chain Management Opportunities and Challenges Technology Choices and Solutions Cisco Case Study Emerging Industry Exchanges Next Steps 3 The -Enabled Enterprise Channel/Distribution Partners Customer Care E-Commerce Business Engaged Enterprise Supply Chain Management Customer Workforce Optimization E-Learning Suppliers/ Manufacturers Employees 4

3 Why Supply Chain Management? Increasing customer demands Measured on responsiveness Expectation of high, consistent quality Mass customization Globalization of competition Broadening of global markets Emergence of new competitors Scale for growth Rising development costs Compressed product lifecycle Need dramatic cost reduction Need to return to core competency Rapid development cycle To survive in the economy enterprises need to extend processes to create a virtual extended enterprise 5 The Extended Enterprise Product Service Depot Inventory, Versions, Demand Message Business Engaged Enterprise Order Fulfillment Order Commit, Demand, Planning, Build, Ship, Pay Order Customer Product Life Cycle Design, Release, Change, Retire Suppliers/ Manufacturers 6

4 We estimate that supply-chain planning vendor revenue will top $3.6 billion, triple today s current revenue, by 2002 By 2004, 90% of enterprises that fail to apply SCM technology and processes will lose preferred supplier status. Supply-Chain Management Growth Gartner, ITxpo 99 Enterprises plan to increase their extranets by 41% over the next two years. Forrester Research Inc 99 7 SCM Example: TSMC and Adaptec Process integration with Extricity, SAP multiple automated processes: Purchase Order/Acknowledgement WIP Update Ship Notification Demand Forecast Engineering Design and Test Results: Increased customer loyalty Reduced product lead times 14 Times ROI over three-year period 8

5 Modes of Networking and Collaboration Private Network (FR, ISDN, Leased Line, xdsl, Cable) VAN Dialup/EDI Application Integration Data Exchange Your Browser/ XML/EDI Access IP VPN Marketplaces Browser/ XML Process Sharing 9 How Do You Connect With Your Extranet Partners Today? Frame Relay Leased Line Public Public (VPN) Dialup/ISDN Carrier IP (IP/VPN) ATM 6% 34% 34% 28% 28% 26% 50% Survey of 50 Global 2500 Companies Source: Forrester Research Inc Nov 99 10

6 Business Requirements Drive Connectivity Solution Business process Integration No. of business partners Mission criticality Relationship flexibility Cost sensitivity High Availability Scalability Security Network Solutions Typically Companies Choose More Than One Solution Cost QoS Flexibility Access Private Network EDI/ VAN IP VPN Exchanges 11 Private Network Your Application Integration 56 kbps Router Front-End ISDN Frame Relay Strategic set of suppliers/partners Limited scalability due to cost Router Router High level of control (security, performance) Access Process Sharing 12

7 Your Private Network: Security Cisco Secure PIX Firewall Cisco Secure Access Control Server Firewalls for protecting confidential internal resources 56 kbps Router ISDN Frame Relay Authentication, authorization for preventing unauthorized user access Router Router PIX Firewall Partner Network Password/ Token Cisco Secure Integrated Firewall 13 Cost of Supply-Chain Downtime Application ERP Supply Chain Mgmt. E-Commerce Banking Customer Service Center Electronic Funds Transfer Messaging Cost per Minute $13,000 $11,000 $10,000 $7,000 $3,700 $3,500 $1,000 Survey of 250 Fortune 1000 Companies Source: The Standish Group 14

8 Private Network: High Availability WAN -SP2 WAN- SP1 ISDN Partners Fast convergence around failures Network device redundancy and resiliency Dual homing to service providers SLA monitoring 15 Your Virtual Private Networks Application Integration IP VPN Process Sharing Servers Scalable Affordable IP VPN service can provide improved SLA VPN Client 16

9 Your Virtual Private Networks: Security Message Digital Certificate Certificate Authority IP VPN Message Digital Certificate Application Integration Process Sharing Authentication: Digital Certificates, Shared Keys Privacy: Virtual Private Networks, IPSec VPN Client 17 Your Virtual Private Networks: Integrated Solution Cisco Secure PIX Firewall Cisco 7100 IP VPN Cisco 1720 Cisco 2600 Application Integration Process Sharing Integrated routing, VPN, firewall, QoS and IPSec support Cisco IOS software Release

10 Your Centralized VPN Client Scalability and Management VPN 3000 Concentrator PPTP/IPSec/L2TP Digital certificate authentication Cisco 7100 IP VPN -Based Management Multiple VPN Clients Support for 1000 s of client sessions Client autoconfigured with user authentication Centrally defined policy-based network access 19 Your Dialup to Value-Added Network EDI Electric Data Interchange X12/EDIFACT Data Exchange over VANs 9.6 kbps Dialup VAN 9.6 kbps Partner A Partner B Partner s EDI System Purchasing System EDI Translator Standard document Non-repudiation Non-real-time Partner C Too expensive for smaller suppliers 20

11 Access and EDI over the Your EDI over Partner A Access EDI Servers EDI to Portal Partner B Cost effective for all suppliers and partners Limited integration 21 -Access Scalability Your EDI over Cisco 7200 Partner A Access EDI Catalyst 6500 Servers LocalDirector EDI to Portal Partner B Server Load Balancing (SLB) scalable web access LocalDirector, Integrated SLB 22

12 -Access Security Policy Manager Cisco Secure PIX Firewall Hacker Partner A EDI over Access EDI Catalyst 6500 LocalDirector Partner B Servers EDI to Portal Perimeter Security Firewalls 23 -Access Security Policy Manager Secure Intrusion Detection Server EDI over Partner A Update Policy Access EDI Catalyst 6500 LocalDirector Partner B Servers EDI to Portal Intrusion Detection Security Policy Management 24

13 -Access Availability Your PIX ISP 2 Access EDI Servers Catalyst 6500 LocalDirector ISP 1 Load balancing across ISP s, network and servers Fast automatic fail-over transparent to user HSRP, fast spanning tree, stateful failover Maximize server availability Supplier 25 High Availability Across the Stack Network Applications Databases Enterprise Storage Infrastructure Minimizing planned and unplanned downtime Distributed intelligence Fast convergence Load balancing/ redundancy Robust hardware and software Best practices 26

14 Partnering for Highly Available E-Business Back-End and Middle-Tier Enterprise Storage Database Cluster Oracle Parallel Server Oracle8i Front-End Access Network Cache Engine Catalyst Switch PIX Firewall Distributed Director Cisco Router Partner/ Customer EMC Symmetrix Connectrix Celerra Powerpath TimeFinder SRDF Oracle Application Server Application Servers Local Director Servers 27 High Availability Foundation Back-End and Middle-Tier Enterprise Storage Database Cluster Front-End Access Network Partner/ Customer ISP 1 ISP 2 Backup Application Servers Servers 28

15 Network Solutions Benefits Summary Business Flexibility Process Integration Scalability Reliability Security Cost Latency Private Network VPN VAN Good Poor 29 Cisco Case Study Problem: Scale through dramatic growth Increased product volume and complexity Higher customer expectation for delivery Solution: Partnerships between key suppliers and functions in Cisco Results: $175M annual savings $269M revenue contribution 56% product outsourced >90% factories are partner owned 45% reduction in supply chain inventories 30

16 Elements of Cisco s Supply-Chain Customer Cisco Connection Online (CCO) CCO Message Order Manufacturing Connection Online (MCO) Suppliers Single Enterprise Autotest Order Entry Planning Dynamic Replenishment Manufacturing Connection On-line Direct Fulfillment Product Data Procurement Business Systems Autotest Control Extranet Shipping Management System Production System Autotest cell Global Manufacturers 31 Cisco s Partner Network ERP/PDM Servers EDI Servers Cisco HQ San Jose, CA Frame Relay Service Provider 2 Frame Relay Service Provider 1 ISDN VAN Platinum Manufacturers Suppliers Gold Suppliers Silver Suppliers and Vendors /EDI VPN EDI Partners 32

17 Emerging Industry Exchanges Customer Enterprises Partner Customer Care E-Commerce Supply Chain Management Buyer Flexibility Industry Exchange Hosted Application Scalability to support all-tiers New applications Procurement Supplier Partner 33 Industry Exchange Applications Real-time visibility Collaborative planning Build-to-order Optimized inventory A Multitier, Integrated Supply Chain Collaborative Product Development Exchanges E-Enabled, Dynamic Trading Communities On-line development Collaborative design Interactive scheduling Auctions, RFQs Consortium buying Liquid market for surplus Catalog purchasing 34

18 Industry Exchange Predictions 10,000 B2B exchanges by 2003 (source: Gartner) $7.29 trillion in B2B commerce by 2004 (source: Gartner) 250 million business users procuring over the by 2003 (source: IDC) 40% of B2B will be captured by B2B exchanges by 2004 (source: B2B Exchanges ) 35 Industry Exchanges Today 1st B2B E-Marketplace in Belgium Multi-Billion-Dollar B2B Venture Retail s First Worldwide Online Supply Marketplace 36

19 Industry Exchange Datacenter Customers Buy Order Status Datacenter Exchange Host Exchange Operators Supply Chain Partners Industry Exchange Reverse Auctions Datacenter Suppliers Secure, Guaranteed Delivery of Messages and Transactions 37 Industry Exchange Infrastructure Requirements Exchanges Behave Like Public Utilities Available During Local Disasters Disaster Protection Infrastructure Requirements High Availability Downtime Effects Whole Industry Meet Unlimited User Volume Scalability Security Highly Confidential Information 38

20 What s Next Attend other related Networkers presentations: E-Commerce Introduction to VPNs Advanced Topics in Enterprise VPN s and PKI VPN Product Update Understand your supply-chain business goals Engage Cisco and ecosystem partners Develop networking strategy and choose appropriate infrastructure(s) 39 Networked Supply Chain Management Session 40

21 Please Complete Your Evaluation Form Session 41 42

IP-VPN Architecture and Implementation O. Satty Joshua 13 December 2001. Abstract

IP-VPN Architecture and Implementation O. Satty Joshua 13 December 2001. Abstract Abstract Virtual Private Networks (VPNs) are today becoming the most universal method for remote access. They enable Service Provider to take advantage of the power of the Internet by providing a private

More information

WAN Traffic Management with PowerLink Pro100

WAN Traffic Management with PowerLink Pro100 Whitepaper WAN Traffic Management with PowerLink Pro100 Overview In today s Internet marketplace, optimizing online presence is crucial for business success. Wan/ISP link failover and traffic management

More information

IBM enetwork VPN Solutions

IBM enetwork VPN Solutions IBM enetwork VPN Solutions the Reach of Your Network Extend Agenda Description and Value of a VPN VPN Technology IBM's VPN Solutions and Future Enhancements Summary What is a VPN? Remote Access Business

More information

A Guide to WAN Application Delivery for the SME Market

A Guide to WAN Application Delivery for the SME Market A Guide to WAN Application Delivery for the SME Market Worry-Proof Internet 2800 Campus Drive Suite 140 Plymouth, MN 55441 Phone (763) 694-9949 Toll Free (800) 669-6242 A Guide to WAN Application Delivery

More information

Mastering Network Design with MPLS

Mastering Network Design with MPLS Mastering Network Design with MPLS Overview In this paper, enterprise CIOs, IT&T professionals and network architects will learn how to improve productivity and security by designing multi-location Virtual

More information

INTERNET TECHNOLOGIES AND SUPPLY CHAIN MANAGEMENT

INTERNET TECHNOLOGIES AND SUPPLY CHAIN MANAGEMENT INTERNET TECHNOLOGIES AND SUPPLY CHAIN MANAGEMENT A number of companies have used the Internet to lower costs and add value to their businesses The Internet has already had a tremendous impact on the field

More information

FatPipe Networks www.fatpipeinc.com

FatPipe Networks www.fatpipeinc.com XTREME WHITE PAPERS Overview The growing popularity of wide area networks (WANs), as a means by which companies transact vital information with clients, partners, and colleagues, is indisputable. The business

More information

Chapter 5. B2B E-Commerce: Selling and Buying in Private E-Markets

Chapter 5. B2B E-Commerce: Selling and Buying in Private E-Markets Chapter 5 B2B E-Commerce: Selling and Buying in Private E-Markets Learning Objectives 1. Describe the B2B field. 2. Describe the major types of B2B models. 3. Discuss the characteristics of the sell-side

More information

ECESSA. White Paper. Optimize Your Network on a Limited IT Budget

ECESSA. White Paper. Optimize Your Network on a Limited IT Budget ECESSA White Paper Optimize Your Network on a Limited IT Budget The days of a single Internet connection are over. Many organizations are quickly recognizing that redundant link access at a reasonable

More information

Colt IP VPN Services. 2010 Colt Technology Services Group Limited. All rights reserved.

Colt IP VPN Services. 2010 Colt Technology Services Group Limited. All rights reserved. Colt IP VPN Services 2010 Colt Technology Services Group Limited. All rights reserved. Agenda An introduction to IP VPN Colt IP VPN Hybrid Networking Workforce Mobility Summary 2 Drivers behind IP VPN

More information

Telecom Business Continuity Solutions FOR INTERNAL USE ONLY

Telecom Business Continuity Solutions FOR INTERNAL USE ONLY Telecom Business Continuity Solutions FOR INTERNAL USE ONLY Business continuity? Perception versus reality Perceived biggest threats in 2005* Events causing disruption in 2003-04** IT / Telecom protection

More information

BUSINESS-BUSINESS (B2B) E-COMMERCE STRATEGIES AND SOLUTIONS. Presented by LEENA J MANWANI

BUSINESS-BUSINESS (B2B) E-COMMERCE STRATEGIES AND SOLUTIONS. Presented by LEENA J MANWANI BUSINESS-BUSINESS (B2B) E-COMMERCE STRATEGIES AND SOLUTIONS Presented by LEENA J MANWANI INTRODUCTION The Big Bucks on the Internet these days are coming from B2B (businessto-business) deals--buying and

More information

FatPipe Networks www.fatpipeinc.com

FatPipe Networks www.fatpipeinc.com WARP WHITE PAPERS FatPipe WARP Reliability, Redundancy and Speed of Bi-directional IP Traffic The implementation of mission critical applications run over wide area networks as a basic communication tool

More information

Assessing Business Continuity Solutions

Assessing Business Continuity Solutions Assessing Business Continuity Solutions Ensuring the uninterrupted operation of businesses is an issue of increasing importance not just for large enterprises but for medium and small organizations as

More information

Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications

Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications Product Overview Cisco Dynamic Multipoint VPN (DMVPN) is a Cisco IOS Software-based security solution for building scalable

More information

B2B E-COMMERCE: A PRIMER

B2B E-COMMERCE: A PRIMER B2B E-COMMERCE: A PRIMER Bruno Floriani bruno.floriani@lapointerosenstein.com Lapointe Rosenstein Montreal, Quebec Most of us have heard or read headlines about the explosive growth potential of the B2B

More information

Chapter 5: Understanding Internetworking Infrastructure

Chapter 5: Understanding Internetworking Infrastructure Chapter 5: Understanding Internetworking Infrastructure Key questions What are the basic components of Internetw orking Infrastructures? What Business Implications do they bring? The Future? A Graphical

More information

POINT OF VIEW. The Critical Role of Networking in Enterprise Resource Planning. Introduction

POINT OF VIEW. The Critical Role of Networking in Enterprise Resource Planning. Introduction The Critical Role of Networking in Enterprise Resource Planning Introduction Achieving and maintaining competitive advantage is the raison d etre for every business around the world. Doing so requires

More information

Infotriever Production Environment

Infotriever Production Environment Availability Infotriever Production Environment High-availability requires well-structured processes for application quality assurance and change control. Infotriever has taken great care to eliminate

More information

Internet e-commerce: Reinventing EDI for the Web

Internet e-commerce: Reinventing EDI for the Web IBM Global Services Internet e-commerce: Reinventing EDI for the Web Introduction EDI Services About 2 million companies with 10 or more employees are prime candidates to join those companies already using

More information

Stephen Miles. Transform IT assets to Drive Business Service Innovation. CA Expo Hong Kong. Vice President - Service Assurance Asia Pacific & Japan

Stephen Miles. Transform IT assets to Drive Business Service Innovation. CA Expo Hong Kong. Vice President - Service Assurance Asia Pacific & Japan Stephen Miles Vice President - Service Assurance Asia Pacific & Japan CA Expo Hong Kong 21 September, 2012 Transform IT assets to Drive Business Service Innovation The age of innovation has arrived CLOUD

More information

Secure Network Design: Designing a DMZ & VPN

Secure Network Design: Designing a DMZ & VPN Secure Network Design: Designing a DMZ & VPN DMZ : VPN : pet.ece.iisc.ernet.in/chetan/.../vpn- PPTfinal.PPT 1 IT352 Network Security Najwa AlGhamdi Introduction DMZ stands for DeMilitarized Zone. A network

More information

Remote Connectivity for mysap.com Solutions over the Internet Technical Specification

Remote Connectivity for mysap.com Solutions over the Internet Technical Specification Remote Connectivity for mysap.com Solutions over the Technical Specification June 2009 Remote Connectivity for mysap.com Solutions over the page 2 1 Introduction SAP has embarked on a project to enable

More information

Managed Services The. The Road to Revenue. Pravin Mahajan pmahajan@cisco.com. Session Number Presentation_ID

Managed Services The. The Road to Revenue. Pravin Mahajan pmahajan@cisco.com. Session Number Presentation_ID Managed Services The The Road to Revenue Pravin Mahajan pmahajan@cisco.com Session Number 1 Agenda Managed Services Introduction Solution Offerings Market to Services Mapping Summary 2 High Business Interest

More information

Community Development and Training Centre Semester 2 2006 IT 245 Management Information Systems

Community Development and Training Centre Semester 2 2006 IT 245 Management Information Systems Chapter 5 Electronic Commerce System Community Development and Training Centre Semester 2 2006 IT 245 Management Information Systems Electronic Commerce: Electronic commerce encompasses the entire online

More information

Module 6. e-business and e- Commerce

Module 6. e-business and e- Commerce Module 6 e-business and e- Commerce 6.1 e-business systems 6.2 e-commerce systems 6.3 Essential e- commerce processes 6.4 Electronic payment processes 6.5 e-commerce application trends 6.6 Web store requirements

More information

Everything You Need to Know About Network Failover

Everything You Need to Know About Network Failover Everything You Need to Know About Network Failover Worry-Proof Internet 2800 Campus Drive Suite 140 Plymouth, MN 55441 Phone (763) 694-9949 Toll Free (800) 669-6242 Overview Everything You Need to Know

More information

How Virtual Private Networks Work

How Virtual Private Networks Work How Virtual Private Networks Work by Jeff Tyson This article has been reprinted from http://computer.howstuffworks.com/ Please note that the web site includes two animated diagrams which explain in greater

More information

How Linksys Successfully Integrated with the Cisco Network Infrastructure

How Linksys Successfully Integrated with the Cisco Network Infrastructure How Linksys Successfully Integrated with the Cisco Network Infrastructure Selective IT integration approach improves network performance, security, resilience, and costs for Linksys division. Cisco IT

More information

Layer 4-7 Server Load Balancing. Security, High-Availability and Scalability of Web and Application Servers

Layer 4-7 Server Load Balancing. Security, High-Availability and Scalability of Web and Application Servers Layer 4-7 Server Load Balancing Security, High-Availability and Scalability of Web and Application Servers Foundry Overview Mission: World Headquarters San Jose, California Performance, High Availability,

More information

IBM Enterprise Asset Management

IBM Enterprise Asset Management IBM Enterprise Asset November 14 th, 2012 Daniel STAN Tivoli Software Sales, IBM Romania IBM Tivoli 2012 Strategic Capabilities VISIBILITY CONTROL AUTOMATION See and understand your business in real time

More information

Enterprise Network Solution

Enterprise Network Solution Enterprise Network Solution CONTENT p Enterprise Evolution p DCN Solutions p Case Studies Business Driven More Productivity More profitability Business Driven Challenge Productivity Improve Efficiency

More information

P&SM: eprocurement. CIPS Position on Practice

P&SM: eprocurement. CIPS Position on Practice CIPS Position on Practice P&SM: eprocurement 'The combined use of electronic information and communications technology (ICT) in order to enhance the links between customer and supplier, and with other

More information

Cisco Router and Security Device Manager (SDM)

Cisco Router and Security Device Manager (SDM) Cisco Router and Security Device Manager (SDM) Session Number 1 Cisco SDM: Combining Ease Of Use & Application Intelligence Cisco SDM is an intuitive, web-based tool for Easy and Reliable Deployment and

More information

Introduction. Technology background

Introduction. Technology background White paper: Redundant IP-VPN networks Introduction IP VPN solutions based on the IPsec protocol are already available since a number of years. The main driver for these kinds of solutions is of course

More information

Delivering Cloud Services Transformation : Plan > Build> Assure> Secure. Stephen Miles Vice President, Solution Sales, APJ

Delivering Cloud Services Transformation : Plan > Build> Assure> Secure. Stephen Miles Vice President, Solution Sales, APJ Delivering Cloud Services Transformation : Plan > Build> Assure> Secure Stephen Miles Vice President, Solution Sales, APJ Agenda Cloud is Great, Cloud is Good More Options, More Complexity From Outlier

More information

Partnering for Success in Market Transition

Partnering for Success in Market Transition Partnering for Success in Market Transition Trần Ngọc Vinh Business Development Manager Managed Services Cisco Vietnam tranvinh@cisco.com 2006 Cisco Systems, Inc. All rights reserved. tranvinh@cisco.com

More information

Case-study: SwissAir. The Internet Business. Case-study: SwissAir. Case-study: SwissAir. Summary. Summary

Case-study: SwissAir. The Internet Business. Case-study: SwissAir. Case-study: SwissAir. Summary. Summary Case-study: SwissAir The Internet Business Old model: check flight info online Step 1. Toward customers e-ticketing, electronic check-in frequent flyer miles Web site personalization (and statistics!)

More information

WAN. Introduction. Services used by WAN. Circuit Switched Services. Architecture of Switch Services

WAN. Introduction. Services used by WAN. Circuit Switched Services. Architecture of Switch Services WAN Introduction Wide area networks (WANs) Connect BNs and LANs across longer distances, often hundreds of miles or more Typically built by using leased circuits from common carriers such as AT&T Most

More information

White Paper. Complementing or Migrating MPLS Networks

White Paper. Complementing or Migrating MPLS Networks White Paper Complementing or Migrating MPLS Networks Table of Contents 1. Executive Summary... 3 2. Complementing MPLS Networks... 3 3. Migrating from MPLS Networks with Elfiq s SitePathMTPX... 5 4. Calculating

More information

CARRIER MPLS VPN September 2014

CARRIER MPLS VPN September 2014 CARRIER MPLS VPN September 2014 SERVICE OVERVIEW The International MPLS IP-VPN service provides a full range of VPN connectivity solutions, including: Carrier MPLS IP VPN: dedicated to operators looking

More information

Concepts in Enterprise Resource Planning

Concepts in Enterprise Resource Planning Objectives Concepts in Enterprise Resource Planning Third Edition Chapter Eight ERP and Electronic Commerce After completing this chapter, you will be able to: Describe business-to-business b i e-commerce

More information

IP VPN Solutions Secure, flexible networking options from a leader in IP solutions

IP VPN Solutions Secure, flexible networking options from a leader in IP solutions IP VPN Solutions Secure, flexible networking options from a leader in IP solutions IP VPN Security that s virtually everywhere An increasing number of businesses today are leveraging the power of IP virtual

More information

VPLS lies at the heart of our Next Generation Network approach to creating converged, simplified WANs.

VPLS lies at the heart of our Next Generation Network approach to creating converged, simplified WANs. Virtual Private LAN Service (VPLS) A WAN that thinks it s a LAN. VPLS is a high security, low latency means to connect sites or services either point-to-point or as a mesh. We use Virtual Private LAN Service

More information

Chapter 14! Enterprise Computing!

Chapter 14! Enterprise Computing! Chapter 14 Enterprise Computing Enterprise computing involves the use of computers in networks, such as LANs and WANs, or a series of interconnected networks that encompass a variety of different operating

More information

Worldwide WAN Optimization Management 2005-2009 Forecast and Analysis

Worldwide WAN Optimization Management 2005-2009 Forecast and Analysis Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com EXCERPT Worldwide WAN Optimization Management 2005-2009 Forecast and Analysis Network Infrastructure

More information

EDI BROCHURE ELECTRONIC DATA INTERCHANGE WITH FORD. created by GSEC, Global Supplier Electronic Communications

EDI BROCHURE ELECTRONIC DATA INTERCHANGE WITH FORD. created by GSEC, Global Supplier Electronic Communications ELECTRONIC DATA INTERCHANGE WITH FORD EDI BROCHURE created by GSEC, Global Electronic Communications Page 1 of 23 Brochure map EDI Brochure Overview Connecting to Ford Further Information Support Who is

More information

Chapter 6. Architecture About Infrastructure. Introduction. Real World Examples

Chapter 6. Architecture About Infrastructure. Introduction. Real World Examples Introduction Chapter 6 Architecture and Managing and Using Information Systems: A Strategic Approach by Keri Pearlson & Carol Saunders What is the architecture of an organization? What is the infrastructure

More information

E-Business, E-Commerce

E-Business, E-Commerce E-Business, E-Commerce Lecture Outline 11 Instructor: Kevin Robertson Introduction to Information Systems Explain the differences between extranets and intranets as well as show how organizations utilize

More information

Remote Access VPN Solutions

Remote Access VPN Solutions Remote Access VPN Solutions P/N 500187 June 2000 Check Point Software Technologies Ltd. In this Document: Introduction Page 3 Remote Access VPN Defined Page 3 Business Case Page 4 Key Requirements Page

More information

SingTel MPLS. The Great Multi Protocol Label Switching (MPLS) Migration

SingTel MPLS. The Great Multi Protocol Label Switching (MPLS) Migration SingTel MPLS The Great Multi Protocol Label Switching (MPLS) Migration SingTel MPLS The Great MPLS Migration There are now a variety of alternatives when it comes to connecting multiple sites with WAN

More information

SEC-370. 2001, Cisco Systems, Inc. All rights reserved.

SEC-370. 2001, Cisco Systems, Inc. All rights reserved. SEC-370 2001, Cisco Systems, Inc. All rights reserved. 1 Understanding MPLS/VPN Security Issues SEC-370 Michael Behringer SEC-370 2003, Cisco Systems, Inc. All rights reserved. 3

More information

MPLS@NLBd.d. Janko Jager. * MPLS Multi Protocol Label Switching ** NLBd.d. Nova Ljubljanska banka d.d.

MPLS@NLBd.d. Janko Jager. * MPLS Multi Protocol Label Switching ** NLBd.d. Nova Ljubljanska banka d.d. MPLS@NLBd.d. Janko Jager * MPLS Multi Protocol Label Switching ** NLBd.d. Nova Ljubljanska banka d.d. Telecommunications, Portorož, 04.10.2008 NLB d.d. 1 Foreword This presentation is about NLB d.d. experience

More information

IBM Sales and Distribution IBM and Manhattan Associates

IBM Sales and Distribution IBM and Manhattan Associates IBM Sales and Distribution IBM and Manhattan Associates Innovating across the supply chain and beyond 2 IBM and Manhattan Associates Market-leading companies realize that their supply chains are strategic

More information

Cisco Disaster Recovery: Best Practices White Paper

Cisco Disaster Recovery: Best Practices White Paper Table of Contents Disaster Recovery: Best Practices White Paper...1 Introduction...1 Performance Indicators for Disaster Recovery...1 High Level Process Flow for Disaster Recovery...2 Management Awareness...2

More information

Outsourced EDI Services

Outsourced EDI Services Outsourced EDI Services E-COMMERCE FOR SMALL & MID-SIZED BUSINESSES AN OUTSOURCED, INTERNET-BASED SERVICE SPS Commerce s Outsourced Electronic Data Interchange (EDI) Services quickly enable your organization

More information

GE Information Services. We Bring Good Things to Life

GE Information Services. We Bring Good Things to Life e GE Information Services We Bring Good Things to Life GE Information Services Global Leader in EDI Services Number one in U.S. and Europe Number two in Asia/Pacific Local Presence in 42 Countries More

More information

Enterprise Systems: From Supply Chains to ERP to CRM

Enterprise Systems: From Supply Chains to ERP to CRM Enterprise Systems: From Supply Chains to ERP to CRM Management Information Code: 164292-02 Course: Management Information Period: Autumn 2013 Professor: Sync Sangwon Lee, Ph. D D. of Information & Electronic

More information

Fact Sheet Fujitsu Revenue Management Solution for the Wholesale Distribution Industry

Fact Sheet Fujitsu Revenue Management Solution for the Wholesale Distribution Industry Fact Sheet Fujitsu Revenue Management Solution for the Wholesale Distribution Industry Fujitsu Revenue Management Solution manages end to end supply chain management. This solution integrates demand planning,

More information

EVALUATING AND SELECTING E-COMMERCE SOFTWARE SOLUTIONS

EVALUATING AND SELECTING E-COMMERCE SOFTWARE SOLUTIONS 4-04-55 INFORMATION MANAGEMENT: STRATEGY, SYSTEMS, AND TECHNOLOGIES EVALUATING AND SELECTING E-COMMERCE SOFTWARE SOLUTIONS Duane E. Sharp INSIDE Challenges to E-business; Designing and Maintaining; Online

More information

Solution Brief. Secure and Assured Networking for Financial Services

Solution Brief. Secure and Assured Networking for Financial Services Solution Brief Secure and Assured Networking for Financial Services Financial Services Solutions Page Introduction To increase competitiveness, financial institutions rely heavily on their networks to

More information

IBM 000-281 EXAM QUESTIONS & ANSWERS

IBM 000-281 EXAM QUESTIONS & ANSWERS IBM 000-281 EXAM QUESTIONS & ANSWERS Number: 000-281 Passing Score: 800 Time Limit: 120 min File Version: 58.8 http://www.gratisexam.com/ IBM 000-281 EXAM QUESTIONS & ANSWERS Exam Name: Foundations of

More information

Network Management for Common Topologies How best to use LiveAction for managing WAN and campus networks

Network Management for Common Topologies How best to use LiveAction for managing WAN and campus networks Network Management for Common Topologies How best to use LiveAction for managing WAN and campus networks April 2014 www.liveaction.com Contents 1. Introduction... 1 2. WAN Networks... 2 3. Using LiveAction

More information

C a r l G o e t h a l s T e r r e m a r k E u r o p e. C a r l. g o e t h a l s @ t e r r e m a r k. c o m

C a r l G o e t h a l s T e r r e m a r k E u r o p e. C a r l. g o e t h a l s @ t e r r e m a r k. c o m Cloud Computing for Government & Enterprise C a r l G o e t h a l s T e r r e m a r k E u r o p e C a r l. g o e t h a l s @ t e r r e m a r k. c o m Agenda Some history on Terremark State of Cloud Public

More information

Cisco Which VPN Solution is Right for You?

Cisco Which VPN Solution is Right for You? Table of Contents Which VPN Solution is Right for You?...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 NAT...2 Generic Routing Encapsulation Tunneling...2

More information

Security in Global IP Networks

Security in Global IP Networks Security Technology for the Internet Security in Global IP Networks Tatu Ylönen SSH Communications Security Corp What are global IP networks? The Internet The consumer internet Global uncontrolled

More information

E-DISASTER RECOVERY MEANS CONTINUOUS AVAILABILITY

E-DISASTER RECOVERY MEANS CONTINUOUS AVAILABILITY 5-02-16 INFORMATION MANAGEMENT: STRATEGY, SYSTEMS, AND TECHNOLOGIES E-DISASTER RECOVERY MEANS CONTINUOUS AVAILABILITY Janet Butler INSIDE From Recovery to Planning; Sources of Downtime; Planning Ahead;

More information

Evaluate the Usability of Security Audits in Electronic Commerce

Evaluate the Usability of Security Audits in Electronic Commerce Evaluate the Usability of Security Audits in Electronic Commerce K.A.D.C.P Kahandawaarachchi, M.C Adipola, D.Y.S Mahagederawatte and P Hewamallikage 3 rd Year Information Systems Undergraduates Sri Lanka

More information

Networked Storage Virtualization

Networked Storage Virtualization EMC White Paper k Networked Storage Virtualization Abstract: An ever-growing number of enterprises rely on SAN-based storage to handle their missioncritical data requirements. This, in turn, demands higher

More information

How Microsoft dynamics AX fairs in comparison to other ERP s

How Microsoft dynamics AX fairs in comparison to other ERP s How Microsoft dynamics AX fairs in comparison to other ERP s GONE ARE THOSE LEGACY ERP SYSTEMS OF OLDEN DAYS. LEGACY SYSTEMS LOOK VAST, REQUIRE HUGE BUDGETS, AND TAKE LONG IMPLEMENTATION TIME. IT IS A

More information

APPENDIX A WORK PROCESS SCHEDULE RELATED INSTRUCTION OUTLINE

APPENDIX A WORK PROCESS SCHEDULE RELATED INSTRUCTION OUTLINE APPENDIX A WORK PROCESS SCHEDULE RELATED INSTRUCTION OUTLINE E COMMERCE SPECIALIST PAGE 1 OF 11 WORK PROCESS SCHEDULE E COMMERCE SPECIALIST (ECS) O*NET SOC CODE: 15 1099.99 RAIS CODE: 1054CB DESCRIPTION:

More information

IP Contact Center: Realize the Full Business Potential of IP Contact Centers

IP Contact Center: Realize the Full Business Potential of IP Contact Centers IP Contact Center: Realize the Full Business Potential of IP Contact Centers WHITEPAPER The joint solution from Cisco and IBM provides people, processes, and technology needed to maximize the return on

More information

Business-to-Business Electronic Commerce ( B2B-EC )

Business-to-Business Electronic Commerce ( B2B-EC ) Business-to-Business to-business Electronic Commerce ( B2B-EC ) Sistem e-businesse (MG-652) Jurusan Manajemen Agenda Characteristics of B2B EC Models of B2B EC From Traditional to Internet-based EDI Integration

More information

B2B Strategies: from EDI to e-commerce. Objectives. In this chapter, you will learn about:

B2B Strategies: from EDI to e-commerce. Objectives. In this chapter, you will learn about: Introduction to e-commerce B2B Strategies: from EDI to e-commerce Objectives In this chapter, you will learn about: Strategies that businesses use to improve purchasing, logistics, and other support activities

More information

Today, the Cisco Enterprise B2B team has created automated and standardized processes in the following areas:

Today, the Cisco Enterprise B2B team has created automated and standardized processes in the following areas: How Cisco Enables Electronic Interactions with Sales, Manufacturing, and Service Partners Business-to-business drives productivity, growth, and an improved customer experience. Cisco IT Case Study/Business

More information

Interorganizational Systems, ERPs and CRM

Interorganizational Systems, ERPs and CRM Interorganizational Systems, ERPs and CRM Athens University of Economics and Business Department of Management Science and Technology ISTLab/ Wireless Research Center George M. Giaglis giaglis@aueb.gr

More information

System Monitoring Quick Overview. Product Management SAP AG

System Monitoring Quick Overview. Product Management SAP AG System Monitoring Quick Overview Product Management SAP AG Agenda Overview The Challenge of Monitoring A Landscape System Monitoring with SAP Solution Manager Summary Further Information SAP 2009 / Page

More information

IP Telephony Technology. IEEE ComSoc Meeting. Corey Coffin, SE Cisco Systems

IP Telephony Technology. IEEE ComSoc Meeting. Corey Coffin, SE Cisco Systems IP Telephony Technology IEEE ComSoc Meeting Corey Coffin, SE Cisco Systems 1 Agenda IP Convergence Call Manager Deployment Models Case Studies Summary 2 Toll Bypass and IP Telephony PBX PBX Router/GW IP

More information

Cisco Secure Network Container: Multi-Tenant Cloud Computing

Cisco Secure Network Container: Multi-Tenant Cloud Computing Cisco Secure Network Container: Multi-Tenant Cloud Computing What You Will Learn Cloud services are forecast to grow dramatically in the next 5 years, providing a range of features and cost benefits for

More information

Protecting Your Enterprise Networks: A Comprehensive Approach for End-to-End Security

Protecting Your Enterprise Networks: A Comprehensive Approach for End-to-End Security Protecting Your Enterprise Networks: A Comprehensive Approach for End-to-End Security Network security is mission critical for Multinationals to succeed in today s e-business environment without losing

More information

1) A complete SCM solution includes customers, service providers and partners. Answer: TRUE Diff: 2 Page Ref: 304

1) A complete SCM solution includes customers, service providers and partners. Answer: TRUE Diff: 2 Page Ref: 304 Enterprise Systems for Management, 2e (Motiwalla/Thompson) Chapter 11 Supply Chain Management 1) A complete SCM solution includes customers, service providers and partners. Diff: 2 Page Ref: 304 2) SCM

More information

Security, Reliability, Scalability

Security, Reliability, Scalability AT&T enterprise hosting services AT&T Enterprise Hosting Services Security, Reliability, Scalability and Global Reach For Mission Critical and Resource-Intensive e-business Applications Benefits Flexible

More information

Switched Ethernet (SW-E) Overview INTRODUCTION SERVICE OFFERINGS ACCESS OPTIONS PROVISIONING SERVICE LEVEL AGREEMENT (SLA) KEY SEGMENT AREA

Switched Ethernet (SW-E) Overview INTRODUCTION SERVICE OFFERINGS ACCESS OPTIONS PROVISIONING SERVICE LEVEL AGREEMENT (SLA) KEY SEGMENT AREA Overview INTRODUCTION SERVICE OFFERINGS ACCESS OPTIONS PROVISIONING SERVICE LEVEL AGREEMENT (SLA) KEY SEGMENT AREA StarHub pioneers in forward-looking technology innovations to enhance ability and connectivity.

More information

Outsourcing. w os WORKPLACE. it os IT SERVICE MANAGEMENT SERVICES BPO OUTSOURCING. ITO dos DATACENTER OPERATION SERVICES.

Outsourcing. w os WORKPLACE. it os IT SERVICE MANAGEMENT SERVICES BPO OUTSOURCING. ITO dos DATACENTER OPERATION SERVICES. IT ITO dos DATACENTER OPERATION w os WORKPLACE OPERATION OUTSOURCING a os APPLICATION OPERATION it os IT SERVICE MANAGEMENT BUSINESS PROCESS BPO OUTSOURCING o ss OUTSOURCING SUPPORT Outsourcing Companies,

More information

Gaining Competitive Advantage Through Internet Business Solutions. 1999, Cisco Systems, Inc.

Gaining Competitive Advantage Through Internet Business Solutions. 1999, Cisco Systems, Inc. Gaining Competitive Advantage Through Internet Business Solutions Source Presentation_ID graphic: 1999, Cisco Systems, Inc. 1 Cisco - A Best Practice Example Who s been to Cisco and can tell us about the

More information

February 16th, 2012 Prague. Smarter Commerce. Robert Mahr. Leader Smarter Commerce CEE & RCIS

February 16th, 2012 Prague. Smarter Commerce. Robert Mahr. Leader Smarter Commerce CEE & RCIS February 16th, 2012 Prague Smarter Commerce Robert Mahr Leader Smarter Commerce CEE & RCIS Complex Fuzzy Interlocked Powerful! The Smarter Consumer is more instrumented Instrumented 36% more consumers

More information

Virtual Private LAN Service (VPLS)

Virtual Private LAN Service (VPLS) Virtual Private LAN Service (VPLS) Walking through Wan history, from the early days Leased lines Customers subscribe to dedicated point-to-point links Cost prohibitive for customers Started in the 1980

More information

Cisco Solutions for Big Data and Analytics

Cisco Solutions for Big Data and Analytics Cisco Solutions for Big Data and Analytics Tarek Elsherif, Solutions Executive November, 2015 Agenda Major Drivers & Challengs Data Virtualization & Analytics Platform Considerations for Big Data & Analytics

More information

ADDENDUM 2 TO APPENDIX 1 TO SCHEDULE 3.3

ADDENDUM 2 TO APPENDIX 1 TO SCHEDULE 3.3 ADDENDUM 2 TO APPENDIX 1 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT Overview EXHIBIT E to Amendment No. 60 The Disaster Recovery (DR) Services, a Tier-Level DR Solution, addresses the

More information

Cisco Certified Security Professional (CCSP)

Cisco Certified Security Professional (CCSP) 529 Hahn Ave. Suite 101 Glendale CA 91203-1052 Tel 818.550.0770 Fax 818.550.8293 www.brandcollege.edu Cisco Certified Security Professional (CCSP) Program Summary This instructor- led program with a combination

More information

How-to-Sell Data Center. [January 2010]

How-to-Sell Data Center. [January 2010] How-to-Sell Data Center [January 2010] Agenda Why You Should Care Business Trends Value proposition What to sell Selling Tips Competitive Snapshot Resources to Help You Succeed 2 Why You Should Care Data

More information

Data Center Technologies

Data Center Technologies Data Center Technologies Ing. Marcel Kuza mkuza@uy.ibm.com Agosto, 2010 XI Jornadas de Actualización Tecnológica: Networking, Punta del Este, Uruguay Agenda Introduction to Data Center Solutions (by IBM)

More information

IJMIE Volume 2, Issue 5 ISSN: 2249-0558

IJMIE Volume 2, Issue 5 ISSN: 2249-0558 E-Commerce and its Business Models Er. Nidhi Behl* Er.Vikrant Manocha** ABSTRACT: In the emerging global economy, e-commerce and e-business have increasingly become a necessary component of business strategy

More information

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R F l e x i b l e N e t w o r k - B a s e d, E n t e r p r i s e - C l a s s I P

More information

End-to-End Infrastructure Solutions

End-to-End Infrastructure Solutions End-to-End Infrastructure Solutions Thakral One www.thakralone.com www.thakralone.com 1 Agenda 1 2 3 Maximizing Infrastructure Investments End-to-End Infrastructure Solutions Thakral One and Our Value

More information

Virtual Private Networks

Virtual Private Networks Virtual Private Networks The Ohio State University Columbus, OH 43210 Jain@cse.ohio-State.Edu http://www.cse.ohio-state.edu/~jain/ 1 Overview Types of VPNs When and why VPN? VPN Design Issues Security

More information

Cisco AVVID Network Enterprise Data Center Solution Overview

Cisco AVVID Network Enterprise Data Center Solution Overview White Paper Cisco AVVID Network Enterprise Data Center Solution Overview Data centers enable the consolidation of critical computing resources, in controlled environments under centralized management,

More information

CHAPTER 13: ELECTRONIC COMMERCE AND E-BUSINESS

CHAPTER 13: ELECTRONIC COMMERCE AND E-BUSINESS CHAPTER 13: ELECTRONIC COMMERCE AND E-BUSINESS Multiple Choice: 1. founded Amazon.com. A. Alan Kay B. Jeff Bezos C. Bill Gates D. Andy Grove Answer: B Reference: Jeff Bezos: The Virtual Bookseller Difficulty:

More information

Belgacom Group Carrier & Wholesale Solutions. ICT to drive Your Business. Hosting Solutions. Datacenter Services

Belgacom Group Carrier & Wholesale Solutions. ICT to drive Your Business. Hosting Solutions. Datacenter Services Belgacom Group Carrier & Wholesale Solutions ICT to drive Your Business Hosting Solutions Agenda Vision on our Why outsourcing Shared Hosting Virtual dedicated Hosting Dedicated Hosting What / Why virtualization?

More information

i. Definition ii. Primary Activities iii. Support Activities iv. Information Systems role in value chain analysis

i. Definition ii. Primary Activities iii. Support Activities iv. Information Systems role in value chain analysis ACS 1803 Final Exam Topic Outline I. Enterprise Information Systems a. Enterprise systems vs. inter-organisational systems b. Value Chain Analysis ii. Primary Activities iii. Support Activities iv. Information

More information