Networked Supply Chain Management
|
|
- Emma Harvey
- 8 years ago
- Views:
Transcription
1 1 Networked Supply Chain Management Session 2
2 Agenda Supply-Chain Management Opportunities and Challenges Technology Choices and Solutions Cisco Case Study Emerging Industry Exchanges Next Steps 3 The -Enabled Enterprise Channel/Distribution Partners Customer Care E-Commerce Business Engaged Enterprise Supply Chain Management Customer Workforce Optimization E-Learning Suppliers/ Manufacturers Employees 4
3 Why Supply Chain Management? Increasing customer demands Measured on responsiveness Expectation of high, consistent quality Mass customization Globalization of competition Broadening of global markets Emergence of new competitors Scale for growth Rising development costs Compressed product lifecycle Need dramatic cost reduction Need to return to core competency Rapid development cycle To survive in the economy enterprises need to extend processes to create a virtual extended enterprise 5 The Extended Enterprise Product Service Depot Inventory, Versions, Demand Message Business Engaged Enterprise Order Fulfillment Order Commit, Demand, Planning, Build, Ship, Pay Order Customer Product Life Cycle Design, Release, Change, Retire Suppliers/ Manufacturers 6
4 We estimate that supply-chain planning vendor revenue will top $3.6 billion, triple today s current revenue, by 2002 By 2004, 90% of enterprises that fail to apply SCM technology and processes will lose preferred supplier status. Supply-Chain Management Growth Gartner, ITxpo 99 Enterprises plan to increase their extranets by 41% over the next two years. Forrester Research Inc 99 7 SCM Example: TSMC and Adaptec Process integration with Extricity, SAP multiple automated processes: Purchase Order/Acknowledgement WIP Update Ship Notification Demand Forecast Engineering Design and Test Results: Increased customer loyalty Reduced product lead times 14 Times ROI over three-year period 8
5 Modes of Networking and Collaboration Private Network (FR, ISDN, Leased Line, xdsl, Cable) VAN Dialup/EDI Application Integration Data Exchange Your Browser/ XML/EDI Access IP VPN Marketplaces Browser/ XML Process Sharing 9 How Do You Connect With Your Extranet Partners Today? Frame Relay Leased Line Public Public (VPN) Dialup/ISDN Carrier IP (IP/VPN) ATM 6% 34% 34% 28% 28% 26% 50% Survey of 50 Global 2500 Companies Source: Forrester Research Inc Nov 99 10
6 Business Requirements Drive Connectivity Solution Business process Integration No. of business partners Mission criticality Relationship flexibility Cost sensitivity High Availability Scalability Security Network Solutions Typically Companies Choose More Than One Solution Cost QoS Flexibility Access Private Network EDI/ VAN IP VPN Exchanges 11 Private Network Your Application Integration 56 kbps Router Front-End ISDN Frame Relay Strategic set of suppliers/partners Limited scalability due to cost Router Router High level of control (security, performance) Access Process Sharing 12
7 Your Private Network: Security Cisco Secure PIX Firewall Cisco Secure Access Control Server Firewalls for protecting confidential internal resources 56 kbps Router ISDN Frame Relay Authentication, authorization for preventing unauthorized user access Router Router PIX Firewall Partner Network Password/ Token Cisco Secure Integrated Firewall 13 Cost of Supply-Chain Downtime Application ERP Supply Chain Mgmt. E-Commerce Banking Customer Service Center Electronic Funds Transfer Messaging Cost per Minute $13,000 $11,000 $10,000 $7,000 $3,700 $3,500 $1,000 Survey of 250 Fortune 1000 Companies Source: The Standish Group 14
8 Private Network: High Availability WAN -SP2 WAN- SP1 ISDN Partners Fast convergence around failures Network device redundancy and resiliency Dual homing to service providers SLA monitoring 15 Your Virtual Private Networks Application Integration IP VPN Process Sharing Servers Scalable Affordable IP VPN service can provide improved SLA VPN Client 16
9 Your Virtual Private Networks: Security Message Digital Certificate Certificate Authority IP VPN Message Digital Certificate Application Integration Process Sharing Authentication: Digital Certificates, Shared Keys Privacy: Virtual Private Networks, IPSec VPN Client 17 Your Virtual Private Networks: Integrated Solution Cisco Secure PIX Firewall Cisco 7100 IP VPN Cisco 1720 Cisco 2600 Application Integration Process Sharing Integrated routing, VPN, firewall, QoS and IPSec support Cisco IOS software Release
10 Your Centralized VPN Client Scalability and Management VPN 3000 Concentrator PPTP/IPSec/L2TP Digital certificate authentication Cisco 7100 IP VPN -Based Management Multiple VPN Clients Support for 1000 s of client sessions Client autoconfigured with user authentication Centrally defined policy-based network access 19 Your Dialup to Value-Added Network EDI Electric Data Interchange X12/EDIFACT Data Exchange over VANs 9.6 kbps Dialup VAN 9.6 kbps Partner A Partner B Partner s EDI System Purchasing System EDI Translator Standard document Non-repudiation Non-real-time Partner C Too expensive for smaller suppliers 20
11 Access and EDI over the Your EDI over Partner A Access EDI Servers EDI to Portal Partner B Cost effective for all suppliers and partners Limited integration 21 -Access Scalability Your EDI over Cisco 7200 Partner A Access EDI Catalyst 6500 Servers LocalDirector EDI to Portal Partner B Server Load Balancing (SLB) scalable web access LocalDirector, Integrated SLB 22
12 -Access Security Policy Manager Cisco Secure PIX Firewall Hacker Partner A EDI over Access EDI Catalyst 6500 LocalDirector Partner B Servers EDI to Portal Perimeter Security Firewalls 23 -Access Security Policy Manager Secure Intrusion Detection Server EDI over Partner A Update Policy Access EDI Catalyst 6500 LocalDirector Partner B Servers EDI to Portal Intrusion Detection Security Policy Management 24
13 -Access Availability Your PIX ISP 2 Access EDI Servers Catalyst 6500 LocalDirector ISP 1 Load balancing across ISP s, network and servers Fast automatic fail-over transparent to user HSRP, fast spanning tree, stateful failover Maximize server availability Supplier 25 High Availability Across the Stack Network Applications Databases Enterprise Storage Infrastructure Minimizing planned and unplanned downtime Distributed intelligence Fast convergence Load balancing/ redundancy Robust hardware and software Best practices 26
14 Partnering for Highly Available E-Business Back-End and Middle-Tier Enterprise Storage Database Cluster Oracle Parallel Server Oracle8i Front-End Access Network Cache Engine Catalyst Switch PIX Firewall Distributed Director Cisco Router Partner/ Customer EMC Symmetrix Connectrix Celerra Powerpath TimeFinder SRDF Oracle Application Server Application Servers Local Director Servers 27 High Availability Foundation Back-End and Middle-Tier Enterprise Storage Database Cluster Front-End Access Network Partner/ Customer ISP 1 ISP 2 Backup Application Servers Servers 28
15 Network Solutions Benefits Summary Business Flexibility Process Integration Scalability Reliability Security Cost Latency Private Network VPN VAN Good Poor 29 Cisco Case Study Problem: Scale through dramatic growth Increased product volume and complexity Higher customer expectation for delivery Solution: Partnerships between key suppliers and functions in Cisco Results: $175M annual savings $269M revenue contribution 56% product outsourced >90% factories are partner owned 45% reduction in supply chain inventories 30
16 Elements of Cisco s Supply-Chain Customer Cisco Connection Online (CCO) CCO Message Order Manufacturing Connection Online (MCO) Suppliers Single Enterprise Autotest Order Entry Planning Dynamic Replenishment Manufacturing Connection On-line Direct Fulfillment Product Data Procurement Business Systems Autotest Control Extranet Shipping Management System Production System Autotest cell Global Manufacturers 31 Cisco s Partner Network ERP/PDM Servers EDI Servers Cisco HQ San Jose, CA Frame Relay Service Provider 2 Frame Relay Service Provider 1 ISDN VAN Platinum Manufacturers Suppliers Gold Suppliers Silver Suppliers and Vendors /EDI VPN EDI Partners 32
17 Emerging Industry Exchanges Customer Enterprises Partner Customer Care E-Commerce Supply Chain Management Buyer Flexibility Industry Exchange Hosted Application Scalability to support all-tiers New applications Procurement Supplier Partner 33 Industry Exchange Applications Real-time visibility Collaborative planning Build-to-order Optimized inventory A Multitier, Integrated Supply Chain Collaborative Product Development Exchanges E-Enabled, Dynamic Trading Communities On-line development Collaborative design Interactive scheduling Auctions, RFQs Consortium buying Liquid market for surplus Catalog purchasing 34
18 Industry Exchange Predictions 10,000 B2B exchanges by 2003 (source: Gartner) $7.29 trillion in B2B commerce by 2004 (source: Gartner) 250 million business users procuring over the by 2003 (source: IDC) 40% of B2B will be captured by B2B exchanges by 2004 (source: B2B Exchanges ) 35 Industry Exchanges Today 1st B2B E-Marketplace in Belgium Multi-Billion-Dollar B2B Venture Retail s First Worldwide Online Supply Marketplace 36
19 Industry Exchange Datacenter Customers Buy Order Status Datacenter Exchange Host Exchange Operators Supply Chain Partners Industry Exchange Reverse Auctions Datacenter Suppliers Secure, Guaranteed Delivery of Messages and Transactions 37 Industry Exchange Infrastructure Requirements Exchanges Behave Like Public Utilities Available During Local Disasters Disaster Protection Infrastructure Requirements High Availability Downtime Effects Whole Industry Meet Unlimited User Volume Scalability Security Highly Confidential Information 38
20 What s Next Attend other related Networkers presentations: E-Commerce Introduction to VPNs Advanced Topics in Enterprise VPN s and PKI VPN Product Update Understand your supply-chain business goals Engage Cisco and ecosystem partners Develop networking strategy and choose appropriate infrastructure(s) 39 Networked Supply Chain Management Session 40
21 Please Complete Your Evaluation Form Session 41 42
IP-VPN Architecture and Implementation O. Satty Joshua 13 December 2001. Abstract
Abstract Virtual Private Networks (VPNs) are today becoming the most universal method for remote access. They enable Service Provider to take advantage of the power of the Internet by providing a private
More informationWAN Traffic Management with PowerLink Pro100
Whitepaper WAN Traffic Management with PowerLink Pro100 Overview In today s Internet marketplace, optimizing online presence is crucial for business success. Wan/ISP link failover and traffic management
More informationIBM enetwork VPN Solutions
IBM enetwork VPN Solutions the Reach of Your Network Extend Agenda Description and Value of a VPN VPN Technology IBM's VPN Solutions and Future Enhancements Summary What is a VPN? Remote Access Business
More informationA Guide to WAN Application Delivery for the SME Market
A Guide to WAN Application Delivery for the SME Market Worry-Proof Internet 2800 Campus Drive Suite 140 Plymouth, MN 55441 Phone (763) 694-9949 Toll Free (800) 669-6242 A Guide to WAN Application Delivery
More informationMastering Network Design with MPLS
Mastering Network Design with MPLS Overview In this paper, enterprise CIOs, IT&T professionals and network architects will learn how to improve productivity and security by designing multi-location Virtual
More informationINTERNET TECHNOLOGIES AND SUPPLY CHAIN MANAGEMENT
INTERNET TECHNOLOGIES AND SUPPLY CHAIN MANAGEMENT A number of companies have used the Internet to lower costs and add value to their businesses The Internet has already had a tremendous impact on the field
More informationFatPipe Networks www.fatpipeinc.com
XTREME WHITE PAPERS Overview The growing popularity of wide area networks (WANs), as a means by which companies transact vital information with clients, partners, and colleagues, is indisputable. The business
More informationChapter 5. B2B E-Commerce: Selling and Buying in Private E-Markets
Chapter 5 B2B E-Commerce: Selling and Buying in Private E-Markets Learning Objectives 1. Describe the B2B field. 2. Describe the major types of B2B models. 3. Discuss the characteristics of the sell-side
More informationECESSA. White Paper. Optimize Your Network on a Limited IT Budget
ECESSA White Paper Optimize Your Network on a Limited IT Budget The days of a single Internet connection are over. Many organizations are quickly recognizing that redundant link access at a reasonable
More informationColt IP VPN Services. 2010 Colt Technology Services Group Limited. All rights reserved.
Colt IP VPN Services 2010 Colt Technology Services Group Limited. All rights reserved. Agenda An introduction to IP VPN Colt IP VPN Hybrid Networking Workforce Mobility Summary 2 Drivers behind IP VPN
More informationTelecom Business Continuity Solutions FOR INTERNAL USE ONLY
Telecom Business Continuity Solutions FOR INTERNAL USE ONLY Business continuity? Perception versus reality Perceived biggest threats in 2005* Events causing disruption in 2003-04** IT / Telecom protection
More informationBUSINESS-BUSINESS (B2B) E-COMMERCE STRATEGIES AND SOLUTIONS. Presented by LEENA J MANWANI
BUSINESS-BUSINESS (B2B) E-COMMERCE STRATEGIES AND SOLUTIONS Presented by LEENA J MANWANI INTRODUCTION The Big Bucks on the Internet these days are coming from B2B (businessto-business) deals--buying and
More informationFatPipe Networks www.fatpipeinc.com
WARP WHITE PAPERS FatPipe WARP Reliability, Redundancy and Speed of Bi-directional IP Traffic The implementation of mission critical applications run over wide area networks as a basic communication tool
More informationAssessing Business Continuity Solutions
Assessing Business Continuity Solutions Ensuring the uninterrupted operation of businesses is an issue of increasing importance not just for large enterprises but for medium and small organizations as
More informationCisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications
Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications Product Overview Cisco Dynamic Multipoint VPN (DMVPN) is a Cisco IOS Software-based security solution for building scalable
More informationB2B E-COMMERCE: A PRIMER
B2B E-COMMERCE: A PRIMER Bruno Floriani bruno.floriani@lapointerosenstein.com Lapointe Rosenstein Montreal, Quebec Most of us have heard or read headlines about the explosive growth potential of the B2B
More informationChapter 5: Understanding Internetworking Infrastructure
Chapter 5: Understanding Internetworking Infrastructure Key questions What are the basic components of Internetw orking Infrastructures? What Business Implications do they bring? The Future? A Graphical
More informationPOINT OF VIEW. The Critical Role of Networking in Enterprise Resource Planning. Introduction
The Critical Role of Networking in Enterprise Resource Planning Introduction Achieving and maintaining competitive advantage is the raison d etre for every business around the world. Doing so requires
More informationInfotriever Production Environment
Availability Infotriever Production Environment High-availability requires well-structured processes for application quality assurance and change control. Infotriever has taken great care to eliminate
More informationInternet e-commerce: Reinventing EDI for the Web
IBM Global Services Internet e-commerce: Reinventing EDI for the Web Introduction EDI Services About 2 million companies with 10 or more employees are prime candidates to join those companies already using
More informationStephen Miles. Transform IT assets to Drive Business Service Innovation. CA Expo Hong Kong. Vice President - Service Assurance Asia Pacific & Japan
Stephen Miles Vice President - Service Assurance Asia Pacific & Japan CA Expo Hong Kong 21 September, 2012 Transform IT assets to Drive Business Service Innovation The age of innovation has arrived CLOUD
More informationSecure Network Design: Designing a DMZ & VPN
Secure Network Design: Designing a DMZ & VPN DMZ : VPN : pet.ece.iisc.ernet.in/chetan/.../vpn- PPTfinal.PPT 1 IT352 Network Security Najwa AlGhamdi Introduction DMZ stands for DeMilitarized Zone. A network
More informationRemote Connectivity for mysap.com Solutions over the Internet Technical Specification
Remote Connectivity for mysap.com Solutions over the Technical Specification June 2009 Remote Connectivity for mysap.com Solutions over the page 2 1 Introduction SAP has embarked on a project to enable
More informationManaged Services The. The Road to Revenue. Pravin Mahajan pmahajan@cisco.com. Session Number Presentation_ID
Managed Services The The Road to Revenue Pravin Mahajan pmahajan@cisco.com Session Number 1 Agenda Managed Services Introduction Solution Offerings Market to Services Mapping Summary 2 High Business Interest
More informationCommunity Development and Training Centre Semester 2 2006 IT 245 Management Information Systems
Chapter 5 Electronic Commerce System Community Development and Training Centre Semester 2 2006 IT 245 Management Information Systems Electronic Commerce: Electronic commerce encompasses the entire online
More informationModule 6. e-business and e- Commerce
Module 6 e-business and e- Commerce 6.1 e-business systems 6.2 e-commerce systems 6.3 Essential e- commerce processes 6.4 Electronic payment processes 6.5 e-commerce application trends 6.6 Web store requirements
More informationEverything You Need to Know About Network Failover
Everything You Need to Know About Network Failover Worry-Proof Internet 2800 Campus Drive Suite 140 Plymouth, MN 55441 Phone (763) 694-9949 Toll Free (800) 669-6242 Overview Everything You Need to Know
More informationHow Virtual Private Networks Work
How Virtual Private Networks Work by Jeff Tyson This article has been reprinted from http://computer.howstuffworks.com/ Please note that the web site includes two animated diagrams which explain in greater
More informationHow Linksys Successfully Integrated with the Cisco Network Infrastructure
How Linksys Successfully Integrated with the Cisco Network Infrastructure Selective IT integration approach improves network performance, security, resilience, and costs for Linksys division. Cisco IT
More informationLayer 4-7 Server Load Balancing. Security, High-Availability and Scalability of Web and Application Servers
Layer 4-7 Server Load Balancing Security, High-Availability and Scalability of Web and Application Servers Foundry Overview Mission: World Headquarters San Jose, California Performance, High Availability,
More informationIBM Enterprise Asset Management
IBM Enterprise Asset November 14 th, 2012 Daniel STAN Tivoli Software Sales, IBM Romania IBM Tivoli 2012 Strategic Capabilities VISIBILITY CONTROL AUTOMATION See and understand your business in real time
More informationEnterprise Network Solution
Enterprise Network Solution CONTENT p Enterprise Evolution p DCN Solutions p Case Studies Business Driven More Productivity More profitability Business Driven Challenge Productivity Improve Efficiency
More informationP&SM: eprocurement. CIPS Position on Practice
CIPS Position on Practice P&SM: eprocurement 'The combined use of electronic information and communications technology (ICT) in order to enhance the links between customer and supplier, and with other
More informationCisco Router and Security Device Manager (SDM)
Cisco Router and Security Device Manager (SDM) Session Number 1 Cisco SDM: Combining Ease Of Use & Application Intelligence Cisco SDM is an intuitive, web-based tool for Easy and Reliable Deployment and
More informationIntroduction. Technology background
White paper: Redundant IP-VPN networks Introduction IP VPN solutions based on the IPsec protocol are already available since a number of years. The main driver for these kinds of solutions is of course
More informationDelivering Cloud Services Transformation : Plan > Build> Assure> Secure. Stephen Miles Vice President, Solution Sales, APJ
Delivering Cloud Services Transformation : Plan > Build> Assure> Secure Stephen Miles Vice President, Solution Sales, APJ Agenda Cloud is Great, Cloud is Good More Options, More Complexity From Outlier
More informationPartnering for Success in Market Transition
Partnering for Success in Market Transition Trần Ngọc Vinh Business Development Manager Managed Services Cisco Vietnam tranvinh@cisco.com 2006 Cisco Systems, Inc. All rights reserved. tranvinh@cisco.com
More informationCase-study: SwissAir. The Internet Business. Case-study: SwissAir. Case-study: SwissAir. Summary. Summary
Case-study: SwissAir The Internet Business Old model: check flight info online Step 1. Toward customers e-ticketing, electronic check-in frequent flyer miles Web site personalization (and statistics!)
More informationWAN. Introduction. Services used by WAN. Circuit Switched Services. Architecture of Switch Services
WAN Introduction Wide area networks (WANs) Connect BNs and LANs across longer distances, often hundreds of miles or more Typically built by using leased circuits from common carriers such as AT&T Most
More informationWhite Paper. Complementing or Migrating MPLS Networks
White Paper Complementing or Migrating MPLS Networks Table of Contents 1. Executive Summary... 3 2. Complementing MPLS Networks... 3 3. Migrating from MPLS Networks with Elfiq s SitePathMTPX... 5 4. Calculating
More informationCARRIER MPLS VPN September 2014
CARRIER MPLS VPN September 2014 SERVICE OVERVIEW The International MPLS IP-VPN service provides a full range of VPN connectivity solutions, including: Carrier MPLS IP VPN: dedicated to operators looking
More informationConcepts in Enterprise Resource Planning
Objectives Concepts in Enterprise Resource Planning Third Edition Chapter Eight ERP and Electronic Commerce After completing this chapter, you will be able to: Describe business-to-business b i e-commerce
More informationIP VPN Solutions Secure, flexible networking options from a leader in IP solutions
IP VPN Solutions Secure, flexible networking options from a leader in IP solutions IP VPN Security that s virtually everywhere An increasing number of businesses today are leveraging the power of IP virtual
More informationVPLS lies at the heart of our Next Generation Network approach to creating converged, simplified WANs.
Virtual Private LAN Service (VPLS) A WAN that thinks it s a LAN. VPLS is a high security, low latency means to connect sites or services either point-to-point or as a mesh. We use Virtual Private LAN Service
More informationChapter 14! Enterprise Computing!
Chapter 14 Enterprise Computing Enterprise computing involves the use of computers in networks, such as LANs and WANs, or a series of interconnected networks that encompass a variety of different operating
More informationWorldwide WAN Optimization Management 2005-2009 Forecast and Analysis
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com EXCERPT Worldwide WAN Optimization Management 2005-2009 Forecast and Analysis Network Infrastructure
More informationEDI BROCHURE ELECTRONIC DATA INTERCHANGE WITH FORD. created by GSEC, Global Supplier Electronic Communications
ELECTRONIC DATA INTERCHANGE WITH FORD EDI BROCHURE created by GSEC, Global Electronic Communications Page 1 of 23 Brochure map EDI Brochure Overview Connecting to Ford Further Information Support Who is
More informationChapter 6. Architecture About Infrastructure. Introduction. Real World Examples
Introduction Chapter 6 Architecture and Managing and Using Information Systems: A Strategic Approach by Keri Pearlson & Carol Saunders What is the architecture of an organization? What is the infrastructure
More informationE-Business, E-Commerce
E-Business, E-Commerce Lecture Outline 11 Instructor: Kevin Robertson Introduction to Information Systems Explain the differences between extranets and intranets as well as show how organizations utilize
More informationRemote Access VPN Solutions
Remote Access VPN Solutions P/N 500187 June 2000 Check Point Software Technologies Ltd. In this Document: Introduction Page 3 Remote Access VPN Defined Page 3 Business Case Page 4 Key Requirements Page
More informationSingTel MPLS. The Great Multi Protocol Label Switching (MPLS) Migration
SingTel MPLS The Great Multi Protocol Label Switching (MPLS) Migration SingTel MPLS The Great MPLS Migration There are now a variety of alternatives when it comes to connecting multiple sites with WAN
More informationSEC-370. 2001, Cisco Systems, Inc. All rights reserved.
SEC-370 2001, Cisco Systems, Inc. All rights reserved. 1 Understanding MPLS/VPN Security Issues SEC-370 Michael Behringer SEC-370 2003, Cisco Systems, Inc. All rights reserved. 3
More informationMPLS@NLBd.d. Janko Jager. * MPLS Multi Protocol Label Switching ** NLBd.d. Nova Ljubljanska banka d.d.
MPLS@NLBd.d. Janko Jager * MPLS Multi Protocol Label Switching ** NLBd.d. Nova Ljubljanska banka d.d. Telecommunications, Portorož, 04.10.2008 NLB d.d. 1 Foreword This presentation is about NLB d.d. experience
More informationIBM Sales and Distribution IBM and Manhattan Associates
IBM Sales and Distribution IBM and Manhattan Associates Innovating across the supply chain and beyond 2 IBM and Manhattan Associates Market-leading companies realize that their supply chains are strategic
More informationCisco Disaster Recovery: Best Practices White Paper
Table of Contents Disaster Recovery: Best Practices White Paper...1 Introduction...1 Performance Indicators for Disaster Recovery...1 High Level Process Flow for Disaster Recovery...2 Management Awareness...2
More informationOutsourced EDI Services
Outsourced EDI Services E-COMMERCE FOR SMALL & MID-SIZED BUSINESSES AN OUTSOURCED, INTERNET-BASED SERVICE SPS Commerce s Outsourced Electronic Data Interchange (EDI) Services quickly enable your organization
More informationGE Information Services. We Bring Good Things to Life
e GE Information Services We Bring Good Things to Life GE Information Services Global Leader in EDI Services Number one in U.S. and Europe Number two in Asia/Pacific Local Presence in 42 Countries More
More informationEnterprise Systems: From Supply Chains to ERP to CRM
Enterprise Systems: From Supply Chains to ERP to CRM Management Information Code: 164292-02 Course: Management Information Period: Autumn 2013 Professor: Sync Sangwon Lee, Ph. D D. of Information & Electronic
More informationFact Sheet Fujitsu Revenue Management Solution for the Wholesale Distribution Industry
Fact Sheet Fujitsu Revenue Management Solution for the Wholesale Distribution Industry Fujitsu Revenue Management Solution manages end to end supply chain management. This solution integrates demand planning,
More informationEVALUATING AND SELECTING E-COMMERCE SOFTWARE SOLUTIONS
4-04-55 INFORMATION MANAGEMENT: STRATEGY, SYSTEMS, AND TECHNOLOGIES EVALUATING AND SELECTING E-COMMERCE SOFTWARE SOLUTIONS Duane E. Sharp INSIDE Challenges to E-business; Designing and Maintaining; Online
More informationSolution Brief. Secure and Assured Networking for Financial Services
Solution Brief Secure and Assured Networking for Financial Services Financial Services Solutions Page Introduction To increase competitiveness, financial institutions rely heavily on their networks to
More informationIBM 000-281 EXAM QUESTIONS & ANSWERS
IBM 000-281 EXAM QUESTIONS & ANSWERS Number: 000-281 Passing Score: 800 Time Limit: 120 min File Version: 58.8 http://www.gratisexam.com/ IBM 000-281 EXAM QUESTIONS & ANSWERS Exam Name: Foundations of
More informationNetwork Management for Common Topologies How best to use LiveAction for managing WAN and campus networks
Network Management for Common Topologies How best to use LiveAction for managing WAN and campus networks April 2014 www.liveaction.com Contents 1. Introduction... 1 2. WAN Networks... 2 3. Using LiveAction
More informationC a r l G o e t h a l s T e r r e m a r k E u r o p e. C a r l. g o e t h a l s @ t e r r e m a r k. c o m
Cloud Computing for Government & Enterprise C a r l G o e t h a l s T e r r e m a r k E u r o p e C a r l. g o e t h a l s @ t e r r e m a r k. c o m Agenda Some history on Terremark State of Cloud Public
More informationCisco Which VPN Solution is Right for You?
Table of Contents Which VPN Solution is Right for You?...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 NAT...2 Generic Routing Encapsulation Tunneling...2
More informationSecurity in Global IP Networks
Security Technology for the Internet Security in Global IP Networks Tatu Ylönen SSH Communications Security Corp What are global IP networks? The Internet The consumer internet Global uncontrolled
More informationE-DISASTER RECOVERY MEANS CONTINUOUS AVAILABILITY
5-02-16 INFORMATION MANAGEMENT: STRATEGY, SYSTEMS, AND TECHNOLOGIES E-DISASTER RECOVERY MEANS CONTINUOUS AVAILABILITY Janet Butler INSIDE From Recovery to Planning; Sources of Downtime; Planning Ahead;
More informationEvaluate the Usability of Security Audits in Electronic Commerce
Evaluate the Usability of Security Audits in Electronic Commerce K.A.D.C.P Kahandawaarachchi, M.C Adipola, D.Y.S Mahagederawatte and P Hewamallikage 3 rd Year Information Systems Undergraduates Sri Lanka
More informationNetworked Storage Virtualization
EMC White Paper k Networked Storage Virtualization Abstract: An ever-growing number of enterprises rely on SAN-based storage to handle their missioncritical data requirements. This, in turn, demands higher
More informationHow Microsoft dynamics AX fairs in comparison to other ERP s
How Microsoft dynamics AX fairs in comparison to other ERP s GONE ARE THOSE LEGACY ERP SYSTEMS OF OLDEN DAYS. LEGACY SYSTEMS LOOK VAST, REQUIRE HUGE BUDGETS, AND TAKE LONG IMPLEMENTATION TIME. IT IS A
More informationAPPENDIX A WORK PROCESS SCHEDULE RELATED INSTRUCTION OUTLINE
APPENDIX A WORK PROCESS SCHEDULE RELATED INSTRUCTION OUTLINE E COMMERCE SPECIALIST PAGE 1 OF 11 WORK PROCESS SCHEDULE E COMMERCE SPECIALIST (ECS) O*NET SOC CODE: 15 1099.99 RAIS CODE: 1054CB DESCRIPTION:
More informationIP Contact Center: Realize the Full Business Potential of IP Contact Centers
IP Contact Center: Realize the Full Business Potential of IP Contact Centers WHITEPAPER The joint solution from Cisco and IBM provides people, processes, and technology needed to maximize the return on
More informationBusiness-to-Business Electronic Commerce ( B2B-EC )
Business-to-Business to-business Electronic Commerce ( B2B-EC ) Sistem e-businesse (MG-652) Jurusan Manajemen Agenda Characteristics of B2B EC Models of B2B EC From Traditional to Internet-based EDI Integration
More informationB2B Strategies: from EDI to e-commerce. Objectives. In this chapter, you will learn about:
Introduction to e-commerce B2B Strategies: from EDI to e-commerce Objectives In this chapter, you will learn about: Strategies that businesses use to improve purchasing, logistics, and other support activities
More informationToday, the Cisco Enterprise B2B team has created automated and standardized processes in the following areas:
How Cisco Enables Electronic Interactions with Sales, Manufacturing, and Service Partners Business-to-business drives productivity, growth, and an improved customer experience. Cisco IT Case Study/Business
More informationInterorganizational Systems, ERPs and CRM
Interorganizational Systems, ERPs and CRM Athens University of Economics and Business Department of Management Science and Technology ISTLab/ Wireless Research Center George M. Giaglis giaglis@aueb.gr
More informationSystem Monitoring Quick Overview. Product Management SAP AG
System Monitoring Quick Overview Product Management SAP AG Agenda Overview The Challenge of Monitoring A Landscape System Monitoring with SAP Solution Manager Summary Further Information SAP 2009 / Page
More informationIP Telephony Technology. IEEE ComSoc Meeting. Corey Coffin, SE Cisco Systems
IP Telephony Technology IEEE ComSoc Meeting Corey Coffin, SE Cisco Systems 1 Agenda IP Convergence Call Manager Deployment Models Case Studies Summary 2 Toll Bypass and IP Telephony PBX PBX Router/GW IP
More informationCisco Secure Network Container: Multi-Tenant Cloud Computing
Cisco Secure Network Container: Multi-Tenant Cloud Computing What You Will Learn Cloud services are forecast to grow dramatically in the next 5 years, providing a range of features and cost benefits for
More informationProtecting Your Enterprise Networks: A Comprehensive Approach for End-to-End Security
Protecting Your Enterprise Networks: A Comprehensive Approach for End-to-End Security Network security is mission critical for Multinationals to succeed in today s e-business environment without losing
More information1) A complete SCM solution includes customers, service providers and partners. Answer: TRUE Diff: 2 Page Ref: 304
Enterprise Systems for Management, 2e (Motiwalla/Thompson) Chapter 11 Supply Chain Management 1) A complete SCM solution includes customers, service providers and partners. Diff: 2 Page Ref: 304 2) SCM
More informationSecurity, Reliability, Scalability
AT&T enterprise hosting services AT&T Enterprise Hosting Services Security, Reliability, Scalability and Global Reach For Mission Critical and Resource-Intensive e-business Applications Benefits Flexible
More informationSwitched Ethernet (SW-E) Overview INTRODUCTION SERVICE OFFERINGS ACCESS OPTIONS PROVISIONING SERVICE LEVEL AGREEMENT (SLA) KEY SEGMENT AREA
Overview INTRODUCTION SERVICE OFFERINGS ACCESS OPTIONS PROVISIONING SERVICE LEVEL AGREEMENT (SLA) KEY SEGMENT AREA StarHub pioneers in forward-looking technology innovations to enhance ability and connectivity.
More informationOutsourcing. w os WORKPLACE. it os IT SERVICE MANAGEMENT SERVICES BPO OUTSOURCING. ITO dos DATACENTER OPERATION SERVICES.
IT ITO dos DATACENTER OPERATION w os WORKPLACE OPERATION OUTSOURCING a os APPLICATION OPERATION it os IT SERVICE MANAGEMENT BUSINESS PROCESS BPO OUTSOURCING o ss OUTSOURCING SUPPORT Outsourcing Companies,
More informationGaining Competitive Advantage Through Internet Business Solutions. 1999, Cisco Systems, Inc.
Gaining Competitive Advantage Through Internet Business Solutions Source Presentation_ID graphic: 1999, Cisco Systems, Inc. 1 Cisco - A Best Practice Example Who s been to Cisco and can tell us about the
More informationFebruary 16th, 2012 Prague. Smarter Commerce. Robert Mahr. Leader Smarter Commerce CEE & RCIS
February 16th, 2012 Prague Smarter Commerce Robert Mahr Leader Smarter Commerce CEE & RCIS Complex Fuzzy Interlocked Powerful! The Smarter Consumer is more instrumented Instrumented 36% more consumers
More informationVirtual Private LAN Service (VPLS)
Virtual Private LAN Service (VPLS) Walking through Wan history, from the early days Leased lines Customers subscribe to dedicated point-to-point links Cost prohibitive for customers Started in the 1980
More informationCisco Solutions for Big Data and Analytics
Cisco Solutions for Big Data and Analytics Tarek Elsherif, Solutions Executive November, 2015 Agenda Major Drivers & Challengs Data Virtualization & Analytics Platform Considerations for Big Data & Analytics
More informationADDENDUM 2 TO APPENDIX 1 TO SCHEDULE 3.3
ADDENDUM 2 TO APPENDIX 1 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT Overview EXHIBIT E to Amendment No. 60 The Disaster Recovery (DR) Services, a Tier-Level DR Solution, addresses the
More informationCisco Certified Security Professional (CCSP)
529 Hahn Ave. Suite 101 Glendale CA 91203-1052 Tel 818.550.0770 Fax 818.550.8293 www.brandcollege.edu Cisco Certified Security Professional (CCSP) Program Summary This instructor- led program with a combination
More informationHow-to-Sell Data Center. [January 2010]
How-to-Sell Data Center [January 2010] Agenda Why You Should Care Business Trends Value proposition What to sell Selling Tips Competitive Snapshot Resources to Help You Succeed 2 Why You Should Care Data
More informationData Center Technologies
Data Center Technologies Ing. Marcel Kuza mkuza@uy.ibm.com Agosto, 2010 XI Jornadas de Actualización Tecnológica: Networking, Punta del Este, Uruguay Agenda Introduction to Data Center Solutions (by IBM)
More informationIJMIE Volume 2, Issue 5 ISSN: 2249-0558
E-Commerce and its Business Models Er. Nidhi Behl* Er.Vikrant Manocha** ABSTRACT: In the emerging global economy, e-commerce and e-business have increasingly become a necessary component of business strategy
More informationGlobal Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R F l e x i b l e N e t w o r k - B a s e d, E n t e r p r i s e - C l a s s I P
More informationEnd-to-End Infrastructure Solutions
End-to-End Infrastructure Solutions Thakral One www.thakralone.com www.thakralone.com 1 Agenda 1 2 3 Maximizing Infrastructure Investments End-to-End Infrastructure Solutions Thakral One and Our Value
More informationVirtual Private Networks
Virtual Private Networks The Ohio State University Columbus, OH 43210 Jain@cse.ohio-State.Edu http://www.cse.ohio-state.edu/~jain/ 1 Overview Types of VPNs When and why VPN? VPN Design Issues Security
More informationCisco AVVID Network Enterprise Data Center Solution Overview
White Paper Cisco AVVID Network Enterprise Data Center Solution Overview Data centers enable the consolidation of critical computing resources, in controlled environments under centralized management,
More informationCHAPTER 13: ELECTRONIC COMMERCE AND E-BUSINESS
CHAPTER 13: ELECTRONIC COMMERCE AND E-BUSINESS Multiple Choice: 1. founded Amazon.com. A. Alan Kay B. Jeff Bezos C. Bill Gates D. Andy Grove Answer: B Reference: Jeff Bezos: The Virtual Bookseller Difficulty:
More informationBelgacom Group Carrier & Wholesale Solutions. ICT to drive Your Business. Hosting Solutions. Datacenter Services
Belgacom Group Carrier & Wholesale Solutions ICT to drive Your Business Hosting Solutions Agenda Vision on our Why outsourcing Shared Hosting Virtual dedicated Hosting Dedicated Hosting What / Why virtualization?
More informationi. Definition ii. Primary Activities iii. Support Activities iv. Information Systems role in value chain analysis
ACS 1803 Final Exam Topic Outline I. Enterprise Information Systems a. Enterprise systems vs. inter-organisational systems b. Value Chain Analysis ii. Primary Activities iii. Support Activities iv. Information
More information