Re-engineering in IT means extracting the business logic and data from current systems then moving to new system. The term “re-engineering” have different meaning with the term “business process re-engineering” or “BPR”. The “system re-engineering” refers to software only while BPR refers to redesigning the business processes.
People thinks existing systems as a debt that have to be maintained, and avoid developing the new, exciting systems. That thinking way is the main problem in IT management. Instead, management team needs to understand the existing systems as asset. When developer can reverse engineer a system, to extract the underlying business logic, they can forward engineer that logic to new system.
Charles Bachman proposed a new system development life cycle, which can include all four basic activities: maintenance, enhancement, new development and migration. This life cycle presents on circular.
As in case study of GTE Directories, a company in advertising industry with Yellow Page product, they have four legacy systems/databases. These databases were designed application-by-application at original, so they didn't have any business relationship to each other. The management team decided using reverse engineering tools to help them improve databases. A designer modelled existing database to graphical then made changes by manipulating icons. The reverse engineering tool helped to draw complete and consistent relationship diagrams. Once new databases design had been created, the designer forward engineered the database design to generate database statements.
Friday, March 26, 2010
Thursday, March 25, 2010
Security’s Five Pillars
There are five pillars of security techniques nowadays. They are:
- Authentication: means verify authenticity of users. It depends on three basic factors: knowledge factor, ownership factor, and inherence factor. “Knowledge factor” or “something they know” means things only they know, e.g. password or first pet’s name. “Ownership factor” or “something they have” means things belong to them, e.g. the token or digital certificate. “Inherence factor” or “something they are or do” means a physical characteristic, e.g. fingerprint or retinal eye.
- Identification: means issuing and verifying access privileges. In principle, identification is certified able to do certain things. Identification has moved to application level, where people have an authentication at every application. Because identification at application is inconvenient for user, so companies are moving to single-sign-on technique.
- Privacy and Integrity: means keeping information from being seen (privacy) and changed (integrity). The most common method of protecting data is encryption. Two common types of encryption are public key and secret key. DES is an example of secret key, while RSA is an example of public key.
- Nonrepudiation: it can prove that communication between sender and receiver is secure and there is trusted third parties can monitor their transferring data. This technique prevents man-in-middle attack or phishing.
Labels:
authentication,
DES,
disaster,
identification,
integrity,
nonrepudiation,
pillar,
privacy,
recovery,
RSA,
security
Wednesday, March 24, 2010
Managing Outsourcing: Organizational Structure
There are lot of factors affect to handle a successful working relationship in managing outsourcing. These are four popular factors below:
A typical solution for parties is layered joint teams. A top-level team has final word for conflict resolutions. An operational team monitors everyday functioning. A special-purpose team deal with pressing issues. Come back with Kodak, their management structure has some elements: a management board, an advisory council, a supplier and alliance management group, etc.
Even though, the joining is a common management structure but a single executive still needs in charge at each side of their relationship. At client side, this position is the relationship manager. A relationship manager should good at negotiating, sweet talk, and effective communication between end users and service providers.
- Organizational Structure
- Governance
- Day-to-day working
- Supplier development
A typical solution for parties is layered joint teams. A top-level team has final word for conflict resolutions. An operational team monitors everyday functioning. A special-purpose team deal with pressing issues. Come back with Kodak, their management structure has some elements: a management board, an advisory council, a supplier and alliance management group, etc.
Even though, the joining is a common management structure but a single executive still needs in charge at each side of their relationship. At client side, this position is the relationship manager. A relationship manager should good at negotiating, sweet talk, and effective communication between end users and service providers.
Labels:
joint,
manage,
manager,
organization,
outsource,
relationship,
structure,
team
Tuesday, March 23, 2010
Working Outward: Business-to-Customer
In most industries, companies must utilize computer systems to advance in their competition. Industry leaders advance their systems to state-of-the-art to address four aspect of competitiveness: quality, service, innovation, and speed.
More experience leads the firm to a set of connected curves, rather than one continuous learning curve. A company properly identified a new market and the technology to exploit it can shift to new experience curve. An electronic tender is an electronic communication capability on a product or service. An electronic tender allows another computer cared for, attended to or kept track of it. Becoming customer driven is the current focus of companies.
By involving of Internet, Business-to-Customer (B2C) has both new advantages and problems.
Advantages of B2C E-Business
- Internet helps business overcome the geographic limitation.
- Reduce order-processing.
- Available online to serve customer at anytime (24/7).
- Quickly address concerns and customize responses.
- Pay more attentions to customer services and personalized.
- Provide relate products and services with things are customer looking for.
- Sell goods direct to customer without other distribution channels.
Potential B2C problems
- Systems not always reliable or poorly designed.
- Shipping challenge can completely avoidable by connect to supply chain solutions.
- Employee deals with technical problems and customers. Less expertise in a new market segment is a problem, too.
- Each area has difference legal system that made business always be aware.
- All competitors can easy create an online business.
- The price competition reduces profit margins of all companies.
- The competitors appear from everywhere, not only within local area.
Labels:
advantages,
B2C,
customer,
disadvantages,
outward,
strategic
Monday, March 22, 2010
Leading aspect of the CIO’s role
If CIOs have an important role in aligning IT into business, they must understand the business. With that understanding, they can create a vision and encourage their firm apply IT to business.
Understanding the Business
Nowadays, understanding the business operation’s environment is important because the relationship with other firms affect the business competes. There are seven approaches for CIO to understand the business:
What is a vision? A vision is a statement of how someone wants future to be or believe it to be. It is used to set direction of an organization. When has a vision, then CIO can formulated a strategy on how to bring the vision into being.
Why develop a vision? A vision of desirable future can provide stability when it sets direction for an organization. In today’s environment, events are likely to appear random. Thus, direction setting and short-term explorations within that space are most appropriate.
Encouraging champions of IT projects: A champion is someone with a vision who gets it implemented by obtaining the funding, pushing the project over difficulties, putting his or her reputation on the line, and taking on the risk of project. CIO’s need champions to encourage IT experimentation, especially by people from the operating units. The champions need three things from IS management: information, resource, and support.
Understanding the Business
Nowadays, understanding the business operation’s environment is important because the relationship with other firms affect the business competes. There are seven approaches for CIO to understand the business:
- Encourage project teams to study the marketplace
- Concentrate on lines of business
- Sponsor weekly briefing
- Attend industry meetings with line executives
- Read industry publications
- Hold informal listening sessions
- Partner with a line executive
What is a vision? A vision is a statement of how someone wants future to be or believe it to be. It is used to set direction of an organization. When has a vision, then CIO can formulated a strategy on how to bring the vision into being.
Why develop a vision? A vision of desirable future can provide stability when it sets direction for an organization. In today’s environment, events are likely to appear random. Thus, direction setting and short-term explorations within that space are most appropriate.
Encouraging champions of IT projects: A champion is someone with a vision who gets it implemented by obtaining the funding, pushing the project over difficulties, putting his or her reputation on the line, and taking on the risk of project. CIO’s need champions to encourage IT experimentation, especially by people from the operating units. The champions need three things from IS management: information, resource, and support.
Sunday, March 21, 2010
The trends of Information Technology
The trends of IT can recognize through changes in hardware, software, data and communication.
Hardware trends
At first, the main hardware concerns of data processing manager were machine efficiency and tracking new technological development. From 1980s, the trend of personal computer (PC) started. Now, the PCs trend is established. Client-server computing forms the underlying structure. Telco and handheld manufactures raise the trends of Mobile Computing. Telco will handle both voice and data. Wireless involving means people can work anytime-anywhere.
Software trends
Since 1960s, IS management discussed purchasing service from external provider. Then topics expanded to software development life cycle. During the 1990s, software buyers forced driven to open systems. ERP was a major trend in 1990. Like hardware, network centric software is becoming more popular. Web-service is another change in software. The Business Process Management Systems (BPMS) will become the future of software. Therefore, the process centric applications will be the next trend of software.
Data trends
In 1970s, database management systems became the technical solutions for managing data. With distributing data, in 1990s, the trend was expanding from to information resources. Data warehousing and mining had been discussed. Knowledge Management is of prior important in the new economy because of intangibles hold competitive value. Two major data issues now facing CIOs are security and privacy.
Communication trends
LAN and WAN appeared. Then, Internet helped people to search the Web, chat, send email, transfer files, etc. Internet’s protocols have become the standard for LANs and WANs. Wireless is the latest technology.
Labels:
communication,
data,
hardware,
software,
trends
Subscribe to:
Comments (Atom)