Вы находитесь на странице: 1из 18

1|Page

ITBM
ASSIGNMENT

Submitted by
Robin Joseph Thomas
FK-2055
PGDM 19-B
2|Page

1) Supply chain management


SCM is the process of effectively managing the components of an extended
value chain--from suppliers, through manufacturing and distribution chain, and
to the consumers. SCM information systems use technology to more effectively
manage supply chains.
TYPES OF SCM SYSTEM SOFTWARE
The two basic types of SCM system software are:
1. Supply Chain Planning software (SCP): It uses mathematical models to predict
inventory levels based on the efficient flow of resources into the supply chain
2. Supply Chain Execution software (SCE): It is used to automate different
steps in the supply chain such as automatically sending purchase orders to
vendors when inventories reach specified levels.

2) 3G
International Mobile Telecommunications-2000 (IMT — 2000), better
known as 3G or 3rd Generation, is a generation of standards for mobile phones
and mobile telecommunications services fulfilling specifications by the
International Telecommunication Union. Application services include wide-area
wireless voice telephone, mobile Internet access, video calls and mobile TV, all in
a mobile environment. A 3G system must allow simultaneous use of speech and
data services, and provide peak data rates of at least 200 kbit/s according to the
IMT-2000 specification.
In 2008, India entered the 3G arena with the launch of 3G enabled Mobile and
Data services by Government owned Bharat Sanchar Nigam Ltd. (BSNL). Later,
MTNL launched 3G in Delhi and Mumbai. Nationwide auction of 3G wireless
spectrum was announced in April 2010. The first Private-sector service provider
that launched 3G services is Tata Docomo, on November 5 2010. And the second
is by Airtel in the middle of the same month. Other providers like Vodafone, Idea
and Aircel are expected to launch 3G services by January 2011.
3|Page

3) .NET
The Microsoft .NET Framework is a software framework for Microsoft
Windows operating systems. It includes a large library, and it supports several
programming languages which allows language interoperability (each language
can utilize code written in other languages.) The .NET library is available to all the
programming languages that .NET supports. The framework's Base Class Library
provides user interface, data access, database connectivity, cryptography, web
application development, numeric algorithms, and network communications.
The class library is used by programmers, who combine it with their own code to
produce applications
Microsoft started development on the .NET Framework in the late 1990s
originally under the name of Next Generation Windows Services (NGWS). By late
2000 the first beta versions of .NET 1.0 were released. Version 3.0 of the .NET
Framework is included with Windows Server 2008 and Windows Vista. Version
3.5 is included with Windows 7, and can also be installed on Windows XP and the
Windows Server 2003 family of operating systems. On April 12, 2010, .NET
Framework 4 was released alongside Visual Studio 2010.

4) SERVICE ORIENTED ARCHITECTURE


A service-oriented architecture is essentially a collection of services. These
services communicate with each other. Service-oriented architecture (SOA) is a
flexible set of design principles used during the phases of systems development
and integration in computing. Service Provider creates a service for interaction
and exposes the service’s description for consumers and may decide to register
this service with registry of choice. The Service consumer discovers the service
from register or directly from service provider and send messages in well defined
XML format

The eight specific service-orientation principles:


 Standardized Service Contract
 Service loose coupling
4|Page

 Service Abstraction
 Service Reusability
 Service Autonomy
 Service Statelessness
 Service Discoverability
 Service Composability

REQUIREMENTS
 Interoperability among different systems and programming languages that
provides the basis for integration between applications on different
platforms through a communication protocol

 Desire to create a federation of resources.

5) WIPRO
Wipro Technologies Limited is a giant information technology services
corporation headquartered at Bangalore, business spans India, Asia Pacific and
the Middle East.It has interests varying from Information technology, consumer
care, lighting, Engineering and health care businesses.
Azim Premji is the Chairman of the Board, WIPRO started as a vegetable oil
trading company in 1947 from an old mill at Amalner, Maharastra, India founded
by M.H. Premji .In 1979, WIPRO began developing its own computers and in 1981
started selling the finished product.Wipro Limited, which dealt in hydrogenated
cooking fats along with consumer products, grew from a company of US $2.5
million to a giant of $1.4 billion under Premji's leadership. Its main divisions
include IT Services,Product Engineering Solutions,Technology Infrastructure
Services and Business Process Outsourcing. IT details of the company include
Database: MS SQL 2000/2005,OS: Windows 2003 enterprise edition,Application:
Alpha petrol, Enabler Management, Enabler Configuration, Fuel
Réconciliation,Reporting Tool: Jasper Report and Controller Hardware: Enabler
5|Page

from Integration Technologies from New Zealand. WIPRO mainly deals with
System Software Development, Operating System, Device Driver Development.

6) Cloud computing
Cloud computing is a style of computing that characterizes a model in
which providers deliver a variety of IT-enabled capabilities to consumers. Cloud-
based services can be exploited in a variety of ways to develop an application or
a solution. Using cloud resources does not eliminate the costs of IT solutions, but
does re-arrange some and reduce others. In addition, consuming cloud services
enterprises will increasingly act as cloud providers and deliver application,
information or business process services to customers and business partners.
ADVANTAGES DISADVANTAGES

Increasingly associated with SMEs. Requires a constant Internet


connection.

Cloud computing users avoid capital Does not work well with low-speed
expenditure connections.

Reduced implementation and Can be slow.


maintenance costs.

Increased storage on demand / Flexible Features might be limited.


and scalable infrastructures.

“Greening” of the data center / Reduced Stored data might not be secure.
Energy costs
Highly automated. Stored data can be lost

Greater mobility to workforce.


6|Page

7) CUSTOMER RELATIONSHIP MANAGEMENT


Customer relationship management is a comprehensive strategy. It is the
process of acquiring, retaining and partnering with selective customers to create
superior value for the company and the customer. It involves integration of
marketing, sales, customer service and supply chain functions of the
organization. The purpose of CRM is to improve marketing productivity. Effective
CRM implementation requires a frontline information system that shares
relevant customer information across all interface units.CRM tools are meant to
supplement a company’s strategy for building effective customer relationships.

FACTORS CONTRIBUTING TO DEVELOPMENT AND EVOLUTION OF CRM


Advent of sophisticated computer and telecommunication technologies that
allow producers to directly interact with end customers. For e.g. in Airline,
Banking, the de-intermediation process is fast changing the nature of marketing
and consequently making relationship more popular. The de-intermediation
process and consequent prevalence of CRM is also due to the growth of the
service economy. Between the service provider and the service user and the
service user an emotional bond also develops creating the need for maintaining
and enhancing the relationship
Another force driving the adoption of CRM has been the total quality movement.
When companies embraced the TQM philosophy to improve quality and reduce
costs, it became necessary to involve suppliers and customers in implementing
the program at all levels of the value chain. Thus several companies, such as
Motorola, IBM, Xerox formed partnering relationships with suppliers and
customers to practice TQM .Marketers are forced to be more concerned with
customer retention & loyalty. On the supply side it pays more to develop closer
relationships with a few suppliers than to work with more vendors.
Finally, many large internationally oriented companies are today trying to
become global by integrating their worldwide operations. Since CRM
implementation comprises a significant IT component, these companies have
often handed over the responsibility of CRM implementation to IT departments.
7|Page

8) LINUX
It is a Unix-like Operating System. Linux is a famous open source project. It
is free to use, distribute, modify under a compatible licence. Linux is produced by
a large developer and user community.it is a combination of many projects. The
cost of commercial development of this is estimated at USD 7 billion. Linux was a
Unix-based OS. UNIX was developed in 1970 by AT&T Lab (Later known as Bell
Lab. Linux is created in 1991 by Linus Torvalds.
Version 1of Linux is released in 1994. Initially it was developed for 80x86
processors (IA32 or i386 architecture processors. Today it supports various
processors such as- AMD, Motorola 6800, Power PC, etc. People can improve and
add things in LINUX. Some WINDOWS programs can be run under LINUX using
emulator.

9) GREEN COMPUTING
The study and practice of using computing resources efficiently. The goals
are similar to green chemistry; that is reduce the use of hazardous materials,
maximize energy efficiency during the product’s lifetime and promote
recyclability or biodegradability of defunct products and factory waste.
Virtualization is the process of running two or more logical computer systems on
one set of physical hardware; it is one of the most approaches of the green
computing. Other approaches are Power management, Power supply, Storage,
Video card, Material recycling.
It is estimated that out of $250 billion per year spent on powering computers
worldwide, only about 15% of that power is spent computing-the rest is wasted.
In order to achieve the energy efficiency target IT Cos. will have to learn to use
less electricity in just the same the way, using green computing to save money.
This will demand major changes in IT uses and policies. An industry initiative
called 80 PLUS certificates PSUs that are at least 80% efficient.
8|Page

GREEN IT
The problem: Rising energy cost will have an impact.
The solution: A fresh approach to IT and power is now needed, putting power
consumption at the force in all aspects of IT.
Strategies of change: IT Cos. will have to learn to use less electricity in just the
same the way, using green computing to save money. This will demand major
changes in IT uses and policies.
The features of a green computer of tomorrow would be like: efficiency,
manufacturing and materials recyclability, server model, self-powering and other
trends.

10) EBAY
Ebay is one of the finest example for E-commerce, It consists of the buying
and selling of products or services over electronic systems such as the Internet
and other computer networks. The amount of trade conducted electronically has
grown extraordinarily with widespread Internet usage, Online retailers are
sometimes known as e-tailers and Online retail is sometimes known as e-tail.
Online shopping is a form of electronic commerce where the buyer is directly
online to the seller's computer usually via the internet, Electronic commerce that
is conducted between businesses is referred to as business-to-business or B2B.
It is an American Internet company that manages eBay.com, an online auction
and shopping website in which people and businesses buy and sell a broad
variety of goods and services worldwide, Founded in 1995 by Pierre Omidyar, a
computer programmer and its present CEO is John Donahoe. There are different
models used in such E-commerce applications and they include Brokerage model,
Advertising model, Infomediary model, Direct model, Manufacturer model,
community model and finally subscription model.

11) MOBILE APPLICATIONS


Mobile applications is used to describe Internet applications that run on
smart phones and other mobile devices, they usually help users by connecting
9|Page

them to Internet services more commonly accessed on desktop or notebook


computers or help them by making it easier to use the Internet on
their portable devices. Mobile application development is a important concept in
the field of mobile applications, it is defined as, the process by
which applications are developed for small low-power handheld devices such
as persona digital assistants, enterprise digital assistants or mobile phones. These
applications are either pre-installed on phones during manufacture, or
downloaded by customers from app stores and other mobile software
distribution platforms.
Mobile applications development mainly consists of two platforms, one which
supports multiple manufacturers and one which does supports only one
platform. Multiple supporting platforms include Java-me, Symbian, Android and
Windows mobile. Single manufacturer platforms include Blackberry and Apple.
Business market for Mobile applications is huge as much as $1.7 billion.

12) Social Networking Sites


Social networking is the interaction of people who share common
interest”. Social Networking Sites is the online service or platform that builds
social relations among people”
BLOG
A blog is basically an online journal that can be either public or private. If your
blog is private, only specific users that you invite can read your blog. You can blog
about anything, personal experiences, travel, or on a particular topic. To
subscribe to a blog, you will need to sign up for a Google reader account or other
RSS feed reader.
ORKUT
Orkut is an online community that connects people through a network of trusted
friends

FACEBOOK
It allows user search for new and old friends. It makes less awkward when
communicating with strangers. It is easier to join group having similar interest. It
10 | P a g e

is free and easy to use. The level of customization makes it stand out from other
networking sites.

13) APPLE.INC
Steve Jobs, Steve Wozniak, and Mike Markkula formed Apple Computer on
April 1, 1976, after taking out a $250,000 loan. Steve Wozniak built a computer
to run on the 6502 chip from MOS technology, but Jobs had the idea to sell it.
The different Apple includes Apple I, Apple II, and Macintosh…etc. In 1991, Apple
Computer, IBM, and Motorola joined to create the PowerPC processors.
In July 2005, iPod’s U.S. market share was estimated at 74% January 2007; Apple
reported record annual earnings of $7.1 billion. In January, Steve Jobs announced
the company would change its name to Apple, Inc. to incorporate their many
endeavors. On January 27, 2010, Apple introduced their much-anticipated media
tablet, the iPod running a modified version of iOS.

14) GENPACT
Traces its beginnings to 1997, when under the name of GECIS; it was
established as an independent business unit of GE Capital. Genpact became an
independent company in January 2005, enabling faster growth by reaching down
to clients outside the GE family. The company was listed on the NYSE in August
2007 under the trading symbol “G”. Genpact has its head quarters at Hamilton,
Bermuda.
MAJOR CLIENTS OF GENPACT
 GlaxoSmithKline
 Penske
 Genworth
 Nissan
 Air Canada
 Linde
 Wachovia
11 | P a g e

15) Business analytics


Business intelligence (BI) refers to computer-based techniques used in
spotting, digging-out, and analyzing business data, refers to the use of
technology to collect and effectively use information to improve business
effectiveness. Common functions of Business intelligence are Reporting,Online
analytical processing, data mining, Business management and predictive
analytics. In 1958 Hans peter was the first person to use the term Business
intelligence. Its applications include gaining new insight, to support business
decisions, Continuous monitoring processes.
Before implementing a BI solution, it is worth taking different factors into
consideration before proceeding. According to Kimball et al. These are the three
critical areas that you need to assess within your organization before getting
ready to do a BI project,
1. The level of commitment and sponsorship of the project from senior
management
2. The level of business need for creating a BI implementation
3. The amount and quality of business data available
Future of BI: By 2012, business units will control at least 40 percent of the
total budget for business intelligence.
By 2010, 20 percent of organizations will have an industry-specific analytic
application delivered via (SaaS) as a standard component of their business
intelligence portfolio.

16) FLASH MEMORY


Flash memory is not new, but it is moving up to a new tier in the
storage echelon. Flash memory is a semiconductor memory device, familiar from
its use in USB memory sticks and digital camera cards. It is much faster than
rotating disk, but considerably more expensive, however this differential is
shrinking. At the rate of price declines, the technology will enjoy more than a 100
percent compound annual growth rate during the new few years and become
strategic in many IT areas including consumer devices, entertainment equipment
12 | P a g e

and other embedded IT systems. In addition, it offers a new layer of the storage
hierarchy in servers and client computers that has key advantages including
space, heat, performance and ruggedness.Two technologies used in flash
memory are
 NAND technology
 NOR technology

CHARACTERISTICS
 Flash memories are non-volatile; they do not require power to retain
memory content.
 They can be programmed (erased and written to) and can be accessed
(read) at high speed.
 Longer time periods are required for erasing and writing.
 The development of flash memories is lagging behind the development of
DRAMs because of the need for high internal voltages for writing and
erasing.
 Flash memories are beginning to be widely used in the commercial market
where they are showing up in applications such as solid state disks.
 Flash memories do have a limited life of about 104 to 106 erase and write
operations but this is sufficient for many applications.

17) ONLINE BANKING


Online banking is the practice of making bank transactions or paying bills
via the Internet. One can shop online, communicate online, and now, one can
even do one’s banking online. Online banking allows us to make deposits,
withdrawals and pay bills all with the click of a mouse. One can check the balance
every day just by logging on to one's account. Since bills are paid online, the
necessity of writing checks, affixing postage and posting the payment in the mail
is eliminated. Once the amount is entered and the payee is checked off, the
funds are automatically deducted from the payer's choice of account. At the
13 | P a g e

same time the setting up an account may take time and there are learning
difficulties also because the site changes and upgrades.

BASIC REQUIREMENT
1. Administrator Rights
2. Browser Settings
3. Certified Versions of Sun Java Software for CitiDirect
4. Cookies
5. Internet Explorer 7.0 - Browser Settings
6. Internet Security Options
7. Java Scripts
8. Proxy Server
9. Required Hardware
10.Required Software
11.Secure Sockets Layer Protocol (SSL)

18) Firewall
It is a logical barrier designed to prevent unauthorized or unwanted
communications between sections of a computer network. Firewalls are used to
prevent unauthorized Internet users from accessing private networks
connected to the Internet, especially intranets. All messages entering or leaving
the intranet pass through the firewall, which examines each message and blocks
those that do not meet the specified security criteria.

PLATFORMS OF FIREWALL
DESKTOP FIREWALL
Any software installed on an operating system to protect a single computer is
called a desktop or personal firewall. This type of firewall is designed to protect
a single desktop computer.
NETWORK LEVEL FIREWALL
14 | P a g e

It inspects packet headers and filtering traffic based on the IP address. The port
and the service can’t validate user inputs or detect maliciously modified
parameters in an URL request. It leaves your network vulnerable to a number of
serious threats.

STATEFUL MULTI LEVEL FIREWALL


It filters packets at the network level and recognize and process application-
level data, but since it doesn't employ proxies, it deliver reasonably good
performance in spite of the deep packet analysis. It is not cheap, and it can be
difficult to configure and administer.

19) TELECOM INDUSTRY


Indian telecom industry is the world fastest growing telecommunication
industry. It is the second largest telecommunication network in the world in
terms of number of wireless connection after china. The mobile tariffs in India
have also become lowest in the world. Indian telecommunication system is
governed by the Indian telegraph act, 1885 (ITA 1885) and the Indian wireless
act, 1933. The department of telecommunications (dot) governs the Indian
telecom industry. Dot, in co- ordination with its arm, telecom commission, looks
after licensing, policy making, and frequency management. Dot established the
telecom regulatory authority of India (TRAI) in 1997. The telecom disputes
settlement and appellate tribunal (TDSAT) were also established at the same
time. Another regulatory body is the wireless planning commission (WPC) under
the ministry of communications. In June 2009, the government of India banned
the import of several mobile phones manufactured in china. In April 2010, the
government was also reported to be blocking Indian service providers from
purchasing Chinese mobile technology. India will start using ipv6 (internet
protocol version 6) from March 2012, according to a new roadmap released by
the Indian government. Indian telecom sector has shown tremendous growth in
past few years on the back of increasing demand and policy initiatives taken by
the government.
15 | P a g e

20) ORACLE
Oracle Corporation was founded in 1977 by Larry Ellison, Bob Miner and
Ed Oates. Over 65,000 customers worldwide rely on Oracle's complete
application solutions to achieve superior results. Oracle Applications also provide
complete choice and a secure path for customers to benefit from the latest
technology advances. Oracle Applications Unlimited is Oracle's commitment to
customer choice through continuous investment and innovation in current
applications offerings. The powerful combination of complete solutions and
complete choice drive better business performance and help customers.

21) FINANCIAL PACKAGES


The most commonly used financial packages are:

ORACLE ERP: Oracle ERP Software is the most comprehensive software system at
present that integrates all the business functions most effectively, featuring a
unique combination of hardware and software. This software is engineered to
cater the requirements of different types of industries and business processes
and has fast gained popularity across the globe.

TALLY: Tally an accounting Software is one of the simplest software’s to use, it is


very user friendly and even a person having the basic knowledge of accounts and
computers can easily learn this package on his own.

SAP: SAP is one of the top Enterprise Resource Planning (ERP) software in the
world. SAP is the brainchild of five IBM engineers who broke off from IBM and
founded SAP AG in 1992. It drives efficiency and value to the bottom line of
large, mid-size and now smaller organizations by redefining how business should
be done. SAP solutions deliver real-time visibility across the entire enterprise and
are not limited to top management, control engineers or the IT team.
16 | P a g e

22) AMAZON.COM
Amazon.com is a public company founded in 1994 by Jeffery P Bezos. Its
headquarters is in Seattle, Washington, USA. It is available worldwide.
Its products include books, music CDs, consumer electronics among others and
services include compute, content delivery, database, E-Commerce, messaging
and monitoring, networking, payments and billing, storage...etc.
There were a few controversies related with this site such as differential pricing
competition, product availability, kindle content removal, sale of Wikipedia’s
material as books and collection of sales tax.

23) IT SECURITY
IT Security is eliminating the disruption of business operations and
reducing the exposure to cyber attacks. Another term for this is IT Security
Assurance. It is protecting information or data in whatever form. Cyber crime
and terrorism has escalated during recent years. It is well-organized. It is
advanced technically. It is well-financed. It has adopted a new view. The
legal/regulatory risks are disclosure of customer relationship, damage claims,
taxation/customs aspects, national/international restrictions of inter- and intra-
business financial transactions and rules imposed by regulators. Basic research
has created sufficiently good encryption algorithms. Vendors have integrated
encryption into some of their products. As part of the Internet growth,
encryption issues are gaining public attention. More than ever, IT Security needs
strong support from basic and applied research. The shortcomings in adapting
research results to business/industry must be overcome. The demand for skilled,
interdisciplinary IT Security experts is growing quickly.

24) UID
UID project is known as AADHAAR. It means 'support' or 'foundation’.
Aadhaar is the new name of the Multipurpose National Identity Card program of
the Unique Identification Authority of India. The purpose of UID is to ensure
inclusive growth by providing a form of identity to those who do not have any
17 | P a g e

identity. It seeks to provide Aadhaar numbers to the marginalised sections of


society and thus would strengthen equity. The Aadhaar number will enable
better delivery of services and effective governance. Public and private agencies
can build services and applications that benefit residents across India. It enables
uniqueness and centralized online identity verification and gives the power to
access anywhere.

25) IT IN SPORTS
Technology is found in everything we do and everything we watch. It aids
in the healing process of athletes. It allows athletes on teams to improve their
skills, as well as connects your everyday coaches to referees on the field.
Technology has made many people’s lives much easier and has opened up the
horizon for millions of jobs. The technologies used in Baseball are Sabermetrics,
Scouting Software, Sports Betting, Dartfish, Yellow Line and Omega Wave.
Satyam Computer Services Ltd, India’s fourth biggest software firm, has blazed
the trail, signing a seven-year agreement to be FIFA’s official IT services provider
and its first major sponsor from cricket-mad India. IT used in cricket are Hawkeye
and Hotspot. The story of Indian Information Technology is now on rails! Six
coaches of the Commonwealth Express train now traversing the country are
devoted to telling the success story of IT in India. It is also appropriate to briefly
examine how the web will change the sale and distribution of sporting goods
which is central to running sport programs. Wide Area Networks (WANs) can link
together sports administrators located throughout a country.

26) KNOWLEDGE PROCESS OUTSOURCING


KPO is one step extension of Business Processing Outsourcing (BPO) .KPO
is emerging as a new sector that promises to provide long-term jobs for
intellectual, analytical and knowledgeable people with a pay scales much higher
than the BPO sector.KPO can be defined as high added value processes chain
where the achievement of objectives is highly dependent on the skills, domain
knowledge and experience of the people carrying out the activity.
18 | P a g e

KPO services that can be outsourced to India are

a.) Research & Development,


b.) Business and Technical Analysis,
c.) Learning Solutions,
d.) Animation & Design,
e.) Business & Market Research,
f.) Pharmaceuticals and Biotechnology

MAJOR KPO COMPANIES


 Genpact
 Evalueserve
 Ugam Solutions
 WNS
 24/7 Customer

Вам также может понравиться