Blockchain Technology As a way to increase data security for transaction, a new system that allows these transactions to occur automatically more securely and without an intermediary has been conceived. Blockchain or (Distributed Ledger Technology) was developed in the aftermath of the 2008 recession to deliver transparency, security, and efficiency in managing transactions between multiple parties. This concept is now being implemented or considered in many business models worldwide. What really is Blockchain? In its simplest form, Blockchain can be described as a private, secure network that uses cryptography to keep exchanges secure, provides a decentralized database, or digital ledger, of transactions that everyone on the network can see. This network is essentially a chain of computers that must all approve an exchange before it can be verified and recorded. Following figure illustrates the Basic Blockchain Process. One of the benefits of this system is that once a record is Continue reading
Business Information Systems
Email Security Best Practices to Keep Your Business Safe
The most pervasive means of communication today for businesses and private citizens, Electronic mail or Email, was not designed with security in mind. Today, Email application is built into almost all smart devices from phones to computers to gaming and sensor devices. however, the Email message that this device send and receive is transmitted in plain text format in almost all cases. with ever-increasing cybercrime, sending plain text message that can potentially contain sensitive data is a risky undertaking. This weakness in security in Email systems, has made Email the primary attack vector for criminals. Cybercriminals use Email as simplest and cheapest method to ship their malicious payload to targets. The three core principles when it comes to information security, Confidentiality, Integrity and Availability (CIA) holds true in Email security as well. However, there is one other principle to consider in Email security, Non-repudiation meaning that the sender of the Continue reading
Case Study on Business Systems Planning And Implementation : McDonald’s Corporation
McDonald’s has worked hard to be more than a restaurant chain. It has become a marketing icon and is part of the routines of millions of people. Its success is so far reaching that it has developed its own culture and identity. It has become a symbol of the success and desirability of American popular culture. McDonald’s operates more than 24,000 restaurants in 114 countries. It has a 21 percent share of the very competitive US fast food industry. Overseas restaurants now account for half of the company’s profits. McDonald’s plans to open 10,000 new restaurants by the year 2005. It has been the forerunner in the recent industry trend of co-branding and satellite locations. What has set McDonald’s apart from the average hamburger restaurant is its ability to recognize customers’ needs and desires. It seems customers want fast, friendly service in a clean and orderly environment. McDonald’s Continue reading
Case Study: Cisco Systems Inc.’s ERP Implementation
Introduction Cisco Systems, Inc. is a big player in the Internet technologies field, manufacturing their primary product – the router. Two Stanford computer scientists founded the company in 1984, unbelievably by 1997, Cisco became a fortune 500 company and in the following year Cisco’s market capitalization was over $100 billion dollars. With the gigantic growth experienced Cisco needed to look into their future regarding their existing Enterprise Resource Planning package. Unreliability and common outages brought into question the validity of trying to enlarge the current system to meet the Cisco’s constantly growing needs. The current system was a UNIX-based software package that supported financial, manufacturing, and order-entry systems. An upgrade was made available to Cisco, but would be a fix that offered more reliability and redundancy without maintainability or room for growth. The management structure in 1993 provided that each functional business unit make its own decisions regarding the future of their IT Continue reading
Case Study on E-Business Transformation: Cisco Systems
Cisco Systems is the network vendor for many institutions — yet they now also provide products and services for home networking. At the beginning history of Cisco Systems, the corporation’s goals were to build-up easiness in accessing the information using various electronic information channels, especially computer, inside the Stanford campus. Along with the growth of the firm, the management hired many talented employees. They formalized their business plan covering four strategic goals (provide complete solution for businesses, make acquisitions a structured process, define the industry-wide networking protocols, and form the right strategic alliances). Based on that strategy, they want to become “e-business” leaders in their industry. Cisco use several distribution channels to deliver its products and services such as personal selling, third-party distributors, resellers, service providers, and system integrators. Since Cisco plays in the networking products, they try to provide customers with a great possible flexibility of product or service Continue reading
Data Mining – Meaning, Processes and Models
Data mining involves the use of sophisticated data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. These tools can include statistical models, mathematical algorithms, and machine learning methods such as neural networks or decision trees. Consequently, data mining consists of more than collecting and managing data, it also includes analysis and prediction. The objective of data mining is to identify valid, novel, potentially useful, and understandable correlations and patterns in existing data. Finding useful patterns in data is known by different names (e.g., knowledge extraction, information discovery, information harvesting, data archaeology, and data pattern processing). The term “data mining” is primarily used by statisticians, database researchers, and the business communities. The term KDD (Knowledge Discovery in Databases) refers to the overall process of discovering useful knowledge from data, where data mining is a particular step in this process. The steps in the KDD process, Continue reading