Project Report, Analysis of Existing System of a chosen company complete the report only
Analysis of Existing SystemAnalyze the key problems of the existing system used by the company. Also discuss the Information Systems used within the companyPossible Solutions and Suggestions for the companyConclusionadd to reference
Saudi Electronic University
College of Administrative and Financial Sciences
|Student Name:dana ali al-rammah
Jumanah ayman fathi diab
|Course Title: Management Information System
|Course Code: MIS201|
|Academic Year/ Semester:||CRN:10431|
|Student Grade:||Grade Level:|
Table of Contents:
Executive summery 2
Company’s profile 4
technology involved 6
About IBM security 8
established in 1911 as the computing-tabulating-recording company (CTR) then it was renamed “international business machines”
Headquarters in Armonk, New York. A multinational American technology corporation currently operates in over than 170 countries.
IBM is a computer, technology information technology consulting corporation, works varies from mainframe computers to nontechnology.
Throughout the history of revolutionized technology IBM was leading the industrial towards more innovated, creative ways to recreate the concept of modern technology. It started in the late 1800s and kept progressing till now days, the company was responsible of bankrupting it competitors by always being the best. IBM had its 1st contract by 1890s and it consisted of providing tabulating equipment for the tabulation and analysis. IBM have completely change the industry when it brought to light their 1st comprehensive computers (the System/360) in 1964, and by so IBM became widely know for its innovated technology.
Company’s profile :
In fields ranging from mainframe computers to nanotechnology, IBM manufactures and sells computer hardware , middleware, and applications, and offers hosting and consulting services. It is also a significant research institution, holding the record for most U.S. patents created by a corporation for 27 consecutive years as of 2020.
It is shocking to hear from some people, but IBM still makes computers. They are not making computers running Windows, but they are still making high-end computers running AIX, their Unix version. They render minicomputers and mainframes as well. Such business lines still have high profit margins which typically include contracts for lucrative operation and maintenance.
IBM has a substantial arm for sales and operation. They market their own apps, as well as resell apps from other businesses. And in the 1990s, IBM considered the installation and maintenance of computers, both theirs and the computers of other firms, to be very profitable. If you like, you can also outsource part or all your IT department to IBM.
IBM also competes for a cloud hosting architecture against Amazon and Microsoft. The offer is not as common as AWS or Azure, but it lives on. It makes sense to accept its cloud product if you buy other things from IBM, too.
In the 1990s, IBM’s Deep Blue technology famously defeated Gary Kasparov in chess. That eventually became a technology that was launched in 2010, called Watson. Machine learning is not the same thing as artificial intelligence, but the idea is to take as much knowledge as possible and apply it to the problem you just gave it to a computer that never forgets.
Even though machine learning is still a specialized area, it is full of potential. The problem is what IBM will sell it for. For now, for being the product with the two biggest buzzwords attached to it, Watson receives the award that everyone has heard of but very few have actually seen.
IBM have an organizational structure count of 399,409 (2009) with the implementation of the divisional structure in this way the work is divided into a variety of department with deferent activates. The organization structure of IBM consists of a board of directors with the responsibility of managing overall corporations and board committees that is responsible and overseas many activities, in the contrary executive officers is in charge of hands-on day to day tasks.
As an old and well know cooperation IBM have a reputation of being the top in it field. It begun its business back in 1911 which means went through all of the technology changes in every decade and time. The company’s competitive advantage strategy consist of simple yet rather progressive approach, the company wouldn’t be able to last if it was a traditional kind, IBM had a vision of the future, what makes IBM a leader in the information technology and the computing sector is first; IBM is creating it own market by transforming industries and professions with data. Secondly IBM is remaking enterprise IT for the era of cloud. Lastly; IBM is enabling systems of engagement for enterprises.
1) Several form of strategies for that of competitive advantages is that it gets combined with that of the activity scope of a considerable or specific form for fetching/achieving those who in turn would allow for generic strategy.
Such a strategy in turn would be responsible for achieving the performance better than the average performance in the industry. Some of these strategies are cost leadership, the second being the focus with regards to cost and differentiation focus, and the differentiation.
2) Below are some of the strategies:
A country’s physical infrastructure requires all the physical structures and components required for its operations to be sustained. There are roads that are used by people to move goods between towns, or from rural to urban areas. There are streets and roads that are used every day by drivers to drive to work and school. Bridges exist that help people cross rivers. Infrastructure is often considered to be items such as electrical and water utilities, as they allow the municipality to provide key services that residents need.
IT infrastructure is like infrastructure construction in that it consists of physical elements that enable user-required operations and facilities to enable business functions. There are databases that support key functions, servers that host applications and server-housing data canters. Network infrastructure is also available that enables the company’s access to applications and servers. The term IT infrastructure refers to all the components and elements that, along with other resources, support data and information management and access functions.
Role of IT Infrastructure Management
Management of IT infrastructure deals with the supervision of key elements of IT infrastructure that are required to provide business services. These can include networking components and software applications , but the physical components like networking hardware and computers and the facility itself are usually the primary focus of IT infrastructure management.
Three Categories of IT Infrastructure Management
Our understanding of the management of IT infrastructure depends on knowledge of the basic components of the IT infrastructure and the most critical tasks associated with each component ‘s management. Management of IT infrastructure is often divided into three management sub-categories: systems management, management of storage and network management.
In the overall sense of IT infrastructure management, systems management encompasses a broad variety of main tasks, since it requires the administration of all IT assets usually located within a data center. Usually, a Chief Information Officer ( CIO) or Chief Technical Officer (CTO) is responsible for overseeing the data center’s daily activities and handling the introduction of new software and third-party software into the hybrid cloud environment of the enterprise.
Safety-focused programs such as intrusion detection and prevention, or security information and event management are included in systems management activities. Systems management involves log management, workload automation, configuration management and the integration of cloud-based software and services.
The discipline of managing protection networks is network management. Networks are managed and configured by IT security and operations analysts to ensure that resources are correctly distributed to applications and services where they are required, and that service quality and availability are maintained. Network management also requires a security aspect, as IT operators need to maintain network visibility and accountability to monitor the security posture of the enterprise and defend against illegal access and data losses.
For IT and business organizations, data storage capacity is a restricted commodity. The regulation of data storage technology is also a vital part of IT infrastructure management. , Times and increase the data center ‘s efficiency. Techniques of automation and virtualization will allow companies to re-allocate storage resources quickly where necessary. Other methods of management, such as data replication, mirroring, and encryption, help protect against data loss or theft.
IT Infrastructure Management Components
In addition to the three key IT infrastructure management groups, recognizing the IT infrastructure as a composition of seven major components can also be useful. The design, implementation , maintenance, and retirement of each of these IT infrastructure components are the responsibility of IT infrastructure managers:
Computer Hardware Platforms – Along with server machines and mainframes, computer hardware includes client machines such as laptops and desktop computers.
Operating System Platforms – The second aspect of the IT infrastructure is the operating systems that operate on computer hardware platforms. UNIX, Windows, Mac OS X and Linux are popular operating systems.
Software Applications – IT infrastructure management is primarily based on the management of the IT infrastructure’s physical components but may exercise some control of the most important software applications for enterprises. This usually involves applications, such as SAP , Oracle, Microsoft, and others, that are essential for controlling service delivery at the enterprise level.
Data Management and Storage – One of the main functions of IT technology management is the management and supervision of data storage components. IT organisations, along with the software components used to coordinate databases (MySQL, IBM DB2, Oracle, and others), can be responsible for handling the physical components of data storage, such as data servers.
Networking and Telecommunications Platforms – The internal network of the IT company comes under the purview of IT infrastructure management. This includes everything from virtual network applications (Microsoft Windows Server, Cisco, etc.) to physical infrastructure for telecommunications (telephones, routers, cables, etc.)
Internet — The Internet-related infrastructure is closely connected to the IT infrastructure’s networking and telecommunication elements. The IT infrastructure includes websites that are hosted on internal or external servers, cloud-based web applications, development tools for web apps and web hosting services.
Consulting and System Integration Services – In companies that use legacy systems, IT organizations may be interested in the introduction of new IT infrastructure to upgrade legacy systems with new applications that are more efficient and stable for the current technological world.
About IBM security:
IBM security intelligence tools help you protect against current and potential cyber threats. You will benefit from an integrated framework that enables you to detect vulnerabilities, coordinate intelligent response to attacks, conduct forensic analyses and automate enforcement.
1- IBM BigFix offers all your endpoints visibility so that you can quicker repair bugs, apply patches and stable devices than you ever thought possible. BigFix enables you minimize endpoint management cycles and reduce costs by linking the IT operations and security team:
*Cyberattacks are becoming more advanced and targets are organizations of all kinds and sizes. IBM tools for endpoint management will assist you in assessing vulnerabilities and prioritizing the risks. To detect threats, IBM enables you to track every endpoint and exploit advanced malware protection.
*Artificial Intelligence (AI) can allow you to secure and monitor smartphones , tablets, laptops, and more. Experience quick, modular deployments and integration with current applications. Nonstop technological assistance and smooth incorporation of the infrastructure optimize your investments.
*Prioritizing patching and remediation can be difficult for security and operations teams. The endpoint management and security framework of IBM BigFix ® helps these two teams to work effectively together. Reducing running costs, inspiring staff, and enforcing compliance.
2-The IBM QRadar analytics tool help you speed up your response to threats. The built-in principles of correlation and dashboards of the app provide comprehensive insights into your security environment. These features allow you, even with limited resources, to act quickly to investigate vulnerabilities.
*Tie data points to a single incident. To consolidate data from thousands of devices, endpoints, and applications, QRadar Security Information and Event Management ( SIEM) works across the business. It lets you stay ahead of cyber threats by implementing these capabilities as fully hosted and controlled Software as a Service (SaaS). Take advantage of the predictability and versatility of the budget that accommodates your changing needs.
*To rapidly assess the source and nature of security threats, QRadar Advisor with WatsonTM leverages artificial intelligence ( AI). It automatically investigates every indication of weakness and gives you useful insights so that your response cycle can be handled effectively. This will allow you to get a head start on your answer. See immediately which threats are high priorities, which networks are affected, from which threats come and more. And reduce your chance of a crucial incident being missed.
3-Security teams are directed through the response phase by the IBM Resilient Incident Response Platform ® while automating routine activities and delivering internal threat information. To alter responses, Resilient also offers agile playbooks based on real-time event data.
*In complex technology environments, managing security can drain time and resources rapidly. Incident response is centralized by the IBM ® Resilient Incident Response Platform ®. See and comprehend intelligence knowledge, automate tasks, and obtain details of an attack in real time.
*Requirements for privacy violations are difficult and constantly changing. Resilient, with a knowledge base of the new legislation, offers always-updated response plans.
*Automatic reaction to incidents helps the team to get in front of cyberattacks. Resilient offers smart orchestration that can help you handle even the most complicated threats. Experiences are optimized by integration of existing technologies.
1-The IBM analytics software can help you control, track, and explore information in your company. You will also be able to identify trends using predictive modelling and forecast future results:
*The IBM Integrated Analytics Software integrates data warehousing and multicloud mobility with the latest data science techniques to shorten development cycles as a single data management platform.
The software allows you to:
*data visualization software, such as IBM SPSS ® Modeler, will help you to avoid this pitfall. Test concepts, build and deploy prototypes, infuse machine learning apps, and find trends. SPSS provide New opportunities to improve productivity would be found by consumers at all skill levels.
Users can gather strong, predictive insights through SPSS to help steer your organisation’s future. Can make decisions guided by data, reduce the risk of your business, and increase sales and profitability.
*IBM Cognos analytics software: Cognos offers a way through AI to understand the big picture of your business, as well as the specifics. Generate expert reports, carry out deep-dive research and forecast market performance accurately.
Cognos helps you to track your data once you understand it, continue to explore it and share your findings along the way. To discover hidden insights, consumers have access to dashboards, data visualizations and analytics management.
2- waston customer engagement software : it is helping your company gauge consumer behaviour and create more meaningful content, by provides to you a deep customer insight.
At any giving moment any individual working in the organization will have to communicate with others, if it was inside the company’s borders it will be face to face communication, however when email, instant text, video conference of video call, phone communication, file exchange system, is used to transformation and share it consider telecommunication system for it used the technology.
As years proceeds into more technological and progressive companies are required to adapt and evolve, most companies including IBM are currently using clouds for their data and information collection, however one cloud is not sufficient enough to include all data from all years and time, thus the companies are using multiclouds. However its tricky to shift from current cloud to multicloud for its designed differ and may cause date loss in process and most importantly it may be pricy. Data constant growth is the main reason why its needed, as the time proceeds and the companies grows over the years it becomes more and more important.
IBM have giving solution to other companies to help them improve their telecommunication with keeping them connected with providing a hardwiring communication system, one huge telecommunication company the located in UK has more than sixte offices with thirteen satellites that orbit our global. Thus the company is required to have a suitable data collection, that’s why IBM have created the “ digital insights”. No data shall be lost or neglected and its less expansive than having data warehouse. It offers more than just cost reduction it gives solution for data overcoaching view, and data life cycle automation and orchestration, with making the human error less while reorganizing the database.
hardware is where you can locate the physical component of any computer, those components include computer case, CPU, data storage, motherboard and other parts.
IBM have many excellent examples of hardware units used by companies from start ups to big firms and corporations.
The latest IBM z brought secure, privet, and resiliency to the hybrid could infrastructure with single or multi frame.
IBM LinuxONE III
The development of coulds native and cyber resilience is brought by the encryption wherever. It is the cloud needed and found at any time and place, with high privacy and excellent security you can transfer data.
IBM Power system S914
With high security and reliability IBM® Power System S914 was designed to make it easier and faster to integrate information and data to the company’s cloud.
International Business Machines Corporation (IBM). (1976, January 01). Retrieved October 12, 2020, from https://www.computerhistory.org/brochures/g-i/international-business-machines-corporation-ibm/
Company profile for IBM. (2010, November 10). Retrieved September 29, 2020, from com/sustainable-business/profile-ibm“>https://www.theguardian.com/sustainable-business/profile-ibm
What Is the IBM Organizational Structure? (n.d.). Retrieved September 28, 2020, from https://www.reference.com/business-finance/ibm-organizational-structure-f2615c299ea00348
Farquhar, D. (2020, June 14). What does IBM do now? Retrieved September 28, 2020, from net/what-does-ibm-do-now/”>https://dfarq.homeip.net/what-does-ibm-do-now/
IBM. (2020, September 25). Retrieved September 28, 2020, from https://en.wikipedia.org/wiki/IBM
Saudi Arabia. (n.d.). Retrieved September 29, 2020, from https://www.ibm.com/sa-en
*Enterprise Security: Threat Intelligence: IBM. (n.d.). Retrieved November 03, 2020, from https://www.insight.com/en_US/shop/partner/ibm/software/security.html
*IBM Software: Business Analytics Software. (n.d.). Retrieved November 03, 2020, from https://www.insight.com/en_US/shop/partner/ibm/software.html
*A blueprint for data in a multicloud world. (n.d.). Retrieved November 06, 2020, from https://www.ibm.com/thought-leadership/institute-business-value/report/multicloud-data-strategy
* Us-en_hardware_HP. (n.d.). Retrieved November 06, 2020, from https://www.ibm.com/products/hardware
Are you busy and do not have time to handle your assignment? Are you scared that your paper will not make the grade? Do you have responsibilities that may hinder you from turning in your assignment on time? Are you tired and can barely handle your assignment? Are your grades inconsistent?
Whichever your reason may is, it is valid! You can get professional academic help from our service at affordable rates. We have a team of professional academic writers who can handle all your assignments.
Our essay writers are graduates with diplomas, bachelor, masters, Ph.D., and doctorate degrees in various subjects. The minimum requirement to be an essay writer with our essay writing service is to have a college diploma. When assigning your order, we match the paper subject with the area of specialization of the writer.
PLACE THIS ORDER OR A SIMILAR ORDER WITH USA ELITE WRITERS TODAY AND GET AN AMAZING DISCOUNT