Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Management Information System Expert

Attempt all the problems.

Section-A

problem1) describe how advancement in security features affects functioning of the organizations. What is the connection of ERP and data security? Discuss with suitable exs.

problem2) How has ERP facilitated supply chain functions? What advantages have been gained by organizations by integrating their supply chain management functionality with their ERP implementations?

problem3) How do ERP systems integrate with Business Intelligence (BI) systems? How does this integration help in better management and retrieval of BI information? Describe with suitable exs.

problem4) An organization has to prepare itself for ERP implementation much before actual ERP decision is taken. Accordingly, four phases are generally followed in ERP implementation. describe these phases in detail, describing the impact and use of activities which take place during each of these phases

Section-B

Case Study :  INFOR XPPS AT BEHR INDIA

The Company

Based in Pune, India, Behr India Limited designs and manufactures advanced heating, ventilating and air-conditioning (HVAC) units for the automotive industry. A joint venture established in 1997 between Behr Group of Germany and Anand Automotive systems in India, Behr India employs more than 400 people.

The Problem/Situation

As company sales grew at more than 20 percent a year, Behr India had got a variety of applications and hardware systems supporting both its engineering design and general business administration functions. As demands on the IT infrastructure increased, the existing environment was unable to provide scalability and cost-effective growth path which the company required. It was essential to provide infrastructure capable not only of growing with business, but also reducing its total costs of ownership and providing excellent service to customers.

Behr India uses CATIA, Star-CD and Team Centre Enterprise software for its product design, product analysis and product data management, all of which are highly compute-intensive operations. The company also runs the ERP solution tailored for the automotive industry, XPPS, which manages very large volumes of business-critical operational data.

Running on diverse range of physical systems, it was becoming progressively harder to control costs and to provide efficient IT service to support the business. Data was stored in multiple locations with no central system for management, backup, archive or restore, presenting a considerable business risk.

Behr India was determined to implement the new computing environment which will provide highly available and reliable servers to optimize its CATIA design and XPPS production environments. The goal was to provide a stable, scalable, reliable and cost-effective operating environment which will help the company increase sales and support future business growth.

The Solution & Implementation

With help from IBM business partner CMS Computers, Behr India selected an integrated IBM solution offering high-performance with low operational costs. The company implemented IBM System x (xSeries models 206 and 226) and System i5 platforms, with IBM DB2 database and IBM Tivoli Storage Manager, to support wide range of design, production and administration systems. Behr India also installed 22 IBM IntelliStation POWER 265 arid 275 workstations running the IBM AIX 5L operating system to support its CATIA V4 & V5 application. The XPPS ERP solution was installed on new IBM System i5 solutions running the IBM i5/0S operating system with IBM DB2 database.

Behr India also deployed IBM Tivoli Storage Manager Application Servers V5.3 software to manage backup for its. CATIA, CAD and CAM files and for its file servers. The Tivoli software automates many low level tasks, freeing up skilled technicians to focus on higher value work.

Kedar Potnis says, "for a mid -size company, integration and range of IBM technologies are very attractive, helping us to build the efficient, effective and scalable infrastructure. IBM was able to present all of these technologies as a unified solution, enabling us to meet our objectives without having to deal with large number of different vendors."

The Benefits

With its new IBM servers, workstations and software, Behr India has improved availability, reliability and scalability of its infrastructure. Centralized information management is providing better protection against data loss and an extra IBM System is server would be added as the full disaster recovery solution for the ERP environment.

With business advantage depending on successfully leveraging compute-intensive design applications, the high-performance of IBM server platforms and workstations is very important to Behr India's success.

IBM and CMS Computing have provided complete infrastructure for Behr India which offers easy management and ability to expand non-disruptively as business grows. In summary, benefits included enhanced stability and reliability, improved performance for CAD and PDM systems, reduced administrative costs for backup and greater protection for business-critical data, and low total cost of ownership.

problem5) Case problems:

a) Analyze case presented in the above case study?

b) Suggest appropriate measures to company in order to achieve its objectives.

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M93718

Have any Question? 


Related Questions in Management Information System

Objectiveapply the standards for fair responsible and

Objective: Apply the standards for fair, responsible and acceptable use of information technology (e.g., computer systems, network, etc.) to your environment Perform a security audit of your own computer. Part I: Accepta ...

Assignmentpart 1 short answer answer all questions in

Assignment Part 1: SHORT ANSWER Answer ALL QUESTIONS in this section. Each response must be at least two sentences long. Type your responses immediately below the questions. All responses must be supported by reference t ...

Assignmentoverview - every organization must create a cyber

Assignment Overview - Every organization must create a cyber security profile (System Security Plan (SSP)) for all of its major and minor information systems. The cyber security profile documents the current and planned ...

Quality please respond to the followingrank the following

"Quality" Please respond to the following: Rank the following parties as it relates to their responsibility over the quality of project deliverables. Justify your ranking. Project manager The development team The project ...

Jails prisons and the incarceratedbullsuggest two ways that

Jails, Prisons, and the Incarcerated • Suggest two ways that can reduce overcrowding in correctional facilities. Explain your choices in detail. • Should private companies be allowed to run correctional institutions? Exp ...

Discussionpart a- apa format- 500 words- 3 referencesat

Discussion Part A- APA Format- 500 Words- 3 References At first, stakeholder identification seems pretty straightforward - name the people who will affect the project or be affected. In fact, all too frequently some very ...

Individual information systems security implementation

Individual: Information Systems Security Implementation Recommendation Resources: COBIT readings from the Electronic Reserve Readings. Effective information security recommendations must be incorporated into a formal inf ...

Each student will turn in a project based on some

Each student will turn in a project based on some principles learned in this class. The write up will be one page that answers three questions: 1) What was the company's problem, 2) how did you solve the problem and 3) w ...

Prepare a 350 to 1050 word paper that answers fully

Prepare a 350 to 1,050 word paper that answers fully discusses the topic questions Why does keeping good records help in managing your network? What type of information is shown on a wiring diagram? How does this differ ...

Module- information security - deliverableidentifying and

Module- Information Security - Deliverable Identifying and Analyzing Security Threats Objective: Use concepts/tools/techniques discussed in this module to identify a security incident that has happened within the last tw ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen