As demand for Y2K-compatible systems began to decrease in mid-1998, so did the enterprise resource planning (ERP) software boom. To remain competitive in this era of online business, ERP vendors have extended their packages to manage more than the core business processes, which include payroll and accounting, human resources (HR), manufacturing, and sales and distribution. While these primary applications remain important components of any ERP system, ERP now embraces e-commerce, advanced planning and scheduling (APS), Internet-based procurement, business intelligence (BI), and customer relationship management (CRM). This report also examines other services offered by ERP software providers, including portals, Web-based hubs for easy application access, online marketplaces and interactive, industry-specific trading communities.
The Internet is making our daily lives as digital as possible, and this new era is called the Internet of Everything (IoE). The key force behind the rapid growth of the Internet is the technological advancement of enterprises. The digital world we live in is facilitated by these enterprises’ advances and business intelligence. These enterprises need to deal with gazillions of bytes of data, and in today’s age of General Data Protection Regulation, enterprises are required to ensure privacy and security of large-scale data collections. However, the increased connectivity and devices used to facilitate IoE are continually creating more room for cybercriminals to find vulnerabilities in enterprise systems and flaws in their corporate governance. Ensuring cybersecurity and corporate governance for enterprises should not be an afterthought or present a huge challenge. In recent times, the complex diversity of cyber-attacks has been skyrocketing, and zero-day attacks, such as ransomware, botnet, and telecommunication attacks, are happening more frequently than before. New hacking strategies would easily bypass existing enterprise security and governance platforms using advanced, persistent threats. For example, in 2020, the Toll Group firm was exploited by a new crypto-attack family for violating its data privacy, where an advanced ransomware technique was launched to exploit the corporation and request a huge figure of monetary ransom. Even after applying rational governance hygiene, cybersecurity configuration and software updates are often overlooked when they are most needed to fight cyber-crime and ensure data privacy. Therefore, the threat landscape in the context of enterprises has become wider and far more challenging. There is a clear need for collaborative work throughout the entire value chain of this network. In this context, this book addresses the cybersecurity and cooperate governance challenges associated with enterprises, which will provide a bigger picture of the concepts, intelligent techniques, practices, and open research directions in this area. This book serves as a single source of reference for acquiring the knowledge on the technology, process, and people involved in next-generation privacy and security.
This book provides a detailed “how-to” guide, addressing aspects ranging from analysis and design to the implementation of applications, which need to be integrated within legacy applications and databases. The analysis and design of the next generation of software architectures must address the new requirements to accommodate the Internet of things (IoT), cybersecurity, blockchain networks, cloud, and quantum computer technologies. As 5G wireless increasingly establishes itself over the next few years, moving legacy applications into these new architectures will be critical for companies to compete in a consumer-driven and social media-based economy. Few organizations, however, understand the challenges and complexities of moving from a central database legacy architecture to a ledger and networked environment. The challenge is not limited to just designing new software applications. Indeed, the next generation needs to function more independently on various devices, and on more diverse and wireless-centric networks. Furthermore, databases must be broken down into linked list-based blockchain architectures, which will involve analytic decisions regarding which portions of data and metadata will be processed within the chain, and which ones will be dependent on cloud systems. Finally, the collection of all data throughout these vast networks will need to be aggregated and used for predictive analysis across a variety of competitive business applications in a secured environment. Certainly not an easy task for any analyst/designer! Many organizations will continue to use packaged products and open-source applications. These third-party products will need to be integrated into the new architecture paradigms and have seamless data aggregation capabilities, while maintaining the necessary cyber compliances. The book also clearly defines the roles and responsibilities of the stakeholders involved, including the IT departments, users, executive sponsors, and third-party vendors. The book’s structure also provides a step-by-step method to help ensure a higher rate of success in the context of re-engineering existing applications and databases, as well as selecting third-party products, conversion methods and cybercontrols. It was written for use by a broad audience, including IT developers, software engineers, application vendors, business line managers, and executives.
Proven strategies for companies seeking to accelerate an ERP implementation Almost all large and midsize corporations worldwide will be involved in implementing enterprise resource planning and/or e-business applications over the next two to three years. This is the only book that discusses how to implement a rapid ERP system and shows how e-business is impacted by the implementation of an ERP system. This book also provides valuable tried and true methods of keeping the project under or within budget. A quality ERP transaction foundation is a prerequisite for taking advantage of many of the new e-business opportunities that executives have placed high on their list of priorities. This valuable guide examines the strengths and weaknesses of ERP and shows when rapid implementation is not appropriate. The book also provides outsourcing alternatives and the use of application service alternatives, and shows how e-business is impacted by the implementation of an ERP system. Murrell G. Shields (McLean, VA) is the Director of Management Solutions and Services and National Leader of Technology and Infrastructure Services at Deloitte & Touche.
• Presents the most recent ABAP technologies and tools through the eyes of a developer• Includes new content on syntax enhancements, Web Dynpro, SAP BusinessObjects integration, XML processing, Rich Islands, and more• Companion CD includes an HTML version of the first edition, as well as code samplesNext Generation ABAP Development is a book designed to keep seasoned developers up-to-date with the latest techniques and technologies available in ABAP. In the second edition of this best-selling title, follow along with a lead ABAP developer as he learns how to assess and employ the new tools and features of ABAP within SAP NetWeaver 7.0 to 7.0 enhancement package 2 (EhP2). You'll be able to witness the entire process of building applications: design, development, and testing of all areas. In addition, you'll also become familiar with end-to-end object-oriented design techniques.New Tools and FeaturesKeep your ABAP knowledge up-to-date by mastering the new tools and features of ABAP within SAP NetWeaver 7.0 to 7.0 EhP2.Real-World ExamplesLearn about new possibilities in ABAP by exploring example scenarios related to the fictional development project discussed throughout the book.Brand New ContentExplore completely new content about ABAP syntax enhancements, Web Dynpro, XML processing,SAP BusinessObjects integration, and more.ABAP Troubleshooting and Web ServicesFind expanded and updated information about ABAP troubleshooting and Web Services.CD ContentBenefit from a CD that contains code samples and an HTML version of the first edition of this book.Highlights• Workbench tools and package hierarchy• ABAP syntax enhancements• Data Dictionary objects• Data persistence layer• Shared memory objects• ABAP and SAP NetWeaver Master Data• Management• XML processing and XSLT• SAP Interactive Forms by Adobe
The ERP Implementation cycle is characterized by complexity, uncertainty and a long timescale. It is about people and issues that affect the business it is a multi-disciplinary effort.This book will provide you with the practical information you will need in relation to the many issues and events within the implementation cycle. After reading this book you will be fully equipped and alerted to what is involved in an ERP implementation.ERP (Enterprise Resource Planning) can be described as an integrated enterprise-wide information system. As well as handling many of the transactions found within a business it has the potential for meeting many of the information requirements of busy personnel. If used in the right hands, it may provide the business with a competitive edge.Much can go wrong during the implementation since there are many issues to deal with. From the content of this book you will gain an understanding of what can go wrong you will be prepared in advance, and will be equipped to take preventative steps to smooth the progress of implementation.This book:Covers the multidisciplinary subject of ERP implementationLooks at a range of relevant topics including ERP market-place development, vendor selection, project management, process design and post GoLive improvementsReveals a range of issues which an implementer should be alert to right at the outset before the go-ahead is given to proceed with an implementationFeatures material on vendor selection, project management, training, business process re-engineering (BPR) and continuous improvement
Product Lifecycle Management (PLM) is the newest wave in productivity. This revolutionary approach is an outcome of lean thinking; however, PLM eliminates waste and efficiency across all aspects of a product's life--from design to deployment--not just in its manufacture. By using people, product information, processes, and technology to reduce wasted time, energy, and material across an organization and into the supply chain, PLM drives the next generation of lean thinking. Now PLM pioneer Michael Grieves offers everyone from Six Sigma and lean practitioners to supply chain managers, product developers, and consultants a proven framework for adopting this information-driven approach. Product Lifecycle Management shows you how to greatly enhance your firm's productivity by integrating the efforts of your entire organization. Most companies are seeing the returns of their efforts in lean methods diminishing, as the most fruitful applications have already been addressed. Here, Grieves reveals how PLM gives you an opportunity to make improvements both within and across functional areas in order to increase agility, optimize efficiency, and reduce costs across the board. He gives you the most comprehensive view of PLM available, fully outlining its characteristics, method, and tools and helping you assess your organizational readiness. There's also proven examples from the field, where PLM is being widely adopted by leading companies, including General Motors, General Electric, and Dell, that are widely adopting the approach. You'll see how PLM has saved these companies billions in unnecessary costs and shaved as much as 60% off cycle times. With this book you'll learn how to: Develop and implement your PLM strategy to support your corporate objectives Engage all your employees in using information to eliminate waste Enable improved information flow Better organize and utilize your intellectual capital Foster an environment that drives PLM Lean manufacturing can only take your organization so far. To bring your productivity to the next level and save remarkable amounts of time, money, and resources, Product Lifecycle Management is your one-stop, hands-on guide to implementing this powerful methodology.
This book contains substantially extended and revised versions of the best papers from the 12th International Conference on Enterprise Information Systems (ICEIS 2010), held in Funchal, Madeira, Portugal, June 8-12, 2010. Two invited papers are presented together with 39 contributions, which were carefully reviewed and selected from 62 full papers presented at the conference (out of 448 submissions). They reflect state-of-the-art research work that is often driven by real-world applications, thus successfully relating the academic with the industrial community. The topics covered are: databases and information systems integration, artificial intelligence and decision support systems, information systems analysis and specification, software agents and internet computing, and human-computer interaction.
This volume presents work from the IFIP TC 8 WG 8.9 International Conference on the Research and Practical Issues of Enterprise Information Systems (CONFENIS 2007). Enterprise information systems (EIS) have become increasingly popular. EIS integrate and support business processes across functional boundaries in a supply chain environment. In recent years, more and more enterprises world-wide have adopted EIS such as Enterprise Resource Planning (ERP) for running their businesses.