Operations management is “the management of systems or processes that create goods and/or provide services” (Stevenson, 2017, p. 4). It is the administration of business practices to create the highest level of efficiency possible within an organization. Quite simply, it is the process or set of processes used by an organization, to convert materials and labor into goods and services with the goal of maximizing profit. As one author stated in a 2015 Harvard Business Review article “operations is and has always been what gives an organization the power to act: to create value for its customers; to capture value for its shareholders; and to share value with its ecosystem” (Iansiti, 2015). As with any process, comes change – the ever-revolving door of adjusting to needs of society. The most significant changes to shape operations management is the evolution of technology and the speed in which it has advanced. IBM is perhaps the best known ‘computer company’ in the world, with its infamous ‘Big Blue’ moniker and logo. IBM is an integral part of the industrial revolution and partly responsible for the forces that caused the shifts in operations for the organization and global community.
Significant Forces
Within the age of inescapable advanced innovations, operations permit an expanding assortment of organizations, ever more coordinates, associated, and disseminated, ever more centered on software and information. Usually particularly critical for IBM as they are a worldwide computer innovation and IT counseling firm. IBM’s character has been shaped over about 100 years, a long time of doing commerce within the field of information-handling. Nearly all the company’s items were planned and created to record, handle, communicate, store and recover data. Drives in innovation is at the root of how operations administration has advanced, and IBM has been at the cutting edge of worldwide innovative development. The mantra of ‘be the change you need to see’ initiated the development and formed IBM into the organization it is present-day.
Looking more closely at how the trade in which IBM works made a difference in molding the way the organization itself works, the measured framework of generation utilizing “interchangeable parts” created at the turn of the final century was coordinates into IBM’s generation system. In creating the primary IBM individual computer in 1981, acting lab chief Don Estridge chose early on that to be fruitful and to meet deadlines, the bunch gathered to form this transformed item must adhere to the arrangement of utilizing tried merchant innovation, a standardized, -one-model item, open design, and an outside sales channel for fast customer showcase immersion. Fast-forward, IBM created a no-hands assembly line with a spearheading completely computerized computer plant (Saporito & Madden, 1986). This calculated move permitted IBM to be the primary to create tablet computers totally by robots. This unused ‘flexible automation’ mechanized the generation of printers, other pc’s, machines.
Key Obstacles
Amid the 1980s and early 1990s, IBM was tossed into chaos by back-to-back insurgencies. The PC transformation set computers straightforwardly within the hands of millions of individuals. Both insurgencies changed the way clients seen, applied and accepted innovation, generally shaking how IBM conducted business. This shift took a toll on organizational administration driving streamlining to become the central focus. And IBM considered separating its business units into partitioned free businesses. Louis V. Gerstner, Jr. became IBM’s chairman and CEO in 1993 and set up a ‘customer-oriented’ sensibility and strategic-tank. In spite of the increasing pressure to fragment IBM into autonomous companies, Gerstner took steps to stabilize the company by revamping the item line, lessening the workforce and noteworthy taken a toll decreases through gigantic cutbacks and offering resources (DiCarlo, 2002). He accepted that separating the company up would have annihilated the company’s ‘one of a kind’ advantage which was giving coordinated arrangements for its clients. Once more, clients were centered on coordinated commerce arrangements – a key IBM quality that combined the company’s ability in arrangements, administrations, items and innovations. Towards the end of 1995, Gerstner unveiled IBM’s newly minted vision that organized computing would drive the next stage of technology development and would be the company’s overarching technique. Before the start of the new millennium, IBM stood on the limit of the unused century having reestablished itself as a driving data innovation trailblazer.
Any organization within the trade of advertising inventive items and arrangements are destined to confront regulation, compliance and policy problems in their processes to discover opportunities in which their market-leadership drives opportunities for global expansion. Policy and regulation have such a huge effect on a business’ operations and development prospects, and it would be advantageous of IBM to remain proactive instead of reactive, so they can spot potential dangers or openings early within the advancement of UniPay in South Korea. Numerous of the foremost globally successful organizations have created key arrangements with policy makers and regulators with the purpose of making connections where government, controllers and industry can work together to attain superior results. Creating a methodology for engaging with individuals who are in control of regulations and creating policy, admittedly can be overwhelming without the know-how or the capability of a devoted in-house work. IBM has their preverbal ‘ears to the street’ when it comes to monitoring trends in the global market, while maintaining full awareness of any potential implications to their partnership with Samsung. At minimum, IBM must have a handle to methodically and proactively screen advancements in government, parliament, controllers and the ranges of the open division that are significant to the mobile payment division. Wherever there’s a component of disturbance, IBM must already know or easily recognize, who the controllers are, their respective powers, and how they tend to utilize them. This will permit IBM to construct a full picture of their policy stakeholders over legislative issues, controllers, industry and position them for less adverse reaction to changes that threaten their business or partnership with Samsung. Committing to the additional effort affords the company the unique position of identifying risks and proactive mitigation for critical business decision and those who influence policy. This cuts down on the time spent investing in issues and/or people that have little or no influence on the overall goals.
Changes
IBM is changing its product and service offerings by detouring from being a hardware powerhouse, to providing more software and consultancy services. IBM also responsible for acquiring, maintaining, and managing the foremost business-critical and private information for the world’s largest organizations, which requires it to have a robust and clean process to ensure the integrity of its hardware, code as it drives innovation and business arrangements. This was mostly due to the divestment of its PC and low-end server commerce within the 2000s, combined with the securing more than 30 companies, primarily in business software solutions and technology service, for more than three years. Moreover, “the way in which software is sold has changed, and over the past 10 years, IBM has moved from 47% recurring as-a-service revenue to 61% as-a-service revenue as of 2017” (Duberstein, 2018). Additionally, “22% of revenue, or $17 billion of IBM’s business, now occurs within the IBM cloud, up from just $4 billion a few years ago. The mix of strategic essentials has grown strongly, from just 27% of revenue in 2014 to 46% of revenue” (Duberstein). At this point in time, roughly 50% of the employees at IBM were hired within the last five years, leading then CFO James Kavanaugh to conclude that a reduction in redundant corporate layers was necessary. This action led to the overhaul of organizational processes and reorganization which increased the delivery speed of the company’s service offerings. Because it has for nearly 30 years, IBM has led the tech industry in patents granted last year, with over 50% of the patents in these developing areas. Hence, all these developments arrive at the same conclusion for its entire client base.
Business Operations
International Business Machines Corporation (IBM) has an operations management (OM) strategy that addresses optimization needs in hardware and software development, distribution and maintenance operations in the 10 strategic decision areas. Operations managers are concerned with the 10 decisions that strategically impact the success of the business. IBM implements policies and reforms through these 10 strategic decision areas to maximize the effectiveness of implementation while ensuring the continuity of operations (Ferguson, 2017).
Design of goods and services. This strategic decision area of operations management focuses on how to maintain consistently high quality within target cost limits for the company’s information technology products.
Quality management. This strategic decision area of operations management has the objective of satisfying customers’ demands and expectations regarding IBM’s information technology products.
Process and capacity design. IBM fulfills this objective through a continuous improvement model that integrates new operational standards and requirements in response to changes in the information technology market.
Location strategy. This strategic decision area of operations management aims for optimal locations in considering suppliers, customers, employees, and other components of the business, thereby impacting the place or distribution element in IBM’s marketing mix or 4Ps.
Layout design and strategy. High efficiency and productivity in the flow of information and resources are the objectives in this strategic decision area of operations management. IBM satisfies these objectives through a combination of automation and the use of standards and best practices in the information technology industry.
Job design and HR. The strategic decision in this area of operations management focuses on maintaining an effective workforce for the information technology business. IBM’s organizational structure influences operational approaches used for this area.
Supply chain management. Operations managers aim to keep high supply chain efficiencies and capacities in this strategic decision area. In this regard, IBM’s approach to operations management involves using information technologies to automate supply chain processes for high efficiency that supports the business strength of high economies of scale. On the other hand, the company satisfies capacity goals through programs that support suppliers’ productivity growth.
Inventory management. In this area of operations management, the strategic decision deals with maintaining adequate inventory while considering internal and external factors. The company has redundancy allowances and buffer inventory to address such operational issues and to account for fluctuations in market demand.
Scheduling. Appropriate schedules for processes and resources are IBM’s objective in this strategic decision area of operations management. The company’s scheduling approach is based on the type of operations, operational productivity requirements, and location of operations, among other variables.
Maintenance. This strategic decision area of operations management has the objective of maintaining adequate resources and processes to support the information technology business. IBM maintains high productivity levels in its technology laboratories through regular checks and upgrades of relevant equipment.
Key Trends
Trade regulations and digital disruption are changing the ways companies invest domestically and abroad. Whether by imposing tariffs or quotas on imports and exports of certain goods, or providing subsidies for local businesses to produce and support local companies versus doing business with an international competitor, governments trade policy can affect how you do business by either making it easier or difficult to trade with international partners (Standford, n.d.).
Digital disruption is defined as “the set of ground-breaking changes that affect companies both as a result of the emergence of new digital technologies on the market and when they introduce them into various areas of their operations, such as production, organization or relations with their customers” (Dominguez, 2019). Digital disruption deals with the effects of the processes of change that we are experiencing as result of the entry of technologies in companies and the market. As digital technologies are part of everyday operations of every organizations, it is rare to find a company that does not rely on technology for critical business functionalities. As technology advances, so does the dependency on technology increases. An increasing number of people today are spending more of their free time spending money online or taking part in a social media outlet. This trend shifts the emphasis of a business towards digital sources of revenue through various digital channels.
Impact
The impact of trade regulations on IBM to develop UniPay in South Korea involves the supply chain of both IBM and Samsung. The local governments and political climate of both countries affect how the respective companies can enter into a partnership, especially given the proximity of South Korea’s neighbor to the north – North Korea. Both companies rely on a network of 1,000’s of partners who supply integral parts to their flagship products and services. Some local regulations in the Southern Asian region places a quota on the number of imported products used to develop technologies. Military tension with North Korea negatively impacts foreign companies considering doing business in the region. IBM would have to take into consideration how much of the in-house expertise to use and resources necessary to use local intellectual capital and infrastructure.
IBM could survey common components of computerized commerce and compare them against their internal business practices. Advanced businesses center on the competitive focal points that innovation affords them, whether that’s lessening overhead or giving modern value to their clients. IBM could combine their current innovations with Samsung to cut costs, accumulate information and provide a progressed client involvement. The usage and administration of computerized administrations can require organizational rebuilding, particularly as unused parts are made. IBM should investigate unused trade models that put client encounter at the center of computerized methodology. Consumers are more likely to increase spending for an amazing client involvement, making it a key differentiator within the advanced economy. Trade models that adjust with this accentuation on client fulfillment will eventually focus on computerized administrations.
References
DiCarlo, L. (2002, November 11). How Lou Gerstner Got IBM To Dance. Retrieved from Forbes: https://www.forbes.com/2002/11/11/cx_ld_1112gerstner.html#7e1d107e4257
Dominguez, A. (2019, January 25). 5 key aspects of digital disruption. Retrieved from Pandora FMS: https://pandorafms.com/blog/digital-disruption-2/
Duberstein, B. (2018, March 19). How IBM’s Business Is Changing. Retrieved from The Motley Fool: https://www.fool.com/investing/2018/03/19/how-ibms-business-is-changing.aspx
Ferguson, E. (2017, June 16). IBM’s Operations Management Areas: 10 Decisions, Productivity. Retrieved from Panmore Institute: http://panmore.com/ibm-operations-management-areas-10-decisions-productivity
Iansiti, M. (2015, June 30). The History and Future of Operations. Retrieved from Harvard Business Review: https://hbr.org/2015/06/the-history-and-future-of-operations
Saporito, B., & Madden, S. (1986, September 15). IBM’S NO-HANDS ASSEMBLY LINE. Retrieved from Fortune: https://archive.fortune.com/magazines/fortune/fortune_archive/1986/09/15/68041/index.htm
Standford, C. (n.d.). How Markets and Trade Relations Affect Business. Retrieved from Fleximize: https://fleximize.com/articles/001264/how-markets-and-trade-relations-affect-business
Stevenson, W. J. (2017). Operations Management, Thirteenth Edition. McGraw-Hill Education.
IBM – International Business Machine Corporation was founded over 100 years ago in 1911. They are massive contributors in the I.T and anything related to computation. IBM revenue was $39.2 billion in 2018 which was generated by the fields they are in which include I.T services, hardware, rental, and financing, etc. They are one of the largest employers in the computing space at a massive 366600 employees in over 175 countries. Their mission has been to develop as well as invent information technologies in the field of computing.
IBM manufactures and sells computer hardware and software. Also, they provide consulting services that help with areas such as mainframe computers to nanotechnology. IBM computers were used in the Apollo mission during 1969 – 1971 which put the first humans on the moon. Additionally, the idea of the butterfly switch was thought by and employee, these switches are used in the majority of laptop keyboards as it provides tactile feedback while being small. Furthermore, they have invented and developed some of the most crucial in the 20th century that we still use to this day.
IBM has had a massive impact on society as they hold such a massive list of inventions. One such invention is the Relational database, today every company or entity has a database that’s used to store customer or some sort of data. This has made everything more efficient from buying an item online to keeping medical records, as before paper was used slowing down the process of retrieving information. Additionally, barcodes are used everywhere which gives a unique id to a product they are responsible for making the keeping track of stock a simple task, making the customer experience purchasing an item quicker. Furthermore, they made the first personal computer available in 1981. This has had unperceivable consequences from allowing information to be available freely to everyone to speeding up tasks that involve complicated mathematics.
IBM researchers are currently working on making food security and safety better as the population of the earth will surpass 8 billion which means feeding more people. Therefore, an increase in water usage and land. So, they are looking into making the supply chain more efficient and reduce waste as climate change is already stressing resources available to us. They are also researching in the field of quantum computers which is currently in its early days but the benefits of utilising a quantum computer to perform complex simulations with galaxies to increasing security. This is because all most if not all security uses encryption which is basically a math problem, but numbers are very long making them very difficult to crack as traditionally computers take a long time (thousands of years). However, with quantum, they can use an infinite range of values between 0 and 1 making it possible to crack encryption with minutes.
P1 – You are to establish project aims and objectives for the above scenario.
Abstract
The aim is your overall intention for the project. It is the reason why you are doing the research and signals where you hope to be by the end.
The aim is to research IBM are technology companies responsible for protecting the health, safety, and wellbeing of users of their products and services.
The International Business Machines Corporation (IBM) is an American multinational information technology company headquartered in Armonk, New York, with operations in over 170 countries. The company began in 1911, founded in Endicott, New York, as the Computing-Tabulating-Recording Company (CTR) and was renamed ‘International Business Machines in 1924. IBM is incorporated in New York.
IBM produces and sells computer hardware, middleware, and software, and provides hosting and consulting services in areas ranging from mainframe computers to nanotechnology.
The objectives are the specific steps you will take to get there. The objectives are the specific steps you will take to achieve your aim. These are usually formatted as a numbered list to make it easy to see the main steps of the project.
Objectives:
To protecting the health, safety and wellbeing of users of IBM company.
To build a health, safety, and well-being of product to user.
To improving the health, safety, and wellbeing of users of IBM services.
P2 – Produce a project management plan that covers aspects of cost, scope, time, quality, communication, risk, and resources.
Scope:
Project scope is the part of project planning that involves determining and documenting a list of specific project goals, deliverables, features, functions, tasks, deadlines, and ultimately costs. In other words, it is what needs to be achieved and the work that must be done to deliver a project.
Project scope is part of the project plan and involves identifying and documenting a list of specific project objectives, deliverables, tasks, costs, and deadlines. Project scope documentation (called the scope statement, terms of reference or job description) describes the scope of the project, identifies the responsibilities of each team member, and sets out procedures for how to verify and approve completed work.
It defines its boundaries and called as requirements. It can refer product scope or project scope:
Product scope as the functions and features that characterize a product or a service.
Project scope is the work that must be done in order to deliver a product according to the product’s scope.
Cost:
Project costs are the total funds required to complete a project or work, including direct and indirect costs. Project costs are any expenses listed or estimated to be incurred to complete the project or monetary obligations that have been incurred or estimated to be incurred, as listed in the project baseline.
Quality:
Project quality management is an area of knowledge related to project quality in project management. It involves project management of the final product of the project and the project itself. The goal of project quality management is to use specific processes and activities to identify, evaluate, control, and achieve product quality.
Manufacturers in many industries are under pressure due to poor production quality. As manufacturers struggle with costly scrap and rework, the costs associated with poor quality are rising. In addition, reputational impact is more disruptive than ever, and the cost of recalling failed products is increasing.
Unfortunately, traditional quality control and inspection techniques are expensive, time-consuming, error-prone, and sometimes even dangerous. However, this may change as Industry 4.0 establishes its own new specifications. McKinsey believes that with Industry 4.0, manufacturers can see a 10-20% increase in quality costs.
IBM is committed to achieving the highest quality standards. Quality is the foundation of our value proposition, brand image, and the cornerstone of IBM’s long-lasting relationship, which is vital to the success of our customers.
Customers’ perspectives on IBM and its products and services are a lens for assessing market quality. Our goal is to bring value to customers every time they interact with IBM, either directly or through our business partners in all the geographic markets we serve. IBM listens to customer feedback and uses these insights to improve the customer experience and quality. Customers choose IBM and recommend it to their business partners, and colleagues and friends’ decisions will be part of IBM’s measurement of success.
The head of IBM is responsible for understanding how customers interact with IBM, defining metrics and improvement goals, and actions that drive quality goals. Hopefully, all IBM employees can model nine IBM practices to define everything we do on behalf of the company.
Communication:
Communication is the key to project management. To successfully execute the project, effective communication with all stakeholders is essential. Many projects fail due to lack of communication or inefficiency. Communication is best defined as the exchange of information and the expression of ideas, thoughts, and feelings through words and other methods. In project management, this means the exchange of knowledge, skills, and experience.
IBM® Personal Communications is host communication and terminal emulation package for Microsoft® Windows ™. Now with a complete 64-bit architecture, it has virtual terminal (VT) emulation and system network architecture (SNA) application support and provides a platform to access data and applications on different host systems. It is a component of the IBM Host Access Client Package (HACP) and the IBM Host Integration Solution.
Full 64-bit architecture eases management tasks
The 64-bit enhancements make it easier to manage environment from the Host Access Client Package server to save configurations and rapidly download updates. And the Managed HOD environment replaces the browser on the local machine and removes the need to download the Java Runtime Environment (JRE).
Platform-independent solution
Includes Standalone Host On-Demand (HOD) client application, a Java® based standalone version of IBM Host on-Demand emulator—making it a platform-independent application solution for host access. It handles a wide variety of protocols, including ISDN, High-Performance Routing (HPR), SNA, TN3270(e), TN5250, and IP. Provides SNA interfaces for logical unit applications (LUA), advanced program-to-program communications (APPC), and common programming interface for communications (CPI-C) on Windows.
Time-saving utilities
Boosts troubleshooting efficiency with debug tools such as Trace utility. Provides multilingual support, including double-byte character set (DBCS) languages, euro sign support, and extensive keyboard and code-page support. The product includes the option to print from display or printer sessions and provides a print preview option of collected screens should you wish to proceed with printing or abort and collect different screens.
Enhanced security
Connects to security-enabled servers with support for load-balancing Service Location Protocol (SLP). Includes Bypass Sign-on Using Password Substitution, Kerberos Services Ticket Auto-Sign on, and Certificate Express Logon. Allows the Client-Server negotiation over GSKIT secure channel using certificates. Offers a secure FTP client.
P3: You are to produce a work breakdown structure, a Gantt chart to provide timeframes and stages for completion.
A work breakdown structure (WBS) is a delivery-oriented, hierarchical decomposition that is performed by a project team to accomplish project goals and create the work required for delivery. WBS is the basis for effective project planning, execution, control, monitoring, and reporting. All work included in the WBS will be identified, estimated, scheduled, and budgeted.
The work breakdown structure (WBS) was developed to build consensus on the scope of the project. It is a hierarchical description of the work that must be done to complete a project deliverable. Each descending layer in the work breakdown structure represents an increasingly detailed description of the project deliverables.
A Gantt chart is a bar chart used to illustrate the progress of a project, named after its inventor, Henry Gantt, who designed it from 1910 to 1915. The modern Gantt chart also shows the dependencies between the activity and the current progress status.
A Gantt chart is a horizontal bar chart that visually represents a project plan over a period of time. Modern Gantt charts usually show you the status of each task in the project and who is responsible.
Task
Week 1
Week 2
Week 3
Week 4
Week 5
Week 6
Week 7
P1 Devise project aims and objectives for a chosen scenario.
P2 Produce a project management plan that covers aspects of cost, scope, time, quality, communication, risk and resources.
P3 Produce a work breakdown structure and a Gantt Chart to provide timeframes and stages for completion.
P4 Carry out small-scale research by applying qualitative and quantitative research methods appropriate for meeting project aims and objectives.
P5 Analyze research and data using appropriate tools and techniques.
P6 Communicate appropriate recommendations as a result of research and data analysis to draw valid and meaningful conclusions.
P7 Reflect on the value of undertaking the research to meet stated objectives and own learning and performance.
Final submission of the project
P4 – Carry out small-scale research by applying qualitative and quantitative research methods appropriate for meeting project aims and objectives.
A survey is defined as a research methodology used to collect data from a predefined set of respondents to obtain information and insights on a variety of topics of interest. Surveys have multiple purposes and can be conducted in a variety of ways depending on the method chosen and the goals to be achieved.
Data is usually obtained through the use of standardized procedures, the purpose of which is to ensure that each respondent is able to answer questions in a level playing field to avoid prejudice that may affect research or research results. A survey involves asking people for information through a questionnaire that can be distributed in paper form, although with the advent of new technologies, the use of social media, email, QR codes or URLs to distribute information is more common.
As a field of applied statistics for human research surveys, survey methods have studied the techniques of collecting a single unit sample from the population and the collection of survey data, such as the construction of questionnaires and methods to improve the number and accuracy of survey responses.
Question:
What is your name
Do u know IBM
How do u know IBM
Have u used IBM before or currently using? (SQL, hard disk, IBM software)
Do u think IBM still famous in Malaysia?
How satisfied were u with IBM service experience?
How could IBM improve the services
Do u think IBM is easy to use?
Do u think IBM responsible in users’ health, safety and well-being?
Based to previous question, state your reason if you choose NO.
Will you support IBM if they offers services that responsible for users’ health, safety and wellbeing (eg: data security, time limitation or virus scanner)?
Do you agree that IBM offers better services than other companies?
Do you think IBM really provide a convenience service for the users?
Based on the previous question, provide your reason for choosing NO.
Will you recommend IBM services to your family or friends?
Please give the reason for choosing NO in previous question.
P5 – Analyze research and data using appropriate tools and techniques.
Question 1 ask the user name.
Question 2 ask the user about the IBM.
Question 3 ask the user how do know IBM.
Question 4 ask the user have used IBM before or currently using.
Question 5 ask about the IBM still famous in Malaysia.
Question 6 ask about the user satisfaction level to the IBM service experience.
Question 7 ask about how could IBM improve the services.
Question 8 ask about IBM is easy to use.
Question 9 ask about the IBM responsible in users’ health, safety and well-being.
Question 10 ask about the reason for question 9.
Question 11 ask about the user will support the IBM if they offers services that responsible for users’ health, safety and wellbeing.
Question 12 ask about the user agree that IBM offer better services than other companies.
Question 13 ask the IBM really provide a convenience service for the users.
Question 14 ask the reason for choosing NO on question 13.
Question 15 ask about the user will recommend IBM services to family or friends.
Question 16 ask the reason for question 15.
P6 – Communicate appropriate recommendations as a result of research and data analysis to draw valid and meaningful conclusions.
Based on scenario, I create a survey about the managing a successful computing project. I used the product is IBM company. The first question I require user insert their name. The second question was I ask user “Do u know IBM”. The result is 80% answer yes, 10% No, 10% answer maybe. The third question was “how do u know IBM”, the result is 70% that knew from social media, 20 % is advertisement, 10% is knew from family and relative. The question 4 is “have u used IBM before or currently using? (SQL, hard disk, IBM software), the result is 70% have using and 30% are not using. The question 5 is “do u think IBM still famous in Malaysia”, the result is 66.7% users think still famous in Malaysia, 11.1 % users are think not famous in Malaysia and 22.2 % not sure.
Question 6 “how satisfied were u with IBM service experience?” the result is 10% user give the 5 satisfied level, 50% give 4 satisfied level and 40% give 3 satisfied level. The question 7 I was required the user give the comment for the IBM services, the result is users hope they can offers more services, to have more innovative products, to improve at the security of the user’s data, more service centers, more option, give more details to the public, can improve the life of human and upgrade info. The question 8 I was ask “do u think IBM is easy to use?” the result is 55.6% answer yes, 11.1% answer no, 33.3% answer maybe. The question 9 I ask about “do u think IBM responsible in users’ health, safety and well-being”, the result is 70% answer maybe, 30% answer yes. The question 9 “will you support IBM if they offers services that responsible for users’ health, safety and wellbeing (eg: data security, time limitation or virus scanner), the result is 70% answer yes, 10% answer no and 20% answer maybe.
The question 11 “do you agree that IBM offers better services than other companies”, the result is only one user gives 5 star, 3 users give 4 star, and 6 users give 3 star. The question 13 “do you think IBM really provide a convenience service for the users”, the result is 50% users think maybe, the 50% think yes. The question 15 “will you recommend IBM services to your family or friends”, the result is 60% answer maybe, the 40% user answer 40%.
P7- Reflect on the value of undertaking the research to meet stated objectives and own learning and performance.
To conclude that, I research the aim and objective of the IBM company. It help us can know about the aim and objective of the IBM company. After that, I research the scope, cost, quality and communication of the IBM. I know that the scope of this company is create a product scope as the functions and features that characterize a product or a service.
The Gantt chart is recorded the routine during research the data of this project. The Gantt chart is simply record to let other people can read and understand. After that, I use the Google forms to do the survey about the IBM to my friends and family. I create some question to ask them to get the responses of the IBM. I refer the objectives to create the question to collect the data.
Next, I collected the results from my family and friends and analysis the results. From the result I know that IBM still have people use it and they also give some comments hope can to improve the services. From this survey, it can helps us to know it better the service of IBM.
I follow the tasks given to complete, I learn about how to complete and manage a project. We can through Internet, books, reference, social media and so on to collect the data. We also can collect the data from our friends and family or carry out survey. From this project I can learn more about the product and service of IBM.
Conclusion
From this project, I learned how to write a report that is target a company which is IBM to collect the aim, objective, create a survey to collect the data. After conducting the survey, we get to understand more about the IBM Company such as scope, cost, aim, objectives, and so on.
Through this project, I gained a lot of experience and prepared myself for possible challenges in the future.
Reference:
Smartsheet. 2020. Demystifying The 5 Phases Of Project Management. [online] Available at: [Accessed 11 March 2020].
The Digital Project Manager. 2020. Why Is Project Management Important? – The Digital Project Manager. [online] Available at: [Accessed 11 March 2020].
McConnell, E., Linman, D., McConnell, E. and McConnell, E., 2020. Project Cost Management – Definition, Process, And Software. [online] Mymanagementguide.com. Available at: [Accessed 11 March 2020].
Inloox.com. 2020. The Importance Of Time Management (Aspects Of Project Management Part 1) – Inloox. [online] Available at: [Accessed 11 March 2020].
En.wikipedia.org. 2020. Gantt Chart. [online] Available at: [Accessed 11 March 2020].
QuestionPro. 2020. What Is A Survey – Definition, Methods, Characteristics And Examples | Questionpro. [online] Available at: [Accessed 11 March 2020].
The rapid growth and demand to promptly provision, scale and delete resources from a self-service cloud portal or an Application Programming Interface (API), has drastically changed how IBM and our industry have brought agility to information technology resources. In this paper, we will discuss the development and evolution of the IBM Research Cloud Integration Solution and provide our analysis and history of cloud deployment and automation readiness.
I. Introduction
Cloud automation, with a high degree of agility, is critical for businesses to succeed with the new, advanced cloud based workloads that depend on rapid deployment of IT resources. Several years ago, researchers and developers at IBM began to create their private clouds to support their growing business needs for IT resources in minutes, versus project months. Researchers needed to deliver a differentiated experience quickly. This also meant connecting and using all relevant data, no matter where it lived. This changed the way we look at integration. This was achieved by developing a solution which combines and brings together technology, people and ideas to reap the most from their IT environment.
Today, IBM Cloud and automation are part of all new Research projects and solutions. New technologies, development, and operational models driven by the industry are continiously integrated into the IBM cloud at a rapid pace. IBM Research drives many of these emerging technologies and integration while also benefiting from the increased efficiencies including rapid scale, high availability, increased security posture and all at a fraction of the cost compared to several years ago. IBM Cloud encompasses a comprehensive set of components and capabilities including public, private,
and hybrid deployment offerings. IBM Bluemix, a component of the IBM Cloud, brings together platform and infrastructure services that offer a rich assortment of infrastructure, cognitive, software and services. A recent survey indicates that 93% of organizations are using some form of cloud service [1]. The perception of public cloud services continues to improve and is at a point now that those who trust these public cloud services outnumber those who distrust them, by a margin of 2 to 1 [1]. The IBM Research Information Technology (IT) enviroment utilizes both public and private service capabilities of the IBM Cloud offering.
II. History
IBM Research came to the realization, in 2007, that an investment in a general cloud solution for our Research projects was essential to our business. In 2008, the first version of the IBM Research Compute Cloud was introduced to the community. A decade later, we can see the impact cloud has had on the information technology industry including IBM Research. There are various types of cloud deployment. Private cloud is a deployment of cloud, where an organization or a third party owns and maintains the dedicated infrastructure and platforms specifically for use by the organization [2]. This type of model is usually behind a corporate firewall and can be either local, on premise, or dedicated, off premise at the cloud provider’s data centers. In contrast, a public cloud is a deployment model providing cloud resources to any individual consumer or business from a pool of shared resources. Shared resources build on economies of scale to drive cost down. Public cloud providers typically provide some level of security and resource isolation while sharing network, storage, compute, and application components. The sharing of these resources at the various levels drives the cost down compared to the dedicated resources that are required for private clouds. Hybrid cloud is a combination of the private and public cloud deployment models described above. There are various reasons why organizations, including IBM Research, utilize the hybrid model: efficiency, optimization, agility, cost, security, compliance and speed are several key factors.
The initial versions of the IBM Research Cloud offerings were all based on internal IBM private clouds. Although they provided greater efficiencies than historical approaches (i.e. traditional, dedicated, physical servers), IBM Research realized it needed to further optimize its information technology utilization, including their expense and capital investments. In 2013, IBM Research ran a study to understand how it could leverage public cloud and its expected impact. The Research study considered aspects such as; features, cost, and security in the analysis. In 2014, IBM Research introduced a new, hybrid cloud-based offering, which was created based on the analysis and conclusions of the study. This hybrid cloud offering has continued to evolve ever since and the environment is now referred to as the “IBM Research Cloud Integration Solution”. The IBM Research Cloud Integration Solution provides the ease of use and ability for individual IBM researchers to utilize IBM Cloud resources via an internal self-service portal for various configurations and solutions. The intuitive interface allows researchers to simply manage and use the cloud resources they need for their projects. The service also allows them to seamlessly access their cloud resources from the internal IBM network. A more recent advancement takes a major step forward by providing Platform as a Service (PaaS) integration (IBM Bluemix), in addition to the existing Infrastructure as a Service (IaaS) integration [2]. These integrations provides the IBM Research organization with increased features and agility, all while optimizing cost, security and compliance at various levels.
Fig. 1. 1 Illustrates the high-level components of resources available to researchers as part of the IBM Cloud Integration. It includes internal IBM Research resources, IBM Bluemix infrastructure and application resources, as well as, the Bluemix catalog of services. The environment has a number of IBM-defined security zones that indicate differing security requirements. The IBM internal network is illustrated by the light blue color. The external networks are illustrated by the yellow colors.
Researchers are guided to choose the environment or environments that best meets the need, which is often determined by the type of workload, data classification, export controls, and access models in partnership engagement scenarios. The automated process to provision resources through the self-service portal includes the installation of the security tools required to capture the data used for ongoing security monitoring and analysis. The IBM Research Cloud Integration Solution extends the geographically diverse, IBM Research internal network, by utlizing the distributed, worldwide presence and capabilities of the IBM Cloud and Bluemix infrastructures. This approach essentially makes the cloud resources local within the internal network, as it provides localized access to improve latency at the various worldwide Research locations. Furthermore, such geographically disbursed resources can also be used to address in country-specific regulatory requirements for specific projects. This network topology is the foundation that all the other capabilities are built on and a key differentiator for the IBM Cloud offering.
Fig. 2. 2 Illustrates a point in time snapshot of the resources currently allocated in the public IBM Cloud that are an integrated part of the IBM Research hybrid cloud which was introduced in late 2013. The figure is based on data captured in January 2016. These public cloud resources were provisioned by researchers via the custom self-service portal that was developed by IBM Research Integrated Solutions to facilitate ease of use and to deal with the various Operational Support Systems and Business Support Systems needs of the offering. There are about 1,400 active devices daily. The figure also illustrates that over 10,000 devices were provisioned and decommissioned over the span of about 2.5 years.
III. Cloud capabilities
The IBM Research Cloud Integration Solution contains full automation of IT security tooling and is built on APIs. Each component has a set of APIs that are used for the existing automation and are available for new solutions. This provides the ability to change the environment as needed. For example, if the network intelligence tools detect abnormal traffic flow from an Internet Protocol (IP) address in the Bluemix infrastructure side to the IBM internal network that may be having an impact on service quality or even detecting a denial of service, these tools can utilize the APIs to block that traffic or even shutdown the device generating the network traffic. The APIs can be used to isolate the security threat, minimizing the impact to the overall environment. IBM, like most organizations, has specific requirements on how and when to address security vulnerabilities (i.e. patching prioritization). When a device has a vulnerability that can be mitigated by a patch and the potential vulnerability has not been addressed by a due date, the security tools can shutdown the device, isolate it, or remediate the vulnerability by automatically patching the device.
The recent introduction of the IBM Bluemix Container service [3] built on Kubernetes [4] has provided new development and operational models. The use of portable, self-contained images for applications solutions, provides increased agility in deployment and operations. In addition to an extensive collection of APIs and logs, the platform provides a rich set of declarative metadata that can be used together to continuously drive efficiencies. These include autoscaling to address demand and cost, automatic vulnerability detection, and remediation without impacting availability. IBM has been a guiding force behind the Cloud Native Computing Foundation (CNCF), a community dedicated to innovation around a set of leading-edge technologies to enable the next generation of cloud-native development [5]. Kubernetes is CNCF’s flagship orchestration engine. Amazon Web Services (AWS) just recently announced that it has joined the community due in part to the potential disruption Kubernetes may have on the AWS proprietary container-based services [6,7]. IBM’s Container service is built on top of the IBM Bluemix Infrastructure network capabilities. It simplifies the adoption by automating cluster provisioning and the ability to grow and shrink the cluster. The cluster nodes are managed by IBM Cloud and the network is controlled by the IBM Research integration team. The IBM Research Cloud Integration Solution has implemented multi-tenant clusters for increased resource and cost optimization. This allows the research DevOps [8] teams to focus on the application and not on the underlying infrastructure. Additional tools are being developed that analyze resource utilization to identify idle resources that are candidates for decommissioning, which will further optimize (reduce) cost and avoid additional security risks.
IV. Securing the cloud
Security surrounding cloud environments still remains a major concern for today’s organizations [1]. With the ever-increasing number and severity of breaches, it is certainly no surprise that security and compliance are of paramount concern for companies migrating to cloud environments. The IBM Research Cloud Integration Solution provides many data points and APIs, at various points of the overall environment, that are used by the security management tools and processes to address risk, compliance, and resiliency. Each data source that is part of the infrastructure – including the Operational Support Systems [12], Business Support Systems [12], network filtering, categorization/classification of systems and data for provisioned devices, individual provisioned device patch status, and vulnerability information, and provisioned device logs – are used by the IT security-related intelligence tools to assess and respond to the overall environment. The assessments are done both in real-time and over time to
understand trends in the environment and identify anomalies. The tools can utilize the hybrid cloud APIs and change the environment based on the assessment as previously described in several scenarios. These changes to the environment can then be iteratively considered in new environment assessments to understand the impact the changes leading to refinements and optimization of actions. The IBM Bluemix Cloud offering provides a built-in security service called Vulnerability Advisor [9], which is able to discover vulnerabilities in Docker [10] images hosted in the IBM Bluemix Container service. The set of capabilities offered by the container service, Kubernetes, and the Vulnerability Advisor service allows DevOps teams, to build automated operational pipelines that can patch the vulnerabilities immediately when detected, without any impact to the availability of the deployed applications. This is a key differentiator for IBM and a key capability that IBM Research DevOps teams will take advantage of as they continue to move their innovative applications and projects from traditional hosting environments to this new, hybrid platform. The need for such an approach is particularly evident in a recent study where 24% of the latest Docker images were discovered to have vulnerabilities [11]. In summary, the IBM Research Cloud Integration Solution demonstrates how to best exploit the services of the IBM Cloud (including Bluemix), based on both business and technical requirements. These requirements include cost, opportunity, security, and regulatory compliance, as determined by the IBM business standards, as well as, IBM customer requirements. We have seen the ongoing demand for new services, platforms, and the growing requirements for agile innovation and delivery in our own environment, and we responded accordingly. We believe that similar businesses and organizations may benefit from the same approach, based on our technical and industry analysis. The rapid growth and adoption of cloud in the marketplace has sparked great innovation and delivery for the information technology industry. IBM Research continues to improve and expand the ease of access and use of virtually unlimited IT resources, with the necessary automation and services to provide the necessary optimization in areas such as; integration, scalability, vulnerability management, environment integrity, and resource management.
References
Building Trust in a Cloudy Sky, The state of cloud adoption and security, https://www.mcafee.com/us/solutions/lp/cloud-securityreport.html
Thoughts on Cloud, http://www.thoughtsoncloud.com/2014/02/cloudcomputing-basics/
IBM Bluemix Container Service, https://www.ibm.com/cloudcomputing/bluemix/containers
Amazon Web Services, https://aws.amazon.com/ [7] CNCF Welcomes Amazon, and so does IBM, https://www.ibm.com/blogs/cloud-computing/2017/08/cncf-welcomesamazon-ibm/
DevOps, https://en.wikipedia.org/wiki/DevOps
IBM Vulnerability Advisor, https://www.ibm.com/blogs/bluemix/2017/01/vulnerability-advisor-appsecurity/
International Business Machines Corporation (IBM) applies procedures to address a wide variety of issues in the information development industry condition, for instance, the external segments showed up in this Five Forces assessment of the business. Five powers examination are proposed to show the outside components that add to a company’s achievement. The forces delineated in the assessment are; danger of new contestants, dealing intensity of purchasers, risk of substitutes, aggressive competition, and dealing intensity of providers. An examination made for IBM will be useful for the organization to ensure their long-stretch accomplishment. IBM is known as a particularly powerful innovation and IT guiding organization.
Threat of New Entrants: The danger of new members against IBM is low. All together for other members to get forceful against IBM, they will be required to contribute a great deal of capital. The IBM brand name has been trusted since 1924. All together for another member to feasibly fight, it would need to develop a brand name that customers could trust by and large quickly. Another obstacle that new hopefuls would need to crush is that of pattern-setting development. IBM has been set up organization for around 100 years with various inventive and pattern-setting developments. The new hopeful would need to from the start beat the current pattern-setting advancements that IBM starting at now has.
Bargaining Power of Buyers: The wheeling and dealing force of buyers is moderate. Buyers of IBM things as often as possible require specific organizations. This makes it progressively hard for buyers to change to new creators who can’t continually fulfill their specific needs. At the moment that a buyer decided to purchase things expected for dispersed figuring or other the same IT organizations, there are different various associations who produce something very like pursue. In order to stay before contenders, IBM should keep up their improvements.
Threat of Substitutes: The danger of substitutes is high. There are various associations that can make practically identical programming by fundamentally obtaining their own one-of-a-kind IT agents to make things organized expressly for them. IBM uses a huge R&D bunch that is devoted to improving new things that customers need. This will help IBM hold customers from potential substitutes by outfitting customers with authorized advancements that they can use for their associations.
Competitive Rivalry: The engaged challenge is high for IBM. The market is flooded with tantamount advancement associations who give a comparable substance or work off comparable stages. IBM will be required to imaginative strategies to ensure their future achievement in the advertise. To be sure, even with the progression of new things or organizations, fighting associations duplicate the accomplishment of the things and organizations to offer essentially equivalent to things. This makes for solidified test with IBM and its opponents.
Bargaining Power of Suppliers: The managing force of suppliers is low. There is a high number of supplier substitutes that drive the cost down for IBM. IBM contributes upwards of $2 billion consistently in its suppliers, which in this manner creates progression and fresh contemplations that the suppliers can contribute. All things considered, IBM needs to keep up their creative procedure in order to stay before their rivals. The association will in like manner need to make and convey new advancement types of progress for their customers to limit them from changing to new members and contenders.
VRIO – The VRIO Analysis of IBM will look at all of its internal resources separately to assess whether these give bolstered high ground. The IBM VRIO Analysis furthermore makes reference to at each stage whether these benefits could be improved to give a more imperative high ground. All in all, the advantages dismembered are compressed in regards to whether they offer proceeded with advantage, has an unused high ground, brief advantage, forceful fairness or centered downside.
Significant: The IBM VRIO Analysis shows that the cash-related resources of IBM are particularly significant as these aids with placing into external open entryways that rise. These moreover help IBM in doing combating outside perils. As demonstrated by the VRIO Analysis of IBM, its close by sustenance things are a huge resource as these are significantly isolated. This makes the evident motivating force for these by customers high. These are furthermore regarded more than the test by customers in view of the partition in these things. The IBM VRIO Analysis shows that IBMs laborers are a noteworthy resource for the firm. A basic section of the workforce is significantly arranged, and this prompts continuously helpful yield for the affiliation. The delegates are moreover undaunted, and upkeep levels for the affiliation are high. The aggregate of this believers into progressively significant motivation for the end clients of IBMs things. As shown by the VRIO Analysis of IBM, its licenses are a significant resource as these empower the firm to sell its things without centered hindrance. This results in increasingly vital salary for IBM. These licenses in like manner give IBM allowing pay when it licenses these licenses out to various makers. The IBM VRIO Analysis shows that IBMs assignment mastermind is a significant resource. This causes it in associating with a constantly expanding number of customers. This ensures more noticeable livelihoods for IBM. It moreover ensures that headway practices convert into bargains as things are viably open. As shown by the VRIO Analysis of IBM, its cost structure is certainly not a significant resource. This is in light of the fact that the systems for creation lead to more critical costs than that of contention, which impacts the general advantages of the firm. Along these lines, its cost structure is an engaged obstacle that ought to be worn down.
Uncommon: The money-related assets of IBM are seen as uncommon as indicated by the VRIO Analysis of IBM. Solid money-related assets are just controlled by a couple of organizations in the business. The nearby nourishment items are seen as not uncommon as distinguished by IBM VRIO Analysis. These are effectively given in the market by different contenders. This implies contenders can utilize these assets in the same route as IBM and hinder upper hand. This implies the nearby nourishment items bring about aggressive equality for IBM. As this asset is important, IBM can even now utilize this asset.
The representatives of IBM are an uncommon asset as recognized by the VRIO Analysis of IBM. These representatives are profoundly prepared and gifted, which isn’t the situation with workers in different firms. The better pay and workplace guarantee that these representatives don’t leave for different firms. The licenses of IBM are an uncommon asset as recognized by the IBM VRIO Analysis. These licenses are not effectively accessible and are not controlled by contenders. This permits IBM to utilize them without obstruction from the challenge. The dispersion system of IBM is an uncommon asset as distinguished by the VRIO Analysis of IBM. This is on the grounds that contenders would require a great deal of venture and opportunity to arrive up with a preferred circulation organize over that of IBM. These are likewise controlled by not very many firms in the Industry.
Imitable: The cash-related resources of IBM are over the top to duplicate as recognized by the IBM VRIO Analysis. These advantages have been acquired by the association through postponed benefits consistently. New members and contenders would require similar advantages for a noteworthy stretch of time to assemble these proportions of money-related resources.
The local sustenance things are not all that over the top to duplicate as recognized by the VRIO Analysis of IBM. These can be secured by contenders too if they put an immense entirety in creative work. These in like manner don’t require years-long understanding. In this way, the close-by sustenance things by IBM outfit it with a fleeting high ground that contenders can too get as time goes on. The delegates of IBM are moreover not costly to reflect as perceived by the IBM VRIO Analysis. This is because various firms can in like manner set up their delegates to improve their capacities. These associations can moreover contract delegates from IBM by offering better compensation packs, working environment, benefits, advancement openings, etc. This makes the agents of IBM an advantage that gives a fleeting advantage. Competition can obtain these later on.
The licenses of IBM are difficult to imitate as perceived by the VRIO Analysis of IBM. This is on the grounds that it isn’t legitimately allowed to copy an authorized thing. Near resources for be made and getting a patent for them is moreover a costly system. The allotment arrangement of IBM is furthermore extreme to impersonate by competition as perceived by the IBM VRIO Analysis. This has been made during the time a little bit at a time by IBM. Contenders would need to contribute a gigantic entirety if they are to reflect an equivalent scattering system.
Association: The budgetary resources of IBM are sifted through to get an impetus as perceived by the VRIO Analysis of IBM. These advantages are used purposely to place assets into the right spots; using openings and combating threats. Therefore, these benefits exhibit to be a wellspring of proceeded with advantage for IBM. The Patents of IBM are not effective as perceived by the IBM VRIO Analysis. This infers the affiliation isn’t using these licenses to their greatest limit. An unused high ground exists that can be changed into a practical high ground if IBM
Universal Business Machines Corporation (IBM) applies techniques to address a wide assortment of issues in the data advancement industry condition, for example, the outer fragments appeared in this Five Forces evaluation of the business. Five forces assessment are proposed to show the outside segments that add to an organization’s accomplishment. The powers outlined in the evaluation are; threat of new competitors, managing force of buyers, danger of substitutes, forceful challenge, and managing power of suppliers. An assessment made for IBM will be valuable for the association to guarantee their extended length achievement. IBM is known as an especially incredible advancement and IT directing association.
Risk of New Entrants:
The threat of new individuals against IBM is low. All together for another part to get compelling against IBM, they will be required to contribute a lot of capital. The IBM brand name has been trusted since 1924. All together for another part to possibly battle, it would need to build up a brand name that clients could trust all things considered rapidly. Another impediment that new hopefuls would need to pound is that of example setting improvement. IBM has been set up association for around 100 years with different creative and design setting advancements. The new confident would need to from the beginning beat the present example setting progressions that IBM beginning at now has.
Haggling Power of Buyers:
The haggling power of purchasers is moderate. Purchasers of IBM things as frequently as conceivable require explicit associations. This makes it continuously difficult for purchasers to change to new makers who can’t persistently satisfy their particular needs. Right now that a purchaser chose to buy things expected for scattered figuring or other a similar IT associations, there are diverse different affiliations who produce something extremely like seek after. So as to remain before contenders, IBM should keep up their enhancements.
Risk of Substitutes:
The threat of substitutes is high. There are different affiliations that can make for all intents and purposes indistinguishable programming by in a general sense acquiring their very own unique IT specialists to make things composed explicitly for them. IBM utilizes a tremendous R&D bundle that is committed to improving new things that clients need. This will help IBM hold clients from potential substitutes by equipping clients with approved headway that they can use for their affiliations.
Aggressive Rivalry:
The connected with challenge is high for IBM. The market is overflowed with commensurate progression affiliations who give an equivalent substance, or work off similar stages. IBM will be required to innovative methodologies to guarantee their future accomplishment in the promote. Undoubtedly, even with the movement of new things or associations, battling affiliations copy the achievement of the things and associations to offer basically comparable to things. This makes for hardened test with IBM and its adversaries.
Dealing Power of Suppliers:
The overseeing power of providers is low. There is a high number of provider substitutes that drive the expense down for IBM. IBM contributes upwards of $2 billion reliably in its providers, which as such makes movement and new thoughts that the providers can contribute. Everything considered IBM needs to keep up their inventive technique so as to remain before their adversaries. The affiliation will in like way need to make and pass on new headway kinds of progress for their clients to restrain them from changing to new individuals and contenders.
VRIO – The VRIO Analysis of IBM will take a gander at all of its inner assets independently to evaluate whether these give supported high ground. The IBM VRIO Analysis besides makes reference to at each phase whether these advantages could be improved to give an increasingly basic high ground. All things considered, the focal points eviscerated are packed concerning whether they offer continued with advantage, has an unused high ground, brief bit of leeway, strong decency or focused drawback.
Critical:
The IBM VRIO Analysis shows that the money related assets of IBM are especially huge as these guides with putting into outer open doors that ascent. These also help IBM in doing fighting outside risks. As showed by the VRIO Analysis of IBM, its near to sustenance things are a gigantic asset as these are essentially secluded. This makes the clear rousing power for these by clients high. These are moreover respected more than the test by clients in perspective on the parcel in these things. The IBM VRIO Analysis shows that IBMs workers are an important asset for the firm. An essential area of the workforce is altogether orchestrated, and this prompts consistently accommodating yield for the association. The representatives are in addition resolute, and upkeep levels for the alliance are high. The total of this adherents into continuously huge inspiration for the end customers of IBMs things. As appeared by the VRIO Analysis of IBM, its licenses are a noteworthy asset as these engage the firm to sell its things without focused block. This outcomes in progressively crucial compensation for IBM. These licenses in like way give IBM permitting pay when it licenses these licenses out to different creators. The IBM VRIO Analysis shows that IBMs task plan is a critical asset. This causes it in partner with a continually extending number of clients. This guarantees progressively perceptible vocations for IBM. It in addition guarantees that progress rehearses convert into deals as things are feasibly open. As appeared by the VRIO Analysis of IBM, its cost structure is surely not a huge asset. This is considering the way that the frameworks for creation lead to more basic expenses than that of dispute, which impacts the general points of interest of the firm. Thusly, its cost structure is a drawn in impediment that should be worn out.
Remarkable:
The cash related resources of IBM are viewed as extraordinary as showed by the VRIO Analysis of IBM. Strong cash related resources are simply constrained by several associations in the business. The close by sustenance things are viewed as normal as recognized by IBM VRIO Analysis. These are adequately given in the market by various contenders. This infers contenders can use these benefits in a similar course as IBM and impede advantage. This infers the close by sustenance things realize forceful equity for IBM. As this benefit is significant, IBM can even now use this advantage.
The delegates of IBM are an extraordinary resource as perceived by the VRIO Analysis of IBM. These agents are significantly arranged and talented, which isn’t the circumstance with laborers in various firms. The better pay and work environment ensure that these delegates don’t leave for various firms. The licenses of IBM are an extraordinary resource as perceived by the IBM VRIO Analysis. These licenses are not viably available and are not constrained by contenders. This grants IBM to use them without check from the test. The scattering arrangement of IBM is an exceptional resource as recognized by the VRIO Analysis of IBM. This is in light of the fact that contenders would require a lot of adventure and chance to land up with a favored course sort out over that of IBM. These are moreover constrained by not a lot of firms in the Industry.
Imitable:
The money related assets of IBM are over the top to copy as perceived by the IBM VRIO Analysis. These favorable circumstances have been procured by the relationship through delayed advantages reliably. New individuals and contenders would require comparative points of interest for a critical stretch of time to collect these extents of cash related assets.
The nearby sustenance things are not too ridiculous to copy as perceived by the VRIO Analysis of IBM. These can be verified by contenders as well on the off chance that they put a gigantic sum in inventive work. These in like way don’t require years long understanding. Along these lines, the near to sustenance things by IBM outfit it with a passing high ground that contenders can too get over the long haul. The representatives of IBM are in addition not expensive to reflect as apparent by the IBM VRIO Analysis. This is on the grounds that different firms can in like way set up their agents to improve their abilities. These affiliations can in addition contract delegates from IBM by offering better remuneration packs, working condition, benefits, progression openings, and so forth. This makes the operators of IBM a bit of leeway that gives a temporary preferred position. Rivalry can get these later on.
The licenses of IBM are hard to mirror as apparent by the VRIO Analysis of IBM. This is in light of the fact that it isn’t authentically permitted to duplicate an approved thing. Close to assets for be made and getting a patent for them is additionally an exorbitant framework. The distribution plan of IBM is moreover extraordinary to mimic by rivalry as saw by the IBM VRIO Analysis. This has been made during the time a tad at once by IBM. Contenders would need to contribute a massive total on the off chance that they are to mirror a proportional dissipating framework.
Affiliation:
The budgetary assets of IBM are filtered through to get a driving force as apparent by the VRIO Analysis of IBM. These points of interest are utilized intentionally to put resources into the correct spots; utilizing openings and fighting dangers. Thusly, these advantages display to be a wellspring of continued with advantage for IBM. The Patents of IBM are not compelling as seen by the IBM VRIO Analysis. This construes the connection isn’t utilizing these licenses to their most noteworthy utmost.
The means by which companies sell their solutions to clients is constantly changing due to advancements in technology and means by which clients search for products and services. In this academic essay, I will detail my experience of visiting a sales centre in the technological powerhouse of IBM, and how they are embracing the digital age in connecting and selling to their customers.
1. Reasons you chose this Company
The world we live in today is becoming more connected than ever before. As a result, people are expecting to be able to purchase quicker and faster. This has paved the way for digital sales to take over. IBM operates under a B2B landscape, which has been transformed through digital innovation. (Rowley & et al, 2019).
Today, 67% of the buyer’s journey is now experienced digitally. (Tremblay, 2017).
Electronic data interchange (EDI), among other technologies, has propelled the B2B landscape beyond traditional boundaries. (Gervert & et al, n.d.).
As a result from this digital wave, field sales have slowed down dramatically. Field sales drive up costs and trade is limited to people within the same geological area. Digital sales allow for large amounts of volume and money to be moved quicker than field sales ever could. Studies have confirmed this. Martin reported 46% of participants agreed there is an ongoing shift from field sales to digital sales. (Martin, 2013).
Photo taken from inside IBM’s campus. It is the largest Digital Sales Centre Worldwide.
I have a genuine interest in technology and the latest trends in the business world. For this reason, I wanted to have a valuable experience in this environment. IBM is one of the world’s leading technological companies. They are leading the field in artificial intelligence, something that interests me also.
As my cousin works there, I was referred to a manager in which I had contacted to set up the shadow day. The definition of a referral is the ‘act of telling someone about the positive features of a person or a business, or the person who is being referred’. (Your Dictionary, 2018)
2. Background on the company
1. History
IBM – International Business Machines, is a multinational consulting company and technology. IBM is now one of the world’s leading technology organizations with its origins in the United States. (Success story, n.d.).
The company was set up in 1911, formally known as CTR (Computer Tabulating Recording Company). It got its initial name form the merging of three separate companies; Tabulating Machine company, Computing Scale company, and International Time Recording company. In 1924, Thomas J. Watson changed the name of CTR and formally founded IBM (Bellis, 2019)
From the start, IBM has defined itself not through the sale of products ranging from commercial scales to punch-card tabulators, but through its research and development. (Bellis, 2019)
2. [IBM Today
IBM is the 8th most valuable company in the world, with a net worth of $170.90 Billion. In 2018, they generated $79.14 billion in revenue alone. (IBM, 2018). The company has an outstanding global presence, operating in over 170 countries. (Bnamericas, 2019)
They currently have 350600 employees, nicknamed ‘IBMers’. (Statista, 2018). In Ireland, they employ more than 3,000 people across a wide range of businesses and locations. (Top 1000, 2019)
In 2018, they won multiple awards, including winner for artificial intelligence for business with over 20000 engagements across 20 industries. They also were number in terms of hybrid cloud. 47 from the Fortune 50 rely on IBM’s cloud services, which generated $19 billion for the company. (IBM, 2018).
3. Differentiator
Since 1924, IBM has prided itself on being the one of the most reliable and trustworthy technological companies in the world. There business has always revolved around their mission statement of leading ‘in the creation, development, and manufacture of the industry’s most advanced information technologies, including computer systems, software, networking systems, storage devices, and microelectronics. (Lombardo, 2018).
4. IBM – “Think of us a Volvo”
When I asked what made IBM different on my shadow day, I was asked to compare the company to Volvo. The company is not all bells and whistles. It is not the flashiest item you will ever by nor will it provide you the same excitement as a Ferrari. However, the Volvo is respected globally. The brand is trustworthy and has a deep history with its customers. They are experienced and have a rich history of being a market leader in their respected field. IBM is the Volvo of the technological world.
3. What is their Sales process
‘The Sales process is a series of ordered and value-added steps towards a predetermined goal which is a sale’. (Eriksson, 2013).
A good sales process focuses not on just generating and closing deals, but ensuring that the client experience is as good as it can be, increasing the chances of future sales. This is extremely important, with Cespedes stated that less than 10% of companies effectively execute their strategic process. (Cespedes 2014).
IBM pays attention to all stages of the sales process, from prospecting, closing a deal, and nurturing client relationships for future sales. There salesforce is divided into three roles:
Business Development Representatives (BDRs) – Prospecting
Digital Sellers and Brand Specialists – Closing Deals
On my shadow day, I was introduced to synergy of these three roles and how they complement each other, with the ultimate goal of increasing sales.
1. Business Development Representatives (BDRs) – Prospecting
The first step in IBM’s sales process begins with their BDRs. Their role in the process is to develop and qualify leads and pass them to the digital sellers and brand specialists in stage two. In sales, this is referred to as prospecting. Rippe and Campbell define prospecting as ‘the salesperson searches for and identifies potential buyers who have the need, willingness, ability, and authority to buy the salesperson’s offering’. (Rippe and Campbell, 2017).
BDRs focus mainly on inbound leads but also assist with outbound sales campaigns. They are connected to online chats and can answer any queries visitors to their website may have. BDRs also get notified when visitors view certain IBM solutions or white papers on the IBM site. The BDRs reach out and qualify that there is an interest from a lead on a certain solution. Once this is confirmed, they conduct a warm handover to a Brand Specialist who progresses the sale. These two approaches are examined in detail below.
The first method used by BDRs is by where a lead downloads a ’white paper’ from IBM’s website. This is an information sheet detailing a specific product or service provided by IBM. A lead is required to fill in personal details in order to download a ‘white paper’. This download sends an alert to IBM’s database, which in turn gets passed on to the most suitable BDR for that specific lead. This is referred to as an ‘alert’ by the BDRs. On my shadow day, it was explained to me that IBM receives thousands of these ‘alerts’ daily. This creates opportunities and qualified leads which are then passed onto the Brand Specialists/ Digital Sellers in stage two of the sales process.
The second method by which BDR develop leads is through IBM’s online chat forum. These forums allow the lead to gather information on a particular product or service from a BDR. As these conversations are short and informal, a relaxed atmosphere is created, allowing for an organic relationship to build. Similar to the ‘white paper’ download, the leads are provided information about their quiry and are encouraged to investigate further.
However, each one of these leads must be qualified into a prospect before they are passed onto the second stage of IBM’s sales process. This is where I was introduced to ‘BANT’.
‘BANT is a sales qualification framework used to identify and pursue the most qualified prospects based on their Budget, Authority, Need, and Time Frame.’ (Kooij, P4, 2017) (Leadliasion, 2019) The four key areas of BANT explained
This qualification technique was conceived by IBM and is used throughout the business world today. (Kooij, 2017). According to IBM, the lead is considered ‘validated’ if they meet three out of the four BANT requirements. (IBM, 2019).
Depending on the circumstances, the salesman or salesperson can decide how strict they follow this technique.
Once a BDR has qualified a lead into a prospect, the they will pass this prospect onto the Digital sellers/ Brand specialists in the second stage of the sales process.
2. Digital Sellers and Brand Specialists – Closing Deals
Once the qualified lead has been ‘BANT Qualified’, it is then the responsibility of the Brand Specialist to progress the deal. The Brand Specialist familiarizes himself with the client, client industry, history with IBM and what was discussed with the BDR. You can see an example of the preparation a Brand Specialist uses in appendix 1.
The Brand Specialist role is to provide the prospect with an estimate, draw up a specific contract, and, ultimately, close a deal. On my shadow day, I learned how important building credibility with clients is. This is achieved by researching the prospect’s background, industry and having a thorough understanding of IBM’s solutions. The approach taken by the Brand Specialist is influenced by the size and history of the prospect provided by the BDR.
For small to medium-sized companies, the seller will go straight to the decision-makers. These are roles like the chief finance officer (CFO) and chief marketing office (CMO). It is highly common that decision-makers have ‘gate keepers’ preventing unsolicited communication from sellers. A ‘gate keeper’ is ‘a person who controls access to something or someone. (Your Dictionary, n.d.). Sellers use certain tricks when calling clients to get past gatekeepers, such as implying urgency, using technical language to overwhelm and convince.
For larger clients, the approach is different. The salesperson begins by investigating the history that IBM holds with that prospect. They ask fellow colleagues for information about the prospect and how they have handled them in the past. Background checks on the company are also carried out. This provides the salesperson with valuable information in which they can use to develop a relationship with the prospect. From this, the salesperson can assess which areas of the prospects business need the work of IBM.
In some cases, the prospect can act as a mean of communication to the upper levels of that company. Therefore, it is vital that Brand Specialists develop a relationship with these prospects. On my shadow day, it was explained that Brand Specialists would add the prospect on LinkedIn and begin communicating about the information provided by the BDR. Over time, the relationship would build and trust is born. As a result of this, Brand Specialists can then move up the levels within the business, contact and building relationships over a period of time. During each of these relationships, IBM close deals, generating business ties and revenue.
However, no matter how large or small the prospect is, the method used by salespeople to close the deal is the prospect’s Compelling Reason to Act’ (CRA). This is where the salesperson ‘creates a value proposition that motivates their client to take action now. (Alvilhiera, 2017).
Clarifying this early on is extremely important for IBM. If the prospect has no reason to act now, they won’t. This is the reason B2B sales-people lose well-qualified leads. (Apollo, 2019).
Following the closure of the deal, the process is handed over to the final part of the sales process: client success managers (CSMs) and client executives (CEs) – nurturing client relationships.
The third stage of IBM’s selling process is the follow-up. The role of the follow-up is ‘ensure customer satisfaction and continuity of business relations’. (Eriksson, J., P4, 2013). Consumers who are dissatisfied with a service will tell many of their acquaintances. (Susskind, 2002).
Kotler and Armstrong describe the importance of this for a business, as it reduces buyer concern which may have (risen) from the sales. The salesperson’s interest with the buyer is further cemented during the follow-up also. (Kotler and Armstrong, 2013).
IBM divide their follow-up into two areas: Client Success Managers (CSMs) and Client Executives (CEs).
For small to medium-sized clients, IBM issue CSM’s to follow up. These are one-person teams which have multiple clients in which they are responsible for. Their role is to act as a point of contact for the client while continuously trying to improve the relationship.
As the relationship builds and progresses, CSM’s are also encouraged to offer their clients upgrades on products and services. This allows IBM to generate further revenue streams, while also building relationships with their customers.
The other follow used by IBM is for their larger clients. These are the key accounts for IBM, otherwise known as ‘Key Account Management’.
‘KAM is about identifying the most vital customers (key accounts) and work towards them with more attention and close collaboration compared to the other customers possessed by a company. It is implemented in order to create strong relationships with key customers in a long-term perspective’. (Andersson and Johansson, P9, 2015).
Here, CEs are issued to one individual client. Due to the importance of these key accounts, CEs can have a team between one hundred to one thousand for the ongoing follow-up. These executives are assigned to IBM’s largest clients, with examples including Vodafone and Lloyds Bank. (Ahmed, 2018). As these companies generate huge amounts of revenue, it is crucial IBM has an extensive team behind these follow-up. Similar to the CSMs, CEs try develop and strengthen the relationships with their clients.
4. Future plans for the company
The future of IBM is exciting. IBM president and CEO Ginni Rometty explained the next phases for the company will focus on their cloud services and artificial intelligence (AI). Romney outlined how that AI has driven the cloud and that we are ‘all standing at the beginning of (a new) chapter of this digital reinvention’. (Tech Central, P6, 2019). Romney has expressed how IBM will develop AI in three ways; core AI, trusted AI and scalable AI. (Tech Central, 2019). These will allow IBM to scale up AI platforms and be leaders for the future.
Focusing on their cloud services, in October 2018, IBM acquired Red Hat, a US company focused on open-source software and technology, in a deal worth $34 billion. (Sherman and Kolodny, 2018). Open source was the biggest theme for technology companies in 2018. With Red Hat CEO Jim Whitehurst joining IBM’s senior management team and reporting to CEO Ginni Rometty, the open-source, enterprise software maker will become a unit of IBM’s Hybrid Cloud division. (Kennedy, 2018). This acquisition ties directly into IBM’s vision for their four key strategic imperatives: cloud, social, mobile and analytics. (Sherman and Kolodny, 2018).
IBM and Red Hat said the deal would allow companies to do even more cloud work, keeping their apps and data portable and secure, regardless of which cloud or hybrid technology they adopt. (Kennedy, 2018)
5. Key Takeaways
1. Shadow Day
My three key takeaways from the shadow day experience were:
I gained an experience of what working in market-leading company was like. Everyone made me feel welcome and like I belonged there. I was introduced to one of the leading managers, Jeffrey Moran, at the beginning of my day. Jeffrey took time out of his busy schedule to personally give me a tour of the different buildings within IBM. Although I am only a college student, he still showed an immense amount of respect toward me. Jacques Heffernan sat down and held two-hour interview in which I gained information about the business practices and his personal background. The atmosphere surrounding the campus was all towards one goal: being the best. From this, it gave me a direction in which I can work my career path too.
I acquired new skills that I can use in my professional career. Prior to the shadow day, I had to send emails and contact different levels of the company in order to grant me access to the campus for the day. On the day itself , I noticed there was a high level of professionalism which I have never experienced before. Everyone I was introduced to shook hands with me, while also maintaining eye contact, among other things. This added to my overall experience of IBM. I can take these details along with me and acquire them for my future professional career.
The performance of the company is second to none. Their attention to detail was transparent in every aspect of the company. Everyone on the campus has a vital role in working towards their targets. This ranges from the cleaners all the way to the CEO. They all want to meet their targets while maintaining a sense of pride. Everyone is shown equal respect and given the same opportunities, regardless of their background. This morale richness is something I can strive towards.
2. Module
My two key takeaways from the sales module were:
The sales module has inspired me to set goals and targets for both my personal and professional life. Kieran always explained that we are all a ‘driver of one’. We should all strive to be the best we can be, even if it means choosing the road less travelled. We are all in charge of our own paths in life. This is one of many valuable lessons I gained from the module. I also enhanced many skills that varied from working in a group to thinking under pressure on my own. In particular, the video that was required for our group assignment provided me with leadership skills. I took responsibility for any of the queries myself or my team members had as I was the point of contact with the lecturer. Although this created pressure, I handled myself in a collective manner and felt as though I strived as the leader of the group. I can call on this experience in future projects.
The lectures that I attended were both insightful and involving. The lecturer, Kieran, has a sense of pride about the topic. Kieran was able to call upon many anecdotes from his experiences surrounding sales in both his professional and personal career. I truly enjoyed listening to these experiences as they made the module enjoyable, unlike some of my other modules. From this, it has given me extra motivation to find a career that I am as passionate about as Kieran is about sales.
6. Summary of experience
Overall, my experience of IBM was extremely valuable. The world we live in today has so much to thank IBM for. The digital world is accelerating at a pace few thought possible years ago. IBM is at the forefront of this.
I was able to put the skills and theories learned from the classroom into practice. Organizing the day itself provided me with a sense of accomplishment. It allowed me to showcase my professionalism to managers in an area I have great admiration and respect for.
I gained an invaluable experience of what it is like to work in a market-leading company. The atmosphere of the IBM is somewhere I want to be. The personal tour I received at the beginning of the day from Jeffrey and the two hour interview from Jacques were personal highlights. The scale of the operation is outstanding which showed throughout the shadow day. The employees are hard-working and extremely focused towards their individual and collective goals. Everyone is an example that hard work does pay off.
My shadow day experience was insightful, educational and has provided me a sense of direction in which I can drive my professional career towards.
Reference List
Rowley, J., Sexton, K. and Seley, A. (2019). Digital Selling Secrets. 4th ed. [ebook] pp.1-19. Available at: http://realityworksgroup.com/wp-content/uploads/2015/05/How-to-Improve-Digital-Sales-Processes-Secrets-from-Top-Sales-Pros-eBook.pdf [Accessed 11th Apr. 2019].
Tremblay, S. (2017). Virtual Sales Requires All Hands (Digital and Human) on Deck. [online] Cisco. Available at: https://blogs.cisco.com/partner/virtual-sales-requires-all-hands-digital-and-human-on-deck [Accessed 11th Apr. 2019].
Gervert, E., Jonk, G. and Tandrup, N. (n.d.). The Future of B2B Sales. 1st ed. [ebook] pp.1-20. Available at: https://www.atkearney.com/documents/20152/924892/Beyond+Limits-The+Future+of+B2B+Sales.pdf/69b66ff2-6c82-e471-39d2-68b07e336a22 [Accessed 11 Apr. 2019].
Martin, S. (2013). The About the Field Sales to Inside Sales Migration Trend. 2nd ed. [ebook] pp.1-30. Available at: http://pages.velocify.com/rs/leads360/images/SalesMigrationFull.pdf [Accessed 11th Apr. 2019].
Your Dictionary. (2018). Referral dictionary definition | referral defined. [online] Available at: https://www.yourdictionary.com/referral [Accessed 12th Apr. 2019].
Successstory.com. (n.d.). IBM Success Story. [online] Available at: https://successstory.com/companies/ibm [Accessed 12th Apr. 2019].
Bellis, M. (2019). The Evolution of IBM from the Beginning til Now. [online] ThoughtCo. Available at: https://www.thoughtco.com/ibm-history-1991407 [Accessed 11th Apr. 2019].
IBM (2018). IBM: 2018 Annual Report. [online] IBM, pp.1-154. Available at: https://www.ibm.com/annualreport/assets/downloads/IBM_Annual_Report_2018.pdf [Accessed 14th Apr. 2019].
Bnamericas. (2019). BNamericas – International Business Machines Corp.. [online] Available at: https://www.bnamericas.com/en/company-profile/international-business-machines-corp-ibm [Accessed 15th Apr. 2019].
Statista. (2018). IBM employees 2000-2018 | Statistic. [online] Available at: https://www.statista.com/statistics/265007/number-of-employees-at-ibm-since-2000/ [Accessed 15th Apr. 2019].
Kooij, J. (2017). BANT and Beyond: Advanced Sales Qualification for SDRs & AEs | Sales Hacker. [online] Sales Hacker. Available at: https://www.saleshacker.com/bant-sales-qualification-new-era/ [Accessed 16th Apr. 2019].
Top 1000. (2019). IBM on Top10. [online] Available at: http://www.top1000.ie/ibm [Accessed 17th Apr. 2019].
Lombardo, J. (2018). IBM’s Mission Statement & Vision Statement (An Analysis) – Panmore Institute. [online] Panmore Institute. Available at: http://panmore.com/ibm-vision-statement-mission-statement-analysis-recommendations [Accessed 17th Apr. 2019].
Eriksson, J. (2013). Building the Sales Process. Vol4, 2, pp.1-71.
Rippe, C. and Campbell, K. (2017). The Sales Process as a Framework for Witnessing. [online] 1(1), pp.1-12. Available at: http://file:///C:/Users/natha/Downloads/TheSalesProcessasaFrameworkforWitnessing.pdf [Accessed 18th Apr. 2019].
Your Dictionary. (n.d.). Gatekeeper defined. [online] Available at: https://www.yourdictionary.com/gatekeeper [Accessed 18th Apr. 2019].
Alvilhiera, J. (2017). 5 Characteristics of a Compelling Reason to Act. [online] Linkedin. Available at: https://www.linkedin.com/pulse/5-characteristics-compelling-reason-act-jim-alvilhiera [Accessed 18th Apr. 2019].
Apollo, B. (2019). Don’t waste your time on deals that have no compelling reason to act. [online] Inflexion Point. Available at: https://www.inflexion-point.com/blog/b2b-sales-don%E2%80%99t-waste-your-time-on-deals-that-have-no-compelling-reason-to-act [Accessed 18th Apr. 2019].
Kotler, P. and Armstrong, G. (2013). Building the Sales Process. [online] 4(2), pp.1-71. Available at: https://www.theseus.fi/bitstream/handle/10024/62336/Building+the+sales+process_Jere+Eriksson.pdf;jsessionid=A1D73D515E0DC8F69B66890068EC28E3?sequence=1 [Accessed 18th Apr. 2019].
Andersson, E. and Johansson, L. (2015). Key account management a study of mid-sized organisations with and without implemented key account management. [ebook] Sweden: Linnaeus University, pp.1-55. Available at: https://www.diva-portal.org/smash/get/diva2:840052/FULLTEXT01.pdf [Accessed 18th Apr. 2019].
Ahmed, R. (2018). Who are IBM’s biggest customers. [online] Quora. Available at: https://www.quora.com/Who-are-IBMs-biggest-customers [Accessed 19th Apr. 2019].
TechCentral.ie. (2019). CEO Rometty on the future of hybrid cloud, AI and IBM – TechCentral.ie. [online] Available at: https://www.techcentral.ie/%EF%BB%BFceo-rometty-on-the-future-of-hybrid-cloud-ai-and-ibm/ [Accessed 19th Apr. 2019].
Sherman, A. and Kolodny, L. (2018). IBM to acquire Red Hat in deal valued at $34 billion. [online] CNBC. Available at: https://www.cnbc.com/2018/10/28/ibm-to-acquire-red-hat-in-deal-valued-at-34-billion.html [Accessed 19th Apr. 2019].
Kennedy, J. (2018). IBM’s biggest ever acquisition: Big Blue to buy Red Hat for $34bn. [online] Silicon Republic. Available at: https://www.siliconrepublic.com/companies/ibm-red-hat [Accessed 19th Apr. 2019].
Cespedes, F. (2014). Putting Sales at the Centre of strategy. Harvard Business Reviews, 26-30. Available at https://hbr.org/2014/10/putting-sales-at-the-center-of-strategy [Accessed 19th Apr. 2019].
Susskind, A. (2002). I Told You So!. Cornell University, 43(2), 75-85. Retrieved from https://journals.sagepub.com/doi/abs/10.1177/001088040204300208?journalCode=cqxa
WebSphere is the connecting software for resources integration and designing of service-oriented infrastructure. This term is, as a rule, used to refer to a specific product of IBM Company (IBM WebSphere Application Server). WebSphere refers to the category of middleware which is intermediate software allowing performance of electronic business applications at different platforms on the basis of Web technology. “IBM WebSphere comprises a set of products with the goal to help developers deploying Web applications” (Hansmann, 2005).
IBM WebSphere includes a wide range of products, such as, CICS Transaction Server, WebSphere Business Monitor, WebSphere Commerce, WebSphere Edge Server, WebSphere Portal, WebSphere Product Center, WebSphere Customer Center, and a number of other products which are necessary for conducting electronic business. “From a central console, systems administrators can configure, monitor, and manage business integration software across host and distributed platforms” (Spencer, 2004). Certain WebSphere products allow modeling of corporate business processes, connecting with the systems of customers and business partners, direct monitoring of business processes, applications integration, and management of effectiveness and optimization of business processes.
Different application servers utilize Java Messaging Service (JMS) possessing the capabilities of messaging. “JMS and the additional messaging features of WebSphere 5.0 provide further evidence for the fact that the asynchronous and synchronous programming models are both required to build next generation applications” (Francis, High, Hernes, Knutson, Rochat, & Vignola, 2002). The application server is needed for giving these functions to the environments with incorrect infrastructures, as well as for those infrastructures which require a more tight integration and management which can be guaranteed by application server. WebSphere application server consists of numerous server offerings possessing typical for them functions and capabilities. “This allows WebSphere Application Server to address a broad spectrum of solutions, ranging from the most rudimentary web application to transactional and scaleable e-business applications” (Francis et al., 2002).
Advantages of WebSphere from an IT and business perspective
One of the greatest advantages of using WebSphere from the IT perspective is a wide range of products of one and the same family. It is a common knowledge that products designed by one and the same company will perform better together than products from several manufacturers. WebSphere has a complex set of products which, if installed together, can ensure proper carrying out of business processes.
From a business perspective, products offered by WebSphere allow conducting business operations on a high level ensuring at the same time reliable connection with business partners and consumers around the globe. One of WebSphere products, namely, WebSphere Process Server, can be helpful in operating business processes. This program complex serves for the support of solutions created on the basis of service-oriented infrastructure; it is used for realization of complicated business processes, as well of traditional business integration, such as, for instance, application integration on an enterprise scale. WebSphere Process Server is based on another product of this family, WebSphere Application Server Network Deployment, and contains all its advantages, namely, clusterization, high operating ratio, and built-in capabilities of messages and transactions management.
Other WebSphere Products Contributing to Advantages of WebSphere for Business
WebSphere Business Monitor
Another WebSphere product which can be helpful in business is WebSphere Business Monitor. This Web application provides the users with instrument panels which allow monitoring of different aspects of business efficiency. Instrument panels are created on the basis of portlets making it possible to quickly find necessary information, to analyze and compile reports on the business efficiency, and to adjust operations and notifications being the phase of business efficiency management. “IBM WebSphere Business Monitor enables users to view dashboards, to analyze how their processes are working, to track individual items, and to identify bottlenecks” (Bieberstein, Laird, Jones, & Mitra, 2008).
WebSphere Business Integration
In addition, WebSphere offers Tops BI services on introduction of integration systems and business process management based on IBM WebSphere Business Integration. “The WebSphere Business Integration family addresses the issue of connectivity management, isolating applications from concern with network protocols and platform dependencies” (Yusuf, 2004). The product can conduct complex survey including business processes and IT-infrastructure analysis; it is able to work out the architecture of integration solution; it can adjust and adapt monitoring means for business processes, informational security, and administration. “The WebSphere Business Integration Family also offers a suite of adapters that bridge between popular off-the-shelf business applications, such as SAP or PeopleSoft, and WebSphere MQ” (Yusuf, 2004).
WebSphere Business Modeler
Finally, IBM WebSphere Business Modeler allows modeling, projecting, and analyzing business processes, integrate new and improved processes, and determine organizational elements, resources, and business objects of the company which are necessary for realization of these processes. The program is aimed at achieving correspondence between object life cycles and models of business process. “Currently supported features include: object life cycle conformance and coverage checking, semi-automatic resolution of selected compliance violations, extraction of object life cycles from a process model, and generation of a process model from several object life cycles” (Alonso, Dadam,& Rosemann, 2007).
WebSphere Business Modeler allows creating the model of processes which is a graphic representation of the business processes existing in the company; resources model which sets different types of resources and their copies used in other models (for instance, the existing corporate informational systems may be used as resources); informational model which is a representation of data structures used in business processes; organizational model which defines the structure of the enterprise, organizational units and resources connected with them; analytical model which sets basic metrics and characteristics of business processes. The creation of these models corresponds to the specification of Business Process Management Notation which is aimed at forming simple and intelligible description of business processes clear to all types of workers starting from business analysts and ending up with technical experts.
Recommendations
Healthcare industry has never employed IT technologies for the improvement of the services it delivers this is why these days the gap between healthcare services and technology is immense. The best way out of this situation is using SOA model which would help to create information exchange system necessary for healthcare industry. The implementation of SOA will advance medicine and improve the quality of healthcare services. SOA plays a significant role in the future of medicine since it allows creating community sites controlled by experts, and different medical blocks, which can facilitate the work of medical librarians, students, scientists, and physicians. Assets and requirements which SOA model comprises will make it possible for other healthcare projects to reuse them. This is beneficial for the healthcare industry where sharing of information is extremely important. Web services are likely not only to change the existing ways of practicing medicine and to improve the delivery of healthcare services, but to reduce costs by means of utilization of IT resources.
References
Alonso, G., Dadam, P., & Rosemann, M. (2007). Business Process Management: 5th International Conference, BPM, Brisbane, Australia, Proceedings. Springer.
Bieberstein, N., Laird, R.G., Jones, K., & Mitra, T. Executing SOA: A Practical Guide For The Service-Oriented Architect. Addison-Wesley.
Francis, T., High, R., Herness, E., Knutson, J., Rochat, K., & Vignola, C. (2002). Professional IBM WebSphere 5.0 Application Server. John Wiley and Sons.
Hansmann, U. (2005). Pervasive Computing: The Mobile World. Springer.
Spencer, D. (2004). IBM Software for E-business on Demand: Business Transformation and the on Demand Software Infrastructure. Maximum Press.
Yusuf, K. (2004). Enterprise Messaging Using JMS and IBM WebSphere. Prentice Hall PTR.
Information security is a very critical issue as we grow towards the information and knowledge age. This is due to the very many security threats, in regard to information and technology, associated with it. The more there is advancement in technology, the more security threats faced in the modern information and knowledge based world. The International Business Machines (IBM) is a well renowned company.
It is ranked as the largest information technology company in the world in regard to a number of elements, for instance, the revenue it generates per year (TechRepublic, 2004). This piece of work looks at IT Security with much emphasis being given to the information threats and the ways of enhancing information and technology security.
Enhancing IT Security
The research question for this assignment is; what are the strategies utilized by companies to foster IT security?
Information is an essential element in any organization irrespective of its size or the activities it is involved with. It is the driving force towards success and progress without which an organization would be stagnant.
Information has been identified as the pillar that keeps all organs of an organization, for instance, the human resource and assets on the move. It should therefore be safeguarded under all circumstances irrespective of the cost that may be incurred because its importance surpasses the cost incurred to greater heights.
The quality of information and how well it is managed determines the overall success of a given company, for example, in regard to the position it is able to secure in the ever competitive market place.
The International Business Machines is an example of a company that has been regarded by many organizations as a source of solution to their information security related problems due to its efficiency and effectiveness in its provision of quality services (Calder &Watkins, 2005).
There are various strategies that are put in place by different companies in order to ensure that information technology security threats are dealt with in an appropriate manner; that allows an organization to always be in a position to carry out all its functions properly and defend its operations strongly where need arise. Some of the threats include hacking, viruses, intrusion of data among others.
Hacking is the process of access an organization’s information system for malicious gains. It could take different forms for instance password cracking, E-mail cracking and packet modification.
Viruses are computer programs that usually copy themselves and infect a computer causing damages including loss of data. Intrusion of data on the other hand entails unauthorized access of data by various parties which could expose a organization’s strengths an aspect that is not good.
Some of the strategies available in the market include intrusion detection and prevention through utilization of various technologies and software. Network security is also another strategy that has been enhanced by companies. This is a very essential aspect that avoids any threat that could be perpetrated through a network, a tool through which hackers and crackers carry out their malicious deals.
Various incident response strategies should also be established to deal with different kinds of emergencies. The response is determined to a greater extent by the nature of the threat posed as well as the extent of penetration of the threat into the data system (TechRepublic, 2004).
For IBM, some of the information protection strategies that should be reinforced include IBM Security Network Intrusion Prevention System, IBM Security Server Protection, and IBM Security Virtual Server Protection for VMware, IBM Tivoli Identity Manager, Tivoli Security Information and Event Manager, and IBM Tivoli Key Lifecycle Manager among others.
There are also security products that have been designed and developed specifically for the purpose of data recovery, for instance, IBM Tivoli Storage Manager, IBM Tivoli Storage Manager for Databases, IBM Tivoli Storage Manager for Mail and IBM Tivoli Storage Manager for System Backup and Recovery (Anonymous, 2010).
The first step in implementation of the strategies is usually a data security strategy and assessment to determine an organization’s specific needs in regard to information security hence coming up with a holistic information protection measure that aims at minimizing expenses hence boosting productivity and profitability.
One should also ensure that all the organizations involved comply with all the legal and business requirements to avoid any form of irregularities that could affect an organization in one way or the other. IBM should also recognize the fact that a good data and information protection strategy should be cost-effective and at the same time address all the set regulations to avoid fines.
The company should do this by identifying where essential and sensitive data is located and hence taking necessary steps in protecting it depending on how it is used and the risk of exposure. This is achieved through data security strategy and assessment that in turn assists in the development of a risk-balanced security strategy.
Conclusion
From the above discussion, it is evident that information and technology are associated with a lot of major threats and hence the need to provide maximum security to avoid losses that could even lead to closure of organizations. The security measures adopted by different organizations differ in many ways, for instance, in terms of cost, effectiveness as well as compliance with different set standards and requirements.
The IBM has however proved to be very efficient in provision of security services to counter different kinds of information security threats faced in today’s world. This has been made possible through the utilization of various strategies as mentioned above, which ensures that all threats are handled effectively avoiding any form of loss or destruction of information.
The file system is one of the most visible parts of the operating system. Almost all operating systems let users specify named objects, called files. Files hold programs, data, or anything else the user desires. The operating system also provides various APIs to create, read, write, destroy, and manage files. Moreover, most operating systems have their own unique and distinct file types. For example, UNIX has regular directories, files, and special block and character stream files. Regular files hold user data. Directories are essentially used to keep track of files and consist of information needed to supply files with symbolic names. Also, block and character stream files are used for modeling disk and terminal-like devices. Moreover, the very first application enablers added was the ability to store files from other operating system environments, like UNIX. At V3R1, the integrated file system (IFS) was introduced which not only created a consistent structure for all the existing file systems seen in the AS/400, but also created a new file system structure altogether needed for other operating systems. With passage of time, new file systems have been added. The IFS supported 10 file systems and three server types, by the time the iSeries was announced.
Features and Advantages
The IFS is said to be a part of OS/400, and provides a consistent structure for applications and users that were previously part of the AS/400. In addition, it provides support for the stream I/O files utilized by the PC and UNIX operating systems. Stream files, which contain long continuous strings of data, have become increasingly significant for storing images, audio, and video files (Soltis, 2001). Moreover, the IFS provides a common view of stream files that are stored either locally on the iSeries or a remote server. To manage all the files, a new hierarchical directory structure was created. This hierarchical directory permits access to objects by specifying the path to the objects, through the directories, in a way similar to the one seen in PC and UNIX file systems. This directory and file structure allows information such as UNIX stream files, record-oriented database files, and file serving to be handled through separate file systems or a common interface, depending on the application’s needs. The main advantage and unique capability of the IFS is the ability to support separate file systems through a common, consistent interface. In the original S/38, it was easy to search for an object in the database by simply looking up the name in a library. A library supplied a means by which objects could be organized into distinct groups, and allowed objects to be found by a name. The similar library structure was incorporated into OS/400 (Soltis, 2001).
Libraries: Libraries are said to be OS/400 objects which are used for finding other objects in the database. Moreover, the library is arranged in a single-level hierarchical manner, unlike the directory structure found in UNIX and PC operating systems which show a multi-level hierarchy. Finding an OS/400 object needs the object names and the library along with the object type to uniquely identify the object. Exceptionally, a library cannot reference other libraries, which will, conversely, violate the single-level hierarchy of Library/Object. However, there is a unique and special library called QSYS that is used to reference other libraries (Soltis, 2001).
Shared Folders: Shared folders were brought into OS/400 primarily to support Office/400 functions. The S/36 was an efficient office system, and most of the concepts related to folders originated from this system. An OS/400 folders object was included to support these Office functions. In other words, the integrated Office support provided a filing system for all Office objects that contained data for an Office product. Documents, emails, programs, and file were amongst the conventional items that were present in this file system. Furthermore, document library services allow users to treat the filing system as an electronic filing cabinet furnished with document library objects in folders. Folder management services allow users to organize the objects in these folders. Additionally, folders may contain other folders and may be searched interactively. Therefore, along with the traditional Office items as stated above, shared folders contain stream, files for graphs, images, spreadsheets, PC programs, and PC files. Moreover, IBM replaced PC support with a product called Client Access that provided a platform for distributed client-server computing (Soltis, 2001). Initially, the primary challenge had been to determine how to construct a single file system that could integrate all file system types, since the separate file system was not designed to be compatible to each other. As previously discussed, the single-level-hierarchy OS/400 library structure is a subset of the one used in PC operating system with different names but similar structure. The PC operating systems contain files instead of objects, and a library is called a directory in which files exist. Unlike the OS/400 library structure, directories which exist within directories on the PC are usually called sub-directories. This arrangement, thus, creates a multi-level hierarchy for PC file naming, as opposed to the single-level structure employed by the OS/400 library. A PC file name takes the form DIR1DIR2…..DIRnFILENAME. This is a superset of the OS/400 library naming structure, except for the backward slashes (). Likewise, a UNIX file structure is a superset of the OS/400 library structure. Moreover, a UNIX file system allows multiple paths to the same object. The solution for combining all these file systems was to use a single root from a UNIX-like file system and to place all others under this root. A path name then takes the form DIR1/DIR2/…DIRn/FILENAME. The lengths of the file and directory names in IFS are increased to match the UNIX-based open system standards, like Posix and XPG. In OS/400, the names in the IFS directories are stored in a format known as Unicode, which is an international standard supporting multiple languages, which includes the double-byte character sets used by many nations (Soltis, 2001). The data format must be compatible with the application that requests it, because the IFS allows accessing the data, or the data must be converted to a compatible format. OS/400 manages the conversion between data formats such as Extended Binary Coded Decimal Interchange Code (EBCDIC) used for native iSeries applications, and the American Standard Code for Information Interchange (ASCII) in the PC world. All the files and file systems in the IFS are treated like OS/400 objects. Moreover, file system supports the same set of operations, described for each file in a standard operations table. Each file system possesses its own set of logical structures and rules to interact with information in storage, and these structures and rules differ from one file system to another. By employing a table approach, new file systems can be introduced to the IFS without requiring changes to existing file systems or the operations corresponding to those file systems. Furthermore, the IFS considers the original library support and original folders support as separate and distinct systems; along with the other file support that has varying capabilities. With this structure, new file systems may be integrated into the IFS as and when required. The virtual file system architecture provides a common interface to every file system in the IFS. VFS is an object-oriented interface which provides objects called as nodes which are abstract objects that represent the real objects stored in the file system. The nodes allow a collection of abstract operations to be defined that can be performed on real objects (Soltis, 2001). The UNIX-, Windows-, and OS/400-based servers allow the iSeries to act as both client and server when sharing data over a network. Additionally, the IFS supports the xSeries servers, either remotely attached to the iSeries or integrated into it, and Linux server running in an iSeries partition.
NFS Server: The NFS file system and NFS server let the iSeries act as both client and server by allowing remote file systems or directories to be mounted locally on a PC, a UNIX workstation, or the iSeries. The NFS file system allows users to access data and objects stored on a remote NFS server. Through the NFS server, the iSeries can export a network file system. This server also lets data to be exported from any of the following file systems: Root (/), QSYS.LIB, QOpenSys, QOPT, and UDFS. Communications between client and server are, therefore, accomplished through the use of Remote Procedure Calls (RPCs) (Soltis, 2001).
OS/400 NetServer: OS/400 NetServer allows Windows PCs access IFS directories and OS/400 output queues, with TCP/IP configured on both the iSeries and PC. The PC users access the shared information via Windows Network Neighborhood. The PC user who is connected to the iSeries views the IFS as a disk drive containing directories and objects, and can operate with files in the IFS by utilizing either the file-sharing clients built into Windows and NetWare or Client Access Express for Windows. Major changes have been made to the Client Access support of the iSeries. Previously, the Client Access family of products used proprietary support for printers and network drives. These products are now replaced with two new products that do not require the proprietary support, i.e. iSeries Client Access Express for Windows and iSeries Access for Web. The iSeries Express client uses in-built features of the Windows OS to communicate with OS/400 NetServer for network file and print access. By using the Express client, users can access files using Client Access SPIs through the File System in Operations Navigator (OpsNav). Directories may be created, removed, and renamed when working with the IFS under File System in OpsNav. Moreover, drag-and-drop functions are also available in the Express Client under Integrated File System with the Client Access SPIs. This is particularly important to take advantage of Secure Socket Layer (SSL). The SPIs support SSL while OS/400 NetServer does not (Soltis, 2001).
IFS objects can be accessed using either OpsNav or CL commands, the command language for OS/400 that was carried forward from S/38. Moreover, all the APIs used in the IFS are thread safe when they are directed at an object in a thread-safe file system. QOpenSys, QSYS.LIB, QOPT, QNTC, and user-defined file systems are all thread safe. Also, DataLinks extend the types of data stored in a database file. DataLink columns in the database are used for holding references to non-database files that are stored in the local IFS, remote IFS, or in the file system of any attached UNIX or Windows server that has IBM’s DataLink Manager installed. A DataLink is used to specify the object’s file location rather than storing the data object itself in the database columns. Furthermore, DataLink support lets the user assign directories in the Root to hold data link objects. Once a directory is set as a DataLink directory, all objects in that directory are accessed via the DataLink File Manager, i.e. DLFM. Therefore, the IFS is a fundamental application enabler for the iSeries. It enhances the existing data management capabilities of OS/400 and extends these capabilities to support the emerging new application environments (Soltis, 2001).
The New I/O
The I/O subsystem diffuses almost every part of a computer system. Though it is considered to be only one-third of the processor, memory, and I/O complex, I/O is considerably larger than either of the other two. I/O configuration requires more hardware and more lines of operating system code, as compared to anything else in the system. Briefly, the I/O sub-system constitutes of the group of components, both hardware and software, responsible for processing input and delivering output to various types of devices attached to the system. Whenever a user requires any system resource, such as reading from or writing to a file, requesting instructions of a program to be executed, requires another system object, creating or destroying an object, and that resource has not already been brought into memory, the computer goes through the I/O sub-system to retrieve or store, create or destroy the resource. Although I/O impacts every level in a computer system, it is usually relegated to second-class citizenship (Soltis, 2001). Along with the memory subsystem, the I/O subsystem finds out the response time and throughput for most computers. With the approaching time, when computers from low-end PCs to the fastest supercomputers will use the same microprocessor building blocks, I/O capabilities may be the only feature that distinguishes one computer system from another. Therefore, it can be debated that, as many are now starting to do, I/O is the most important component in the system. The I/O subsystem residing in the iSeries has undergone major transitions in the past few years, so it is appropriate to examine those changes to see how they will affect IBM’s future system designs. The iSeries uses a hierarchy of components for the attachment of I/O, which includes I/O buses, I/O hubs, I/O bridges, I/O processors (IOPs), I/O adapters (IOAs), and lastly, I/O devices and network connections. The history of I/O hubs subsystem designs in the AS/400 and S/38 is partially technical and partly political. For both systems, the I/O designs were heavily influenced by the factors outside the Rochester development lab (Soltis, 2001).
Pre-history: The S/38
The S/38 employed an I/O channel that was similar to an IBM System/370 (S/370) channel, in many ways. A channel can be thought of as a specialized computer built alongside the main processor that is designed to offload the I/O processing from the main processor. A channel has its own instruction set designed especially to interact with the bus-attached I/O adapter and to transfer data between the memory and I/O devices. The main processor passes the channel hardware to the channel programs which then executes simultaneously with other executing programs in the main processor. When a channel finishes with its program, it interrupts the main processor to get more work. The main reason behind S/38 using a channel was because of the people involved. Many new people had to be brought into Rochester to design and build the S/38 (Soltis, 2001). Most of them came from other parts of IBM, and since the designers of the I/O hardware had previously operated S/370 channels, they decided to use a variant of a design they were familiar with. However, unlike the S/370, which supported multiple channels, the S/38 had only single channel. The second channel was designed but never implemented. The S/38 channel could be described as a block-multiplexer channel operating in a fixed burst mode (Soltis, 2001). For the very first AS/400s, the new I/O structure was developed. Unlike a channel, where the I/O intelligence is placed alongside the main processor or is even part of it, the new structure distributed the intelligence throughout some specialized IOPs designed to perform I/O operations. The concept of using separate processors for I/O had initially been adopted by System/36 (S/36), so the concepts were well known to Rochester developers. A fundamental part of this new I/O structure was the System Products Division (SPD) bus. During the 1980s, IBM corporate management was pertained to the fact that IBM had too many midrange computers all competing for the same customer market. To solve this problem, management moved the responsibility for five distinct midrange systems into one development division, i.e. the SPD. Two of those systems, the S/34 and the S/38, were products from Fortress Rochester. Soon, a new project with the code name Fort Knox was started in SPD, to converge all five systems into one system. The various parts of the new system would be built in different locations that were part of SPD (Soltis, 2001).
From 1988 through 1997, the system I/O bus used in all AS/400s was the SPD bus. Moreover, specialized hardware generated the signals for one or more SPD buses and handled the transitions from the high-speed system memory bus to these SPD system I/O buses. The SPD bus has itself undergone some various updates over the years, but otherwise it is a packet-oriented bus with enhancements that allow efficient streaming of data. Packet-oriented data transmit messages in small blocks, known as packets. Streaming entails continuous blocks of data can be sent, which permits higher data rates to be achieved on the bus. In a streaming mode, the SPD bus can support data rates of 25 to 36 megabytes per second (MB/sec), depending on direction and contention on the bus. Furthermore, the SPD bus supported a parallel copper implementation that could be used inside a single enclosure. This parallel copper bus had 32 lines to transfer data, 8 lines to transfer command and status information, 8 lines for origin-destination identification, and several other control lines. When the AS/400 system was brought in, in 1988, the parallel copper SPD bus was the only one available. Afterwards, a serial optical version of the SPD bus was introduced, which could go outside the single enclosure. Moreover, this serial optical bus was able to cover distances up to 500 meters and even two kilometers in certain environments (Soltis, 2001). Connected to the SPD bus were the IOAs and IOPs that worked together to perform several functions. Additionally, they moved data between the system’s main memory and the I/O devices as well as network connections. They transposed data from one form to another and provided a buffer for high-speed devices like disks for data required by the processors. Earlier, the implementation of these I/O functions utilized dedicated-function IOPs. However, the exception was the multifunction I/O processor where multiple functions could be executed on one IOP. Since most IOPs were dedicated to a single function, the various adapter cards which contained the IOPs and IOAs tended to share very less. As a result of this, numerous different processors were used for the IOPs mostly from the Motorola 68000 family; and many unique AS/400 interfaces to devices were established/ created. A good example of these unique AS/400 interfaces are SCSI, SCSI-2, Workstation, LAN, FDDI, ATM, WAN, Token-Ring, ISDN, Frame Relay. In short, standardization was not a higher priority (Soltis, 2001). Rather than totally altering and immediately phasing out the SPD bus and all SPD I/O adapters, the changes were staged over four releases. This technique would allow customers to migrate to the new AS/400e models and move many of the SPD I/O adapter cards to the new system. Furthermore, a transition I/O structure was created to support both SPD and PCI adapter cards for the next few releases. Soon the necessity arose to increase the bus bandwidths beyond the SPD bus’s capability since customers demanded for tremendous increases in processor, I/O device, and the interconnection network speeds, and to prepare for the likes of 1 to 2 gigabit/sec Fiber Channel buses and 1 to 2 gigabit/sec. The result of this effort is the RIO bus, which consists of a pair of byte-wide unidirectional point-to-point buses, each one containing 8 data lines, one clock line, and one flag line. Another major change during this transition period focused on the IOPs. Starting with V4R1, all new IOPs were being designed to have a more uniform structure. Apart from PowerPC processors, the IOPs use the 32-bit 603 and 740 family of PowerPC. Unlike most of the previous IOPs, these support the attachment of multiple IOAs (Soltis, 2001). Before V4R1, the internal buses of the IOPs were based on the Intel 960 bus, the Motorola 68000 bus, the IBM Micro Channel, or the proprietary magnetic media bus architecture. Since V4R1, all new IOPs now use only the PCI bus. Furthermore, the PCI bus architecture allows a shared bus to be used for interconnecting the I/O components in the server. When one device is using the bus at a given instance of time, no other device can use the same bus at that time. Though multiple PCI buses may be used in a server, however, the shared bus architecture restricts the total I/O bandwidth that can be achieved. With InfiniBand, the shared bus is replaced by high-bandwidth, high-speed, point-to-point connections between devices. Additionally, InfiniBand is known as switched fabric architecture because it uses switches for making point-to-point connections, similar to the way switches are used in the iSeries memory subsystem. Moreover, the InfiniBand architecture is also called channel architecture because of its similarity in the concept to the S/370 channel that inspired the I/O structure in the S/38. Also, because InfiniBand is a channel, it has more intelligence built into it than a PCI bus does.
iSeries and the Internet
IBM has placed iSeries as the best hardware platform for the Internet-based applications by offering software development and management tools like the WebSphere, as well as creating a multifaceted iSeries environment called the Integrated File System (IFS). Server software is written to run in a UNIX or Windows operating system environment. In other words, servers expect an environment wherein there are directories, subdirectories, and stream files, and not libraries, objects, and members. But in reality, everything in the iSeries native environment may be classified as a library, object, or member (Janson, 2007). In other words, there are many alternative system environments on the iSeries. The iSeries supports and affirms many universes, of which the native environment is only one. The IFS encompasses all storage on an iSeries and is comprised of several directories of which the Root directory (/) is the parent or primary directory. Everything stored on the iSeries is placed in the Root directory. Directories are similar to libraries, i.e. they are used to organize files. However, unlike libraries, directories can have subdirectories. The Root already contains a series of predefined subdirectories that support other common computer system environments. For example, QOpenSys subdirectory operates like UNIX system environment, and QSYS subdirectory encompasses the iSeries native environment. Moreover, each of the separate environments has its own rules regarding storing information and executing programs (Janson, 2007). Data or a program stored in the Root or QOpenSys is stored as a stream file; there are many variations amongst these predefined directories. For example, Root is not case sensitive and QOpenSys is. In addition to this, the IFS also supports a “current directory”. The current directory depicts a current library in the native environment. Whenever a user does not specify a directory, the system uses the current directory, which may be set to the Root or created by the user.
Working in the IFS: Studio’s Remote System Explorer (RSE) provides a tree diagram interface to all the directories and files of IFS. The iSeries native environment supplies IFS commands that allow users to work with any object irrespective of which directory is it stored in. These commands can be implemented from the command line on any menu or screen just like CL commands. Furthermore, prompting will also work on these commands. The workhorse of these commands is WRKLNK, i.e. Work with Object Links. WRKLNK displays a list of object names, i.e. links that are contained within a specified subdirectory. Thus, when issuing the WRKLNK command, the user is required to identify the path to be displayed. For example, to display all the objects within YOURLIBXX, the full IFS path of the Root, QSYS, and YOURLIBXX should be specified. The syntax for the WRKLNK command would be: WRKLNK OBJ (‘/QSYS.LIB/YOURLIBXX.LIB/*’) (Janson, 2007)
In the above command the QSYS and YOURLIBXX need types of LIB, and the file-naming convention of separating the object name and type with a period is required. Additionally, the path is enclosed in single quotes, and the Root is indicated by the first forward slash. Also, a forward slash is used to separate the subdirectory from its parent directory; an asterisk must also be specified. The asterisk entails all the objects within YOULIBXX are displayed. Subsetted lists may be displayed by using asterisk(s) to replace the object links’ names, types, or portions of the name and types. For example, specifying *.file would display only file objects, while specifying ‘/A’ would display object links in the Root directory that have names beginning with A only. The “Work with Object Links” display screen functions exactly like the “Work with Objects Using PDM” screen. Functions are carried out by specifying options to the left of the object links or pressing a function key (Janson, 2007). Server software on an iSeries is usually installed in the Root or QOpenSys directory. Each server requires Web pages to be stored in a certain directory. In this case, the server requires all Web pages to be stored in the following directory path:
QIBM/ProdData/HTPP/Public/HTTPSVR/HTML/
The IP address of the iSeries followed by that path and the file name can be, for instance, given as: 123.456.789.3/QIBM//ProdData/HTPP/Public/HTTPSVR/HTML/coolpage.html
As far as typing mistakes made by the user before entering the address, is concerned, fortunately, “nicknames” for these paths can be established. These nicknames are configured or defined with the WRKHTTPCG command, i.e. Work with HTTP Configuration. Issuing this command displays a screen with all sorted of configuration information. Configuration information contains both required information and the preferences. When the HTTP server starts, the configuration information is read and the HTTP server performs all the necessary set-up tasks that are defined in the configuration information (Janson, 2007). In the above example, the server is required to set-up a “path nickname”. The Pass command assigns a nickname to an existing directory path, and when added to the configuration information, the following Pass command will establish ‘/sample’ as nickname for the server’s Web page path: Pass/sample/* /QIBM//ProdData/HTPP/Public/HTTPSVR/HTML/*
Many commands may be too long to fit on the “Work with HTTP Configuration” screen. To display and edit a line, a 2 is typed in the option area to the left of the line and ENTER is pressed. The “Change HTTP Configuration Entry” screen is displayed with the full command. This Pass command creates a nickname of ‘/’ for the Web page stored the Welcome.html file (Janson, 2007). The Welcome.html file comes with HTTP server software and contains a sample Web page. The Pass command entails the Welcome.html file will be displayed when the URL or IP address is specified. In short, this Pass command establishes Welcome.html as the default home page for the server. Furthermore, Pass command can be added to make “/ sample” as a nickname for the default Web page path. To add a line, a 3 is typed in the option files on the blank line on the “Work with HTTP Configuration” screen, and a sequence number is entered where the new line is to be added in the configuration data. Restarting the HTTP server will establish the user-friendly path name of ‘/sample’ for the path /QIBM/ProdData/HTPP/Public/HTTPSVR/HTML
There are some ways to move a Webpage to the correct directory on the iSeries. For example, SEU could be used to enter the HTML source code into a member, and then the CPYTOSTMF command could be used to move pages to the correct IFS file. However, Studio is infinitely easier. Publishing a page is called Exporting in Studio. For the said example, the StudioPage.html is to be exported to the iSeries directory path of /QIBM/ProdData/HTPP/Public/HTTPSVR/HTML. To do this, first the file StudioPage.html is selected in the Navigator tree. FILE and then EXPORT is clicked on the screen to display the Export window. At the Export window, the Remote File System option is selected and the Next button is clicked. At the Export RFS window, the directory path may be typed in the Folder textbox. The path can also be specified by using the Browse for Folder window, which provides a navigation tree for all external systems identified by WebSphere. In this case, the user needs to expand on the iSeries entry and drill down the path of /QIBM/ProdData/HTPP/Public/HTTPSVR/HTML (Janson, 2007).
Types of files in the IBM System I
Keyed Files: Storage devices physically access the storage media either sequentially or directly. Direct access entails that the storage media or media can go directly to any storage location and read the information stored there. Sequential access means that the storage device should go through all storage location that physically precedes the storage location being sought (Janson, 2007). Tape devices and computer disks provide the same type of access to data records. When accessing a particular data record, however, there needs to be a way to identify that record. That is, each record is allocated a number based on its relative position within the file, called the relative record number. This is the number DFU that has been used to identify records. Relative record numbers can work wonders for CDs with small number of songs, for instance, but with data files containing thousands of records, it is difficult to keep track of each record’s record number. The most common method of identifying records is with a primary or unique key. Earlier, the primary key controlled the physical location of data records. Also, there could be many unique keys but only one primary key. The iSeries allows one to define a single primary key for a physical file. However, the primary key does not control the location of data records. Files may also have secondary keys. These fields do not essentially have a unique value for each record. For example, the student file may have the field “eye color” as a secondary key. Finding the file based on a particular eye color will not result in finding a single record, i.e. the search would result in multiple records. Thus, non-unique secondary keys cannot be used for identifying a particular record (Janson, 2007). Sequential files store records in a sequential manner, one after another in key order. Access to a sequential file is limited to the sequential access method, i.e. each record is processed in the order in which it is placed in the file. Such type of files can support access to the file in only one key field order. This is the main reason why sequential organization is never used. Furthermore, keyed sequential files allow each record to be uniquely identified. However, retrieving a specific record means that each record is read and the key field’s value is checked. In an indexed sequential file, each record contains a unique value for the key, records are grouped into blocks, and each block contains records for specific range of key values. Within the block, the records are stored in a sequential manner in key order; blocks do not have to be in key order. The main reason behind this organization is the concept of index, which is a file that contains an index record for each block of data records. Additionally, the index record contains two major pieces of information: the highest key value contained within the block, and the starting storage location/ address of the block. Moreover, the index records are stored in key order (Janson, 2007). Also, the index contains only the key fields and the storage location. While accessing an indexed sequential file for a particular record, the first step is to sequentially search the index. Each index record’s key value is checked against the key value that is being searched for. If the index value is greater than the value being searched for, the block containing the data record is found. The system then goes directly to that block as indicated by the storage location in the index record, and reads each data record sequentially in the block, looking for the accurate key value. Space utilization in the system memory can be improved by using a more complicated calculation called a hashing routine. There are several types of hashing routines but what characterizes them all is that they generate a smaller range of addresses. A typical example is the division/remainder method wherein the number of storage location that will be in the file will be determined. Then, the largest prime number is chosen that is less than the number of records to be stored. This method is based on the fact that the number of possible remainders generated by division is equal to the divisor (Janson, 2007). Each operating system or file management system implements the file organizations and access procedures, in a unique manner. Also, they generally have their naming conventions. For instance, the iSeries supports access to files in the form of arrival sequence order. That is, a user or program can access records in the order in which they arrive into a file. As far as access is concerned, arrival sequence is similar to sequential access. However, the iSeries does not store records in arrival order. It employs sophisticated algorithms that calculate the most efficient utilization of available space and resources and may even scatter records across physical storage devices. The iSeries provides arrival sequence access through an access path. This access path can be thought of as an index. For example, an arrival sequence access path that supports only sequential access to a file could simply consist of a list of storage locations. To access the file, the access path would be searched sequentially and the records read directly (Janson, 2007).
Logical Files: A Database Management System will usually provide three ways of viewing a database, i.e. physical view, global view, and the ability of building multiple user views of the data. Because of the iSeries’ single level approach to storage, the physical view of data is mostly hidden from the iSeries. One need not know the disk, track, or sector on which data is stored. Additionally, any specific location addresses or indices are used internally by the DBMS and are not readily available to the user. However, the iSeries does not offer a limited physical view of the data, with the DSPPFM command, along with some capability to manipulate the physical organization of the data, with the RGZPFM command. DDS does, however, provide a global view of all the data as files as well as it allows construction of individual views. This is obtained through both logical and physical files. Physical files contain the definition of individual fields within the file and include an access path to the data (a key) and the data itself (Janson, 2007). These definition “pieces” taken as a whole provide a global view of all data on the iSeries. Users often want to see data in a form other than how it is organized. The iSeries employs another type of object called a logical file that provides an alternative access to data in physical files. Like physical files, logical files contain file definitions. However, logical files contain only field definitions and an access path, and no data is stored in a logical file. Since logical files do not contain any data, they must reference data already defined in a physical file. But a logical file can reference field from many physical files.
Through logical files, unique combinations of data seem to exist without duplication of any data (Janson, 2007). Logical files are defined with DDS and are created by compiling the member of the source physical file that contains the logical file’s DDS definition, similar to physical files. To create a logical file, first a member with a type of LF is created, and then the logical file’s DDS source definition is entered. And finally, the DDS is compiled to create the logical file. Since logical files do not contain any data, they simply point to data contained in physical files (Janson, 2007). There are several benefits offered by logical files. Firstly, logical files can be used to easily generate customer reports. This relieves the programmer of having to write and maintain large reporting system. The programmer can greatly reduce the number of report programs through logical files. The specialized access provided by logical files to physical files also simplifies program input and output logic. Because logical files are defined externally, they can also be used by many programs. Without logical files, every program would have to contain the duplicate program code to access the separate physical files. Lastly, logical files do not create any duplicate data (Janson, 2007).
Reference List
Janson, R. (2007). Introduction to the iSeries and Websphere Studio Client. USA: Shroff/ Janson Publishers.
Soltis, F.(2001). The Inside Story of the IBM iSeries. Colorado, USA: 29th Street Press.