Adoption Process: Information Management

There are five main stages that influence the decision, which include awareness that the need exists, searching for information, considering alternative options, making a purchase decision, and behavior after the purchase. Awareness of the existence of a specific problem or need and understanding what type of product can solve or satisfy it (Nam et al., 2019). Without awareness of the need, the purchase of a product is impossible. Understanding that the awareness exists is caused by ordinary internal needs or external ones that are affected by advertising. The consumer is looking for information about a product that can meet their needs. They are trying to find the best solution based on sources of information that they trust.

The consumer evaluates and compares the solutions found in studying information about the problem and its solution. Usually, consumers compare several found options  deciding which one will suit them best. At this stage, the consumer chooses the products attributes that are significant for themselves and compares them with different brands (Nam et al., 2019). This stage is carried out through greater customer engagement, that is, with maximum interest, they compare several brands; if they are not affected, they stop at one. After evaluating several brands, the consumer decides to buy one of them. Consumers make a purchase and then they realize whether they are satisfied or dissatisfied with their decision. This is influenced by the level of expectations from the product, which are formed mainly by advertising.

The task of marketers is to consider all possible factors that harm the choice of buyers and level them. The task of marketers is to study the customers satisfaction or dissatisfaction with the purchase (Nam et al., 2019). This is necessary to understand what needs to be finalized so that the client is delighted and what exactly attracts consumers. The problem for marketers is that the products characteristics that cause delight become expected after a while, so marketers must constantly look for new ways to evoke a sense of admiration among consumers.

Reference

Nam, D., Lee, J., & Lee, H. (2019). . International Journal of Information Management, 49(1), 411-423.

The Current Information Management System Improvement

Previous analysis has shown that Company X needs a substantial improvement of its information management strategy. The changes in the way, in which data is processed in the company, as well as the ways, in which the staff members interact, is bound to have a significant effect on the quality of its performance. Therefore, the tools used for data analysis and the output is delivered by the staff members when adopting each of these devices can be considered the primary variables to be analyzed (Jones, 2014).

To carry out the analysis, one will have to identify the performance rates for each of the data management tools, locate the outcome, and create a table that will contain the key results. As the table provided above shows, the usage of the tools needs to be correlated with the average speed of the staffs performance, the number of defective items produced, and the speed of data processed before the production process commences. As a result, the ultimate strategy that permits the most detailed data processing and the smallest number of errors made can be selected (Pyzdek & Keller, 2014).

Table 1. Errors, Performance Speed, and Data Processing.

Number of Defective Items Number of Items per Hour Amount of Information Processed per Hour (essential pieces)
17 206 10
21 258 16
6 172 4
14 199 11
8 65 2
19 113 12
4 25 1

A brief analysis of the above information will require locating whether the number of defective items is linked to the number of items per hour produced, whether the number of defective items is linked with the amount of information processed per hour, and whether the number of items produced per hour has something to do with the speed of data processing. Setting the level of significance at ±=0.05 and rejecting the null hypothesis in case it is higher than the P-value, one will be able to perform the test and identify possible links between the variables mentioned above. It should be borne in mind that the p-value should be calculated for all three of the possible combinations; thus, the connection between the variables can be identified (Castaneda-Mendez, 2015).

As the ANOVA test has shown, there is a strong correlation between all of the variables mentioned above. Therefore, it can be assumed that the appropriate strategy should be chosen on the basis of the number of items produced, the speed of data analysis, and the error rates. Seeing that the p-value equals 0.00013, the null hypothesis can be rejected; in other words, there is a very strong correlation between the choice of the information management approach and the number of defects produced in the course of the companys operations (Agustiady, 2013).

Similarly, the main effects plot indicates that the strategy chosen to carry out the information management process, i.e., the amount of data processed, affects the output retrieved during the production process significantly. The plot shows quite graphically that there is a direct correlation between the above variables. More importantly, the graph also indicates that there is a link between the number of defective items and the speed of data processing (i.e., the choice of the information management approach). Particularly, the graph indicates that the three actors listed above are in direct proportion to each other. Hence, it is strongly suggested that the information management principle based on the principles of sharing and the adoption of the latest IT tools should be considered as the essential step in facilitating informational security of the entrepreneurship.

Reference List

Agustiady, T. (2013). Communication for continuous improvement projects. Boca Raton, FL: CRC Press.

Castaneda-Mendez, K. (2015). Understanding statistics and statistical myths: How to become a profound learner. Boca Raton, CA: CRC Press.

Jones, E. (2014). Quality management for organizations using lean Six Sigma techniques. Boca Raton, CA: CRC Press.

Pyzdek, T., & Keller, P. (2014). Process behavior charts. In The Six Sigma handbook (4th ed.) (pp. 293-392). New York, NY: McGraw-Hill.

Information Technology Project and Risk Management

Identify one technology risk and one non technology risk an organization may encounter when outsourcing a component of an IT project to a foreign country. Develop a risk management plan to manage these risks

According to Marchewka (2009), one technological risk is the shortage of indigenous information technology companies in the area of interest. This shortage leads to a deficiency of technically skilled staff, for instance, software developers and project managers. This is an extra cost because experts are shipped in to train the natives and then subcontract them. A shortage of indigenous IT companies brings in a new problem of inadequate software advancement bodies. According to Vetter (2009), in cases of such deficiencies, the call for new management proficiency is necessary and comes at a cost. Lack of experienced personnel results in the creation of applications that do not meet the requirements.

Political instability is a non-technological risk to consider. It has enormous effects on concrete business progression. Its presence affects the smooth running and operation of the daily activities of an organization. What is being experienced in Syria today destabilizes the capability to draw and maintain foreign investors. Potential investors shy away from politically unstable environments. For an organization that has already outsourced and there is political instability, it would suffer monetary loss, and if the services or products affected the daily running of the company, temporary closure may take place.

Risk Management plan

In order to avoid setting up a costly outsourcing venture, organizations need to set up risk management plans, to oversee the entire process. Vetter (2009) suggests that before outsourcing, organizations should seek experts advice on outsourcing; as such advisors have immense information on outsourcing relations. This is vital in making outsourcing decisions, as the benefits are not only visible but tangible. A risk management plan ensures that there are no future regrets. Training should be offered to ensure that the personnel is up to date with technology. In cases of political instability, the services that do not affect the day to day running of the business should be outsourced, and a backup plan should be put in place.

Clear knowledge and understanding of the outsourcing environment and its political stability, is vital in making decisions on outsourcing. This will enable the outsourcing company to know the upheavals and successes that may occur. As a result, a reliable entry and exit plan are formulated to be implemented when the need arises.

Why should the project team focus on both internal and external customers?

According to Marchewka (2009), the entire project is a customer sequence, which involves all the stakeholders, who are customers in one way or another. Maintaining early and constant communication with customers is vital for project accomplishment. According to the U.S. Department of the Interior Bureau of Reclamation (USDIBR) (2006), in order to focus on customers, project communication should be emphasized. The handout defines project communication as the exchange of project-specific information, which emphasizes the creation of good relations between the correspondent and the recipient.

By focusing on the internal customer, there is a well-timed and proper generation of the projects requirements, in terms of raw materials and technology to be used. In addition, product development is also timely and of expected quality. The project team forms the internal customer, where the supplier is the task manager involved in earlier stages of the project life cycle, which provides the inputs and communicates to the manager, who in turn delivers the goods to the customer who is a task manager involved in testing the product.

According to USDIBR (2006), customers are of help in improving project management by ensuring that the addition of value is a fundamental part of project management. Customers may have important and necessary resources or knowledge, to make a considerable contribution to the assignment. The importance of both internal and external customers in quality project development is the brainstorming of ideas and developing strategies for the completion of the project.

In quality planning, external and internal customers play a major role in identifying the standards required for the project. They constantly evaluate the project, to ensure that quality values are met. They also monitor the results to ensure they are in line with the set conditions. Quality improvement is enhanced by the customers, and as a result, the quality of project management is enhanced, giving rise to quality products.

Compare the views of Justen Deal, Scott Herren and Matthew Schiffgens. Why would these individuals have such different views of this projects implementation?

Deal, Herren, and Schiffgen had different views on the implementation of Kaisers Health Connect. Deal claimed that the trustworthiness and measurability to hold the large epic capacity were a problem, and thus the application of Health Connect could pose more problems.

However, Harren considered the measurability of the application as not being the issue, but the entire design of the Health Connect was to blame for the mishaps and its failure to sustain the expected workload. Schiffgens acknowledged the fact that large organizations like Health Connect, had contests along the way, but what mattered in their case was the fact that their contests were managed.

Herren stated that Health Connects problems were not associated with Citrix. Citrix had several other fruitful Epic distributions in other locations. Schiffgens countered Deals accusation, by stating that difficult moments were part and parcel of any business organization, but what mattered most, was how those impediments were managed, so as to create a positive business environment. He went further to claim that the disorders at Corona Data Centre were good, but what counted, was the fact that they had managed the situation.

The three individuals had conflicting views, because of the different positions they held in their respective organizations and each had varied intentions in stating their views. Deal, being a Kaiser employee, based his views on his daily experiences. Its possible that he was well-endowed with the functional variability of the project. He was informed of the shortcomings of Health Connect. Schiffgens was the spokesman for Kaiser, and was expected to fully protect the organizations public image in order not to lose trust from their customers. Herren had a duty to protect the image and reputation of Citrix systems and to dissociate it from any organization, which was going under in order for them to stay afloat in the market. He talks in favor of Citrix and distances it from Health Connect.

Should Kaiser terminate this project? Or should they continue with the implementation? What are the ramifications for terminating the project or continuing?

Kaiser Foundation should implement the e-health records management system, because this mode is efficient and thus improves health care provision. The efficiency comes in whereby, it is easy to retrieve a patients record and forward it for the clients examination. This saves on time, and thus several patients can be attended to within a short time. Emergency cases can be handled, because its easier to retrieve the patients records, and thus study the individuals past medical history (Schwalbe, 2009).

According to King (2009), the electronic health records management, aids in eradicating redundant processes. Moreover, the tedious paperwork has been done away with, thus presenting a tidy model of record management. This model has sufficient security in cases of data loss, because there are data backups. It is also easier to determine a new client from an existing one, hence duplicity is avoided. A medical follow up on a patients case can be enabled, because there is easier access to the patients records. Mechanical errors experienced in the paper system, such as wrongly entered data, have been managed.

According to Chen (2012), the adoption of an inclusive electronic health records system, has had far-reaching advancements in the health delivery sector. She claimed that scheduled visits and e-mail texts were easily managed. These patients aligned processes, have improved the health care that is being offered. Chen (2012) further claims that this mode has enhanced documentation. Consequently, this creates a reliable and effective medical system. This mode has enabled a connectivity of all the sections of health, providing units for instance pharmacies, laboratories, and inpatient outpatient support areas.

The consequences for the continuity of e-health records management system project are far reaching. According to Gurley and Rose (2004), the startup expenses for such a project, are usually exorbitant. Since most healthcare providers are usually in the process of cutting down costs, investing in such an expensive venture is a problem. Moreover, such an installation requires a certain level of information on the part of the patients.

The hospital staff are no exception, and they are also required to be taken through some courses that will enable them work perfectly with the system. This training means that the healthcare providers will dig deeper into their pockets, and this proves costly. Despite these impediments, electronic health records management systems, are necessary in a globalizing society, in order to see them through to the next level of technological advancements.

What, from a project management perspective, could Nestle have done better in implementing SAP?

In implementing SAP, there were a number of issues that Nestle should have done to ensure a successful and workable implementation. The participation of the workers and management staff in the implementation of the project was essential. This could have ensured that the workers acknowledge the changes that were to take place and the reasons for them. A forum to train the workers and the management staff could have been held to educate and hence introduce them to the new system. Moreover, through the said workshop, workers could have been made to acknowledge change consequently accepting to do things in diverse and up-to-the-minute ways.

Rushing to meet project deadlines was another issue that should have been taken aboard. What was necessary for Nestle was introducing a workable plan and not quickening implementation in order to have a new but ineffective system. To have a functional system, the compatibility of the new system and the old one should have been tested in order to incorporate the two into a wholesome running implementation. In conclusion, the necessity of a new system was to be clearly outlined in order to agree on a format in which the several divisions of Nestle could harmonize activities to bring forth a fully operational organization.

The primary lesson that Dunn says she gained from the project is, No major software implementation is really about the software. Its about change management. Do you agree with her statement? Discuss why you agree or disagree?

I agree with Dunns statement that any implementation is usually about the change management and not the software itself. First, before any implementation, it should be taken into account that the intended implementation is not going to work in a vacuum, but will be operated on by people, the management, and thus their acceptance of it is vital. Baekdal et al. (2006) note that change is about people, and in consequence their competence and self enthusiasm advances the functioning of the company.

The management needs to be persuaded to accept changes in the operation of the organization. This can be attained through workshops focusing on change readiness and personal change orientation.

Education on change readiness enables the workers to be keen on accepting any new implementation program that the organization has lined up. Baekdal et al. (2006) adds that change management introduces new ideals in the workers, and thus remedies them for any responsibly, ensuring that they accept any new implementation with litheness. In conclusion, change management enables workers familiarize themselves with new software before it is implemented. Moreover, it makes the feelings of the management known, about the intended implementation.

References

Baekdal, T.,Hansen, K.L., Todbjerg, L., & Mikkelsen, H. (2006). Change Management Handbook Handle change management projects more effectively. Web.

Chen, C. (2012). The Kaiser Permanente electronic health record: transforming and streaming modalities of care. Web.

Gurley, L. & Rose, B. (2004). Advantages and disadvantages of the electronic medical record. New York: The American Academy of Medical Administrators.

King, R. (2009). How Kaiser Permanente went paperless. Web.

Marchewka, J. (2009). Information technology: project management. New York: John Wiley & Sons.

Schwalbe, K. (2009). Information technology project. New York: Cengage Learning.

U.S. Department of the Interior Bureau of Reclamation (USDIBR) (2006). Managing water in the West: managing for excellence team 19- adding value to major repair projects. Web.

Vetter, R. (2009). The pros and cons of outsourcing. London: Alsbridge.

Information Management in Different Organizations

Introduction

Information Management has become a commonly used word in modern management enterprises systems and has gained lots of advantages over its usage in selected firms. Information management is defined as the acquisition, recording, organizing, storage, dissemination, and retrieval of information. Good information management has been described as getting the right information to the right person in the right format at the right time. (Business Definition for Information Management).

However, the general opinion about information management is that literature does not support the view, but management theorists and practitioners advocate that it is beneficial to corporate. Proper information management can help an organization in the effective communication of information and ideas. Information management or managing information refers to using and managing the information for accomplishing the objectives of the organization. Here the current information management system of the Military of United Arab Emirates (UAE) is analyzed, and a technology-oriented new information management system is recommended. As proper information management has a significant influence on the success of any organization, the UAE military organization also has a system of information management. However, it requires some change to adjust to the present technological advancement of the world. Traditional information management systems used in organizations were almost manual, but today it is difficult to imagine an information management system, which does not make use of technology in one way or the other. The management of information is a challenging task, just like the management of personnel or employees. A full-fledged information management system shows the effectiveness of an organizations efforts in creating an organized information management system, just like proper management of employees shows the effectiveness of the HR management system of an organization. Management of information of a military organization is a little complicated and different when compared to other forms of organization. Most of the information of a military organization is strictly confidential and requires careful management.

Information management and success of an organization

The way of management of information adopted by an organization has much influence on the success of that organization. An efficient information management system helps in planning the overall activities of an organization. Also, the managers who make crucial decisions require different information. If the organization has a good information management system, the decision-makers can make their decision easily correctly. The apt and timely decision is essential for the success of an organization. If an effective information management system exists in an organization, it means that there exists a good flow of communication. In addition, when the organization wants to communicate with the outsiders like the government and other organizations, this can act as a good aid, thereby ensuring timely execution of the plan of action of the organization. If the information is properly organized, it can bring coordination between different departments, which is essential for the success of an organization. If an organization is managing the information in a wise manner, it can easily store, process, and access the information as and when required for the achievement of the organizational goals.

Managing information in a military organization

As stated in the introduction, the management of information of a military organization is different t from the management of information of other organizations. Unlike information management in any business organization, information management in a military organization is different. This is because the fact that majority of the information of a military organization is strictly confidential and requires utmost care when dealing with this information. Therefore, a secured information management system can only ensure and keep the confidentiality of the information. Communication between different persons in different cadres is very important. If the communication is effective and efficient, then it is easy to achieve the objectives of the military and achieve the desired results. For this, military originations follow a well-structured information management system so that it can be used for future purposes also. In times of war, it is essential to analyze the past information and background of the opponent. This is facilitated by a proper information management system.

Military of United Arab Emirates

There are different divisions for UAE Military; they are explained below:

Emirati Army

The headquarters of the army of the United Arab Emirates is situated at Abudhabi. The army has a well-designed structure, and they are equipped in such a way that they are ready to serve the nation when the need arises. There are two infantry brigades in Dubai.

The army mainly uses different arms imported from the United States of America and France. The armys armored capability has been improved as part of the UAEs military modernization program. (Military: Emirati Army).

Emirati Navy

Emirati Navys headquarter is in Abudhabi. Also, the army has facility centers in some other parts of the United Arab Emirates. There is a battalion called the marine battalion in Emirati Navy. Different arms are used by the navy for providing better defense services to the country. The naval aviation department has a number of helicopters that are ready to use as and when required for war purposes. As part of the modernization of the military program, the navy is seeking to improve its blue water capabilities with the construction of six multi-role corvettes and to increase its amphibious capabilities through the attainment of assault and landing craft as well as amphibious armored personnel carriers for its marine battalion. (Military: Emirati Navy).

UAE Air force

The Air force department of receives funds from all seven emirates; these funds are used for the purpose of daily operations of the Air force. Some of the emirates have royal flights. There is a mutual understanding between different states of the country, and they co-operatively control different aircraft and transport systems. There are aircraft for the two regions, namely western command and central command of the Air force. It is also abode to the Abu Dhabi Royal Flight, the AH  64As, the Cougars, and the Puma transports. (UAE Air Force).

IT and non-IT communication in the military sector

Communication is an important part of the functioning of the military service. Compared to other public and private sectors in a country, the military sector transfers confidential data. Therefore, their communication deserves more importance than any other sector. For this purpose, authorities use both IT and non-IT methods. Usage of IT and non-IT methods are based on the situation of the usage and the technology used for the communication and data transfer. These two methods have both advantages and drawbacks. Compared to non-IT communication, IT-based communication and information transfer is secure and safe. The reason is that it can offer sophisticated technologies for protecting the confidentiality of the data. The following part discusses IT and non-IT communication in the military sector and the process of communication. Digital communication is a part of communication with the help of information technology. The digital communication method is used for transferring data with high security in the military. Communication through mobile phones and GPS navigators are commonly used in the military sector. Soldiers carry cell phones, and they can hand over information from one to another or to their superiors and subordinates within seconds. New Communication devices like mobile phones are relevant for the communication process in the military, especially from the hostile zone. The functioning of mobile phones and GPS find their root through computerized traffic signals. For day-to-day purchases in the military, communication from various parts of the military services is essential. The information grid is used for the purchase and its documentation. Some other IT-based methods used in the military for communication are Personal Digital Assistant (PDA) and iPod and pen drives. Military authorities use devices like pen drives, which can store multi-gigabyte of data, to transfer a large volume of data in a confidential manner. (Donnelley).

Apart from the above-mentioned methods, other IT-based communication methods commonly used in the military sector are the Internet, e-mail, videoconferencing, telephone, etc. By using the Internet and e-mail communication, transferring of data can be done rapidly and easily. If the military officers want to inform some matter to more than one subordinate, e-mail is the best choice. IT-based video and voice conferencing is used in the military sector for communicating with people, especially soldiers in different parts of the country and outside the country. According to the website training Links, Video conferencing that meets key security criteria is a crucial command-and-control tool for military commanders, providing the information and situational awareness they need to plan, execute and manage military operations.(Cisco Provides IP-Based Video, Audio, and Web Conferencing for U.S Military Operations World Wide).

Military satellite communication is very popular now. This is also an IT-based communication method, and this is the core part of communication today. Its importance increases when the military force is camping in a foreign territory.

All the above-mentioned points indicate that Information Technology plays an important role in the field of communication in the military sector. Communication through e-mail, mobile phone, videoconferencing, satellite and data, and information transferring through pen drive, CD, iPod, PDA, etc., come under this type of communication.

All kinds of traditional communication methods come under non-IT-based communication. That is communication through letter or by direct meeting etc. In IT-based communication, there is a possibility for loss of data. However, it consumes more time than communication with the help of IT-based mediums. In certain situations, communication through the non-IT medium is preferable and more secure than the IT medium. Sometimes, for getting more authenticity and confidentiality, this type of communication becomes essential. At that time, they used communication methods like telegram, post, and messenger. All these methods need more time and expense.

Data warehousing and access in the military secto

Daily huge amount of data storage and retrieval is done in any military sector. This data may be confidential. The military embedded storage system provides a reliable and large volume of data storage in the ground and air environment, which separate environmental parameters. The military sector establishes a fiber channel and sufficient software platform for this purpose. Major environmental parameters are.

  1. Labs or fixed ground installations:  Generally, commercial technology takes responsibility for this job.
  2.  C41SR aircraft in-cabin:  For the functioning of this system, it is a semi-rugged storage subsystem, which requires vibration from the aircraft. For the proper functioning of this system, Hard disk drives are used. This is suitable for reconnaissance aircraft. Here the basic component used is commercial drives by way of semi-rugged packaging.
  3. C41SR aircraft out-of-cabin:  In this category, pieces of equipment are carried in an outer pod. In this aircraft, a hard disk is used with the support of an independent pressurized camber and heating elements. This is useful in aircraft in low-temperature situations.
  4. Tactical combat platform:  Here, solid-state drivers with stable parts are used for data storage. This platform is suitable for fighter aircraft, helicopters, and tanks.

An embedded military system uses COTS packaging for the right delivery of storage products with relevant operational features. A disk interface is essential here, and Fibre Channel (FC) is applicable for it. Using FC has some advantages. It provides an invariable duty-cycle function in heavy transactional storage situations; it has effective scaling between different Storage Area Networks (SAN) and connection among facts recorders, and disk drives are very fast in it.

In the military, the storage and retrieval of data should be robust and consistent. The embedded military system provides all these features. Because of this reason, military sectors prefer this system for their data storage and retrieval. (Bohman).

Information flow in the organization and decision-making

If a proper flow of information exists, the management of information would be an easy task. Mainly three kinds of information flow exist in the military organization. They can be as follows: minimum, adequate, and excessive. In minimal information flow, there is minimum interaction between the members or participants involved in the network. In this communication, the benefits would be less, as there is no continuous flow of information or interaction. Inadequate information flow, there is no unnecessary communication or flow of information, but there is only a flow of required or apt information, thereby ensuring better results. In excessive information flow, there is an excessive flow of information in which there will be unnecessary information resulting in high cost as it requires the processing of all the information that is flown. Therefore, it is better to have a network of communication or information flow in which there is adequate information flow. It is already mentioned that the relevant information is required for taking various organizational decisions, whatever be the nature of the organization, whether it be a military organization or non-military organization. If there is a proper flow of information, then only the management or top authorities can take the appropriate decision. The information needs to be flown from bottom to top as well as top to bottom. Decisions are to be taken in war times as well as in peace times. The nature of decisions in war times and non-war times would be different. In war times, quick decisions need to be taken in no time. Proper communication is significant, especially at the time of war in the military organization for communicating the development in the war and for the corporation. (Bobby. F).

Issues in the present information system of UAE military service

An example of information flow in the UAE military is as follows: Usually, the organization follows a systematic procedure. For example, the details of the meeting of the top management need to be communicated to the bottom level staff; this information is first stored in the storage system that the organization has. Then, the bottom-level staff, using the access code provided to them, accesses this information in a systematic manner. The information flown in the organization should only be a valid one which the top-level authority has the responsibility for checking the validity of the information. The relevant and presently required information is flown under this system. The authenticity of the information is also ensured as the source of information is clearly mentioned at the end of the information. The information is passed only after checking the accuracy of the information, and utmost security is ensured as different security measures are used for the transmission and access of information.

During the recent war, a need arose for top management to communicate some important matters to the bottom level as well as to the armies regarding the war details. However, it was experienced that proper information did not reach the concerned parties. A complaint reached the management desk about the redundancy of the data and the inadequate information obtained by the armies and staff.

Findings

From the above-said example and analyzing the present information system of UAE military services, we can reach the following findings:

The timing of the flow of information in the present system is reliable. The only factor which requires more focus is on improving the efficiency of the current system with respect to sufficiency in storage capacity, security, etc. The UAE military has to store a lot of information, and these have to be flown from one to another. During the information flow, there arises a data loss due to insufficient data storage capacity of the server. A lot of information has to be stored in the system coming from management and from other sources. Strict checking on the validity of the information from other sources like logistics, personnel data, application files, books, manuals, etc., is required before storing it.

In addition, it was seen that a direct link should be created between the server, management, armies, and staff.

Recommendation letter addressing the advantages of the new system and the key issues of the present system

Report to the Senior Manager

Subject: Key issues of Present management information system and the benefits of the proposed information system for UAE military services

Make no mistake; information security is one of the most important military issues of the 21st century. (The Importance of Military Information Security John Keller, Editor in Chief) An analysis of the present information system has been analyzed for reviewing the complaint received at the management desk. From the analysis, it is judged that the current system lacks sufficient storage capacity due to the entry and storage of invalid information in the webserver. It also requires coordination between the server and different sources. A new information repository and controller system along with a server is proposed as a solution. The working of this system can be as follows: the information flow from the server is the same as the previous system, but change occurs only in the inflow and storage of information towards the system. The following figure shows the outline of the proposed system.

The working of the proposed system.
Figure 1. The working of the proposed system.

In the proposed system, data entering is done in two ways. In the case of management professionals, data is directly entered into the server, and from there, the server transfers it to the information repository and controller system for permanent storage, and from there, data is transferred as and when required. The data from other sources like logistics, personnel data, etc., are directly entered into the information repository and controller system. In this system, username and password limit the entry of information into the system as the user wants to log in with his username and password for data entry. After the entry of the information and before storing it, the information repository and controller system check the validity of the information. This system may comprise a data processing apparatus and different storage media for storing, based on different classes of information. In the first step, the data processing apparatus identifies the contents in the files entered. If any duplication occurs, the redundant data are deleted to enhance the validity of the information stored in the system. In the second step, files are classified according to the nature of the information. In the third stage, permanent storage of one copy of the content is done. If the information is required urgently, a request is passed from the server to the information repository and controller system, and the information is passed according to the request. Based on the urgent nature of the information entered, the system transfers it to the server and gives direction to the management.

Advantages of the proposed information repository and controller system

The overall functioning of the organization, mainly in the areas of security, the accuracy of the information can be enhanced with the help of the proposed system. It helps in improving the storage capacity of the server. Checking the validity of the data through the data processing apparatus helps in eliminating redundant data in the server. The validity of the data is essential because of the reason that if the data are not valid, the decision based on such data goes wrong. Quick and reliable information flow is possible as the urgent data gives a signal to the server for transferring the information to the concerned people. It improves the quality of the decision of the management, as only valid information is stored. Adequate information is passed to the concerned individual to ensure the accuracy and adequateness of the information. Data loss during the information flow is eliminated. Coordination of all activities is done with the combined working of web server and information repository and controller system.

Conclusion

If an organization is properly managing the different information passed through the organization, it can ensure success. The timely and apt decision has a significant role in the success of an organization, and the said decisions are taken on the basis of different information available. The management information system provides several benefits to the organization despite the nature of the business in which it is involved. It helps in the decision-making and communication process, which exist in the organization. In the case of military organizations, an information system is very much essential due to the confidential nature of information passed from one source to another. Change Management means one of two thingsdealing with unwanted or unexpected change due to circumstances beyond control (reactive), or taking steps to bring about deliberate change (proactive). Todays military services are challenged on both fronts as they face dynamic battlefield logistics and ever-changing technology. (The Challenge of Change. (Military Service Change Management)). It may be concluded that the proposed information system helps to recover from the problems of the present system and to improve the system.

Works Cited

Bobby. F, Brashears. Building a Communications Feedback System in the Military Organization. DTIC: Defense Technical Information Center. 1973.

Bohman, T. Military Data Storage: Tough Enough for Duty. Hardware beyond the Backplane: Systems Issues. 2006.

Business Definition for: Information Management. BNET. 2009. Web.

Cisco Provides IP-Based Video, Audio and Web Conferencing for U.S Military Operations World Wide. Skip Pratts Training Links. 2005.

Donnelley, Harrison. Q& A: Lieutenant General Keith B. Alexander. Military Information Technology: The Voice of Military Communications and Computing. 2009.

Emirati Forces. Global Security.org. 2009.

Military: Emirati Army. Global Security. Org. 2009.

Military: Emirati Navy. Global Security. Org. 2009.

The Challenge of Change. (Military Service Change Management). Encyclopedia.com. 2005. Web.

The Importance of Military Information Security John Keller, Editor in Chief. Military & Aer Space Electronics. 2009.

UAE Air Force. 2009.

United Arab Emirates- Armed Forces. Encyclopedia of the Nations. 2009.

Real Estate Companys Information Management

Introduction

This letter addresses one of the crucial concerns that real estate organizations face in the global market. As a developing company, this firm needs to consider the issue of data management in the real estate setting to develop a competitive advantage. Because of the challenges that the processing of data and forecasting changes in the real estate context involve, a range of companies face a rapidly developing crisis. Therefore, a report that covers essential points concerning the use of innovative Management Information Systems (MISs) for real estate organizations is needed.

Information Management

The report addresses the concerns and constraints that real estate firms have to face during the implementation of their key objectives and management of customers needs. The focus on MISs as the tools that will offer this firm a vast exposure to its target audiences, potential partners, and future investors will be needed (Amannah 41). By incorporating the proposed tools into this companys functioning and data management framework, one will increase its resilience rates in the highly competitive market and facilitate its future growth.

In addition, integrating the proposed technological innovation into the context of the organization will help to maintain contact with customers and the members of the supply chain management (SCM) process more actively. As a result, buyers will be informed about emerging opportunities and options, whereas SCM activities will be implemented within the set deadline. Thus, the quality of the organizations performance will rise, making the firm more competitive in the real estate market.

Conclusion

The current approach toward information management makes this organization lose several crucial opportunities in managing data and keeping contact with its stakeholders. Therefore, the incorporation of MISs into its framework will lead to better performance and enhanced SCM activities. For this reason, the proposed system will need to be institutionalized within the corporate setting.

Work Cited

Amannah, Constance Izuchukwu. Management Information System for Real Estate and Property Management. International Journal of Computer Science and Mathematical Theory, vol. 3, no. 1, 2017, pp. 40-70.

Information Management and Related Issues in Business

Introduction

Information gathering, dissemination and storage have changed remarkably with the advent of technology. Traditional methods that were used to conduct business in many organizations have been changed to increase effectiveness. This basically implies that organizations must embrace the use of IT. However, there are many IT-related issues that emerge on a daily basis. In a bid to identify the IT-related issues that organizations face today, I conducted a research that highlights them and their importance.

The logic used in coming up with the issues is the identification of those which seem common in a large number of organizations. The research covers all organizations including the large and small ones. It also covers all types of organizations among them profit and non-profit ones. It can be applied across many sectors because the IT issues faced by organizations are not restricted to specific sectors (Top Five Privacy Issues Organizations Must Tackle, 2012).

Issue 1: Information Management

Management of information entails gathering and managing information from different sources and its dissemination to various audiences. The life cycle of information is important and involves several processes among them how it is collected, processed, utilized, retained, retrieved, shared and eventually destroyed. Management of information touches on all individuals who handle it. It is comprised of the control and organization exercised during processing and making it available.

Most organizations experience problems with regard to management of information. Some of the basic issues that pose a challenge include ownership establishment, responsibility and the manner in which the information is used. These are important issues to many organizations since they protect the integrity and quality of information (Parker, 2012).

Data quality is among the most important concerns of information management. It covers availability, relevance and accuracy among other things. In addition, it includes the security of information and its capacity to be maintained (Mutch, 2008). The value of data quality in organizations is necessitated by widespread data use in business intelligence and the rise of information sharing. The value of information can only be increased when the right protective measures are put in place.

Business intelligence which involves collecting information is regarded as an important way of gaining a better understanding of a business organization and its clients. It is therefore important for business organizations to manage information appropriately, protect it and make it available whenever it is needed. Considering the use of programs for managing information may be an important decision for organizations to manage their intellectual capital (Munson, 2011).

Issue 2: Emerging technologies

The second IT-related issue that organizations face is emerging technologies. These are associated with both opportunities and perils in many organizations. One of the emerging technologies that is of concern to organizations is cloud computing. This is the process through which virtualization procedures and the internet are used to make an environment where provision of security, data, infrastructure and other applications is enabled through internet based resources. Users are able to identify transmission channels, storage sites and processing locations on the basis of the type of cloud. The encryption of the data in the cloud is determined by the user.

The issues that arise from this emerging technology include recovery of data, its availability and legislative issues on personal information. Individuals who use cloud are concerned about the location of data, the effectiveness of data control mechanisms and the ability to get the data when required to effect certain operations. Social networking sites such as twitter, MyLife, facebook and Classmates.com have found increased use in business settings.

Organizations use these sites in a limited way but the employees use them widely. Most organizations are concerned about the time employees spend on the sites and the business information they post. Studies have shown that most IT decision makers express their concerns regarding the security risks associated with the use of social sites by employees. Many cases of employees who download software not connected to work to corporate computers have been recorded. It is crucial for organizations to develop procedures that can monitor emerging technologies and evaluate their risks and opportunities. IT risks management programs may be introduced to assist in such efforts.

Issue 3: IT Governance

The third IT-related issue that organizations face is IT governance. It entails the organizational and leadership structures that ensure IT applications meet the set objectives. It encompasses audit committees and directors with the support of line and senior organizational management. Organizations face challenges in that they lack effective activities of IT governance. In addition, the audit committees and boards of directors also lack enough knowledge on issues of IT governance. Activities related to IT governance are important in enhancing the use of IT to support the goals and objectives of an organization. It has the ability to transform the supportive role of IT into a tool for enabling the creation of new services and strategies.

Issue 4: Consumer Privacy Issues

The fourth IT-related issue that is affects organizations is consumer privacy issues. Due to the fact that people nowadays live in a data age, organizations generate and use a lot of information on a daily basis. The manipulation and storage of this information is further facilitated by technological developments. However, despite the importance of these developments in gathering and analyzing customer information, organizations face many privacy issues that put business relationships at risk.

They ask questions with regard to the information that can be collected, its storage mechanisms and use. On the other hand, the customers have questions concerning what organizations collect and where it is applied. Consumer privacy is a sensitive issue to many organizations with regard to the information that is collected from the consumers and how it is used. Information gathering may also raise concerns regarding the reputation of organizations in this data age (Data protection and consumer privacy  the issue, n.d)

Issue 5: IT Resources and Skills

The fifth IT related issue that organizations face is IT resources and skills. There has been a decline in the availability of IT skills in many organizations. One of the factors that have contributed towards this decline is economic recession. Most organizations require skilled IT workers regardless of whether they process in large or small platforms. This is because there are many issues such as business solutions and design that require the services of experts in IT. It is important to have IT professionals who can integrate technology and business matters. This ensures that the organization achieves proper communication of technology issues to support the organizational needs.

Conclusion

It is important for business organizations to embrace the use of technology in business operations. With the current trends, it is virtually impossible for any organization to operate without technology. However, there are various IT related issues that must be identified and addressed fully. This is because unless they are addressed, they might lead to poor performance. Some other issues may cost organizations huge amounts of money if they are not addressed.

References

Data protection and consumer privacy  the issue. (n.d). Web.

Munson, C. (2011). Business & Technology Issues. Web.

Mutch, A. (2008). Managing Information and Knowledge in Organizations.New York, Taylor & Francis.

Parker, R. (2012). The top 10 tech issues. Web.

Top Five Privacy Issues Organizations Must Tackle. (2012). Web.

Walmart: Information Management System

Walmart is a retail company that integrates different types of retail stores and has a complex structure of warehouses, supply chain partners, and stores. As a result, its information management system (IMS) is similarly immense, incorporating logistics, transportation, supply chain management, customer management, online shopping, delivery, and more. The business currently incorporates various technological solutions to reach its objectives. These include cloud data storage, satellite communication, blockchain technology, the Internet of Things, radio-frequency identification (RFID), electronic data interchange (EDI), artificial intelligence (AI), robots, and drones (Garcia, 2020). The innovative technology implementation aligns with Walmarts goals of dominating the retail market, expanding its stores contents and locations, and improving logistics.

Walmarts warehousing and transportation combine the use of the Internet of Things and the vendor-managed inventory model. The latter implies that suppliers are responsible for using data from Walmart databases about the companys inventory levels and sending the necessary stock to Walmart (Greenspan, 2019). In turn, Walmart handles the transportation of goods from its warehouses to retail stores and utilizes robots for automated unloading (Heller, 2018). By using this system, Walmart is able to monitor and record its different inventory types and outsource some tasks to its partners while relying on its cloud-based database. The Internet of Things is implemented in warehouses in the form of sensors that regularly check the products status and food contamination risks (Greenspan, 2019). Similarly, transportation is streamlined with RFID technology and EDI systems to ensure faster product flow (Garcia, 2020). These technologies create a network that allows for updating the inventory databases in real-time.

Walmart continuously seeks to use new technology to retain its competitive advantage in the retail market. The companys cloud computing is a unique feature that allows the business to store large amounts of information without sacrificing the speed of information access and update (Garcia, 2020). Another potential strong aspect is Walmarts early adoption of blockchain, robots, and drones. Currently, Walmart is partnering with three operators to develop a system of drone deliveries that is already at the stage of implementation and expansion in several states (Singh et al., 2022). Furthermore, Walmart uses automation and AI to improve its delivery systems (Singh et al., 2022). Faster delivery, better websites and applications, and innovative approaches to retail experiences ensure increased customer satisfaction.

As noted above, the combination of Azure-based cloud storage systems and the vendor-managed inventory model allows Walmart to excel at better supply chain coordination. The use of technology and delegation of tasks streamlines the transportation of goods, minimizes delays, and lowers the businesss costs in controlling stock flow (Garcia, 2020). By simplifying the process and including vendors in warehouse management, Walmart can focus its resources on improving customer experiences. Additionally, Walmart uses EDI systems to monitor orders and determine product inventory for all goods (Garcia, 2020). This technology makes product flow more informative, which raises the quality of data and lowers the risk of low-running stocks.

Implementing various technological advancements allows Walmart to create a system that provides detailed information about each product in all warehouses, stores, and other locations. Vendors use this data to resupply the retailer without delays. At the same time, this data ensures that Walmarts online applications for customers provide them with the best customer experience. It is vital for Walmart to focus on its technologies to manage the international business efficiently, decrease the risk of a low and high stock, and store, share, and update large quantities of data. Information management systems used at Walmart allow the company to sell a wide variety of products, offer quick delivery, and increase its profits by lowering logistics costs.

References

Garcia, G. (2020). Information systems utilization of an organization: The case of Walmart Inc. [Thesis]. College of Computer and Information Science.

Greenspan, R. (2019). Walmarts inventory management. Panmore Institute. Web.

Heller, L. (2018). 7 ways Walmart is innovating with technology. Retail Dive. Web.

Singh, V., Kaur, M., Vashishth, P., & Kumar, S. (2022). Walmart innovation strategy uses emerging tech and acquisitions. GreyB Services. Web.

Lenovo Group Ltd.s Operations and Information Management

Executive Summary

The purpose of this paper is to provide an overview of operations and information management and related concepts. The description of operations and information management is informed by literature review. The influences made by operations management on different spheres are discussed. In addition, the researcher critically analyses the external and internal factors which affect the manufacturing process design at the smartphone division of Lenovo Group Ltd. The impact of five operational performance objectives on process design and layouts is also discussed in detail.

Introduction and Background

The purpose of every business is to produce some kind of product or service. Competition prompts companies to maximise the use of assets and develop such business processes which will allow them to deliver their products or services to customers in the most efficient way possible. Those companies which fail to commit to the idea of constant process improvement are bound to find themselves at a disadvantage.

The field of corporate management is dynamic and reflects the responsive nature of business (Ates & Bititci 2011, p. 5601). The changing nature of business means that organisations are required to constantly deliver innovative responses through the optimisation of business operations and the implementation of new, more efficient business practices (Ates & Bititci 2011, p. 5601). Because of this fact businesses came to understand the importance of operations management in improving organisational performance.

The concept of operations management is concerned with the processes designed to deliver products and services to customers (Slack, Chambers & Johnson 2010, p. 2). Naturally, due to the fact that a variety of companies deliver different products and services in specific business environments, the design of operations varies. A number of internal and external factors influence process design, operations management, and development. This paper seeks to address the issue of operations and information management and the variables which influence the design of operations. The researcher critically discusses the main factors that influence the manufacturing process design at the smartphone division of Lenovo Group Ltd. In addition, the role of the five Operational Performance Objectives is discussed in decision-making associated with process design and layouts.

The Overview of Operations Management Theory

Operations management is a concept that describes the activity of managing the processes between the production of a product and its delivery to the customer (Slack, Chambers & Johnson 2010, p. 4). Service operations management addresses the same processes in the service industry.

In its essence, operations management is concerned with managing a business process. A business process can be defined as an established pattern of activities followed to produce a certain outcome (Forster 2006, p. 4). A business process design may have variability, some internal or external factor which impacts the design of the process. An example of variability may be the delay of shipment with raw materials used in production. The greater the variability is, the bigger the impact on process development is.

There are several general approaches to process management. In the manufacturing industry, the following approaches are outlined: project, jobbing, batch, mass, continuous process. In the service industry, the following approaches are defined: professional services, service shops, and mass services (Slack, Chambers & Johnson 2010, p. 665).

The layout of an operation can be defined as the allocation of resources and tasks, which happens during the production and delivery of a product or service (Slack, Chambers & Johnson 2010, p. 179). Several layout types are defined by the researchers. These include: fixed-position, functional, cell, and product layout (Slack, Chambers & Johnson 2010, p. 180).

The concept of operations management is directly connected to the operations function of an organisation (Slack, Chambers & Johnson 2010, p. 4). Every company produces some sort of output, be it a product or service, and as such, the operations function is inherent to all businesses. Operations management has direct implications for business profitability and sustainability. The continuous effort towards refining the design of operations will allow the company to stay ahead of the competition and therefore, stay in business as long as the improvement is made.

Due to the increasing importance of technology in business operations, the concept of information management was developed to address organisational activity in the field of information technology (Slack, Chambers & Johnson 2010, p. 212). Information management is concerned with the design of processes established to allow storage, management, and sharing of information within the organisation. A broader definition of operations management includes technical and information systems activities as part of the operations management (Slack, Chambers & Johnson 2010, p. 5).

Most todays businesses depend on the flow of information between various stakeholders: the employees, the public, other organisations, etc. Effective information management is vital to allow for timely and secure management of information within organisations. Such management is aimed at establishing the infrastructure and necessary software solutions intended to maximise business efficiency through collecting, storing and analysing operations data. With the shift towards integrated communications, information management plays an important role in assisting a company in creating and sustaining integrated communication on different operational levels. Integrated communication requires cross-functional planning and monitoring, which is impossible without proper information management. Depending on the size and nature of business, information management may be concerned with setting up a simple Intranet network, or implementing a set of integrated business-management applications known as ERP.

Supply chain management is a part of operations management, and it refers to the organisation of all supply chain activities, with the goal of creating the best customer value and competitive advantage (Boyer & Verma 2009, p. xvii). A supply chain is the means by which a company brings its products or services to the marketplace (Straus 2012, par. 1). The management of the company is responsible for the creation of a corporate strategy, a broad set of policies and plans which coordinate operational goals. Operations managers develop operations strategy and an efficient supply chain strategy in order to achieve certain strategic or competitive priorities.

The Impact of Operations Management

Operations management is critical for every organisation activity, successful maintenance of which ensures that the company will perform decently due to the appropriate production and redesign of business processes (Slack, Chambers & Johnson 2010, p. xix). It has an enormous impact on various spheres such as decision making, customer satisfaction and loyalty, and overall performance.

As operations management deals with the administration of various activities, it presupposes the necessity to formulate strategies for their maintenance. It is tightly connected with such specific topics as scheduling, planning, or control. Operations management is targeted at finding the most appropriate and useful solutions so that they incline to the main objective functions. In this way, duration, cost or usage of a particular product is taken into consideration when making a decision. Coming to right conclusions, managers align those business activities that should be accomplished with suitable steps and characteristics. When management step is failed, no well-grounded decisions can be made.

Customer satisfaction is also likely to be affected by operations management. In this way, it can depend on the way the product or service is delivered to the client. The most vivid example can be the duration of the waiting time. When clients expect to obtain something, they tend to be positively approached initially, but delays in the distribution are likely to cause problems. The speed of the delivery is a part of operations performance that depends on management. Professionals are to pay enormous attention to the speed, dependability, and quality of their products and services if they are willing to ensure customer loyalty. Managers decisions, in this way, can attract more clients and make them satisfied or lead the company to the bankruptcy because of client attrition.

In general, it is considered that operations management practices can substantially improve organisational performance through the procedures and methodological solutions that are maintained on the shop floor. Thus, managers are to utilise appropriate approaches and specific methodologies that deal with all spheres of their business to be able to solve different kinds of problems. Processing, warehouse and material management tend to be the most critical elements in this framework. For example, World Class Manufacturing approach should be used when considering workplace maintenance while Total Quality Management should focus on specific tools that provide an opportunity to ensure high quality of products and their delivery (Battistoni et al. 2013, p. 3).

All in all, operations management is expected to enhance quality, reduce production time, improve human resources management, simplify accounting, increase profits, and reduce stocks.

Company Information

Lenovo Group Ltd. is a Chinese personal technology company, one of the biggest personal computer vendors in the world. In addition to personal computers, Lenovo produces a variety of other technology products, including servers, smart televisions and mobile devices such as smartphones and tablets. Lenovo has a growing global presence and currently operating in over 160 countries around the globe. Lenovo is pursuing the strategy of growth through merger and acquisition. Recently, Lenovo purchased well-known American technology company Motorola.

The focus of this paper is the operations management of the smartphone division of Lenovo Group Ltd. The smartphone division manufactures Android smartphones under brands Lenovo and Motorola. Lenovo uses vertical integration to acquire greater control over product development and supply chain operations through owned manufacturing capabilities (About Lenovo n.d., para. 5). This business model allows the company to remain competitive in one of the most competitive industries  smartphone business.

Currently, the company is number four smartphone manufacturer in the world (About Lenovo n.d., para. 7). The companys mission is to become the leading personal technology company in the world (About Lenovo n.d., para. 8).

The manufacturing process of Lenovo smartphones is done by the traditional method of production line and includes the following steps:

  • production of motherboards and other necessary components;
  • quality testing of components produced in-house;
  • assembly of smartphones;
  • testing of smartphones;
  • packaging of smartphones;
  • storage and delivery.

Factors which Influence the Manufacturing Process Design

Lenovo applied operations and information management to establish an efficient production process. The design of the manufacturing process at Lenovo is dictated by the need to produce a large volume of products. The type of manufacturing process used at Lenovo is the mass process since the company produces a limited number of smartphones in large volumes. The need for high-volume production which is associated with a relatively low degree of product variety necessitates a repetitiveness of process designs, and the development of a core process which remains largely unchanged with the introduction of new products (Slack, Chambers & Johnson 2010, p. 93). The need for high-volume production with little product variability is the main internal factor which influences the design of the companys operations.

Mobile division of Lenovo produces smartphones, and it has to establish a supply chain to purchase those components which are not manufactured in-house and create and maintain facilities where these components and smartphones are stored. Warehouses and necessary infrastructure are used by manufacturing firms like Lenovo to store goods produced in advance and sustain a steady supply of smartphones. As such, Lenovo has to establish and maintain storage facilities and organise the delivery of its products to customers. This is another internal factor which dictates the way manufacturing process is organised.

In addition to internal factors, business settings have a profound effect on the requirements established for operations and information management (Slack, Chambers & Johnson 2010, p. 11). In the case of the smartphone division of Lenovo, among the external factors the most important ones are demand fluctuations, rapidly developing smartphone technology, rising quality expectations, and increased price competition, as well as the infrequent introduction of new products. These factors prompted Lenovo management professionals to develop innovative responses to the changing business conditions.

Since Lenovo is a manufacturing company, is has to produce the right volume of smartphones to correspond to the customers demand. As such, Lenovo has to adjust demand to fit available production and storage capacity. In this regard, Lenovo uses lean approach to establishing a demand-driven supply network (OMarah n.d., para. 2). The model of lean thinking implies achieving greater efficiency by eliminating waste, i.e. such practices or activities which negatively affect business performance, and use lean principles to creating better customer value. One of this principles is the adjusting of production to meet demand.

The company uses an end-to-end value chain approach, with hard-line control over at least sourcing, manufacturing, logistics and planning to meet supply and demand (OMarah n.d., para. 2). Lenovos supply chain includes an expansive infrastructure, which is leveraged to develop new products using existing logistics and IT solutions and immediately affects the companys operating and financial performance. Lenovo expands its supply chain management to various existing locations as part of its business strategy. The company focuses on the developing markets outside Chine and invests in the infrastructure in this region (About Lenovo n.d., para. 5).

Smartphone technology has been developed rapidly with new, innovative products presented every one or two years. This fact means that smartphone manufacturers have to establish such production process which can remain largely unchanged with the introduction of new smartphone models. Lenovo uses the production line method of mass production of smartphones and components, which means that the company can relatively quickly produce a supply of new models to respond to changes in consumer preferences. The repetitive design of Lenovo smartphones is another measure taken by the company in response to the rapidly developing smartphone technology. Such design allows the company to introduce new smartphone models with better characteristics with minimum design changes and using the same production processes.

The primary goal of any business in a competitive industry is to find a competitive advantage and establish it through operations. The smartphone market is a ferociously competitive one with a number of technology companies offering the same or similar products locally and globally. Due to the competitive nature of this industry, the manufacturers have a limited ability to regulate prices. The pressure from Chinese manufacturers which operate at very low gross margins necessitates using all possible means to keep costs of production low. This is one of the factors which influence the design of Lenovo manufacturing process. In order to contain costs, the company produces smartphones in large volumes and at least partially uses components manufactured in-house. Both of these strategies allow the company to cut production costs through standardisation and vertical integration of components supply.

Customer-induced variability has an effect on the design of the manufacturing process at Lenovo. If customers do not buy Lenovo smartphones, the company will have to cease the production to limit financial losses. If customers buy the companys smartphones but are not satisfied with their quality, they are likely to penalise the company and Lenovo will have to make some changes to its production pipeline. As such, Lenovo pays special attention to quality control and performs extensive tests on all of its smartphones.

Five Operational Performance Objectives and Process Design

The operational performance focuses on five main objectives that are to be considered by all organisations that are willing to achieve success. However, managers are free to choose which one should be emphasised more than others depending on the companys peculiarities.

Professionals tend to agree that quality is the most significant determinant of success. It aligns with the customer needs and ensures the stability of the product or service. Lenovo realises such tendencies and emphasises that customer satisfaction is critical to it. That is why it ensures high quality of all produces devices and provided services in the framework of its strategy (About Lenovo n.d., para 9). Quality is an integral element that is never ignored. Lenovo aligns it with affordable prices and attracts clients in this way.

The time of the product delivery is critical because it has enormous influence on the customer satisfaction and loyalty. It addition to that, it can affect the quality of the product in some cases. Speed also deals with the time needed for research and development, as it influences the way a company responds to customer needs and requirements. Even though this aspect is not as critical as quality for Lenovo, the organisation does its best to improve supply chain operations and ensure their efficiency through the development of appropriate strategies.

Dependability presupposes customers dependency on the company and its products. It can be increased through the on-time product delivery and its correspondence to customer expectations. Even though this objective is not directly discussed by Lenovo, it develops response-time targets for the similar purposes, which ensures stability.

Flexibility is vital for an organisation that is willing to attract diverse populations and to be able to respond to any changes. It presupposes readiness to change and adapt that is often rejected by the staff. For Lenovo, flexibility is one of the main objectives. The company does its best to meet the needs of its clients so it provides a wide range of products that can appeal almost to everyone (About Lenovo n.d., para. 23). It also gathers customer feedback to be proactive and give the clients what they want to obtain.

Defining different cost for products, organisations receive an opportunity to satisfy more clients. Due to the great number of offerings, Lenovo can state various unit costs so that all people can afford something to their liking.

In this way, operational performance objectives determine decisions that Lenovo makes in the framework of process design and layout. Volume, the variety of products, and their cost alter to align with customer needs and organisational goals. Quality, flexibility and cost are those critical objectives that are emphasised by Lenovo and form its offerings.

Conclusion

Operations and information management are essential to business success and development. Nowadays, competition and economic conditions require businesses to be committed to process improvement in order to respond to market changes. Operations and information management are necessary to deliver products and services to consumers.

Technology company Lenovo established efficient operations management to gain competitive advantage and remain profitable in a highly competitive smartphone market. Among the factors, which influenced the design of Lenovos manufacturing processes, are high production volumes, the variability in supply and demand, rapidly developing smartphone technology, rising quality expectations, and increased price competition, as well as the infrequent introduction of new products.

Operations management professionals play an important role in establishing a corporate strategy and a set of performance objectives to drive the company forward. With performance objectives defined, operations management professionals adjust the operating environment to accomplish them. Operational performance objectives are necessary for businesses to improve their performance and remain competitive.

References

About Lenovo 2016, Web.

Ates, A & Bititci, U 2011, Change process: a key enabler for building resilient SMEs, International Journal of Production Research, vol. 49, no. 18, pp. 5601-5618.

Battistoni, E, Bonacelli, A, Colladon, A & Schiraldi, M 2013, An analysis of the effect of operations management practices on performance, International Journal of Engineering Business Management, vol. 5, no. 1, pp. 1-11.

Boyer, K & Verma, R 2009, Operations and Supply Chain Management for the 21st Century, Cengage Learning, Boston.

Forster, F 2006, The idea behind business process improvement, Web.

OMarah, K n.d., Lenovo: Doing everything right to be demand-driven, Web.

Slack, N, Chambers, S & Johnson, R 2010, Operations management, Prentice Hall, Upper Saddle River.

Straus, J 2012, Building an effective supply chain and distribution system, Web.

Information Management in Modern Business

Introduction

It is paramount to note that technologies that are related to information management have been significantly improved over the last few years. However, many significant issues are still present and should be addressed. For example, some information that is collected is completely irrelevant, and it leads to numerous complications. It is also necessary to understand that several limitations prevent implementation if information management in various companies (Hinton, 2006). The biggest problem is that enormous amounts of resources are required in most cases, and it is not an easy task to justify storage of information is viewed as not valuable. However, it is imperative to note that data analysis tools that are often introduced can be used to process the information, and some organizations also offer similar services.

Information Management Today

The article that was written by Ackoff in 1967 is one of the best examples of works that are tested by time. The author had discussed five assumptions that are related to information systems and explained why he disagrees with them in great detail. It needs to be said that the first statement that is listed in the article is no longer accurate because some systems have been developed to address this significant issue. Information is now represented in a comprehensive manner because tools for visualization are often used. Nevertheless, it is true that an enormous amount of unnecessary data is still present.

The biggest issue is that all the information is connected, and it is nearly impossible to evaluate which correlations are meaningful without human interference. It is paramount to say that the second assumption is true because managers nowadays have much better understanding of information that is necessary. However, the problem that needs to be discussed that some essential data is not taken into account most of the time, and it needs to be considered because it is possible to find correlations that are valuable. The third assumption is also true in most cases because a qualified manager should be able to utilize the information that was provided to its full potential. Assistance or tools that help with decision-making process may be necessary in some cases to achieve best possible results (Ozz, 2008).

Nevertheless, it is paramount to understand that the results are extremely dependent on the resources and tools that are available. Similarly, the fourth assumption is also correct even nowadays. Communication was viewed as one of the most significant aspects of management, and many methods and techniques have been developed to address the issues that may occur. Such tools as smartphone applications are especially valuable because they can be used to interact with employees and supervisors in most environments, and this is extremely useful.

The last assumption is also correct because most information systems are relatively easy to use for managers once they are trained to use them and gain enough experience. However, one may want to understand the way in which it functions to improve personal knowledge significantly. Such individuals will also have an understanding of limitations that are associated with similar systems, and these factors will be taken into account during the process of decision-making.

Ackoff Revisited

It is necessary to understand that these assumptions were developed long time ago, and a vast range of technologies and strategies has been introduced that have helped to address some of the most significant problems. However, they may be updated with the knowledge that is available today. The first assumption is that new methods of analysis can be used to overcome the difficulties that managers have to face in the workplace that are associated with the lack of information. However, it needs to be said that it is not true, and most professionals have to deal with this issue even nowadays.

It is true that they have access to a broad range of data, but some essential information may still not be available. The second assumption should focus on the fact that expectations for information managers are currently too high, and most believe that one should be able to identify the information that is necessary in the particular case. However, it is not true because each situation needs individual approach. Enormous experience in the industry and cooperation with other professionals may be required. The third assumption should state that decisions that are based on the available data are correct in most cases. It is paramount to understand that it may not be true in some situations, and may lead to severe complications.

Numerous factors should be considered before the final decision is made, and should not be based solely on the data. The fourth assumption also needs to be updated. Most believe that modern tools of communication are extremely efficient, and personal conversations are not as necessary as they used to be. However, it should be said that this opinion is questionable. One of the central problems that need to be discussed is that interactions on the Internet are extremely different. The last assumption that is currently popular is that information managers should understand the way information systems function. It is paramount to address the fact that they became incredibly complicated over the years, and it is not an easy task to comprehend such systems, and it requires knowledge in different areas.

CPA Vision Project

CPA Vision Project has been developed to provide a perspective on the profession of an accountant in the future. Its primary goal is to evaluate the issues that are currently related to this job and to find the ways to solve them. It is understandable that perception of accountants has changed over the years, and many companies view it as not as necessary as it used to be. The main problem is that numerous operations that were previously performed by professionals are now performed with a use of modern technologies. However, it is imperative to note that an enormous number of tasks have been introduced that may be solved only by qualified professionals.

The framework that was developed is extremely useful because it provides a broad range of competencies that are required for an accountant. The values that are listed are essential for this job, and every individual should understand that they should be focused on to be a successful professional. The information about core services is also paramount because it helps to identify the areas that interest managers the most. This project focuses on aspects that are related to new technologies, and it is suggested that they should be used to guarantee that the information is delivered to managers according to their demands. Issues that are related to communication are also addressed.

It is essential because an accountant should be ready to cooperate with supervisors and create relationships in the workplace, and every qualified specialist should be able to voice their opinions to make sure that operations are performed efficiently. It needs to be understood that profession is changing at an incredibly fast rate, and one should be able to accept the situation that occurred. One should be able to meet the expectations of any company if he or she follows the principles that are suggested in the framework. However, it is in need of improvement because it does not address some of the fundamental problems that are currently present.

Skills Needed for Accountants

A broad range of skills is necessary for every accountant to make sure that correct information is provided. It is imperative to understand that requirements often vary from organization to organization, and experience is also necessary most of the time (Sin & Jones, 2003). Analytical skills also essential because some tasks are incredibly complicated, and accountants are often faced with tough decisions in the workplace that require an understanding of numerous processes.

Communication skills also should not be disregarded because this job is associated with interactions, and one must be able to express his or her opinions about financial statements. Information must be delivered to subordinates and supervisors in a comprehensive manner with the use of such methods of data representation as numbers, info graphs and others. Outstanding computer skills are extremely necessary because new technologies are often introduced, and it is paramount to keep track of latest trends. Excellent knowledge of computer programs is of utmost importance in modern society because data is mostly recorded and stored in spreadsheets, and an ability to use databases is incredibly valuable. It is imperative to have access to the Internet because the software is updated quite often, and some of those updates are crucial.

Also, it is necessary to understand the measures that should be taken to guarantee the safety of information. Leadership skills may also be required because it is necessary to organize the process of data collection and to motivate workers to make sure that correct information is being produced. Supervision can be one of the most imperative of accountant’s responsibilities and should not be disregarded. Ability to work in a team is also crucial, and it needs to be said that it is nearly impossible to be successful as an accountant if an individual cannot cooperate to achieve common goals. Overall, various career opportunities for an accountant are currently available, and the profession has faced numerous changes over the last few years. It should be noted that an ability to adapt is of utmost importance in most cases. In is extremely necessary to develop as a professional if one wants to stay competent.

Conclusion

In conclusion, it needs to be said that information management has dramatically improved over the last few years because of the introduction of numerous new technologies and tools. Some of them are incredibly disruptive, and various enterprises are not ready to face such changes. Many issues that are associated with accounting information systems are still present and need to be addressed. Overall, it is imperative to understand the aspects that may cause complications if one wants to become a successful accountant in the future.

References

Hinton, M. (2006). Introducing information management. Oxford, UK: Elsevier Butterworth-Heinemann. Web.

Ozz, E. (2008). Management Information Systems (6th ed.). Boston, MA: Society for Cengage Learning. Web.

Sin, S., & Jones, A. (2003). Generic skills in accounting. Frenchs Forest, AU: Pearson Education Australia. Web.

Linux System Usage in Information Management

Introduction

Open-source software is usually a program in which its’ source code is available to any person or public for their use or modification from its original state free from charge and without any kind of license i.e. open. Open source code is typically created as a collaborative effort in which programmers improve upon the code and share the changes within the community.

A big question is how the open-source model for software development is superior to another kind of development such as the commercial model? Open source development is, effectively, many unrelated or related developers collaborate to produce software for free distribution and for improvement. On the other hand, commercial software is developed by programmers who are employed by a company for the purpose of creating a package that will be sold. The code is protected through various mechanisms, such as a patent and copyright. (Cajori, 2000)

Main body

In many cases, open-source software is also protected by copyright and sometimes by a patent. The main difference is that commercial software doesn’t grant the user any right beyond the application of software package, open-source software licenses usually provide broad rights to change the code and redistribute it either in whole or in part.

There are usually many kinds of encouragement that regard the use of open-source software which is normally viewed as either ethical or philosophical or pure practical issues. The open-source software is usually received at a cheaper cost compared to other software such as commercial source software. (Cajori, 2000)

There are also other features that make Linux open-source software as beneficial as open-source software. The availability of the source code and also the right to change and redevelop it is very useful. This enables free changing and improvement of software to be beneficial to one’s needs. This then makes it possible to use the code in new hardware; adapt it to a different condition, and understanding how the system works. This is why experts have reached a conclusion that open source software has a long time and bugs can be isolated.

There is also the flexibility of the software to an organization. This together with the combination to redistribute the rights increases the population of users which helps to build a market for support and customization of the software. This then improves the quality of the product and its functionality.

There is no one to restrict in a unilateral way the usage of the software. This is due to when a proprietary software vendor decides not to upgrade software for an older platform. This results in organizations sticking to an older version of the software or switching to another product. When open-source software is used the organization can fund the development for desired platform else look for other vendors to provide the upgrades. (McSeveny, 2003)

Open-source software has no end time. This is a very common concern with proprietary software. For example, if an organization uses a software product, and relies on the software manufacturer for upgrades of its continued development and then the software company closes down or merge then the lifetime of the product ends. Open-source software protects against this because if the group or organization that developed the code decides to stop its further development, it is always possible to find another software group to continue the maintenance and its improvement without any obstructions.

There are no black boxes” are possible because open source software is usually dependable. There are many reasons for this. By having the source code, it is possible to check and verify the contents of the algorithm and its implementation scheme. This difference lies in the fact that organizations are allowed to modify what is appropriate. A good example is the Linux kernel and its international patches. The patches are developed by different parties in countries where such a development is acceptable, and users in those countries can use such enhancements. With binary kinds of products, no inspection is possible, with closed source or nearly free licenses inspection is possible, but modifications are unacceptable. (McSeveny, 2003)

There is the possibility of forking: creating an alternative codebase. An example is the Linux kernel, where two distinct code bases are used, one which is perceived as stable and one as experimental. In this way, it’s possible to introduce new and harmful technologies without disrupting the stable ones. So, an organization interested in leading-edge technologies can try them, and people who use the Linux kernel in production areas can count on both stable and tested features.

No extra fees can be asked for modified versions and organizations can use the current code base to start other projects. Knowledge to work on can be gathered at a minimal cost. This is what made Internet software systems such an important factor in the new economy. Also, the right to modify them allows incredible expansion in the number of communication protocols and systems which are tailored for the organization’s needs. This then is a reason for the success of the Linux kernel which is widely used by students because of low cost mostly after college.

There are fewer conflicting priorities due to marketing pressures and expectations. This is so because there is no single commercial pushing for exact time delivery or features that have to be supported. Usually, open-source software is delivered when it is completed, and when the development team feels that the quality of the product is good. This means that software usually does not need many service packs and updates reducing the maintenance cost.

Of course, open-source software leads to the perception of disadvantages. However, some of them are only disadvantages if we are stuck to classical development models, which is of course not the case with open source. Some of them are:

Its’ not guaranteed that the development will succeed. It’s not possible to know the stability of the software and whether the software will be successful or not. This is a problem too with proprietary software, but it is more common in open source. Especially when a project is started with fewer backing companies this is due to immature and the development base still being developed. (Menninger, 1999)

There may be significant problems connected to intellectual software this so because some countries accept software and algorithm patents. This makes it hard to differentiate between piracy and genuine products. Open-source packages are modified with switches or patches that enable or disable patented code fragments according to country. Although the issue of software patents is a problem for the whole software industry, open source is probably one of the more clear cases where it can be shown how they harm the regular process of software development. The specific problems are that the availability of source code simplifies the detection of patent infringements by patent holders and that the absence of a company that holds all the rights on the software also makes it difficult to use the mechanisms in use by companies to defend from patent litigation. (Menninger, 1999)

Conclusion

It is difficult to know the existence of a project and its current status. There is less advertising for open source software and mostly to those that lack support from companies. However, several aggregation points for open-source software exist, although in many cases they are used by experts, and not by the general public or organization. They are also in many cases very specific to some software categories, such as scientific software or database systems.

It is extremely important to see through the various interpretations of the advantages and disadvantages of open source, and if possible try to analyze with quantitative methods if open source can be helpful in a given situation, or for a given user or company. (Menninger, 1999)

References

Cajori, F. (2000). A History of Computer Applications, New York: Dover Publications pp. 17-54.

Hayashi, T. (1995). Theory and Modern Use of Computers, Groningen: Egbert Forsten pp.64-142.

Ifram, G. (2000). The Universal History of Numbers: From Prehistory to the Invention of the Computer, New York: John Wiley & Sons pp. 34-78.

Menninger, K. (1999). Softwares and their Applications, New York: Dover Publications pp. 6-98.

McSeveny, A. (2003). History of Computers, Sydney: Pearson Longman pp. 112- 202.

Victor, J. (2007). The Mathematics and Relation with Computers, NJ: Princeton University Press pp. 47-124.