Enterprise system recommendation

Assignment Help Basic Computer Science
Reference no: EM133051233

Enterprise System Recommendation

Extra Sweet Sugar, Inc. manufactures candy in Riyadh and distributes its products throughout KSA. The organization has over 350 employees in three locations. Its functional business units currently work in silos, with data pertaining to their various departments held in separate, legacy systems. The company's revenues are growing, and it has an online retail site.

As the company's IT manager, you have been tasked with recommending a Customer Relationship Management (CRM) enterprise system to senior management. Address the following:

1. Which type of enterprise system would you recommend and why?

2. What are the benefits of implementing such a system?

3. What challenges do you foresee in implementing this system? How would you address these?

4. What are some of the vendors that offer such systems? Is there one that's preferable given the organization's needs? Why? What business factors should be addressed in order to make this determination?

Reference no: EM133051233

Questions Cloud

Algorithm is run on different hardware : For a given algorithm, how will BigO change if the algorithm is run on different hardware (e.g. a faster processor)?
Standard trade theory : Standard trade theory is based on perfect competition, with constant returns to scale at the level of the individual firm and constant
Host integrity monitors and types of malware : What is "Host Integrity Monitors"? What types or examples of malware? What does the malware response plan phase consist of?
Software architecture and microservices architecture : Discuss the advantages and disadvantages of centralized and decentralized Software Architecture. Discusses each aspect of Computer Architecture Testing.
Enterprise system recommendation : What are the benefits of implementing such a system? What challenges do you foresee in implementing this system? How would you address these?
Strategies for reducing the risks : What is the weakest link in the security of an IT infrastructure? What are some of the strategies for reducing the risks?
What type of cyber-attack occurred : What type of cyber-attack occurred? How did the organization respond to the attack? What were the impacts (or potential impacts) to the business?
Crime and security : How has the term hacking changed meaning over the years? What is the most dangerous hacker tool? What was the Arpanet?
Fragment option in android design support : What are the various layouts that are created when a developer utilizes the Fragment option in the Android Design Support Library?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Discuss the ethical concerns of doug actions

Discuss the ethical concerns of Doug's actions. What might the ramifications or consequences of his actions be? Why?

  What is the expected number of data entries

Propose a replication scheme to minimize data loss as nodes fail. What is the expected number of data entries that get lost when three random nodes fail?

  Gathering system requirements build vs buy

your initial response by the middle of each week and then return on a couple of other days to see what's going on with the discussions.

  Vendor-provided operating system

Mainframe computers of the past usually ran only a vendor-provided operating system. Older personal computers often ran MS-DOS, CP/M, or a similar system. In addition, specialized operating systems have been created for real-time systems

  Problem regarding the circular linked list

One way to implement a queue is to use a circular linked list. In a circular linked list, the last node's next pointer points at the ?rst node. Assume the list does not contain a header and that we can maintain, at most, one iterator corresponding..

  Detail the embedded system design cycle

Discuss from your personal perspective in detail the embedded system design cycle for a Dell XPS notebook computer and Windows 10 Enterprise operating system.

  Review the antivirus program and ensure

Review the antivirus program and ensure it is up to date and running a full scan of the system. Identify at least five unnecessary services from the default installation of Windows. Think about how you can provide security training in 30 minutes.

  What should the method do if and exception is thrown

Write a method that takes as a parameter the name of a binary file, reads the content of the file and returns it as an array of bytes. Write a method that writes the file content to another file. Compare both files.

  Using backups for complete recovery

Successful database recovery relies on the database being backed. This is what enables the database to recover data that were lost due to a media failure, loss of power, or any other type of disaster. Each time the online line redoes logs filled u..

  Conduct risk assessment for accounting firm

You are brought in to conduct a Risk Assessment for an accounting firm. Have both cloud and on-premise infrastructure for their high impact expensive software

  Current position of the federal reserve chairman

Analyze the current position of the Federal Reserve Chairman and Board related to interest rates, money supply, and inflation, and the effectiveness

  Creating a predictive analytics business

Write a project proposal to start a startup company. Creating a Predictive Analytics Business

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd