8
Sumya Medhat Ismail MIS English Section Enterprise Resource Planning System & Web-Enabled Databases

Enterprise resource planning system & web enabled databases

Embed Size (px)

Citation preview

Page 1: Enterprise resource planning system & web enabled databases

Sumya Medhat Ismail MIS English Section

Enterprise Resource Planning System &

Web-Enabled Databases

Page 2: Enterprise resource planning system & web enabled databases

Sumya Medhat Ismail MIS English Section

1

ERP System : is software solution that addresses the enterprise need .It takes the process view of an organization goals and tightly integrates all function in that organization.

It is also defined as : a large computer system that integrate all facets of

an operation, including, development, manufacturing, sales and marketing.

Enterprise Resource Planning System

Page 3: Enterprise resource planning system & web enabled databases

2Sumya Medhat Ismail MIS English Section

Enterprise Resource Planning System

This integration is accomplished with through a database shared by all the application programs.

An ERB is “ do it all” system that performs everything from entry of sales orders to customer service.

The purpose of ERB is to facilitate the flow of information between all business functions inside the boundaries of the organization and manage the connections to outside stakeholders.

Page 4: Enterprise resource planning system & web enabled databases

3Sumya Medhat Ismail MIS English Section

Enterprise Resource Planning System

Why ERP? ERP offers solution for all Business

function Packages available for organization

of all sizes and types Global nature (multi currency)

Disadvantages of ERPElimination of costly inflexible legacy systemvery complex , Expense and time in implementation

Page 5: Enterprise resource planning system & web enabled databases

4

WEB-ENABLED DATABASEWeb-enabled Database

Sumya Medhat Ismail MIS English Section

Definition : simply put, a database with a web-based interface.

This mean That the web designer does not need to know the details about the DB’s

underlying design lonely has to worry about the web interface.Similarly, the DB designer need not concern himself with the DB’s web

interface lonely with how the DB schema are designed

WED are used all the time, sometimes even without the user’s realization .

The most common user of a WED is one who needs to access information on demand from a central data repository, yet maybe located for away from the actual location of the database itself.

Page 6: Enterprise resource planning system & web enabled databases

5Sumya Medhat Ismail MIS English Section

Web-enabled Database

WED typically uses 3 tiers (also called Layers)

Presentation Layer :concerned only with the actual “Look & Feel” that an outside user would experience; this is the WED’s interface to the outside world.

Middleware Layer :consist of some Logic to translate a user’s input, mouse clicks and like into a format a database can understand; this layer essentially converts the input from the presentation layer into database useable from and

back again for the results Database Layer :

this layer contains the table to be queried, and the information that the user seeks to retrieve (data).

Page 7: Enterprise resource planning system & web enabled databases

6Sumya Medhat Ismail MIS English Section

Web-enabled Database

WED Adv.& Disadv.

1) Pull Vs pushA web-enabled database allows users to get

the information they need form a central repository on demand.

Push Model ex: send out a memo to faculty to notify everyone of an up coming

event

Pull Model ex: a faculty member calling for info. About a certain event

2) Ease of use: much simple to interact with a web interface that a command-line3)Access: can easily access from anywhere one can get a web connection does not need a separate program.

1)Access: like database users must be divided into access groups; this database from the ability of any user to get any and all information.

It is inevitable that some outside users would love to get a high level of access so they can get info. to which they ought not be privy, It can be hacked through typical means (password theft and the like)

2)Primitive Designs: WED s support the full range of DB operations, but in order to make them easy to use they must be “dumbed down”.3)Denial of service: can be attacked by hackers to cause a “DOS” to legitimate users, making access to info. difficult.

Page 8: Enterprise resource planning system & web enabled databases

Thank you