Implementation of Information Technology in a Job Shop Manufacturing Company

Author(s):  
Purnendu Mandal

ABC Engineering is a Melbourne-based job shop manufacturing company. The company attempted a major improvement in the information technology area by implementing and enhancing the capability of a MIS software package called ‘ManuSoft’. The general manager of ABC Engineering felt that the implementation of this commercially available package would enhance the productivity and help managers in the planning process. The company carried out a detailed study on various IT tools and information systems softwares that are applicable to the job shop manufacturing situation. Considering the prevailing company situations, it was decided that ‘ManuSoft’ would satisfy the information requirements. A project team was set up to study the scope of IT improvements and implement the required IT/IS system.

Author(s):  
Purnendu Mandal

A.B.C. Engineering is a Melbourne-based job shop manufacturing company. The company attempted a major improvement in the information technology area by implementing and enhancing the capability of a MIS software package called ManuSoft. The General Manager of A.B.C Engineering felt that the implementation of this commercially available package would enhance the productivity and help managers in the planning process. The company carried out a detailed study on various IT tools and information systems softwares that are applicable to the job shop manufacturing situation. Considering the prevailing company situations, it was decided that ManuSoft would satisfy the information requirements. A project team was set up to study the scope of IT improvements and implement the required IT/IS system.


Author(s):  
Shruti Makarand Kanade

 Cloud computing is the buzz word in today’s Information Technology. It can be used in various fields like banking, health care and education. Some of its major advantages that is pay-per-use and scaling, can be profitably implemented in development of Enterprise Resource Planning or ERP. There are various challenges in implementing an ERP on the cloud. In this paper, we discuss some of them like ERP software architecture by considering a case study of a manufacturing company.


2019 ◽  
Vol 5 (2) ◽  
pp. 109-115
Author(s):  
Johanes Fernandes Andry ◽  
Gunawan Wang ◽  
Gusti Ngurah Suryantara ◽  
Devi Yurisca Bernanda

PT Hema Indonesia is manufacturing company established in 2001 and has continued to grow. Nowadays the company has supported business processes in various companies, such as the use of information systems. The purpose of this research is to get an overview of the performance of information systems in order to determine the extent of maturity level which is currently running, with a few aspects to consider such as effectiveness and, efficiency. Implementing IT governance, however, is a challenge to organizations. To ensure IT alignment with business goals use standard COBIT. The analytical tool used is the standard procedure COBIT issued by ISACA. In this paper the method to be used is COBIT 4.1. Coverage of Audit IT Domain are Plan Organize (PO), such as PO4, PO5, PO7 and PO8. The conclusion that can be drawn from the research that has been done is IT governance at the company has been done, although still run optimally within each IT process contained in the sub domain average on level repeatable and defined proses.


1997 ◽  
Vol 25 (4) ◽  
pp. 38-47 ◽  
Author(s):  
Mary J. Granger ◽  
Elizabeth S. Adams ◽  
Christina Björkman ◽  
Don Gotterbarn ◽  
Diana D. Juettner ◽  
...  

2014 ◽  
Vol 701-702 ◽  
pp. 919-922
Author(s):  
Hong Fei Xu ◽  
Si Rui Pang ◽  
Jian Wen Du ◽  
Xue Mei Li

A system includes three power information security defense line is constructed, to achieve the information network, information outside the network, scheduling data network depth protection. According to the information security protection requirements, starting from the overall structure of information systems, taking into account the information system to schedule production system as the core, based on independent research and development of core information security isolation unit, set up three lines of defense in the power of information systems, electricity secondary system, information network systems, information systems outside the network partition protection.


Sign in / Sign up

Export Citation Format

Share Document