首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 156 毫秒
1.
基于SaaS模式的餐饮管理平台将传统的购买模式改进为租赁模式,而SOA能够更好地实现和优化业务流程,为餐饮管理运营提供了一个灵活的、可持续发展的IT平台。本文讨论了基于SOA的SaaS系统的相关技术分析和实现;在此基础上。构建了基于SAAS的餐饮管理系统。测试结果说明SaaS+SOA构建企业信息化平台是可行的。  相似文献   

2.
针对当前中小型物流企业信息化存在的问题,分析了中小型物流企业构建基于SaaS模式的现代物流管理系统优势,并提出基于SaaS模式的现代物流管理总体结构,以及现代物流管理数据存储方案与设计思路。  相似文献   

3.
本文研究了基于分布式计算的IT资源管理系统,该系统实现了网络IP地址的安全管理、IT资产的自动管理、基于VLAN管理、软件的集中分发及远程桌面维护、网络的在线监控等功能。  相似文献   

4.
在构建运维平台背景下,本文将ITIL(Information Technology Infrastructure Library)理念引入IT资产管理。基于全生命周期管理和问题管理的需求,进行系统结构和功能设计,利用MySQL数据库和J2EE技术实现IT资产管理系统的开发。  相似文献   

5.
为应对现下各大IT外包服务公司日益扩张的业务量所带来的成本压力,以及因服务网点分散所带来的资讯问题,并积极有效地分配IT服务人员,设计了一种基于云计算中SaaS概念、物联网概念,并合理运用现有RFID,GSM技术的人力和资产管理系统,旨在实现快速有效的人力资源调度以及方便快捷的物资信息管理。阐述了系统的组成结构,并进行了硬件和软件上的设计。项目结果证明该系统具有可行性和实用性。  相似文献   

6.
《软件》2017,(1):102-107
随着信息技术的不断发展和各种大数据平台的建设,企业中拥有IT资产种类和数量也越来越多,但目前建设的常规的固定资产管理系统存在资产数据不全、数据质量不高、与资产运维脱节、资产变更不及时等问题。为此,建议构建新的IT资产管理系统,将IT资产与IT运维紧密结合起来,实现了对IT资源从入库到报废的整个生命周期的管理,优化了IT资产的管理流程,提高了IT资源管理水平。  相似文献   

7.
随着物联网技术的日益发展,如何设计一个RFID管理系统,使之能在企业中普遍运用为了热点。综合RFID技术和SaaS模式,并扩展数据库共享,构建一个SaaS模式下基于RFID技术的综合性企业管理系统,使得企业可以进行实时的人事查询、物流监控和进度控制,保证数据安全性、可靠性,达到透明、智能的人事、物流和资产管理,项目结果表明,该系统可以有效提高企业管理效率,具有可行性和实效性。  相似文献   

8.
人力信息管理系统为各部门提供了人员数据方面最基础的管理支撑。大多数跨国企业更倾向于采用专业软件厂商提供的HR解决方案,如SAP、Oracle等厂商的ERP人力资源方案。随着云计算的广泛应用,厂商提供了相应的SaaS部署方案,既满足了业务要求,又简化了部署成本和时间。但是,商业化产品在数据结构层面的封闭及新的SaaS部署模式,对企业IT方面的数据整合提出了新的要求。通过采用诸如SAPSuccessFactor、Halogen等形式的SaaS应用,在各业务系统及IT基础系统(如AD)实现人员数据、账户同步,实现人力、IT部门间人员信息和账户的数据流通,保证了人员数据状态的一致性和有效性,为此类应用场景提供了一种轻量级的思路。  相似文献   

9.
SaaS模式下数据扩展性的设计与实现   总被引:1,自引:0,他引:1  
引入了SaaS软件模式,针对GSP医药管理业务,给出了SaaS应用程序的架构模型。在对比分析三种存储模式的基础上,给出了基于元数据驱动的数据扩展方案的数据库设计,并对数据库设计给予详细阐述。在此基础上编码和测试,实现了对SaaS模式数据扩展性研究从理论到实践的转化。  相似文献   

10.
由广州理想资讯科技有限公司提供的IPDSMS桌面管理系统通过对企业IT系统中的桌面设备进行全面的管理,保证企业IT系统稳定、安全、可靠地运行。IPDSMS(IPDSys-temManagementSuite)桌面管理套件是国内一款功能全面的模块化系统,拥有资产管理、进程管理、补丁管理、接入安全控制等多个模块。这些模块能实现企业IT设备全生命周期管理,在企业信息资源管理系统发生意外损失时,能将损失减少到最低点,最大程度地提高IT的投资回报。IPDSMS桌面管理让您轻松实现:一、资产管理如何轻松掌握所有内网PC资产情况?IPDSMS系统的资产管理模块…  相似文献   

11.
《Information & Management》2016,53(7):915-928
In this study, we investigated the organizational factors that influenced Indonesian companies in their decision to adopt software as a service (SaaS). Based on a multiple-case study of 18 Indonesian companies, we identified three patterns: Top management support is an enabler for SaaS adoption; small to medium-sized enterprises (SMEs) are more likely to adopt SaaS than large companies; and organizational readiness is not an enabler for SaaS adoption. The last two patterns contradict existing information technology (IT) innovation adoption research. We explain this by examining the nature of SaaS as an IT innovation and the characteristics of Indonesia as a developing country.  相似文献   

12.
SaaS模式的中小企业客户关系管理研究   总被引:1,自引:0,他引:1       下载免费PDF全文
客户关系管理是提高企业核心竞争力的关键之一,传统客户关系管理模式无法满足广大中小企业的需求。在讨论新的SaaS概念及SaaS模式与传统模式比较的基础上,分析了基于SaaS模式的中小企业客户关系管理优势,提出了基于SaaS模式的中小企业客户关系管理解决方案,构建了SaaS模式解决方案的逻辑体系结构,并指出了中小企业实施SaaS模式客户关系管理应注意的问题。  相似文献   

13.
To secure their information assets, organizations should seek support from enterprise security architectures. Security patterns are a good way to build and test new security mechanisms, but they have some limitations related to their usability. In previous work, we defined a new type of security pattern called Enterprise Security Pattern. The main objective of these patterns is to provide an instance of model-driven architecture, which offers a solution to recurring problems that have to do with information systems security. In recent years, the hiring of Software as a Service (SaaS) from cloud providers has become very popular. There seem to be many advantages of using these services, but organizations need to be aware of a variety of threats, as well as being prepared to handle them. In another work undertaken previously, we defined an enterprise security pattern called Secure Software as a Service (Secure SaaS), which the organizations could apply to protect their information assets when using SaaS. In this paper, we present different instances of the solution models of the enterprise security pattern Secure SaaS, aiming to verify the risks that an organization would assume if each of the instances were deployed. With this approach, we intend to show how the design decisions adopted when performing the transformations between the solution models can have a direct impact on the security provided by the pattern.  相似文献   

14.
在IT系统运维管理工作中,最紧急和重要的就是保证系统的稳定运行。当系统出现故障时,如何快速地恢复系统的服务是企业运维管理部门的首要任务之一。本文通过分析IT系统运维管理要求和及时运维人员的工作模式,创新性地提出采用手机短信命令的方式,实现远程对服务器进行运维管理的解决方案,解决了运维人员在不具备网络接入条件下无法对IT系统进行运维管理的问题。  相似文献   

15.
Despite that Software as a Service (SaaS) seems to be the most tempting solution among different types of cloud services, yet it has not been adopted to-date with as much alacrity as was originally expected. A variety of factors may influence the adoption of SaaS solutions. The objective of this study is thus to explore the significant factors affecting the adoption of SaaS for vendors and enterprise users. An analytical framework is proposed containing two approaches—Technology Acceptance Model (TAM) and Rough Set Theory (RST). An empirical study on the IT/MIS enterprises in Taiwan is carried out. The results have revealed a considerable amount of meaningful information, which not only facilitates the SaaS vendors to grasp users’ needs and concerns about SaaS adoption, but also helps the managers to introduce effective marketing strategies and actions to promote the growth of SaaS market. Based on the findings, some managerial implications are discussed.  相似文献   

16.
Nonprofit organizations (NPOs) operate in environments characterized by growing competition for resources and greater stakeholder demands for accountability, which makes deploying and maintaining information systems a struggle. In this competitive, resource-constrained environment, enterprise Software-as-a-Service (SaaS) platforms offer NPOs a cost-effective way access reliable, low-maintenance information technology services. Thus, the extent to which NPOs assimilate SaaS is an important area of inquiry. Yet despite the wealth of research on organizational IT assimilation, we know little regarding whether, when, and how NPOs assimilate IT innovations. We further our understanding of NPO assimilation of SaaS by conducting a context-based study. To do so, we employ multiple methods with data collected from US-based NPOs executives. Our first study showed that organizational factors (e.g., readiness, top management participation) and environmental factors (e.g., social gains, industry) affect the degree to which NPOs assimilate SaaS. However, we also found that technological factors do not appear to play a significant role in NPO SaaS assimilation. We conducted a phenomenological analysis to shed further light on this unexpected finding. Our analysis found that readiness to adopt SaaS, perceptions about SaaS complexity, and the use of outside consultants all played a key role in NPOs’ assimilation process.  相似文献   

17.
IT providers have heralded software-as-a-service (SaaS) as an excellent complement to on-premises software addressing the shortcomings of previous on-demand software solutions such as application service provision (ASP). However, although some practitioners and academics emphasize the opportunities that SaaS offers companies, others already predict its decline due to the considerable risk involved in its deployment. Ours is the first study to analyze the opportunities and risks associated with adopting SaaS as perceived by IT executives at adopter and non-adopter firms. We first developed a research model grounded in an opportunity-risk framework, which is theoretically embedded in the theory of reasoned action. Subsequently, we analyzed the data collected through a survey of 349 IT executives at German companies. Our findings suggest that in respect to both SaaS adopters and non-adopters, security threats are the dominant factor influencing IT executives' overall risk perceptions. On the other hand, cost advantages are the strongest driver affecting IT executives' perceptions of SaaS opportunities. Furthermore, we find significant differences between adopters' and non-adopters' perceptions of specific SaaS risks and opportunities, such as performance and economic risks as well as quality improvements, and access to specialized resources. Our study provides relevant findings to improve companies' assessment of SaaS offerings. It also offers SaaS providers insights into the factors that should be prioritized or avoided when offering SaaS services to companies at different stages of their technology adoption lifecycle.  相似文献   

18.
随着云计算技术的飞速发展,云计算在管理信息系统中的发展中作用日益凸显。基于云计算的管理信息系统多数是基于SaaS技术构建的。本文针对大型餐饮企业业务复杂度高、IT软硬件基础薄弱和企业管理软件的实施难度较大这一现状,设计了基于云计算的餐饮管理信息系统,该系统具有高效、便捷、节能、安全、低成本等特点。  相似文献   

19.
Currently, there are two models of service delivery in the information technology (IT) arena: implementation agent and software-as-a-service (SaaS), and each model results in a different IT service supply chain (SSC) structure. When IT service is delivered via implementation agents, independent software vendors (ISV) form the core of the supply chain, while in SaaS chains, platform operators act as the core. It is important to clarify how to coordinate supply chain participants in their respective supply chains, because there is sparse research about supply chain coordination contracts in the IT service industry. This paper draws upon the theory of revenue sharing contracts and investigates IT SSC coordination mechanisms under both SaaS and implementation agent models. The analytical results indicate that a SaaS supply chain has an optimal IT service price that is only related to the variable costs (C os ) of the SaaS platform operator, and so if the variable cost (C os ) can be reduced to zero, perfect coordination would exist. In contrast, the implementation agent supply chain achieves perfect coordination when the variable cost of the implementation agent is equal to the average unit implementation fee. By comparing the two supply chain models and interpreting their respective coordination mechanisms, this study can further advance supply chain contract theory research.  相似文献   

20.
McGovern  M. 《IT Professional》2002,4(3):52-54
Managing IT system security is a never-ending effort. Regardless of how well you secure a system today, new threats and issues will appear tomorrow. User support, IT staff enthusiasm, and management buy-in are critical assets for overcoming the constant barrage of threats. Unfortunately, there is no standard playbook that tells IT managers how to manage these relationships and focus them on security issues. Every IT staff must build its own strategy. The article outlines concepts to manage security. This list serves as a good source of ideas for how IT managers can use awareness to advance their security goals  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号