MIS in Businesses
MIS in Businesses
Business Today
System
• Set of related activities that are joined together
to achieve a common goal.
• Open – constantly interacts with the environment
• Closed – does not interact with the environment
• Cybernetic system – when feedback is applied to a
system
SYSTEM
A set of elements or components that works together
and interacts to accomplish goals
FEEDBACK
Input
Input Captures or collects raw data from within organization
or from its external environment.
Processing
Processing converts this raw input into a more meaningful form.
Output
Output transfers from processed information to the people
who will use it or to the activities for which it will be used.
Feedback
Feedback is output that is returned to appropriate members of
the organization to help them evaluate or correct the input
stage.
Data
A stream of raw facts about anything
Examples:
Record of all the players in one day cricket
matches.
5
Information
processed data, which is useful to the
recipient.
Examples:
Profit of the company in the current year
The highest ever score in one day cricket
First ten toppers in a class
The top 50 business houses of India.
6
Then Information is……
WHICH
• Tells something the receiver did not know
• Reduces uncertainty
7
Perspectives on Information Systems
Figure 1.3 Raw data from a supermarket checkout counter can be processed and organized to produce
meaningful information, such as the total unit sales of dish detergent or the total sales revenue
from dish detergent for a specific store or sales territory.
Information System: why?
OR
• Information system:
Set of interrelated components
Collect, process, store, and distribute information
Support decision making, coordination, and control
Perspectives on Information Systems
Functions of an
Information System
An information system contains
information about an
organization and its surrounding
environment. Three basic
activities—input, processing, and
output—produce the information
organizations need. Feedback is
output returned to appropriate
people or activities in the
organization to evaluate and
refine the input. Environmental
actors, such as customers,
suppliers, competitors,
stockholders, and regulatory
agencies, interact with the
organization and its information
systems.
Figure 1.4
Perspectives on Information Systems
Contd…
Perspectives on Information Systems
Levels in a Firm
Business organizations are
hierarchies consisting of three
principal levels: senior
management, middle
management, and operational
management. Information
systems serve each of these
levels. Scientists and
knowledge workers often work
with middle management.
Figure 1.6
Types of Information Systems
Executive Level-I
Support
Systems
Level- III
Transaction Processing Systems
19
Business Processes and
Information Systems
• Business processes:
Workflows of material/information/knowledge
Sets/steps of activities
Figure 2-1 Fulfilling a customer order involves a complex set of steps that requires the close coordination of
the sales, accounting, and manufacturing functions.
Types of Information Systems
A Payroll TPS
A TPS for payroll
processing captures
employee payment
transaction data (such
as a time card). System
outputs include online
and hard-copy reports
for management and
employee paychecks.
Figure 2-2
Types of Information Systems
How Management Information Systems Obtain Their Data from the Organization’s
TPS
In the system illustrated by this diagram, three TPS supply summarized transaction data to the MIS
reporting system at the end of the time period. Managers gain access to the organizational data
through the MIS, which provides them with the appropriate reports.
Types of Information Systems
This report, showing summarized annual sales data, was produced by MIS.
Types of Information Systems
• Enterprise applications : are used to ensure that TPS, MIS, DSS, and
ESS work together smoothly.
Four major applications:
Enterprise systems
Supply chain management systems
Customer relationship management systems
Knowledge management systems
It also incorporates
information supplied by
knowledge management
systems, manufacturing and
finance systems, and other
enterprise systems
Types of Information Systems
• Enterprise systems
Collects data from different firm functions and stores data in single
central data repository
Resolves problem of fragmented, redundant data sets and systems
Enable:
Coordination of daily activities
Efficient response to customer orders (production, inventory)
Provide valuable information for improving management decision
making
Types of Information Systems
Expert systems are the most widely applied & commercially successful
AI technology.
Transferring Expertise
Objective of an expert system
– To transfer expertise from an expert to a computer system and
– Then on to other humans (non-experts)
• Enterprise Systems
Also called “enterprise resource planning (ERP) systems”
Integrated software modules and a common central database
Better Coordination among its functional Areas and improve overall
business efficiency.
Collects data from many divisions of firm
Information entered in one process is immediately available for other
processes
Enterprise Systems
• Enterprise Software
Built around hundreds of predefined business processes that reflect best
practices
Finance/accounting: General ledger, accounts payable, etc.
Human resources: Personnel administration, payroll, training, etc.
Manufacturing/production: Purchasing, shipping, etc.
Sales/marketing: Order processing, billing, sales planning, etc.
To implement, firms:
Select functions of system they wish to use
Map business processes to software processes
– Use software’s configuration tables for customizing
Enterprise Systems
HOW ENTERPRISE
SYSTEMS WORK
• Competitive Advantage
Doing things better than your competitors, charging less for superior products, and
responding to customers and suppliers in real time all add up to higher sales and
higher profits that your competitors cannot match. Dell Computers and Wal-Mart
are prime examples of how these companies used information systems and
technologies to separate themselves from their competition.
• Survival
Firms also invest in information systems and technologies because they are
necessities of doing business. Information systems is not a luxury. In most
businesses, information systems and technology is the core to survival.
Value chain analysis (VCA)
It is a process where a firm identifies its primary and support activities that
add value to its final product and then analyze these activities to reduce costs
or increase differentiation.
Value chain represents the internal activities a firm engages in when
transforming inputs into outputs.
Electronic Business Concepts
61
Traditional Business
• Traditionally, business is exchange of articles,
goods and food items, a need based..
62
Traditional Business to e-business
Steps for transition of existing traditional
business to e-business are
E-Business
Objectives of e-business
• E-business objectives can be listed as –
– Primary objective :
• to use internet and electronic communication system to
deliver business value by its effective use in business
transactions
71
E-Business Models
E-business model –
• A framework with all business components to create value and
meet business objectives
or
• A set of business processes through planned activities to
achieve business objectives
Revenue Model of web based Companies
84
e-business transactions / communications
• Three types of networks used for e-business transactions /
communications - Internet, Intranet and Extranet
• Internet is used globally to have communication with various
stakeholders of e-business
• Intranet is used by the people within an organization to
support organizational communication
• Extranet is used to maintain distributed communication
among various business partners(Authorised) such as
suppliers and buyers, to ease communication and coordination
of regular activities
Electronic Data Interchange
• EDI Developed in 1980s
• EDI Allows structured business documents to be routed
electronically.
• EDI is mainly used to electronically transmit business
documents, such as invoices, purchase orders, shipping
notices, financial information, payment, and other standard
business correspondences among various business partners
• When EDI is used for payments, it is commonly referred to as
financial EDI or electronic funds transfer (EFT).
• Reasons for implementing EDI:
– To eliminate duplicate data entry
– To eliminate errors
– To reduce fixed replenishment costs
– To reduce the replenishment lead time
– To improve communication along supply chain
Electronic Data Interchange
Examples of Documents Exchanged
Purchase Order
PO Acknowledgement
Invoice
CASH
Remittance Advice
EDI Documents
Following are few important documents used in EDI −
1. Invoices
2. Purchase orders
3. Shipping Requests
4. Acknowledgement
5. Business Correspondence letters
6. Financial information letters
88
EDI Applications
EDI, applied to the different business processes, allows more streamlined and
efficient operations of your commercial, purchasing and administrative
departments with companies both supplying and receiving goods.
Reduction in data entry errors. − Chances of errors are much less being use of computer in
data entry.
Shorter processing life cycle − As orders can be processed as soon as they are entered into the
system. This reduced the processing time of the transfer documents.
Electronic form of data − It is quite easy to transfer or share data being in electronic format.
Reduction in paperwork − As lot of paper documents are replaced with electronic documents
there is huge reduction in paperwork.
Cost Effective − As time is saved and orders are processed very effectively, EDI proves to be
higly cost effective.
Standard Means of communication − EDI enforces standards on the content of data and its
format which leads to clearer communication.
90
EFT, NEFT, RTGS, IMPS, EMT
91
Electronic Funds Transfer (EFT) is the electronic transfer of money from one
bank account to another, either within a single financial institution or across
multiple institutions, through computer-based systems and without the direct
intervention of bank staff. EFTs are known by a number of names.
For example, when you use your debit card to make a purchase at a store or
online, the transaction is processed using an EFT system. The transaction is
very similar to an ATM withdrawal, with near-instantaneous payment to the
merchant and deduction from your checking account.
Direct deposit is another form of an electronic fund transfer. In this case, funds
from your employer’s bank account are transferred electronically to your bank
account, with no need for paper-based payment systems.
The growing popularity of EFT for online bill payment is paving the way for a
paperless universe where checks, stamps, envelopes, and paper bills are
obsolete.
The benefits of EFT include reduced administrative costs, increased efficiency,
simplified bookkeeping, and greater security. However, the number of
companies who send and receive bills through the Internet is still relatively
small. 92
How do you transfer funds?
Transferring funds via electronic gateway is much simpler than the conventional
methods. You can choose to:-
1. Transfer funds into your own linked accounts of the same bank network.
2. Transfer funds into different account of the same bank.
3. Transfer funds into different bank’s accounts using NEFT.
4. Transfer funds into other bank accounts using RTGS
5. Transfer funds into various accounts using IMPS.
93
94
NEFT
The National Electronic Funds Transfer is a nation-wide money transfer system
which allows customers with the facility to electronically transfer funds from their
respective bank accounts to any other account of the same bank or of any other
bank network. Not just individuals but also firms and corporate organizations may
use the NEFT system to transfer funds to and fro.
Funds transfer through NEFT requires a transferring bank and a destination bank.
With the RBI organizing the records of all the bank branches at a centralized
database, almost all the banks are enabled to carry out an NEFT transaction. Before
transferring funds via NEFT you register the beneficiary, receiving funds. For this
you must possess information such as name of the recipient, recipient’s bank name,
a valid account number belonging to the recipient and his respective bank’s IFSC
code. These fields are mandatory for a funds transfer to be authorized and
processed.
Any sum of money can be transferred using the NEFT system with a maximum cap
of Rs. 10, 00, 000.
NEFT transactions can be ordered anytime you want, even on holidays except for
Sundays which are designated bank holidays. However, the transactions are settled
in batches defined by the Reserve Bank of India depending upon specific time slots.
95
RTGS
Real Time Gross Settlement as the name suggests is a real time funds transfer
system which facilitates you to transfer funds from one bank to another in real
time or on a gross basis. The transaction isn’t put on a waiting list and cleared
out instantly. RTGS payment gateway, maintained by the Reserve Bank of India
makes transactions between banks electronically. The transferred amount is
instantly deducted from the account of one banks and credited to the other
bank’s account.
Users such as individuals, companies or firms can transfer large sums using the
RTGS system. The minimum value that can be transferred using RTGS is Rs. 2
Lakhs and above. However there is no upper cap on the amount that can be
transacted.
The remitting customer needs to add the beneficiary and his bank account
details prior to transacting funds via RTGS. A beneficiary can be registered
through your internet banking portal. The details required while transferring
funds would be the beneficiary’s name; his/her account number, receiver’s bank
address and the IFSC code of the respective bank.
On successful transfer the Reserve Bank of India acknowledges the receiver
bank and based on this the both the remitting bank as well as the receiving
bank may/ may not notify the customers.
96
IMPS
Majority of the funds transferred using electronic channels are processed via NEFT
or RTGS. But as the funds could only be cleared in batches using these transfer
gateways, the National Payments Corporation of India introduced a pilot mobile
payment project also known as the Immediate Payment Service (IMPS).
Available to Indian public, IMPS offers instant electronic transfer service using
mobile phones. IMPS interbank transfer service is available 24X7 and allows you to
use your mobile phones to access your account and to authorize transfer of funds
between accounts and banks. The IMPS service also features a secure transfer
gateway and an immediate confirmation on fulfilled orders.
IMPS is offered on all the cellular devices via Mobile Banking or through SMS
facility.
To be able to transfer money via IMPS route you must first register for the
immediate payment services with your bank. On obtaining the Mobile Money
Identifier (MMID) and MPIN from the bank you can login or make a request via
SMS to transfer a certain amount to a beneficiary.
97
Email Money Transfer – EMT
A retail banking service that allows users to transfer funds between personal
accounts using email and their online banking service. Email money transfers are
considered secure because only the notification of transfer is done through email.
The actual funds are settled through the existing funds transfer networks that banks
have used for years.
The email money transfer is most commonly used by clients of the "big five" banks
in Canada: the Royal Bank of Canada, TD Canada Trust, the Canadian Imperial Bank
of Commerce, the Bank of Montreal and the Bank of Nova Scotia. Because email is
used, however, this service is susceptible to phishing scams. Care must be taken by
both parties to ensure the safety of both the sender and receiver.
It is a good practice to not accept transfers from unknown parties, and to contact
the sender directly when notified of a transfer that is not expected.
98
Online Shopping
99
Online shopping is one of the most popular ways to make
purchases, but it's not something that everyone is
comfortable doing. As with most things, there are positives
and negatives associated with this approach to shopping.
Consider the advantages and disadvantages carefully so you
can make an informed decision about what's best for you.
100
101
102
Advantages
• Access - Online shopping allows you to shop from any vendor, at any
time, anywhere in the world. Virtual window shopping enables all users
to shop at their leisure and across multiple marketplaces.
• Time Saver - You no longer have to get in your car and have to drive to
the mall to shop. There are no lines and you can come back to your cart
whenever you want.
• Online Deals and Promotions - Before you checkout, you can scour
the Internet for online coupon codes or special discounts. Many
companies send coupons to their customers who have opted into their
email marketing campaigns, delivering them with the latest product or
service information and what current promotions they are currently
holding.
103
Disadvantages
104
Launching a Successful
Online website
Or
Steps involved in Web Site Building
Building or Acquiring a Web Site
Buying Content:
Content that is acquired from outside sources should be supplemental
content, not primary content
3.2 Content Management
• content management
The process of adding, revising, and removing
content from a Web site to keep content fresh,
accurate, compelling, and credible
– Content Testing
– Measuring Content Quality
– Content Removal
– Content Management Software (CMS)
4. Web Site Design
Information architecture
How the site and its Web pages are organized, labeled, and
navigated to support browsing and searching throughout the Web
site
Deep linking
Entry into a Web site via the site’s interior pages, not the
homepage, typically through search engines or external links
Site navigation
Aids that help visitors find the information they need quickly and
easily
Colors and Graphics
The key to effective use of color and graphics is to design the site to
match the expectations of the target audience
A Simple Hierarchical Web Site Structure
Web Site Design
119
Types of Payment Systems
Stored value payments systems(Internet Banking) are accounts
created by depositing funds into an account and from which
funds are paid out or withdrawn as needed
Debit cards immediately debit a checking or other demand
deposit account. Smart cards(Debit Card) as store value
systems are based on credit-card-sized plastic cards that have
embedded chips that store personal information
Digital Wallet : Authenticates the consumer through the use of
digital certificates or other encryption methods, stores and
transfers value, and secures the payment process from the
consumer to the merchant. payumoney, paytm, mobikwik,
freecharge, citrus, airtelmoney, etc.
Online store value systems(Wallet in a website) rely on
prepayments, debit cards, or checking accounts to create value
in an account that can be used for e-commerce shopping
Types of Payment Systems
Credit card represent an account that extends credit to
consumers, permits consumers to purchase items while
deferring payment, and allows consumers to make payments
to multiple vendors at one time
Credit card associations are nonprofit organizations that set
standards for issuing banks
Issuing banks actually issue credit cards and process
transactions
Processing centers or clearing houses handle verification of
accounts and balances
How an Online Credit Card
Transaction Works
Limitations of Online Credit Card
Payment Systems
Security
Neither the merchant not the consumer can be fully
authenticated
Merchant Risk
Consumers can repudiate(Reject) charges
Cost
Roughly 3.5% of purchase plus transaction fee
Social Equity
Young adults do not have credit cards
Almost 100 million adult cannot afford cards or are
considered poor risks
Web Server & Web Browser
124
Web Browser:
web browser is a software application which enables a user to display and interact
with text, images, videos, music and other information typically located on a Web
page at a website on the World Wide Web or a local area network.
Some of the Web browsers currently available for personal computers include
Mozilla Firefox, Avant Browser, Safari, Google Chrome, Konqueror, Opera, Flock,
Internet Explorer, Epiphany, K-Meleon and AOL Explorer
125
Web Server:
The term web server can mean one of two things:
computer program that is responsible for accepting HTTP requests from web clients, which
are known as web browsers, and serving them HTTP responses along with optional data
contents, which usually are web pages such as HTML documents and linked objects
(images, etc.).
126
Cryptography
slide 127
Cryptography
• Symmetric Cryptography
• Asymmetric Cryptography
slide 128
Symmetric Cryptography or Private Key Encryption or
Secret Key Encryption:
use one key (public key) to encrypt a message. Symmetric cryptosystems use
the same key (secret key) to encrypt and decrypt a message. It is also called
Private (secret) Key Cryptography. It is most widely used symmetric key
encryption. It uses 128-, 192-, and 256-bit encryption keys
slide 129
Asymmetric Cryptography or Public Key Encryption:
Asymmetric cryptosystems use one key (the public key) to encrypt a message
and a different key (the private key) to decrypt it. Asymmetric cryptosystems are
also called public key cryptography.
slide 130
Digital Certificate
131
Digital Certificate
• Digital certificate includes:
– Name of subject/company
– Subject’s public key
– Digital certificate serial number
– Expiration date, issuance date
– Digital signature of CA(Certifying Authorities)
Digital Certificates and Certification
Authorities
2. Example Certificate (1)
Certificate Summary
2. Example Certificate (2)
• Certificate Attribute details : Key Usage
2. Example Certificate (3)
• Certificate Attribute details : Subject
Digital Signature
137
What is a digital signature?
It is an electronic signature that can be used to authenticate the identity
of the sender of a message or the signer of a document, and possibly to
ensure that the original content of the message or document that has
been sent is unchanged.
The use of digital signatures usually involves two processes, one performed by
the signer and the other by the receiver of the digital signature:
• Digital signature creation
• Digital signature verification
139
FTP
140
Why do we need a FTP Service?
142
HyperText Transfer Protocol (HTTP)
• http:// www.xyz.com
143
HTTP Proxy Server
HTTP
Browser Internet
Server
144
E Mail
145
Role of Email in Ecommerce::
What can email marketing do for your online business?
146
SMTP
(Simple Mail Transfer Protocol)
147
Simple Mail Transfer Protocol
• It is a Protocol originated in 1982
• Standard message format
• Goal: To transfer mail reliably and efficiently
• SMTP service runs on port 25.
Format of an email
• Mail is a text file
• Envelope –
– sender address
– receiver address
– other information
• Message –
– Mail Header – defines
the sender, the receiver,
the subject of the
message, and other
information
– Mail Body – Contains the
actual information in the
message
Recipient ISP’s mail server
150
Post Office Protocol (POP) /
Internet Message Access
Protocol (IMAP)
151
POP/IMAP
All Messages
Internet
IMAP:
Dr.Amer
Friends
….
Internet
Post Office Protocol v3
• Simple
• Allows the user to obtain a list of their Emails
• Users can retrieve their emails
• Users can either delete or keep the email on
their system
• Minimizes server resources
Internet Mail Access Protocol v4
• Has more features than POP3
• User can check the email header before downloading
• Emails can be accessed from any location
• Can search the email for a specific string of
characters before downloading
• User can download parts of an email
• User can create, delete, or rename mailboxes on a
server
Firewall
156
What is a Firewall?
Effective means of protection local network of systems from
network-based security threats from outer world
– while providing (limited) access to the outside world (the Internet)
• Mobile ticketing
• Content purchase and delivery
• Information services
• Mobile banking
• Mobile Browsing
• Auctions
• Mobile Purchase
• Mobile marketing and advertising, etc.
Entertainment Communications
• Music • Short Messaging
• Games • Multimedia Messaging
• Graphics • Unified Messaging
• Video • e-mail
• Pornography • Chatrooms
• Video - conferencing
M- commerce
Information
Transactions
• News
• Banking
• City guides
• Broking
• Directory Services
• Shopping
• Maps
• Auctions
• Traffic and weather
• Betting
• Corporate information
• Booking & reservations
• Market data
• Mobile wallet
• Mobile purse
Mobile Commerce Application
• Google • Apple
– Android – Apple store
• Google Android Market • The App Store is a
digital application
distribution platform
for iOS developed and
maintained by Apple.
Mobile payment
• Is an alternative payment method. Instead
of paying with cash, cheque or credit cards,
• A consumer can use a mobile phone to pay
for a wide range of services and digital or
hard goods such as:
– Music, videos, ringtones, online game
– Transportation fare (bus, subway or train)
– Books, magazines, tickets
Mobile Payment
Customer requirements:
a larger selection of merchants with whom they can
trade
a more consistent payment interface when making the
purchase with multiple payment schemes, like:
Credit Card payment
Bank Account/Debit Card Payment
Merchant benefits:
• brands to offer a wider variety of payment
• Easy-to-use payment interface development
• Advantages
Offers many payment options
Push advertising, direct marketing.
More efficient and extensive service offered.
The Internet is going mobile
Can be easily setup
• Disadvantage
Expensive cost
Larger screens won’t be displayed is clear
May be Slow speed
Limited for longer message
It hard way to fill the data.
Security issue also
Cases / Case Studies
173
E Business /MIS Cases
Case 1
The world GoldStar sells television sets, computers, laptop, CD drives, DVD players,
microwaves, refrigerators and the very recent – cosmetics.
Explain how GoldStar can use IT. Who are the users and how they are benefited? Explain
how Ecommerce model works? You as an external consultant, prepare a detail workout.
Case 2
A small scale Industry with an annual turnover of Rs. 3 crores wants to investigate the
possibility of IT and E- Commerce strategy. You as an external consultant, prepare a
detailed report highlighting the step by step approach for implementing IT tools and
Ecommerce strategy. Also highlight the major returns, unseen risks and the security issues
of E-Commerce.
Case 3
An Automobile Industry with an annual turnover of Rs. 100 crores wants to investigate the
possibility of IT and E- Commerce strategy. You as an external consultant, prepare a
detailed report highlighting the step by step approach for implementing IT tools and
Ecommerce strategy. Also highlight the major returns, unseen risks and the security issues
of E-Commerce.
174
Case 4
Founded in 1994, Exodus communications helped create the complex web hosting business and has
attained a market value of over $10 billion. The company offers sophisticated system and network
management, along with professional services to support performance for customers’ websites. Exodus
manages its network infrastructure via a worldwide network of Internet Data Centers (IDCs) located in
North America, Europe, and Asia pacific. Exodus has 22 data centres around the world and is building
another 14. Its customers include eBay, Yahoo!, Merrill Lynch, British Airways and Johnson & Johnson.
When Ellen Hancock, its CEO, joined the company before its IPO in 1998, 80% of its customer base was
internet start-ups and 20% were in the “enterprise” category. By 2000, 49% of the customer base was in
the enterprise category. In the same time frame,, it had grown from no consultants to 660 as managed
services increased from 8% to 34% of its business. During this transition, Exodus bought two computer
security companies and had moved into a number of new services.
An example of the type of service demands that Exodus encounters occurred when the Webmasters of
the RollingStone.com, the website of Rolling Stone magazine, had difficulty trying to solve a slow
response time problem just a day before the publication of a multimedia cover story on Britney Spears.
This would obviously cause a spike in demand that would exacerbate the response time problem. Since
Exodus was hosting and maintaining the site, its engineers helped in solving the problem, which involved
incorrect configurations data that caused server to use 10 to 15 seconds to refresh domain name data
every few minutes instead of daily.
175
Case 4 – Continued…
Approximately 400 of its customers( 12% of its customer base of 3300 companies) are application service providers
(ASPs) that run application software for other firms using remote servers linked to a WAN so that those first no longer
have to install and maintain the software. Exodus charges for service based on usage, and this fits well with an ASP
charging scheme. Its ASP customers range from start-ups to established software firms such as PeopleSoft and
Oracle’s Business Online. According to Ellen Hancock, “it’s very hard to say what you’re not doing, but we’ve spent a
lot of time trying to do that. We say we’re not going to know applications. We’re not in that business. We just support
the ASP……. We have no notion of competing with Oracle on E-commerce. We do not intend to ever understand HR
(human resources) apps. That’s a whole different skill base, and we don’t have it. Both Exodus and its rival Digex seem
to be evolving into “managed service providers” but using different paths. In late 2000, Digex unveiled a customer self
service portal called myDigex.com that gives them the ability to manage and provision their own services, such as
performance statistics, site/server layouts, asset management, billing and help desk issues. In addition, it gives access
to service-level agreements and Digex support staff. In contrast, the new but not yet named services Exodus
announced included remote monitoring, storage management and performance monitoring. According to one
industry analyst, “these guys are happy to host, and they’re willing to manage your servers, but they are unwilling to
raise the level of responsibility to something that is application-specific or customer specific.”
Questions:-
1. Why should a large, technically sophisticated company like Merrill Lynch buy Web hosting services from Exodus
Communications?
2. According to the case study, Exodus Communications is an ISP for ASPs, but currently says it is not interested in
moving into that market based on its current skills. What are the possible advantages and disadvantages of moving
into the ASP market as it learns more about how to support this type of activity?
176
Case 5
When Ellen Hancock, its CEO, joined the company before its IPO in 1998, 80%
of its customer base was internet start-ups and 20% were in the “enterprise”
category. By 2000, 49% of the customer base was in the enterprise category. In
the same time frame,, it had grown from no consultants to 660 as managed
services increased from 8% to 34% of its business.
During this transition, Exodus bought two computer security companies and had
moved into a number of new services.
177
Case 5 – Continued…
An example of the type of service demands that Exodus encounters occurred when
the Webmasters of the RollingStone.com, the website of Rolling Stone magazine,
had difficulty trying to solve a slow response time problem just a day before the
publication of a multimedia cover story on Britney Spears. This would obviously
cause a spike in demand that would exacerbate the response time problem. Since
Exodus was hosting and maintaining the site, its engineers helped in solving the
problem, which involved incorrect configurations data that caused server to use 10
to 15 seconds to refresh domain name data every few minutes instead of daily.
Approximately 400 of its customers( 12% of its customer base of 3300 companies)
are application service providers (ASPs) that run application software for other
firms using remote servers linked to a WAN so that those firs no longer have to
install and maintain the software. Exodus charges for service based on usage, and
this fits well with an ASP charging scheme. Its ASP customers range from start-ups
to established software firms such as PeopleSoft and Oracle’s Business Online.
178
Case 5 --- Continued…
According to Ellen Hancock, “it’s very hard to say what you’re not doing, but
we’ve spent a lot of time trying to do that. We say we’re not going to know
applications. We’re not in that business. We just support the ASP……. We have
no notion of competing with Oracle on E-commerce. We do not intend to ever
understand HR (human resources) apps. That’s a whole different skill base, and
we don’t have it.
Both Exodus and its rival Digex seem to be evolving into “managed service
providers” but using different paths. In late 2000, Digex unveiled a customer
self-service portal called myDigex.com that gives them the ability to manage and
provision their own services, such as performance statistics, site/server layouts,
asset management, billing and help desk issues. In addition, it gives access to
service-level agreements and Digex support staff. In contrast, the new but not yet
named services Exodus announced included remote monitoring, storage
management and performance monitoring. According to one industry analyst,
“these guys are happy to host, and they’re willing to manage your servers, but
they are unwilling to raise the level of responsibility to something that is
application-specific or customer specific.”
179
Questions:-
1. Why should a large, technically sophisticated company like Merrill Lynch buy
Web hosting services from Exodus Communications?
180