You are on page 1of 10

Business Intelligence

Business View of IT
Agenda

A typical enterprise

Malcolm Baldrige performance excellence framework

Types of IT applications

Characteristics of Internet ready IT applications

Technology centric applications – from 1965 to 2000 and future

Typical enterprise application architecture

Few information users and their requirements


A typical Enterprise
Malcolm Baldrige Performance Excellence framework

Organizational Profile:
Environment, Relationships and Challenges

2. Strategic Planning 5. Workforce Focus

1. Leadership 7. Results

3. Customer and Market Focus 6. Process Management

4. Measurement, Analysis, and Knowledge Management


Types of IT applications

Department IT applications
• Payroll processing applications

Online Transaction Processing Systems


• Train/Air reservation application

Business Process / Model Innovation


• Amazon book store

Decision Support Systems


Characteristics of internet ready IT applications

Support large number of users of different interests and abilities

Provides display on multiple devices and formats

Deployed on large secure servers through license Management software

Support single sign-on and support special authentication & authorization requirements

Ability to run on any Operating system

Ability to use/ connect to any RDBMS for data storage

Could be implemented in multiple programming languages or combinations as well

Leverages enterprise storage capabilities and back-up systems

Supports extensive connectivity to different types of networks and Internet services

And many more...


Technology centric applications – from 1965 to 2000 to future
Typical Enterprise Application Architecture
Few Information users and their requirements

Administrative users, who


Role based users who have
configure IT environment,
access to certain category of IT
manage users, access control,
application, certain level of
anti-virus, perform anti-theft
classified information, access to
checks, install updates/ upgrades
specific systems & even specific
and back-up enterprise data and
operations they are allowed to
restore in the event of data
perform.
corruption.

Multi-device access users, who


Knowledge workers/ analytical
sometimes work in office, move
users who discover new patterns
in the field, use different devices
in enterprise data to help
ranging from desk top system to
businesses make innovative
hand held smartphone to
moves in the market place for
connect to enterprise IT
competitive advantage.
applications.
THANK YOU
www.infosys.com
The contents of this document are proprietary and confidential to Infosys
Limited and may not be disclosed in whole or in part at any time, to any third
party without the prior written consent of Infosys Limited.
© 2011 Infosys Limited. All rights reserved. Copyright in the whole and any
part of this document belongs to Infosys Limited. This work may not be
used, sold, transferred, adapted, abridged, copied or reproduced in whole or
in part, in any manner or form, or in any media, without the prior written
consent of Infosys Limited.

© 2011 Infosys Limited 10

You might also like