e-Management Applications Galore! e-Managing comes of age

Earlier this year, SolNet “e-vangelist” and dotcom survivor Mike Lowe changed job title. Formerly e-business solutions manager – today his business card reads: “national solutions sales manager”. It’s sign of the more mature e-business, or more accurately, e-managing times we’re living in. Just as quickly as it became popular in the ’90s, the ‘e-word’ is now disappearing from our corporate vocabulary.
e-Business is business in the 21st century. It is conducted anywhere – thanks to mobile internet access – and any time. And it impacts virtually every management process and discipline.
The hype is over – companies are now ‘e-nabling’ their business pro-cesses because it improves service and profitability, not just because the competition is doing it. As Lowe puts it, “the ‘fud’ factor is no longer out there. Fear, uncertainty and doubt that once surrounded e-business has disappeared, along with its complexities of two or three years ago.”
There is new confidence surrounding e-managing – the confidence that comes with coming of age. Furthermore, the costs and risks traditionally associated with applying e-business systems are fraction of what they once were.

e-Business defined
What is e-managing – and how does it create efficiencies? Oracle’s marketing director Nigel Murphy describes it as more than just electronic transactions between suppliers and buyers. “True e-business is the automation and web-enabling of all business processes, from human resource management to marketing and procurement,” he says. “By automating business processes you streamline and standardise them, stripping out time wastage and cost.”
Additional efficiencies are generated by departments, or even companies, sharing one e-business system for procurement or payroll processing, for example.
As result, transaction costs fall and duplication and waste are eliminated.
“By implementing ‘self-service’ your people have the e-tools to do all their own procurement, travel bookings and so on, online,” says Murphy, adding that such automated systems have the extra benefit of enforcing compliance with company policy.
Perhaps the greatest win from embracing e-business processes is the more efficient management of documents and data (information), particularly in supply chain applications involving many suppliers.
Rod Hall, of Tranzsoft Group, has seen the benefits first hand and points to the Pacific Health Exchange (PHE) as good example. HealthAlliance, which is member of the PHE provides shared e-procurement service between number of District Health Boards and potentially around 110 medical industry suppliers. “It provides common platform for e-trading between hospitals and any suppliers that want slice of the action,” he says.
Hall lists the benefits as increased accuracy of information (data re-keying is minimised); the ability to receive purchase orders electronically (picking and invoicing becomes much easier); and the ability to use web browsers as an ordering platform (product selection, request, despatch, and invoicing is all web-enabled, and instant).
It’s all about smarter management of information, and the deployment of electronic document exchange gateway platforms – Tranzsoft’s I2ms product is one of them. The system enables the transfer and exchange of documents and information between disparate systems (for example finance, sales, and inventory), and speeds up cooperation and information flow between companies and their partners or suppliers.
e-Managing data helps cut the so-called ‘paper mountain’ down to size. The latest breed of document management systems will register and file inbound data such as email and, via secure customised intranets, make that information available across the enterprise (bearing in mind that the degree of data mining available to an individual depends on that person’s position within the company).
The outcome of implementing such systems is vastly improved communication, and better informed management.

Security concerns
Microsoft New Zealand marketing director Tony Ward says it’s ironic that the internet was created by the US Army out of system of trust – and essentially it still operates that way today. “In the early days of e-commerce on the internet, there was lot of paranoia for first-time credit-card users. As time has passed, the trust and comfort factor has grown considerably.”
A major contributor to the increased security of web-enabled trading has been the emergence of the XML specification, and more specifically, ebXML (Electronic Business using eXtensible Markup Language). The latter is now considered the common standard for conducting business over the internet. ebXML picks up where the old, comparatively expensive EDI (electronic data interchange) left off – and because everybody is marching to the same tune, overall supply chain costs can be significantly reduced.
Fewer proprietary security software products on the market also mean less risk. Today’s standardised security software means that authentication, ID management and encryption is more reliable and trustworthy than ever. Perhaps this is where e-business has demonstrated its greatest maturity.
In terms of enterprise network security, Scott Ferguson, regional director for Check Point Software Technologies, believes many companies make the mistake of dealing with e-security issues purely at technical level, instead of treating it as business issue. “Look at security as an enabler, rather than brick-wall that protects everything,” he says. “It’s about making information available in secure way, not keeping people out. So ask the questions: what key assets do you need to protect? And how do you want to authenticate people?”
Ferguson warns that the nature of security attacks has changed recently. Rather than the network layer coming under attack, the focus is now directed at the application and operating system level. Setting up firewalls on the perimeter is no longer sufficient.
“e-Security systems must provide protection from within as well as outside the perimeter. Companies are now subject to vulnerabilities from their distributed workforce,” he says pointing out that many of the “Blaster” virus attacks recently were propagated by staff working on laptops at home, and then taking worms back to work.
“Like six-lane highway, there will always be dangers associated with e-business. But don’t be afraid of those risks, just recognise them and do something about them,” says Ferguson.

Advice for first-timers
According to SolNet’s Lowe, managerial time constraints and shortage of experienced top-level industry consultants in this country, can make the adoption of e-business processes more risky than it should be. “You need to do your research, or pay an expert to do it. If you’re after an e-business solution, instead of seeking specific products or consultants find preferred supplier with track record.”
He suggest the knowledge of many consultants is out of date and therefore it’s better to work with supplier who can successfully integrate systems – one who understands the complexities surrounding e-business.
The speed of implementation is also key to successfully adopting e-management processes. “Nobody wants an army of consultants swarming around for 12 months with little to show for it at the end,” says Oracle’s Nigel Murphy. His company has e-business systems that can be implemented in as little as 10 days.
“Outsourcing the management of your e-business applications is another way to address cost,” he says. “The main advantage is certainty – you negotiate monthly fee, and that’s it, no surprises.”
When researching where to apply e-business systems, good start is to focus on your most acute ‘pain point’. “By definition, that’s where you’ll get the fastest ROI if you fix it,” says Murphy. “Examine the complete business flow around that pain so you understand all the ramifications – how it impacts on finance, customer service, and so on. Then loo

Visited 4 times, 1 visit(s) today

Business benefits of privacy

Privacy Week (13-17 May) is a great time to consider the importance of privacy and to help ensure you and your company have good privacy practices in place, writes Privacy

Read More »
Close Search Window