Examples, where integrated data may help, inform the core business procedures of the larger organization
- A firm can use it’s Business Process Management (BPM) framework and service account from a Client Relationship Management (CRM) implementation can be integrated into a core data hub for one view of the client (Loshin, 2008, p. 69).
- By operating jointly, Intel’s CRM and ERP workgroups explore and standardize the transactional and organizational implementations (Tremblay, 2007, p. 16).
- A commercial airline gathers 10 terabytes of sensor information for every half-hour of flight mileage. Currently, such ETL technology may be profoundly applied for separate data banking. Data and knowledge management experts for the airline’s initiatives increasingly use ETL and data banking along with the intense “lifting” of their data. At the same time, the organization maintains its BU instruments with precision and updated data (Loshin, 2008, p. 71).
Role of the CRM system currently used by one of the business units in the consolidation of data to support the core business processes for a larger organization
The CRM framework assists the larger firm in organizing and handling its associations with clients. This means gathering and distributing all these data into the central business zones is part of the role of the CRM system. The objective of this role is permitting a larger firm to handle its clientele in an improved manner. This manner includes the application of unfailing frameworks and procedures that interact with the firm’s data and knowledge management experts and clientele. The CRM framework also acquires the maximum performance of the firm’s information expertise (Loshin, 2008, p. 85). Even though this role constraints the functionality, it is a tremendous step for consolidating the missing components in an entire framework. The CRM system also incorporates the workflow procedure computerization of the larger organization (Tremblay, 2007, p. 24). As a result, the software for the business units ends up supporting the overall transactions of the CRM framework by aiding it in automating, handling, observing, and measuring the principal business protocols.
Challenges to the use of integrated data solutions may impact a multinational organization working in the United States and abroad
The key challenge is losing or misplacing data values (Tremblay, 2007, p. 28). A multinational firm may be unable to regain the data for employees or clients in other countries from data warehouses in the United States. More particularly, if the firm loses a worker’s name, the worker’s email address may not be enough ground for the firm to find the name from the human resources reference databank in the overseas company. Another risk is the duplication of data (Tremblay, 2007, p. 30). Integrated data solutions do not always provide distinctive identifiers. As a result, it becomes hard for the firm to spot data duplicates in data warehouses in both the United States and abroad. Even though the organization may consider using uncertain logic, carrying out inaccurate data matches cannot fully remove data duplicates.
Finally, integrated data solutions can cause varying data formats (Loshin, 2008, p. 92). In this situation, the organization may have data stored in a format that cannot be incorporated with other databanks. For example, the data format for an overseas multinational organization may not integrate with the data warehouse in the United States headquarters. Another example is the need to mix a multi-value address area with a databank that stores standardized address records (Loshin, 2008, p. 93). In this case, the organization may need to build logic to determine the required street address, city, state, nation, and zip code.
References
Loshin, D. (2008). Master Data Management. Burlington, MA: Morgan Kaufmann.
Tremblay, M. C. (2007). Uncertainty in the Information Supply Chain: Integrating Multiple Health Care Data Sources. South Florida: University of South Florida.
Copyright Law: The Authors Guild Vs Google
Introduction
The modern digitalized society provides multiple benefits for people because of the accessibility of information. At the same time, it also generates many concerns about the protection of data and copyright issues. The fact is that the rapid development of the Internet and emergence various databases containing thousands of works introduced significant problems to copyright holders. The fact is that the free distribution of texts can deprive them of the expected income.
The existing copyright law is expected to protect authors from losses mentioned above and provide punishment for offenders. However, the complexity of relations in digitalized society and problematic regulation results in the emergence of many conflicts.
For instance, the American concept of fair use can today be applied to any purposes; it means that the existing scope of copyright limitations and exceptions can fail to suffice the current copyright holders’ demands (Katz, 2013). That is why there is a ground for the emergence of conflicts presupposing the unethical behavior and illegal use of texts. Thus, the given paper is devoted to the investigation of the case Google vs. Authors Guild and ethical problems associated with it.
Background
The fact is that the 21st century can be characterized by numerous debates about the future of traditional data storage devices and books that could also be related to this category. The spread of electronic book readers and the appearance of digital versions of all texts triggered a vigorous discussion about how this sphere will evolve. The situation is also complicated by the fact that along with the decreased popularity of conventional books numerous legal and ethical concerns emerged (Baker, 2014).
The problem can be partially solved by the introduction of protection to books that are guarded by the law of copyright; however, these measures do not suffice authors, and they experience significant losses (Sookman, 2014).
These include financial issues because of the decreased number of texts’ sales, which are the main source of income for copyright holders. Moreover, the authors do not have the motivation to work because of the high probability of illegal use of their works and lack of money to support their creativity. One of the most popular platforms of this sort Google also provides access to a wide collection of works to its users. For this reason, it faced a wave of dissatisfaction and numerous claims from the Authors Guild.
The Authors Guild v. Google
This conflict can be described as a copyright case opened in the USA. The main parties to the conflict are Google and the Authors Guild. The first actor insisted on the importance of the development of an online database providing access to a significant number of books to users regarding the fair use concept. However, the Authors Guild is against it because of the lack of legal protection to texts and impairment of copyright holders’ interests.
At the same time, the provision of access to books’ summaries, selected chapters, and other content is a direct threat to the development of the whole industry. That is why during the court the Authors Guild introduced appeals related to Google’s infringement of the basic copyright rules while creating, developing, and supporting their project Google Book Search (Rasenberger & Besek, n.d). The complainant stated that this database caused substantial harm to many authors whose books were included in its archives. First, the corporation made a number of texts available for free which deprived authors of incomes; second, Google did not pay license fees which also does not benefit creators (Rasenberger & Besek, n.d.).
However, the given lawsuit was dismissed because of the no signs of critical violations (Rasenberger & Besek, n.d.). In accordance with the decree of the court, Google Books as the platform that provides access to various sources meets all requirements for fair use (Rasenberger & Besek, n.d.). Fair use is the idea presupposing the reproduction of the copyrighted material without special permission or additional payments (Sookman, 2014). This decision triggered a wave of discussions and new appeals to the Second Circuit, and the US Supreme court. However, the lower courts’ decision were not changed (Liptak & Alter, 2016). Google Books was considered an online database that did not violate existing copyright laws and works within the existing legal framework.
Fair Use
This case illustrates a number of ethical issues. Adheres of the Authors Guild appeal to the concept of fair use which turns out to be insufficient to protect creators’ rights. In general, fair use can be determined as a specific doctrine peculiar to the law of the USA (Mangal, 2016). It provides the right to use copyrighted content without permission of the copyright holder (Sookman, 2014). This right is limited by various regulations stating that only some portions of materials can be used (Sookman, 2014).
The main purpose for the introduction of this law is to balance the current interests of authors or copyrights holders with the public and users’ interest in the free distribution and use of various works (Mangal, 2016). The primary point of concern of these parties is the generation of constant income from using their texts in different ways; it includes sales, use by the third parties, and copying (Mangal, 2016). At the same time creators are interested in the popularization of their works among the target audience (Mangal, 2016).
Fair use is also introduced to promote the development of students’ science, research, and other fields. In accordance with the dominant idea, the given approach is expected to cultivate a new society that benefits from the use of books. However, the initial purpose of copyright law is also to cultivate the evolution of useful arts by protecting original ideas and their authors’ right to benefit from their creation (Aufderheide & Jaszi, 2018). In such a way, being similar in their origins, fair use and copyright law are two sides of the same coin that protect different values.
However, this belief is opposed by another perspective on the problem stating that the practice of fair use is not fair. The limited utilization of materials protected by copyright poses a threat to holders (Aufderheide & Jaszi, 2018). Instead of buying the whole source, individuals can collect the needed information from the provided piece. New generation search engines create a set of new problems such as the increased accessibility of texts, the emergence of the ability to use them not entering the database, and the appearance of multiple websites providing protected content not having any rights for these actions (Gilder, 2018).
Moreover, information can be shared with other people using the Internet or data storing devices. In such a way, the doctrine undermines the existing balance and gives rise to multiple ethical issues. For instance, the publishing industry has numerous claims for Google as it includes snippets of copyrighted works and short summaries that can be used by learners and other individuals without buying the source (The Authors Guild, n.d.).
Regardless of the legality of this act, these actions cause substantial damage to the industry, copyright holders, and authors. From another perspective, the situation is analogous to movie trailers at YouTube that provide some information about films; however, viewers still watch them in cinemas. The only thing these videos do is helping to determine the quality of content and whether it is worth watching. Google Books acts in a similar way by helping consumers to select an appropriate source.
Google’s Use of Texts
Google corporation does not agree with this perspective and does not want to accept claims from various agents. First of all, the company states that all measures to provide the texts only of works that can be found in the public domain are introduced (Johns & Huthwaite, 2016). It means that full copies of protected sources are not offered to users for free, and they should pay for them. Second, only summaries of books that remain under the copyright protection and that can be found online are provided to users who search a particular source. It helps the company not to violate the terms of the existing copyright laws and act regarding the fair use concept.
Third, the company guarantees the improved defense for books that should be bought by consumers to ensure that authors will have their compensation. It means that if an individual wants the copy of a book, a link to a site where it can be legally bought will be provided. Otherwise, only previews are available. A set of these measures is expected to minimize the damage done to copyright laws and ensures that no serious violations will emerge.
Criticism
Nevertheless, this approach is often criticized by authors and copyright holders. They state that the company does not have the right to copy full texts of all books that are protected by the law and save them (Hobb, 2010).
The utilized method of storing information violates the existing law and contributes to the appearance of new problems in the sphere. In such a way, there are multiple claims regarding the legitimacy of Google’s perspective on fair use. At the same time, there are also ethical issues related to the respect of intellectual property and rewards that should be provided to authors if their works are used by the third parties (The Authors Guild, n.d.). Responding to these multiple claims, the corporation introduced its own perspective on the discussed issue.
Settlement Agreement
The fact is that creating the basis for a new project, Google engaged in a so-called settlement agreement. It was offered on October 28. 2008 and presupposed the $125 million that should be paid to all rights-holders whose books would be scanned and used in the new database (Band, 2009). Additionally, authors were able to introduce a claim about their books being used by Google and receive about $ 60 per work (Band, 2009).
At the same time, copyright holders were supposed to receive 63% of all advertising used by the company (Samuelson, n.d.). The given agreement had to be approved by the court as it presupposed some rewards to authors, along with the opportunity to utilize the basic assumptions of the fair use doctrine and provide users with the needed resource (Band, 2009). In other words, the deal can be considered Google’s attempt to find the most appropriate variant to scan books’ texts and use them in its new project.
Analyzing this situation, it is critical to say that little has changed for Google and its project. The basic idea of GBS is to provide users with sources they might need for various purposes. For this reason, the existence of millions of copies that can be offered to viewers makes the existing database one of the most potent tools for research and study. It will benefit students and young researchers working in various spheres by providing them access to needed materials. At the same time, authors of utilized ideas can also be rewarded as they will be paid for the full texts if they are needed. In such a way, this approach helps to balance creators’ rights and demand for books.
Additionally, the big collection of works contributes to the continuous increase in the popularity of this platform and its further development. Google does not provide access to full texts because of the failure of the agreement. Instead, there are multiple previews, snippets, and summaries that help to understand the main themes discussed in particular texts and make certain conclusions. This pieces of data are enough to determine the quality of the source, evaluate its content, and the ability to contribute to the development of a particular research project.
Benefits to the Public
Thus, as it has already been stated, there are two different perspectives on this project. The positive one considers Google Book Search a potent tool that guarantees multiple benefits to the public. First of all, it provides a powerful stimulus for the development of the sphere of education (Johns & Huthwaite, 2016). Millions of users from all regions of the world who have access to the Internet acquire the opportunity to find books the need for study.
It significantly improves their academic achievements and contributes to the growing interest to some sources that previously were disregarded. There is a phenomenon of a long tail which means that some sources can be popularized by launching works with a similar theme to a popular one; readers will read deep into the catalog of recommendations and discover new titles devoted to the same problem they can read (Anderson, 2004). The given marketing model becomes an effective tool to promote various goods regarding the modern digitalized environment.
Moreover, the sphere of science also benefits from the development of Google Book Search as many students working on their research projects acquire the convenient, effective, and simple tool that guarantees successful search and improves outcomes. In such a way, education and science become the public domains that enjoy the appearance of GBS and depend on its further evolution.
Secondly, the increased popularity of Google Books simulates the growth of interest in reading. Contrary to numerous assumptions stating the development of this database will undermine the basis of copyright laws and deprive authors of the opportunity to earn money, statistics show that about half of the users prefer to review the book using Google before buying it (Johns & Huthwaite, 2016).
Surprisingly, but the platform contributes to the increase in the demand on books that can be considered credible sources of information and interest readers by the facts that they provide. It can be taken as a significant benefit for the public as it cultivates the rise of reading culture and, at the same time, helps to generate profit for authors and copyright holders whose texts are included in the database (“Summaries of fair use cases,” n.d.). In such a way, Google Book Search becomes an important part of the cycle of creation and distribution of original texts and their further use.
Ethical Aspects to support Authors
However, along with these benefits, there is another perspective on the problem stating that Google violates basic authors rights and creates the basis for the emergence of multiple ethical issues. First of all, as it is outlined in the Authors Guild’s claim, the right to copy texts that can be found in the database should be bought from copyright holders. Otherwise, it can be considered a fraud and a rude violation of their basic rights (Hartman, DesJardins, & MacDonald, 2017). In such a way, a significant ethical dilemma emerges. The Authors Guild emphasizes the fact that as any individual, authors and copyright holders should be rewarded for their activities and work; however, Google minimizes chances to generate benefits by selling books as they are already available at their database.
Another ethical argument supporting the rights of authors is that the introduction of GBS and its approach to the practice of fair use creates the precedent that can be used by other companies or corporations to make new services that violate the rights of publishers and copyright holders. The adherers of this idea emphasize the fact that Google’s decision to create this online library triggered revolutionary changes in the world of books.
At the same time, the fact that the court considers these actions legal can serve as the justification of these actions and their promotion in the future. In such a way, authors lose their motivation to work and create new texts as they will be placed in Google Books and used by individuals from various regions (The Authors Guild, n.d.). However, the given statement can be considered too pessimistic and subjective. The primary driver of creativity is the inspiration as it makes individuals to create their works or elaborate new ideas. In such a way, appropriate levels of motivation will remain.
Conclusion
Altogether, the case Google v. Authors guild gave rise to numerous debates about the concept of fair use and ethical character of the corporation’s actions. Regardless of the fact that the court did not find violations of the copyright law, there are still numerous claims to GBS as it copies texts without the authors’ permission. However, Google company emphasizes the fact that only previews are provided to users.
Additionally, the company outlines multiple benefits associated with the development of the database such as new opportunities for studying, a powerful stimulus for the development of science, and growing interest for books that were previously disregarded. Despite these facts, there are still many problems with the ethical character of this approach as authors’ rights can be ignored which means the decrease in their motivation levels and the collapse of the sphere.
References
Anderson, C. (2004). The long tail. Wired.
Aufderheide, P., & Jaszi, P. (2018). Reclaiming fair use: How to put balance back in copyright (2nd ed.). Chicago, IL: University of Chicago Press.
The Authors Guild. (n.d.). Authors Guild v. Google. Web.
Baker, P. (2014). US copyright law: Ownership, fair use and the idea/expression distinction. New York, NY: Philip S. Baker.
Band, J. (2009). The long and winning road to the Google Books settlement. The John Marshall Review of Intellectual Property Law, 9(227). Web.
Gilder, G. (2018). Life after Google: The fall of big data and the rise of the blockchain economy. Washington, DC: Gateway Editions.
Hartman, L., DesJardins, J., & MacDonald, C. (2017). Business ethics: Decision making for personal integrity & social responsibility (4th ed.). New York, NY: McGraw-Hill Education.
Hobb, R. (2010). Copyright clarity: How fair use supports digital learning. Thousand Oaks, CA: Corwin.
Johns, P., & Huthwaite, T. (2016). Google writes history: The end of “Authors Guild v. Google”. Baldwins.
Katz, A. (2013). Fair use 2.0: The rebirth of fair dealing in Canada. In M. Geist (Ed.), The copyright pentalogy (pp. 93-157). Ottawa, Canada: University of Ottawa Press.
Liptak, A., & Alter, A. (2016). Challenge to Google Books is declined by supreme court. The New York Times.
Mangal, V. (2016). Is fair use actually fair? Analyzing fair use and the potential for compulsory licensing in Authors Guild v. Google. North Carolina Journal of Law & Technology, 17(5). Web.
Rasenberger, M., & Besek, J. (n.d.). The Authors Guild v. Google: The future of fair use?
Samuelson, P. (n.d.). The Google Book settlement as copyright reform.
Sookman, B. (2014). The Google Book project: Is it fair use?
Summaries of fair use cases. (n.d.).
Data Management, Networking And Enterprise Software
Data Management in Business
How does a relational database organize data, and how does it differ from an object-oriented database?
A relational database can be described as a collection of data that is organized through a system of tables which grants easy access to various types of information while an object-oriented database utilizes objects as representations of data in order to create the system of classification within the database. Some of the inherent advantages of object oriented databases as compared to a relational database comes in the form of far easier methods of navigation, a lesser amount of code is required, there is reduced pagination, and the objects within the database do not require aspects related to assembly and disassembly of coding time.
On the other hand it must be noted that there are vastly more tools available for relational databases, the inherent standards of this type of database infrastructure is more stable and support for a relational database is far more certain and simpler thus reducing the need for constant changes to be implemented.
What is the role of information policy and data administration in the management of organizational data resources?
It is important to note that data administration often entails the implementation of processes that are considered industry standard (meaning that they conform to a certain structure and method of operation) so as to ensure that the operational capacity of the company’s database is running at peak capacity and works in a manner that can be easily cross compatible with a myriad of different systems and components as determined by the database administrator.
It is based on this that the processes utilized to store and retrieve data as well as the inherent restrictions placed on data access and creation are governed by the information policy that is established within the company. By having an information policy in place this ensures that the management of organizational data resources is not subject to constant problems related to the dissemination of the wrong types of information, access to critical systems by unauthorized personnel as well as the creation of new forms of data that have not been subject to approval by upper management. In summary, information policies act as safeguards against potential misuse of the company’s database.
Why is data quality assurance so important for a business?
It is important to note that businesses operate not only on the basis of supply and demand but also do so through by quantifying data in order to predict current business trends, store information and develop market strategies in order to better position the operational performance of the company to comply and take advantage of changes within the market. It is based on this that data quality assurance becomes an almost integral aspect of business since inconsistencies, anomalies and even errors in the data presented can and often will result in problems related to database administration which can cost a company millions of dollars in lost transactions or even fines from vendors.
One example of this was seen in 2010 wherein Convergys, a global leader in relationship management and business processing, experienced a database error due to data inconsistencies within its network. As a result the company lost an estimated $1 million within a single day due to contractual obligations with AT&T that it was unable to meet due to its network being unable to field the necessary customer service calls as a direct result of the data anomaly. It is this and other such examples that the profiling of data through data quality assurance becomes all the more necessary especially in an era where businesses are reliant on error free methods of operation.
Telecommunications networks and Internet in Business
What are the principal components of telecommunications networks and key networking technologies?
The principal components of telecommunication networks consist of terminals, links and nodes from which various forms of information and methods of communication are conducted on a daily basis. The first proponent of a telecommunication network, namely the terminal, acts as a means by which a company, customer, or employee is able to access the network in order to send or receive data.
This can consist of a wide variety of possible forms such as a computer terminal, a mobile phone, a tablet pc or even your basic fax machine/landline phone. Without this component in place a user will be unable to send or receive information and is thus an integral part of the telecommunication process. It must be noted though that unlike the other proponents of a network, such as links and nodes, terminals are user specific and as such there are inherent limitations to the type of data and method of communication that can be conducted over such devices.
For example, while a fax machine can send or receive phone calls and receive faxes it is unable to manifest aspects of data related to computer files. The second component of a telecommunication network is the link. This aspect of a telecommunication network can consist of either an actual physical link between a terminal and the network (i.e. a fiber optic cable) or a logical link (i.e. a data uplink, point to point link etc.).
It is through a link that a terminal is able to connect to a network and from there send or receive data to and from a myriad of sources. Lastly, a node acts a redistribution point for information wherein data sent from a terminal is sent to a node and from there the information is transferred to an endpoint which usually takes the form of another terminal. For computer networks this often takes the form of server or data hub while for telecommunication networks this manifests itself as a router.
How do the Internet and Internet technology work, and how do they support communication and e-business?
The internet can basically be considered a gateway from which businesses can easily access a diverse consumer base while at the same time creating a faster and more efficient method by which it is able to contact a myriad of suppliers, employees and distributors. One way of seeing how the internet supports businesses can be seen in the process of E-commerce. E- Commerce, an abbreviation of the term electronic commerce, is a way in which business transactions such as the buying and selling of products is conducted over the internet. Due to its the widespread proliferation with thousands of users being added to the online browsing population on a daily basis the breadth and depth of the internet is not to be underestimated.
With estimates placing the number of users in the hundreds of millions companies have started to capitalize on this trend by moving traditional operations such as advertising and retail to online mediums in order to attract customers to their products. Originally E-commerce was limited to operations such as electronic data exchanges, electronic funds transfers as well as ordinary bank to bank communications.
It wasn’t meant as a means of purchase but rather as a means to which banks could easily and effectively communicate with one another in order to facilitate the transfer of funds from one country to another. One other original purpose of the original e-commerce system was its use as a means to send invoices and purchase orders between businesses in order to better facilitate customer transactions. With the advent of credit cards, ATM’s and the rise in the popularity of the internet following the creation of the Windows 95 operating system and the changeover from slow dial up connections to faster broadband systems the concept of E-commerce as a means of direct customer selling took off.
Sites such as Ebay and Amazon.com were the vanguards of an online sales industry that resulted in a plethora of websites all dedicated to buying or selling products in one form or another. When dealing with online retail operations it must be noted that such methods of selling to customers do not suffer from the regular limitations that affects in-store selling. With an online store a company is able to save money on employee salaries, benefits and bonuses since the entire process has been automated using computers resulting in the potential for a greater product to profit ratio due to the lower costs involved in operations.
In fact most online retail stores employee skeleton crews of website editors, procurement specialists and online marketers which enable the company to run a website with fewer employees needed yet are able to display their products in a much more efficient and attractive way than in a store and are able reach a much larger market due to online marketing campaigns.
Information Security in Business Organizations
What are the components of an organizational framework for security and control?
An organizational structure for security and control often involves aspects related to compliance management (in order to ensure that the indicated security protocols are followed), security program management (which is necessary in implementing the necessary standards for security), incident management (in order to handle problems as they occur), host and network security controls and lastly software architecture, strategy and consulting. It is only when such aspects are method that something can be considered a proper framework for security and control.
What are the most important tools and technologies for safeguarding information resources?
Preventing malicious access to database resources is one of the responsibilities of a database manager and often times one of the most difficult to accomplish due to the ever changing security environment that we find ourselves in at the present. It is based on this that the following tools and technologies should be taken into consideration when safeguarding the information within your company’s database.
The first is the most widely utilized and implemented tool in database security management today: the username and password. Through the use of an alphanumeric username and password word that is unique to individual users this in effect restricts access to certain aspects of the company’s information system. The inherent problem with this is that even if limited access is granted a user can still go online and download various types of malicious software which could in the end compromise the integrity of the system and grant access to third parties. It is due to this that another resource that is often utilized by companies in order to safeguard their data is to install an assortment of firewalls, anti-virus programs and website restrictions.
Enterprise software and information systems
How do supply chain management systems coordinate planning, production, and logistics with suppliers?
In order to coordinate aspects related to planning, production, and logistics with suppliers, supply chain management systems often utilize the following functionalities in order to address such issues: The first is the customer requirement processing functionality which examines the needs of customers versus the current capabilities of the company. By examining what is necessary versus what is required the system in effect determines how much to order and where to allocate it.
This is where the purchase order processing functionality enters into the picture wherein through this particular function individual suppliers are contacted in order to have goods sent to the correct locations at the right time. The third level of functionality involves inventory management which entails an examination of the current stocks of the company’s supplies and products in order to determine what will be necessary in the upcoming quarters.
Another function is the supplier management/sourcing functionality which involves a classification of the different sources of materials for the company and the necessary means of obtaining it. Lastly comes the warehouse management functionality which as its name implies involves the storage and delivery of current company products and resources.
What are the challenges posed by enterprise applications?
One of the problems connected to enterprise software is the inherent cost related to their creation. Unlike other types of software that companies purchase in order to solve various problems within their company, enterprise software is often created “in-house” and thus has a far higher cost as compared to simply buying the software solution from another company. It thus becomes a question as to why companies would chose to create enterprise software solutions with the high costs associated with their creation.
One of the reasons behind this is connected to the concept of proprietary and how developing software that is meant to enhance and address specific problems within the company can actually become an advantage in the long run since software of this particular nature can create a certain degree of added value for a company’s clients. One company in particular that proves the effectiveness of such a method of operation is Accenture which has developed a plethora of in-house accounting software solutions that has resulted in the company becoming a veritable behemoth in the accounting world due to its focus on providing clients with cost effective solutions for their accounting needs.
On the other hand, it must be noted that there are inherent problems with issues related to cross compatibility of enterprise software especially in cases where a company merges its systems with another. This was seen in the case of Cingular when it was bought by AT&T resulting in the merger of proprietary in-house Cingular systems such as C.A.R.E with the Telegence systems utilized within AT&T. The end result is usually an arduous process of re-coding, evaluation and re-coding once more in order to combine both systems in order to merge them in such a way that it does not cause problems for the company’s information architecture.
One of the last problems involving enterprise software is the sheer amount of complexity found in the coding process of the tools. This means that should the creator of the software leave for another company it often takes a considerable amount of time for the new person in charge to familiarize himself/herself with the software which can often result in subsequent operational problems and delays within the company should something need to be fixed.