IS Analysis
IS Analysis
Hardware is the physical technology a business might use to achieve their goals. A few examples of hardware would be computers, laptops, printers, and physical network or server equipment. Target implements the usage of hardware into several areas of their firm, a notable example being their self-checkout stations. These stations provide customers with the opportunity to check themselves out by scanning their items and paying with their debit or credit card. This makes the checkout process more efficient as it is believed to reduce labor costs, wait times, and increase profit for the company. While the self-checkout stations achieve these goals, there are some disadvantages that they bring to Target stores across the globe. When the kiosks were first brought to the public, theft increased as the self-checkout process made it easier to steal items. Self-checkout also proved to be inefficient when customers had larger amounts of products to scan and purchase. The hardware itself proved to be costly, compared to other methods of checking out customers. This can be improved however, as Target continues to develop strict policies and procedures as to lessen the disadvantages the self-checkout stations bring.
Software is the instructions for the hardware a company uses. Without software, it would be unable to function as it would not understand or be able to complete a task. Target uses software to better its checkout experience for customers, manage its countless department databases, keep track of inventory, and much more. An example of software that Target employs to assist in its day-to-day operations is the Enterprise Cart & Checkout platform. Better known as ECCO, this program allows Target employees and customers to be able to go through the checkout process smoothly, in an easy, efficient, and stress-free manner. Target for the most part uses a Linux based operating system which means it treats its POS system as a mini cloud. Linux is a free, open source operating system that's used in many devices. Linux's operating system is known to be secure and stable.
An application software is a program designed to perform specific tasks for specific users. The tasks can include word processing, spreadsheets, and database management. Our company, Target, uses a great variety of horizontal and vertical and customized applications
The Vertical Applications: These applications are industry-specific and for Target it would include its retail management systems like the Point Of Sale (P.O.S) systems. They system Target uses isn’t publicly branded but is known as “Target P.O.S”. The P.O.S system is very effective because it helps streamline the whole checkout process, it maintains a well-managed inventory, it tracks sales and it helps increase customer satisfaction by helping the checkout lines move faster as well as keeping order and track of each transaction.
The Horizontal Applications: These applications are of general-purpose and Target is not the only company to use it - Microsoft Office Suite. Target employees can use this application for document creation, create presentations with PowerPoint, use Excel for data analysis and other tools.
- Customized Application: These applications are created with specific purposes and tend to meet specific needs. An example of this application used by Target can be the Target Circle app; this app was created to help personalize deals for users and helps integrate that with Target’s inventory and sales systems. This app has also been highly effective as it continues to help with the engagement between shoppers and Target. It helps make the experience run smoother for customers and for the company it helps collect data regarding shopping patterns and habits from its customers.
.
Target’s new technology considerations should include implementing AI to the Circle App as well as the other applications systems it currently uses. AI or Artificial Intelligence is when computer systems can do taks that humans usually do such as problem solving. The use of AI could lead to tailored recommendations to each user, it could include chatbots with a higher efficiency than the one it currently has - ultimately, the use of AI can enhance customer service.
Another new technology it can focus on would be Internet of Things as Target can use IoT devices to track live inventory and make sure that the shelves of each aisle and section are always full and reduce the “out-of-stock” situations. IoT is a network of physical objects that use sensors and software to connect and exchange data with other devices on the internet. In a more futuristic way, Target could also expand into Robots. Perhaps Target could use robots to keep shelves stocked, clean isles, and manage their inventory
I believe that Target is capable of using more than one of these technologies - such as AI and IoT devices since they are very common and growing in this industry. However, robots might not necessarily work because customers can be scared of shopping with robots being so close to them as well as stop supporting Target due to the lay-off that using robots would generate.
Our information system is P.O.S and I included an example of what a file with its fields would look like for this application. A file is the collection of related data while the field is the individual pieces that contribute and make that file. Metadata is a set of data that that describes and gives information about other data.
File Name: NOVEMBER WEEK 5 SALES
METADATA for the NOVEMBER WEEK 5 SALES file -
Metadata Example for a Sales Transaction File:
Date Created: 2024-11-25 14:35:00 (indicates when the transaction record was created)
Last Updated: 2024-11-25 14:35:10 (indicates the last time the record was modified)
Created By: POS Terminal ID 1023 (identifies the specific terminal or system that created the record)
File Size: 2.3 KB (size of the transaction record)
DBMS is a Database Management System and it is a software that helps users create and manipulate databases. It helps maintain the data organized and stored. DBMS also manages through querying, constantly updating its data, and administrating the databases.
Target uses Oracle Database
+---------------------+
| Applications |
| (e.g., POS System, |
| Inventory System) |
+---------------------+
|
v
+---------------------+
| Database Server |
| (Oracle Database) |
+---------------------+
|
v
+---------------------+
| Data Storage |
| (Databases) |
+---------------------+
Database applications involve forms, reports, queries, application programs. Forms help a user to make edits and view the data on a database. Reports are a structured presentation of data to make databases easier to understand. Queries involve manipulating data on a database. A database application example would be Microsoft SQL server.
Some new technologies for databases include NoSQL databases, NewSQL and in-memory. Target doesn’t publicly say if they are using NewSQL database, however based on their large scale retail operations, it is highly likely that they are using it. It's likely they are using it to help with managing their customer and inventory data. But again they never publicly announced if they actually use it or not. Cloud databases such as Microsoft Azure as a part of their hybrid-multi cloud architecture. They use this database to help with inventory management, point-of-scale systems and digital media.
A LAN is a local area network that allows devices to connect in a single location like a home, office or school. Some of its components consist of a router, switch, ethernet and DNS. Target uses a router and allows anybody in the store to connect to the wifi and use it for free. Target also uses a LAN protocol to connect devices in their stores and network infrastructure. It is really practical to use a LAN protocol in a large store like Target.
Everywhere in the world, individuals utilize the internet to complete things on a regular basis. The internet is defined as a collection of computer networks that are able to communicate with one another globally. In order to connect their stores, distribution centers, and other locations across the nation, Target uses a specialized network infrastructure, mostly fiber optic cables. They frequently cooperate with carriers like Verizon to guarantee dependable and secure communication.Target.com is the domain name.
Given that it offers flexibility, scalability, cost-effectiveness, and accessibility for individuals and businesses to manage their data and applications without the burden of maintaining their own IT infrastructure, "The Cloud" is the elastic leasing pooled computer resources over the internet. Users can store and access data, applications, and services without having to manage their own physical hardware, enabling them to access information from any location with an internet connection.
Target uses cloud-based services for its information system. It mainly uses a "hybrid-multi-cloud" strategy, combining their own private cloud for data-intensive workloads with public cloud services like Microsoft Azure and Google Cloud Platform . This results in a mix of IaaS and some PaaS , depending on the particular applications used. They mostly don't use a software as a service model.
Some of the most notable problems with Target's network is its history of inadequate network segmentation, which made it easy for hackers to obtain vast amounts of data about consumers during their 2013 data breach by taking advantage of flaws in a third-party vendor's system, compromising millions of credit card numbers and personal information. Other problems include insufficient security measures, failure to recognize warning signs, and improper protection of point-of-sale devices, underscoring the significance of strong network segregation and vendor security procedures. Some recommendations would be to deploy robust firewalls to filter incoming and outgoing traffic and block unauthorized access. Also intrusion Detection/Prevention Systems to Monitor network traffic for suspicious activity and take preventive actions. Last but not least to prevent network segmentation is VLANs to isolate different network segments and limit potential damage from breaches.
Hardware is the physical technology a business might use to achieve their goals. A few examples of hardware would be computers, laptops, printers, and physical network or server equipment. Target implements the usage of hardware into several areas of their firm, a notable example being their self-checkout stations. These stations provide customers with the opportunity to check themselves out by scanning their items and paying with their debit or credit card. This makes the checkout process more efficient as it is believed to reduce labor costs, wait times, and increase profit for the company. While the self-checkout stations achieve these goals, there are some disadvantages that they bring to Target stores across the globe. When the kiosks were first brought to the public, theft increased as the self-checkout process made it easier to steal items. Self-checkout also proved to be inefficient when customers had larger amounts of products to scan and purchase. The hardware itself proved to be costly, compared to other methods of checking out customers. This can be improved however, as Target continues to develop strict policies and procedures as to lessen the disadvantages the self-checkout stations bring.
Software is the instructions for the hardware a company uses. Without software, it would be unable to function as it would not understand or be able to complete a task. Target uses software to better its checkout experience for customers, manage its countless department databases, keep track of inventory, and much more. An example of software that Target employs to assist in its day-to-day operations is the Enterprise Cart & Checkout platform. Better known as ECCO, this program allows Target employees and customers to be able to go through the checkout process smoothly, in an easy, efficient, and stress-free manner. Target for the most part uses a Linux based operating system which means it treats its POS system as a mini cloud. Linux is a free, open source operating system that's used in many devices. Linux's operating system is known to be secure and stable.
An application software is a program designed to perform specific tasks for specific users. The tasks can include word processing, spreadsheets, and database management. Our company, Target, uses a great variety of horizontal and vertical and customized applications
The Vertical Applications: These applications are industry-specific and for Target it would include its retail management systems like the Point Of Sale (P.O.S) systems. They system Target uses isn’t publicly branded but is known as “Target P.O.S”. The P.O.S system is very effective because it helps streamline the whole checkout process, it maintains a well-managed inventory, it tracks sales and it helps increase customer satisfaction by helping the checkout lines move faster as well as keeping order and track of each transaction.
The Horizontal Applications: These applications are of general-purpose and Target is not the only company to use it - Microsoft Office Suite. Target employees can use this application for document creation, create presentations with PowerPoint, use Excel for data analysis and other tools.
- Customized Application: These applications are created with specific purposes and tend to meet specific needs. An example of this application used by Target can be the Target Circle app; this app was created to help personalize deals for users and helps integrate that with Target’s inventory and sales systems. This app has also been highly effective as it continues to help with the engagement between shoppers and Target. It helps make the experience run smoother for customers and for the company it helps collect data regarding shopping patterns and habits from its customers.
.
Target’s new technology considerations should include implementing AI to the Circle App as well as the other applications systems it currently uses. AI or Artificial Intelligence is when computer systems can do taks that humans usually do such as problem solving. The use of AI could lead to tailored recommendations to each user, it could include chatbots with a higher efficiency than the one it currently has - ultimately, the use of AI can enhance customer service.
Another new technology it can focus on would be Internet of Things as Target can use IoT devices to track live inventory and make sure that the shelves of each aisle and section are always full and reduce the “out-of-stock” situations. IoT is a network of physical objects that use sensors and software to connect and exchange data with other devices on the internet. In a more futuristic way, Target could also expand into Robots. Perhaps Target could use robots to keep shelves stocked, clean isles, and manage their inventory
I believe that Target is capable of using more than one of these technologies - such as AI and IoT devices since they are very common and growing in this industry. However, robots might not necessarily work because customers can be scared of shopping with robots being so close to them as well as stop supporting Target due to the lay-off that using robots would generate.
Our information system is P.O.S and I included an example of what a file with its fields would look like for this application. A file is the collection of related data while the field is the individual pieces that contribute and make that file. Metadata is a set of data that that describes and gives information about other data.
File Name: NOVEMBER WEEK 5 SALES
METADATA for the NOVEMBER WEEK 5 SALES file -
Metadata Example for a Sales Transaction File:
Date Created: 2024-11-25 14:35:00 (indicates when the transaction record was created)
Last Updated: 2024-11-25 14:35:10 (indicates the last time the record was modified)
Created By: POS Terminal ID 1023 (identifies the specific terminal or system that created the record)
File Size: 2.3 KB (size of the transaction record)
DBMS is a Database Management System and it is a software that helps users create and manipulate databases. It helps maintain the data organized and stored. DBMS also manages through querying, constantly updating its data, and administrating the databases.
Target uses Oracle Database
+---------------------+
| Applications |
| (e.g., POS System, |
| Inventory System) |
+---------------------+
|
v
+---------------------+
| Database Server |
| (Oracle Database) |
+---------------------+
|
v
+---------------------+
| Data Storage |
| (Databases) |
+---------------------+
Database applications involve forms, reports, queries, application programs. Forms help a user to make edits and view the data on a database. Reports are a structured presentation of data to make databases easier to understand. Queries involve manipulating data on a database. A database application example would be Microsoft SQL server.
Some new technologies for databases include NoSQL databases, NewSQL and in-memory. Target doesn’t publicly say if they are using NewSQL database, however based on their large scale retail operations, it is highly likely that they are using it. It's likely they are using it to help with managing their customer and inventory data. But again they never publicly announced if they actually use it or not. Cloud databases such as Microsoft Azure as a part of their hybrid-multi cloud architecture. They use this database to help with inventory management, point-of-scale systems and digital media.
A LAN is a local area network that allows devices to connect in a single location like a home, office or school. Some of its components consist of a router, switch, ethernet and DNS. Target uses a router and allows anybody in the store to connect to the wifi and use it for free. Target also uses a LAN protocol to connect devices in their stores and network infrastructure. It is really practical to use a LAN protocol in a large store like Target.
Everywhere in the world, individuals utilize the internet to complete things on a regular basis. The internet is defined as a collection of computer networks that are able to communicate with one another globally. In order to connect their stores, distribution centers, and other locations across the nation, Target uses a specialized network infrastructure, mostly fiber optic cables. They frequently cooperate with carriers like Verizon to guarantee dependable and secure communication.Target.com is the domain name.
Given that it offers flexibility, scalability, cost-effectiveness, and accessibility for individuals and businesses to manage their data and applications without the burden of maintaining their own IT infrastructure, "The Cloud" is the elastic leasing pooled computer resources over the internet. Users can store and access data, applications, and services without having to manage their own physical hardware, enabling them to access information from any location with an internet connection.
Target uses cloud-based services for its information system. It mainly uses a "hybrid-multi-cloud" strategy, combining their own private cloud for data-intensive workloads with public cloud services like Microsoft Azure and Google Cloud Platform . This results in a mix of IaaS and some PaaS , depending on the particular applications used. They mostly don't use a software as a service model.
Some of the most notable problems with Target's network is its history of inadequate network segmentation, which made it easy for hackers to obtain vast amounts of data about consumers during their 2013 data breach by taking advantage of flaws in a third-party vendor's system, compromising millions of credit card numbers and personal information. Other problems include insufficient security measures, failure to recognize warning signs, and improper protection of point-of-sale devices, underscoring the significance of strong network segregation and vendor security procedures. Some recommendations would be to deploy robust firewalls to filter incoming and outgoing traffic and block unauthorized access. Also intrusion Detection/Prevention Systems to Monitor network traffic for suspicious activity and take preventive actions. Last but not least to prevent network segmentation is VLANs to isolate different network segments and limit potential damage from breaches.

Comments
Post a Comment