Free Essay

Critical Information

In:

Submitted By jkemp2000
Words 640
Pages 3
Critical Information Systems Paper
Jason Kempen
BSA/310
May 30, 2011
Caryl Rahn

Critical Information Systems Paper

Huffman Trucking is a transportation company that was founded in 1936 by K. Huffman. He started this company with one single tractor-trailer. Soon he had developed the need for growth of his company as a result of World War II which caused a huge demand for carrier services from companies in the Midwest to the ports of the East Coast. With Huffman’s main customer being the United States Government he found that by 1945 his fleet had developed an increase in its size from one tractor trailer to 16 tractors and 36 trailers. Besides the government Hoffman also had accounts with automotive parts suppliers, plastic manufacturers, electronics manufacturers, and various other customers that required special material transport needs.
Huffman Trucking is a nationally known company with locations in Cleveland Oh, St. Louis Mo, Los Angeles Ca, and Bayonne N.J.. Huffman Trucking now also has 800 tractors, 260 roll on and off units, and 2,100 45 ft trailers. He also now employs 925 drivers and 425 various other staff members. With a company of this size there is much needed responsibility such as keeping track of equipment expenses, mileage, drivers daily logs, and freight. At this point in time each facility is keeping track of their own expenses and records which could be causing a bit of confusion on when the tractors and trailers need their appropriate maintnance done. This issue has brought the maintnance supervisors together to develop a fleet maintenance database that will keep track of all the important fleet maintnace information such as DOT inspections, fuel reports, service records and the operators usage. With this data base it will help each location to be able to pull up needed info on the vehicle and know what maintenance is due and notes from other service techs as to what diagnostics have been done or need to be done. This will also help upper management to know what has been happening with the vehicles in order to help correct anything that may need attention such as extensive repairs or fuel usage.
I worked as a truck driver for 5 yrs and we had a GPS system in all of our trucks it was called OBD- On Board Diagnostics system. This device tracked everything from where I was located to what was wrong with my tuck. It even new everytime the truck was on or off and even running and not moving. This device helped the company with high maintance cost as well as fuel cost. If we were given a load to a specific destination we had a specific route to take. If the hub would pull up our location and find that the driver was taking a different route they would be docked the fuel for taking the extra route. Many would do this to get extra mileage on their pay. The OBD also cut down on drivers cheating on their logs and being fined although many companies would cheat the system at the hub for the driver. This saved on having to fill out paper logs. Another good reason for the GPS tracking is so that if a customer was to call wondering about their shipment the hub can give exact location of product. We also had GPS on our trailers in case of a trailer swap with another company driver or if a trailer is stolen.
Another excellent database would be for payroll so that each hub can be better organized with the main office when turning in the employees times.

Quinstreet Inc.. (2011). Webopedia. Retrieved from http://www.webopedia.com/TERM/D/database.html

Huffman Trucking. (Aug 2010). Huffman Trucking. Retrieved from https://ecampus.phoenix.edu/secure/aapd/cist/vop/Business/Huffman/Intersite1/HuffmanInterPort.htm

Similar Documents

Premium Essay

Critical Information Systems

...Critical Information Systems BSA/310 University of Phoenix Smith Systems Consulting Finance and Accounting Information Security systems The information security systems that have been put in place are all for the benefit of the company and its customers, to restrict the sharing of confidential information to those without clearance. Some of the features of this system are that the computer hardware is run off “In-House” dedicated servers and thin client desktops (for security purposes) and that there will be no file storage or file retention on those thin client desktops. Other policies that are in affect are those to help with practicing safe handling of sensitive information and the security of the area it is being accessed in. All of the applications and systems used are password protected to the maximum security standard recommended by the industry. All of the Finance and Accounting personnel have to undergo a comprehensive background check prior to their employment; this is to include such areas as education, prior employment, police records, credit records, and citizenship verification. Attendance logs are automated and maintained on each Finance and Accounting staff member and all other personnel that is authorized to access any part of the Finance and Accounting systems. For each employee and each workstation there are access and transaction logs that are kept and maintained. No employee of the Finance and Accounting department is permitted to work...

Words: 959 - Pages: 4

Free Essay

Critical Information Systems

...Critical Information Systems Lance Kaea Carson BSA 310 May 15, 2011 Rich Harrell Critical Information Systems An Information System is an organizations framework for efficiency, productivity, and functionality. It “is a collection of hardware, software, data, people and procedures that are designed to generate and disseminate information and data that supports the activities of an organization” (International Graduate, 2011). Kudler Fine Foods is an organization specializing in providing domestic and imported sustenance to consumers. This paper clarifies an information system critical to their business process and examines how this system has an effect on the organization’s intricate structure. Information Systems Information systems used by organizations often follow a “traditional hierarchical structure” (Turban & Volonino, 2010. p.42). The structure commonly consists of seven functional types (1) Personal and Productivity Systems, (2) Transaction Processing Systems, (3) Functional and Management Information Systems, (4) Enterprise Systems, (5) Inter-organizational Systems, (6) Global Systems, and (7) Special Systems. Each category plays an essential role in the overall function of an organization when utilized. The development of an application program is used to execute or support a specific organization task or business process through the use of that information system. Although system types and applications can be independent of each other, most...

Words: 830 - Pages: 4

Premium Essay

Case Study 1: the Critical Need for Information Security Rubrick

...Case Study 1: The Critical Need for Information Security Due Week 2 and worth 100 points Access the ACM Digital Library by following the steps below: Students: 1. Login to iCampus. 2. From iCampus, click STUDENT SERVICES>> Learning Resources Center >> Databases. 3. Scroll down to "Information Systems/Computing". 4. Select “ACM Digital Library” below the heading. 5. Enter your library username and password. Faculty: 1. Login to Blackboard: bb.strayer.edu. 2. Click the "Resource Center" tab at top right of page. 3. From the list on the left, click "Databases". 4. Scroll down to "Information Systems/Computing". 5. Select “ACM Digital Library” below the heading. 6. Enter your library username and password. Download and read the following articles available in the ACM Digital Library: Bernier, M., Chapman, I., Leblanc, S. P., & Partington, A. (2011). An overview of cyber-attack and computer network operations simulation. Proceedings from MMS ’11: Military Modeling & Simulation Symposium. Boston, MA. Maughan, D. (2010, February). The need for a national cybersecurity research and development agenda. Communications of the ACM, 53(2), 29-31. Write a four to five (4-5) page paper in which you: 1. Identify at least three (3) benefits or key knowledge points that could be derived from using cyber-attack simulator systems and research, and suggest how this insight could assist in defining the...

Words: 1615 - Pages: 7

Free Essay

Critical Information Exchange in Sipd

...Critical information exchange in supplier involvement product development Master of Science Thesis in Quality and Operations Management ALEXANDER ARVIDSON DEIVITE SILVA Department of Technology Management and Economics Division of Quality Sciences CHALMERS UNIVERSITY OF TECHNOLOGY Gothenburg, Sweden, 2012 Report No. E2012:026 Critical information exchange in supplier involvement product development Master of Science Thesis in Quality and Operations Management Alexander Arvidson Deivite Silva Department of Technology Management and Economics Division of Quality Sciences Chalmers University of Technology Gothenburg, Sweden, 2012 Report no. E2012:026 Critical information exchange in supplier involvement product development Master of Science Thesis in Quality and Operations Management © Alexander Arvidson and Deivite Silva Department of Technology Management and Economics Division of Quality Sciences Chalmers University of Technology Gothenburg, Sweden, 2012 Report no. E2012:026 Printed by Reproservice, Gothenburg, Sweden Abstract The purpose of this thesis has been to review Volvo’s information exchange in supplier involvement product development (SIPD) and to identify important information required to perform effective and efficient product development projects when suppliers are involved. The project was carried out at the Volvo Group which is a leading global supplier of commercial vehicles. Volvo Group is from here referred to as Volvo...

Words: 26968 - Pages: 108

Premium Essay

Critical Information Systems: Ups

...Critical Information Systems: UPS America The United Parcels Service (UPS) is a corporation specializing in the collection and delivery of packages around the world. What helped this private message and delivery service go from running errands and delivering packages of anything ranging from notes and baggage to trays of food on foot or bicycles for longer distances to routing packages and servicing areas in 200 nations worldwide? It was the company’s ability to adapt with the changing of times and information technology. In keeping up with the technology age UPS’s information systems helped take them to the top. Those systems are DIAD (Delivery Information Acquisition Device), COMPASS (Computerized Operations Monitoring, Planning and Scheduling System), and UPSnet. United Parcel Service was started in 1907 by James E. Casey. Originally the company was named American Messenger Company headquartered in Seattle, Washington. Jim and his partner, Claude Ryan, had one goal. That was to provide their customers with reliable, around the clock service at low-rates and the utmost respect and courtesy. Even today those principles are embedded deep in UPS and summed up in the company’s slogan: best service and lowest rates. Six years later the company began to receive stiff competition after the introduction of the automobile. The company soon acquired their first automobile and established the first consolidated delivery technique, which is the combing of packages addressed...

Words: 692 - Pages: 3

Premium Essay

New Information Technology Critical Essay

...NEW INFORMATION TECHNOLOGIES | SOCIAL MOVEMENT OF NETWORK AND SOCIAL MEDIA | Critical essay | SOYEON PARK 20122455 2012-12-05 | SOCIAL MOVEMENT OF NETWORK AND SOCIAL MEDIA Malcom Gladwell printed an article in The New Yorker, the article is entitled ‘Small Change : Why the revolution will not tweeted’. The article is giving criticism in principle about the social media disseminator’s ideas that social media such as facebook and tweeter will bring enormous changes on social activities and movements. His article provides us with amount of food for thought about what is behaviorism and social movement in the age of social media and what is relations between social media and social movements. Of course, there would be a sharp division of opinions between those who approve and disapprove. He argues that it is impossible to reform the society radically by social media such as tweeter and facebook based on weak ties. And he pointed out the limit of ordinary unimportance of weak ties. It means, in spite of extensivity and quantitative expansion of weak ties, it does not have materiality of solidarity showing in the 1960s’ a civil rights movement. And he’s opinion is that the connection of information is different with the solidarity of people. A movement, which goes along with human body, makes people blood boil and heat them up, unlike when they are absorbing information by using their brain cells. It is hard to banish the lingering and regret about that kind of...

Words: 1592 - Pages: 7

Premium Essay

Weaponized Lies: Critical Thinking In The Information Age

...The book “Weaponized Lies” was written by Daniel Joseph Levitin the author of “A Field Guide to Lies: Critical Thinking in the Information Age” book, cognitive psychologist, neuroscientist, writer. The main idea is how people using information against everyone and how to think critically to avoid “fake news” around us. In 2016 the Oxfords Dictionary’s Word of the year was post-truth, which means “relating to or denoting circumstances in which objective facts are less influential in shaping public opinion than appeals to emotion and personal belief”. But it doesn’t means that idea of truth doesn’t exist anymore. One accident example was the lie of Washington, DC, pizza shop Comet Ping Pong was running a sex slave operation led by Hillary Clinton led Edgar M....

Words: 484 - Pages: 2

Premium Essay

Bsa 310 Critical Information System Paper

...Critical Information System Paper Ted Ko, BSA 310 University of Phoenix August 21, 2011 Greg Walker Critical Information System Kudler Fine Foods is a local gourmet grocery store located in San Diego, with three locations. All the stores carry the very best domestic and imported goods. Kathy Kudler, Owner of Kudler Fine Foods, opened the first of three stores in 1998. In the year 2000, Kathy opened a second store with the third store opening in 2003 (Kudler Virtual Organization, 2006). Kudler Fine Foods utilizes an information technology system that is vital to its business. The company uses the POS (Point of Sales) Database System to organize and keep track of items and orders. Without this, they would not be as successful as they are. Point of Sales System Databases keeps track of inventory, supplier, order, customer, store, tender (sales), tax table, order line, and item. A successful business cannot function accurately without all these tables. The Inventory Table contains the components that make up an item. Such as, perishable indicator, quantity on hand, and unit cost. It is also “used for managing inventory and determining the availability of ingredients that go into prepared items, such as bakery products, ect” (Kudler Virtual Organization, 2006). “The Supplier Table data concerning wholesalers, vendors and other suppliers from whom inventory is procured” (Kudler Virtual Organization, 2006). Meaning, depending on the inventory, which is going to determine who...

Words: 546 - Pages: 3

Premium Essay

Case1

...Amazon’s business and what factors are critical to its success? [list or table] Amazon’s Businesses | Critical Success Factors | Online Retailer | Competitive pricing | | Product | | Error free fulfillment | | Lowest possible operating cost | | Best possible terms from suppliers | | An easy to navigate web site that explits personalization and automated event notification to engage and service the customer | | Best possible terms from suppliers | Back-uo | Error-free fulfillment | | Lowest possible operating cost | | Excellent computer service | | Automatic and information intensive business process | Cloud | A powerful, well organized system/data processing capability | | Cost efficient | | Efficiently and accurately capture, recod, store, process and retrieve data& information involved with the work | Kindle | Competitive pricing | | Environment friendly | | One size fit all | 2. What challenges did Amazon face when it first entered the marketplace? [list] a. .Amazon ‘s early history was facing some financial problems, like startling loses and lots of red ink. b. .Amazon needed to build warehouse, which is really expensive. c. .When Amazon first entered the marketplace, the information systems and processes was brand new. d. .Amazon had some competitor, and it was a challenge. e. .Developing a new method f. . g. add more items as needed….. 3. What information is required by Amazon to transact,...

Words: 337 - Pages: 2

Premium Essay

Hate

...Today we live in a world where data is a critical resource. Information is also a critical resource and consists of data that is processed into meaningful information for the purpose of organizations and users. Collected data is stored into what is known as databases where it is organized into potentially valuable information.Data also known as Raw data is a stream of facts that are not organized or arranged into a form that people can understand or use (Gillenson, Ponniah, Kriegel, Trukhnov, Taylor, Powell, & Miller, 2008) . Raw Data are facts that have not yet been processed to reveal their meaning (Gillenson, Ponniah, Kriegel, Trukhnov, Taylor, Powell, & Miller, 2008). For example when AT&T wireless ask their clients to participate in a survey about theproducts they have purchased or how was their customer service experience the data collected is useful but not until the raw data isorganized by combining it with other similar data and analyzed into meaningful information. Information is the result of processing raw data to reveal its meaning (Coronel, Morris, & Rob,2010). Data processing can be as simple as organizing data to reveal patterns or as complex as making forecasts or drawing inferences using statistical modeling (Gillenson, Ponniah, Kriegel, Trukhnov, Taylor, Powell, & Miller, 2008).Both data and information are types of knowledge which share similarities in the fact that each are used to draw a conclusion for a specific purpose. Data is gathered by...

Words: 301 - Pages: 2

Free Essay

Social Media

...May 25, 2015 Erin Di Cesare Social Media When it comes to social media there is no one-size fits all, in today’s society it is much easier to obtain information from social media than one would think. There are advantages and disadvantages of easily obtainable information, just like there is advantages and disadvantages to social media, and knowing these advantages and disadvantages may very well alter the way one uses social media. Believe it or not there are advantages to easily obtainable information. One of which is expediency, it is convenient for people to be in one place and catch the hottest news, listen to fresh top songs on the billboard charts, watch and share music videos to those songs, while at the same time holding a conversation through chat multiple friends instantly. It is easier than reading the newspaper, watching TV, listening to the radio, and talking on the phone all at once to achieve the same thing. One can multi-task and do these things efficiently while conforming to society’s intolerant nature. A disadvantage of easily obtainable information is identity theft, which is where critical or sensitive information is available when it shouldn’t be. Another one is the unintentional discovery of finding out a family member perishing in a car accident or some other drastic way before the information is able to be properly delivered. There are many different advantages and disadvantages of social media. Everything in excess is bad. Social media is not...

Words: 753 - Pages: 4

Free Essay

Data

...Data & Information Define Data: Data is just raw facts and figures it does not have any meaning until it is processed into information turning it into something useful. DATA Information 01237444444 Telephone Number 1739 Pin Number A,C,D,B,A* Grades Achieved At GCSE Define Information: Information is data that has been processed in a way that is meaningful to a person who receives it. There is an equation for Information which is: INFORMATION= DATA + CONTEXT + MEANING DATA 14101066 Has no meaning or context. CONTEXT A British Date (D/M/YEAR) We now know it says 14th of October 1066. Unfortunately we don’t know it’s meaning so it’s still not information yet. MEANING The Battle Of Hastings We now know everything so it can now be defined as information. How Is Data Protected? You’re data is protected by a law called the Data Protection Act this controls how your personal information is used by organisations, businesses or the government. This means legally everyone responsible for using data has to follow strict rules called ‘data protection principles’ there are eight principles. How Your Data Is Protected Use strong an multiple passwords. Too many of us use simple passwords that are easy for hackers to guess. When we have complicated passwords, a simple “brute force attack”—an attack by a hacker using an automated tool that uses a combination of dictionary words and numbers to crack passwords using strong passwords doesn’t mean this can’t happen it just means...

Words: 904 - Pages: 4

Premium Essay

Apa Style

...communication in a business environment, is with my current job. While working at Verizon, an essential aspect of the job is communication. It's imperative that when communicating with the customers, we as employees are relaying the correct information to them. Customers call in every day in regards to their account, half of the calls are customers who are stating that they were given incorrect information or was told one thing that hasn't happened. This is the main reason effective communication is important, especially in a business aspect. A major company like Verizon have a leadership chain where information is passed down and relayed to the employees who talk to the customers every day. It is crucial to communicate the information, so there isn't any problems with the customers. When there is a break in communication, customers are given the wrong information, which leaves an unhappy customer and possible loss in the business. A particular call I experienced is when a customer called in and was extremely upset because he was given information in regards to his bill, but when the customer received the bill it was higher than expected. I had to listen to the customer to get a better understand of where his emotions where and respond to the critical ques of the call. To give the customer a better understanding, I thoroughly explained each section of his bill. By the end of the call, the customer hung up feeling relieved because I was able to resolve his issue and give him a better...

Words: 482 - Pages: 2

Free Essay

Data Information

...Data and Information Summary HCI/520 11/18/2013 Data and Information Summary Today we live in a world where data is a critical resource. Information is also a critical resource and consists of data that is processed into meaningful information for the purpose of organizations and users. Collected data is stored into what is known as databases where it is organized into potentially valuable information. Data also known as Raw data is a stream of facts that are not organized or arranged into a form that people can understand or use (Gillenson, Ponniah, Kriegel, Trukhnov, Taylor, Powell, & Miller, 2008) . Raw Data are facts that have not yet been processed to reveal their meaning (Gillenson, Ponniah, Kriegel, Trukhnov, Taylor, Powell, & Miller, 2008). For example when AT&T wireless ask their clients to participate in a survey about the products they have purchased or how was their customer service experience the data collected is useful but not until the raw data is organized by combining it with other similar data and analyzed into meaningful information. Information is the result of processing raw data to reveal its meaning (Coronel, Morris, & Rob, 2010). Data processing can be as simple as organizing data to reveal patterns or as complex as making forecasts or drawing inferences using statistical modeling (Gillenson, Ponniah, Kriegel, Trukhnov, Taylor, Powell, & Miller, 2008). Both data and information are types of knowledge which share similarities...

Words: 538 - Pages: 3

Premium Essay

Club It, Part 1

...(1) Title: Club IT, Part 1 Name: Jordan Miller Course: XBIS 219 Due Date: Sunday, December 19, 2010 Instructor: Helena Robinson (2) Strategic planning decisions are critical for business owners in today’s fast moving economy. One part of this planning is the use by organization of a wide variety of information systems. Lisa Tejada and Ruben Keys started an entertainment business together when they graduated with business degrees. They were shrewd in their fund allocation but needed assistance in developing their information management department. The assistance they required was in the analysis of their new company’s needs. Their new company is called Club IT. The goal of Club is to provide an environment that is relaxing and safe so that individuals may gather and interact. The target clientele will be individuals ages 21 to 30. There will be alcoholic beverages served, so 21 will be the cutoff age for legal reasons. Appetizers and other menu items will also be provided. Live bands, NYC bands, San Francisco bands and world DJs will all be used with the main musical focus lying in hip-hop, techno, electronica, and MP3 playlists. An open mike for alternative, R&B, country, latin, folk and jazz will be offered during specific months. Merchandising will include baseball caps, shot glasses, t-shirts and glass mugs. Anticipated staff needs are to be met by: * 1 Assistant manager, * 4 bartenders, * 6 waiters, * 2 stewards, ...

Words: 869 - Pages: 4