The Growing Interest In Enterprise Resource Planning (ERP)

The Growing Interest In Enterprise Resource Planning (ERP)

Enterprise Resource Planning (ERP)

The fact that large enterprises today have the ability to seamlessly move data all the way from manufacturing to human resources, and everywhere in between, is largely due to one of the greatest success stories in linking/ integrating cross-functions within companies: Enterprise Resource Planning (ERP) Systems. But as with many effective systems, ERP is not without its share of weaknesses.Back in the 1970’s, before commercial Internet and web-based communications, ERP made its entrance into the business world. At that time, vendors were still laboriously hand-keying, sending and receiving information on paper via internal systems. When the 1980’s rolled around, outward communications between manufacturers and trading partners was done through electronic data interchange (EDI) systems, requiring extensive testing to ensure security and integration viability to avoid risks.

With the speed that the market changes today, this approach is not only extremely difficult, but virtually impossible, and so it became natural for companies to look to their trusty ERP systems for assistance with their outside communication requirements.

Sadly, ERP is unable to deliver in the area of outside communications between manufacturers and vendors. Simply put, ERP was designed to excel at integrating everyone internally but did not address the need to communicate with the outside world.

Regions of the World

Most enterprises have had to look beyond their ERP system and search elsewhere for a solution to their outside communication needs. Many enterprises have chosen to use cloud-based providers to provide that solution, and open up a whole new world full of trading partners from all regions of the world.

Getting on board of a cloud-based system can be achieved in as little as a couple of weeks and in some cases several days. An enterprise can move into a prime position to exchange invoices, bills of lading, purchase orders and the like on a daily basis in a very short time.

For companies still using EDI systems to exchange information and documents, there are very real security concerns, requiring each business to deny trading partners and suppliers access to their ERP systems, making it cumbersome and limiting.

Information and data flows in from cloud-based and EDI systems to ERP via a secure application programming interface (API) directly to ERP and is controlled and managed by corporate IT.

The process appears to work well. The large number of enterprises that are considering, and those that have already done so, enhancing their ERP system with external systems to communicate with the world is proof positive.

The upshot of all of this for IT is that enterprises have found a way to run effective systems like ERP without trying to convert these systems to do what they were never intended to do.

It wasn’t too long ago that someone would try and find a way to convert an ERP system into one that would handle the outside processes of a business. Fortunately the ERP systems have maintained their integrity so businesses can they can be integrated with solutions to handle the need for communication with the outside world.

By Sam Michaels,

Sam is the managing editor and creator of Cloud Accounting Today. He holds a MS in Accounting and has over 10 years of experience in the field. He currently resides in Northern Virginia.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Controversial Chinese Cybersecurity Law Under Review Again

Controversial Chinese Cybersecurity Law Under Review Again

Cybersecurity Law BEIJING. The National People’s Congress, the equivalence of the Chinese Parliament, moved forward in drafting a second version of a controversial cybersecurity law first introduced almost a year ago. This means the law is thought to be closer to passing and will bring greater censorship for both foreign and domestic citizens and businesses.…

Personal Account of Google CEO Compromised

Personal Account of Google CEO Compromised

Personal Account Compromised The security of our information online, whether it’s our banking details, emails or personal information, is important. Hackers pose a very real threat to our privacy when there are vulnerabilities in the security of the services we use online. It can be worrying then when the CEO of perhaps the largest holder…

How You Can Improve Customer Experience With Fast Data Analytics

How You Can Improve Customer Experience With Fast Data Analytics

Fast Data Analytics In today’s constantly connected world, customers expect more than ever before from the companies they do business with. With the emergence of big data, businesses have been able to better meet and exceed customer expectations thanks to analytics and data science. However, the role of data in your business’ success doesn’t end…

Data Protection and Session Fixation Attacks

Data Protection and Session Fixation Attacks

Keeping the man out of the middle: preventing session fixation attacks In a nutshell, session fixation is a type of man in the middle attack where an attacker is able to pretend to be a victim using a session variable. For instance, let’s say you have an application that uses sessions to validate the user.…

E-Commerce Advances For Savvy Marketers

E-Commerce Advances For Savvy Marketers

Digital Marketing Platforms Advertising and marketing techniques have progressed rapidly in the last decade with both channel focus and the direction of content shifting considerably due primarily to advances in cloud technology. Gartner’s Magic Quadrant for Digital Commerce 2016 singles out a few ecommerce providers who are topping their sector in both ability to execute…

The Future of M2M Technology & Opportunities

The Future of M2M Technology & Opportunities

The Future Of The Emerging M2M Here at CloudTweaks, most of our coverage is centered around the growing number of exciting and interconnected emerging markets. Wearable, IoT, M2M, Mobile and Cloud computing to name a few. Over the past couple of weeks we’ve talked about Machine to Machine (M2M) such as the differences between IoT and…

The Cloud Above Our Home

The Cloud Above Our Home

Our Home – Moving All Things Into The Cloud The promise of a smart home had excited the imagination of the movie makers long ago. If you have seen any TV shows in the nineties or before, the interpretation presented itself to us as a computerized personal assistant or a robot housekeeper. It was smart,…

The Global Rise of Cloud Computing

The Global Rise of Cloud Computing

The Global Rise of Cloud Computing Despite the rapid growth of cloud computing, the cloud still commands a small portion of overall enterprise IT spending. Estimates I’ve seen put the percentage between 5% and 10% of the slightly more than $2 trillion (not including telco) spent worldwide in 2014 on enterprise IT. Yet growth projections…

Infographic Introduction – Benefits of Cloud Computing

Infographic Introduction – Benefits of Cloud Computing

Benefits of Cloud Computing Based on Aberdeen Group’s Computer Intelligence Dataset, there are more than 1.6 billion permutations to choose from when it comes to cloud computing solutions. So what, on the face of it, appears to be pretty simple is actually both complex and dynamic regardless of whether you’re in the market for networking,…

Cloud Computing – The Real Story Is About Business Strategy, Not Technology

Cloud Computing – The Real Story Is About Business Strategy, Not Technology

Enabling Business Strategies The cloud is not really the final destination: It’s mid-2015, and it’s clear that the cloud paradigm is here to stay. Its services are growing exponentially and, at this time, it’s a fluid model with no steady state on the horizon. As such, adopting cloud computing has been surprisingly slow and seen more…

Teach Yourself The Cloud: Cloud Computing Knowledge In 5 Easy Steps

Teach Yourself The Cloud: Cloud Computing Knowledge In 5 Easy Steps

Teach Yourself The Cloud Learn how to get to grips with cloud computing in business  Struggling to get your head around the Cloud? Here are five easy ways you can improve your cloud knowledge and perhaps even introduce cloud systems into your business.  Any new technology can appear daunting, and cloud computing is no exception.…

Cloud Infographic – Disaster Recovery

Cloud Infographic – Disaster Recovery

Disaster Recovery Business downtime can be detrimental without a proper disaster recovery plan in place. Only 6% of businesses that experience downtime without a plan will survive long term. Less than half of all businesses that experience a disaster are likely to reopen their doors. There are many causes of data loss and downtime —…