Feeds

B2B still to fulfil promise

Manage, communicate, automate, integrate

  • alert
  • submit to reddit

Seven Steps to Software Security

Business to Business (B2B) was meant to revolutionise the way that organisations did business. The development of marketplaces meant that products and services could be bought and sold with massively reduced effort in terms of both time and money.

Unlike many of the so-called advances of the new economy, the B2B model isn't flawed - the opportunity to save costs by improving the effectiveness and efficiencies of the procurement operation as well as reducing the number of pen-pushers and bean-counters is attractive to every organisation.

So, it should be good news - but not every organisation is finding the benefits. One of the main problems faced, like the adoption of many of the new technologies, is the need for integration - registering on an exchange is one thing but getting the information flowing through the rest of the IT systems is another.

Added to that is the need for content management, not content management in the usual sense of the word but the ability to maintain company catalogues on line. Finally, and perhaps most surprisingly, is that many companies are simply surprised by the amount of cooperation needed to operate in an exchange environment.

An effective B2B implementation has several key components. First is the ability to manage information; this may come as a surprise as that is the fundamental function of IT systems. We all know that there is far more information around these days than ever before, and today's ever increasingly complex business environment requires the most effective and efficient management of this information possible.

Communication is another key to success. Obviously, entry into a trading exchange requires communication with other participants and with the globalisation of business enabled by the Internet it is important to consider that third parties will be in a number of locations around the world.

After that it's down to automation, again another basic IT function, and in order to get the best of your B2B exchange you need to look at the automation of areas over and above where you might usually consider, such as automation of workflow approval.

Fortunately, or perhaps unfortunately, it all comes back to integration. In order to get the full benefits of B2B, organisations must be linked up fully internally before linking themselves up with third parties. Eventually organisations will integrate and will gain the full benefits offered by B2B, and many other technologies. Until then, they and their systems will continue to exist as islands.

© IT-Analysis.com. All rights reserved.

Boost IT visibility and business value

More from The Register

next story
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
Airbus promises Wi-Fi – yay – and 3D movies (meh) in new A330
If the person in front reclines their seat, this could get interesting
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
Want to beat Verizon's slow Netflix? Get a VPN
Exec finds stream speed climbs when smuggled out
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.