Riordan Manufacturing Information TechnologyEssay Preview: Riordan Manufacturing Information TechnologyReport this essayMedtronic and The Oracle Database Management SystemMedtronic, Inc. is a global leader in medical technology providing lifelong solutions for people with chronic disease. The company offers products, therapies, and services that enhance or extend the lives of millions of people. Each year, 5 million people benefit from Medtronics technology, used to treat conditions such as diabetes, heart disease, neurological disorders, and vascular disease. Medtronic has been in the business of selling medical devices for half of a century.
The company uses various Oracle Databases to store several hundred gigabytes of information on every implantable device the company sells. Oracle Database is a relational database management system software product released by Oracle Corporation and has become a major feature in database computing.
Medtronic is a company that is growing by leaps and bounds and is faced with many challenges in its competive field. The company wants to maintain an advantage with its physician/customer loyalty as it grows, to optimize sales force performance and customer service by providing the sales team with accurate customer data, provide efficient reporting with its 800 scheduled reports on a daily basis and provide transparency to intergrated data from disparate source systems.
The solutions worked with BI Consulting Group to implement Oracle Business Intelligence Enterprise Edition, creating a business analytics system which measures and monitors key sales metrics. It provides the sales team with an accurate 360 degree view of customer information. It also provides timely reports and analysis to the company executives. The Oracle System has improved insight into key data such as devices sold per region, physician loyalty, and sending purchase orders, to name just a few. The Oracle System has created a “Command and Control” dashboard, available to a variety of departments, that decreased the reporting production and distribution overhead, enabled
Risks
Oracle does not currently have a system designed to protect your personal data. Data protection mechanisms are available at the following security levels, with or without changes to the existing products. You should consult the system documentation to obtain information and provide feedback on your security issues, and ensure compliance with the relevant security policies and practices.
Risks of security and security risks are identified by the following criteria (see Security Risk Management, below). You should refer to all the following steps for details, especially because we provide the following security protection procedures for you to prepare your data protection. These are provided as guidelines only, and you should read your policies carefully.
Know your database security requirements. The database security requirements can be summarized as follows:
• the availability of new or revised information on the customers’ computer. • the availability of or enhanced access to, or information about security measures. • database security services such as:
• customer information security • vendor-defined information management services.
Read, review, and submit appropriate security policies and requirements.
Work with your security agency to identify those security policies and requirements that you require (for example, the “Minimum Software and Software Security” section of the Oracle Database Security Guide.
Use confidentiality protections for your database and information security. See the Oracle Database Security FAQ for information on how to protect your Oracle database, and how to use the security protections in combination with your current data protection policies.
Use a secure FTP server when you are at least 100% sure of access in your database.
Ensure that a password-protected password is provided on your public and private computers.
Protect your database access files with a strong and reliable password manager.
Provide a database backup for your data prior to or within 24 hours of the date of your access to the database.
Access your database through a password manager that is capable of storing and keeping a small fraction of the full user name, username, and password.
Use a secure FTP server when you are at least 100% sure of access to your database. Do not upload files you cannot decrypt.
Do not upload files that are not stored on your computer, for example files that have an expiration date, date-to-time or date-to-date.
Be aware that any changes to the database schema and the underlying database software will result in increased risk.
Use a strong password manager when you are at least 100% sure of access to your database. If the password manager provides an access denial-of-service attack, you must be able to protect against the attackers.
Ensure that all information you receive as stored on your computer (including your