20
PRACTICAL TRAINING REPORT 1 King Saud University College of Computer and Information Sciences Department of Information System (IS) Practical Training Report “ELM Company” Faisal Essa Almalahy 432104608 Start of training 12/6/2016 End of training 12/8/2016

Final Report (For University)

Embed Size (px)

Citation preview

Page 1: Final Report (For University)

PRACTICAL TRAINING REPORT 1

King Saud University

College of Computer and Information Sciences

Department of Information System (IS)

Practical Training Report

“ELM Company”

Faisal Essa Almalahy

432104608

Start of training 12/6/2016 End of training 12/8/2016

Page 2: Final Report (For University)

PRACTICAL TRAINING REPORT 2

1. Table of Contents

3. National Information Center ...................................................................... 4

3.1 Background................................................................................................ 4

3.2 ELM Organization Structure ....................................................................... 5

3.3 Services that the company provides .......................................................... 6

4. The Training ............................................................................................... 8

4.1 Tasks .......................................................................................................... 8

4.2 Tools and webs are used ......................................................................... 16

5. Conclusion ............................................................................................... 19

6. References ............................................................................................... 20

Page 3: Final Report (For University)

PRACTICAL TRAINING REPORT 3

2. Table of Figures

Figure 1 Entity Extraction .................................................................................... 8

Figure 2 Data Mining ........................................................................................... 9

Figure 3 Gartner ................................................................................................ 10

Figure 4 IDC ...................................................................................................... 11

Figure 5 Comparison Sheet ............................................................................... 12

Figure 6 summarize 1 ........................................................................................ 13

Figure 7 summarize 2 ........................................................................................ 14

Figure 8 summarize 3 ........................................................................................ 14

Figure 9 ITSM & ITIL .......................................................................................... 15

Page 4: Final Report (For University)

PRACTICAL TRAINING REPORT 4

3. National Information Center

3.1 Background

ELM is a Saudi joint stock company owned by the Public Investment Fund (PIF), which is the

investment arm of the Saudi ministry of finance. ELM services are provided to all forms of

beneficiaries, including government, corporate sector and individuals.

ELM Company develops creative and modern solutions delivered electronically through various

channels, it deploys integrated secure e-Services and high-profile government support projects

designed to meet the requirements of both private and government sectors. It also manages

electronic Services on behalf of their clients to enable them further to enhance their provided

services either directly or through secure electronic portals.

ELM was first established as Al-ELM Research and Development Company. The company role was

to localize and transfer knowledge and information technology to the kingdom of Saudi Arabia.

In 2002, the company began its commercial activities and changed its name to Al-ELM

information Security Company. Its serviced at that time included everything that had to do with

information security starting from designing secure structures for companies, to performing

penetration testing. The first E-government service started in the following years piloted by the

Saudi omrah portal. IN 2004, Al-ELM switched its business focus from information security to

providing secure e-Services. In the years to come, the company continued providing all sorts of

different secure e-Services until it produced the Electronic exit/re-entry travel visa for expatriates

residing within the country, which was the first fully interactive Saudi e-Government service that

applies all qualifications of an e-service. IN the year 2007, the Ministerial Cabinet approved the

decree to transform the company to be owned by the public investment fund and also became a

closed joint stock company. Later on, a strategic plan was launched by the company to contract

with the government sectors in implement outsourcing, optimizing and information technology

projects.

After that, the ELM identity was launched in 2012. In 2014 the company continued its strategy to

grow and started providing its services directly to the private sector in addition to the

government contracts to implement strategic projects for the country.

Sectors: Electronic services, Information technology services, Government outsourcing services,

Training solutions services, consulting services.

Page 5: Final Report (For University)

PRACTICAL TRAINING REPORT 5

3.2 ELM Organization Structure

Page 6: Final Report (For University)

PRACTICAL TRAINING REPORT 6

3.3 Services that the company provides

Efada

It handles the recording and transferring of medical check results for beneficiaries

from health institutes whom are authorized by the ministry of health, to the databases of

concerned entities through a secure electronic system.

Kashef

Kashef service automatically checks the vehicle's date by spotting the vehicle's plate with

special cameras, then the data is checked instantly with the governmental systems

databases and give the result of the vehicle's law abiding status.

Leeqa

With work overflow, time constraints and routine complexities, it has become quite

difficult to communicate with senior officials, whether from their side or the client’s side.

Leeqa is an integrated service offering diverse packages that allow officials and VIPs to

technically receive and organize requests, therefore ensuring fair play for all.

Moued

Moued works on scheduling appointments electronically for organizations that offer their

services for the public and would like to organize receptions appointments. It allow the

individual to book his visit through an electronic portal of the serving entity.

Page 7: Final Report (For University)

PRACTICAL TRAINING REPORT 7

Muqeem

This service allows organizations to explore resident workers data and execute passports

procedures online anytime and anywhere without the need to visit passports office.

Tamm

Tamm service helps vehicles' owners in Saudi Arabia to get all updated information of their

respective vehicles from their governmental sources , to review and control data

simultaneously.

Yakeen

Allowing entities to verify the data of people whom they are dealing with by comparing it

with the official government records. This service is beneficial to entities that has a

database of clients or employees such as banks, health institutions, government

organizations and commissions as well as other organizations that deal with various

personal data and information.

Natheer

Natheer is a service designed for helping organizations to verify the data of the individuals

they deal with, and report about the incidents that happen to individuals, employees or

clients, related to the entity in a business relationship. This service is beneficial to

organizations that has a database of clients or employees such as banks, health

institutions, government entities & commissions as well as other organizations that deal

with various personal data and information.

Mojaz

Mojaz is an advanced service which provides information about used vehicles, from the

date of entry into the Kingdom. The service is designed to help buyers who want to

purchase used vehicles, by obtaining reliable information from reliable source about the

used vehicle.

Page 8: Final Report (For University)

PRACTICAL TRAINING REPORT 8

4. The Training

I worked on the consulting department with own office, PC, Email, and personal account in the

company servers.

On the first day at the ELM Company Signature the Terms and Conditions, they took my

fingerprint and gave me personal card to attend and leave the company, and then the

department of human resources sent me to the general administration of the consulting

department.

Working time 8 hours per day, 5 days per week, from 8AM – 4PM, the company provides many

and several services such free light snacks, fruits and hot and cold drinks.

4.1 Tasks

1. On the first week my manager introducing me to the departments and the employees, then I worked some random works like searching for the accidents in the Saudi Arabia to assist the employee who is beside me, then help the other employee to enter the data from the excel sheet to EPM, and stuff like that.

2. On the second week searching for Entity Extraction and what the tools are used, then searching for Analytics and what the tools are used, and searching for the Data Mining and what the tools are used.

Figure 1 Entity Extraction

Page 9: Final Report (For University)

PRACTICAL TRAINING REPORT 9

Figure 2 Data Mining

Page 10: Final Report (For University)

PRACTICAL TRAINING REPORT 10

3. After searching I compare these tools by the Gartner website, then compare it again to

the IDC website for the most accurate results, and make a Comparison Sheet.

Figure 3 Gartner

Page 11: Final Report (For University)

PRACTICAL TRAINING REPORT 11

Figure 4 IDC

Page 12: Final Report (For University)

PRACTICAL TRAINING REPORT 12

Figure 5 Comparison Sheet

Page 13: Final Report (For University)

PRACTICAL TRAINING REPORT 13

4. The supervisor enrolled me to a new project within the ITC Department for

“Governmental entity”, this project aims to develop a strategic plan to ensure and improve its ICT capabilities. There are many of the gaps identified in the GAP Analysis need to resolution by developing proper list of initiatives and projects future then prioritize projects to make the most important things on the beginning of the project and the cost of implementing projects.

5. My job is to summarize this huge and complicated document in a presentation using MS PowerPoint and then a meeting held to discuss this presentation. Then I worked on comparing the “the future Initiatives and Projects list” with other similar government agencies in the kingdom to check it’s compatibly, after comparison there is some projects does not compatible and then we summarize it to a PowerPoint slides.

Figure 6 summarize 1

Page 14: Final Report (For University)

PRACTICAL TRAINING REPORT 14

Figure 7 summarize 2

Figure 8 summarize 3

Page 15: Final Report (For University)

PRACTICAL TRAINING REPORT 15

6. The supervisor request to make a search about what ITSM & ITIL and what their benefits, we made a word document to clarify the idea about these topics.

Figure 9 ITSM & ITIL

7. The last task, we wrote a report about the “Capability Maturity Assessment” related to some Governmental entity.

Page 16: Final Report (For University)

PRACTICAL TRAINING REPORT 16

4.2 Tools and webs are used

Tools

The tools that were used:

Microsoft Word To write a detailed explanation about a specific subject to make it easy to understand and clear to facilitate decision-making.

Microsoft PowerPoint Use it to summarize and present some topics.

Microsoft Outlook Using ELM email to do multiple tasks such as receiving and sending an email and schedule a meeting etc.

Entity Extraction Is a subtask of information extraction that seeks to locate and classify named entities in text into pre-defined categories such as the names of persons, organizations, locations, expressions of times, quantities, monetary values, percentages, etc.

Analytics Is the discovery, interpretation, and communication of meaningful patterns in data, Especially valuable in areas rich with recorded information, analytics relies on the simultaneous application of statistics, computer programming and operations research to quantify performance. Analytics often favors data visualization to communicate insight.

Data Mining Is an interdisciplinary subfield of computer science, It is the computational process of discovering patterns in large data sets involving methods at the intersection of artificial intelligence, machine learning, statistics, and database systems. The overall goal of the data mining process is to extract information from a data set and transform it into an understandable structure for further use.

Page 17: Final Report (For University)

PRACTICAL TRAINING REPORT 17

Webs

Gartner Is an American research and advisory firm providing information technology related insight, its headquarters are in Stamford, Connecticut, United States. It was known as Gartner Group, Inc. until 2001, when it was then changed to Gartner.

IDC International Data Corporation (IDC) is the premier global provider of market intelligence, advisory services, and events for the information technology, telecommunications and consumer technology markets. IDC helps IT professionals, business executives, and the investment community make fact-based decisions on technology purchases and business strategy.

Some terms

ITIL The ITIL (Information Technology Infrastructure Library) framework is designed to standardize the selection, planning, delivery and support of IT services to a business. The goal is to improve efficiency and achieve predictable service levels. The ITIL framework enables IT to be a business service partner, rather than just back-end support. ITIL guidelines and best practices align IT actions and expenses to business needs and change them as the business grows or shifts direction.

ITSM IT Service Management (ITSM) is not just about software tools, it is about process, people, and technology. Software is a component of an ITSM solution. ITSM software solutions usually come with several components such as a database, business objects (Users, Groups, Roles, etc.), and a process engine. These software solutions can typically be designed to meet most, if not all, ITIL recommendations. Be advised that organizations exist, such as PINK that evaluate ITSM software solutions to certify their ITIL capabilities. Be sure to choose ITSM tools that are certified if you plan to implement ITIL best practices.

Page 18: Final Report (For University)

PRACTICAL TRAINING REPORT 18

Quick win Is an improvement that is visible, has immediate benefit, and can be delivered quickly after the project begins, the quick win does not have to be profound or have a long-term impact on your organization, but needs to be something that many stakeholders agree is a good thing.

Hardware sizing Is determining the capabilities of the hardware.

CEO Chief executive officer, the position of the most senior corporate officer, executive, or administrator in charge of managing an organization.

CIO Chief information officer, a job title commonly given to the most senior executive in an enterprise responsible for the information technology and computer systems that support enterprise goals.

As Is Current situation stage within the methodology used.

Page 19: Final Report (For University)

PRACTICAL TRAINING REPORT 19

5. Conclusion

The first and the most important thing that I gained during my training in ELM Company is

that I have to see how is the work is going to be done in the real world.

In addition, I got to work and mix up with professional workers who work in the same area

as me, which is very important.

The third benefit, the training taught me how to achieve the required goal under a deadline,

a pressure may be present sometimes, and how to work and coordinate the work in a team.

Furthermore, how communicate with a different level of people such as a manager,

assistance and supervisor.

I also learned how to use the SAP to manage and see the absence so I can make an excuse

if I have an appointment or if I got sick, and my reward.

Also, I learned how I can formatting a documents like Microsoft word and Microsoft

PowerPoint, to make it clear and easy to read.

Final thing, there are a different of Job titles, with a different departments and they

communicating with each other.

Page 20: Final Report (For University)

PRACTICAL TRAINING REPORT 20

6. References about [Online] // idc. - https://www.idc.com/about/about.jsp.

Analytics [Online] // wikipedia. - https://en.wikipedia.org/wiki/Analytics.

Data_mining [Online] // wikipedia. - https://en.wikipedia.org/wiki/Data_mining.

Elm_information_security #Elm_History [Online] // wikipedia. -

https://en.wikipedia.org/wiki/Elm_information_security#Elm_History.

entity_recognition [Online] // wikipedia. - https://en.wikipedia.org/wiki/Named-entity_recognition.

Gartner [Online] // wikipedia. - https://en.wikipedia.org/wiki/Gartner.

ITIL [Online] // searchdatacenter. - http://searchdatacenter.techtarget.com/definition/ITIL.

itsm [Online] // allthingsitsm. - http://allthingsitsm.com/itil-vs-itsm-what-is-the-difference/.

Services [Online] // ELM. - http://www.elm.sa/en/Pages/default.aspx.