SlideShare uma empresa Scribd logo
1 de 20
Baixar para ler offline
PRACTICAL TRAINING REPORT 1
King Saud University
College of Computer and Information Sciences
Department of Information System (IS)
Practical Training Report
“ELM Company”
Faisal Essa Almalahy
432104608
Start of training 12/6/2016
End of training 12/8/2016
PRACTICAL TRAINING REPORT 2
1. Table of Contents
3. National Information Center...................................................................... 4
3.1 Background................................................................................................ 4
3.2 ELM Organization Structure....................................................................... 5
3.3 Services that the company provides.......................................................... 6
4. The Training............................................................................................... 8
4.1 Tasks.......................................................................................................... 8
4.2 Tools and webs are used ......................................................................... 16
5. Conclusion............................................................................................... 19
6. References............................................................................................... 20
PRACTICAL TRAINING REPORT 3
2. Table of Figures
Figure 1 Entity Extraction.................................................................................... 8
Figure 2 Data Mining........................................................................................... 9
Figure 3 Gartner................................................................................................ 10
Figure 4 IDC ...................................................................................................... 11
Figure 5 Comparison Sheet............................................................................... 12
Figure 6 summarize 1........................................................................................ 13
Figure 7 summarize 2........................................................................................ 14
Figure 8 summarize 3........................................................................................ 14
Figure 9 ITSM & ITIL.......................................................................................... 15
PRACTICAL TRAINING REPORT 4
3. National Information Center
3.1 Background
ELM is a Saudi joint stock company owned by the Public Investment Fund (PIF), which is the
investment arm of the Saudi ministry of finance. ELM services are provided to all forms of
beneficiaries, including government, corporate sector and individuals.
ELM Company develops creative and modern solutions delivered electronically through various
channels, it deploys integrated secure e-Services and high-profile government support projects
designed to meet the requirements of both private and government sectors. It also manages
electronic Services on behalf of their clients to enable them further to enhance their provided
services either directly or through secure electronic portals.
ELM was first established as Al-ELM Research and Development Company. The company role was
to localize and transfer knowledge and information technology to the kingdom of Saudi Arabia.
In 2002, the company began its commercial activities and changed its name to Al-ELM
information Security Company. Its serviced at that time included everything that had to do with
information security starting from designing secure structures for companies, to performing
penetration testing. The first E-government service started in the following years piloted by the
Saudi omrah portal. IN 2004, Al-ELM switched its business focus from information security to
providing secure e-Services. In the years to come, the company continued providing all sorts of
different secure e-Services until it produced the Electronic exit/re-entry travel visa for expatriates
residing within the country, which was the first fully interactive Saudi e-Government service that
applies all qualifications of an e-service. IN the year 2007, the Ministerial Cabinet approved the
decree to transform the company to be owned by the public investment fund and also became a
closed joint stock company. Later on, a strategic plan was launched by the company to contract
with the government sectors in implement outsourcing, optimizing and information technology
projects.
After that, the ELM identity was launched in 2012. In 2014 the company continued its strategy to
grow and started providing its services directly to the private sector in addition to the
government contracts to implement strategic projects for the country.
Sectors: Electronic services, Information technology services, Government outsourcing services,
Training solutions services, consulting services.
PRACTICAL TRAINING REPORT 5
3.2 ELM Organization Structure
PRACTICAL TRAINING REPORT 6
3.3 Services that the company provides
Efada
It handles the recording and transferring of medical check results for beneficiaries
from health institutes whom are authorized by the ministry of health, to the databases of
concerned entities through a secure electronic system.
Kashef
Kashef service automatically checks the vehicle's date by spotting the vehicle's plate with
special cameras, then the data is checked instantly with the governmental systems
databases and give the result of the vehicle's law abiding status.
Leeqa
With work overflow, time constraints and routine complexities, it has become quite
difficult to communicate with senior officials, whether from their side or the client’s side.
Leeqa is an integrated service offering diverse packages that allow officials and VIPs to
technically receive and organize requests, therefore ensuring fair play for all.
Moued
Moued works on scheduling appointments electronically for organizations that offer their
services for the public and would like to organize receptions appointments. It allow the
individual to book his visit through an electronic portal of the serving entity.
PRACTICAL TRAINING REPORT 7
Muqeem
This service allows organizations to explore resident workers data and execute passports
procedures online anytime and anywhere without the need to visit passports office.
Tamm
Tamm service helps vehicles' owners in Saudi Arabia to get all updated information of their
respective vehicles from their governmental sources , to review and control data
simultaneously.
Yakeen
Allowing entities to verify the data of people whom they are dealing with by comparing it
with the official government records. This service is beneficial to entities that has a
database of clients or employees such as banks, health institutions, government
organizations and commissions as well as other organizations that deal with various
personal data and information.
Natheer
Natheer is a service designed for helping organizations to verify the data of the individuals
they deal with, and report about the incidents that happen to individuals, employees or
clients, related to the entity in a business relationship. This service is beneficial to
organizations that has a database of clients or employees such as banks, health
institutions, government entities & commissions as well as other organizations that deal
with various personal data and information.
Mojaz
Mojaz is an advanced service which provides information about used vehicles, from the
date of entry into the Kingdom. The service is designed to help buyers who want to
purchase used vehicles, by obtaining reliable information from reliable source about the
used vehicle.
PRACTICAL TRAINING REPORT 8
4. The Training
I worked on the consulting department with own office, PC, Email, and personal account in the
company servers.
On the first day at the ELM Company Signature the Terms and Conditions, they took my
fingerprint and gave me personal card to attend and leave the company, and then the
department of human resources sent me to the general administration of the consulting
department.
Working time 8 hours per day, 5 days per week, from 8AM – 4PM, the company provides many
and several services such free light snacks, fruits and hot and cold drinks.
4.1 Tasks
1. On the first week my manager introducing me to the departments and the employees,
then I worked some random works like searching for the accidents in the Saudi Arabia to
assist the employee who is beside me, then help the other employee to enter the data
from the excel sheet to EPM, and stuff like that.
2. On the second week searching for Entity Extraction and what the tools are used, then
searching for Analytics and what the tools are used, and searching for the Data Mining
and what the tools are used.
Figure 1 Entity Extraction
PRACTICAL TRAINING REPORT 9
Figure 2 Data Mining
PRACTICAL TRAINING REPORT 10
3. After searching I compare these tools by the Gartner website, then compare it again to
the IDC website for the most accurate results, and make a Comparison Sheet.
Figure 3 Gartner
PRACTICAL TRAINING REPORT 11
Figure 4 IDC
PRACTICAL TRAINING REPORT 12
Figure 5 Comparison Sheet
PRACTICAL TRAINING REPORT 13
4. The supervisor enrolled me to a new project within the ITC Department for
“Governmental entity”, this project aims to develop a strategic plan to ensure and
improve its ICT capabilities.
There are many of the gaps identified in the GAP Analysis need to resolution by
developing proper list of initiatives and projects future then prioritize projects to make
the most important things on the beginning of the project and the cost of implementing
projects.
5. My job is to summarize this huge and complicated document in a presentation using MS
PowerPoint and then a meeting held to discuss this presentation. Then I worked on
comparing the “the future Initiatives and Projects list” with other similar government
agencies in the kingdom to check it’s compatibly, after comparison there is some projects
does not compatible and then we summarize it to a PowerPoint slides.
Figure 6 summarize 1
PRACTICAL TRAINING REPORT 14
Figure 7 summarize 2
Figure 8 summarize 3
PRACTICAL TRAINING REPORT 15
6. The supervisor request to make a search about what ITSM & ITIL and what their
benefits, we made a word document to clarify the idea about these topics.
Figure 9 ITSM & ITIL
7. The last task, we wrote a report about the “Capability Maturity Assessment” related to
some Governmental entity.
PRACTICAL TRAINING REPORT 16
4.2 Tools and webs are used
Tools
The tools that were used:
Microsoft Word
To write a detailed explanation about a specific subject to make it easy to understand and
clear to facilitate decision-making.
Microsoft PowerPoint
Use it to summarize and present some topics.
Microsoft Outlook
Using ELM email to do multiple tasks such as receiving and sending an email and schedule
a meeting etc.
Entity Extraction
Is a subtask of information extraction that seeks to locate and classify named entities in
text into pre-defined categories such as the names of persons, organizations, locations,
expressions of times, quantities, monetary values, percentages, etc.
Analytics
Is the discovery, interpretation, and communication of meaningful patterns in data,
Especially valuable in areas rich with recorded information, analytics relies on the
simultaneous application of statistics, computer programming and operations research to
quantify performance. Analytics often favors data visualization to communicate insight.
Data Mining
Is an interdisciplinary subfield of computer science, It is the computational process of
discovering patterns in large data sets involving methods at the intersection of artificial
intelligence, machine learning, statistics, and database systems. The overall goal of the
data mining process is to extract information from a data set and transform it into an
understandable structure for further use.
PRACTICAL TRAINING REPORT 17
Webs
Gartner
Is an American research and advisory firm providing information technology related
insight, its headquarters are in Stamford, Connecticut, United States. It was known as
Gartner Group, Inc. until 2001, when it was then changed to Gartner.
IDC
International Data Corporation (IDC) is the premier global provider of market intelligence,
advisory services, and events for the information technology, telecommunications and
consumer technology markets. IDC helps IT professionals, business executives, and the
investment community make fact-based decisions on technology purchases and business
strategy.
Some terms
ITIL
The ITIL (Information Technology Infrastructure Library) framework is designed to
standardize the selection, planning, delivery and support of IT services to a business. The
goal is to improve efficiency and achieve predictable service levels. The ITIL framework
enables IT to be a business service partner, rather than just back-end support. ITIL
guidelines and best practices align IT actions and expenses to business needs and change
them as the business grows or shifts direction.
ITSM
IT Service Management (ITSM) is not just about software tools, it is about process, people,
and technology. Software is a component of an ITSM solution.
ITSM software solutions usually come with several components such as a database,
business objects (Users, Groups, Roles, etc.), and a process engine. These software
solutions can typically be designed to meet most, if not all, ITIL recommendations. Be
advised that organizations exist, such as PINK that evaluate ITSM software solutions to
certify their ITIL capabilities. Be sure to choose ITSM tools that are certified if you plan to
implement ITIL best practices.
PRACTICAL TRAINING REPORT 18
Quick win
Is an improvement that is visible, has immediate benefit, and can be delivered quickly after
the project begins, the quick win does not have to be profound or have a long-term impact
on your organization, but needs to be something that many stakeholders agree is a good
thing.
Hardware sizing
Is determining the capabilities of the hardware.
CEO
Chief executive officer, the position of the most senior corporate officer, executive, or
administrator in charge of managing an organization.
CIO
Chief information officer, a job title commonly given to the most senior executive in an
enterprise responsible for the information technology and computer systems that support
enterprise goals.
As Is
Current situation stage within the methodology used.
PRACTICAL TRAINING REPORT 19
5. Conclusion
 The first and the most important thing that I gained during my training in ELM Company is
that I have to see how is the work is going to be done in the real world.
 In addition, I got to work and mix up with professional workers who work in the same area
as me, which is very important.
 The third benefit, the training taught me how to achieve the required goal under a deadline,
a pressure may be present sometimes, and how to work and coordinate the work in a team.
 Furthermore, how communicate with a different level of people such as a manager,
assistance and supervisor.
 I also learned how to use the SAP to manage and see the absence so I can make an excuse
if I have an appointment or if I got sick, and my reward.
 Also, I learned how I can formatting a documents like Microsoft word and Microsoft
PowerPoint, to make it clear and easy to read.
 Final thing, there are a different of Job titles, with a different departments and they
communicating with each other.
PRACTICAL TRAINING REPORT 20
6. References
about [Online] // idc. - https://www.idc.com/about/about.jsp.
Analytics [Online] // wikipedia. - https://en.wikipedia.org/wiki/Analytics.
Data_mining [Online] // wikipedia. - https://en.wikipedia.org/wiki/Data_mining.
Elm_information_security #Elm_History [Online] // wikipedia. -
https://en.wikipedia.org/wiki/Elm_information_security#Elm_History.
entity_recognition [Online] // wikipedia. - https://en.wikipedia.org/wiki/Named-entity_recognition.
Gartner [Online] // wikipedia. - https://en.wikipedia.org/wiki/Gartner.
ITIL [Online] // searchdatacenter. - http://searchdatacenter.techtarget.com/definition/ITIL.
itsm [Online] // allthingsitsm. - http://allthingsitsm.com/itil-vs-itsm-what-is-the-difference/.
Services [Online] // ELM. - http://www.elm.sa/en/Pages/default.aspx.

Mais conteúdo relacionado

Mais procurados

Digital Transformation
Digital TransformationDigital Transformation
Digital TransformationAbbas Badran
 
مذكرة تاريخ اولى ثانوى كاملة وشامله كل اجزاء المنهج
مذكرة تاريخ اولى ثانوى كاملة وشامله كل اجزاء المنهجمذكرة تاريخ اولى ثانوى كاملة وشامله كل اجزاء المنهج
مذكرة تاريخ اولى ثانوى كاملة وشامله كل اجزاء المنهجأشرف هاشم عبد الرحمن
 
تقنية البلوك تشين Blockchain
تقنية البلوك تشين Blockchainتقنية البلوك تشين Blockchain
تقنية البلوك تشين BlockchainAbdurrahman AlQahtani
 
أساسيات أمن المعلومات
أساسيات أمن المعلوماتأساسيات أمن المعلومات
أساسيات أمن المعلوماتMohammed Almeshekah
 
How to program Chevrolet ecbm with gm tech 2 diagnostic scan tool
How to program Chevrolet ecbm with gm tech 2 diagnostic scan toolHow to program Chevrolet ecbm with gm tech 2 diagnostic scan tool
How to program Chevrolet ecbm with gm tech 2 diagnostic scan toolamysmyy
 
أنواع أجهزة الحاسب
أنواع أجهزة الحاسبأنواع أجهزة الحاسب
أنواع أجهزة الحاسبtahanisaad
 
حماية البيانات الشخصية الرقمية والجرائم الإلكترونية وحماية المستهلك في ميزان...
 حماية البيانات الشخصية الرقمية والجرائم الإلكترونية وحماية المستهلك في ميزان... حماية البيانات الشخصية الرقمية والجرائم الإلكترونية وحماية المستهلك في ميزان...
حماية البيانات الشخصية الرقمية والجرائم الإلكترونية وحماية المستهلك في ميزان...Aboul Ella Hassanien
 
The CPG Digital Revolution: Moving from Analog to Digital Operating Model
The CPG Digital Revolution: Moving from Analog to Digital Operating ModelThe CPG Digital Revolution: Moving from Analog to Digital Operating Model
The CPG Digital Revolution: Moving from Analog to Digital Operating Modelaccenture
 

Mais procurados (10)

Digital Transformation
Digital TransformationDigital Transformation
Digital Transformation
 
مذكرة تاريخ اولى ثانوى كاملة وشامله كل اجزاء المنهج
مذكرة تاريخ اولى ثانوى كاملة وشامله كل اجزاء المنهجمذكرة تاريخ اولى ثانوى كاملة وشامله كل اجزاء المنهج
مذكرة تاريخ اولى ثانوى كاملة وشامله كل اجزاء المنهج
 
Pwc fintech-global-report
Pwc fintech-global-reportPwc fintech-global-report
Pwc fintech-global-report
 
تقنية البلوك تشين Blockchain
تقنية البلوك تشين Blockchainتقنية البلوك تشين Blockchain
تقنية البلوك تشين Blockchain
 
أساسيات أمن المعلومات
أساسيات أمن المعلوماتأساسيات أمن المعلومات
أساسيات أمن المعلومات
 
How to program Chevrolet ecbm with gm tech 2 diagnostic scan tool
How to program Chevrolet ecbm with gm tech 2 diagnostic scan toolHow to program Chevrolet ecbm with gm tech 2 diagnostic scan tool
How to program Chevrolet ecbm with gm tech 2 diagnostic scan tool
 
The Development of e-Government in Uganda
The Development of e-Government in UgandaThe Development of e-Government in Uganda
The Development of e-Government in Uganda
 
أنواع أجهزة الحاسب
أنواع أجهزة الحاسبأنواع أجهزة الحاسب
أنواع أجهزة الحاسب
 
حماية البيانات الشخصية الرقمية والجرائم الإلكترونية وحماية المستهلك في ميزان...
 حماية البيانات الشخصية الرقمية والجرائم الإلكترونية وحماية المستهلك في ميزان... حماية البيانات الشخصية الرقمية والجرائم الإلكترونية وحماية المستهلك في ميزان...
حماية البيانات الشخصية الرقمية والجرائم الإلكترونية وحماية المستهلك في ميزان...
 
The CPG Digital Revolution: Moving from Analog to Digital Operating Model
The CPG Digital Revolution: Moving from Analog to Digital Operating ModelThe CPG Digital Revolution: Moving from Analog to Digital Operating Model
The CPG Digital Revolution: Moving from Analog to Digital Operating Model
 

Destaque (20)

Gotas De Carinho Tremda Vida
Gotas De Carinho  Tremda VidaGotas De Carinho  Tremda Vida
Gotas De Carinho Tremda Vida
 
Deus quero louvarte
Deus quero louvarteDeus quero louvarte
Deus quero louvarte
 
Como parar de fumar - Dois métodos para abandonar o cigarro
Como parar de fumar - Dois métodos para abandonar o cigarroComo parar de fumar - Dois métodos para abandonar o cigarro
Como parar de fumar - Dois métodos para abandonar o cigarro
 
Nómina de titulación
Nómina de titulaciónNómina de titulación
Nómina de titulación
 
Seg
SegSeg
Seg
 
Passive voice (1) teoría
Passive voice (1) teoríaPassive voice (1) teoría
Passive voice (1) teoría
 
Informatica. LZ IIIC
Informatica. LZ IIICInformatica. LZ IIIC
Informatica. LZ IIIC
 
Por que andalucia
Por que andaluciaPor que andalucia
Por que andalucia
 
Victor Hugo
Victor HugoVictor Hugo
Victor Hugo
 
skydrive_word_doc
skydrive_word_docskydrive_word_doc
skydrive_word_doc
 
We asked students to countries want to go and they went.
We asked students to countries want to go and they went.We asked students to countries want to go and they went.
We asked students to countries want to go and they went.
 
Biglietto
BigliettoBiglietto
Biglietto
 
Piracicaba1
Piracicaba1Piracicaba1
Piracicaba1
 
T R A B A J O D E C O M P U T A C I O N
T R A B A J O  D E  C O M P U T A C I O NT R A B A J O  D E  C O M P U T A C I O N
T R A B A J O D E C O M P U T A C I O N
 
Futebol
FutebolFutebol
Futebol
 
Recreos
RecreosRecreos
Recreos
 
O ABSOLUTISMO
O ABSOLUTISMOO ABSOLUTISMO
O ABSOLUTISMO
 
Scan pic0001.jpg oliva
Scan pic0001.jpg olivaScan pic0001.jpg oliva
Scan pic0001.jpg oliva
 
F&C Business Card
F&C Business CardF&C Business Card
F&C Business Card
 
Comenzar
ComenzarComenzar
Comenzar
 

Semelhante a Final Report (For University)

Problems faced by RTO users
Problems faced by RTO usersProblems faced by RTO users
Problems faced by RTO usersKarthik Krishnan
 
Accenture-Technology-Vision-for-Revenue-Agencies-Pov-Web
Accenture-Technology-Vision-for-Revenue-Agencies-Pov-WebAccenture-Technology-Vision-for-Revenue-Agencies-Pov-Web
Accenture-Technology-Vision-for-Revenue-Agencies-Pov-WebSudhir Pitlam
 
IRJET - Ways of Improving it-Dependent Service Delivery in Public Organis...
IRJET -  	  Ways of Improving it-Dependent Service Delivery in Public Organis...IRJET -  	  Ways of Improving it-Dependent Service Delivery in Public Organis...
IRJET - Ways of Improving it-Dependent Service Delivery in Public Organis...IRJET Journal
 
Apresentação eSocial Online (Versão em Inglês)
Apresentação eSocial Online (Versão em Inglês)Apresentação eSocial Online (Versão em Inglês)
Apresentação eSocial Online (Versão em Inglês)EmployerRH
 
B009 2010-iaasb-handbook-iaps-1013
B009 2010-iaasb-handbook-iaps-1013B009 2010-iaasb-handbook-iaps-1013
B009 2010-iaasb-handbook-iaps-1013RS NAVARRO
 
[E government policy training] guangzhou city presentation
[E government policy training] guangzhou city presentation[E government policy training] guangzhou city presentation
[E government policy training] guangzhou city presentationshrdcinfo
 
PROPOSAL FOR CLOUD APPLICA.docx
PROPOSAL FOR CLOUD APPLICA.docxPROPOSAL FOR CLOUD APPLICA.docx
PROPOSAL FOR CLOUD APPLICA.docxwoodruffeloisa
 
Legal Suits – Court Case, Client Attorney App
Legal Suits – Court Case, Client Attorney AppLegal Suits – Court Case, Client Attorney App
Legal Suits – Court Case, Client Attorney AppIRJET Journal
 
IRJET-Wireless Sensing Network for Agriculture Monitoring
IRJET-Wireless Sensing Network for Agriculture MonitoringIRJET-Wireless Sensing Network for Agriculture Monitoring
IRJET-Wireless Sensing Network for Agriculture MonitoringIRJET Journal
 
US State Government Case Study
US State Government Case StudyUS State Government Case Study
US State Government Case StudyMark S. Mahre
 
Cw comp1108 531_mo233_20150420_185837_1415
Cw comp1108 531_mo233_20150420_185837_1415Cw comp1108 531_mo233_20150420_185837_1415
Cw comp1108 531_mo233_20150420_185837_1415Owen Muzi
 
Universal Jobmatch Equality Impact Assessment
Universal Jobmatch Equality Impact AssessmentUniversal Jobmatch Equality Impact Assessment
Universal Jobmatch Equality Impact AssessmentJessica Arevalo
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Initial Country Offering: How To Build Government-In-The-Cloud or Country-As-...
Initial Country Offering: How To Build Government-In-The-Cloud or Country-As-...Initial Country Offering: How To Build Government-In-The-Cloud or Country-As-...
Initial Country Offering: How To Build Government-In-The-Cloud or Country-As-...Vladislav Solodkiy
 

Semelhante a Final Report (For University) (20)

Chapter 10
Chapter 10Chapter 10
Chapter 10
 
A Centralized Multimodal Authentication Platform with trust model approach fo...
A Centralized Multimodal Authentication Platform with trust model approach fo...A Centralized Multimodal Authentication Platform with trust model approach fo...
A Centralized Multimodal Authentication Platform with trust model approach fo...
 
Problems faced by RTO users
Problems faced by RTO usersProblems faced by RTO users
Problems faced by RTO users
 
Ne gp
Ne gpNe gp
Ne gp
 
Accenture-Technology-Vision-for-Revenue-Agencies-Pov-Web
Accenture-Technology-Vision-for-Revenue-Agencies-Pov-WebAccenture-Technology-Vision-for-Revenue-Agencies-Pov-Web
Accenture-Technology-Vision-for-Revenue-Agencies-Pov-Web
 
IRJET - Ways of Improving it-Dependent Service Delivery in Public Organis...
IRJET -  	  Ways of Improving it-Dependent Service Delivery in Public Organis...IRJET -  	  Ways of Improving it-Dependent Service Delivery in Public Organis...
IRJET - Ways of Improving it-Dependent Service Delivery in Public Organis...
 
2016 CV updated
2016 CV updated2016 CV updated
2016 CV updated
 
Apresentação eSocial Online (Versão em Inglês)
Apresentação eSocial Online (Versão em Inglês)Apresentação eSocial Online (Versão em Inglês)
Apresentação eSocial Online (Versão em Inglês)
 
E
EE
E
 
B009 2010-iaasb-handbook-iaps-1013
B009 2010-iaasb-handbook-iaps-1013B009 2010-iaasb-handbook-iaps-1013
B009 2010-iaasb-handbook-iaps-1013
 
[E government policy training] guangzhou city presentation
[E government policy training] guangzhou city presentation[E government policy training] guangzhou city presentation
[E government policy training] guangzhou city presentation
 
PROPOSAL FOR CLOUD APPLICA.docx
PROPOSAL FOR CLOUD APPLICA.docxPROPOSAL FOR CLOUD APPLICA.docx
PROPOSAL FOR CLOUD APPLICA.docx
 
Legal Suits – Court Case, Client Attorney App
Legal Suits – Court Case, Client Attorney AppLegal Suits – Court Case, Client Attorney App
Legal Suits – Court Case, Client Attorney App
 
IRJET-Wireless Sensing Network for Agriculture Monitoring
IRJET-Wireless Sensing Network for Agriculture MonitoringIRJET-Wireless Sensing Network for Agriculture Monitoring
IRJET-Wireless Sensing Network for Agriculture Monitoring
 
US State Government Case Study
US State Government Case StudyUS State Government Case Study
US State Government Case Study
 
Cw comp1108 531_mo233_20150420_185837_1415
Cw comp1108 531_mo233_20150420_185837_1415Cw comp1108 531_mo233_20150420_185837_1415
Cw comp1108 531_mo233_20150420_185837_1415
 
F031201037041
F031201037041F031201037041
F031201037041
 
Universal Jobmatch Equality Impact Assessment
Universal Jobmatch Equality Impact AssessmentUniversal Jobmatch Equality Impact Assessment
Universal Jobmatch Equality Impact Assessment
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Initial Country Offering: How To Build Government-In-The-Cloud or Country-As-...
Initial Country Offering: How To Build Government-In-The-Cloud or Country-As-...Initial Country Offering: How To Build Government-In-The-Cloud or Country-As-...
Initial Country Offering: How To Build Government-In-The-Cloud or Country-As-...
 

Final Report (For University)

  • 1. PRACTICAL TRAINING REPORT 1 King Saud University College of Computer and Information Sciences Department of Information System (IS) Practical Training Report “ELM Company” Faisal Essa Almalahy 432104608 Start of training 12/6/2016 End of training 12/8/2016
  • 2. PRACTICAL TRAINING REPORT 2 1. Table of Contents 3. National Information Center...................................................................... 4 3.1 Background................................................................................................ 4 3.2 ELM Organization Structure....................................................................... 5 3.3 Services that the company provides.......................................................... 6 4. The Training............................................................................................... 8 4.1 Tasks.......................................................................................................... 8 4.2 Tools and webs are used ......................................................................... 16 5. Conclusion............................................................................................... 19 6. References............................................................................................... 20
  • 3. PRACTICAL TRAINING REPORT 3 2. Table of Figures Figure 1 Entity Extraction.................................................................................... 8 Figure 2 Data Mining........................................................................................... 9 Figure 3 Gartner................................................................................................ 10 Figure 4 IDC ...................................................................................................... 11 Figure 5 Comparison Sheet............................................................................... 12 Figure 6 summarize 1........................................................................................ 13 Figure 7 summarize 2........................................................................................ 14 Figure 8 summarize 3........................................................................................ 14 Figure 9 ITSM & ITIL.......................................................................................... 15
  • 4. PRACTICAL TRAINING REPORT 4 3. National Information Center 3.1 Background ELM is a Saudi joint stock company owned by the Public Investment Fund (PIF), which is the investment arm of the Saudi ministry of finance. ELM services are provided to all forms of beneficiaries, including government, corporate sector and individuals. ELM Company develops creative and modern solutions delivered electronically through various channels, it deploys integrated secure e-Services and high-profile government support projects designed to meet the requirements of both private and government sectors. It also manages electronic Services on behalf of their clients to enable them further to enhance their provided services either directly or through secure electronic portals. ELM was first established as Al-ELM Research and Development Company. The company role was to localize and transfer knowledge and information technology to the kingdom of Saudi Arabia. In 2002, the company began its commercial activities and changed its name to Al-ELM information Security Company. Its serviced at that time included everything that had to do with information security starting from designing secure structures for companies, to performing penetration testing. The first E-government service started in the following years piloted by the Saudi omrah portal. IN 2004, Al-ELM switched its business focus from information security to providing secure e-Services. In the years to come, the company continued providing all sorts of different secure e-Services until it produced the Electronic exit/re-entry travel visa for expatriates residing within the country, which was the first fully interactive Saudi e-Government service that applies all qualifications of an e-service. IN the year 2007, the Ministerial Cabinet approved the decree to transform the company to be owned by the public investment fund and also became a closed joint stock company. Later on, a strategic plan was launched by the company to contract with the government sectors in implement outsourcing, optimizing and information technology projects. After that, the ELM identity was launched in 2012. In 2014 the company continued its strategy to grow and started providing its services directly to the private sector in addition to the government contracts to implement strategic projects for the country. Sectors: Electronic services, Information technology services, Government outsourcing services, Training solutions services, consulting services.
  • 5. PRACTICAL TRAINING REPORT 5 3.2 ELM Organization Structure
  • 6. PRACTICAL TRAINING REPORT 6 3.3 Services that the company provides Efada It handles the recording and transferring of medical check results for beneficiaries from health institutes whom are authorized by the ministry of health, to the databases of concerned entities through a secure electronic system. Kashef Kashef service automatically checks the vehicle's date by spotting the vehicle's plate with special cameras, then the data is checked instantly with the governmental systems databases and give the result of the vehicle's law abiding status. Leeqa With work overflow, time constraints and routine complexities, it has become quite difficult to communicate with senior officials, whether from their side or the client’s side. Leeqa is an integrated service offering diverse packages that allow officials and VIPs to technically receive and organize requests, therefore ensuring fair play for all. Moued Moued works on scheduling appointments electronically for organizations that offer their services for the public and would like to organize receptions appointments. It allow the individual to book his visit through an electronic portal of the serving entity.
  • 7. PRACTICAL TRAINING REPORT 7 Muqeem This service allows organizations to explore resident workers data and execute passports procedures online anytime and anywhere without the need to visit passports office. Tamm Tamm service helps vehicles' owners in Saudi Arabia to get all updated information of their respective vehicles from their governmental sources , to review and control data simultaneously. Yakeen Allowing entities to verify the data of people whom they are dealing with by comparing it with the official government records. This service is beneficial to entities that has a database of clients or employees such as banks, health institutions, government organizations and commissions as well as other organizations that deal with various personal data and information. Natheer Natheer is a service designed for helping organizations to verify the data of the individuals they deal with, and report about the incidents that happen to individuals, employees or clients, related to the entity in a business relationship. This service is beneficial to organizations that has a database of clients or employees such as banks, health institutions, government entities & commissions as well as other organizations that deal with various personal data and information. Mojaz Mojaz is an advanced service which provides information about used vehicles, from the date of entry into the Kingdom. The service is designed to help buyers who want to purchase used vehicles, by obtaining reliable information from reliable source about the used vehicle.
  • 8. PRACTICAL TRAINING REPORT 8 4. The Training I worked on the consulting department with own office, PC, Email, and personal account in the company servers. On the first day at the ELM Company Signature the Terms and Conditions, they took my fingerprint and gave me personal card to attend and leave the company, and then the department of human resources sent me to the general administration of the consulting department. Working time 8 hours per day, 5 days per week, from 8AM – 4PM, the company provides many and several services such free light snacks, fruits and hot and cold drinks. 4.1 Tasks 1. On the first week my manager introducing me to the departments and the employees, then I worked some random works like searching for the accidents in the Saudi Arabia to assist the employee who is beside me, then help the other employee to enter the data from the excel sheet to EPM, and stuff like that. 2. On the second week searching for Entity Extraction and what the tools are used, then searching for Analytics and what the tools are used, and searching for the Data Mining and what the tools are used. Figure 1 Entity Extraction
  • 9. PRACTICAL TRAINING REPORT 9 Figure 2 Data Mining
  • 10. PRACTICAL TRAINING REPORT 10 3. After searching I compare these tools by the Gartner website, then compare it again to the IDC website for the most accurate results, and make a Comparison Sheet. Figure 3 Gartner
  • 11. PRACTICAL TRAINING REPORT 11 Figure 4 IDC
  • 12. PRACTICAL TRAINING REPORT 12 Figure 5 Comparison Sheet
  • 13. PRACTICAL TRAINING REPORT 13 4. The supervisor enrolled me to a new project within the ITC Department for “Governmental entity”, this project aims to develop a strategic plan to ensure and improve its ICT capabilities. There are many of the gaps identified in the GAP Analysis need to resolution by developing proper list of initiatives and projects future then prioritize projects to make the most important things on the beginning of the project and the cost of implementing projects. 5. My job is to summarize this huge and complicated document in a presentation using MS PowerPoint and then a meeting held to discuss this presentation. Then I worked on comparing the “the future Initiatives and Projects list” with other similar government agencies in the kingdom to check it’s compatibly, after comparison there is some projects does not compatible and then we summarize it to a PowerPoint slides. Figure 6 summarize 1
  • 14. PRACTICAL TRAINING REPORT 14 Figure 7 summarize 2 Figure 8 summarize 3
  • 15. PRACTICAL TRAINING REPORT 15 6. The supervisor request to make a search about what ITSM & ITIL and what their benefits, we made a word document to clarify the idea about these topics. Figure 9 ITSM & ITIL 7. The last task, we wrote a report about the “Capability Maturity Assessment” related to some Governmental entity.
  • 16. PRACTICAL TRAINING REPORT 16 4.2 Tools and webs are used Tools The tools that were used: Microsoft Word To write a detailed explanation about a specific subject to make it easy to understand and clear to facilitate decision-making. Microsoft PowerPoint Use it to summarize and present some topics. Microsoft Outlook Using ELM email to do multiple tasks such as receiving and sending an email and schedule a meeting etc. Entity Extraction Is a subtask of information extraction that seeks to locate and classify named entities in text into pre-defined categories such as the names of persons, organizations, locations, expressions of times, quantities, monetary values, percentages, etc. Analytics Is the discovery, interpretation, and communication of meaningful patterns in data, Especially valuable in areas rich with recorded information, analytics relies on the simultaneous application of statistics, computer programming and operations research to quantify performance. Analytics often favors data visualization to communicate insight. Data Mining Is an interdisciplinary subfield of computer science, It is the computational process of discovering patterns in large data sets involving methods at the intersection of artificial intelligence, machine learning, statistics, and database systems. The overall goal of the data mining process is to extract information from a data set and transform it into an understandable structure for further use.
  • 17. PRACTICAL TRAINING REPORT 17 Webs Gartner Is an American research and advisory firm providing information technology related insight, its headquarters are in Stamford, Connecticut, United States. It was known as Gartner Group, Inc. until 2001, when it was then changed to Gartner. IDC International Data Corporation (IDC) is the premier global provider of market intelligence, advisory services, and events for the information technology, telecommunications and consumer technology markets. IDC helps IT professionals, business executives, and the investment community make fact-based decisions on technology purchases and business strategy. Some terms ITIL The ITIL (Information Technology Infrastructure Library) framework is designed to standardize the selection, planning, delivery and support of IT services to a business. The goal is to improve efficiency and achieve predictable service levels. The ITIL framework enables IT to be a business service partner, rather than just back-end support. ITIL guidelines and best practices align IT actions and expenses to business needs and change them as the business grows or shifts direction. ITSM IT Service Management (ITSM) is not just about software tools, it is about process, people, and technology. Software is a component of an ITSM solution. ITSM software solutions usually come with several components such as a database, business objects (Users, Groups, Roles, etc.), and a process engine. These software solutions can typically be designed to meet most, if not all, ITIL recommendations. Be advised that organizations exist, such as PINK that evaluate ITSM software solutions to certify their ITIL capabilities. Be sure to choose ITSM tools that are certified if you plan to implement ITIL best practices.
  • 18. PRACTICAL TRAINING REPORT 18 Quick win Is an improvement that is visible, has immediate benefit, and can be delivered quickly after the project begins, the quick win does not have to be profound or have a long-term impact on your organization, but needs to be something that many stakeholders agree is a good thing. Hardware sizing Is determining the capabilities of the hardware. CEO Chief executive officer, the position of the most senior corporate officer, executive, or administrator in charge of managing an organization. CIO Chief information officer, a job title commonly given to the most senior executive in an enterprise responsible for the information technology and computer systems that support enterprise goals. As Is Current situation stage within the methodology used.
  • 19. PRACTICAL TRAINING REPORT 19 5. Conclusion  The first and the most important thing that I gained during my training in ELM Company is that I have to see how is the work is going to be done in the real world.  In addition, I got to work and mix up with professional workers who work in the same area as me, which is very important.  The third benefit, the training taught me how to achieve the required goal under a deadline, a pressure may be present sometimes, and how to work and coordinate the work in a team.  Furthermore, how communicate with a different level of people such as a manager, assistance and supervisor.  I also learned how to use the SAP to manage and see the absence so I can make an excuse if I have an appointment or if I got sick, and my reward.  Also, I learned how I can formatting a documents like Microsoft word and Microsoft PowerPoint, to make it clear and easy to read.  Final thing, there are a different of Job titles, with a different departments and they communicating with each other.
  • 20. PRACTICAL TRAINING REPORT 20 6. References about [Online] // idc. - https://www.idc.com/about/about.jsp. Analytics [Online] // wikipedia. - https://en.wikipedia.org/wiki/Analytics. Data_mining [Online] // wikipedia. - https://en.wikipedia.org/wiki/Data_mining. Elm_information_security #Elm_History [Online] // wikipedia. - https://en.wikipedia.org/wiki/Elm_information_security#Elm_History. entity_recognition [Online] // wikipedia. - https://en.wikipedia.org/wiki/Named-entity_recognition. Gartner [Online] // wikipedia. - https://en.wikipedia.org/wiki/Gartner. ITIL [Online] // searchdatacenter. - http://searchdatacenter.techtarget.com/definition/ITIL. itsm [Online] // allthingsitsm. - http://allthingsitsm.com/itil-vs-itsm-what-is-the-difference/. Services [Online] // ELM. - http://www.elm.sa/en/Pages/default.aspx.