Strategic Use of Information Technology
Essay by people • January 22, 2011 • Essay • 1,339 Words (6 Pages) • 2,630 Views
Strategic Use of Information Technology
Abstract
Throughout our country's rich history it's been proven that consistent technological advancements as well as their successful and strategic deployment have been imperative to the successful operations and production of businesses worldwide. Regardless the business you find yourself, consistently improving and updating information systems with new and improved technology helps businesses gain a competitive advantage or at least ensures that business the ability to continue operations and production. In this paper, I will explain the information systems and the different types of technology used for processing applicants for service into the branches of the military by the Military Entrance Processing stations throughout this country.
Table of Contents
ABSTRACT 2
STRATEGIC USE OF INFORMATION TECHNOLOGY 3
Strategic Deployment 3
Economic Impact 4
Recommendations 5
CONCLUSION 7
Strategic Use of Information Technology
First I need to explain the overall concept or in military terms mission of MEPS (Military Entrance Processing Stations), then I will cover how the current economic trends in this society have affected business at the MEPS and finally I will give some personal recommendations that if added, could make the processing flow more smoothly. There are sixty five MEPS throughout the country to include Puerto Rico, Alaska and Hawaii, all of which fall under the authority of USMEPCOM. Each MEPS consist of sections, each with their own specific tasks: Processing, Medical, Testing, Headquarters section and Liaisons who perform services specific to each branch of the military (Army, Navy, Army National Guard, Air Force, Marines and Coast Guard). There are managers for each section in each MEPS, some civilian and others military members. I am the manager in charge of the processing section.
My current position in the Army has me overseeing the process of finding a place for qualified individuals in the military. With the numerous events that have occurred over the last decade and the development of Homeland Security our job is not just to process applicants and put them into the military but also to ensure that these future soldiers are of sound mind and body and do not present any further risk to our country. The use of technology through this process, from fingerprinting to background checks, is essential for us to complete the mission at hand.
Strategic Deployment
I will cover the different types of technology used in the MEPS information systems by briefly describing a day in the life of a MEPS applicant. When applicants first arrive at the building they have to be enrolled into our system called e-security. E-security is an internet based system that is linked throughout the MEPS, so once enrolled into e-security an applicant can be pulled up by any other MEPS. E-security is a biometrics system that uses fingerprint pads for fingerprint analysis and cameras with facial recognition software. Access into e-security and the different sections within it are also password protected, so access is dependent on the section that each employee works in and each transaction completed is tracked by each employee's last name and the last four of their SSN.
Once enrollment into e-security is complete, applicants go through a thorough physical exam, in which all medical results are stored in a medical record that is kept in locked filing cabinets with limited access and in e-security. Once the physical is complete, applicants who have not taken the ASVAB (Armed Service Vocational Aptitude Battery) either in school or at a remote site, will take it on the internet based computers in the testing section.
Now that applicants are physically and intellectually qualified, it's time for the service liaisons to find a specific job for each applicant based on their desires, the results from the physical and the ASVAB. This is all done on branch specific software that is linked to e-security. The
...
...