Information storage and retrieval software, Software Engineering

INFORMATION STORAGE  AND RETRIEVAL SOFTWARE:

IBM (International Business Machines Corporation) was one of the earliest to invest money to develop software packages intended for Information Storage and Retrieval. The well known package STAIRS (an acronym for Storage and Information Retrieval System) was developed to be used on IBM machines, that too mainframe series. STAIRS was a machine dependent program which was commercially made available for any one who could afford its cost. This package has been used by some organisations to manage bibliographic databases. It was a powerful text-retrieval system which enabled string searching from any part of the record. Following the introduction of STAIRS, similar programs soon became available on mainframes as well as minicomputers. Packages like ISIS, MINISIS came into existence. But most of these packages were hardware dependent, and therefore could not be used on a wider scale due to lack of portability. Hence, need was felt to develop software packages which could be used for library and information storage and retrieval operations on a wider range of computers, especially microcomputer systems. Several attempts were made in this direction by commercial firms and international organisations like UNESCO, resulting in the proliferation of a number of microcomputer oriented software packages. Many of such packages are being commercially marketed, while a few packages like CDS/ISIS are supplied almost free of cost to educational and non-profit making institutions, particularly in India. 

Today, there are a number of microcomputer oriented software packages intended for automating library, routines and information retrieval operations. In recent years, the movement towards integrated modular software, which means that the librarian can spread the cost and effort of implementation without the risk of software incompatibility, has become common. There are packages such as 'Bookshelf' which contain programs for individual operations like acquisitions, cataloguing, serials control, etc. Each of these modules can be purchased separately, if necessary, and one can use the same set of records without the need to re-enter data each time.  

Posted Date: 10/24/2012 3:03:09 AM | Location : United States







Related Discussions:- Information storage and retrieval software, Assignment Help, Ask Question on Information storage and retrieval software, Get Answer, Expert's Help, Information storage and retrieval software Discussions

Write discussion on Information storage and retrieval software
Your posts are moderated
Related Questions
What is A Technical Analyst? Ans) Technical Analysts perform test assessments and validate system/functional test needs. Depending on the project, single person might wear more

List the important properties of a modular system.    Desirable properties are:- Every module is a well defined subsystem useful to others Every module has a well defined single

(a) Visual Basic is governed by an event processor. Explain the meaning of this phrase. (b) Differentiate between an event procedure and a general procedure. (c) "For datab

How can a company improve quality of business information?

Discuss how your own organization can take advantage of outsourcing its IT systems/functions. In your discussion state what can be outsourced and what benefit will be gained. Do yo

The level at which the software uses scarce resources Efficiency level.

Describe design walk throughs A design walkthrough is a quality practice that allows designers to obtain an early validation of design decisions related to the development and t

Describe Operational Testing? Ans) Testing done by the end user on software in its normal operating environment.

Define the Behavioural Model It defines operational behaviour of the system.  In this model, numerous operations of the system are represented in pictorial form. Tools used to

What are the various types of system testing? 1. Recovery testing - is intended to check the system's ability to recover from failures. 2. Security testing - verifies th