Technology enablers - information system, Computer Engineering

Technology Enablers - Information System

The progression described above has been enabled by five main factors:

  • Increases in processing capability allowing smaller and smaller pieces of hardware to perform more and increasingly complex functions 
  • The convergence of computing and communications technologies
  • The development of easy to use human machine interfaces 
  • The emergence of design standards for information systems making it easier for companies to design, procure and install these systems
  • The use of standardised hardware combined with customised software leading to a more capable and cost effective system.

 

The progression detailed and increases in functionality and utility has also led to some changing assumptions about IS. In the early days due to various factors including technological immaturity, poor definition of organisational requirement and operator apprehension and unfamiliarity, IS was initially sub-optimised and therefore received a lot of bad press. However recently this has been changing. Some examples illustrating the nature of this change are illustrated in the table below.

Previous assumption

Is unfamiliar and frightening

Provides masses of unusable data

Is separate from value added steps

Does not play an active role in the business D

Operational processes are designed to compensate for the inadequacies of IS

New assumption

Is user-friendly

Interprets data and produces useable information and knowledge

Is a source of value and may bring competitive advantage

Drives the business

Operational processes are designed around the enablers provided by IS.

Posted Date: 3/14/2013 3:37:21 AM | Location : United States







Related Discussions:- Technology enablers - information system, Assignment Help, Ask Question on Technology enablers - information system, Get Answer, Expert's Help, Technology enablers - information system Discussions

Write discussion on Technology enablers - information system
Your posts are moderated
Related Questions
Q. Illustrate the Cache Memory Operation? It comprises a copy of a part of main memory contents. When a program is running and CPU tries to read a word of memory (instruction o

State the term- Interviewing This involves a one to one question & answer session between analyst and customer/employee. A good method if analyst wants to probe deeply into on

LAN is a privately - owned computer networks confined to small geographical area, like a factory or an office widely used to connect office PCs to share resources and information.

documentation for dbms report

State the term- Use a define function This is almost exactly the same approach as #define and -D compiler arg that C programs use. In your  Verilog  code,  use  a  'define  to

Q. Versions of small computer systems interface? SCSI-1 calls for a cable with 8 data wires plus one for parity. SCSI-2 allows use of multiple cables to support 16- or

Explain the differences between Internal and external fragmentation. Internal and external fragmentation (1) While memory allocated to a process is a little larger than th

Minimize the logic function F(A, B, C, D) = ∑ m(1,3,5,8,9,11,15) + d(2,13) using NAND gate with help of K-map. Ans. Realization of given expression by using NAND gates:  In

c-program for the minimum total number of shelves

The following is taken from the first edition of the Set Book. We have included this because we find these characteristics helpful. We will refer to them later. In addition to t