Technology enablers - information system, Computer Engineering

Technology Enablers - Information System

The progression described above has been enabled by five main factors:

  • Increases in processing capability allowing smaller and smaller pieces of hardware to perform more and increasingly complex functions 
  • The convergence of computing and communications technologies
  • The development of easy to use human machine interfaces 
  • The emergence of design standards for information systems making it easier for companies to design, procure and install these systems
  • The use of standardised hardware combined with customised software leading to a more capable and cost effective system.

 

The progression detailed and increases in functionality and utility has also led to some changing assumptions about IS. In the early days due to various factors including technological immaturity, poor definition of organisational requirement and operator apprehension and unfamiliarity, IS was initially sub-optimised and therefore received a lot of bad press. However recently this has been changing. Some examples illustrating the nature of this change are illustrated in the table below.

Previous assumption

Is unfamiliar and frightening

Provides masses of unusable data

Is separate from value added steps

Does not play an active role in the business D

Operational processes are designed to compensate for the inadequacies of IS

New assumption

Is user-friendly

Interprets data and produces useable information and knowledge

Is a source of value and may bring competitive advantage

Drives the business

Operational processes are designed around the enablers provided by IS.

Posted Date: 3/14/2013 3:37:21 AM | Location : United States







Related Discussions:- Technology enablers - information system, Assignment Help, Ask Question on Technology enablers - information system, Get Answer, Expert's Help, Technology enablers - information system Discussions

Write discussion on Technology enablers - information system
Your posts are moderated
Related Questions
Explain Garbage collection In this method two passes are made over the memory to identify new areas. In the first pass it traverses all pointers pointing to allocated areas an

Q. Explain about System Deadlock? A deadlock denotes to the condition when simultaneous processes are holding resources and putting off each other from finishing their executio

Minimum possibility -minimax algorithm: Finally, we want to put the scores on the top edges in the tree. So there is over again a choice. Whenever, in this case, we have to r

Explain the term - Instruction execution We  know  that  the  fundamental  function  performed  by  a  computer  is  the  execution  of  program. The program that is to be exec

Disadvantages of wireless technology -  Range can be very limited -  Possible interference from nearby electronic devices -  Security issues (i.e. tapping illegally into

Is it possible to pass data to and from include programs explicitly? No.  If it is needed to pass data to and from modules it is needed to use subroutines or function modules.

What happens if we use Leave to list-processing without using Suppress-Dialog? If we don't use Suppress-Dialog to next screen will be viewed but as empty, when the user presse

When signed numbers are used in binary arithmetic, then which one of the notations would have unique representation for zero ? Ans. When signed numbers are utilized in binary ar

Explain Public Switched Telephone Network. PSTN (Public Switched Telephone Network): This is Public Switched Telephone Network (PSTN), which accommodates two types of subscri

What is load-through or early restart? When a read miss happens for a system with cache the needed word may be sent to the processor as soon as it is read from the main memory