Information storage and retrieval software, Software Engineering

Assignment Help:

INFORMATION STORAGE  AND RETRIEVAL SOFTWARE:

IBM (International Business Machines Corporation) was one of the earliest to invest money to develop software packages intended for Information Storage and Retrieval. The well known package STAIRS (an acronym for Storage and Information Retrieval System) was developed to be used on IBM machines, that too mainframe series. STAIRS was a machine dependent program which was commercially made available for any one who could afford its cost. This package has been used by some organisations to manage bibliographic databases. It was a powerful text-retrieval system which enabled string searching from any part of the record. Following the introduction of STAIRS, similar programs soon became available on mainframes as well as minicomputers. Packages like ISIS, MINISIS came into existence. But most of these packages were hardware dependent, and therefore could not be used on a wider scale due to lack of portability. Hence, need was felt to develop software packages which could be used for library and information storage and retrieval operations on a wider range of computers, especially microcomputer systems. Several attempts were made in this direction by commercial firms and international organisations like UNESCO, resulting in the proliferation of a number of microcomputer oriented software packages. Many of such packages are being commercially marketed, while a few packages like CDS/ISIS are supplied almost free of cost to educational and non-profit making institutions, particularly in India. 

Today, there are a number of microcomputer oriented software packages intended for automating library, routines and information retrieval operations. In recent years, the movement towards integrated modular software, which means that the librarian can spread the cost and effort of implementation without the risk of software incompatibility, has become common. There are packages such as 'Bookshelf' which contain programs for individual operations like acquisitions, cataloguing, serials control, etc. Each of these modules can be purchased separately, if necessary, and one can use the same set of records without the need to re-enter data each time.  


Related Discussions:- Information storage and retrieval software

Explain ad hoc testing, Ad hoc testing is a testing approach. It is the lea...

Ad hoc testing is a testing approach. It is the least formal testing approach.

Decomposed the system into several subsystems, Question: (a) With refe...

Question: (a) With reference to component communication, explain the differences between interface oriented and message oriented communication in terms of communication method

Explain the phased waterfall model, Explain the Phased Waterfall Model ...

Explain the Phased Waterfall Model It is a type of waterfall model where the project is separated into small phases and delivered at intervals by dissimilar teams. Different Te

Data dictionary, give the example of data dictionary

give the example of data dictionary

Design and implementation constraints, The Clue-Less system shall operate w...

The Clue-Less system shall operate with the following Web browsers: Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, and Safari. OE-2: The Clue-Less system shall

What is sei capability maturity model, What is SEI capability maturity mode...

What is SEI capability maturity model? Initial Essentially uncontrolled Repeatable Product management procedures explained and used Defined Proc

List the important properties of a modular system, List the important prope...

List the important properties of a modular system.    Desirable properties are:- Every module is a well defined subsystem useful to others Every module has a well defined single

Explain depth of conditional nesting, Depth of conditional nesting Thi...

Depth of conditional nesting This is a measure of the depth of nesting of if-statements in a program. Deeply nested if statements are hard to understand and are potentially er

What are the common approaches in debugging, What are the common approaches...

What are the common approaches in debugging? Brute force method: The memory dumps and run-time tracks are examined and program with write statements is loaded to obtain clues t

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd