Technology enablers - information system, Computer Engineering

Assignment Help:

Technology Enablers - Information System

The progression described above has been enabled by five main factors:

  • Increases in processing capability allowing smaller and smaller pieces of hardware to perform more and increasingly complex functions 
  • The convergence of computing and communications technologies
  • The development of easy to use human machine interfaces 
  • The emergence of design standards for information systems making it easier for companies to design, procure and install these systems
  • The use of standardised hardware combined with customised software leading to a more capable and cost effective system.

 

The progression detailed and increases in functionality and utility has also led to some changing assumptions about IS. In the early days due to various factors including technological immaturity, poor definition of organisational requirement and operator apprehension and unfamiliarity, IS was initially sub-optimised and therefore received a lot of bad press. However recently this has been changing. Some examples illustrating the nature of this change are illustrated in the table below.

Previous assumption

Is unfamiliar and frightening

Provides masses of unusable data

Is separate from value added steps

Does not play an active role in the business D

Operational processes are designed to compensate for the inadequacies of IS

New assumption

Is user-friendly

Interprets data and produces useable information and knowledge

Is a source of value and may bring competitive advantage

Drives the business

Operational processes are designed around the enablers provided by IS.


Related Discussions:- Technology enablers - information system

Explain the term - ancestors, Explain the term - ancestors The ancestor...

Explain the term - ancestors The ancestors of modern age computer were mechanical and electro-mechanical instruments. This ancestry can be traced as back and seventeenth centur

Explain csmsginterface() function with predefined protocol, Explain CSMsgIn...

Explain CSMsgInterface() Function with Predefined Protocol  A REQUEST structure is created for each message sent to the server. Messages passed to CSMsgInterface() as *dataMSG

Security protocols used for e-commerce applications, Explain dissimilar sec...

Explain dissimilar security protocols used for e-commerce applications.   The e-commerce systems of today are composed of a number of components including: a commerce server, d

Logic-based expert systems - , Logic-based Expert Systems - Artificial inte...

Logic-based Expert Systems - Artificial intelligence: Expert systems are agents which are programmed to make decisions about real world situations. They are put together by uti

4, Ask question 4#Minimum 100 words accepted#

Ask question 4#Minimum 100 words accepted#

Address - operand data types, Q. Address - operand data types? A...

Q. Address - operand data types? Addresses : Operands residing in memory are specified by their memory address while operands residing in registers are specified by a re

What is real time clock, Real time clock A real-time clock keeps the t...

Real time clock A real-time clock keeps the time in real time - i.e. in hours and minutes. Software for the real-time clock comprises an interrupt service procedure which is c

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd