Showing posts with label MIS. Show all posts
Showing posts with label MIS. Show all posts

Saturday, February 12, 2011

Web Browsers


A Web browser, often just called a "browser," is the program people use to access the World Wide Web. It interprets HTML code including text, images, hypertext links, Javascript, and Java applets. After rendering the HTML code, the browser displays a nicely formatted page

Firefox
Experience the simplistic power of Firefox, one of the original FREE Internet browsers. This web browser packs top–notch features and blazing speed into a tidy, intuitive interface that will help you navigate the web the way you want to. A few outstanding features include tabbed browsing, an integrated search engine and many add–ons of all types. This high-performance browser also has a massive selection of great customization features and tools to help you personalize your Web experience. New to version 3.5 of Firefox is improved speed, a private browsing mode, even more security than in previous versions, open audio and video formats, and a bunch of additional improvements.

Chrome
Google has joined the Internet browser competition full force with a very impressive entry, Chrome. Google Chrome takes a unique approach to browsing the web, combining top notch features with speed, compatibility, and simplicity.Chrome uses complex features but makes them very simple to use. Chrome is an open source project using the WebKit rendering engine. We like what we’ve seen in Chrome so far, and look forward to seeing more innovation and simple usability from the browser in the future.

Internet Explorer
Microsoft's current standard is Internet Explorer 8. This web browser outperforms its ancestors with tighter security, private browsing and a clean look.Internet Explorer 8 features extensive parental controls that can be customized to fit each individual in a family. If you have small children and protection is a priority, look no further, this is the browser for your home computer.

Opera
Though not as popular as some of the other Internet Browsers, we rank Opera highly due to its customization abilities and extensive features. Even with the additional features, we found Opera easy to use. This is a FREE download and you can access the Opera mobile and mini browsers as well. Opera is fast, has many great features, and is extremely customizable. Opera is a great browser as an alternative or addition to Firefox, Google Chrome, and/or Internet Explorer.

Safari
Safari is not an Apple exclusive anymore; the top-notch Internet browser is now available for PCs as well. Safari provides the Mac look and feel in Internet browsing. It is complete with tabbed browsing that includes a save tabs feature.Safari focuses on being lightweight and non-obtrusive rather than customizable. Hence the sleek interface isn't bulky and the frame is only one pixel wide.

Steps to Secure your Computer

Protecting your computer is the best way to ensure all of your personal documents are safe, and there are a variety of online tools that you can use to help you ensure all your information is out of the hands of hackers.
 
  1. Virus software is the number one way to protect your computer. Viruses can cause your computer to crash, which will then cause all of your saved documents, records and photos to be deleted. Make sure you update your antivirus software frequently for the best protection.
  2. Don’t click links in your email, and verify links are safe by typing the link in directly. If you have received an email from your bank telling you to log in, chances are that the link is a phishing site designed to get your login information.
  3. If you are using Windows operating system, make sure you update regularly. You can get automatic updates Microsoft, and have the updates installed anytime that is convenient for you. Make sure that you have updates scheduled to install at regular intervals using the task scheduler or action center.
  4. Scan email attachments with your antivirus, even if they are sent from a friend or family member. Some email providers offer free antivirus scans for all email attachments to ensure they are virus free. The email service automatically scans for viruses, worms and other corruptions before you download any files.
  5. Encrypt sensitive data, such as financial records and personal information so that hackers won’t have easy access to your records and files if your computer is attacked.
  6. Don’t use your computer’s administrative account unless you are performing regularly scheduled maintenance. Since you need to be on the administrative account to make changes to your computer, it is safer to use another account at all times.
  7. Install a firewall, and use it. A firewall closes the channel that is produced when you log onto the internet, ensuring your computer is safe from incoming viral attacks.
  8. Use more efficient programs, such as Firefox web browser. Firefox is updated regularly, and allows for personalized safety and browsing.
  9. Protect against keyloggers with anti-logging software. Keyloggers are programs that create a file for every character you enter on the keyboard, giving hackers access to all of your passwords and information.
  10. Make sure that downloaded programs are free of corruptions before you install them using a scanner, You can email or send programs and files directly to Virus Total to ensure they are clean before you download them.

Systems Approach to Problem Solving

The systems approach to problem solving used a systems orientation to define problems and opportunities and develop solutions. Studying a problem and formulating a solution involve the following interrelated activities:

1. Recognize and define a problem or opportunity using systems thinking.
2. Develop and evaluate alternative system solutions.
3. Select the system solution that best meets your requirements.
4. Design the selected system solution.
5. Implement and evaluate the success of the designed system.


1) Defining problems and opportunities 
Problems and opportunities are identified in the first step of the systems approach. A problem can be defined as a basic condition that is causing undesirable results. An opportunity is a basic condition that presents the potential for desirable results. Symptoms must be separated from problems. Symptoms are merely signals

2) Systems thinking
Systems thinking is to try to find systems, subsystems, and components of systems in any situation your are studying. This viewpoint ensures that important factors and their interrelationships are considered. This is also known as using a systems context, or having a systemic view of a situation. I example, the business organization or business process in which a problem or opportunity arises could be viewed as a system of input, processing, output, feedback, and control components. Then to understand a problem and save it, you would determine if these basic system functions are being properly performed.

3) Developing alternate solutions
There are usually several different ways to solve any problem or pursue any opportunity. Jumping immediately from problem definition to a single solution is not a good idea. It limits your options and robs you of the chance to consider the advantages and disadvantages of several alternatives. You also lose the chance to combine the best points of several alternative solutions. Where do alternative solutions come from/ experience is good source. The solutions that have worked, or at least been considered in the past, should be considered again. Another good source of solutions is the advice of others, including the recommendations of consultants and the suggestions of expert systems. You should also use your intuition and ingenuity to come up with a number of creative solutions. These could include what you think is an ideal solution. The, more realistic alternatives that recognize the limited financial, personnel, and other resources of most organizations could be developed. Also, decision support software packages can be used to develop and manipulate financial, marketing, and other business operations. This simulation process can help you generate a variety of alternative solutions. Finally, don’t forget that “doing nothing” about a problem or opportunity is a legitimate solution, with its own advantages and disadvantages.

4) Evaluating alternate solutions
Once alternative solutions have been developed, they must be evaluated so that the best solution can be identified. The goal of evaluation is to determine how well each alternative solution meets your business and personal requirements. These requirements are key characteristics and capabilities that you feed are necessary for your personal or business success.


5) Selecting the best solution
Once all alternative solutions have been evaluated, you can being the process of selecting the best solution. Alternative solutions can be compared to each other because they have been evaluated using the same criteria.

6) Designing and implementing solution
Once a solution has been selected, it must be designed and implemented. You may have to depend on other business end users technical staff to help you develop design specifications and an implementation plan. Typically, design specifications might describe the detailed characteristics and capabilities of the people, hardware, software, and data resources and information system activities needed by a new system. An implementation plan specifies the resources, activities, and timing needed for proper implementation.

7) Post implementation review
The final step of the systems approach recognizes that an implemented solution can fail to solve the problem for which it was developed. The real world has a way of confounding even the most well-designed solutions. Therefore, the results of implementing a solution should be monitored and evaluated. This is called a postimple- implemented. The focus of this step is to determine if the implemented solution has indeed helped the firm and selected subsystems meet their system objectives. If not, the systems approach assumes you will cycle back to a previous step and make another attempt to find a workable solution.

System Development Life Cycle

The Systems Development Life Cycle (SDLC) is a conceptual model used in project management that describes the stages involved in an information system development project from an initial feasibility study through maintenance of the completed application. Various SDLC methodologies have been developed to guide the processes involved including the waterfall model (the original SDLC method), rapid application development (RAD), joint application development (JAD), the fountain model and the spiral model. Mostly, several models are combined into some sort of hybrid methodology. Documentation is crucial regardless of the type of model chosen or devised for any application, and is usually done in parallel with the development process. Some methods work better for specific types of projects, but in the final analysis, the most important factor for the success of a project may be how closely particular plan was followed.

Feasibility
The feasibility study is used to determine if the project should get the go-ahead. If the project is to proceed, the feasibility study will produce a project plan and budget estimates for the future stages of development.

Requirement Analysis and Design 
Analysis gathers the requirements for the system. This stage includes a detailed study of the business needs of the organization. Options for changing the business process may be considered. Design focuses on high level design like, what programs are needed and how are they going to interact, low-level design (how the individual programs are going to work), interface design (what are the interfaces going to look like) and data design (what data will be required). During these phases, the software's overall structure is defined. Analysis and Design are very crucial in the whole development cycle. Any glitch in the design phase could be very expensive to solve in the later stage of the software development. Much care is taken during this phase. The logical system of the product is developed in this phase.

Implementation
In this phase the designs are translated into code. Computer programs are written using a conventional programming language or an application generator. Programming tools like Compilers, Interpreters, Debuggers are used to generate the code. Different high level programming languages like C, C++, Pascal, Java are used for coding. With respect to the type of application, the right programming language is chosen.

Testing
In this phase the system is tested. Normally programs are written as a series of individual modules, these subject to separate and detailed test. The system is then tested as a whole. The separate modules are brought together and tested as a complete system. The system is tested to ensure that interfaces between modules work (integration testing), the system works on the intended platform and with the expected volume of data (volume testing) and that the system does what the user requires (acceptance/beta testing).

Maintenance
Inevitably the system will need maintenance. Software will definitely undergo change once it is delivered to the customer. There are many reasons for the change. Change could happen because of some unexpected input values into the system. In addition, the changes in the system could directly affect the software operations. The software should be developed to accommodate changes that could happen during the post implementation period.

Wednesday, November 10, 2010

Moral , Ethics, Law

Moral
A lesson to be learned from a story or event. The moral may be left to the hearer, reader or viewer to determine for themselves, or may be explicitly encapsulated in a maxim. As an example of the latter, at the end of story of the Tortoise and the Hare, in which the plodding and determined tortoise wins a race against the much-faster yet extremely arrogant hare, the stated moral is "slow and steady wins the race". However, other morals can often be taken from the story itself; for instance, that "arrogance or overconfidence in one's abilities may lead to failure or the loss of an event, race, or contest". The use of stock characters is a means of conveying the moral of the story by eliminating complexity of personality and so spelling out the issues arising in the interplay between the characters, enables the writer to generate a clear message. With more rounded characters, such as those typically found in Shakespeare's plays, the moral may be more nuanced but no less present, and the writer may point it up in other ways (see, for example, the Prologue to Romeo and Juliet).

Ethics
Ethics are considered the moral standards by which people judge behavior. Ethics are often summed up in what is considered the “golden rule”—do unto others as you would have them do unto you. While this makes sense as a general rule of thumb, it is not entirely useful when looking to define business ethics. In business, there are many different people you have to answer to: customers, shareholders and clients. Determining what to do when an ethical dilemma arises among these different interests can be extremely tricky, and as such business ethics as a field is complex and multi-faceted.

Law
Is a system of rules, usually enforced through a set of institutions.[5] It shapes politics, economics and society in numerous ways and serves as a primary social mediator of relations between people. Contract law regulates everything from buying a bus ticket to trading on derivatives markets. Property law defines rights and obligations related to the transfer and title of personal (often referred to as chattel) and real property. Trust law applies to assets held for investment and financial security, while tort law allows claims for compensation if a person's rights or property are harmed. If the harm is criminalised in a statute, criminal law offers means by which the state can prosecute the perpetrator. Constitutional law provides a framework for the creation of law, the protection of human rights and the election of political representatives. Administrative law is used to review the decisions of government agencies, while international law governs affairs between Sovereign States in activities ranging from trade to environmental regulation or military action. Writing in 350 BC, the Greek philosopher Aristotle declared, "The rule of law is better than the rule of any individual.

Monday, November 1, 2010

Geographic Information Systems (GIS)

Definition. A geographic information system is:
·    A computer software system (with supporting hardware)
·    that manages data pertaining to land, water, and air resources,
·    such that one can store and retrieve such geographic information
·    as well as analyze stored information or additional parameters derived from stored information.

A geographic information system (GIS) integrates hardware, software, and data for capturing, managing, analyzing, and displaying all forms of geographically referenced information.
GIS allows us to view, understand, question, interpret, and visualize data in many ways that reveal relationships, patterns, and trends in the form of maps, globes, reports, and charts.
A GIS helps you answer questions and solve problems by looking at your data in a way that is quickly understood and easily shared.
GIS technology can be integrated into any enterprise information system framework

Implementing GIS
A working GIS integrates five key components: hardware, software, data, people, and policy and procedures

Hardware and Software


Hardware is the computer on which a GIS operates. Today, GIS software runs on a wide range of hardware types, from centralized computer servers to desktop computers used in stand-alone or networked configurations.

GIS software provides the functions and tools needed to store, analyze, and display geographic information. Key software components are :

·    Tools for the input and manipulation of geographic information.
·    A database management system (DBMS)
·    Tools that support geographic query, analysis, and visualization
·    A graphical user interface (GUI) for easy access to tools

The affordability of desktop computers with an increasing computing power and decreasing cost of software has resulted in widespread desktop GIS.

Data

Data is one of the most important and costly component in implementing GIS. Database is the longest living part of any GIS implementation. Building the database takes the longest time, costs the most money, and requires the most effort in terms of planning and management. Implementing GIS requires adequate emphasis on database planning and choosing the right information base for the particular applications of an organisation.

Most GIS applications in a particular area require a common set of spatial data (figure 9.2). However, these data are often possessed by different organizations. Due to the lack of proper data sharing mechanism, different organizations are involved in collecting the same data, thus wasting resources and time. This duplication of effort is also due to insufficient or inappropriate standards in data collection. The major problem in reuse of data is the lack of awareness or willingness to share the data among the organizations. GIS as a technology will only be viable and cost-effective, if data is readily available at affordable cost.

People

GIS technology is of limited value without the people who manage the system and develop plans for applying it to real-world problems. GIS users range from technical specialists who design and maintain the system to those who use it to help them perform their everyday work. GIS constitute truly an interdisciplinary field and require varied backgrounds of expertise, depending upon the applications. It requires input from the computer and information technology experts for the system support and the input from domain specialists for application specific models and analyses.

Policies and Procedures

A successful GIS operates according to a well-designed plan and business rules, which are the models and operating practices unique to each organization. GIS exist in the context of application within an organisation. For example - in the case of municipal GIS applications, it will have different functional requirements compared to GIS for agriculture or land use planning.

Besides the technical components like hardware, software and databases, institutional framework and policies are also important for a functional GIS. The interest and willingness of decision makers in exploiting GIS technology, and the organisational set up for collecting spatial data, analysis procedures, and using the results for planning and implementation form a very important component in a GIS.
Choosing the right GIS for a particular GIS implementation involves matching the GIS needs to the functionality demanded by the types of application of an organisation.

Friday, October 8, 2010

Application Software

Also known as an application, is a computer software designed to help the user to perform singular or multiple related specific tasks. Examples include enterprise software, accounting software, office suites, graphics software, and media players.

Application Software Characteristics

An application thus differs from an operating system (which runs a computer), a utility (which performs maintenance or general-purpose fucntions), and a programming language (with which computer programs are created).

Depending on the activity for which it was designed, an application can manipulate text, numbers, graphics, or a combination of these elements.

In some types of embedded systems, the application software and the operating system software may be indistinguishable to the user, as in the case of software used to control a VCR, DVD player or microwave oven


Examples

Enterprise Software: It deals with the needs of organization processes and data flow. The customer relationship management or the financial processes in an organization are carried out by means of enterprise software.

Information Worker Software: Individual projects within a department and individual needs of creation and management of information are handled by information worker software. Documentation tools, resource management tools and personal management systems fall under the category of this form of application software.

Educational Software: It has the capabilities of running tests and tracking progress. It also has the capabilities of collaborative software. It is often used in teaching and self-learning.

Simulation Software: Used to simulate physical or abstract systems, simulation software finds applications in both, research and entertainment. Flight simulators and scientific simulators find a place in the list of simulation software.

Content Access Software: It is used to access content without editing. The common examples of content access software are web browsers and media players.

Importance of Information Systems

It is surprising facts that there are many more companies still do not use the Internet. It is even more surprising that some of them are still using their twenty-year-old computer information system. Company information
system is a set of interrelated component that collect, process, store, and disseminate information to support companies’ managerial team in decision making, coordinating, controlling, and analyzing.

Upgrading the computer information system is not an option in this technology-driven era; it is a requirement. Companies that use an up-to-date information system to gather, assimilate, and evaluate internal as well as external information are gaining competitive advantage over other firms. Management is quicker to cater to customer’s needs and complaints. With the growth of communication networks, there are almost no barriers between the firm’s management, employees, customers and suppliers. Networked computing systems have made new modes of work possible.

A sophisticated computer information system enables companies to monitor employees, to keep managers and employees informed, to coordinate activities among divisions, or even to sell their products to customers via the internet. Moreover, in the era of information technology like this, information has become valuable organizational asset just like human resources and inventories.

Furthermore, a good information system can facilitate direct communication between firm and suppliers, manufacturers, dealers, and marketers. Together, they can create a value chain as though they were in one organization.
In the meantime, the widespread use of information freeway is inviting unwelcome threats. Today, companies are plagued by hackers; competitors, thieves, spies, hired agents, or even from disgruntled employees. Therefore, firms have taken measures to safeguard their system such as installing complex computer firewalls to detect hackers or purchasing expensive and advance encryption software
.
More and more people are working from their homes nowadays. Information technology has become so sophisticated it allows people to choose to work from home. Teleconferencing and video conferencing enable employees to beam in whenever needed. In addition to that, information technology can allow a firm to reduce costs. Taking Ernst &Young for example, the company has successfully reduced its office space by 2 million square feet by allowing their employees to work from home.

In conclusion, information system enables companies to react, respond, cater, store, retrieve, disseminate, and control their new valuable asset that is information. In the years to come, a good information system within a company will be no longer an option; it will become a compulsory in determining success.

Information Systems

Information Systems (IS) is a professional and academic discipline concerned with the strategic, managerial  and operational activities involved in the gathering, processing, storing, distributing and use of information, and its associated technologies, in society and organizations.
 
Typically, information systems or the more common legacy information systems include people, procedures, data, software, and hardware (by degree) that are used to gather and analyze digital  information. Specifically computer-based information systems are complementary networks of hardware/software that people and organizations use to collect, filter, process, create, & distribute data (computing). A majority of IS programs are located in business schools; however, they may have different names such as management information systems, computer information systems, or business information systems.

History
 
1970's
Mainframe computers were used Computers and data were centralized Systems were tied to a few business functions:  payroll, inventory, billing. Main focus was to automate existing processes

1980's
PCs and LANs are installed. Departments set up own computer systems End-user computing with Word Processors and Spreadsheets makes departments less dependent on the IT department Main focus is automating existing processes.
 
1990's 
Wide Area Networks (WANs) become corporate standardsSenior management looks for system integration and data integration.  No more stand-alone systems.Main focus is central control and corporate learning
 
2000's 
Wide Area Networks expand via the Internet to include global enterprises and business
partners – supply chain and distributionSenior management looks for data sharing across systems.Main focus is efficiencies and speed in inventory, manufacturing, distribution
 
 
Examples of Information Systems
 
Executive Support Systems An Executive Support System ("ESS") is designed to help senior management make strategic decisions. It gathers, analyses and summarises the key internal and external information used in the business.
A good way to think about an ESS is to imagine the senior management team in an aircraft cockpit - with the instrument panel showing them the status of all the key business activities. ESS typically involve lots of data analysis and modelling tools such as "what-if" analysis to help strategic decision-making.
Management Information Systems A management information system ("MIS") is mainly concerned with internal sources of information. MIS usually take data from the transaction processing systems (see below) and summarise it into a series of management reports.
MIS reports tend to be used by middle management and operational supervisors.
Decision-Support Systems Decision-support systems ("DSS") are specifically designed to help management make decisions in situations where there is uncertainty about the possible outcomes of those decisions. DSS comprise tools and techniques to help gather relevant information and analyse the options and alternatives. DSS often involves use of complex spreadsheet and databases to create "what-if" models.
Knowledge Management Systems Knowledge Management Systems ("KMS") exist to help businesses create and share information. These are typically used in a business where employees create new knowledge and expertise - which can then be shared by other people in the organisation to create further commercial opportunities. Good examples include firms of lawyers, accountants and management consultants.
KMS are built around systems which allow efficient categorisation and distribution of knowledge. For example, the knowledge itself might be contained in word processing documents, spreadsheets, PowerPoint presentations. internet pages or whatever. To share the knowledge, a KMS would use group collaboration systems such as an intranet.
Transaction Processing Systems As the name implies, Transaction Processing Systems ("TPS") are designed to process routine transactions efficiently and accurately. A business will have several (sometimes many) TPS; for example:
- Billing systems to send invoices to customers
- Systems to calculate the weekly and monthly payroll and tax payments
- Production and purchasing systems to calculate raw material requirements
- Stock control systems to process all movements into, within and out of the business

Office Automation Systems Office Automation Systems are systems that try to improve the productivity of employees who need to process data and information. Perhaps the best example is the wide range of software systems that exist to improve the productivity of employees working in an office (e.g. Microsoft Office XP) or systems that allow employees to work from home or whilst on the move.