History of information technology and organisations, Computer Engineering

Assignment Help:

History of Information Technology and Organisations

The increasing sophistication in information systems and the growth in their use have been influenced by three main factors:

  • Increasing and relentless pressures on organisations to perform.
  • The rate of change in enabling technology.
  • The increasing complexity of products and services that require increasing amounts of information to support their production and delivery.

 

The diagram overleaf illustrates how IS has invaded the operations of the business across the last 40 years.

Stage 1 signifies a simple system that has been implemented discretely to aid the operation of one particular function - this may be a stock control system that is used within a store or a simple spreadsheet system used in the finance department. This type of system typically began to appear during the late 1960s and early 1970s.

Stage 2 shows the proliferation of these discrete systems throughout the organisation and characterises the trends during the late 1970's and early 1980's, therefore the stock control system maybe accompanied by a cost control system within the finance department and a configuration control system within the engineering department. The key point is that each system will still be operating in isolation from the others and, due to crude Human Machine Interface (HMI) these systems may have been difficult to use requiring special skills and training.

Stage 3 illustrates the changes since the 1980's with the linking of these discrete systems to become an integrated whole where the stock control system, the finance system and the configuration control system maybe integrated with a procurement system to make an Material Resource Planning (MRP) system using a common database and communication interfaces. This stage usually signifies the point at which the organisation becomes dependant on the IS as most of the important information and many of the critical functions are now carried out 'to the beat of the system'. It is also important to note that from a historical point of view often the IS was overlaid upon the previous manual systems in piecemeal way. This means that this period was often characterised by integrated, but sub-optimal and difficult to operate systems.

117_History of Information Technology and Organisations.png

Stage 4 however signifies that more recently as technology has become more sophisticated both in processing power and more importantly in Human Machine Interface (HMI) it has been possible to re-engineer business processes to be built around the information system in the first instance leading to a more streamlined process rather than a manual process with the IS working as a bolt-on. The nature of the HMI and the rise in 'windows' based systems also allows easier use so making for a business that truly works with the system. This is illustrated by the rise in Enterprise Resource Planning (ERP) systems that control all aspects of the business including provision of human resources, and planning of future business.

Stage 5 indicates that the rise in communications technology enablers now allows business systems to span whole markets and link businesses up and down supply chains. An example could by the electronic transfer of design data using common file formats to enable joint product development programs between partner companies.

More recently the Internet has become a major force in inter-company collaboration and communication. While this diagram indicates an evolution across time beginning at Stage 1 with systems that are limited in scope, simple in operation and stand-alone, to Stage 5 with systems that encompass entire organisations or markets, are complex in operation and fully integrated, it is important to note that all organisations must decide, depending upon their particular business needs and resources, what type of IS they should implement. Although this diagram shows a progression with Stage 5 as the pinnacle, a system of this sophistication may not be the most useful or practical for every organisation even in the 21st century.


Related Discussions:- History of information technology and organisations

Uniform memory access model (uma), Uniform Memory Access Model (UMA) In...

Uniform Memory Access Model (UMA) In this model, the main memory is uniformly shared by all processors in multiprocessor systems and each processor has equal access time to sha

How to use an assembler, Q. How to use an Assembler? Symbolic instructi...

Q. How to use an Assembler? Symbolic instructions which we code in assembly language is called as- Source program. An assembler program translates source program in machine

Illustrate why does a tea kettle sing, Q. Illustrate why does a tea kettle ...

Q. Illustrate why does a tea kettle sing? Answer:- There is a little attachment with a hole in it which acts as a whistle. It is inserted into the spout of the kettle as w

Segment combinations, Segment Combinations In 8086 assembler provides a...

Segment Combinations In 8086 assembler provides a means for combining segments declared in various modules. Some typical combine types are: 1.   PUBLIC: This combine directi

Describe big notation, Q. Describe Big Notation? Big O Notation : The ...

Q. Describe Big Notation? Big O Notation : The set O (g(n)) comprises all functions f(n) for that there exists   positive constants c such that for satisfactorily large values

Characteristics of input- output channels, Q. Characteristics of input- out...

Q. Characteristics of input- output channels? The I/O channel represents an extension of DMA concept. An I/O channel has ability to execute I/O instructions that gives complete

State in brief about virtual memory, What is Virtual memory The term v...

What is Virtual memory The term virtual memory signifies something that appears to be present though actually it is not. Virtual memory technique enables users to use more mem

Fingerprint- biometric computer security systems, Fingerprint- Biometric co...

Fingerprint- Biometric computer security systems First of all, fingerprint is the most commonly used biometric technology, because every person has unique fingerprints and the

C, Write a ‘C’ functions to arrange the elements of an integer array in suc...

Write a ‘C’ functions to arrange the elements of an integer array in such a way that all the negative elements are before the positive elements. The array is passed to it as an arg

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd