Poor technology or system requirements definition, Computer Engineering

Assignment Help:

Poor Technology or System Requirements Definition - Information System

Previously we looked at product design and specifically the importance of requirements capture as part of the design process. This method is equally as important in the implementation of an IS as only by thoroughly defined what the IS should do can we hope to have a system that will meet all our needs using the appropriate technology. Often a lack of understanding of how our processes and organisation works when it is unsupported by an information system makes it difficult to specify exactly what the IS is required for. The usual response is then to buy an off the shelf solution that may be a square peg filling a slightly rectangular hole. Another common mistake is to over-specify resulting in a system that is awash with features that are not required, leading to operator confusion and overwork as these features may get in the way of the real value adding functionality that the IS may have.

Legacy systems and current infrastructure This problem is most easily understood using the everyday example of the rail ways where the rail network infrastructure is so large and well established that any new innovation must be used in conjunction with infrastructure that may be over a century old. It is therefore difficult to introduce a new type of train as it has to interface with a track that maybe a century old meaning that the ability to use new technology is limited at conception. The rapidly changing face of technology especially in the area of information systems and the race to install these that has been taking place over the last 40 years results in many cases (especially in larger organisations) in solutions being chosen for their ability to interface and integrate with an older less able systems as the cost of an 'upgrade' or 'bolt-on' is seen as more palatable than a completely new system. 

Hopefully however more recently with the trend towards standardised hardware and custom software; combined with greater vision being displayed by systems designers in terms of modular approaches; together with forwards and backwards compatibility strategies this problem should reduce.


Related Discussions:- Poor technology or system requirements definition

Name some register output control signals, Name some register output contro...

Name some register output control signals. Pc out , MDR out , Z out , Offset out , R1 out , R2 out , R3 out and TEMP out .

What you mean by organizational effectiveness, Q. What you mean by organiza...

Q. What you mean by organizational effectiveness? Organizational effectiveness is measured in terms of productivity, structural flexibility, Employee involvement and Job satisf

What is page-stealer process, What is Page-Stealer process? This is the...

What is Page-Stealer process? This is the Kernel process that makes rooms for the incoming pages, by swapping the memory pages that are not the part of the working set of a pro

What happens if acknowledge() is called within a transaction, As per the JM...

As per the JMS specification, when you are in a transaction, the acknowledge Mode is ignored. If acknowledge() is known as within a transaction, it is ignored.

Explain time switching, Explain Time Switching. Time Switches: The ...

Explain Time Switching. Time Switches: The principle of a time switch is demonstrated in figure. This connects an incoming n channel PCM highway to an outgoing n channel PC

Intentional hacking helps in maintaining better security, Intentional hacki...

Intentional hacking helps in maintaining better security Several companies employ professionals as security specialists whose basic job is to detect and cover loopholes in t

Estimate the circuit switched network, a) Total available bandwidth = 1 Mbp...

a) Total available bandwidth = 1 Mbps = 1000 Kbps Each user requires send data at the rate of = 500 kbps As it is circuit switched network we have to dedicate the bandwidth So the

Genetic algorithms - artificial intelligence, Genetic Algorithms: In s...

Genetic Algorithms: In such a scenario the evolutionary approach to "Artificial Intelligence" is one of the neatest ideas of all. Whether we have tried to mimic the functionin

What is sensitivity list, What is sensitivity list? A list of signals w...

What is sensitivity list? A list of signals which trigger execution of the block when they change value. Sensitivity list  indicates that when a change occurs to any one of

Target - data phase, Target abort -computer architecture: Usually, a t...

Target abort -computer architecture: Usually, a target holds DEVSEL# asserted through the final data phase. However, if a target desserts DEVSEL# before disconnecting without

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd