Poor technology or system requirements definition, Computer Engineering

Assignment Help:

Poor Technology or System Requirements Definition - Information System

Previously we looked at product design and specifically the importance of requirements capture as part of the design process. This method is equally as important in the implementation of an IS as only by thoroughly defined what the IS should do can we hope to have a system that will meet all our needs using the appropriate technology. Often a lack of understanding of how our processes and organisation works when it is unsupported by an information system makes it difficult to specify exactly what the IS is required for. The usual response is then to buy an off the shelf solution that may be a square peg filling a slightly rectangular hole. Another common mistake is to over-specify resulting in a system that is awash with features that are not required, leading to operator confusion and overwork as these features may get in the way of the real value adding functionality that the IS may have.

Legacy systems and current infrastructure This problem is most easily understood using the everyday example of the rail ways where the rail network infrastructure is so large and well established that any new innovation must be used in conjunction with infrastructure that may be over a century old. It is therefore difficult to introduce a new type of train as it has to interface with a track that maybe a century old meaning that the ability to use new technology is limited at conception. The rapidly changing face of technology especially in the area of information systems and the race to install these that has been taking place over the last 40 years results in many cases (especially in larger organisations) in solutions being chosen for their ability to interface and integrate with an older less able systems as the cost of an 'upgrade' or 'bolt-on' is seen as more palatable than a completely new system. 

Hopefully however more recently with the trend towards standardised hardware and custom software; combined with greater vision being displayed by systems designers in terms of modular approaches; together with forwards and backwards compatibility strategies this problem should reduce.


Related Discussions:- Poor technology or system requirements definition

Conversion of base 10 to base 22 numerical system?, Hypothesis ... since th...

Hypothesis ... since the Hebrew language is a Numerical language meaning that each letter in their alphabet has a numerical value. I believe, that the Hebrew-language based on a r

Explain sr latch with nand gate, Explain SR Latch with NAND Gate? SR La...

Explain SR Latch with NAND Gate? SR Latch has two useful states: Set state, when output Q=1 and Q'=0. Reset state, when output Q=0 and Q'=1.Output Qand Q' are normally

DoDAF OV-2 for a green datacenter, How do I create a DoDAF OV-2 for the con...

How do I create a DoDAF OV-2 for the construction of a green data center?

What is the difference among thread and process, Thread is a least unit of ...

Thread is a least unit of process. In process have one or more thread.

Describe the functionality of software testing, What do you do if you have ...

What do you do if you have given functionality that wasn't listed in the requirements? - If the functionality isn't essential to the purpose of the application, it should be re

Define terms setup time and hold time violation, Define setup time and hold...

Define setup time and hold time, what will occur when there is setup time and hold tine violation, how to overcome it? For Synchronous flip-flops, we have particular requiremen

Define a formal system, Q. Define a Formal System? A Formal System is o...

Q. Define a Formal System? A Formal System is one which is planned in advance and is used according to schedule. In this system procedures and policies are documented well in a

Conversion of data types done between abap/4 & db layer, How is conversion ...

How is conversion of data types done between ABAP/4 & DB layer? Conversion among ABAP/4 data types and the database layer is complete within the database interface

Security protocols used for e-commerce applications, Explain dissimilar sec...

Explain dissimilar security protocols used for e-commerce applications.   The e-commerce systems of today are composed of a number of components including: a commerce server, d

Exit command, Your shell must accept the exit command. This command will ...

Your shell must accept the exit command. This command will be in the form: e x i t When you encounter this command, your shell should terminate. Please note that when you

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd