Poor technology or system requirements definition, Computer Engineering

Assignment Help:

Poor Technology or System Requirements Definition - Information System

Previously we looked at product design and specifically the importance of requirements capture as part of the design process. This method is equally as important in the implementation of an IS as only by thoroughly defined what the IS should do can we hope to have a system that will meet all our needs using the appropriate technology. Often a lack of understanding of how our processes and organisation works when it is unsupported by an information system makes it difficult to specify exactly what the IS is required for. The usual response is then to buy an off the shelf solution that may be a square peg filling a slightly rectangular hole. Another common mistake is to over-specify resulting in a system that is awash with features that are not required, leading to operator confusion and overwork as these features may get in the way of the real value adding functionality that the IS may have.

Legacy systems and current infrastructure This problem is most easily understood using the everyday example of the rail ways where the rail network infrastructure is so large and well established that any new innovation must be used in conjunction with infrastructure that may be over a century old. It is therefore difficult to introduce a new type of train as it has to interface with a track that maybe a century old meaning that the ability to use new technology is limited at conception. The rapidly changing face of technology especially in the area of information systems and the race to install these that has been taking place over the last 40 years results in many cases (especially in larger organisations) in solutions being chosen for their ability to interface and integrate with an older less able systems as the cost of an 'upgrade' or 'bolt-on' is seen as more palatable than a completely new system. 

Hopefully however more recently with the trend towards standardised hardware and custom software; combined with greater vision being displayed by systems designers in terms of modular approaches; together with forwards and backwards compatibility strategies this problem should reduce.


Related Discussions:- Poor technology or system requirements definition

Benefit of digital versatile disk read only memory, Q. Benefit of digital v...

Q. Benefit of digital versatile disk read only memory? The main benefit of having CAV is that individual blocks of data can be accessed at semi-random mode. So head can be move

What is hashing, What is Hashing? Hashing: Hashing gives the direct acc...

What is Hashing? Hashing: Hashing gives the direct access of record from the file no matter where the record is in the file. This is possible with the help of a hashing functio

Explain about control memory organization, Q. Explain about Control Memory ...

Q. Explain about Control Memory Organization? One of the simplest ways to organize control memory is to organize micro-instructions for different sub cycles of machine instruct

Delete a user from a category, Execute the following functionality using Ja...

Execute the following functionality using Java & SQL with simple GUI interface: 1.  Insert/delete/update an XML document.  2.  Insert/delete/update a category.  3.  Alloca

Identify the number of control lines for 16 to 1 multiplexer, The number of...

The number of control lines for 16 to 1 multiplexer is ? Ans. We have 16 = 2 4 , 4 Select lines are needed.

What is shadow mask, Q. What is Shadow Mask? Shadow Mask is a metal she...

Q. What is Shadow Mask? Shadow Mask is a metal sheet that has fine perforations (holes) in it and is situated a short distance before phosphor coated screen. The Phosphor dots

What are the entities that swapped out of the main memory, What are the ent...

What are the entities that are swapped out of the main memory while swapping the process out of the main memory? All memory space occupied by the process, process's u-area, and

The constructed datatype of c, The constructed datatype of C is known as ...

The constructed datatype of C is known as Structure is a constructed datatype of C.

How non- textual information is contained in a web page, How non- textual i...

How non- textual information is contained in a web page? Non-textual information as digitized photo and a graphics image is not inserted directly into a HTML document. In place

What is the purpose of guard bits, What is the purpose of guard bits used i...

What is the purpose of guard bits used in floating point operations? The guard bits are the extra bits which are used to retain the in-between steps to enhance the accuracy in

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd