Poor technology or system requirements definition, Computer Engineering

Assignment Help:

Poor Technology or System Requirements Definition - Information System

Previously we looked at product design and specifically the importance of requirements capture as part of the design process. This method is equally as important in the implementation of an IS as only by thoroughly defined what the IS should do can we hope to have a system that will meet all our needs using the appropriate technology. Often a lack of understanding of how our processes and organisation works when it is unsupported by an information system makes it difficult to specify exactly what the IS is required for. The usual response is then to buy an off the shelf solution that may be a square peg filling a slightly rectangular hole. Another common mistake is to over-specify resulting in a system that is awash with features that are not required, leading to operator confusion and overwork as these features may get in the way of the real value adding functionality that the IS may have.

Legacy systems and current infrastructure This problem is most easily understood using the everyday example of the rail ways where the rail network infrastructure is so large and well established that any new innovation must be used in conjunction with infrastructure that may be over a century old. It is therefore difficult to introduce a new type of train as it has to interface with a track that maybe a century old meaning that the ability to use new technology is limited at conception. The rapidly changing face of technology especially in the area of information systems and the race to install these that has been taking place over the last 40 years results in many cases (especially in larger organisations) in solutions being chosen for their ability to interface and integrate with an older less able systems as the cost of an 'upgrade' or 'bolt-on' is seen as more palatable than a completely new system. 

Hopefully however more recently with the trend towards standardised hardware and custom software; combined with greater vision being displayed by systems designers in terms of modular approaches; together with forwards and backwards compatibility strategies this problem should reduce.


Related Discussions:- Poor technology or system requirements definition

Explain asymmetric cryptographyand its components, Explain Asymmetric crypt...

Explain Asymmetric cryptographyand its components. Asymmetric or public-key cryptography be different from conventional cryptography in which key material is bound to a single

Explain macro definition and call, Explain Macro definition and call. ...

Explain Macro definition and call. Macro: The assembly language programming frequently finds this necessary to repeat certain piece of code several times during the course of

Quick sort exhibit its worst-case behaviour, In which input data does the a...

In which input data does the algorithm quick sort exhibit its worst-case Behaviour? The Quick Sort method exhibits its worst-case behavior when the input data is " Already Comp

What are the different layers of tcp/ip protocol stack, What are the differ...

What are the different layers of TCP/IP protocol stack? Layers in the TCP/IP protocol architecture are:- o  Application Layer o   Host-to-Host Transport Layer,  o  Net

C++, Write a program to find the area under the curve y = f(x) between x = ...

Write a program to find the area under the curve y = f(x) between x = a and x = b, integrate y = f(x) between the limits of a and b. The area under a curve between two points can b

State some criterias and their effects on a database, It is possible to ent...

It is possible to enter one or more criteria in the rows which can influence your database significantly. >="Callahan" this returns all the several records from Callahan to the

Define b2b - business to business, B2B - Business to Business  It is a...

B2B - Business to Business  It is a mode of conducting business among two or more companies over the Internet, rather than more traditional modes like as telephone, mail, and f

What is the motivation for cell design, Question: a) Evary cell in a ce...

Question: a) Evary cell in a cellular network is assigned a band of frequencies. The allocated frequencies are divided into two types of channels. Indentify and describe each t

Era of first generation computers, Q. Era of first generation computers? ...

Q. Era of first generation computers? The trends that were encountered at the time of the era of first generation computers were: Centralized control in a single CPU (al

What is the use of system.xml.xlinq.dll, System.XML.XLinq.dll has classes t...

System.XML.XLinq.dll has classes to provide functionality to use LINQ with XML.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd