Data mining has an important place in today’s world. It becomes an important research area as there is a huge amount of data available in most of the applications. This huge amount of data must be processed in order to extract useful information and knowledge, since they are not explicit. Data Mining is the process of discovering interesting knowledge from large amount of data. The kinds of patterns that can be discovered depend upon the data mining tasks employed. By and large, there are two types of data mining tasks: descriptive data mining tasks that describe the general properties of the existing data, and predictive data mining tasks that attempt to do predictions based on inference on available data. The data mining functionalities and the variety of knowledge they discover are briefly presented in the following list: Characterization: It is the summarization of general features of objects in a target Continue reading
Information Systems Management
Evolution of Management Information System
There have been a lot of changes in the way in which information processing has come up. This change in information processing system can be seen from the point of view of the enabling technologies as well as the increasing demands of the information processing capabilities of organizations. In the past, small organizations were owned and operated by one man. The owner was both president and chief-executive who single handedly undertook all the functions required to operate the organization, including accounting, inventory control, public relations, research and so on. The owner personally gathered information necessary to carry out various functions, either using it as it was gathered or storing the information in his memory for later retrieval. Once a decision is made, the owner undertook the necessary action himself. For a small organization, the owner-oriented information system was often very efficient. For the owner himself, a highly integrated information system Continue reading
Virtual Private Network (VPN) Tunneling Protocols
Virtual Private Network (VPN) create secure connections, called tunnels, through public shared communication infrastructures such as the Internet. These tunnels are not physical entities, but logical constructs, created using encryption, security standards, and protocols. The VPN tunneling protocols are set of standardized rules and policy that are employed on the transmitted data. There are various standard of protocol technologies used to create a VPN tunnel and each of these protocols is specially built with some unique security features. The most widely used Virtual Private Network (VPN) Tunneling Protocols are discussed below. Internet Protocol Security (IPSec) The Internet Protocol Security (IPSec) has proposed in Internet Engineering Task Force (IETF) Request for Comment (RFC) database in RFC (2401), provides data packet integrity, confidentiality and authentication over IP networks. The IPSec policy consists of sets of rules that designate the traffic to be protected, the type of protection, such as authentication or confidentiality, Continue reading
Components of Voice Over Internet Protocol (VoIP)
VoIP stands for Voice over Internet Protocol. It is a technology that lets you make telephone calls over the Internet, rather than a regular phone line. Which is almost always cheaper. VoIP works by using a network technology known as Packet Switching Network whereas landline telephones use the Circuit Switching Network. This is referred to as the Public Switched Telephone Network. The main difference between Packet Switching and Circuit Switching is that Packet Switching uses (data) or Packets and sends them over the Internet while Circuit Switching is accomplished by using electrical circuits to make a telephone connection. Circuit Switching is like the old Switchboard operators, frantically trying to connect the right caller with the receiver. Packet Switching is used to transfer data all across the Internet including E-mail. Packet Switching converts audio formats into data packets and transmits them over the Internet, then reassembles them on the other person’s Continue reading
What is an Enterprise Database?
Data are the raw material from which information is produced. Therefore, it is not surprising that in today’s information-driven environment, data are a valuable asset that requires careful management. To access data’s monetary value, data that stored in company database are data about customers, suppliers, inventory, and operations and so on. Imagine that all the data in the database loss. What will happen if the situation like that happen? Data loss puts any company in a difficult position. The company might be unable to handle daily operation effectively; it might be faced with the loss of customers who require quick and efficient service, and it might lose the opportunity to gain new customers. Data are a valuable resource that can translate into information. If the information is accurate and timely, it is likely to trigger action that enhance the company’s competitive position and generate wealth. In effect, an organization is Continue reading
Enterprise-Wide Computing – Meaning, Importance and Issues
Current breakthroughs in information technology have enabled the worldwide usage of distributed computing systems, leading to decentralize management of information. This has been supported by and has become inflamed great competition in business through faster and more precise data storage and retrieval and information processing. A number of organizations have accomplished high efficiency, comprising ease of use and lesser costs in operations by adopting a client/server computing structure. Furthermore, system integration and interoperability issues are being intensified as institutions and organizations are moving from mainframe based processes towards an open, distributed computing environment, and this situation is pressing corporations into an accelerated construction of extensive distributed systems for operational use. Technological transformations are at this point is happening and accelerating very fast that it may increase the computational power just same as the creation of desktop and personal computers did. Soon a lot of demanding computer applications will no longer Continue reading