Evolution of Management Information System

There have been a lot of changes in the way in which information processing has come up. This change in information processing system can be seen from the point of view of the enabling technologies as well as the increasing demands of the information processing capabilities of organizations. In the past, small organizations were owned and operated by one man. The owner was both president and chief-executive who single handedly undertook all the functions required to operate the organization, including accounting, inventory control, public relations, research and so on. The owner personally gathered information necessary to carry out various functions, either using it as it was gathered or storing the information in his memory for later retrieval. Once a decision is made, the owner undertook the necessary action himself. For a small organization, the owner-oriented information system was often very efficient. For the owner himself, a highly integrated information system Continue reading

Virtual Private Network (VPN) Tunneling Protocols

Virtual Private Network (VPN) create secure connections, called tunnels, through public shared communication infrastructures such as the Internet. These tunnels are not physical entities, but logical constructs, created using encryption, security standards, and protocols. The VPN tunneling protocols are set of standardized rules and policy that are employed on the transmitted data. There are various standard of protocol technologies used to create a VPN tunnel and each of these protocols is specially built with some unique security features. The most widely used  Virtual Private Network (VPN) Tunneling Protocols are discussed below. Internet Protocol Security (IPSec) The Internet Protocol Security (IPSec) has proposed in Internet Engineering Task Force (IETF) Request for Comment (RFC) database in RFC (2401), provides data packet integrity, confidentiality and authentication over IP networks. The IPSec policy consists of sets of rules that designate the traffic to be protected, the type of protection, such as authentication or confidentiality, Continue reading

ERP Software Cost

Enterprise Resource Planning (ERP) packages are very expensive. Let us be clear. If you have already have some system or not, once you decide to go for ERP, you need to plan well. The entire project cost is not the only the ERP Software cost. It includes hardware, software, implementation, consultation charges, sensitizing employees to ERP and training them. Hence, if you come across some one indicating only the ERP software cost, do not get carried away. Every ERP implementation needs careful planning. Once the Enterprise identifies a few specific ERP software, ERP companies or their consultants may be asked to give you some presentation as to why should their ERP software be bought. Do not expect to get the total ERP implementation costs including ERP software cost in this presentation stage. You need to technically evaluate all the suitable ERP software packages. If you have internal expertise or a Continue reading

Enterprise-Wide Computing – Meaning, Importance and Issues

Current breakthroughs in information technology have enabled the worldwide usage of distributed computing systems, leading to decentralize management of information. This has been supported by and has become inflamed great competition in business through faster and more precise data storage and retrieval and information processing. A number of organizations have accomplished high efficiency, comprising ease of use and lesser costs in operations by adopting a client/server computing structure. Furthermore, system integration and interoperability issues are being intensified as institutions and organizations are moving from mainframe based processes towards an open, distributed computing environment, and this situation is pressing corporations into an accelerated construction of extensive distributed systems for operational use. Technological transformations are at this point is happening and accelerating very fast that it may increase the computational power just same as the creation of desktop and personal computers did. Soon a lot of demanding computer applications will no longer Continue reading

Different Types of Information Systems Used in Different Levels of Management

Information system means by which people and organizations utilize technologies, collect, store use and distribute information. Good information system is used to provide important information for decision making. The information technology may be used for the processing, storing or distribution of data. These technologies collectively include information technology and data. It is an organized combination of people, hardware, software, communications networks, and data resources that stores and retrieves, transform and disseminate information in an organization. Very main functions of information systems is systems analysis and design, that is to say, analyzing a customer’s business condition (or trouble), with deference towards information processing, and designing and implementing an suitable–generally computerized–solution to the difficulty. Information systems professionals who focus in this part are known as systems analysts. The procedure begins with a complete determination of the client’s information needs and business processes. The result normally involves various programming, in addition to the Continue reading

What is Enterprise Architecture (EA)?

The Evolution of Enterprise Architecture (EA) Enterprise Architecture evolution began as an idea in 1980 and was embodied in John Zachman’s early EA framework. Thus, informing the reference to John Zachman, as the father of EA. The evolution of Enterprise architecture was to address the increasing complexity of IT systems and difficulty of delivering business value using those systems. Enterprise architecture is characterized by a framework that supports the alignment of business and IT strategy. It was first defined in 1992 by Zachman and Sowa, resulting in its reference as the Zachman framework. It was then referred to as Information System Architecture but later changed in reference, to enterprise architecture in 1996 when Clinger-Cohen Act of the U.S. government directed all federal agencies to implement a holistic approach to incorporate IT to their business goals. Interest in adopting Enterprise architecture has increased as a result, as both government and private Continue reading