Major Perspectives of Information Organization

People understand information organization from four main perspectives, viz. data, relationship, operating system, and application architecture. The data perspective of information organization In the data perspective, people consider the organization of data in terms of their descriptive and graphical elements. Therefore, the two elements possess distinctive features necessitating different storage requirements as well as storage options. A person thus needs to understand the correct sequence in which entities occur and build up until they eventually form a data file. A data item that falls under descriptive data is one of the most basic elements in the organization of information. It is the smallest unit of storage in a database and it goes by the term ‘stored field’ in the database terminology. It may appear in the form of a number, date, an expression, or character string. A group of related data items forms a record and often appears in the Continue reading

New Trends In E-Business

E-business changed the way business was being done over the years. It created more and more avenues and opportunities. E-business changed the competitive platform. While the old competitive barriers are diminishing it created new entry and competitive barriers. The hard competitive barriers are becoming weak while the soft competitive barriers became more and more prominent. It is believed that not even 50% of the potential of e-business is to be unleashed yet. This definitely indicates that e-business has lot more to offer. E-business has appealed the businesses and customers from all segments. E-business increased the connectivity among different businesses. The integration among departments, different businesses, and different sectors through e-business made it possible to offer variety of services to customers. The new technologies, high speed internet made the transactions possible. Improved integration and interoperability needs of next generation e-business systems are met by new e-business solution architectures. New technologies of Continue reading

Evolution of Management Information System

There have been a lot of changes in the way in which information processing has come up. This change in information processing system can be seen from the point of view of the enabling technologies as well as the increasing demands of the information processing capabilities of organizations. In the past, small organizations were owned and operated by one man. The owner was both president and chief-executive who single handedly undertook all the functions required to operate the organization, including accounting, inventory control, public relations, research and so on. The owner personally gathered information necessary to carry out various functions, either using it as it was gathered or storing the information in his memory for later retrieval. Once a decision is made, the owner undertook the necessary action himself. For a small organization, the owner-oriented information system was often very efficient. For the owner himself, a highly integrated information system Continue reading

Virtual Private Network (VPN) Tunneling Protocols

Virtual Private Network (VPN) create secure connections, called tunnels, through public shared communication infrastructures such as the Internet. These tunnels are not physical entities, but logical constructs, created using encryption, security standards, and protocols. The VPN tunneling protocols are set of standardized rules and policy that are employed on the transmitted data. There are various standard of protocol technologies used to create a VPN tunnel and each of these protocols is specially built with some unique security features. The most widely used  Virtual Private Network (VPN) Tunneling Protocols are discussed below. Internet Protocol Security (IPSec) The Internet Protocol Security (IPSec) has proposed in Internet Engineering Task Force (IETF) Request for Comment (RFC) database in RFC (2401), provides data packet integrity, confidentiality and authentication over IP networks. The IPSec policy consists of sets of rules that designate the traffic to be protected, the type of protection, such as authentication or confidentiality, Continue reading

ERP Software Cost

Enterprise Resource Planning (ERP) packages are very expensive. Let us be clear. If you have already have some system or not, once you decide to go for ERP, you need to plan well. The entire project cost is not the only the ERP Software cost. It includes hardware, software, implementation, consultation charges, sensitizing employees to ERP and training them. Hence, if you come across some one indicating only the ERP software cost, do not get carried away. Every ERP implementation needs careful planning. Once the Enterprise identifies a few specific ERP software, ERP companies or their consultants may be asked to give you some presentation as to why should their ERP software be bought. Do not expect to get the total ERP implementation costs including ERP software cost in this presentation stage. You need to technically evaluate all the suitable ERP software packages. If you have internal expertise or a Continue reading

Enterprise-Wide Computing – Meaning, Importance and Issues

Current breakthroughs in information technology have enabled the worldwide usage of distributed computing systems, leading to decentralize management of information. This has been supported by and has become inflamed great competition in business through faster and more precise data storage and retrieval and information processing. A number of organizations have accomplished high efficiency, comprising ease of use and lesser costs in operations by adopting a client/server computing structure. Furthermore, system integration and interoperability issues are being intensified as institutions and organizations are moving from mainframe based processes towards an open, distributed computing environment, and this situation is pressing corporations into an accelerated construction of extensive distributed systems for operational use. Technological transformations are at this point is happening and accelerating very fast that it may increase the computational power just same as the creation of desktop and personal computers did. Soon a lot of demanding computer applications will no longer Continue reading