A Short History of the Blockchain Technology When an unknown scientist under the pseudonym Satoshi Nakamoto published his white paper about Bitcoin – a “purely peer-to-peer version of electronic cash”– in 2008, it was not the cryptocurrency itself but its underlying mechanism, known today as the blockchain, that was considered revolutionary. But overall awareness of the blockchain technology remained rather limited, as Bitcoin itself was not yet widely known. Starting in the year 2012, increasing activity surrounding Bitcoin could be observed, as the cryptocurrency’s market capitalization grew and start-ups in the field of payments and coin wallets started to emerge. But still, Bitcoin and the underlying blockchain remained subject to a general scepticism, being associated mainly with the financing of rather sketchy online activities and other misconceptions. Nonetheless, by the year 2014, over 80 uses of blockchains had been reported. Slowly, the initial scepticism gave way to the increasing efforts of Continue reading
Modern Information Systems
Case Study of Cisco: Transformation of Entire Supply Chain into an Extended Enterprise System
Cisco Systems of San Jose, California, is a company that develops networking devices such as switches, routers, network management software, and dial- up access servers. By the mid 1990s, realizing that growth depended on our ability to scale manufacturing, distribution and other supply chain processes quickly, Cisco managers decided to reinvent its business model and turn itself into a Web-enabled company. An ‘ecosystem’ which in fact transformed the entire supply chain into an extended enterprise system based on internet technology was created in order to links customers, prospects, partners, suppliers and employees in a multi-party, multi-location electronic network. E-Business can be defined as all electronically mediated information exchanges, both within an organisation and with external stakeholders supporting the range of business processes. It links internal employees with external customers, suppliers through technology like Internet, intranets, and extranets. E-commerce, conceived as a subset of e-business, can be categorized as buy-side e-commerce Continue reading
Data Warehousing – Meaning, Benefits and Implications
What is Data Warehousing? The term data warehouse or data warehousing was first coined by Bill Inmon in the year 1990 which was defined as a “warehouse which is subject-oriented, integrated, time variant and non-volatile collection of data in support of management’s decision making process”. When referring to data warehousing as subject oriented, it simply means that the process is giving information about a particular subject rather than the details regarding the on-going operations of the company. Moreover, when data warehousing was referred to as integrated it means that the data or information which are gathered from a number of sources are then all gathered to synthesize a coherent whole. On the other hand, data warehousing being time variant simply means that the data available were identified on a particular period. Lastly, data warehousing as being non-volatile means that the data is stable and when a new data is added Continue reading
Why Information Security is Needed?
Information Security is very important from day to day life to protect your Information online. Leaning how to protect yourself online can benefit you in many ways by keeping your identity form being stolen or your bank account being compromised. Everyday people are led into scams to take information to use it for their own cause. Also learning Information Security is easy to get into. There are many websites and articles to read on to learn about attacks and what to do in a situation. Also learning about privy on social media can help with noticing scams that hackers use on victims. So, it’s best for someone to take the time and learn about the importance of information security. At the current technology era, information is a critical asset and should thus be protected at all costs. Information security refers to preventing unauthorized access to data in a manner that Continue reading
Barriers To Information And Knowledge Sharing
Information and knowledge sharing has become increasingly relevant in an organization since the transfer from an industrial economy based on a hierarchical control to a global, information-driven financial system and decentralized. Information and knowledge management from human is new and very tangible as well as technological side. The problems associated with sharing information and knowledge is to be briefly informed as one of the basic activities of information and knowledge management. Changes both in community culture and in deployed technological solutions and work procedures are required by the knowledge management. This serves as an essential of interaction between technological and social subsystems which demonstrates the information that searching, storing, manipulation and sharing of enormous volume of information are enabled by IT. Moreover, the conversion of data into information with minimum time and space constraints are enabled. The crucial consequence is the fact that in information and knowledge sharing IT plays Continue reading
Operating System – Meaning, Types and Functions
Operating system is the program, which usually installed into the computer by a boot program. It manages all other programs in computer. Sometimes it also called as “OS”. These programs also called applications. The application uses the operating system by making requests for services through API (Application Program Interface). Sometimes users can directly use the operating system through GUI (Graphical Users Interface) or command language. Operating system is a program that allows you to work with hardware and software on your computer. Basically, there are two ways to use operating system on your computer. The two ways are as follows: 1. for ex., DOS, you type a text commands and computer give respond to you according to your command. This is called command line operating system. 2. With a GUI (Graphical User Interface) operating system (ex., windows). You relate with the computer through graphical user interface with pictures and buttons Continue reading