Вы находитесь на странице: 1из 11

Management Information System Assignment: 1 Business Analysis Capability Cluster: Business analysis includes the business consulting activities

s associated with the initial customer engagement. This is typically used to define the business problem, identify the business process improvement, initiatives and asses the readiness of the enterprise to undertake change. It involves the preparation of a business care to undertake change proposal including an indication of cost, anticipated return of investment and other associated business benefits Business Case Support: Consulting support to enable the deviation and presentation of comprehensive and definable business cases. Investment Appraisal: Analysing and modelling to asses the commercial and operational viability operations of investment options. Change Readiness Management: Assessment of an organisations requirements and ability to change contributing to the derivation and implementations of changing programmes. Market Analysis: Formal analysis in markets to understand emerging technologies, system, methodologies, policies and competitors behaviour towards contributing to business strategy formulation. Business Process Optimisation: Analysis and alignment of business process to eliminate waste and improve integrity.

Organisation and Governance Models: Evaluation of organisational structures governance models to deliver business performance. Contracting Strategies: Assessment of efficiency of a candidate contracting strategies to fulfil business objectives. Assignment: 2 Transaction Processing System: Transaction processing systems were the exclusive domain of mainframe computers. Typical examples of such systems would be Airline Reservation System, Banking System, Accounting System etc of almost any large company. Because of this transaction processing systems are mostly unknown to the world of personal computers. Problems of TPS: The need to handle 100s, even 1000s of simultaneous users. The need to allow many years to work on the same set of data with immediate updating. The need to handle users in a safe and consistent manner. Normal time sharing systems are usually incapable of handling these problems because of the great number of users. Spawning a unique process for each user having his own copy of all the data simply creates too much overhead for the operating system. and

The world wide web easily reaches large number of simultaneous users. Consequently web servers internally work very similar to traditional transaction processing system, with the exception that they lack database access and state information pertaining to the individual users. Transaction system handle across in a safe and consistent manner, but there are certain errors that cannot b avoided e.g. network errors or database deadlocks. So a way must exist to handle them when they occur. It is not possible to abort a current process. A transaction must be atomic either all modifications are done or none of them. Transaction systems are designed to guarantee that transactions are atomic. A major hurdle to overcome by programmers of transaction processing systems is to write applicable programmes that meet these objectives. Programmes have to do a great deal of error handling to make transactions truly safe. Decision Support System: DSS are a specific class of computerised information system that supports business and organisational decision making activities. A properly designed DSS is an interactive software based system intended to help decision makers compile useful information from raw data, documents, personal knowledge and for business models to identify and solve problem and make decisions. Typical information that a DSS application might gather and present would be; o Assessing all of your current information assets including legacy and relational data sources, cubes, data warehouses and data marts.

o Comparative scale figures between one week and the next. o Projected revenue figures based on new product sales assumptions. o The consequences of different decision alternatives, given past experience in a content that is described. Information builders web focus reporting system is ideally suited for building DSS due to its wide reach of data, interactive facilities, ad hoc reporting capabilities, quick development times and simple web based deployment. The best supporting systems include high level summary reports or charts and allow the user to drill down for more detailed information. CAM Computer Aided Manufacturing: CAM is the use of computer based software tool that assist engineers and mechanists in manufacturing and prototype product components. CAM is a programming tool that allows you to make 3D models using computer aided design CAD. CAM was used first in 1971 for car body design and tooling. CAM Overview: Traditionally, CAM has been considered as an NC programming tool wherein 3D models of computer components generated in CAD software are used to generate CNC code to drive numerical controlled machine tools. Although this remains the most common CAM function, CAM functions have expanded to integrate CAM more with CAD/CAM/CAE/PLM solution. As with other computer aided technologies CAM does not eliminate the need for the skilled professional such as manufacturing engineers and NC programmers.

CAM in fact leverages the value of the most skilled manufacturing. Early Use of CAM: The first commercial applications of CAM wherein large companies in the automotive and aerospace industries e.g. UNISURF in 1971 at Renault for car body design and tooling. Typical Areas of Concern: High speed machining including stream lining of tool paths a) Multi function machining b) To axis machining c) Ease of use

Machining Process: Most of the machining progresses through four stages where each implemented by a variety of basic and sophisticated strategies, depending on the material and the software available. The Stages: 1) Roughing 2) Self Finishing 3) Finishing 4) Counter Milling CAD: CAD is one of the many tools used by engineers and designers also its used in many ways depending on the profession of the user and the type of software in question. Each different type of CAD system requires the

operator to think differently about how he will use them and design their virtual components in different manner. There are many producers of the lower end 2D systems including a number of free and open source programs. They provide an approach to the drawing process without all the fuss over scale and these can be adjusted as required during the creation of final chart. 3D wire frame is basically an extension of 2D chatting. Each line has to be manually inserted into the drawing. 3D dumb solids (programmes incorporating this include AUTO CAD and code key - 19) are created in a similar fashion to the way you would create the real world object. Each object and feature after creation is what it is. If the operation wants to change it he must add material to it, subtract material from it or delete the object or feature or start over. The Efforts of CAD: Starting in late 1980s the development of readily affordable CAD programmes that could run on even the personal computers which began a trend of massive downsizing in drafting departments in many small mid size companies. As a general rule, one CAD operator could readily replace at least 3 or 5 drafts using traditional methods. The adoption of CAD studio or paper less studio as it is sometimes called in architectural schools which were not without resistance. However, teachers were worried that sketching on a computer screen did not replicate the skills associated with age old practice of sketching in a sketch book. Expert System: An expert system is also known as knowledge based system and also a computer program that contains the knowledge and analytical skills of one or more human experts, related to a specific subject. This class of program was first developed by researchers in artificial

intelligence during 1960s and in 1970s and applied commercially throughout the 1980s. Expert system are designed and created to facilitate tasks in the fields of accounting, medicine process control, financial service, production, HR etc. A good example of application of expert system is in banking area for mortgaging. Loan departments are interested in expert system for mortgages because of the growing cost of labour which makes the handling and acceptance of relatively small loans which are less profitable. A good demonstration of the limitations of an expert system is been used by many people is the Microsoft windows operating system troubleshooting software located in the help section available in the task bar. Another 1970s and 80s application of expert system which we today simply call A1 was in computer games. For e.g. the computer baseball games, ear weaver baseball and tony la russa baseball. Each had highly detailed simulations of the game strategies of these two baseball managers. Advantages: Provides consistent answers for repetitive decisions, processes and task holds, maintains significant levels of information. Encourages organisations to clarify the logic of their decision making. Never forgets to ask a question as a human right. Disadvantages: Lacks common sense needed in some decision making. Cannot make creative responses as human expert would do in unusual circumstances. Domain experts will not be always able to explain their logic reasoning errors may occur in the base of knowledge and lead to wrong decisions. Cannot adapt to changing environment unless knowledge base is changed.

IBM: IBM International Business Machines Corporation which was nicknamed by Big Blue is a multi national computer technology and consulting corporation head quartered in Armonk NYC, USA. This company is one of the few information technology companies with a continuous history dating back to the 19th century. IBM manufactures and sells computer hardware, software and offers infrastructure services, consulting service areas ranging from mainframe computers to nanotechnology. IBM has been known through most of its recent history as the worlds largest computer company with over 35,000 employees world wide. IBM is the largest information technology employer in the world. IBM holds more partners than any other U.S based Technology Company. It has engineers and consultants in over 170 countries and IBM research has 8 laboratories world wide. IBM employee hold 3 noble prizes, 4 turning awards, 5 national medals of science. As a chip maker IBM is among the world wide top 20 semi conductor sales leader. Control: Control is used in a variety of contents to express mastery or proficiency e.g. music students attending a master class are expected to have full control of basic skills such a rhythm and pitch.

Virus: The term virus is often used in reference to any type of meticulous programme or it is used to describe any

negative event that a meticulous program causes to a host system. Computer virus can be further classified by the type of objectives they in fact, the method used to select a potential host and infection technique. File viruses infect application - .com and .exe files. Word macro and excel macro viruses infect Microsoft word DOC and XLS fields respectively. Crime: Crime - ware is still in its fancy with regard to the evolution of mal ware and it does not have an official definition. However, as its name implies crime ware is the malicious software used to initiate the crime is that typically internet based. During the past 2yrs, crime ware attacks have increased at a far greater rate than the normal virus. International gangs of virus writers, hackers and spammers are joining forces to steal information. Software Providers Today: The largest CAM software companies are UGS corp. and DASSULT systems of both over 10% of the market. PTC, HITACHI ZOSEN and DELCAM have over 5%each, while, PLANT EDGECAM, TEBIS, TOPSOLID, CNC (master CAM) SOLID CAM, DP Technologys ESPIRIT, CNC and SESCOI between 2.5% and 5% each. The remaining 35% is accounted by NICHER SUPLIERS like BOB CAD, GIBBS CAM and SURF CAM. Area of Usage: 1) In mechanical engineering 2) In machining 3) In electronic design automation CAM tools prepare printed circuit design data for manufacturing.

Hacker: The term hacker used to carry with it in some what honourable distinction. A hacker is a person who has the inmate ability to use or exploit an object which is in existing stage and it is to be used for something other than its original purpose. Technically a person who commits a crime by the way of hacking into another computer is a criminal hacker or cracker. Hacking a computer is the act of exploiting vulnerable operating system functions, applications and peripherals to gain unsolicited access to a computer or a network. The PHISHER assumption is that people will open the e-mail, read it and believe it contents. They hope that the reader will click on the provided link because it looks official and directed to a site that looks exactly like the real thing e.g. pay Paul, etc. In reality, the user has been directed to the site and hes about to enter confidential account information that will be recorded and sent back to the attacker.

Вам также может понравиться