Premium Essay

Web Based Systems

In:

Submitted By langs777
Words 911
Pages 4
INF 630: Systems Analysis

Web-based Systems In an electronic age where paper forms are becoming obsolete and electronic forms are becoming the best method for gathering, maintaining, and storing information; it is time for the regional offices of Langmade Corporation to make the switch. Time is money, and too much time is wasted filling out sales reports, only to be mailed where added delays are incurred. If the company switches to an electronic sales report that can be submitted either online or through email, not only will the organization save money from reduced paper expenses, employee time, or stamps, but the organization will also increase its efficiency. After comparing three web-based systems submitted by candidates, it will be found that the second candidate solution is the most economically feasible for the organization.
Information and Criterion “The return-on-investment (ROI) analysis technique compares the lifetime profitability of alternative solutions or projects” (Whitten & Bentley, 2007, p. 425). While designing a web-based system, the company seeks to choose the candidate solution the solution that will offer the most benefits for the investment that will be made. It is important to note that each solution presented has been time-adjusted over the projected five-year lifetime of each alternative. This is done so the results do not appear more attractive than they actually are (Whitten & Bentley, 2007). The company has set a minimum lifetime ROI of 80 percent. “Few systems are infeasible. Instead, different solution options tend to be more or less feasible than others” (Whitten & Bentley, 2007, p. 417). Since the organization has set a minimum lifetime ROI in which to use as a criteria for selecting a solution, the lifetime ROI must be calculated for each candidate solution. If the organization is making

Similar Documents

Premium Essay

Web Based Operating Systems

...Web Based Operating Systems David Gonzales POS/355 Instructor John Buono June 18th, 2012 WebOS systems are operating systems that are scaled for internet computing (R. MacManus, May 11, 2006). There are many types of Web Operating Systems and the terminology can seem a bit fuzzy from a metacomputing standpoint. But with the growth of the internet so too has the term WebOS become serious in the ranks of computing systems. There have been many attempts to hoard market share on Web Operating Systems like Microsofts Windows 2003 Server Web Edition (Pingdom, 2011). But basically WebOS Servers are common operating systems serving the public over the internet. Most of these are server editions vary among todays popular operating systems like Windows, Linux, MAC, and UNIX. An additional platform is usually common to layer on top of these operating systems and these come in various flavors as well depending on the function of the website. This paper will target the popular server operating systems that are common on the internet today with emphasis on why these systems are popular and some of the features these systems offer as systems suitable for internet servers. Windows Servers Without question Microsoft Windows bases servers are among the most popular servers on the internet today. Need proof? Just look for the .htm extention at the end of the URL and you will find that most websites are easily identifiable as a Windows based server (J. Kyrnin, About.com). Windows...

Words: 1086 - Pages: 5

Premium Essay

Web - Based Information System

...UNIVERSIty OF GHANA BUISINESS SCHOOL Write a Case Study report on the use of web-based information systems by an organization in Ghana UNIVERSIty OF GHANA BUISINESS SCHOOL Write a Case Study report on the use of web-based information systems by an organization in Ghana Index No: 10508454 Table of Contents Background 2 Information Systems 2 Web-based Information Systems 3 Health Information Systems 3 Types of Health Information System 5 Components and Functions of Health Information System 6 Brief Overview of the Health Care System in Ghana 7 Context of Study 8 Vision and Mission 9 Core Objectives 9 Benefits of web – based health information system 9 Barriers to web – based Health Information System 11 References 13 Background For the thriving nature of every business setting, whether for-profit or not-for-profit, but also for long term survival, there is a need for the adoption of proper information dissemination and sharing systems in real time to the benefit of all stakeholders in the organization. In times past, most businesses operated with less or no importance attached to how data and information about their businesses are handled, oblivious of its subsequent consequences to the organization. Currently, in the midst of a swiftly moving landscape in technology, coupled with transient business innovations that seek to maximize both short-term and long-term profits as well as benefits; that means...

Words: 3411 - Pages: 14

Free Essay

Web Based Hotel Management System

...CHAPTER ONE INTRODUCTION 1.1 Background Information A hotel is an establishment that provides lodging paid on a short-term basis. The provision of basic accommodation, in times past, consisting only of a room with a bed, a cupboard, a small table and a washstand has largely been replaced by rooms with modern facilities For the purpose of this work a guest house is (also guesthouse) is a kind of lodging. In some parts of the world a guest house is similar to a hostel, bed and breakfast, or inn whereas in other parts of the world (such as for example the Caribbean), guest houses are a type of inexpensive hotel-like lodging and a hotel is a commercial establishment providing lodging, meals, and other guest services, both of which can be used interchangeably For this Project I would be using The Covenant University Guest House as my case study The Covenant University Guest house has 80 rooms which are divided into three categories; Executive deluxe rooms, mini suits and standard rooms. All rooms have intercoms, internet services and satellite television, it has a standard restaurant serving continental and national dishes,24hours room service, a mini mart, a gymnasium, laundry service with modern dry cleaning equipment, 3 large halls for exhibitions and conferences and a large secure cark park The Covenant University Guest house has 5 departments namely: 1. Housekeeping department 2. Laundry department 3. F&B(Food and Beverage) department 4. Accounting...

Words: 5965 - Pages: 24

Free Essay

A Case Study of the Web-Based Information Systems Development.

...three years the focus of the information technology industry has moved towards development for the World Wide Web (WWW). Information systems using WWW technology, delivered by an Intranet or via the Internet, are now prevalent throughout New Zealand and overseas. Within New Zealand, a wide variety of organisations are deploying information systems onto the WWW, including banks, government departments and other service providers. They are using the WWW as a strategic business tool, supporting their existing operations or providing a low-cost solution for delivering a new product or service line. 1.1 Proposition and Aims There is an abundance of information on the graphical and user interface aspects of WWW site design. In addition, a large body of knowledge has been developed in the area of software development methodologies. However, there has been very little research conducted to examine if these existing research methodologies are applicable to the information systems developed for the WWW. The WWW is a technologically dynamic environment, and presents new challenges for developers. In order to address the emerging WWW environment, a number of researchers have proposed software development methodologies specifically for the WWW. Consequently, the aim of this research was to investigate how organisations are currently developing WWW-based information systems, and the reasons why those methods are being used. This examination is important because, as the literature ...

Words: 1709 - Pages: 7

Free Essay

Knowledge Management Chapter 09

...Chapter 9 Using Past History Explicitly as Knowledge: Case-Based Reasoning Systems Becerra-Fernandez, et al. -- Knowledge Management 1/e -- © 2004 Prentice Hall Additional material © 2008 Dekai Wu Chapter Objectives • Introduce the student to the concept of using explicit historical occurrences to solve current problems.  Explained in the context of rule-based systems that also use past experience to solve current problems • Introduce case-based reasoning. • Introduce how case-based systems can learn from their own experience Becerra-Fernandez, et al. -- Knowledge Management 1/e -- © 2004 Prentice Hall / Additional material © 2008 Dekai Wu Weaknesses of rule-based systems • Weaknesses of rule-based systems that inspired the rise of case-based reasoning:  Experts may not be able to externalize their experience into clean bits of knowledge that can be encoded into rules  Their knowledge is an accumulation and a combination of years of being exposed to many instances of similar problems (and their subsequent solutions) Becerra-Fernandez, et al. -- Knowledge Management 1/e -- © 2004 Prentice Hall / Additional material © 2008 Dekai Wu Weaknesses of rule-based systems • To manage the knowledge of experts, we must:  Elicit it from the expert  Represent or formalize it in a form suitable for computing  Validate and verify the knowledge • All these contain pitfalls for the rule-based systems approach Becerra-Fernandez, et al. -- Knowledge Management...

Words: 3692 - Pages: 15

Free Essay

Vnx Ops Overview

...Common Management Platform EMC® Common Object Manager (ECOM) Toolkit 2.7.1.0.0 ECOM Deployment and Configuration Guide 300-014-010 REV A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.EMC.com Copyright © 2012 EMC Corporation. All rights reserved. Published March, 2012 EMC believes the information in this publication is accurate as of its publication date. The information is subject to change without notice. THE INFORMATION IN THIS PUBLICATION IS PROVIDED “AS IS.” EMC CORPORATION MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Use, copying, and distribution of any EMC software described in this publication requires an applicable software license. For the most up-to-date listing of EMC product names, see EMC Corporation Trademarks on EMC.com. All other trademarks used herein are the property of their respective owners. 2 ECOM Deployment and Configuration Guide Contents Preface.............................................................................................................................. 7 Chapter 1 Overview of CIM and SMI-S Modeling with CIM and SMI-S....................................................... Structural model overview....................................................... Profiles.......................................................

Words: 5705 - Pages: 23

Premium Essay

Web Application

...CSC581: Advanced Software Engineering Web Application Architectures Manar Alqarni Abstract As the difficulty of web application grows, the need to develop an architecture for the web application is become necessary in order to support and guide an organization for web system planning, maintenance, deployment, building and design. This research paper presents an abstract view for web application architecture and it will be focused on the comparison of existing applications architecture. Moreover, it discusses the advantages and disadvantages of these architectural designs. Key words Web application, Architecture, Framework, MVC, Ajax, SOFEA. 1. Introduction The history of web application has begun when Tim Berners-Lee and his colleagues in 1989 were working together on their project for a distributed hypertext system, they did not have a clue of how the World Wide Web would look alike tomorrow [1]. While many of documents and accessible resources on the web were growing, also the different category of programming languages and technologies for web page generation increased. Additionally, the different category of programming languages and technologies caused a growth in the variety of possibilities and applications on the web [3]. Nowadays, the World Wide Web or WWW is not only of an huge information system that consists of million documents and information, it can also host distributed applications that give a concurrent access to users...

Words: 2759 - Pages: 12

Free Essay

International Management

...BRIEFING Non-European Labour Migration to the UK AUTHOR: DR SCOTT BLINDER PUBLISHED: 30/01/2012 NEXT UPDATE: 30/01/2013 1st Revision www.migrationobservatory.ox.ac.uk BRIEFING: Non-European Labour Migration to the UK This briefing examines labour migration to the UK among people who are not from the European Economic Area (EEA). Labour migrants are those whose primary reason for migrating or whose legal permission to enter the UK is for employment. Key Points Non-EEA labour migration increased over the 1990s and early 2000s but has declined since a peak in 2004-2006. Skilled and highly-skilled workers (Tier 1 and 2 of the Points-Based System) take up slightly less than half of entry visas issued for work. A majority of non-EEA labour migrants coming to the UK are male; a majority of newly arriving labour migrants are aged 25-44. The largest numbers of non-EEA labour migrants are nationals of Asian countries, followed by the Americas; labour migration among Africans has declined since at least 2004. Understanding the evidence Labour migration involves people coming to the UK for the purpose of paid work. Depending on the source of data, measures of labour migration might involve people who say that they are coming to the UK because of a definite job or to look for work (International Passenger Survey data), or people who have permission to enter the UK through a workrelated visa (administrative data on visas and passenger entries). IPS and administrative...

Words: 2938 - Pages: 12

Premium Essay

The Design Guide

...1 INDEX Page INTRODUCTION 1. 2. YOUR CV USING THIS GUIDE TO CREATE A CV AND GETTING HELP 3 3 THE DESIGN GUIDE 3. 4. GETTING STARTED 4 Fig 1. Your Lifeline PROVIDING EVIDENCE THAT 4 CROSSES CULTURES Fig 2. Explaining Your Results COVERING LETTERS 6 Fig 3: Covering Letter Layout Fig 4: Opening Paragraph of Covering Letter Fig 5: Middle Paragraphs of Covering Letter Fig 6: Closing Paragraphs of Covering Letter CV FORMAT – 1 PAGE OR 2? 8 IMAGE AND FONTS 9 THE HEADER 9 Fig. 7: Header Fig. 8: Header plus ORGANISING YOUR MATERIAL 9 AND HEADINGS TACKLING WORK PERMIT ISSUES 10 Fig. 9 Nationality and Work Permission Data WRITING PERSONAL PROFILES 12 Fig 10. Personal Profile Statement Fig 11: Career Objective Statement Fig 12: Career Summary Fig 13: Expertise Summary BEAUTIFUL BULLETS 13 Fig 14: Bullet 1 Fig 15: A Powerful Summary SHOWING MANAGERIAL CAPABILITIES 14 REFERENCES 14 Fig 16. References SCANNING YOUR WORK 15 CV EXAMPLES PROFILE EXAMPLES EXAMPLE COVERING LETTER 16-28 29-30 31 5. 6. 7. 8. 9. 10. 11. 12. 13. 14 15. CV EXAMPLES 2 INTRODUCTION 1. YOUR CV Welcome. If you are a postgraduate student at The Birmingham Business School, one of the tasks you are likely to want to tackle is the design of a CV to ‘market’ your skills for the future. Even if you do not intend to try and seek work in the UK, you are likely to find that you can learn from the self-marketing skills our Careers Advisers and Consultants will emphasise in the workshop sessions offered...

Words: 9018 - Pages: 37

Premium Essay

Strategy as a Wicked Problem

...1. Define Wicked Problem, Examples, 10 Properties. 2. Summarize the 4 solutions listed 3. Summarize PPG’s situation and wickedness 4. Analyze their strategy to come up wickedness through solutions listed in the context: 1. Involve stakeholders, document opinions and communicate 2. Define the corporate identity 3. Focus on action and Adopt a “feed-forward” orientation 5. Lessons from case PPG Question 3 The company, founded over a century ago as a plate-glass manufacture, chemicals and coating business. PPG is a global player with 125 manufacturing facilities and partner over 25 countries,. PPG first became aware of strategy’s wickedness in the late 1980s. Two missteps taught the company that diversification, be it into other industries or countries, is fraught with peril: 1 Diversification: PPG expanded its portfolio by acquiring medical electronics businesses from Honeywell and Litton Industries in 1986 and from Allegheny International in 1987. However, the biomedical industry’s volatility and the units’ focus on customization did not fit the company’s competence in low cost, standardized production. As resulte: Seven years later, PPG had to sell the division. 2 Being in other countries: The company others wicked challenge was China, where PPG offering the market with something they do not have competitive edge over the local supplier. This result where PPG’s operations there...

Words: 353 - Pages: 2

Free Essay

Mab Law Firm Network Merger Project

...Summary Inherent Challenges in merging two networks It is important when integrating multiple networking systems to do a thorough investigation of all systems and use prudence when implementing any strategy so that possible problems can be dealt with as efficiently as possible thereby limiting costs of the actual project itself and loss of revenue due to network downtime. There are some differences in equipment which needs to be dealt with since each firm is using different types of network operating systems, servers, case management systems, and how users connect to the network. Currently both firms have separate security policies and these will need to be reviewed, revised and merged to meet the criteria of the new merged network system. One of the biggest challenges will be the case management systems as Bellview Law Group is using a legacy application while Myrtle and Associates is utilizing a more current web-based system. A migration plan will need to be developed to bring the legacy system over to the web-based system. While this migration is taking place both systems will need to run in parallel so that the data will be accessible. Training will be another issue that needs to be addressed since the staff from Bellview Law Group currently access data only from desktop PCs. they will need to be trained not only on the new web-based case management system but also on the new hardware as well. Finally the actual integration itself will be quite challenging. Timing...

Words: 1754 - Pages: 8

Free Essay

Today

...evaluates different types of network security threats and selects appropriate countermeasures or controls to protect against them. 426.1.6: Intrusion Detection Systems (IDS) - The graduate analyzes network auditing tools related to intrusion detection. Introduction:   Myrtle & Associates and Bellview Law Group are two medium-sized law firms specializing in personal injury cases. The law firms have had a cooperative working relationship for the past 20 years. Recently, the firms have decided to consolidate and merge into one larger firm with a new name: MAB Law Firm. The challenge will be to integrate the computer systems from both firms into one large network. The two law firms are located across town from each other. The integration effort should be designed to combine the firms into a single logical site.   Myrtle & Associates has three servers that were recently upgraded to Windows Server 2008. One of them functions as a domain controller, the other as a file server, and the last as an application server for their web-based case management system. Additionally, this firm utilizes a wireless network so that paralegals and attorneys can access the network using their company laptops. Lastly, the firm also issues smartphones to all attorneys and paralegals so that they can have access to the case management system. Access to the case...

Words: 575 - Pages: 3

Free Essay

Lab #10 Securing the Network with an Intrusion Detection System (Ids)

...Lab #10 Securing the Network with an Intrusion Detection System (IDS) Introduction Nearly every day there are reports of information security breaches and resulting monetary losses in the news. Businesses and governments have increased their security budgets and undertaken measures to minimize the loss from security breaches. While cyberlaws act as a broad deterrent, internal controls are needed to secure networks from malicious activity. Internal controls traditionally fall into two major categories: prevention and detection. Intrusion prevention systems (IPS) block the IP traffic based on the filtering criteria that the information systems security practitioner must configure. Typically, the LAN-to-WAN domain and Internet ingress/egress point is the primary location for IPS devices. Second to that would be internal networks that have or require the highest level of security and protection from unauthorized access. If you can prevent the IP packets from entering the network or LAN segment, then a remote attacker can’t do any damage. A host-based intrusion detection system (IDS) is installed on a host machine, such as a server, and monitors traffic to and from the server and other items on the system. A network-based IDS deals with traffic to and from the network and does not have access to directly interface with the host. Intrusion detection systems are alert-driven, but they require the information systems security practitioner to configure them properly. An IDS provides...

Words: 3209 - Pages: 13

Free Essay

Intrusion Detection

...activities that violate the security policy of the system, and intrusion detection is the process used to identify intrusions. Intrusion Detection Systems look for attack signatures, which are specific patterns that usually indicate malicious or suspicious intent. Intrusion Detection Systems (IDSs) are usually deployed along with other preventive security mechanisms, such as access control and authentication, as a second line of defense that protects information systems. Intrusion detection provides a way to identify and thus allow responses to, attacks against these systems. Second, due to the limitations of information security and software engineering practice, computer systems and applications may have design flaws or bugs that could be used by an intruder to attack the systems or applications. As a result, certain preventive mechanisms (e.g., firewalls) may not be as effective as expected. Intrusion detection complements these protective mechanisms to improve the system security. Moreover, even if the preventive security mechanisms can protect information systems successfully, it is still desirable to know what intrusions have happened or are happening, so that we can understand the security threats and risks and thus be better prepared for future attacks. IDSs may be classified into Host-Based IDSs, Distributed IDSs, and Network-Based IDSs according to the sources of the audit information used by each IDS. 1) Host-based IDSs get audit data from host audit trails and...

Words: 1083 - Pages: 5

Free Essay

Intrusion Detection

...Intrusion detection Intrusion detection is a means of supervising the events that occur in a computer system or network. This includes examining them for traces of possible incidents that are in violations or threats of violation of computer security policies, acceptable use policies, or standard security practices (Ogunleye & Ogunde, 2011). Intrusion detection is become more than ever an important focus of many organization. This focus is driven by the availability of more information systems and globalization through the use of the internet. The market place is no longer the residents of a small town going to the local mall, but services online available to anyone with a web browser. With all this access vastly multiplies the possibilities of one masked robber in a year to thousands of wrong dowers at a desktop or laptop that has discovered vulnerability in the system and decides to take the chance to exploit it. There are various approaches an organization can use to deal with many of the problems that exist with securing an information system. Jain’s (2008) article from the ICFAI Journal of Information Technology depicts a scenario of a network intrusion detection team and how situation can be averted: …The hackers started with slating down the objectives of their ‘Limited Knowledge Penetration Testing’, also referred to as ‘White Box Approach’, and gathered sufficient information to ensure that the testing did not affect the normal business operations. They emulated a...

Words: 1808 - Pages: 8