People often use the terms Information Technology and Information Systems interchangeably, although both the terminologies have established identities of their own. However it is crucial for every professional and individual to understand the subtle differences that defines the individuality of these disciplines.
Information Systems (IS) is a discipline bridging the business field and the well-defined computer science field (popularly called information technology) that has been evolving since it was coined in the early 1970s.An information systems discipline therefore is supported by the theoretical foundations of management social science, information theories and information technology such that students of the discipline have unique opportunity to explore the academics of various business models as well as related algorithmic processes within a computer science discipline. Typically, information systems include people, business procedures or processes, data, software, and hardware that are used to gather and analyze digital information. Specifically Information Systems are the intersection that people and organizations use to collect, filter, process, create, & distribute data (computing) through its business processes, and implemented by its human capital.
While Information Technology (IT) typically is the acquisition, processing, storage and dissemination of digitized information, often represented technically as “Data” through electronics-based media built upon the disciplines of computing and telecommunications. The terminology was first coined in a 1958 by Leavitt and Whisler who defined it as “the new technology that does not yet have a single established name. We shall call it information technology.” Essentially, in its raw form, it comprises of Hardware, Software, the platforms to support both, communication networks and protocols.
It is crucial to understand that while “Information Technology” is a huge discipline with an identity of its own, it essentially is a subset of the discipline “Information Systems”, although the latter evolved much later. The discipline of Information Systems specifically studies the intersection of Business Processes (which may or may not be technology enabled), People (who will be part of the business processes and will use information technology) and Information Technology.
Hope this clarifies your thoughts. Do let me know what you think or would like to discuss further,
Today, a lot of stress is on code reuse, in the IT industry. In fact, the industry is thriving on the same. The problem is every business requirements have its very own set of specific needs which often are not met with by using standardized software packages and code modules, besides other barriers to success. Ideally software should be designed to complement and automate business processes. But since this becomes costly, modules and packages are standardized and IT business analysts try to fit the standard things to all problem domains. The net result is mayhem and chaos. Continue reading “Why Technology Reuse fails”
HP-Palm has become the hype that the mobile computing world could have done without. Is it really worth the hype? Will this $1.2 billion deal create waves in the already competitive market?
Hewlett Packard, the world leader in laptops (in terms of sales) has its own series of PDAs, less popularly known to the common man. The I-PAQ PDAs sold by HP does not rank among the top 10 PDA brands in terms of sales. With the focus shifting towards handheld computing devices, this may have been a desperate move by HP to claim its place in the competitive industry dominated by the likes of Blackberry, Apple, HTC, Nokia and O2. Continue reading “Does the HP-Palm move make sense?”
The technical team or the product development team has come up with a ground breaking product. The technology can have a deep impact on the customer. The technical team knows it, and so does the customer. The contract for a long term engagement is about to hit off, and then the customer asks how much will this technology cost his pockets? In this competitive world, the technology developers do want the best price for the technology, but at the same time, they really do not know what the best price is to which your customer will give the green signal for a long term engagement. So how does one price an IT product? Continue reading “How to price IT products in 7 steps?”
Today the world is walking on core i5 laptops. They are high speed mean machine, well built and easy to handle. The Core i5 is now powering performance laptops for those customers who have the capability to shell out a little extra. Since they are made on Intel’s cutting-edge 32-nanometer manufacturing process, it readily outperforms the older Core 2 Duo, giving much more satisfaction to tech-savvy customers. Continue reading “4 Biggest brands launched the core i5 laptops”
Beowolf cluster: Supercomputers for the poor.
The demand for faster calculations can’t be met by only relying on the speed increase resulting from advances in computer technology as high end super computers are that much costly. One of the solutions to this problem for ‘not-so-deep-pockets’ is the distribution of the numerical tasks to a set of machines. So how to provide supercomputer capabilities cheaply? The answer is Beowolf Clusters. This process is called parallelization because the computers complete their tasks in parallel instead of the traditional step‐by‐step (serial) execution. As computer codes have been updated to use this new paradigm, the demand for parallel computers has grown. In general, such computers need to have: Continue reading “Beowolf Clusters: Cheap supercomputers for poorer pockets”
Amidst a lot of hype as always, today 27th January, 2010, Apple launches the I-Pad. While it is being viewed as the product that will rejuvenate Apple’s revenues for years to come, a question many staunch Apple fans (and those who are not fans of course) will ask, is it really worth the hype? Apple has always created a market even when there is none. Will it be successful yet again this time?
Continue reading “7 reasons why Apple’s I-Pad may fail.”
Outsourcing is the mantra of the day. Today, many large MNCs, all across the globe, outsource activities like customer relationship management activities to cheap labor countries where English speaking skills are not a problem. A major concern in such outsourcing is the security in customer’s sensitive data.
Continue reading “How to tackle the problem of security breaches in call centers”
The Nexus one was launched amongst all the attention and hype by HTC collaboration vis-a-vis the Droid (Motorola) with the onset of 2010. Both sport Google’s OS to begin with. So whats the hype about? This article makes a comparison between the key offerings of these top 2 phones and the possible strategies behind their launches.
The Nexus one was launched amongst all the attention and hype by HTC collaboration vis-a-vis the Droid (Motorola) with the onset of 2010. Both sport Google’s OS to begin with. So whats the hype about? This article makes a comparison between the key offerings of these top 2 phones. Continue reading “Google’s Nexus One vs Droid: A comparison of the current top two G-Phones”
Today, with the rise of popularity of ubiquitous computing and enterprise mobility, more and more professionals have started using PDAs and smart-phones for conducting business. A major risk is that such usage exposes one to attacks through the less secure WiFi or Edge. Protect yourself from mobile security breaches without incurring huge expenses through 7 simple steps.
Today, with the rise of popularity of ubiquitous computing and enterprise mobility, more and more professionals have started using PDAs and smart-phones for conducting business. A major risk is that such usage exposes one to attacks through the less secure WiFi or Edge. The cipher used by the General System for Mobile Communications (GSM) has been cracked by a German researcher Karsten Nohl who presented his findings Sunday at a hacker conference in Berlin. So there is a reasonable cause for most users to worry as the security scheme used by 80 percent of the world’s cellular telephones has been compromised. Continue reading “Security for Mobile: It matters”
A serious concern on the usage of electronics and more importantly cell phones, is the ecological implications they have. The digital wastes have a lot of negative impact which is basically a cumulative recipe for disaster for our planet earth. This blog provides an insight on few of the exciting offerings on green mobile phone technology and how companies are gearing to tend to this emerging urgency.
A serious concern on the usage of electronics and more importantly cell phones, is the ecological implications they have. The digital wastes have a lot of negative impact which is basically a cumulative recipe for disaster for our planet earth. Continue reading “Green mobile phones: is it here to stay?”