A computer system comprises hardware and software components, aiming to offer a powerful computational tool. These systems play a crucial role across diverse domains, aiding us in numerous tasks. The prevalence of the internet has significantly bolstered the utilization of computers for information sharing and communication. Computer systems empower us to store, process, display, and transmit information. Even in a basic modern computer system, multiple programs are typically required to carry out various functions effectively.

Showing posts with label system. Show all posts
Showing posts with label system. Show all posts

Saturday, September 18, 2021

What are the benefits of marketing information system?

Marketing information system has the following benefits:
*It helps marketing planning by gathering reliable information. It handles both internal and external data.

*The problems and opportunities are automatically spotted out. It helps effective tapping of marketing opportunities and effective defense against marketing threats.

*It helps in spotting trends and facilities on formulation of basis of assumption economic and business conditions. It tends to be future oriented.

*It helps the firm adjust its products and services to the needs and tastes of consumers. It acts as a control mechanism as customer reactions are also fed into it from market intelligence, the first sales force or marketing research.

*It provides market intelligence to the firm.

*The system can provide information on seasonal and cyclical demand patterns for planning, monitoring and control purpose.

*It helps controlling marketing activities. The report can be used to monitor and control marketing operations.

*Sharing selected operational information in order to gain advantage from superior expertise across organizational boundaries and further improve efficiency.
What are the  benefits of marketing information system?

Sunday, February 21, 2021

SAP: Systems Applications and Products in Data Processing

SAP was originally introduced in the 1980s as SAP R/2, which was a system that provided users with a soft real-time business application that could be used in multiple currencies and languages.

SAP is incredibly large, extensive software packages used to manage a company's business processes.

By using of this package makes it possible to track and manage, in real-time, sales, production, finance accounting and human resources in an enterprise. SAP brings discipline in the company and it has various authorization level, complete tract record of entries, correction and movements.

SAP based the architecture of R/3 on a three-tier client/server model.
• Presentation Server
• Application Server
• Database Server
SAP: Systems Applications and Products in Data Processing


Thursday, November 1, 2018

Fat client system

Client/server is a term used to describe a computing model for the development of computerized systems. This model is based on the distribution of functions between two types of independent and autonomous processes; servers and clients.

Fat-client is a computer that does not necessitate a connection to a server system to run although they can benefit from being connected to a network and a server. Fat client system means most of the functional modules of the application are performed on the clients. In other words it is a networked computer with most of the resources installed locally. In fact, majority of thick clients have their own operating system and software applications and can be used offline i.e. when not connected to any network or server.

In a thin-client model, all of the application processing and data management is carried out on the server. The client is simply responsible for running the presentation software.
Fat client system

Tuesday, November 28, 2017

Optical scanning system

A scanning system can be an input or output system or a combination of both.  A system’s imaging fidelity depends on and begins with the reading of the input information and ends with the writing of the output data.

Optical scanning can be defined as a system articulation of light to provide information transfer.

An optical scanner is a digital computer input hardware that captures a bit-mapped image of a document.

When the image scanned is a photograph, it may be stored for use as is or be subjected to image processing.

It can read text and graphics from printed material.  A scanner works by digitizing an image – by digitizing it into a grid boxes and representing each box with either a zero or a one, depending on whether the box is filled in.

Optical scanning serves as an information converter. It transforms a spatial function such as images into a time domain to adapt it to electronic processing.
Optical scanning system

Monday, October 9, 2017

Barcodes systems

Most automated systems are designed to utilize either barcodes or optical character recognition imprints (OCR). The majority used barcodes but a number of systems can also accept OCRs and other identifiers as well.

A barcode is a machine readable code consisting of a series of bars and spaces printed in defined ratios.  It is formed by combinations of high and low reflectance regions of the surface of an object, which are converted to ‘I’s and ‘0’s.
Barcodes are easier to scan than OCRs in that scanning equipment must be able to read each entire OCR symbol, while barcodes are scanned by reading any path across the label which touches all bars.
Barcode symbologies are essentially alphabets in which different width of bars and spaces are combined to form characters and ultimately a message.

‘Bar Codes’ are graphical patterns whose principle function is to convey data, and ‘symbologies’ are sets of rules that relate those patterns to their encoded message.
Barcodes are used for a number of purposes other than product identification. Delivery services used barcodes to track packers, and student card may well have a barcode representing student number.

The barcode technology has been developed with the creation of 2D barcodes to increase the data capacity of ID barcodes. With the integration of cameras, mobile phones act as scanners, barcode readers and portable data storages and maintaining network connectivity.
Barcodes systems

Monday, November 7, 2016

Direct Attack hacking

Hacker is a term that applies to anyone who writes computer program code. Cracker is a term that applies to people who use their skills to attempt to access other computer without permission.

There are even programs shared across the internet, allowing people with less skill to mount an attack. Broadly, two types of attacks can be considered: indirect attack and direct attack. A direct attack is a hacker using a personal computer to break into syst

Direct attacks are performed at the sensor level outside the digital limits of the system and therefore, no digital protection mechanism can be used against it.

Direct attacks originate from the threat itself. It would take the form of hacking into a computer system and rewriting or stealing information. This would have a great impact on organizations offering on-line services, since these on-line services could be damaged, modified or destroyed.

Neither problem is that of the organization were not able to determine where the security risk lies, the direct attacks would be re-occurring.

In a direct attack an imposter can either change his biometric characteristics in order to evade identification or claim an authorized user’s identity by simply posing himself or by presenting a falsified biometric trait of that user.

The impact of the attacks would be to publicize the hackers and destroy the credibility of the organization offering the on-line services especially to current and future customers.
Direct Attack hacking

Tuesday, January 5, 2016

Computer applications in inventory and ordering system

Inventory management I an especially complex process for companies that producing articles which selling. This means that production just have data about the quantities of products required to produce for delivery or in addition to the annual and monthly sales plans, continuously carrying out plans on daily basis in necessary.

In order of better planning of inventory management, companies, often use information technology and various software solution to address the problems of inventory management. An inventory-checking system in one business could easily use the web to talk to a stock-ordering system in another business, thus automatically ordering new stock.

Some wholesalers use state-of-the-art inventory management technology within their distribution centers, which use bar codes and radio frequency signals to track and assure accurate product for customers.

The process of ordering is usually done by computer, either manually or automatically. Automatic ordering occurs when stock levels and reorder points are reached that trigger the computer to reorder drug products.

The next step is to send the order form electronically to the suppliers via the computer or in fewer situations by fax. When using computers for ordering, the supplier’s computer system interacts directly with the company’s computer system to communicate quickly.

Order processing is becoming more automated through the use of computer technology known as electronic data interchange (EDI). The basic idea of EDI is to replace the paper documents that basically accompany business transactions, such as purchase orders and invoices, with electronic transmission of the needed information.
Computer applications in inventory and ordering system

Tuesday, December 22, 2015

Computer Controlled Vehicle Systems

Some tasks associated with vehicle operation are too complex to be control by the driver e.g. the controlling of pressure, temperatures, injection amounts, timing, etc. by the engine and drivetrain control.

In Japan, the basic concept for Computer Controlled Vehicle Systems was formulated in July 1970. In autumn of 1970 work on the basic design of the system began with support of the Ministry of International Trade.

Almost all vehicle systems are now controlled by computer. Computer Controlled Vehicle Systems such as engine management, traction control, anti-lock braking and stability control, need to communicate with each other in order to obtain the optimum performance from the vehicle.

To achieve this end the individual systems are linked together by communication bus that permits data to be interchanged between the systems at  a very high data transfer speed; systems that operate at high speeds of data transfer are said to operate in ’real time’.

The advantage of Computer Controlled Vehicle Systems, the systems taking of tasks originally controlled by driver, the driver has more time to concentrate on the remaining tasks which are more difficult to automate.

A further advantage with a computerized controlling of vehicle systems originally managed by the driver is the faster and more precise control process achievable.
Computer Controlled Vehicle Systems

Saturday, November 7, 2015

CyberCash payment system

CyberCash Inc. was founded in 1994 and is performing secure credit card presentations since April 1995. CyberCash provides a range of commerce solutions from credit card based DPSs to account based small payment systems.

Its product and services are free to merchants and customers. CyberCash collects fees from the banks processing their credit cards.

CyberCash operates payment servers and gateways that connect the web based to external financial networks. The company business model is as a payment service provider, with free based on transaction, rather than as a software vendor.

CyberCash’s Secure Internet Payment system does use cryptography to protect the transaction data. CyberCash provides a protocol; similar to SSL to secure purchases over the web.

The system contains a back-end credit card architecture that protects confidentiality and authenticity of the user who in many cases is a merchant.

In October 1997 the German subsidiary Cyber Cash Gmbh was founded. The basic CyberCash is based on secure credit card resp. account detail presentation. The so-called electronic direct debit is a special CyberCash GmbH service.
CyberCash payment system

Wednesday, August 26, 2015

What is Personal Information Manager?

The latest technological advances allow people to change more information faster than ever before. People nowadays are inundated with information.

A Personal Information Manager (PIM) is an application that can manage personal structured data such as address book entries appointments, tasks and notes.

It is a popular application for personal digital assistant (PDA) hand held devices that functions as a personal organizer.

Most Personal Information Manager has:
*an E-mail feature to send, receive and mange e-mails
*a Calendar feature to keep track of schedules
*a Contacts feature to maintain information needed to contact others
*a Tasks feature to record items that need to be done
*a Notes feature to provide reminders

Among popular Personal Information Manager tools are Microsoft Outlook, Apple iCal, Kontact and Lotus Notes. Smartphone usually have built –in Personal Information Software software.

The personal information manager will organize data entered and retrieve information in a variety of forms, depending on the style and structure of the personal information and the information wanted.

For example, information can be retrieved as an electronic calendar or list of appointments, meeting, or other things to do, the time tables for a project; or a display of key facts and financial data about customers, clients, or sales prospects. Personal Information Managers are very popular and convenient to use as they allow the user to organize a number of related tasks into one easy-to-use interface.

PIM tools either focus on specific structured data such as appointments, to-dos or contact data – or tackle only free-form note taking,

Personal information manager are now changing to include the ability to access the World Wide Web also provide e-mail capability.

The acronym Personal Information Manager is now, more commonly used in reference to personal information management as a field of study. As personal information management tool, a Personal Information Manager tool’s purpose is to facilitate the recording, tracking and management of certain types of ‘personal information’.
What is Personal Information Manager?

Friday, June 12, 2015

Computer aided design (CAD)

Computer aided design (CAD) can be defined as the use of computer systems to assist in the creation, modification, analysis or optimization of a design.

It involves the integration of computer science methods and engineering sciences in a computer-based system providing a data base, a program library and a communication subsystem.

CAD implies by definition that the computer in not used when the designer is most effective and vice versa.

A CAD-system contains hardware and software components, which are effectively integrated into one system. The CAD hardware typically includes the computer, one or more graphic display terminal, keyboards and other peripheral equipment.

The CAD software consists of the computer programs to implement computer graphics on the system plus application programs to facilitate the engineering functions of the user company.

By implementing CAD, it will increase productivity of the designer through the visualization of the product and its component, sub-assemblies and related parts and by reducing the time necessary for the development of a conceptual design analysis and documentation.

By using CAD design error can be eliminated at the early stages of design.

Today most CAD system only supports the detailing process with tbe goal of generating a finished technical documentation of the technical solution which can be used for manufacturing and assembly.
Computer aided design (CAD)

Tuesday, March 24, 2015

Event Notification

Alerting Services or Event Notification Services inform their users about changes that have occurred at information objects. These changes are called events.

Most E-commerce applications are event-driven systems that respond to a multitude of events – from new customer’s first website access, to payment and delivery process, and to innumerable customer relationship and supply chain management activities.

Event notification software works with workflow management software to monitor all e-commerce processes and record all relevant events, including unexpected changes or problem situation.

It lets the user generate e-mail notifications and/or custom scripts in response to an alarm being generated.

Event notification is enabled by creating event notifications rules, which specify the criteria for when an event notification should take place and the actions associated with the event notifications.

The goal of an event notification service system is to distribute information to interested parties in a scalable and efficient way.

It involves a set of event producers and a set of consumers; provides a delivery mechanism so that events generated at producers can flow to consumers whose need the events.

That is why event notification processes play an important role in E-commerce systems, since customers, suppliers, employees, and other stakeholders must be notified of all events that might affect their status in a transaction.

Event Notification service can carry out a selection process to determine which of the published notification is of interest to which if its clients, routing and delivering notifications only to those clients that are interested.
Event Notification

Friday, October 3, 2014

Database Management system

A database is a well-organized collection of data that are related in a meaningful way, which can be accessed in different logical orders.

Some commonly used databases are: address book, library catalogue, telephone directory and stock list.

The computer program used to manage and query a database is known as a database management system. Database management system is a collection of database and DBMS utilities which are used to develop applications to satisfy the requirements of user by application developers under the supervision of database administrator. Database management system is software that is helpful in maintaining and utilizing a database.

The main objective of database management systems are data availability, data integrity, data security and data independence.

Database management systems must facilitate the major functions including:
*Defining of database schema
*Manipulation of database
*Sharing of database
*Protection of database
*Database recovery
Database Management system

Friday, September 12, 2014

PayPal payment system

An online payment service functions as a ‘middleman’ between buyers and sellers.

PayPal is a good example of the alternative to credit card payment, providing the payment link between buyers and sellers. PayPal is commonly us to settle purchases made on internet auction sites such as eBay. In recent years, PayPal ha become one of the internet’s most popular payment systems.

A user has to open an account with PayPal to be able to pay and receive money. The account then should be funded with credit or debit cards, electronic wire transfers or by other methods.

It is more economical for PayPal that the account is funded from the consumer’s bank account as it costs very little to process the transaction.

PayPal acts as a merchant in a card funded transaction and pays the merchant service commission to its acquiring bank.

PayPal made it possible; for an HTML developer to accept online credit card payments from any web page without requiring the years of programming skills necessary to install credit card processing software on a web server.
PayPal payment system

Saturday, September 6, 2014

Electronic Payment System

A payment system is merely an agreed upon way value between buyers and sellers in a transaction. Payments system facilitates the exchange of goods or services in an economy.

In early 1990s the business and consumer world encountered a new way of conducting trade business which was named electronic commerce.

Payment for the products and services purchased is an obvious and vital set of processes in electronic commerce transactions.

Electronic payment systems have become necessary to enable the internet commerce.

The benefits to an economy of information technology applications in the payment system are apparent in the speed, traceability, and liquidity that the technology can provide over and above manual processing.

The requirements of payment transactions include confidentiality, security, integrity, non-repudiation and authentication.

But payment processes are not simple, because of the near anonymous electronic nature of transactions taking place between networked computer systems of buyers and sellers, and many security issues involved. Security is a major concern in the payment system.

Electronic commerce payment processes are also complex because of the wide variety of debit and credit alternatives and financial institutions and intermediaries that may be part of the processes therefore, a variety of electronic payment systems have evolved over time.

PayPal is the electronic cash payment system. PayPal eliminates the need to pay for online purchases by writing and mailing checks or using payments cards. PayPal allows consumers to send money instantly and securely to anyone with an e-mail address, including on online merchant.
Electronic Payment System

Sunday, May 4, 2014

A Personalization and Profiling System

Personalization requires some information about the user’s preferences, needs, goals, and expectations. 

Once a person has gained access to an E-Commerce site, profiling processes can occur that gather data on a person and the website behavior and choices. Profiling enables discovery of interest, person characteristics and preferences.

A specific user profile defines a set of data that is linked to one and only one user and characterizes a content/application domain environment associated with this specific user.

User profiles are developed using profiling tools such as user registration, cookies files, website behavior tracking software, and user feedback.

These profiles are then used to recognize a person as an individual user and provide and provide the person with a personalized view of the contents of the site, as well as product recommendations and personalized Web advertising as part of a one-to-one marketing strategy.

Profiles need to be set-up and maintained in order to offer personalized services and devices.

Profiling processes are also used to help authenticate a person identity for account management and payment purposes, and to gather data for customer relationship management and marketing planning, and website management.
A Personalization and Profiling System

Monday, July 23, 2012

System Software

System software consists of programs that are used to control and operate the computer hardware.

System software is not application specific; it is oriented to the needs of the hardware and facilities the development and running of application.

There are three components in system software: operating system, utility programs and language processors. System software serves as the interface between the user, the application software and the computer’s hardware.

The operating system present in all computers except for a few very specialized applications. These programs enable the computer to boot, to launch application programs and to facilitate important jobs such as how to transfer data between input/output devices and to manage resources available (CPU).

The operating system must be loaded in the main memory before the computer can function. Other application software can then be loaded into the computer with the help of the operating system.
System Software

Tuesday, December 13, 2011

Information System and Integrated Data

Once an organization has simplified its system and fully integrated its data, it is in a good position to extend business processes and systems outside its own operations to its customers, partners and suppliers, to encompass its whole economy as an entire automated supply chain.

Large companies can then create ecosystems made of hundreds of partners who can supplement the products and services of the large company, while retaining as good level sharing.

This result in the integration of long chains of business processes with information automatically flowing from company to company smoothly, quickly and accurately. For instance, if a customer places an order on a web site, it transfers automatically into the order entry system, into the accounting systems for invoicing and into the warehouse management system for fulfillment. It is also included in information sent to suppliers on orders in the pipeline, so that they can plan their inventory and pass demand forecast up the chain to their own suppliers.

Many large organizations are setting up their own private electronic marketplace with their suppliers, whilst others are getting together with competitors to set up a similar joint arrangement. E-marketplaces are central hubs or exchanges that bring together buyers and seller across the internet and already demonstrating success.

Customized products can be collaboratively designed within a supplier group, using an internet enabled computer aided designed (CAD) application.

Freight companies can join the e-marketplace to bid for transportation of the finished product or to auction off excess freight space to other companies in the exchange. At the same time, customers can access the market place to track delivery of an order.
Information System and Integrated Data

Tuesday, September 27, 2011

Marketing Information System

For many firms, the competitive nature of today’s business environment has brought home the realization that strategic advantage will accrue to the firm doing the best marketing job.

Effective marketing requires information. Every firm must organize the flow of marketing information to its marketing managers. Companies are studying their manager’s information needs and designing marketing information systems (MIS) to meet these needs.

A marketing information system (MIS) is a system which is used to collect, analyze, report, and take action on information which is critically important to the marketing function of any organization.

To carry out their analysis, planning, implementations and control responsibilities marketing managers need information about development in the marketing environment.

It is useful only if it can help a marketing manager to make a decision. In order to be useful, information should be of high quality, relevant, timely and complete. It should provide a good picture of reality and it should thus to be accurate, valid and reliable.

The role of the MIS is to assess the manager’s information needs, develop the needed information, and distribute the information in a timely fashion to the marketing managers.

The Marketing Information System operates as a decision support system to the following four systems:
*The internal accounting system
*The marketing intelligence system
*The marketing research systems
*The analytical marketing system

The needed information is developed through internal company records, marketing intelligence activities, marketing research and marketing decision support analysis.

The information will includes data on economic and business trends, consumer buying behavior, market development, competitive products and prices as well as data generated by market research.
Marketing Information System

The Most Popular Posts

  • The evolution of business intelligence (BI) tools reflects the broader progress of computing technology and data management. In the 1970s and 1980s, early ...
  • Watermelons are quintessential summer crops, prized for their refreshing, red, juicy, and crisp flesh. Producing high-quality melons requires careful handl...
  • Selenium, an essential trace element, plays a crucial role in various bodily functions, including antioxidant defense and thyroid hormone metabolism. Plant...