Articles in the information_systems category

  1. Email and Encryption

    Posted on in Information Systems

    Email communication has become so common, users often forget that there is no inherent security in the common implementation. For general correspondence it might be acceptable to forsake security in the interest of ease of use. After all, the sharing of recipes between old friends is not always a matter …

  2. 2,200 Seek BIP / BTOP Funding

    Posted on in Information Systems

    American Recovery and Reinvestment Act (ARRA) LogoA week after the official deadline for electronic submission of applications for the Broadband Initiatives Program (BIP) and the Broadband Technology Opportunities Program (BTOP), the National Telecommunications and Information Administration (NTIA) revealed today that nearly 2,200 applicants have requested \$28 billion in funding. The American Recovery and Reinvestment Act …

  3. Issues in Information Security

    Posted on in Information Systems

    In the field of information technology, there are two kinds of professionals. Those that seek to make information more accessible through applications and services, and those that strive to protect that same information. Information security professionals protect information by first striving to identify the individuals access the system and then …

  4. Security Policies

    Posted on in information_systems

    It can be said that security policies are living documents that must be frequently reviewed and revised. As organizations evolve, their security needs evolve as well. Policies written before the evolution of the organization may not adequately reflect newly developed needs. Therefore, it should be considered standard procedure to review …

  5. BIP / BTOP Filing Extension

    Posted on in Information Systems

    American Recovery and Reinvestment Act (ARRA) LogoGood news today for service providers planning to file an electronic application for either the Broadband Initiatives Program (BIP) or Broadband Technology Opportunities Program (BTOP). The deadline for electronic applications has been extended from 5 p.m. ET on August 14, 2009 to 5 p.m. Eastern Time (ET) on …

  6. New Information Systems: Support and Training

    Posted on in Information Systems

    New information systems are not built in a vacuum. Systems analysts cannot hope to design and build an information system that meets the needs of an organization without first determining what those needs are. In order to collect requirements for a new information system, systems analysts must employee various data …

  7. Telecommunications

    Posted on in Information Systems

    This presentation on telecommunications is part of a larger presentation on information technology for Company X.

    What is Telecommunications?

    Simply put, telecommunications is the sending and receiving of messages over long distances. In the past, this might have taken the form of smoke signals or telegraphs. Today, telecommunications takes place …

  8. Information Technology and Organizational Change

    Posted on in Information Systems

    Organizations implement new information systems in order to improve their existing or planned operations. Properly designed information systems produce the benefits of improved productivity, increased effectiveness, and greater creativity. New information systems improve productivity by helping organization processes complete more quickly or with few resources. Effectiveness is increased when organization …

  9. Investing in Information Technology

    Posted on in Information Systems

    In today's global marketplace, even small to medium-sized businesses cannot afford to ignore the value of information technology. As James Senn (2004) notes, interconnected groups of computers offer four benefits to business: speed, consistency, precision, and reliability. Together, these information technology benefits allow businesses to respond quickly to an ever-changing …

  10. The Importance of Data

    Posted on in Information Systems

    Information Tools

    As fully vested members of the Information Age, we manipulate data everyday without really taking notice. Personal computers (PCs) are in our homes and personal digital assistants (PDAs) are in our pockets. These pieces of hardware were designed solely for the purpose of collecting and manipulating data. Hardware …

Slaptijack's Koding Kraken