0% found this document useful (0 votes)
5 views4 pages

Isss

Uploaded by

eventschronical
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views4 pages

Isss

Uploaded by

eventschronical
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Application Portfolio

Application portfolio management (APM) is a framework for managing enterprise IT software


applications and software-based services. APM provides managers with an inventory of an
organization's software applications and metrics to illustrate the business benefits of each
application.

Benefits

Application Portfolio Management (APM) involves:

• Establishing, collecting, and tracking metrics to evaluate and compare applications based
on empirical data.
• Creating an informed inventory of the application landscape, detailing business capabilities,
total cost of ownership, supported applications, and lifecycle management.
• Requiring business and project management professionals to monitor application usage
patterns, values, and costs over time.
• Providing evidence to developers, stakeholders, and management regarding the relative
value, utility, and costs of applications and services within the organization's IT environment.

Application Software

is a type of computer software designed to help users perform specific tasks or activities. Unlike
system software, which runs and manages the computer hardware and provides a platform for
applications to run, application software is focused on user-centric tasks.

Overview of Application Software

Proprietary software - is custom-designed for a specific application and owned by the


company, organization, or individual using it. It can provide a competitive advantage by offering
unique services or solutions that outperform competitors' methods.

Off-the-shelf software - is mass-produced by vendors to meet common needs across various


businesses, organizations, or individuals. For example, many businesses, including Amazon,
use standard payroll software. However, Amazon also uses custom-designed proprietary
software on its website to help visitors find items more easily.

1
Programming Languages
The purpose of programming languages is to provide instructions to a computer system so it can
perform processing activities. Information systems professionals use these languages, which
consist of keywords, symbols, and rules, to construct statements that communicate
instructions to the computer. Each programming language uses symbols, keywords, and
commands that have specific meanings and usage. These elements form the syntax and
semantics of the language, allowing programmers to write instructions that the computer can
understand and execute.

Types of Programming Languages


High-Level Languages:

• Examples: Python, Java, C++, JavaScript.


• Characteristics: Closer to human language, easier to read and write, abstracted from
machine code.
• Usage: Web development, software applications, data analysis.

Low-Level Languages:

• Examples: Assembly language, machine code.


• Characteristics: Closer to machine language, less abstract, more difficult to read and write.
• Usage: System programming, hardware interfacing.

Scripting Languages:

• Examples: Python, JavaScript, Ruby, PHP.


• Characteristics: Often interpreted rather than compiled, used for automating tasks.
• Usage: Web development, automation, data processing.

Markup Languages:

• Examples: HTML, XML, Markdown.


• Characteristics: Used to define and format the structure of text and data.
• Usage: Web pages, data interchange.

Query Languages:

• Examples: SQL.
• Characteristics: Used to manage and manipulate databases.
• Usage: Database management, data querying.

Domain-Specific Languages (DSLs):

• Examples: MATLAB (for mathematics), R (for statistics), Verilog (for hardware description).
• Characteristics: Designed for specific application domains.
• Usage: Specialized fields like data science, hardware design.

2
Evaluating IS
Once an information system is implemented, management often assesses its success in
achieving goals, though many businesses rely on informal evaluations. Businesses can use
productivity metrics, return on investment (ROI), net present value, and other performance
measures to evaluate the contributions of their information systems.

Productivity

is measured as the ratio of output achieved to the input required. Higher productivity indicates
achieving more output with less input, while lower productivity indicates achieving less output
with the same input.

Return on Investment

is a measure of Information Systems (IS) value that evaluates the additional profits or benefits
generated as a percentage of the investment in IS technology. It quantifies the efficiency and
profitability of the investment by comparing the net gains or benefits to the cost incurred.

Risk

Managers evaluating new or modified information systems should consider not only return on
investment (ROI) but also the inherent risks involved in their design, development, and
implementation. Examples of costly failures include unsuccessful ERP implementations and e-
commerce applications that fail to deliver expected benefits, underscoring the need to assess
whether the costs incurred outweigh the potential returns from these systems.

3
Networks
Networks facilitate electronic communication by connecting computers and equipment within
a building, across a country, or globally. Investment firms utilize wireless networks to link
investors with brokers or traders, while hotels use them to provide guests with internet access,
retrieve voice messages, and exchange emails wirelessly. Additionally, wireless transmission
supports remote control systems for drones like Boeing's Scan Eagle, enabling surveillance of
buildings and other areas without physical connection to a phone socket.

Types of Networks
Local Area Network (LAN):

• A LAN connects devices within a limited geographical area, such as a single building or
campus.
• Used for sharing resources like printers and files, and for enabling local communications.

Wide Area Network (WAN):

• A WAN spans larger geographical areas, often connecting multiple LANs or other networks
over long distances.
• Used to connect offices in different cities or countries, and to access centralized resources.

Wireless LAN (WLAN):

• A WLAN uses wireless technology (Wi-Fi) to connect devices within a limited area, similar to
a LAN but without physical cables.
• Commonly used in homes, offices, and public spaces for mobile device connectivity.

Metropolitan Area Network (MAN):

• A MAN covers a larger geographic area than a LAN but smaller than a WAN, typically within a
city or metropolitan area.
• Often used by service providers to provide high-speed connectivity to businesses and
residences.

Virtual Private Network (VPN):

• A VPN creates a secure, encrypted connection over a public network (e.g., the internet),
allowing remote users to access a private network as if they were directly connected.
• Used for remote access, secure communication, and bypassing geographical restrictions.

You might also like