Search results
1 – 10 of over 71000Reinhard Budde and Heinz Züllighoven
Overviews the history of prototyping. Illustrates trends which havesupported the emergence of it. Comments on methods which are in linewith prototyping. Suggests future areas of…
Abstract
Overviews the history of prototyping. Illustrates trends which have supported the emergence of it. Comments on methods which are in line with prototyping. Suggests future areas of research and development. Explores the integration of prototyping into systems development which incorporates pre‐existing software.
Details
Keywords
Hubert Biskup and Karlheinz Kautz
Discusses problems related to software engineering taskmaintenance. Argues that since many scientists and practitioners haveregarded maintenance as divorced from development, it…
Abstract
Discusses problems related to software engineering task maintenance. Argues that since many scientists and practitioners have regarded maintenance as divorced from development, it is not properly embedded in project models. Relates four case studies. Looks at the range of maintenance tasks and strategies. Proposes a change of perspective that would make maintenance part of development. Advocates methods, tools and techniques as possible means of overcoming the problematic situation.
Details
Keywords
VINE is produced at least four times a year with the object of providing up‐to‐date news of work being done in the automation of library housekeeping processes, principally in the…
Abstract
VINE is produced at least four times a year with the object of providing up‐to‐date news of work being done in the automation of library housekeeping processes, principally in the UK. It is edited and substantially written by the Information Office for Library Automation based in Southampton University Library and supported by a grant from the British Library Research and Development Department. Copyright for VINE articles rests with the British Library Board, but opinions expressed in VINE do not necessarily reflect the views and policies of the British Library. The subscription for 1981 and 1982 for VINE is £20 for UK subscribers and £23 for overseas subscribers — subscription year runs from January to December.
Information and communication technologies (ICTs) have featured strongly in all the recent national foresight studies. This paper documents some of the common trends that emerge…
Abstract
Information and communication technologies (ICTs) have featured strongly in all the recent national foresight studies. This paper documents some of the common trends that emerge from a comparison of these different studies and attempts to draw some strategic conclusions. The first section charts their relative importance. The main trends identified in the national foresight studies are then discussed by main technological areas in turn: software, components and peripherals, advanced telecommunications and telematics applications. Finally, the third part of the paper, strong interactions that ICTs have with other technological disciplines is considered, especially in relation to new materials, nanostructures and bioinformatics.
Details
Keywords
Distributed computing systems impose new requirements on the security ofthe operating systems and hardware structures of the computersparticipating in a distributed data network…
Abstract
Distributed computing systems impose new requirements on the security of the operating systems and hardware structures of the computers participating in a distributed data network environment. It is proposed that multiple level (greater than two) security hardware, with associated full support for that hardware at the operating system level, is required to meet the needs of this emerging environment. The normal two layer (supervisor/user) structure may probably be insufficient to enforce and protect security functions consistently and reliably in a distributed environment. Such two‐layer designs are seen as part of earlier single computer/processor system structures while a minimum three/four‐layer security architecture appears necessary to meet the needs of the distributed computing environment. Such multi‐level hardware security architecture requirements are derived from earlier work in the area, particularly the Multics project of the mid‐1960s, as well as the design criteria for the DEC VAX 11/780 and Intel iAPX‐286 processor and its successors, as two later examples of machine structures. The security functions of individual nodes participating in a distributed computing environment, and their associated evaluation level, appear critical to the development of overall security architectures for the protection of distributed computing systems.
Details
Keywords
Bernt Ivar Olsen, Niels Windfeld Lund, Gunnar Ellingsen and Gunnar Hartvigsen
This conceptual article aims to discuss how the concept of a document and documentation along with a general document model could inform us in the design and engineering of…
Abstract
Purpose
This conceptual article aims to discuss how the concept of a document and documentation along with a general document model could inform us in the design and engineering of information or rather documentation systems.
Design/methodology/approach
This paper presents a broad and complementary document model, derived from the last couple of decades' discussion on what is a document and what is documentation. This model is used as a basis for a method, a conceptual tool or a template for analysis of socio‐technical systems.
Findings
The authors contend that the document systems analysis is a holistic approach compared to the traditional systems design and engineering reductionist approach, and also in the context of sociotechnical systems design. The document model is a taxonomy of the constituents of the document and, the authors argue, a potential communication tool in systems design.
Research limitations/implications
The document model presented in this article is discussed more or less solely in the context of information systems design, specifically sociotechnical systems. Moreover, the authors have tried to fit the theory and model within this context here, even though the concepts and thoughts can have much more general implications.
Practical implications
This presentation of a novel document model and framework is presented as a potential tool for systems analysis and design. The authors regard this as a realistic vision for the framework, but at the current stage of development for the model it is probably more useful as draft for such a tool or framework; a point of departure for the discussion of practical – and theoretical – implications of a broad and holistic document model.
Originality/value
A novel, unpublished document model, derived from theoretical discourses of document ontology in the “neo‐documentalist” movement spawned from a particular research community in Tromsø, Norway, is presented and discussed in the light of information systems design.
Details
Keywords
VINE is produced at least four times a year with the object of providing up‐to‐date news of work being done in the automation of library house‐keeping processes, principally in…
Abstract
VINE is produced at least four times a year with the object of providing up‐to‐date news of work being done in the automation of library house‐keeping processes, principally in the UK. It is edited and substantially written by the Information Officer for Library Automation based in Southampton University Library and supported by a grant from the British Library Research and Development Department. Copyright for VINE articles rests with the British Library Board, but opinions expressed in VINE do not necessarily reflect the news and policies of the British Library. The subscription for VINE in 1981 will be £20 for UK subscribers and £23 for overseas subscribers — the subscription year runs from January to December and VINE is available in either paper or microfiche format.
The following is an introductory profile of the fastest growing firms over the three-year period of the study listed by corporate reputation ranking order. The business activities…
Abstract
The following is an introductory profile of the fastest growing firms over the three-year period of the study listed by corporate reputation ranking order. The business activities in which the firms are engaged are outlined to provide background information for the reader.
Peter Blakey, Chris Phillips and Julie Bunnell
Training is a critical factor in enabling users to make effective use of their computers. A variety of training methods have been proposed in the literature. These training…
Abstract
Training is a critical factor in enabling users to make effective use of their computers. A variety of training methods have been proposed in the literature. These training methods will be considered within the framework of procedural and conceptual training, with special reference to their application in the training of novice end users in the use of applications software. The impact of learning styles and other user characteristics on the selection of training methods for use in this area is discussed. Finally, a current research programme to explore the effectiveness of training methods for novice end users is briefly described.
Details
Keywords
Hussein A. Abdullah and Chris R. Chatwin
The adoption of integrated computer‐based manufacturing and managementtechniques by small, traditional engineering companies often representsan unaffordable and high risk…
Abstract
The adoption of integrated computer‐based manufacturing and management techniques by small, traditional engineering companies often represents an unaffordable and high risk investment strategy in technology that is often not well understood by its recipients. Paradoxically, the opportunity for complete success in a small to medium‐sized enterprise (SME) is greater than in a large company which very often is incapable of full integration due to the divisions and inertia implicit in a large hierarchical organization. To derive full benefits from such an investment the company must possess a meticulous understanding of its market, fiscal environment, operations management, engineering and technological skills, manufacturing facilities and product range. It must adopt an appropriate implementation of CIM that does not debase previous ad hoc investments in what are often termed islands‐of‐automation or information technology. For success a well‐planned stepwise approach is vital. Reports on the approach adopted by a small to medium‐sized Scottish engineering company specializing in the production of mechanical actuation systems. Over a three‐year period the company embarked on a low‐cost, phased implementation of software and hardware systems that exploit a database to integrate its design, manufacturing the business operations. A major element in these systems is the distributed Command, Communication and Control (C3) environment which has transformed the effectiveness of operations. The company′s investments were based on a prudent assessment of its current and planned product range, existing and planned manufacturing facilities, the scale of its operations and business objectives.
Details