Reducing Transaction Costs with GLW Infrastructure

Author(s):  
Marcus Vinicius Brandão Soares

This chapter introduces the hybrid GLW information infrastructure as an alternative to proprietary-only information infrastructures with lower costs. The author argues that the use of FLOSS servers in a client- server infrastructure reduces the transaction costs relative to the data processing and the contract management that organizations have to support, preserving the investment already made with the installed base of clients in comparison to the use of proprietary managed servers. Transaction costs of two realworld proprietary infrastructures, Netware 5.0 and Windows NT 4.0, and of GLW, all with Windows 98 clients, are described and compared to give elements for the reader to analyze and decide.

Author(s):  
S. Suhak ◽  
L. Shabanova-Kushnarenko ◽  
M. Siruk ◽  
N. Bihun ◽  
A. Mishchenko

Nowadays, the development of information technologies determines the successful functioning of the political system, since they allow to control political processes, prevent social and political conflicts. Increasing the level of reliability of the information, the most effective use of information resources, external and internal information ropes increase the stability of the political system, stability of the socio-political development of the country. The combination of different telecommunication technologies that create the preconditions for building flexible and high-performance service-oriented systems can be used to solve problems in different industries. However, nowadays, one of the constraints on the implementation and further development of such networks is the theoretical under-development of service delivery models, due to the lack of comprehensive information on the structure of data center networks. During the research conducted by the authors, it was found that the data processing center is the basis for informing the defense ministry of Ukraine. During the research, the authors used general scientific methods of analysis and synthesis, as well as the basic provisions of the theory of informatics, the theory of complex technical systems, the theory of information, etc. During the research, the authors substantiated the main tasks that will be performed by the data processing center of the defense ministry of Ukraine, identified the main information and calculation tasks that will be performed by them. The authors also substantiated the requirements for building a data center of the Defense Ministry of Ukraine. The authors evaluated modern technological solutions and software and hardware for the creation of the information infrastructure of the defense ministry of Ukraine. Possible technical and software for building a reliable and secure data processing center of the defense ministry of Ukraine are proposed. Therefore, the prospective direction of further scientific research of the authors should be considered the justification of ways of improvement of informatization of the armed forces of Ukraine and the creation of information infrastructure of the defense ministry of Ukraine are mobile data centers. This will allow the deployment of information infrastructure in various conditions, including in the open space, which is very relevant for the specifics of actions in the east of Ukraine.


Web Mining ◽  
2011 ◽  
pp. 228-252 ◽  
Author(s):  
Mohamed Salah Hamdi

Rapidly evolving network and computer technology, coupled with the exponential growth of the services and information available on the Internet, has already brought us to the point where hundreds of millions of people should have fast, pervasive access to a phenomenal amount of information, through desktop machines at work, school and home, through televisions, phones, pagers, and car dashboards, from anywhere and everywhere. The challenge of complex environments is therefore obvious: software is expected to do more in more situations, there are a variety of users (Power/Naive, Techie/ Financial/Clerical, ...), there are a variety of systems (Windows/NT/Mac/Unix, Client/Server, Portable, Distributed Object Manager, Web, ...), there are a variety of interactions (Real-time, Data Bases, Other Players, ...), and there are a variety of resources and goals (time, space, bandwidth, cost, security, quality, ...). To cope with such environments, the promise of information customization systems is becoming highly attractive. In this chapter we discuss important problems in relationship to such systems and smooth the way for possible solutions. The main idea is to approach information customization using a multi-agent paradigm.


This chapter builds on the discussion in Chapter 1 by tracing the evolution of the concept of infrastructure into the concept of information infrastructure. The key objective is to describe in detail how different researchers have approached the notion from varied perspectives in their efforts to understand information infrastructure and its role in organizational transformation and practice. The objective is to clarify the distinct aspects of information infrastructures in relation to other information systems, whilst also to identify opportunities for constructing contributions in the existing literature. This chapter concludes with a summary of some key observations emerging from this critical literature review and identifies some implications for the theoretical approach adopted in the rest of this book.


Author(s):  
Nadianatra Musa ◽  
Vishv Malhotra ◽  
Trevor Wilmshurst

Information infrastructures and resources has become critical component of the modern business and non-business organizations. In turn this dependence makes these organizations vulnerable to any significant failure in their information infrastructures and resources. Literature is full of examples of the companies suffering major losses and even demise as a result of information infrastructure and resources failures. To mitigate this vulnerability the senior management and governance of the organizations needs to pay direct role and attention to protect their critical information infrastructures and resources. This paper provides some results of a study we conducted recently to determine how the senior management of Malaysian business organizations view and control the information infrastructure and resources in their organizations to mitigate vulnerabilities to this critical component of their business organization.


Author(s):  
Qiyang Chen ◽  
John Wang

Embracing inapt infrastructure technology is a major threat in developing extensive and efficient Web-based systems. The architectural strength of all business models demands an effective integration of various technological components. Middleware, the center of all applications, becomes the driver—everything works if middleware does. In the recent times, the client/server environment has experienced sweeping transformation and led to the notion of the “Object Web.” Web browser is viewed as a universal client that is capable of shifting flawlessly and effortlessly between various applications on the Internet. This paper attempts to investigate middleware and the facilitating technologies, and point toward the latest developments, taking into account the functional potential of the on-market middleware solutions, as well as their technical strengths and weaknesses. The paper would describe various types of middleware, including database middleware, Remote Procedure Call (RPC), application server middleware, message-oriented middleware (MOM), Object Request Broker (ORB), transaction-processing monitors and Web middleware, etc., with on-market technologies.


Author(s):  
Antonio Cordella

Recent work on information systems has discussed the nature and the complexity of the Information Infrastructures (II) concept. This research has mainly focused on two aspects: studying the process that both shapes and stabilizes information infrastructures, and studying the role played by information infrastructure in leveraging business performance. Using the ideas proposed by the Actor Network Theory (ANT), this article suggests a new way to conceptualise the nature of II, that is, its ontology. Using ANT as an ontological foundation to analyse the relations among actors, the article proposes the concept of information infrastructures in action to highlight their dynamic nature. This leads us to consider information infrastructures not as stable entities, but rather as entities performed in, by, and through relations. The aim of this work is to overcome the limitations associated with studying information infrastructures that rely on stability and manageability assumptions. Conceiving information infrastructures in terms of performative forces that evolve dynamically, this work provides a framework to examine information infrastructure in terms of dynamic relationships by looking at the process that shapes these relationships. The article suggests that information infrastructures should not be studied retrospectively to understand how they are established, but rather should be studied focussing on the process of making. Here we study the action of making rather than the processes that made.


2017 ◽  
Vol 13 (3) ◽  
pp. 80-91
Author(s):  
Scott Winnard

Information technology (IT) tends to be viewed as ancillary to core government functions. Consequently, IT is often outsourced to the private sector. Unfortunately, there is a long line of failed outsourced projects. This article uses two New Zealand case studies, the particularly public failure of the recent school payroll system and the successful introduction of electronic immigration processing, to examine how the design and governance of outsourced government IT projects could be improved. It concludes that an awareness of historic trends is important for project success, that governments need to be more active in combating market based transaction costs and that contract management becomes a core government competency when projects are outsourced. It also argues that better change management and cognisance of design-reality gaps would positively impact the outcomes of future projects.


1998 ◽  
Vol 7 (2) ◽  
pp. 79-95 ◽  
Author(s):  
Stefan Deßloch ◽  
Theo Härder ◽  
Nelson Mattos ◽  
Bernhard Mitschang ◽  
Joachim Thomas

2019 ◽  
Vol 1 (2) ◽  
pp. 7-12
Author(s):  
Larissa Navia Rani ◽  
Hari Marfalino ◽  
Putri Asysyura Yuska

The rapid development of computer technology and information greatly helps work in storing, accessing to data processing becomes faster and easier, this has triggered various fields in utilizing this with the use of computer-based information systems, especially for intelligence units in western security police. The system that will be created uses access to the virtual host-based client server. Modeling used UML modeling, this system is built using PHP programming language and MYSQL database. The results of the study show that the information system designed can process criminal data and is able to be implemented at the research site..


Author(s):  
Rio Yunanto ◽  
M Munayah ◽  
Ony Widilestariningtyas

Yayasan Pembina masjid (YPM) Salman ITB is the foundation that manages the activities of religious service. The process of recording transactions in both of revenue and expenditure on the ledgers are still using Microsoft Office Excel as a tool for data processing. Financial statements prepared by the YPM Salman ITB is not fully using the islamic principles. For these problem the writer take the title "Design Of Financial Statement Accounting Information System Using Microsoft Visual Basic 2008 Software and MySQL Based Client Server" with islamic principles.


Sign in / Sign up

Export Citation Format

Share Document