Information Technology
One of the main sources of development of human beings is through the development of knowledge and in this exercise; we shall be talking about a group in our society who are mainly interested in the development of knowledge -- a university. In these organizations also, information technology now plays an important role as the storage and transfer of knowledge within the organizations and from outside the organization. In this, information technology has to play a major role.
In earlier times, it was felt that knowledge had to be accumulated over a lifetime, and this consisted of facts, events, procedures and other matters. This was stored in our memories, while today a lot of the storage takes place in the memory disks of computers whose capacity keeps increasing and it is the job of the information technology specialist who has to advise us on where the information is to be stored and when the time has come for changing our storage systems. Combined with this is the end of a situation in life where one concentrated on a single job throughout life, and today we have individuals changing their jobs as they develop, in search for better opportunities. In earlier situations, the knowledge available with an individual was lost when the individual left the organization. Today, it is being stored in the information technology sources and it is up to the information technology specialist to decide on the methods of storage, so that it can be collected by a potential user at later dates when he requires it. This is a question of managing the knowledge. (Knowledge Modeling Techniques for Developing Knowledge Management Systems)
At the same time, it has to be understood that the requirement of knowledge in a knowledge developing organization like an university is not the requirement of a continuous flow of knowledge from one point to another, but the requirement will be for an individual and it has to be made available to him immediately, according to his requirement. When this is done properly, it will help in solving the difficulties that research faces, developments made quicker, and innovative new ideas tested immediately. Thus one can say that the flow of knowledge is probably as important as the storage of knowledge. This is also an area where the information technology experts within the organization play an important role. (From Information Management to Knowledge Management: Are You Prepared?)
It is the group of people providing the required technological support to information technology that can keep all developments of information technology within an organization running in a manner that will provide support to each other and stop the exchange of information. It is clear that the intelligence of the developers of knowledge within a university that provides for the success of the organization in terms of fulfillment of the purpose for which it was set up. For this purpose, it is important that all knowledge developers be students, teachers, and researchers simultaneously. The skills of a student are required to learn the changed knowledge in a fast changing world, the skills of a teacher are required to be able to spread out the acquired knowledge among a large group who are collaborating in the developing of the knowledge and it is the research individual who will create the new developments as a university is expected to do. (Carvalho; Ferreira, 2001)
Another aspect of the function of knowledge management within any knowledge developing organization is also an area of research and practice as that is the culture of the organization and like all living and developing organization, the culture has to spread through all functions of the organization. Thus the process of knowledge management also has to deepen the understanding of processes of knowledge within the organization and develop required procedures and methods that will help in the transformation...
Migrate off of any individualized content management systems and processes not integrated to a single portal platform for greater cost and time savings in administration. Olson (32) provides an excellent case study on how universities are making use of open source portal applications to alleviate redundant and often conflicting data in multiple portals on an IBM WebSphere platform Define and build out a portal development plan that encompasses all shared processes
And this money is required to be raised from the market as the company does not generate this amount of revenue either from profits or from internal accruals. (DeHayes, 2003) 5. What should Tim do now? After taking into account all the known and understood pros and cons, there are some points on which Tim has to take action. These are (i) the manner in which to raise capital needed either
Information Technology in Peru The current environment in Peru is not conducive for huge IT investments The IT revolution has encouraged people to look for opportunities in different countries, particularly the third world countries which have been successful in providing the basic amenities at a cost lesser when compared to developed nations. This study is an effort to rank Peru as a possible IT destination for businesses that are planning to
Even if the vendor himself were honest, further character requirements should include professionalism, and punctiliousness with his tasks so that damaging errors, abuse, and misuse are not perpetrated due to sloppiness. An example, here, would be the password falling into the wrong hands due to the vendor's negligence in sufficiently protecting it (White Paper, 2004). The vendor, also, has to demonstrate concern for his client's objectives; there have been too many
IT Acquisition Management for a new Video Shop Individual Project Activities Identification of a problem Organization: Component: Showtime Video Store Business Capture Group The problem is that there is no real information technology security measure employed in the video shop. There is very little awareness of the necessary IT security measures amongst the current management heads which is why they need an effective IT security plan and structure to implement to ensure there is no copyright infringement
Network Security Management From the onset, it is important to note that for data to flow from one computer to another, such computers should be interconnected in what is referred to as a network. With such interconnectedness comes the risk of data interception and it is for this reason that network security is considered crucial. In the recent past, the number of corporations that have experienced attacks on their computing resources
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now