Dividing Computer Duties and Resources
As you plan your workgroup network, you should think about which computers will perform certain tasks in the network. Some tasks include file storage, Internet access, backing up data files, and resource usage. Use the best computer for each job so that the entire network will run efficiently and economically. The first thing you should consider is which computers will be on and available most of the time. Before anyone can use a computer and its resources, of course, that computer must be turned on. This should help you decide computer and resource placement.
After all, you may not want to run upstairs to turn on a computer every time you want to use its CD-ROM drive or printer. When you’re finished, you have to run back upstairs to turn off the computer again. Other items to consider include computer memory, disk space, and specialty hardware for use with resources. In addition to using computers that operate efficiently, you may need to add hardware to computers that will perform special network tasks
Assigning computer duties
Depending on the computers you plan to connect to the network, you’ll want to decide which computers perform certain tasks on the network. You may want each computer to store its own files, for example, or you may have one exceptionally large hard drive that can hold everyone’s extra files.
Making Basic Network Choices
A home network with multiple options for file storage and backups. The computer with the Zip drive might be used for saving graphic files, for example. The computer with the tape drive can back up everyone’s data files. And the computer with the largecapacity hard disk can contain folders in which each user can store his or her files, as well as folders for storing applications, Internet files, and other shared files. First, determine the duties you expect from your computers. A computer can store files— word processing, database, graphics, application, data, and other files—for any or all of the users on the network.
A computer also can store backup files for any or all of the computers on the network. The difference between normal file storage and backup file storage not only determines the amount of hard disk space used but also influences network traffic. If you store your data files on your spouse’s computer, for example, you will have to access your spouse’s computer when you need the files. Each time you open or save a file, you create network traffic and use your spoue’s computer resources, even if it is for only a moment or two. In addition, your spouse’s computer will need to be turned on whenever you need files. On the other hand, when you back up your files to your spouse’s computer, you probably will not need to access the files at all. Generally, you need to access a backup only if something happens to your original files—corruption, disk failure, and the like. The process of backing up, however, takes longer than just saving one file to another computer.
Disk space
You need to consider each computer’s hard disk space before deciding which computer to use for file storage and backups. A computer with only 2 to 5GB of disk space cannot reasonably store many graphics files or music files, for example. However, a 2 to 5GB drive could comfortably store word processing and spreadsheet documents, in addition to several applications. Most new computers come with much larger hard drives now. It’s not unusual to see drives that offer 40, 60, 80, or more gigabytes of space. Depending on your computer’s hard disk space, you might want to divide the file storage duties. You could back up all files to one computer, or back up your files to your spouse’s machine, your spouse’s files to your son’s machine, and your son’s files to your machine. Plan ahead, depending on the hard disk sizes of your computers.
Computer power and memory
Consider, too, the power and memory of each computer on the network. A very slow machine, such as a 300 MHz, might not be the appropriate choice for containing files that need to be accessed often. Such a computer slows down the rest of the network when accessed frequently. Similarly, computers with less memory react more slowly than those with more memory. Reserve the Windows 98 computer with only 64MB of RAM and a Pentium II processor for network jobs that aren’t processor- and memory-intensive. Use the Windows XP Professional computer with 256MB of RAM and a Pentium IV processor for backing up files quickly and effectively.
Dividing resources
The members of a workgroup network act as both the client and the server. As a server, each computer shares its files and resources; as the client, each computer partakes of the others’ resources. You must consider the resources you’ll be using on the network. You can assign resources—such as printers, scanners, storage devices, and so on—to certain computers in your network so that everyone has access but no one computer is burdened by the load. The laser printer is located on the first floor of the house because there are two computers downstairs and only one upstairs. The scanner, on the other hand, is upstairs because the teenager uses it the most and that computer has the appropriate hardware to run the scanner. The other two computers are on the network, however, so they can access scanned images anytime from the teenager’s computer. For each resource you add to the network, you must determine which computer best suits that resource’s requirements.
Consider the requirements for scanners, printers, CD-ROM drives, modems, and others. Remember, too, that when you share a resource, the computer attached to that resource will take a performance hit whenever the resource is being used. When you install a scanner on a computer, you also need to install an adapter card and scanner software. That means the computer on which you install the hardware must have a free slot for the adapter card and room enough for the scanning program. Scanned images create large files, so you’ll need plenty of storage space. Additionally, scanning requires substantial memory and processor speed. The computer to which you install a modem and with which you connect to the Internet also must have considerable memory and processor speed for quick and easy access. The software for sharing an Internet account has special requirements; alternatively, you can use a piece of hardware (called a router) to share Internet connections.
Temporary Internet files and cookies take up a lot of disk space as well. Cookies are identifiers saved on your hard disk during your visits to various Web pages. Software on the Web sends the cookie to collect information—such as your name, e-mail address, site password, and so on—and then logs that information on your hard disk. The next time you visit that particular site, software from the site recalls the cookie so that it knows who you are. Most cookies are harmless. If you use a Web connection on your small-business network, you should certainly employ some sort of security. It’s common for crackers to break into local networks from the Internet and pilfer business records, confidential files, payroll information, and more. The cracker could be your competition, a disgruntled employee, or even a kid experimenting with applications built for cracking systems.
Consider using software such as a firewall or a proxy server. You may prefer to back up files or store files on a CD drive, Zip drive, or other mass storage device. When deciding whether to attach the storage device to a computer, check compatibility as well as requirements. Tape drives are often difficult to install on some computers, for example. CD drives are easy to use, inexpensive, and popular for storing and backing up files.
Understanding the Limits of Workgroup Networking
Workgroup networks offer many advantages for the home network. You can share resources and files with other users, read each other’s schedules, learn about e-mail, and share an Internet access account, for example. You also can experience some real problems with a workgroup network.Workgroup networking can place a strain on individual computers and on resources, especially if the requests for use of the resource or network traffic is high. Also, workgroup networking offers little security for your files and data, and it limits the number of people you can attach to the network. Understanding the limits of a workgroup network will help you determine some solutions to the problems.
Considering performance
Your network performance depends on many issues. You should make sure that you have sufficient computer power, and you need to consider the networking equipment you’ll use. The most positive aspect of performance is that you can always upgrade your equipment. In home networking, you can begin building your network with even the most minimal computer and networking equipment. After you use the network for a while, you can decide if the performance is adequate for your needs. For this plan to work, however, you need to be sure your initial purchases are upgradable. For example, if you purchase a computer, check to see if you can add additional hard disks, if you have plenty of slots for adapter cards, and if the memory is easy to find and upgradable. With your network hardware purchases, you also should plan ahead. When you buy network cards, buy cards that fit several different cabling types and speeds, if possible. When you buy cabling, don’t limit your upgrade choices.
Thinking about security issues
You probably won’t need to worry too much about security issues in your home network. You most likely trust your spouse and your children with any information on the network. There are, however, a few issues to consider.
- First, accidents happen. Someone could access your hard disk accidentally and delete a few files, a folder or two, or your entire hard disk’s contents. This kind of potential problem is a security issue.
- Second, a child could always bring home a friend who fancies him- or herself a hacker. It’s not too unlikely that such a kid could access and then alter, delete, or just read your private files.
- Third, if you have an Internet connection, the possibility always exists that someone could crack your system and compromise your data. Most operating systems provide some safety measures that can protect your files from access by others on the network. You can choose which files to share and which remain private.
Also, applications are available that enable you to control other computers on the network so that files, settings, and configurations are not accessible by anyone without a password. Finally, you can add software to your network to help protect it from intruders via the Internet.
Limiting the number of users
As you know by now, a workgroup network limits the number of users you can add to your network. Ten users are the most you can connect before you start to see a major deficit in performance. Even if you have fewer than ten users, you can experience performance problems. Three or four users who use network resources heavily can slow down performance and hinder everyone’s computer and network operation. If you have any idea at all that you’ll be adding more users or heavy-usage users to your network, consider using high-performance networking equipment, such as Ethernet or Fast Ethernet. You also should consider using a client/server network. Ethernet and Fast Ethernet are networking technologies that provide speed and superior performance.
A client/server network may better serve your needs by using a dedicated server and specialized software . Troubleshooting a workgroup network is fairly easy. First, a workgroup network has only a few users and computers to check when something goes wrong. Second, after the initial setup, only a few things can go wrong to make the network stop working. As far as administering a workgroup network is concerned, your job will be easy.
Making Basic Network Choices
Solving workgroup networking problems depends on the hardware you use to build your network. Unless someone changed the configurations, the problem isn’t likely to be in the networking software. When a connection or access problem occurs, you should check all connections to the network: A cable or network card could be the problem. Replacing these networking items is quick and easy.
Understanding Internet Access
Most homes with PCs have at least one Internet account. Kids might use the account to play games, to e-mail friends, and to gather information for school. Mom and Dad might use the Internet to e-mail family and friends, look for prices on golf carts and digital cameras, read the news, check the weather, make stock investments, bid on auctions, and more. Perhaps one or more family members want to create a Web page or subscribe to e-zines (electronic magazines). This site advertises entertainment links to music, games, and movie clips. You can even design your own Web pages to put on the Web. Add to home and personal use the fact that many people work in their homes instead of in a traditional office. People working in home offices need the Internet for a variety of reasons—checking competitors, advertising with their own Web pages, e-mailing customers, sending and receiving work-related files, and perhaps even running an e-commerce site. Internet access is easier and cheaper than it’s been in years past. Most computers come with built-in modems; or you can easily add an external modem for less than $60. There are also DSL and cable modems available in most areas of the country. All Windows versions have built-in Web browsers and e-mail programs. Most Macs also have built-in browsers and e-mail. Local and national ISPs offer deals to attract more home users.
Exploring advantages and disadvantages of Internet access
The Internet affords the possibility for anyone with a connection to access data from any other Internet connection in the world for a fraction of the cost of traditional data collection methods. Internet access and use are growing at an incredible rate. Anything so nearly infinite certainly has many disadvantages as well as advantages.
Advantages
One of the biggest advantages of Internet connections, as previously mentioned, is the availability of the technology to nearly everyone. Home users now can afford to attach to the Internet by using a standard PC that comes with a modem and the Windows operating system. The only other thing that is needed is the Internet connection. If you already have cable TV, you can add a cable modem with a faster Internet connection than dial-up for around $45 a month. If you already have a network in your home, you have the built-in equipment for sharing an Internet connection. All you need to buy is an inexpensive piece of software or hardware that enables you to share one connection and one Internet account. You don’t have to purchase additional cabling, modems, or other equipment to attach everyone in the home to the Internet.
Following are some of the advantages to using the Internet for the home user:
- Using the Internet promotes cooperative learning. Your kids can e-mail and share files with universities, libraries, research groups, and others. Users send links to useful Web pages to each other and sign up for informational newsletters and papers.
- Internet users can read about, study, and e-mail people from all over the world to share information and opinions. The Internet also increases access to experts; you can locate authors, scientists, doctors, and others easily through their Web pages or e-mail.
- The Internet access increases motivation. The Internet encourages exploration with a wealth of video, music, animations, and more.
Disadvantages
Naturally, having Internet access in your home also has disadvantages. Many people worry about the type of Web sites and information children access when they are not monitored. Sex, violence, and depraved individuals run rampant over the Internet community. Also at risk is the security of your home. Depending on the information you give out on the Internet, unstable or unscrupulous intruders can invade your home through the Internet or even in person. It’s a scary world, and you might be inviting it into your living room every time you access the Internet.
Other disadvantages include the following:
- The Internet wastes a lot of time. Surfing the Web, joining chat rooms, e-mailing list after list of people and groups—they all take time. Whether it’s a child or an adult who is accessing the Internet, time and exposure should be reasonable and often limited.
- The expense of attaching to the Internet can increase as you discover you need more power, multimedia equipment, and other technologies that enhance the Internet experience. Upgrading hardware and software for Internet use can become addictive.
- Depending on your e-mail and Web access for business or personal use is a risky business. ISP connections and services are always subject to failures; you must make sure that you have an alternative when connections break down and services fail.
- Viruses, worms, and Trojan horses attack almost constantly over the Web and through e-mail. Your computer, data, and even networked computers can be at risk from these pests.
Looking at Internet services
If you’ve ever surfed the Net, you know there’s a world of products and services at your fingertips. You also know that you can find information on just about anything, if you know where to look. After you locate the information, you can share it in many ways over the Net. What’s available You can find just about any type of information you want on the Internet. Not only can you find the popular sales and service Web sites, but also you can take advantage of years of research, studies, reports, and surveys. Following are a few of the things you can explore over the Internet:
Find out information about society and culture. Learn about life in foreign countries or in the United States. Study geography, religion, politics, and the people of present cultures or past ones. Examine archaeology, economics, and languages. Learn about biology, astronomy, and other sciences.
- Visit libraries all over the world. Find definitions and dictionaries, quotes, and anthologies. Study the biographies of famous and infamous people who are living today or who are a part of history.
- Read the news, check the sports, and keep an eye on the weather. Learn where the next war will break out and who is testing nuclear weapons in the world. Find out what your governor or state legislature is doing right now.
- Read famous works of literature, view prominent artwork, listen to a symphony. See the latest photography exhibit in Washington, DC, or visit a museum in Kansas.
- Research the latest movies, as well as movies of the past. Play games, read jokes, and connect with others interested in the same hobbies as you.
- Learn about the newest advances in medicine. Read about the medications you’re taking. Find out how to keep fit and eat well. Get government forms, tax information, grant applications, stamps, and information about city, county, state, federal, and international government.
- Find a job. Post your resume. Inquire about openings all over the country and the world. You can register your Web page with various search engines so that anyone searching for a computer book author, for example, can find your resume easily. The Internet has something for everyone, no matter what your question or interest.
Acquiring the information
In addition to supplying enormous amounts of information, the Internet enables you to transfer the information in various ways. In addition to printing data so that you can read it at your own pace, you can transfer the information electronically.
You can send the information you find to another user via e-mail. Attach a file or a link so that you can share any Web site with someone else. Discuss topics, pool resources, and share ideas—all with the click of a mouse. You can send messages to friends and family all over the world with just the click of the mouse.
Chat programs
You also can exchange information over the Internet by using chat programs. Whereas e-mail sometimes must wait until the recipient receives and responds to your message, chat programs connect two or more people online at the same time.
File transfer
Transferring files over the Internet is a quick and easy method of acquiring updates, applications, documents, and other files. You can purchase and download a program, such as a game, a piece of shareware, accounting packages, utilities, and network management software. Many vendors supply free demos of their applications so that you can try it before you buy it. You also can download updated drivers and software for your computer or network. In addition to downloading files from the Internet, you can upload files. Many companies use a special site for their remote employees to send files. You might upload a file to a technical support company, for example, or reports to universities, or documents to friends.
File transfers over the Internet are faster and cheaper than transporting a floppy disk or using snail mail to send files. Conferences and meetings Current technology enables people to hold meetings with colleagues and business associates. NetMeeting, a Windows application, is but one of these programs. Although conferencing software is similar to chat rooms, it also offers features that chat programs do not Some business meeting software, for example, enables the participants to engage in phone conversations at the same time; sometimes videoconferencing is also built in.
Whiteboards are often used to take notes and organize ideas during a meeting; everyone can see the information on the whiteboard, add to it, and modify it. Although conference and meeting software generally is used for business contacts, you easily could use it on your home network too.
Controlling the engine is the most processor- intensive job on your car, and the engine control unit (ECU)is the most powerfil computer in most cars. the ECU uses closed-loop control, a control scheme that monitors outputs of a system to control the inputs to a system, mananing the emissions and fuel economy of the engine (as well as a host of other perameters). Gathering data from dozens of different sensors, the ECU knows every thing from coolant temparature to the amount of oxygen in the exhaust. with this data, it performs millions of calculations each second, including looking upm values in tabels, calculating the results of long equations to decide the best spark and timing and determining how long nthe fuel injector io s open. The ECU does all of this to ensure the lowest emissions and best millage.
A modern ECU might contain a 32 bit, 40 MHZ processor. this may not compared to the 500 to 1 MHZ processor you probably have in your PC, but remember that the processor in your car is running much more efficient code then the one of yiur PC. the code is in average ECU takes up less than 1 megabite( MB) of memory. by comparision, you probably have atleast two gigabytes (GB) of programs on your computer --- thats 2000 times the amount in ECU.
Basic Parsing Technique
Here we discuss the two most common forms of the parser – operator precedence and recursive decent.operator precedence is especially suitable for parsing expression, since it can use information about the precedence and associativity of the operator to guide the parse. Reecursive descent parser uses a collection of mutually recursive routines to perform the syntax analysis.the great bulk of compilers in existence in the early 1970’s use one or both of these methods. A common situation is for operator precedence to be used for expression and recursive descent for the rest of the language.
The primary advantage of these methods is that they are easy to implement by hand. But there are drawbacks as well. Operator precedence has the curious property that if one is not careful, one can recognize inputs that are not in the language of the underlying grammar. Likewise, recursive descent, particularly when augmented with backtracking, can produce rather unexpected results.
Fortunately, there are two newer methods gaining popularity that are both more general than the older methods and more firmly grounded in grammar theory. The first of these methods, LL parsing, will be mentioned in this article, as it is really a table-based variant of recursive descent.
Parser
A parser for grammar G is a program that taken input as string w and produces as output either a parse tree for w, if w is a sentence of G, or an error message indicating that w is not a sentence of G often the parse tree is produced in only a figurative sense; in reality, the parse tree exist only as a sequence of actions made by stepping through the tree construction process.
This article discusses the operation of two basic types of parser for the context-free grammar-Bottom-up and Top-down. As indicated by their names, bottom-up parser build parse tree from bottom to the the root, while top-down parser starts with the root and work down to the leaves. In both cases the input to the parser is being scanned from left to right, one symbol at a time.
The bottom-up parsing method we discuss is called “shift-reduce” parsing because it consist of shifting input symbols onto a stack until right side of the production appears on the top of the stack. The right side may then be replace by (reduced to) the symbol on the left side of the production, and the process repeated.
Unfortunately, if A->XYZ is a production, then not every time that XYZ is on the top of the stack is it correct to reduce XYZ to A; there may be occasion where it Is necessary to continue to shift input symbols on the top of XYZ. Designing an algorithm from a grammar so that shift-reduce decisions are made properly is the fundamental problem of bottom-up parser construction.
SLR parsing
A problem with LL(1) parsing is that most grammars need extensive rewriting to get them into a form that allows unique choice of production. Even though this rewriting can, to a large extent, be automated, there are still a large number of grammars that can not be automatically transformed into LL(1) grammars.
LR parsers is a class of bottom-up methods for parsing that accept a much larger class of grammars than LL(1) parsing, though still not all grammars. The main advantage of LR parsing is that less rewriting is required to get a grammar in acceptable form for LR parsing than is the case for LL(1) parsing.
Furthermore, LR parsers allow external declaration of operator precedences for resolving ambiguity, instead of requiring the grammars themselves to be unambiguous.
we limit the discussion to SLR for the following reasons:
• It is simpler.
• In practice, LALR(1) handles only a few more grammars than SLR.
• When a grammar is in the SLR class, the parse-table produced by a SLR parser generator will be identical to the table produced by a LALR(1) parser generator.
• Understanding of SLR principles is sufficient to know how to rewrite a grammar rejected by a LALR(1) parser
If the input text does not conform to the grammar, there will at some point during the parsing be no applicable actions and the parser will stop with an error message. Otherwise, the parser will read through all the input and leave a single element (the start symbol of the grammar) on the stack. LR parsers are also called shift-reduce parsers. As with LL(1), our aim is to make the choice of action depend only on the next input symbol and the symbol on top of the stack.
Conflicts in SLR parse-tables
When reduce actions are added to SLR parse-tables, we might add one to a place where there is already a shift action, or we may add reduce actions for several different productions to the same place. When either of this happens, we no longer have a unique choice of action, i.e., we have a conflict. The first
situation is called a shift-reduce conflict and the other case a reduce-reduce conflict. Both may occur in the same place. Conflicts are often caused by ambiguous grammars, but (as is the case for LL-parsers) even some non-ambiguous grammars may generate conflicts. If a conflict is caused by an ambiguous grammar, it is usually (but not always) possible to find an equivalent unambiguous grammar. But even unambiguous grammars may in some cases generate conflicts in SLR-tables.
In some cases, it is still possible to rewrite the grammar to get around the problem, but in a few cases the language simply is not SLR. Rewriting an unambiguous grammar to eliminate conflicts is somewhat of an art. Investigation of the NFA states that form the problematic DFA state will often help identifying the exact nature of the problem, which is the first step towards solving it. Sometimes, changing a production from left-recursive to
- Add the production S0 !S, where S is the start symbol of the grammar.
- Make an NFA for the right-hand side of each production.
- If an NFA state s has an outgoing transition on a nonterminal N, add epsilon-transitions from s to the starting states of the NFAs for the righthand sides of the productions for N.
- Convert the combined NFA to a DFA. Use the starting state of the NFA for the production added in step 1 as the starting state for the combined NFA.
- Build a table cross-indexed by the DFA states and grammar symbols (terminals including $ and nonterminals). Add shift actions for transitions on terminals and go actions for transitions on nonterminals.
- Calculate FOLLOW for each nonterminal. For this purpose, we add one more start production.
- When a DFA state contains an accepting NFA state marked with production number p, where the nonterminal for p is N, find the symbols in FOLLOW(N) and add a reduce p action in the DFA state at all these symbols. If production p is the production added in step 1, add an accept action instead of a reduce p action.
right-recursive may help, even though left-recursion in general is not a problem for SLR-parsers, as it is for LL(1)-parsers.
Office automation systems are computer based information systems that collect, process, store and transmit electronic messages, documents and other forms of communications among individuals, work groups and organizations. Such systems can increase the productivity of managerial end users and other professional and staff personnel by significantly reducing the time and effort needed to produce, access and receive business communications.
An overview of office automation systems are given below:
1) Office publishing systems are word processing and desktop publishing systems.
2) Image processing systems are image processing, optical scanning and storage, document management and interactive video systems.
3) Electronic communication systems are electronic meeting, tele-conferencing and telecommunicating systems.
Office support systems are electronic calendar, ticket file, notebook, directory system, work scheduling and task management systems. The above are described in brief:
Office publishing systems
Word processing – It is the use of computer systems to automate the transformation of ideas into a readable form of communication. It involves manipulating text data to produce information products in the form of documents (letters, memos, forms and reports).
Desktop publishing – Organisations can use and develop publishing systems to produce their own printed materials. They can design and print their own newsletters, manuals, brochures and books with several types of styles and graphics and colours on each page.
Voice store and forward systems – It is also known as voice mail or structured verbal-response exchanges. It has the capability of storing verbal data and/or communicating it to another location. It is one of the latest systems and found useful to corporate houses and the society at large.
Electronic Meeting systems – If electronic meeting systems are used, people may not appreciate spending money on travel to attend meetings away from their normal work location. It involves the use of video and audio communications to allow conferences and meetings to be held with participants who may be scattered across a room, a building or a country. It saves employee’s time, increase productivity, reduce total expenses and energy consumptions. This is also promoted in the Group decision support systems, because they promote more efficient and effective decision-making by various groups of people.
Teleconferencing – Participants at remote sites key in their presentation and responses whenever convenient for their online terminals or workstations which are connected to a central conference computer. Since all participants don’t have to do this at the same time, this form of EMS is called computer’s conferencing. Sessions are held in real time with major participants at remote site who take part with voice input of questions and responses.
Telecommuting – It is the use of telecommunications by workers to replace commuting enabling them to work from their homes. It is also used to describe the use of telecommunication to carry on work activities from temporary locations other than offices and homes. Some people consider telecommuting as the creation of virtual offices. They use electronic mail and voice mail to communicate with each other about job assignments.
Multimedia – Another evolving set of technologies for systematically managing graphics, drawings and photographs in addition to text and data are multimedia data management systems. Some of these are called hypermedia systems. These systems use computers and information technology to incorporate text, data, graphics, video and audio within a single application.
Multimedia pertains to technologies that facilitate the integration of two or more types of media such as text, graphics, sound, voice, full motion video or animation into a computer based application. Since 1990s, multimedia will be the foundation of new consumer products and services such as electronic books, newspapers, electronic classroom presentation technologies, full motion video conferencing, imaging, graphics design tools and video electronic and voice mail.
Once a multimedia application is developed, users can press a key on the keyboard or a button on a mouse to retrieve loads of text information. Video clips can be run with the press of another button. Other buttons can activate related narration or music via an attached sound system. In multimedia databases, users can obtain data and information about an entry in a variety of formats including text, data, still photos and audio and video clips. Multimedia databases and applications are rapidly growing in popularity. Multimedia is providing powerful tools for sales presentation. Honeywell Inc. at Minneapolis uses video and audio on laptop computers to describe its products and services. By providing all its 600 sales representatives with the same multimedia presentation using lap-tops, the company found it could promote its products in a more consistent manner.
Organisational applications for multimedia are manly because multimedia is likely to be a major instrument for obtaining corporate information. If multimedia and telecommunication technologies are combined, desktop-to-desktop video conferencing and file sharing become feasible and enable people to change across organization to meet and interact. All future computers, regardless of size are expected to have built in multimedia capabilities combining existing text and numbers with music, full motion and still frame video, animation, voice messages, telephones and fax capabilities. The future will see steady and impressive progress towards faster chips at lower cost and microprocessors with the power of today’s mainframes or supercomputers.
Image processing systems
These represent a final way, on the basis of which companies work with photographs, graphs and document images that can be handled easily by a traditional database. With multimedia systems, the user can be provided with information in a variety of formats, whereas image based database are sufficient for users in many applications. Advances in optical storage and document scanning technologies have made these attractive options for many organizations. It is possible to create and store documents that contain an image or photograph of a source document. It can include the picture of an employee in an employee file or assist inventory clerks to identify stock items.
Image processing systems, also known as electronic image management system, allow users to electronically capture, store, process and retrieve images of documents. Image database management systems are becoming more versatile. The LAN-based image processing systems are also being common, which include several servers each dedicated to a specific function.
Document management systems
These systems are sophisticated image processing systems. These often interface with other office systems such as word processing, desktop publishing, electronic mail, voice mail etc.
These systems allow digitized ‘voice notes’ to be attached to specific document images and may have other special features as well as the ability to store multi-colour documents and colour photographs.
The Automated Office
The goal is to make the office more efficient and effective. In implementing office automation, one has to eliminate time wasting activities and avoid duplication of effort. To achieve this goal, data must never be executed more than once, must be able to communicate the data to the appropriate persons or location. The modern office may be automated through the use of data processing, data communications, word processing, electronic mail and voice store and forward systems etc.
Office automation is defined as a separate sub-system or included within information processing. It includes a wide range of support facilities for knowledge work and activities. When first introduced, it was typically referred only to be replacement of typewriters by word processors. Now office automation is highly inter-related with data processing and telecommunications. Therefore, there is an organizational theory basis for assigning all three functions to a single organizational function, namely information systems or information resources. LAN and WAN are key components for integrating office automation functions and providing access to data processing facilities.
As more white collar jobs require access to computers and communication technology, other physical materials become less important. Electronic and voice mail extend the capability of the telephone to contact another person without being physically present. Information technology removes the physical constraints of being ‘in the office 9 to 5’. This location and time independence of office jobs permit a greater number of options for physical location and organizational facilities.
Three possibilities are in various stages of discussion and experimentation: Satellite work centers, neighborhood work centers and work at home. In the first one, employee may go to the satellite center, which is equipped with terminals, printers and teleconferencing facilities rather than commuting to the central office. The neighbourhood work centre shares the facility to the employee of many organizations. The third one is to work at home, is not significant because managers feel uncomfortable supervising employees. They can not see and also many employees prefer the social interaction the office provides rather than isolation of being at home.
More Articles …
Page 39 of 73