5014 Technology Policy and Administration

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 7

0: Characteristics of Information Technology

Information technology (IT) is the process of creating, storing, transmitting, and perceiving
information and applying these processes.

Information technology is a process that uses a combination of means and methods of data
collection, processing and transmission to obtain new quality information about the state of an
object, technique or phenomenon. The persistence of information technology is creating data
for analysis by people and making decisions based on it to act.

Although the concept of information technology is consider identical to the images of computers
and computer networks, the use of the idea of IT cannot be limit to computers.

Information technology is made up of components such as:

 Software: application and system tools


 Organizational and methodological support
 computer hardware

Characteristics of Information Technologies:


 User operation in data manipulation mode (without programming), the user must not know and
remember but must-see (output devices) and act (input devices).
 Transversal information support at all stages of information transmission with the help of an

integrated database, which provides a unique way to enter, search, display, update and protect

information

 Paperless document processing during which only the final version of the paper document is

record. Intermediate versions and the necessary data recorded on the media are deliver to the user

via the PC display screen.

 Interactive (dialogue) task solving mode with a wide range of possibilities for the user

 Collective production of a document based on a group of computers linked

employing communication.
 Adaptive processing of the form and modes of presentation of information in problem-solving

Information Technology In Business And Everyday Life


Most companies today make constant use of information technology. Let’s take the case of a
clothing store that has a website where it presents data on its products and, in addition, uses email
to contact its customers and suppliers. A computer allows operations to be recorded and invoices
issued to buyers at the store. Stock movements are also recorded on the computer.

Stages of Information Technology Development


It is believe that Computing began to develop after the arrival of computers. But actually, its history
dates back to primitive times, when people shared data through cave drawings.

Let’s Look at The Main Stages of Information Technology Development:


Manual Computing (from ancient times to the second half of the 19th century). The also main tools of
information technology were the pen, the book and the inkwell.
The interaction between people was carry out by sending letters, and its main objective was to
transmit information to the recipient so that he understood what was meant.
Mechanical Computing (late 19th century to present) uses dictaphones, telephones, typewriters, and
email. The goal and methods of communication are the same but more comfortably.
Electrical informatics (from the 40s to the 60s), this era is characterize by the appearance of the first
computer hardware and software, electric typewriters, and portable voice recorders—the emphasis
of information technology shifts from form to content.
In electronic Computing (from the 70s to the present), computers are increasingly sophisticated, and
automated control systems (ACS) and also information retrieval systems (IRS) are created.
Emphasis is place on creating meaningful information.
Informatics (from the 80s to the present), the primary tool of this technology is the personal computer
(PC), with a set of computer programs to perform tasks for different purposes.

Computer Tools Are Of Three Types:


 Computational: automated devices to collect and process information
 Organizational: different kinds of teams to perform technical tasks
 Team communication: laptops, computers, smartphones, tablets and other devices.
Why Is Information Technology Important?
Information technology helps build and grow the business sector and also generate the highest
possible returns. The time it takes for different sectors to generate business has been reduce to a
minimum with the advancement of information technology:
 It provides electronic security, storage and efficient communication.
 Information technology needs computer applications.
 Computers connect Computing with the different organizations of the world.
On the other hand, they help the employees to maintain the records of their numerous clients from
various companies. It also allows patients to contact doctors online and get advice about their
health problems. Finally, the system allows the proper management of patient records.

What Effects do Information Technologies have on Organizations?


As we all know, a company or organization is link to performance, production, competitiveness and
productivity. In this context, also implementing the different technological tools in companies is a
clear need to optimize processes, improve and evolve.
Companies must be able to adjust to new technologies, modify their business models or adapt to
changes proactively. Its benefits in business organizations are many, whether they are: process
optimization, increased productivity, reduced costs, improved communication inside and outside
the company, improved competitiveness, and also the ability to make much more accurate
decisions.

Examples of information technology


So how is IT actually involved in day-to-day business? Consider five common examples of
IT and teams at work:

1. Server upgrade. One or more data center servers near the end of their operational and
maintenance lifecycle. IT staff will select and procure replacement servers, configure and
deploy the new servers, backup applications and data on existing servers, transfer that data
and applications to the new servers, validate that the new servers are working properly and
then repurpose or decommission and dispose of the old servers.

2. Security monitoring. Businesses routinely employ tools to monitor and log activity in


applications, networks and system IT staff receive alerts of potential threats or noncompliant
behavior -- such as a user attempting to access a restricted file -- check logs and other
reporting tools to investigate and determine the root cause of the alert and take prompt
action to address and remediate the threat, often driving changes and improvements to
security posture that can prevent similar events in the future.

3. New software. The business determines a need for a new mobile application that can allow
customers to log in and access account information or conduct other transactions from
smartphones and tablets. Developers work to create and refine a suitable application
according to a planned roadmap. Operations staff posts each iteration of the new mobile
application for download and deploy the back-end components of the app to the
organization's infrastructure.

4. Business improvement. A business requires more availability from a critical application to


help with revenue or business continuance strategies. The IT staff might be called upon to
architect a high-availability cluster to provide greater performance and resilience for the
application to ensure that the application can continue to function in the face of single
outages. This can be paired with enhancements to data storage protection and recovery.

5. User support. Developers are building a major upgrade for a vital business application.
Developers and admins will collaborate to create new documentation for the upgrade. IT
staff might deploy the upgrade for limited beta testing -- allowing a select group of users to
try the new version -- while also developing and delivering comprehensive training that
prepares all users for the new version's eventual release.

Software

There are two categories of software: system software and applications. System software
encompasses the computer programs that manage the basic computing functions. They
include the following:

 OSes;

 BIOSes;

 boot programs;

 assemblers; and

 device drivers.
Business applications include:

 databases, such as SQL Server;

 transactional systems, such as real-time order entry;

 email servers, like Microsoft Exchange

 web servers, like Apache and Microsoft's Internet Information Services (IIS);

 customer relationship management, such as Oracle NetSuite and HubSpot; and

 enterprise resource planning systems, such as SAP S/4HANA.

These applications make use of programmed instructions to manipulate, consolidate,


disperse and otherwise work with data for a business purpose.

Mobile applications that run on smartphones, tablets and other portable devices typically
connect with cloud or data center applications over the internet. These applications have
expanded the scope of computing and created a new category of software and
telecommunications that requires special expertise to maintain.

Hardware

There are many different types of computer hardware. Computer servers run business
applications. Servers interact with client devices in the client-server model. They also
communicate with other servers across computer networks, which typically link to the
internet.
Storage is another type of hardware. It's any technology that holds information as data.
Storage may be local on a specific server or shared among many servers, and it may be
installed on premises or accessed via a cloud service. Information that is stored can take
many forms, including file, multimedia, telephony, and web and sensors data. Storage
hardware includes volatile random-access memory (RAM) as well as non-volatile tape,
hard disk drives and solid-state drives.
Telecom equipment, comprising network interface cards (NICs), cabling, wireless
communications and switching devices, connect the hardware elements together and to
external networks.
Abstracting hardware and software
IT architectures have evolved to include virtualization and cloud computing, where
physical resources are abstracted and pooled in different configurations to meet
application requirements. Clouds may be distributed across locations and shared with
other IT users, or they can be contained within a corporate data center, or some
combination of both deployments.
Volatility is a characteristic of virtualized resources, enabling them to expand and contract
as needed. Subscription-based cloud or locally installed resources, such as storage or
composable architectures, can spin up resources, such as servers, OSes and application
software, as needed and then release them when processing is complete.
IT skills and certifications
A successful IT career will involve developing several technical skills. For the current IT
job market, these 10 skills are among those most in demand:

1. Cyber security

2. cloud computing

3. edge computing and IoT

4. IT automation

5. software development

6. big data management and data analytics

7. DevOps

8. AI

9. ML

10. mobile application development

Conclusion
The customization of automated control systems, communications and office equipment, and the
development of local and global computer networks have a significant impact. Humanity is
increasingly involve in developing information technologies, and also new professions relate to the
sector are emerging.

You might also like