The Internet Archive has digitized a microfilm copy of this work. It may be possible to borrow a copy for reading.
The information upon which to base decisions can be readily available, and there will be much less of an excuse for management to procrastinate. 32 N.A.A. ... However, if the management of branch plants can promptly receive the facts it wants, location and organization of the data processing department is unimportant. ...
Journal of Systems Management
The information required to supply a need either exists in some form—or a means for acquiring and or or- JOURNAL OF SYSTEMS MANAGEMENT ... the meaningful analysis of what is recovered. 32 DSS have two dimensions: functional and operational. ...
IBM Systems Journal
Contents of Volume 32, 1993 Number One (G321-0110) Strategic alignment: Leveraging information technology for transforming organizations J. C. Henderson and N. ... Matyas (G321-5516) IBM SYSTEMS JOURNAL, VOL 32, NO 4, 1993 Number Three (G321-0113) Process automation in software application development K. D. Saracelli and K. F. ...doi:10.1147/sj.324.0687 fatcat:tngxcl457rbmjdxn7kzq6ppwdm
CCI's low volume, high mix manufacturing mode determines its order-driven material inventory management process. ... However, in the low-volume, high-mix industrial environment, other than the inbound and outbound areas, the internal processing is another very crucial part in warehouse management as this particular warehouse ...doi:10.1080/00207543.2017.1394592 fatcat:w6322ltt7bgtfkvcff4s6akenq
Educause Quarterly : EQ
Ball, Program Analyst, School of Medicine, University of Maryland at Baltimore; and in the UMAB Information Resources Management Division, John L. ... Ball is also investigator and project manager for UMAB’s Integrated Academic Information Management System (IAIMS) grant from the National Library of Medicine, which is serving as catalyst for change for ...
Flooding management requires collecting real-time onsite information widely and rapidly. ... INDEX TERMS Computer vision, natural language processing, convolutional neural networks, pluvial flooding, disaster management, rescue and search, resilience. 103396 VOLUME 8, 2020 ... The daily volume clearly shows phase transitions, which can be generated real-time to inform the priority of disaster management and used to coordinate response activities. C. ...doi:10.1109/access.2020.2994187 fatcat:6joxvaet6jgipcrbpyb7ft5fna
the functions of information processing. ... The tasks are formulated that need to be solved for modeling and optimizing business processes of planning and monitoring the academic workload to create an effective information technology for automating ... We will consider a scheme for managing the process of planning and monitoring the volume of academic workload. ...doi:10.37943/aitu.2021.22.54.002 fatcat:jr2jadvlijanzlszl5ppckgsia
& Society, 90-5 Organizational Impacts, 166-73 Management Of Computing & Information Systems Project And People Management, 81-6, 166-73, 186-190 Software Management, 121-7 System Management, 159-65 ... Miscellaneous Australian Computer Journal, Volume 18, 1986 Special Issue on Information Systems Guest Editors’ Introduction: Current Research Directions in Information Systems 157-158 Planning and Control ...
Journal of Systems Management
Since transaction de- rived information is a small subset of the information which top managers need, it is naive to believe that transaction processing systems will somehow evolve into management information ... More importantly, no evolution of the hardware or soft- ware of the transaction processing system and no degree of sophistication in data base management or file integration will yield such information—it ...
Living in the Era of Information, businesses are flooded with information through data processing. ... The aim of current paper is to extensively analyze the existing online literature to find the main (most valuable) components of big-data management according to researchers and the business community. ... Informed Consent Statement: Not applicable. Conflicts of Interest: The authors declare no conflict of interest. ...doi:10.3390/info12100411 fatcat:vrbfmdgjijdhvp7cdymfwyjpwy
It looks at both internal and external benchmarking, at site level and at machine level and how this information can provide real insights into how the site and the process are performing. ... Energy management is a task of growing importance to plastics processors but there is no established structure for measurement, assessment and prediction. ... Acknowledgement This paper is based on a presentation at the Polymer Process Engineering Conference held in Bradford, UK, in July 2007. ...doi:10.1179/174328908x283285 fatcat:4hakhustibfzjke4xyhobzg7rm
SRELS Journal of Information Management
(Information Processing and Management 22, 1986, 135-149). 4 ALLEN (M J) and HARRISON (O S). Word processing and information retrieval —some practical problems. ... (Information Processing and Management. 21; 1985; 127-138). wn ~ © V25N1: 1988 MARCH 43 ...
The Journal of Industrial Engineering
., “Probabilistic Information Processing System for Diagnosis and Ac- tion Selection,” Proceedings of the Second Congress of the Information System Sciences, Spartan Books, Washington, D. C., 1965. ... F., “National Language Processing,” Datamation, Volume 12, No. 6, 1966. Skinner, F. D., “Computer Graphics— Where Are We?” Datamation, Volume 12, No. 5, 1966. SuTHERLAND, I. ...
The Information Management Journal
A review and general summary of ideas in the book Electronic Data Processing for Business and Industry by Richard G. Canning. 32 Marron, Harvey and Martin Snyderman, Jr. ... Assuming management knows what information it needs, no better advice can be followed in solving a data processing problem than to begin at the beginning. ...
This paper presents and compares the most widely used approaches to Information Security Management System -ISO/IEC 27001:2005, BS 7799, ITIL ® and CoBIT ® . ... The company should have an implemented methodological guidance of IT management to ensure a consistent approach to IT management and IT security. ... It is based on the PDCA cycle [32, 33, 34] . ...doi:10.3991/ijes.v1i2.2937 fatcat:uacjxe7q6vbylahpfjsyubmgf4
« Previous Showing results 1 — 15 out of 809,081 results