Home » Past Surveys of IT management professional demonstrate that understanding organization’s domains

Past Surveys of IT management professional demonstrate that understanding organization’s domains

Executive
Summary
Past Surveys of IT management professional
demonstrate that understanding organization’s domains in terms of business
productivity and cost reduction potential and business processes are critical
for information systems personnel. The view of this study is to prepare a work
system and develop its appreciation for organizational work systems in order to
understand the operation and significance of information systems within such
work systems. Work systems by definition are systems in which human participants
and or machines that perform work to produce desired products and services for
internal or external customers. As such, this view stresses that systems in
organizations involves more than just an IT system. Hence, the work system
method has been created to assist in designing and understanding of work
systems in organizations. Hence, the method defines an adaptable set of
procedures that a system analysis can use to identify a work system and clarify
the problems, issues, and opportunities that are related to the work system,
and identify possible recommendations for change, and produce and justify
recommendations.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Introduction
A work systems framework
outlines a static description of a work system during a specific interval. The
work system life cycle model is a dynamic view of how work systems change over
time. There are four internal elements of a work system. These comprise of
process and activities, participants, information, and technologies. The other
elements are customers, products and services, environment, infrastructure and
strategies.
The paper seeks to
analyze a work system, “1830 TLA1” known as Transactional Language 1, which
manages most of the optical, broadband, and access equipment. TL1 is a set of
instructions or messages that allow human users of an operations support system
to easily manage a network element and its resources. It is a highly structured
management interface that used a standard command line interface while allowing
for the extension of vendors, whenever necessary. Distraction on messages,
problems with configuration, performance issues, security and testing can all
be accommodated by a TL1 interface. In addition, its protocol is described by
many as a legacy protocol due to its age but is still common and used in modern
telemetry monitoring networks. Besides being an open network, TL1 is a powerful
since it bridges the gap between human users and the network devices. The
messages are embedded within the database information.TL1 is a Man Machine
Language meaning that its messages should be readable and easy to write by
human users as well as machines (Society of Cable Television
Engineers, 1983). Further, it
offers a command line interface to allow users to control a network element. It
provides network elements with a capability of sending evens to an OSS or
enterprise management system.

TL1 Language Overview
TL1
Messages
TL1 languages comprises of a set of messages.
Basically, there are four categories of messages
i.
Input
messages which is a command that is sent by the human or machine user of the
OSS.
ii.
Output or
response message is a reply that is sent by the network element in response to
an input message
iii.
Acknowledge
message refers to an acknowledgement of the receipt of a TL1 input message and
is sent in case the response message will be delays by more than two seconds
iv.
Autonomous
message are the asynchronous message or usual events or alarms sent by the
network element.
Communication Issues
Although they were
developed to assist business professionals to think about the systems for
themselves, the work system approach is also very relevant for improving
communication and enhancing collaboration between business and IT
professionals. There is a widespread argument that the importance of
communication is seen in user involvement especially in systems development and
maintenance, yet the level as well as quality of user involvement is most often
inadequate. Thus, even if the software totally reflects what was requested,
sometimes it may omit important capabilities that they failed to reflect.
Work Practice Strategy
The changing work
Practice Strategy help build a better Work system that satisfy the customers
and also avoid the pitfalls observed in the Work System Life Cycle (International Conference on Information Systems and
Development: Methods and Tools, Theory and Practice & Nilsson, 2006). Business performance is an aggregation of
work system performance, hence most business information systems should be seen
as a way for operating or supporting work systems.
A Work System Life
Cycle is a process through which a software product passes through one or more
iterations of four phases. These are initiation, development, implementation,
and operations and maintenance. The model assists to bridge the gap between
business and IT professional, because it could assist both to conduct their
system-related work. Thus, applying a work systems approach for understanding
or analyzing business strategies and IT reliant systems assists an organization
to assess the quality of work and the customer satisfaction
Figure 1: The Work System Life Cycle Model
.jpg”>

Eliminating the Third-Party Tool
To be able to eliminate
the Third-Party Tool, users should have awareness on three steps involved since
many problems may result from inadequacies in each step. In most cases,
businesses do purchase software without a clear knowledge of the type of work
systems have the problems or present opportunities to the organization. Essentially,
recommendation will focus on the software choice that will be acquired, but not
on how the work system will run after the software will be available
Transition from 1830 to 1870
In 70’s network operations started and most machines started using MML, a
protocol readable by both humans and machines, in order to control equipment
elements both locally and remotely. Bellcore altered its specifications and in
1998, and equipment was created with the defacto standards organizations that
specified that TL1 is a standard protocol.
Inadequate
use of the Infrastructure
The existing infrastructure within
the organizations has many uses and benefits.
It is one of the highly structures management interface that applies a
standard command line interface while
offering vendor extensions whenever appropriate

References
Society of Cable Television Engineers. (1983).Communications engineering &
design: CED. Denver: International Thomson Communications.
International Conference on Information Systems and Development:
Methods and Tools, Theory and Practice, & Nilsson, A. G. (2006).Advances in information systems
development: Bridging the gap between academia and industry. New York, NY:
Springer.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper
Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more
Live Chat+1 763 309 4299EmailWhatsApp

We Can Handle your Online Class from as low as$100 per week