Skip to main content

Currently Skimming:

Managing Microcomputers and End-User Computing: Some Critical Issues
Pages 81-92

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 81...
... Soon after he was assigned to cost analysis duties, he was given access to a terminal, a powerful fourth-generation language system, ant! ciata particularly invoice and cost data.
From page 82...
... Or can clata processing professionals help end users? These questions suggest a third important end-user computing issue that, along with quality of decisions and security, deserves attention.
From page 83...
... as 'so intent on innovation that its essential atmosphere seems not like that of a large corporation but rather a loose network of laboratories and cubbyholes populated by feverish inventors and dauntless entrepreneurs who let their imaginations fly in all directions' .... They encourage private risk taking, and support good tries" (p.
From page 84...
... You can't rent a drive-it-yourself truck if the only trucks available are 18wheelers requiring special training and hard work to strive. And you won't rent a truck if the closest rental office is several huncirecI miles away.
From page 85...
... With 8.3 million terminals and 2.4 million micros in the United States, the 300,000 data processing professionals are outnumbered by end users 33 to 1. Now that we have the tools, will their use result in better decisions?
From page 86...
... most prevalent in the United States. Thus, I believe that the cost of not providing modern information tools to end users is much greater than the cost of a few bac3 decisions macle more easily by the use of these powerful tools.
From page 87...
... Three acictitional developments will clinch the micro's acivantage over terminals: the capacity of micros is increasing; the friendliness of micro software is improving; and the facilities to transfer data between micro and mainframe, preferably in a way transparent to the user, are becoming available. Soon the micro, combined with communications to the sources of data in the mainframe, will be the dominant solution.
From page 88...
... However, data clown-loacied to a micro is not at greater risk than ciata printed out, or data put on a floppy disk, or microfiche, or any other removable media. In relation to internal security leaks, the micro, as a powerful informa-tion processor, may provide opportunities for access and removal
From page 89...
... The final set of issues are those that, I believe, can be resolver} in most organizations by normal administrative procedures and proper computer-user interfacing. These issues are the effects of bad data, data integrity, the problem of transferring end-user-developec!
From page 90...
... What about files that a user maintains indepenclent of the mainframe systems? Should the data and programs clevelopecl by an end user be considered private, scratch lead material or should some mechanism be installed to allow sharing of this material?
From page 91...
... Waste can occur in several ways: · trying to solve problems by random trial and error (with or without models) ; · computing rather than thinking, researching, or getting out and talking with customers, employees, and other individuals; · using poorly written, inefficient routines; · trying to write programs instead of using packaged software or higher-level languages.
From page 92...
... · Provide good user training. Users tend to follow the instructions given, and good training can help reduce waste, correct inefficient routines, and promote data security and integrity.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.