SlideShare ist ein Scribd-Unternehmen logo
1 von 19
END USER COMPUTING
END USER COMPUTING


   In computing, End User Computing (EUC) refer to systems in
   which non-programmers can create working applications.



   EUC is a group of approaches to computing that aim at better
   integrating end users into the computing environment. These
   approaches attempt to realize the potential for high-end
   computing to perform in a trustworthy manner in problem
   solving of the highest order
END USER COMPUTING


     The term end-user computing has different meanings according
      to the context in which it is used. The following statements could
      all refer to end-user computing:
      ◦ all tools by which non-data-processing staff handle their own
         problems without professional programmers;
      ◦ creative use of data processing by non-data-processing experts;
      ◦ complex computing by non-data-processing professionals to
         answer organisational information needs;
      ◦ non-technical end-users using user-friendly, fourth-generation
         languages (4GLs) and PCs to generate reports or build decision
         support systems;
      ◦ the use of computer hardware and software by people in
         organisations whose jobs are usually classified as net users of
         information systems rather than net developers of information
         systems.
END USER COMPUTING

   Who are the End Users ?


      Non programming
      Command level
      End-user programmers
       (including senior management professionals)
      Functional support personnel
      End user computing support personnel
      DP Programmers
END USER COMPUTING


     End-user computing (EUC): All uses of computers
      by business people who are not information systems
      professionals.

     End-user development (EUD): Systems
      development and programming undertaken by non-IS
      staff.
END USER IS - Services

     End-user IS services: All services required to support
      end-users in running their PCs and developing and
      using applications

      1.   Provide a help-desk service.
      2.   Achieve standardisation of software.
      3.   Ensure network efficiency.
      4.   Provide training.
      5.   Delivering services to end-users cost-effectively.
END USER COMPUTING

   Advantages

    Systems tailored to users

    Enables creative use of IS

    Generates competitive advantage

    Puts users nearer the information

    Allows for variety

    Increases user awareness of IS

    Relieves work load of IT professional
END USER COMPUTING

   Disadvantages

    Produces inappropriate systems

    Causes duplication

    Takes users away from their real job

    Ignores long range and technical issues

    Causes integration problems
END USER COMPUTING
END USER COMPUTING
   •Service Desk – Global Service Desk handling 10mn trouble tickets and
   7mn service desk calls per annum in 20 languages. 17 Global delivery
   centers spread across the world with 7 near shore centers
   •Client Application Management services – Deliver Application
   Packaging, Imaging, Software Distribution and Patch Management
   services in a centralized factory construct. 5000+ Applications packaged
   and distributed annually.
   •Messaging & Collaboration Services – Build, operate and provide
   professional services on email and collaboration platforms like Microsoft
   Exchange, IBM Lotus Notes. Monitor and support more than 800,000
   mailboxes globally
   •Asset Management – Provide a complete Asset Management
   Lifecycle service right from ordering to ongoing management and tracking
   of client assets.
   •Client Support Services – Provide onsite support for Desktops,
   Laptops, Printers, Handheld devices at client locations spread
   globally. Global Network of Client support specialists supporting
   approximately 3 million client devices distributed globally.
   •Infrastructure Application – Build and Manage Infrastructrue
   Applications in customer environments. These services include Directory
   Services, File and Print services, Remote Access Managent, Application
   delivery using Citirix, Microsoft App-V etc.
END USER COMPUTING


     The three main types of end-user computing can be defined as:

      ◦ End-user-developed computer-based information systems for
        personal, departmental or organisation-wide use, where the end-
        user is a non-IT professional;


      ◦ End-user control of which hardware and package applications are
        purchased for use in their department;


      ◦ End-user use of existing information systems.
END USER - development

      End-user development of applications represents a major trend
       in the use of information technology in organisations.

      McGill et al. (2003) explain that:

       ‘User-developed applications (UDAs) are computer based
         applications for which non-information systems professionals
         assume primary development responsibility.
       They support decision making and organizational processes in the
         majority of Organizations’
END USER - Applications

     Reports from a corporate database using standard enquiries defined by the IS/IT
      function
     Simple ad hoc queries to databases defined by the user. For someone in an
      airline, for example, these might include access to a frequent flier
      database, customer reservation system or crew rostering system to monitor
      performance of each
     What-if? analysis using tools such as spreadsheet models or more specialised tools
      such as risk or financial management packages or business intelligence
      software, used for monitoring sales and marketing performance of information
      stored in a data warehouse
     Writing company information for a company intranet
     Development of applications such as a job costing tool or production scheduling
      system, using easy-to-use, high-level tools such as application generators, PC
      database management systems such as Microsoft Access or Borland or visual
      programming environments such as Microsoft Visual Basic.
END USER COMPUTING



     Applications backlog: The demand for new applications by users exceeds the
      capacity of the IS department or IS outsourcing company to develop them.
     Improved toolsets such as Visual Basic for Applications
     The desire by users to query and analyse data and generate reports from
      information stored on databases available across the corporate network
     A trend to decentralisation of computing to user departments for systems to
      support departmental activities
     Reduced expense of application development when conducted by end-users
      (from departmental rather than information systems budget)
     Better fit between end-user-developed software and their requirements (since no
      requirements translation is needed between the users and third-party
      developers). End-users are also less likely to ‘over-engineer’ a solution to a basic
      problem than an IS professional who will want to treat every problem with rigour.
END USER COMPUTING




 Figure 16.6 A model of IS success that can be applied to end-user developed
 applications
END USER COMPUTING


    Isolation: A few scattered pioneers of EUD develop small-scale business      tools within their area.
     Initially, little support from central IS.
    Standalone: Larger-scale applications that may be of importance to a department are developed. At
     this stage, an information centre may be developed to support an increase in demand for user
     computing services.
    Manual integration: Here, different end-user applications need to exchange data. This happens
     through manual intervention, with files being transferred   by floppy disk or across the network or even
     with rekeying of information. Information centre development has continued to support the needs of
     these larger-scale applications by providing training and skills and specifying standards for
     hardware, software and the development process.
    Automated integration: Users start to link into corporate applications to gain seamless access to
     information.
    Distributed integration: At this stage of development, there is a good level of integration between
     different end-user applications and corporate systems. Good standards of metadata (or data describing
     data in a data dictionary) are required to help achieve this.
END USER COMPUTING



     Using information that is out of date

     Information requires export from other information systems before
      it can be analysed by the end-user application

     Corruption of centrally held data by uploading erroneous data

     Development of insecure systems without password control that
      are vulnerable to accidental and deliberate damage.
END USER COMPUTING


    Training: Provision of relevant training courses both in how to program and in how to approach systems
     development in a structured way (the second of these is often omitted). This happened at the Open
     University, where many of the end-users wanted to omit the analysis course.
    Suitability review: Authorisation of major end-user new developments by business and IS managers to check
     that they are necessary (this should not be necessary for smaller-scale developments since otherwise creativity
     may be stifled).
    Standards for development: Such standards will recommend that documentation and structured testing of all
     user-developed software occurs. Detailed standards might include clear data definitions, validation rules, backup
     and recovery routines and security measures.
    Guidance from end-user support personnel: IC or help-desk staff can provide training in techniques used to
     develop software.
    Software and data audits: Regular audits of software produced by end-users should occur for data and
     application quality. There is an apocryphal story of a company that had an end-user-developed spreadsheet for
     making investment decisions which had an error in a formula that lost the company millions of pounds each year!
    Ensuring corporate data security: Ensure that users are not permitted to enter data directly into central
     databases except via applications especially written for the purpose by the IS department which has the
     necessary validation rules to ensure data quality. For analysis of corporate data, data should regularly be
     downloaded from the central database to the PC for analysis, where they can be analysed without causing
     performance problems to the corporate system.
   Help desk: A central facility in an
    organisation which provides end-user help-
    desk services such as phone support for
    troubleshooting end-user software and
    hardware problems, training, guidance on
    end-user development and management of
    user information.

Weitere ähnliche Inhalte

Was ist angesagt?

ERP Implementation Life Cycle
ERP Implementation Life CycleERP Implementation Life Cycle
ERP Implementation Life CycleApurv Gourav
 
MIS and Digital Firms
MIS and Digital FirmsMIS and Digital Firms
MIS and Digital FirmsPulkit Sharma
 
What Is Enterprise Resource Planning System
What Is Enterprise Resource Planning SystemWhat Is Enterprise Resource Planning System
What Is Enterprise Resource Planning SystemKhawaja Naveed
 
introduction to management information systems (MIS)
introduction to management information systems (MIS)introduction to management information systems (MIS)
introduction to management information systems (MIS)Sujan Oli
 
Lesson 5: Information Systems Presentation
Lesson 5: Information Systems PresentationLesson 5: Information Systems Presentation
Lesson 5: Information Systems PresentationKereen Tatham
 
ERP Benefits and Limitations
ERP Benefits and LimitationsERP Benefits and Limitations
ERP Benefits and LimitationsERPSirius UK
 
System Analysis And Design Management Information System
System Analysis And Design Management Information SystemSystem Analysis And Design Management Information System
System Analysis And Design Management Information Systemnayanav
 
Types o f information systems
Types o f information systemsTypes o f information systems
Types o f information systemsBimbashree K.G
 
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)Biswajit Bhattacharjee
 
Enterprise resource planning unit 1 introduction
Enterprise resource planning unit 1 introductionEnterprise resource planning unit 1 introduction
Enterprise resource planning unit 1 introductionGanesha Pandian
 
Chapter 12 information system development
Chapter 12   information system developmentChapter 12   information system development
Chapter 12 information system developmenthaider ali
 
ERP Training
ERP TrainingERP Training
ERP TrainingSoumya De
 
Enterprise resource planning
Enterprise resource planningEnterprise resource planning
Enterprise resource planningAakashTiwari43
 
Modules in Enterprise Resource Planning
Modules in Enterprise Resource PlanningModules in Enterprise Resource Planning
Modules in Enterprise Resource Planningsaksheebhaiswar
 
Systems Analysis And Design 2
Systems Analysis And Design 2Systems Analysis And Design 2
Systems Analysis And Design 2MISY
 

Was ist angesagt? (20)

ERP Implementation Life Cycle
ERP Implementation Life CycleERP Implementation Life Cycle
ERP Implementation Life Cycle
 
MIS and Digital Firms
MIS and Digital FirmsMIS and Digital Firms
MIS and Digital Firms
 
What Is Enterprise Resource Planning System
What Is Enterprise Resource Planning SystemWhat Is Enterprise Resource Planning System
What Is Enterprise Resource Planning System
 
introduction to management information systems (MIS)
introduction to management information systems (MIS)introduction to management information systems (MIS)
introduction to management information systems (MIS)
 
Lesson 5: Information Systems Presentation
Lesson 5: Information Systems PresentationLesson 5: Information Systems Presentation
Lesson 5: Information Systems Presentation
 
Benefits of ERP
Benefits of ERPBenefits of ERP
Benefits of ERP
 
Top five future trends in erp
Top five future trends in erpTop five future trends in erp
Top five future trends in erp
 
Decision support system
Decision support systemDecision support system
Decision support system
 
ERP Benefits and Limitations
ERP Benefits and LimitationsERP Benefits and Limitations
ERP Benefits and Limitations
 
System Analysis And Design Management Information System
System Analysis And Design Management Information SystemSystem Analysis And Design Management Information System
System Analysis And Design Management Information System
 
Types o f information systems
Types o f information systemsTypes o f information systems
Types o f information systems
 
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
 
Enterprise resource planning unit 1 introduction
Enterprise resource planning unit 1 introductionEnterprise resource planning unit 1 introduction
Enterprise resource planning unit 1 introduction
 
Mis introduction
Mis introductionMis introduction
Mis introduction
 
Chapter 12 information system development
Chapter 12   information system developmentChapter 12   information system development
Chapter 12 information system development
 
ERP Training
ERP TrainingERP Training
ERP Training
 
Enterprise resource planning
Enterprise resource planningEnterprise resource planning
Enterprise resource planning
 
Modules in Enterprise Resource Planning
Modules in Enterprise Resource PlanningModules in Enterprise Resource Planning
Modules in Enterprise Resource Planning
 
ERP And Enterprise Architecture
ERP And Enterprise ArchitectureERP And Enterprise Architecture
ERP And Enterprise Architecture
 
Systems Analysis And Design 2
Systems Analysis And Design 2Systems Analysis And Design 2
Systems Analysis And Design 2
 

Ähnlich wie Guide to End User Computing (EUC

Techniques for Developing Systems in IT Management System
Techniques for Developing Systems in IT Management SystemTechniques for Developing Systems in IT Management System
Techniques for Developing Systems in IT Management SystemGruppo Banca Sella
 
SE18_Lec 01_Introduction to Software Engineering
SE18_Lec 01_Introduction to Software EngineeringSE18_Lec 01_Introduction to Software Engineering
SE18_Lec 01_Introduction to Software EngineeringAmr E. Mohamed
 
Software engineering for IV sem BCA ,RCU Belgavi.Syllabus
Software engineering for IV sem BCA ,RCU Belgavi.SyllabusSoftware engineering for IV sem BCA ,RCU Belgavi.Syllabus
Software engineering for IV sem BCA ,RCU Belgavi.SyllabusNagaraj Hiremath
 
SE_Lec 01_ Introduction to Software Enginerring
SE_Lec 01_ Introduction to Software EnginerringSE_Lec 01_ Introduction to Software Enginerring
SE_Lec 01_ Introduction to Software EnginerringAmr E. Mohamed
 
Cb12e basic ppt ch15
Cb12e basic ppt ch15Cb12e basic ppt ch15
Cb12e basic ppt ch15Eric
 
Microsoft India – Managing the Dynamic Desktop Whitepaper
Microsoft India – Managing the Dynamic Desktop WhitepaperMicrosoft India – Managing the Dynamic Desktop Whitepaper
Microsoft India – Managing the Dynamic Desktop WhitepaperMicrosoft Private Cloud
 
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTS
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTSOFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTS
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTSJournal For Research
 
Introduction to Software Engineering & Information Technology
Introduction to Software Engineering & Information TechnologyIntroduction to Software Engineering & Information Technology
Introduction to Software Engineering & Information TechnologyGaditek
 
SOFDESG 01 Introduction.pdf
SOFDESG 01 Introduction.pdfSOFDESG 01 Introduction.pdf
SOFDESG 01 Introduction.pdfJimCValencia1
 
mICF poster 4 (petteri) micf lean mvp design
mICF poster 4 (petteri) micf lean mvp designmICF poster 4 (petteri) micf lean mvp design
mICF poster 4 (petteri) micf lean mvp designStefanus Snyman
 
User Profiling and Technology
User Profiling and TechnologyUser Profiling and Technology
User Profiling and TechnologyJonathan Daniels
 

Ähnlich wie Guide to End User Computing (EUC (20)

End User Computing
End User ComputingEnd User Computing
End User Computing
 
IT ppt.pptx
IT ppt.pptxIT ppt.pptx
IT ppt.pptx
 
Techniques for Developing Systems in IT Management System
Techniques for Developing Systems in IT Management SystemTechniques for Developing Systems in IT Management System
Techniques for Developing Systems in IT Management System
 
End User Computing .pdf
End User Computing .pdfEnd User Computing .pdf
End User Computing .pdf
 
SE18_Lec 01_Introduction to Software Engineering
SE18_Lec 01_Introduction to Software EngineeringSE18_Lec 01_Introduction to Software Engineering
SE18_Lec 01_Introduction to Software Engineering
 
Software engineering for IV sem BCA ,RCU Belgavi.Syllabus
Software engineering for IV sem BCA ,RCU Belgavi.SyllabusSoftware engineering for IV sem BCA ,RCU Belgavi.Syllabus
Software engineering for IV sem BCA ,RCU Belgavi.Syllabus
 
Class 6
Class 6Class 6
Class 6
 
SE_Lec 01_ Introduction to Software Enginerring
SE_Lec 01_ Introduction to Software EnginerringSE_Lec 01_ Introduction to Software Enginerring
SE_Lec 01_ Introduction to Software Enginerring
 
Cb12e basic ppt ch15
Cb12e basic ppt ch15Cb12e basic ppt ch15
Cb12e basic ppt ch15
 
Microsoft India – Managing the Dynamic Desktop Whitepaper
Microsoft India – Managing the Dynamic Desktop WhitepaperMicrosoft India – Managing the Dynamic Desktop Whitepaper
Microsoft India – Managing the Dynamic Desktop Whitepaper
 
Infote groupwork 1
Infote groupwork 1Infote groupwork 1
Infote groupwork 1
 
MIS chap # 4.......
MIS chap # 4.......MIS chap # 4.......
MIS chap # 4.......
 
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTS
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTSOFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTS
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTS
 
Introduction to Software Engineering & Information Technology
Introduction to Software Engineering & Information TechnologyIntroduction to Software Engineering & Information Technology
Introduction to Software Engineering & Information Technology
 
SOFDESG 01 Introduction.pdf
SOFDESG 01 Introduction.pdfSOFDESG 01 Introduction.pdf
SOFDESG 01 Introduction.pdf
 
mICF poster 4 (petteri) micf lean mvp design
mICF poster 4 (petteri) micf lean mvp designmICF poster 4 (petteri) micf lean mvp design
mICF poster 4 (petteri) micf lean mvp design
 
mICF lean MVP design
mICF lean MVP designmICF lean MVP design
mICF lean MVP design
 
User Profiling and Technology
User Profiling and TechnologyUser Profiling and Technology
User Profiling and Technology
 
SE Lecture 1.ppt
SE Lecture 1.pptSE Lecture 1.ppt
SE Lecture 1.ppt
 
SE Lecture 1.ppt
SE Lecture 1.pptSE Lecture 1.ppt
SE Lecture 1.ppt
 

Kürzlich hochgeladen

MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?Olivia Kresic
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFChandresh Chudasama
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMVoces Mineras
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckHajeJanKamps
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxappkodes
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environmentelijahj01012
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfShashank Mehta
 
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Doge Mining Website
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMintel Group
 
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxFinancial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxsaniyaimamuddin
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCRashishs7044
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 

Kürzlich hochgeladen (20)

MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDF
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQM
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptx
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environment
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
 
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdf
 
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 Edition
 
Call Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North GoaCall Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North Goa
 
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxFinancial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 

Guide to End User Computing (EUC

  • 2. END USER COMPUTING In computing, End User Computing (EUC) refer to systems in which non-programmers can create working applications. EUC is a group of approaches to computing that aim at better integrating end users into the computing environment. These approaches attempt to realize the potential for high-end computing to perform in a trustworthy manner in problem solving of the highest order
  • 3. END USER COMPUTING  The term end-user computing has different meanings according to the context in which it is used. The following statements could all refer to end-user computing: ◦ all tools by which non-data-processing staff handle their own problems without professional programmers; ◦ creative use of data processing by non-data-processing experts; ◦ complex computing by non-data-processing professionals to answer organisational information needs; ◦ non-technical end-users using user-friendly, fourth-generation languages (4GLs) and PCs to generate reports or build decision support systems; ◦ the use of computer hardware and software by people in organisations whose jobs are usually classified as net users of information systems rather than net developers of information systems.
  • 4. END USER COMPUTING Who are the End Users ?  Non programming  Command level  End-user programmers (including senior management professionals)  Functional support personnel  End user computing support personnel  DP Programmers
  • 5. END USER COMPUTING  End-user computing (EUC): All uses of computers by business people who are not information systems professionals.  End-user development (EUD): Systems development and programming undertaken by non-IS staff.
  • 6. END USER IS - Services  End-user IS services: All services required to support end-users in running their PCs and developing and using applications 1. Provide a help-desk service. 2. Achieve standardisation of software. 3. Ensure network efficiency. 4. Provide training. 5. Delivering services to end-users cost-effectively.
  • 7. END USER COMPUTING Advantages  Systems tailored to users  Enables creative use of IS  Generates competitive advantage  Puts users nearer the information  Allows for variety  Increases user awareness of IS  Relieves work load of IT professional
  • 8. END USER COMPUTING Disadvantages  Produces inappropriate systems  Causes duplication  Takes users away from their real job  Ignores long range and technical issues  Causes integration problems
  • 10. END USER COMPUTING •Service Desk – Global Service Desk handling 10mn trouble tickets and 7mn service desk calls per annum in 20 languages. 17 Global delivery centers spread across the world with 7 near shore centers •Client Application Management services – Deliver Application Packaging, Imaging, Software Distribution and Patch Management services in a centralized factory construct. 5000+ Applications packaged and distributed annually. •Messaging & Collaboration Services – Build, operate and provide professional services on email and collaboration platforms like Microsoft Exchange, IBM Lotus Notes. Monitor and support more than 800,000 mailboxes globally •Asset Management – Provide a complete Asset Management Lifecycle service right from ordering to ongoing management and tracking of client assets. •Client Support Services – Provide onsite support for Desktops, Laptops, Printers, Handheld devices at client locations spread globally. Global Network of Client support specialists supporting approximately 3 million client devices distributed globally. •Infrastructure Application – Build and Manage Infrastructrue Applications in customer environments. These services include Directory Services, File and Print services, Remote Access Managent, Application delivery using Citirix, Microsoft App-V etc.
  • 11. END USER COMPUTING  The three main types of end-user computing can be defined as: ◦ End-user-developed computer-based information systems for personal, departmental or organisation-wide use, where the end- user is a non-IT professional; ◦ End-user control of which hardware and package applications are purchased for use in their department; ◦ End-user use of existing information systems.
  • 12. END USER - development  End-user development of applications represents a major trend in the use of information technology in organisations.  McGill et al. (2003) explain that: ‘User-developed applications (UDAs) are computer based applications for which non-information systems professionals assume primary development responsibility. They support decision making and organizational processes in the majority of Organizations’
  • 13. END USER - Applications  Reports from a corporate database using standard enquiries defined by the IS/IT function  Simple ad hoc queries to databases defined by the user. For someone in an airline, for example, these might include access to a frequent flier database, customer reservation system or crew rostering system to monitor performance of each  What-if? analysis using tools such as spreadsheet models or more specialised tools such as risk or financial management packages or business intelligence software, used for monitoring sales and marketing performance of information stored in a data warehouse  Writing company information for a company intranet  Development of applications such as a job costing tool or production scheduling system, using easy-to-use, high-level tools such as application generators, PC database management systems such as Microsoft Access or Borland or visual programming environments such as Microsoft Visual Basic.
  • 14. END USER COMPUTING  Applications backlog: The demand for new applications by users exceeds the capacity of the IS department or IS outsourcing company to develop them.  Improved toolsets such as Visual Basic for Applications  The desire by users to query and analyse data and generate reports from information stored on databases available across the corporate network  A trend to decentralisation of computing to user departments for systems to support departmental activities  Reduced expense of application development when conducted by end-users (from departmental rather than information systems budget)  Better fit between end-user-developed software and their requirements (since no requirements translation is needed between the users and third-party developers). End-users are also less likely to ‘over-engineer’ a solution to a basic problem than an IS professional who will want to treat every problem with rigour.
  • 15. END USER COMPUTING Figure 16.6 A model of IS success that can be applied to end-user developed applications
  • 16. END USER COMPUTING  Isolation: A few scattered pioneers of EUD develop small-scale business tools within their area. Initially, little support from central IS.  Standalone: Larger-scale applications that may be of importance to a department are developed. At this stage, an information centre may be developed to support an increase in demand for user computing services.  Manual integration: Here, different end-user applications need to exchange data. This happens through manual intervention, with files being transferred by floppy disk or across the network or even with rekeying of information. Information centre development has continued to support the needs of these larger-scale applications by providing training and skills and specifying standards for hardware, software and the development process.  Automated integration: Users start to link into corporate applications to gain seamless access to information.  Distributed integration: At this stage of development, there is a good level of integration between different end-user applications and corporate systems. Good standards of metadata (or data describing data in a data dictionary) are required to help achieve this.
  • 17. END USER COMPUTING  Using information that is out of date  Information requires export from other information systems before it can be analysed by the end-user application  Corruption of centrally held data by uploading erroneous data  Development of insecure systems without password control that are vulnerable to accidental and deliberate damage.
  • 18. END USER COMPUTING  Training: Provision of relevant training courses both in how to program and in how to approach systems development in a structured way (the second of these is often omitted). This happened at the Open University, where many of the end-users wanted to omit the analysis course.  Suitability review: Authorisation of major end-user new developments by business and IS managers to check that they are necessary (this should not be necessary for smaller-scale developments since otherwise creativity may be stifled).  Standards for development: Such standards will recommend that documentation and structured testing of all user-developed software occurs. Detailed standards might include clear data definitions, validation rules, backup and recovery routines and security measures.  Guidance from end-user support personnel: IC or help-desk staff can provide training in techniques used to develop software.  Software and data audits: Regular audits of software produced by end-users should occur for data and application quality. There is an apocryphal story of a company that had an end-user-developed spreadsheet for making investment decisions which had an error in a formula that lost the company millions of pounds each year!  Ensuring corporate data security: Ensure that users are not permitted to enter data directly into central databases except via applications especially written for the purpose by the IS department which has the necessary validation rules to ensure data quality. For analysis of corporate data, data should regularly be downloaded from the central database to the PC for analysis, where they can be analysed without causing performance problems to the corporate system.
  • 19. Help desk: A central facility in an organisation which provides end-user help- desk services such as phone support for troubleshooting end-user software and hardware problems, training, guidance on end-user development and management of user information.