By John L. Berg, J. L. Berg, H. Schumny
A couple of very important concerns shape the root of this ebook: How can the knowledge expertise (IT) standardization strategy, resulting in unified items that are wanted out there, be made extra effective? Which present IT criteria are of top of the range, what elements have ended in that top caliber, and will these components be re-created for different IT criteria? What advancements to the standard of IT criteria are wanted? Which businesses can be concerned? What everlasting alterations within the IT standardization scene are valuable? At what aspect within the evolution of a know-how is it acceptable to supply criteria? Is strategic making plans possible within the present standardization technique?
Diverse disciplines contributed to the findings during this booklet: computing device scientists, standardization leaders and pros, clients and owners, economists, auditors, software program implementors, and communique specialists.
Read Online or Download An Analysis of the Information Technology Standardization Process PDF
Similar analysis books
The booklet addresses the regulate matters resembling balance research, keep watch over synthesis and filter out layout of Markov leap platforms with the above 3 kinds of TPs, and therefore is principally divided into 3 components. half I stories the Markov bounce platforms with in part unknown TPs. diverse methodologies with varied conservatism for the elemental balance and stabilization difficulties are constructed and in comparison.
- Impossible Certainty: Cost Risk Analysis for Air Force Systems
- Me-110 USA Analysis of the Messerschmitt Me 110
- Analysis of Finite Difference Schemes: For Linear Partial Differential Equations with Generalized Solutions (Springer Series in Computational Mathematics)
- The Future of the Telecommunications Industry: Forecasting and Demand Analysis
Additional info for An Analysis of the Information Technology Standardization Process
43 LT. Standards — Can the Challenges be Met? How well is JTCl doing? I can best answer that question by quoting from a recent management overview report which I submitted to the ISO/IEC JTCl Plenary in Paris last month. "Both the IEC and the ISO should take pride in having established JTCl. The first JTCl Plenary took place in Tokyo from November 17 to November 20, 1987 and was attended by 98 delegates from 20 countries. C. in the United States on April 20 to April 22, 1988 with 16 countries represented.
So companies, users and others have to take a very hard look at what is going on, where to spend their resources, money and technical expertise and when to say "Enough, we can afford no more of this". Another inhibitor can be regional standards development. There is absolutely nothing wrong with regional standards per se. In fact, in many cases they make a lot of sense. For example, the environmental requirements for the Amazon may be entirely different to those of the Northeastern United States or the Ruhr valley.
The national security agencies of several countries are highly active in developing criteria for self-generated standards of security and trust worthiness in both hardware and software - not just in the government systems but in the commercial marketplace also. The intent is entirely understandable but the result of these efforts maybe highly undesirable to both manufacturers and users. There are two key problems involved with what is going on. One is that the degree of security being demanded in some cases will be incommensurate with the needs of the commercial marketplace and costs to the users and manufacturers may be severe and in most cases unnecessary.