SlideShare a Scribd company logo
INFORMATION SYSTEMS
Overview
Information Systems and
Management
An Introduction to
Information Systems
Information System:
An information system is a set of
interrelated components that collect,
manipulate, store data and disseminate
information and provide a feedback
mechanism to monitor performance.
What is an Information
System?
An organized combination of
people, hardware, software,
communications networks, and
data resources that collects data,
transforms it, and disseminates
information.
Data Vs. Information
Data: Raw unorganized facts
Information:
A collection of facts organized in such a
way that they have additional value
beyond the value of the facts themselves.
Defining and organizing relationships among
data creates information.
Information Concepts
Process:
A set of logically related tasks performed
to achieve a defined outcome.
Knowledge:
An awareness and understanding of a set
of information and ways that information
can be made useful to support a specific
task or reach a decision
The Value of Information
The value of Information
is directly linked to how
it helps decision makers
achieve their organization’s
goals.
System
A system is a set of elements or
components that interact to
accomplish goals.
CBIS
Hardware:
Computer Equipment
Software:
Computer Programs
Databases:
An organized collections of facts
CBIS
Telecommunications:
Electronic transmission of signals
for communication
 Networks: Distant electronic communication
 Internet: Interconnected Networks
 Intranet: Internal Corporate Network
 Extranet: Linked Intranets
CBIS
People
Procedures:
Strategies, policies, methods, and
rules for using a CBIS.
Business Information
Systems
Electronic and Mobile
Commerce
E-Commerce:
Any business transaction executed
electronically
M-Commerce:
Transactions conducted anywhere,
anytime
Relies on wireless communications
TPS and ERP
• Transaction
– business related exchange
– Evidence of a business event
• Transaction Processing System (TPS)
– A system which records completed
business transactions
• Enterprise Resource Planning (ERP)
– A set of integrated programs for managing
the entire business operations
Business Information
Systems
Management Information System:
A system used to provide routine
information to managers and decision
makers
Decision Support System:
A system used to support problem-
specific decision making
Specialized Business I.S.
Artificial Intelligence (AI):
A field in which the computer takes on the
characteristics of human intelligence
Expert System:
A system that gives a computer the ability to
make suggestions and act like an expert in a
particular field.
Knowledge Base:
The collection of data, rules,
procedures, and relationships that
must be followed to achieve value or
the proper outcome.
Virtual Reality:
The simulation of a real or
imagined environment that can be
experienced visually in three
dimensions
Systems Development
Systems Development:
The activity of creating or modifying
existing business information systems
Systems Investigation and
Analysis
Understand the problem
and potential solutions
Systems Design,
Implementation, Maintenance
and Review
 Determine how the new system will
meet business needs
 Put the new system into operation
 Ensure the system continues to
meet changing business needs
Information Systems in
Society
Security, Privacy, Ethical
Issues in Information Systems
and the Internet.
Computer Literacy:
Knowledge of computer systems
and equipment and the ways they
function
Data Input
Feedback
Control
Information
Management
Decisions
Output
Process
(Environment)
General Information Systems Diagram
Data:
Raw unorganized facts
Information:
Data organized in a meaningful
way for the user (in consideration of
the environment)
Informal Information System
Each organization has a unique
culture, or fundamental set of
assumptions, values, and ways of
doing things, that has been
accepted by most of its members
Environment:
• Business - other functional areas
• Computer – hardware, software, other IS
Sub System:
Component of a larger system
System Boundary:
Interaction with environment (user or other
system) via an interface
Information System
Activities
1. Input of Data Resources
2. Process Data into Information
3. Output of Information
Input of Data Resources
• Data entry
• Editing
• Machine readable
• Source documents
– Formal record of a transaction
• User interface
– How users interact with information system
– Optical scanning; menu; prompts; fill in
blanks
Process Data into
Information
• Calculate
• Compare
• Sort
• Classify
• Summarize
The quality of the data must be maintained by a
continual process of correcting and updating
activities
Output of Information
• Transmit information to users
– Display; paper; audio
• Storage of data
– Data are retained in an organized manner
• Fields; records; files; data bases
• Control of system performance
– Feedback must be monitored and
evaluated to determine if the information
system is meeting established
performance standards
Decisions
TPS
MIS
GIS, CAD/CAM,
OAS
Keep
Track
Sell
Make
Information Systems
Management Levels
Tactical
Technical
(Operational)
Strategic
Structured
Unstructured
Buy
Functions
Lower
Management
Middle
Management
Knowledge and
Data Worker
Senior
Management
DSS
ESS
Systems Applications in the Organization
INFORMATION SYSTEMS
Overview
Information Systems and
Management

More Related Content

Similar to IS-Overview.ppt

Information Systems
Information SystemsInformation Systems
Information Systems
Sherief Elmetwali
 
Priniciples Of Planning
Priniciples Of PlanningPriniciples Of Planning
Priniciples Of Planning
Dashiya Foundation
 
PIS Lecture notes principal of information systems
PIS Lecture notes principal of information systemsPIS Lecture notes principal of information systems
PIS Lecture notes principal of information systems
ShukraShukra
 
DATABASE ALL CHAPTERS.pptx
DATABASE ALL CHAPTERS.pptxDATABASE ALL CHAPTERS.pptx
DATABASE ALL CHAPTERS.pptx
MAHERMOHAMED27
 
An Introduction to Information Systems
An Introduction to Information SystemsAn Introduction to Information Systems
An Introduction to Information Systems
DYKtv Channel
 
Computer based information system
Computer based information systemComputer based information system
Computer based information system
shoaibzaheer1
 
Introduction to management information system
Introduction to management information systemIntroduction to management information system
Introduction to management information system
Online
 
computer based information system
computer based information systemcomputer based information system
computer based information system
DibyenduBiswas31
 
Chapter 1.pdf
Chapter 1.pdfChapter 1.pdf
Chapter 1.pdf
nadiyanadiya
 
System and designi chapter-1
System and designi chapter-1System and designi chapter-1
System and designi chapter-1
Best Rahim
 
Information Systems in Global Business Today.pptx
Information Systems in Global Business Today.pptxInformation Systems in Global Business Today.pptx
Information Systems in Global Business Today.pptx
Roshni814224
 
Information security
Information securityInformation security
Information security
LJ PROJECTS
 
Computer system
Computer systemComputer system
Computer systemAsif Jamal
 
Sad chapter-1
Sad chapter-1Sad chapter-1
Sad chapter-1
Navdeep Kumar
 
2014 02 bis1513-notes_1394589458_iis_ch01
2014 02 bis1513-notes_1394589458_iis_ch012014 02 bis1513-notes_1394589458_iis_ch01
2014 02 bis1513-notes_1394589458_iis_ch01محمد شاہد
 
01 bus infosysoverview
01  bus infosysoverview01  bus infosysoverview
01 bus infosysoverviewvicson_4
 

Similar to IS-Overview.ppt (20)

management information system
management information systemmanagement information system
management information system
 
Information Systems
Information SystemsInformation Systems
Information Systems
 
Priniciples Of Planning
Priniciples Of PlanningPriniciples Of Planning
Priniciples Of Planning
 
PIS Lecture notes principal of information systems
PIS Lecture notes principal of information systemsPIS Lecture notes principal of information systems
PIS Lecture notes principal of information systems
 
DATABASE ALL CHAPTERS.pptx
DATABASE ALL CHAPTERS.pptxDATABASE ALL CHAPTERS.pptx
DATABASE ALL CHAPTERS.pptx
 
An Introduction to Information Systems
An Introduction to Information SystemsAn Introduction to Information Systems
An Introduction to Information Systems
 
Computer based information system
Computer based information systemComputer based information system
Computer based information system
 
Introduction to management information system
Introduction to management information systemIntroduction to management information system
Introduction to management information system
 
computer based information system
computer based information systemcomputer based information system
computer based information system
 
Itm 1
Itm 1Itm 1
Itm 1
 
Chapter 1.pdf
Chapter 1.pdfChapter 1.pdf
Chapter 1.pdf
 
System and designi chapter-1
System and designi chapter-1System and designi chapter-1
System and designi chapter-1
 
Management information system Unit 1
Management information system Unit 1Management information system Unit 1
Management information system Unit 1
 
Information Systems in Global Business Today.pptx
Information Systems in Global Business Today.pptxInformation Systems in Global Business Today.pptx
Information Systems in Global Business Today.pptx
 
Information security
Information securityInformation security
Information security
 
Meeting 1.pptx
Meeting 1.pptxMeeting 1.pptx
Meeting 1.pptx
 
Computer system
Computer systemComputer system
Computer system
 
Sad chapter-1
Sad chapter-1Sad chapter-1
Sad chapter-1
 
2014 02 bis1513-notes_1394589458_iis_ch01
2014 02 bis1513-notes_1394589458_iis_ch012014 02 bis1513-notes_1394589458_iis_ch01
2014 02 bis1513-notes_1394589458_iis_ch01
 
01 bus infosysoverview
01  bus infosysoverview01  bus infosysoverview
01 bus infosysoverview
 

More from sheryl90

competitive advantage (1).ppt
competitive advantage (1).pptcompetitive advantage (1).ppt
competitive advantage (1).ppt
sheryl90
 
StrategicInformationSystem_Assignment Template.pptx
StrategicInformationSystem_Assignment Template.pptxStrategicInformationSystem_Assignment Template.pptx
StrategicInformationSystem_Assignment Template.pptx
sheryl90
 
Chapter10_mis.ppt
Chapter10_mis.pptChapter10_mis.ppt
Chapter10_mis.ppt
sheryl90
 
83172_pp7.ppt
83172_pp7.ppt83172_pp7.ppt
83172_pp7.ppt
sheryl90
 
wipo_smes_kul_06_www_68913 (1).ppt
wipo_smes_kul_06_www_68913 (1).pptwipo_smes_kul_06_www_68913 (1).ppt
wipo_smes_kul_06_www_68913 (1).ppt
sheryl90
 
kumar.pptx
kumar.pptxkumar.pptx
kumar.pptx
sheryl90
 
OpenSourceLicensingPowerPointPresentation.ppt
OpenSourceLicensingPowerPointPresentation.pptOpenSourceLicensingPowerPointPresentation.ppt
OpenSourceLicensingPowerPointPresentation.ppt
sheryl90
 
1._pmc_2019_day_1_project_initiation_and_planning_final.pptx
1._pmc_2019_day_1_project_initiation_and_planning_final.pptx1._pmc_2019_day_1_project_initiation_and_planning_final.pptx
1._pmc_2019_day_1_project_initiation_and_planning_final.pptx
sheryl90
 
competitive advantage.ppt
competitive advantage.pptcompetitive advantage.ppt
competitive advantage.ppt
sheryl90
 
shidiajisajiq-130116094406-phpapp02.pdf
shidiajisajiq-130116094406-phpapp02.pdfshidiajisajiq-130116094406-phpapp02.pdf
shidiajisajiq-130116094406-phpapp02.pdf
sheryl90
 
969_powerpoint_on_data_protection.ppt
969_powerpoint_on_data_protection.ppt969_powerpoint_on_data_protection.ppt
969_powerpoint_on_data_protection.ppt
sheryl90
 
con_mangt-lec4-project_costppt.ppt
con_mangt-lec4-project_costppt.pptcon_mangt-lec4-project_costppt.ppt
con_mangt-lec4-project_costppt.ppt
sheryl90
 
con_mangt-lec4-project_costppt.ppt
con_mangt-lec4-project_costppt.pptcon_mangt-lec4-project_costppt.ppt
con_mangt-lec4-project_costppt.ppt
sheryl90
 
Chapter 2 Types of Law applicable in Malaysia.pptx
Chapter 2 Types of Law applicable in Malaysia.pptxChapter 2 Types of Law applicable in Malaysia.pptx
Chapter 2 Types of Law applicable in Malaysia.pptx
sheryl90
 
wipo_smes_kul_06_www_68913.ppt
wipo_smes_kul_06_www_68913.pptwipo_smes_kul_06_www_68913.ppt
wipo_smes_kul_06_www_68913.ppt
sheryl90
 
Technology technology.ppt
Technology technology.pptTechnology technology.ppt
Technology technology.ppt
sheryl90
 
typesofinformationsystems-121218091037-phpapp01.pdf
typesofinformationsystems-121218091037-phpapp01.pdftypesofinformationsystems-121218091037-phpapp01.pdf
typesofinformationsystems-121218091037-phpapp01.pdf
sheryl90
 
ch03.ppt
ch03.pptch03.ppt
ch03.ppt
sheryl90
 
ch01_02.ppt
ch01_02.pptch01_02.ppt
ch01_02.ppt
sheryl90
 

More from sheryl90 (19)

competitive advantage (1).ppt
competitive advantage (1).pptcompetitive advantage (1).ppt
competitive advantage (1).ppt
 
StrategicInformationSystem_Assignment Template.pptx
StrategicInformationSystem_Assignment Template.pptxStrategicInformationSystem_Assignment Template.pptx
StrategicInformationSystem_Assignment Template.pptx
 
Chapter10_mis.ppt
Chapter10_mis.pptChapter10_mis.ppt
Chapter10_mis.ppt
 
83172_pp7.ppt
83172_pp7.ppt83172_pp7.ppt
83172_pp7.ppt
 
wipo_smes_kul_06_www_68913 (1).ppt
wipo_smes_kul_06_www_68913 (1).pptwipo_smes_kul_06_www_68913 (1).ppt
wipo_smes_kul_06_www_68913 (1).ppt
 
kumar.pptx
kumar.pptxkumar.pptx
kumar.pptx
 
OpenSourceLicensingPowerPointPresentation.ppt
OpenSourceLicensingPowerPointPresentation.pptOpenSourceLicensingPowerPointPresentation.ppt
OpenSourceLicensingPowerPointPresentation.ppt
 
1._pmc_2019_day_1_project_initiation_and_planning_final.pptx
1._pmc_2019_day_1_project_initiation_and_planning_final.pptx1._pmc_2019_day_1_project_initiation_and_planning_final.pptx
1._pmc_2019_day_1_project_initiation_and_planning_final.pptx
 
competitive advantage.ppt
competitive advantage.pptcompetitive advantage.ppt
competitive advantage.ppt
 
shidiajisajiq-130116094406-phpapp02.pdf
shidiajisajiq-130116094406-phpapp02.pdfshidiajisajiq-130116094406-phpapp02.pdf
shidiajisajiq-130116094406-phpapp02.pdf
 
969_powerpoint_on_data_protection.ppt
969_powerpoint_on_data_protection.ppt969_powerpoint_on_data_protection.ppt
969_powerpoint_on_data_protection.ppt
 
con_mangt-lec4-project_costppt.ppt
con_mangt-lec4-project_costppt.pptcon_mangt-lec4-project_costppt.ppt
con_mangt-lec4-project_costppt.ppt
 
con_mangt-lec4-project_costppt.ppt
con_mangt-lec4-project_costppt.pptcon_mangt-lec4-project_costppt.ppt
con_mangt-lec4-project_costppt.ppt
 
Chapter 2 Types of Law applicable in Malaysia.pptx
Chapter 2 Types of Law applicable in Malaysia.pptxChapter 2 Types of Law applicable in Malaysia.pptx
Chapter 2 Types of Law applicable in Malaysia.pptx
 
wipo_smes_kul_06_www_68913.ppt
wipo_smes_kul_06_www_68913.pptwipo_smes_kul_06_www_68913.ppt
wipo_smes_kul_06_www_68913.ppt
 
Technology technology.ppt
Technology technology.pptTechnology technology.ppt
Technology technology.ppt
 
typesofinformationsystems-121218091037-phpapp01.pdf
typesofinformationsystems-121218091037-phpapp01.pdftypesofinformationsystems-121218091037-phpapp01.pdf
typesofinformationsystems-121218091037-phpapp01.pdf
 
ch03.ppt
ch03.pptch03.ppt
ch03.ppt
 
ch01_02.ppt
ch01_02.pptch01_02.ppt
ch01_02.ppt
 

Recently uploaded

FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 

IS-Overview.ppt