Managing Computers in Large Organizations
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
<strong>Manag<strong>in</strong>g</strong> Microcomputers <strong>in</strong> <strong>Large</strong> <strong>Organizations</strong><br />
http://www.nap.edu/catalog/167.html<br />
About this PDF file: This new digital representation of the orig<strong>in</strong>al work has been recomposed from XML files created from the orig<strong>in</strong>al paper book, not from the<br />
orig<strong>in</strong>al typesett<strong>in</strong>g files. Page breaks are true to the orig<strong>in</strong>al; l<strong>in</strong>e lengths, word breaks, head<strong>in</strong>g styles, and other typesett<strong>in</strong>g-specific formatt<strong>in</strong>g, however, cannot be<br />
reta<strong>in</strong>ed, and some typographic errors may have been accidentally <strong>in</strong>serted. Please use the pr<strong>in</strong>t version of this publication as the authoritative version for attribution.<br />
MANAGING MICROCOMPUTERS AND END-USER COMPUTING SOME CRITICAL<br />
ISSUES<br />
timeshar<strong>in</strong>g systems do not meet those objectives. They are slow, and good<br />
software for end users does not exist or is not made available. In these<br />
cases the end user will f<strong>in</strong>d the micro preferable.<br />
• Ma<strong>in</strong>frames are expensive because of the multiuser overhead and the<br />
communications costs.<br />
If we recognize that any micro can act as a term<strong>in</strong>al and do much more,<br />
and that micros are not much more expensive than a term<strong>in</strong>al, microcomputers<br />
will probably be the preferred solution <strong>in</strong> terms of benefits.<br />
Three additional developments will cl<strong>in</strong>ch the micro's advantage over<br />
term<strong>in</strong>als: the capacity of micros is <strong>in</strong>creas<strong>in</strong>g; the friendl<strong>in</strong>ess of micro<br />
software is improv<strong>in</strong>g; and the facilities to transfer data between micro and<br />
ma<strong>in</strong>frame, preferably <strong>in</strong> a way transparent to the user, are becom<strong>in</strong>g available.<br />
Soon the micro, comb<strong>in</strong>ed with communications to the sources of data <strong>in</strong><br />
the ma<strong>in</strong>frame, will be the dom<strong>in</strong>ant solution. (This comb<strong>in</strong>ation of<br />
microprocessor and communication, accompanied by good software, is termed<br />
by some a “workstation.”)<br />
In addition to these policy and technical considerations, we cannot forget<br />
the <strong>in</strong>dividuality factor <strong>in</strong> our culture and how it will affect the use of micros.<br />
Tak<strong>in</strong>g away or refus<strong>in</strong>g to allow someone to have a micro will be like tak<strong>in</strong>g<br />
away or refus<strong>in</strong>g someone the use of an automobile. That is unth<strong>in</strong>kable <strong>in</strong> a<br />
country where we have a hard time prevent<strong>in</strong>g even drunks from us<strong>in</strong>g<br />
automobiles.<br />
End-user comput<strong>in</strong>g, largely supported by micros, is obviously valuable. If<br />
there is some reason to slow down or suppress the use of micros it must be<br />
because of other issues, such as security or adm<strong>in</strong>istrative decisions.<br />
Security is a critical issue: mak<strong>in</strong>g a system secure may also limit its<br />
flexibility and usefulness. Such limitations prevent or slow down the<br />
distribution of capabilities that aid creativity. Therefore, the goal is to make the<br />
security procedures easy to use yet relatively impenetrable. A s<strong>in</strong>gle key is not<br />
hard to use. A lock requir<strong>in</strong>g two people and two keys gets to be a nuisance.<br />
When I was design<strong>in</strong>g systems I had little concern for safety. The auditors<br />
were there to worry about that, and their specific suggestions would be<br />
implemented. Security, however, was not allowed to get <strong>in</strong> the way of ease of<br />
operation. Today I th<strong>in</strong>k<br />
87<br />
Copyright © National Academy of Sciences. All rights reserved.