Meltem Özturan misprivate.boun.edu.tr/ozturan/mis515

Size: px
Start display at page:

Download "Meltem Özturan misprivate.boun.edu.tr/ozturan/mis515"

Transcription

1 Meltem Özturan misprivate.boun.edu.tr/ozturan/mis

2 Selecting the Best Alternative Major Activities in the Analysis Phase Gather information Define system requirements Prototype for feasibility and discover Prioritize requirements Generate and evaluate alternatives Review recommendations with management 3 The end of the Analysis Phase During analysis many more requirements may be determined than can be dealt with Must prioritize and evaluate them Several alternative packages of requirements may be developed A committee of executives and users will decide which are most important Must select a system scope and level of automation Methods of development are reviewed 4 2

3 Assessing the Target Processing Environment Target processing environment Configuration of computer equipment, operating systems and networks that will exist when the new system is deployed Must be a stable environment to support the new system Design and implementation of the processing environment is one of the early activities in moving from analysis to design 5 Centralized Systems Prior to the early 1970 s there was only one environment the mainframe computer system at a central location Options focused around what kind of input or output to these large systems Common to large-scale batch processing applications (e.g. banking, insurance, government etc.) where: Some input transactions don t need to be processed in real time On-line data entry personnel can be centrally located Large numbers of periodic outputs are produced Often used for a subsystem of a larger, sometimes distributed information system 6 3

4 Single Computer Architecture Places all information system resources on a single computer system and its attached peripherals Requires all users be located near the computer Advantage is simplicity and ease of maintenance However, many systems require more computing power than one single machine can provide 7 Clustered and Multicomputer Architectures A group of computers of the same type that have the same operating environment and share resources Computers from the same manufacturer are networked Clusters act like a single large computer system One may act as entry point and the others function as slave computers 8 4

5 Multicomputer architecture A group of dissimilar computers that are linked together but the hardware and operating systems are not required to be a similar as in the clustered architecture System still functions like one single large computer Can have central computer and slave computers Main computer may execute programs and hold database The front-end computer may handle all communication 9 Notes on Centralized Systems Clustered architectures may be cost efficient if similar operating system is used by all Multicomputer architectures are good when the the centralized system can be decomposed into relatively independent subsystems (each possibly with its own operating systems 10 5

6 Distributed Computing Distributed computing The approach to distributing a system across several computers and locations E.g. corporate financial data might be stored on a centralized mainframe, linked to minicomputers in regional office and personal computers at more locations Relies on computer networks to connect up the systems 11 Computer Networks Computer network A set of transmission lines, equipment and communication protocols to permit sharing of information and resources Local area networks (LAN) A computer network where the distances are local (e.g. in the same building) Wide area network (WAN) A computer network across large distances (e.g. city, province or nation) 12 6

7 LANs and WANs Can be built from many technologies E.g. ethernet and token rings Can use asynchronous transmission mode WANs may be constructed using purchased equipment and leased long-distance transmission lines May be subcontracted from long-distance communication vendors (e.g. AT&T, Sprint etc.) Many ways to distribute information resources Users, application programs and databases can be placed on the same computer or different computers on different LANs 13 Client-Server Architecture Currently the dominant architectural model for distributing information resources Server computer (server): A computer that provides services to other computers on the network Client computer: A computer that requests services from other computers on the network Middleware Computer software that implements communication protocols on the network and helps different systems communicate Data layer A layer on a client-server configuration that contains the database 14 7

8 Three Layer Client-Server Architecture An information system application program can be divided into the following set of client and server processes or layers Three-layer architecture The data layer Manages stored data, implemented as one or more databases The business logic layer Implements the rules and procedures of business processing The view layer Accepts user input, and formats and displays processing results View layer acts as client of the business logic layer, which acts a a client of the data layer 15 Three-layer Architecture 16 8

9 Notes on Three Layer Architecture Easy to distribute and replicate over a network Layers are relatively independent of each other Can be expanded into a larger number of layers N-layer architectures, or n-tiered architectures A client-server architecture that contains n layers 17 N-layer architecture 18 9

10 The Internet and Intranets Internet: a global collection of networks that are interconnected using a common low-level networking standard TCP/IP (Transmission Control Protocol/Internet Protocol) Services provided by the Internet protocols (Simple Mail Transfer Protocol SMTP) File transfer protocols (e.g. File Transfer Protocol FTP) Remote login and process execution protocols (e.g. Telnet) 19 The World Wide Web (WWW) A collection of resources such as files and programs that can be accessed over the Internet using standard protocols, including Formatted and linked document protocols, e.g. HyperTexst Markup Language (HTML), Extensible Markup Language (XML), and Hypertext Transfer Protocol (HTTP) Executable program standards including Java, JavaScript and Visual Basic Script (VBScript) The Internet is the infrastrcture upon which the WWW is based (ie. Resources are delivered over the Internet) 20 10

11 Intranets and Extranets Intranet A private network that is accessible to a limited number of users, but which used the same TCP/IP protocol as the Internet Restricted access firewalls, passwords, unadvertised Extranet An intranet that has been extended outside of the organization to facilitate the flow of information (e.g. access to suppliers, customers, and strategic partners) Allows organizations to exchange information and form a virtual organization The Web is organized as a client-server architecture Web processes are managed by server processes that execute on dedicated servers and clients send requests to servers using a standard web resource request protocol 21 The Internet as an Application Platform The Internet provides an alternative for implementing systems A buyer can access the system while on the road the client portion of the application is installed on their laptop computers (uses modem to connect) Alternatively, using the WWW for accessing the remote site, all the buyer needs is a web browser and is now accessible from any computer with Internet access Use of the Internet greatly expands accessibility and eliminates need to install custom client software also cheaper to put up on the Web 22 11

12 Advantages of WWW over traditional client-server approaches Accessibility Web browser and Internet connections are nearly everywhere and are accessible to large numbers of users Low-cost communication High-capacity WAN form the Internet backbone are funded primarily by governments (a company can use the Internet as a low-cost WAN) Widely implemented standards Web standards are well known and many computer professionals are trained in their use Use of intranet or extranet enjoys all the advantages of web delivery Really represents evolution of client-server computing to the WWW 23 Negative Aspects of Application Security Web servers are well-defined target for security breaches Reliability Internet protocols do not guarantee a minimum level of network through put or that a message Throughput Data transfer capacity of many users limited by analog modems to under 56 kilobits per second Volatile standards Web standards change rapidly 24 12

13 Development and System Software Environments Development environment Consists of standards and tools used in an organization E.g. CASE tools, programming standards System software environment Includes operating system, network protocols, database management systems etc. Important activity during analysis To determine the components of the environment that will control the development of the new application 25 Important components of the environment that will affect the project Language environment and expertise Companies often have preferred languages Numerous languages out there COBOL, C++, Visual Basic, to web-based languages like Java and Perl Script Choosing a new language requires additional work Existing CASE tools and methodologies If a company has invested heavily in a CASE tool then all new development may have to conform to it Required interfaces to other systems A new system typically must provide information to and receive it from existing systems 26 13

14 Operating System environment Strategic goals may exist to change the operating system Multiple platforms may be needed Legacy systems are often still there and may be linked to newer client-server applications and databases Database management system (DBMS) Many corporations have committed to a particular database vendor May require a distributed database environment with portions distributed over the country 27 Deciding on Scope and Level of Automation Scope of a system Which business functions will be included in the system Level of Automation How much automated computer support exists for the functions that are included Scope creep A problem with development projects where requests for additional features just keeps continuing To avoid we need to formalize the process of selecting which functions are critical or not 28 14

15 Scoping Table Scoping table: a tabular list of all the functions to be included within a system It is an expanded version of the event table It may include events from the event table plus some identified later on Each business function can be prioritized Manditory Important Desirable 29 Defining Level of Automation Level of automation The kind of support the system will provide for each function Low, middle, high E.g. low level is using computer for order-entry function, high level is using computer to support high-level decision making by human Low end is basically an automated version of a current manual procedure A high level occurs when system takes over as much as possible the processing of the function High end often involves creating new processes and procedures 30 15

16 Selecting Alternatives More and more new systems are being used to provide high-level automation solutions Criteria used to decide which functions to support and level of automation are based on Strategic IT plan Feasibility study Economic feasibility Operational, organizational and cultural feasibility Technological feasibility Schedule and resource feasibility 31 Generating Alternatives for Implementation Now ask where do we go from here? Options include buying a computer program if the application is fairly standard OR company may decide to build the system from ground up Next figure shows this in a graph Vertical column is the build-versus-buy axis (at the top of the axis the entire system is bought as a package) In between is a combination of buy and build There a various alternatives ranging from in-house development to purchasing a complete ERP system 32 16

17 Implementation Alternatives 33 Facilities Management Facilities management: the outsourcing of all data processing and information technology to an outside vendor E.g. a bank my hire a facilities management firm to provide all of the data processing including software, networks and even technical staff Typically part of a long-term strategic plan for an entire organization Contracts cost a lot (millions) example EDS (Electronic Data Systems) 34 17

18 Packaged and Turnkey Software Systems Packaged software: software that is already built and can be purchased as a package Strict definition is that software is used as is, with no change E.g. a standard reporting system package may work for some of the companies requirements Turnkey system: a complete system solution, including software and hardware, that can be just turned on Companies creating these systems usually specialize in a particular industry But problem that often they don t exactly meet the needs of an organization May allow for vendor to customize part of it to better suit needs Company may buy base system + a number of customization changes and a service agreement (e.g. hospital systems) 35 Packaged and Turnkey Software Systems In some cases only executable code is provided, other cases include both source and executable Vendor may make the changes or company itself might (if it has programmers) Enterprise Resource Planning (ERP) A turnkey system that includes all organizational functions of an organization (e.g. companies such as SAP, PeopleSoft provide these) May take longer than a year to install Can cost millions Advantage of ERP: a new system can often be obtained at a much lower cost than in-house development, also risk may be lower Disadvantage of ERP: system may not do exactly what the organization needs (even after customization) 36 18

19 Custom Software Development A solution that is developed by an outside service provider New system is developed from scratch (using SDLC) But project team consist mainly of outside consultants Advantages of custom development: consulting firm may have developed similar systems and has good knowledge of the domain and pool of qualified staff Outsourcing and contract development are the fastest growing segments of the IS industry Disadvantage: the cost (paying at high consulting hourly wages e.g. $100 per hour is typical) Opted for when no in-house expertise or tight schedules Usually for large systems (e.g. health care) where cost is outweighed by savings due to high volume of use of system 37 In-House Development Large and medium-sized companies have in-house development staff A problem with this is that special technical expertise may be beyond employees experience So may use company employees to manage and staff projects, but also call in consultants when needed Advantage Control of project and knowledge retained in the company Company can build internal expertise Disadvantage In-house staff may not know when they need assistance 38 19

20 Choosing an Alternative for Implementation Identifying Criteria for Selection Criteria will be used to compare alternative choices (e.g. in-house or outsourcing) Three general areas to consider General requirements Technical requirements Functional requirements General requirements include Feasibility assessment (scope and level of automation) Each alternative must meet the requirments of Cost Technology Operations schedule 39 For outsourced alternatives The providers stability and performance record is also important For in-house alternatives Must consider risks, length of schedule and availability of in-house expertise Must evaluate for total cost and impact on the organization of alternatives 40 20

21 Criteria for assessment of alternatives The performance record of the provider Level of technical support from the provider Availability of experienced staff Development costs Expected value of benefits Length of time (schedule) until deployment Impact on internal resources Requirements for internal expertise Organizational impacts (retraining, skill levels) Expected cost of data conversion Warranties and support services (from outside vendors) 41 Relative importance of each criteria can be weighted on a 5-point scale (a weighting scale) 1 indicates low importance 5 indicates high importance Also for each alternative we can rate the alternative for that criteria, on a five point scale 1 indicates the alternative is weak for that criteria 5 indicates the alternative is strong on that criteria Then we can multiply the importance of a criteria by its rating for each alternative to get extended scores Finally, we can add up the extended scores for all alternatives and see which comes up best 42 21

22 In addition to general requirements, we should include criteria to evaluate the quality of the software Robustness (software does not crash) Programming errors (software calculates correctly) Quality of code (maintainability) Documentation Easy installation Flexibility (adjusts to new functionality and environments Structure (maintainable, easy to understand) User-friendliness Can do tables for the above technical requirements and also for functional requirements Once each alternative is evaluated with a raw score, selection can be made accordingly. 43 Presenting the Results Results of investigation and analysis should be summarized in written format and presented in oral executive-level presentation Intended audience is the executive steering committee (decision making and funding) Objective is to provide the necessary background for decision making Alternative should be compiled, organized and presented Balance of detail should be managed by the project team The formality of the presentation varies from organization to organization 44 22

Chapter 3: AIS Enhancements Through Information Technology and Networks

Chapter 3: AIS Enhancements Through Information Technology and Networks Accounting Information Systems: Essential Concepts and Applications Fourth Edition by Wilkinson, Cerullo, Raval, and Wong-On-Wing Chapter 3: AIS Enhancements Through Information Technology and Networks

More information

Business Intelligence and Decision Support Systems

Business Intelligence and Decision Support Systems Business Intelligence and Decision Support Systems (9 th Ed., Prentice Hall) Chapter 8: Data Warehousing Learning Objectives Understand the basic definitions and concepts of data warehouses Learn different

More information

Chapter 8: SDLC Reviews and Audit Learning objectives Introduction Role of IS Auditor in SDLC

Chapter 8: SDLC Reviews and Audit Learning objectives Introduction Role of IS Auditor in SDLC Chapter 8: SDLC Reviews and Audit... 2 8.1 Learning objectives... 2 8.1 Introduction... 2 8.2 Role of IS Auditor in SDLC... 2 8.2.1 IS Auditor as Team member... 2 8.2.2 Mid-project reviews... 3 8.2.3 Post

More information

6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning

6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning 6 Computer Networks 6.1 Foundations of Computer Science Cengage Learning Objectives After studying this chapter, the student should be able to: 6.2 Describe network criteria, physical structures and categories

More information

"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary

Charting the Course... Certified Information Systems Auditor (CISA) Course Summary Course Summary Description In this course, you will perform evaluations of organizational policies, procedures, and processes to ensure that an organization's information systems align with overall business

More information

E-companion. Quiz for IT-knowledge

E-companion. Quiz for IT-knowledge E-companion Quiz for IT-knowledge 1. The is used in combination with other keys to perform shortcuts and special tasks. A) Control (Ctrl) key B) Function key C) Toggle key D) Windows key 2. is the place

More information

E-Commerce. Infrastructure I: Computer Networks

E-Commerce. Infrastructure I: Computer Networks E-Commerce Infrastructure I: Computer Networks Almost all computers today are networked or part of a distributed system. I will provide an overview of networking and a basic description of network technology.

More information

QM Chapter 1 Database Fundamentals Version 10 th Ed. Prepared by Dr Kamel Rouibah / Dept QM & IS

QM Chapter 1 Database Fundamentals Version 10 th Ed. Prepared by Dr Kamel Rouibah / Dept QM & IS QM 433 - Chapter 1 Database Fundamentals Version 10 th Ed Prepared by Dr Kamel Rouibah / Dept QM & IS www.cba.edu.kw/krouibah Dr K. Rouibah / dept QM & IS Chapter 1 (433) Database fundamentals 1 Objectives

More information

WHITE PAPER. Title. Managed Services for SAS Technology

WHITE PAPER. Title. Managed Services for SAS Technology WHITE PAPER Hosted Title Managed Services for SAS Technology ii Contents Performance... 1 Optimal storage and sizing...1 Secure, no-hassle access...2 Dedicated computing infrastructure...2 Early and pre-emptive

More information

Secure VPNs for Enterprise Networks

Secure VPNs for Enterprise Networks Secure Virtual Private Networks for Enterprise February 1999 Secure VPNs for Enterprise Networks This document provides an overview of Virtual Private Network (VPN) concepts using the. Benefits of using

More information

RSA Solution Brief. Managing Risk Within Advanced Security Operations. RSA Solution Brief

RSA Solution Brief. Managing Risk Within Advanced Security Operations. RSA Solution Brief RSA Solution Brief Managing Risk Within Advanced Security Operations RSA Solution Brief How do you advance your security operations function? Increasingly sophisticated security threats and the growing

More information

INTERNET. Intranet & Networking

INTERNET. Intranet & Networking Intranet & Networking Basics of networking INTRANET & NETWORKING To fully understand and appreciate how the Internet works and why it works the way it does, it would be better for you to have some basic

More information

System Analysis & design

System Analysis & design Assiut University Faculty of Computers and Information System Analysis & design Year 2 Academic Year 2014/ 2015 Term (2) Copyright 2014 Dr. Hossam Ragab 8 A n important component of the design phase is

More information

Predictive Insight, Automation and Expertise Drive Added Value for Managed Services

Predictive Insight, Automation and Expertise Drive Added Value for Managed Services Sponsored by: Cisco Services Author: Leslie Rosenberg December 2017 Predictive Insight, Automation and Expertise Drive Added Value for Managed Services IDC OPINION Competitive business leaders are challenging

More information

Internet. Class-In charge: S.Sasirekha

Internet. Class-In charge: S.Sasirekha Internet Class-In charge: S.Sasirekha COMPUTER NETWORK A computer network is a collection of two or more computers, which are connected together to share information and resources. Network Operating Systems

More information

State of Florida uses the power of technology to accomplish objectives. Sprint provides state-of-the-art voice and data solutions

State of Florida uses the power of technology to accomplish objectives. Sprint provides state-of-the-art voice and data solutions Case Study State of Florida uses the power of technology to accomplish objectives Sprint provides state-of-the-art voice and data solutions A look inside the State of Florida government Through recent

More information

TN3270 AND TN5250 INTERNET STANDARDS

TN3270 AND TN5250 INTERNET STANDARDS 51-10-55 DATA COMMUNICATIONS MANAGEMENT TN3270 AND TN5250 INTERNET STANDARDS Ed Bailey INSIDE Enterprise Data and Logic; User Productivity and Confidence; Newer Platforms and Devices; How Standardization

More information

CORPORATE PERFORMANCE IMPROVEMENT DOES CLOUD MEAN THE PRIVATE DATA CENTER IS DEAD?

CORPORATE PERFORMANCE IMPROVEMENT DOES CLOUD MEAN THE PRIVATE DATA CENTER IS DEAD? CORPORATE PERFORMANCE IMPROVEMENT DOES CLOUD MEAN THE PRIVATE DATA CENTER IS DEAD? DOES CLOUD MEAN THE PRIVATE DATA CENTER IS DEAD? MASS MIGRATION: SHOULD ALL COMPANIES MOVE TO THE CLOUD? Achieving digital

More information

Oracle and Tangosol Acquisition Announcement

Oracle and Tangosol Acquisition Announcement Oracle and Tangosol Acquisition Announcement March 23, 2007 The following is intended to outline our general product direction. It is intended for information purposes only, and may

More information

Module 4 Business Value of Telecommunication Networks 4.1 Internet Revolution 4.2 Business value of Internet, Intranet and Extranet

Module 4 Business Value of Telecommunication Networks 4.1 Internet Revolution 4.2 Business value of Internet, Intranet and Extranet Module 4 Business Value of Telecommunication Networks 4.1 Internet Revolution 4.2 Business value of Internet, Intranet and Extranet Module 4 Business Value of Telecommunication Networks Information and

More information

Create the ideal conditions for your network to grow.

Create the ideal conditions for your network to grow. Create the ideal conditions for your network to grow. Create the ideal conditions for your network to grow. SBC PremierSERV SM Network Integration and Managed Services. Flexible, end-to-end solutions

More information

Data Protection. Plugging the gap. Gary Comiskey 26 February 2010

Data Protection. Plugging the gap. Gary Comiskey 26 February 2010 Data Protection. Plugging the gap Gary Comiskey 26 February 2010 Data Protection Trends in Financial Services Financial services firms are deploying data protection solutions across their enterprise at

More information

GoToMyPC Corporate Product Guide

GoToMyPC Corporate Product Guide GoToMyPC Corporate Product Guide 072402 Contents Product Overview...1 How It Works...1 Target Audiences/Product Uses...2 Primary Selling Points...3 Software Features and Benefits...4 Administration Center

More information

NC Education Cloud Feasibility Report

NC Education Cloud Feasibility Report 1 NC Education Cloud Feasibility Report 1. Problem Definition and rationale North Carolina districts are generally ill-equipped to manage production server infrastructure. Server infrastructure is most

More information

How Cisco Expedites IT Integration of an Acquisition

How Cisco Expedites IT Integration of an Acquisition How Cisco Expedites IT Integration of an Acquisition Streamlined, cross-functional processes accelerate how new employees work productively and minimize the transition impact on customers Cisco IT Case

More information

Certified Information Systems Auditor (CISA)

Certified Information Systems Auditor (CISA) Certified Information Systems Auditor (CISA) 1. Domain 1 The Process of Auditing Information Systems Provide audit services in accordance with IT audit standards to assist the organization in protecting

More information

Investor Presentation. February 2016

Investor Presentation. February 2016 Investor Presentation February 2016 Disclaimer Forward-Looking Statements This presentation contains forward-looking statements within the meaning of Section 27A of the Securities Act of 1933, as amended,

More information

Chapter Ten. From Internet to Information Superhighway

Chapter Ten. From Internet to Information Superhighway Chapter Ten From Internet to Information Superhighway After reading this chapter you should be able to: Describe the nature of the Internet and the variety of functions it performs Discuss several software

More information

Simplify IP Telephony with System i. IBM System i IP Telephony

Simplify IP Telephony with System i. IBM System i IP Telephony Simplify IP Telephony with System i IBM System i IP Telephony Highlights Deploy a complete IP telephony suite on one easy-to-manage system, or even part of a system, shared with other applications Integrate

More information

MANAGING STATISTICAL DEVELOPMENT AND INFORMATION TECHNOLOGY IN THE STATISTICAL SYSTEM OF MALAYSIA

MANAGING STATISTICAL DEVELOPMENT AND INFORMATION TECHNOLOGY IN THE STATISTICAL SYSTEM OF MALAYSIA SIXTH MANAGEMENT SEMINAR FOR HEADS OF NATIONAL STATISTICAL OFFICES IN ASIA AND THE PACIFIC. 28 30 MAY 2007, HONG KONG, CHINA 1. Introduction MANAGING STATISTICAL DEVELOPMENT AND INFORMATION TECHNOLOGY

More information

Department of Management Services REQUEST FOR INFORMATION

Department of Management Services REQUEST FOR INFORMATION RESPONSE TO Department of Management Services REQUEST FOR INFORMATION Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services September 3, 2015 250 South President

More information

Cloud Computing: Making the Right Choice for Your Organization

Cloud Computing: Making the Right Choice for Your Organization Cloud Computing: Making the Right Choice for Your Organization A decade ago, cloud computing was on the leading edge. Now, 95 percent of businesses use cloud technology, and Gartner says that by 2020,

More information

THE TOWN OF NORTHEASTERN MANITOULIN AND THE ISLANDS

THE TOWN OF NORTHEASTERN MANITOULIN AND THE ISLANDS THE TOWN OF NORTHEASTERN MANITOULIN AND THE ISLANDS Request for Quotations () For Submissions must be received on or before: 12:00 p.m. March 20 th, 2015 Attn: Mrs. Kristin Luoma, EDO 14 Water Street East

More information

2017 Company Profile

2017 Company Profile 2017 Company Profile LITS Lead Technology Services 10/2/2017 INTRODUCTION Leading Innovative Technology Solutions (LITS) Lead Innovative Technology Services is an affirmative and black economic empowerment

More information

HRSD Position Description: UNIX Systems Administrator

HRSD Position Description: UNIX Systems Administrator HRSD Position Description: UNIX Systems Administrator Section I. Section II. Section III. Position Reference Information a. Department Finance and Administration b. Division Information Technology c. Position

More information

Full file at

Full file at Chapter 2 Data Warehousing True-False Questions 1. A real-time, enterprise-level data warehouse combined with a strategy for its use in decision support can leverage data to provide massive financial benefits

More information

AQU Information Systems Fundamentals Spring 2012 Pg. 9.1

AQU Information Systems Fundamentals Spring 2012 Pg. 9.1 AQU Information Systems Fundamentals Spring 2012 Pg. 9.1 c h a p t e r 9 THE INTERNET & THE NEW INFORMATION TECHNOLOGY INFRASTRUCTURE 9.1 LEARNING OBJECTIVES Describe features of infrastructure & connectivity

More information

hosting Hosting Simplified

hosting Hosting Simplified go hosting Simplified A trusted technology partner of Fortune 500 companies, government institutions and small and medium enterprises across industries for close to two decades OUR LOCATIONS NOIDA JAIPUR

More information

Standards, Evaluation Criteria and Best Practices Telecommunications and Technology Advisory Committee Systemwide Architecture Committee.

Standards, Evaluation Criteria and Best Practices Telecommunications and Technology Advisory Committee Systemwide Architecture Committee. Standards, Evaluation Criteria and Best Practices Telecommunications and Technology Advisory Committee Systemwide Architecture Committee Appendix D APPENDIX D STANDARDS, EVALUATION CRITERIA, AND BEST PRACTICES

More information

Full file at Chapter 2: Technology Infrastructure: The Internet and the World Wide Web

Full file at   Chapter 2: Technology Infrastructure: The Internet and the World Wide Web Chapter 2: Technology Infrastructure: The Internet and the World Wide Web TRUE/FALSE 1. Computer networks and the Internet form the basic technology structure that underlies all electronic commerce. T

More information

Enterprise Geographic Information Servers. Dr David Maguire Director of Products Kevin Daugherty ESRI

Enterprise Geographic Information Servers. Dr David Maguire Director of Products Kevin Daugherty ESRI Enterprise Geographic Information Servers Dr David Maguire Director of Products Kevin Daugherty ESRI Outline Introduction Enterprise GIS vs. Spatially-enabled IS Architectures for building Enterprise GIS

More information

Chapter 15 Networks. Chapter Goals. Networking. Chapter Goals. Networking. Networking. Computer network. Node (host) Any device on a network

Chapter 15 Networks. Chapter Goals. Networking. Chapter Goals. Networking. Networking. Computer network. Node (host) Any device on a network Chapter Goals Chapter 15 Networks Describe the core issues related to computer networks List various types of networks and their characteristics Explain various topologies of local-area networks Explain

More information

ZENworks for Desktops Preboot Services

ZENworks for Desktops Preboot Services 3.2 Novell ZENworks for Desktops Preboot Services DEPLOYMENT www.novell.com Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,

More information

Alberta Pensions Administration Corporation Client Case Study Chooses Fujitsu Legacy Modernization Solution for Mainframe Migration Profile

Alberta Pensions Administration Corporation Client Case Study Chooses Fujitsu Legacy Modernization Solution for Mainframe Migration Profile Client Case Study Alberta Pensions Administration Corporation Chooses Fujitsu Legacy Modernization Solution for Mainframe Migration Profile Located in Edmonton, Alta., Canada, Alberta Pensions Administration

More information

Reaping the Benefits of Managed Services

Reaping the Benefits of Managed Services Figure 1. Converged Network with Managed Services These services complement each other when bundled together. For example, an IP VPN service makes managing an IP voice network simpler and more effective

More information

Network Services. Product Catalog

Network Services. Product Catalog Network Services Product Catalog Massive increases in data traffic, mobile devices and cloud-based applications are constantly changing the way your customers do business. AT&T Internet Access Fast, affordable

More information

Business Data Communications and Networking

Business Data Communications and Networking Business Data Communications and Networking 10th Edition Jerry Fitzgerald and Alan Dennis John Wiley & Sons, Inc Dwayne Whitten, D.B.A Mays Business School Texas A&M University http://alainmaterials.webs.com/

More information

COMPANY. Profile Information Technology GULF POWER ALLIANCE. Providing IT Solution for SME s. YOUR SUCCESS IS OUR BUSINESS

COMPANY. Profile Information Technology GULF POWER ALLIANCE. Providing IT Solution for SME s. YOUR SUCCESS IS OUR BUSINESS GULF POWER ALLIANCE YOUR SUCCESS IS OUR BUSINESS Providing IT Solution for SME s. COMPANY Profile Information Technology GULF POWER ALLIANCE aims to lead the way to the future of Information Technology,

More information

The Internet Advanced Research Projects Agency Network (ARPANET) How the Internet Works Transport Control Protocol (TCP)

The Internet Advanced Research Projects Agency Network (ARPANET) How the Internet Works Transport Control Protocol (TCP) The Internet, Intranets, and Extranets 1 The Internet The Internet is a collection of interconnected network of computers, all freely exchanging information. These computers use specialized software to

More information

Section A - Standards that Apply to All RFPs

Section A - Standards that Apply to All RFPs These standards provide general information regarding the services provided by the Information Technology branch, in the context of implementation projects. These standards are published, at minimum, bi-annually

More information

Aton Connect Host Integration Toolkit Data Sheet

Aton Connect Host Integration Toolkit Data Sheet Aton Connect Host Integration Toolkit Data Sheet I f you are like most developers and engineers, you want a tool that is easy to learn, gets the job done quickly, and is supported by knowledgeable staff

More information

KM COLUMN. How to evaluate a content management system. Ask yourself: what are your business goals and needs? JANUARY What this article isn t

KM COLUMN. How to evaluate a content management system. Ask yourself: what are your business goals and needs? JANUARY What this article isn t KM COLUMN JANUARY 2002 How to evaluate a content management system Selecting and implementing a content management system (CMS) will be one of the largest IT projects tackled by many organisations. With

More information

xiii A. Hayden Lindsey IBM Distinguished Engineer and Director, Studio Tools Foreword

xiii A. Hayden Lindsey IBM Distinguished Engineer and Director, Studio Tools Foreword Foreword Business applications are increasingly leveraging Web technologies. Naturally this is true for Internet applications, but it is also true for intranet and extranet applications applications that

More information

Chapter 2: Technology Infrastructure: The Internet and the World Wide Web

Chapter 2: Technology Infrastructure: The Internet and the World Wide Web Chapter 2: Technology Infrastructure: The Internet and the World Wide Web Student: 1. Networks of computers and the Internet that connects them to each other form the basic technological structure that

More information

IT People has been offering end-to-end IT outsourcing & staffing solutions to companies since two decades.

IT People has been offering end-to-end IT outsourcing & staffing solutions to companies since two decades. Corporate Profile Company Profile IT People has been offering end-to-end IT outsourcing & staffing solutions to companies since two decades. As a resource partner, we offer personalized and professional

More information

Cloud Computing. January 2012 CONTENT COMMUNITY CONVERSATION CONVERSION

Cloud Computing. January 2012 CONTENT COMMUNITY CONVERSATION CONVERSION Cloud Computing January 2012 CONTENT COMMUNITY CONVERSATION CONVERSION Purpose and Methodology Survey Sample Field Work December 20, 2011 January 9, 2012 Total Respondents 554 Margin of Error +/- 4.2%

More information

COMPTIA CLO-001 EXAM QUESTIONS & ANSWERS

COMPTIA CLO-001 EXAM QUESTIONS & ANSWERS COMPTIA CLO-001 EXAM QUESTIONS & ANSWERS Number: CLO-001 Passing Score: 800 Time Limit: 120 min File Version: 39.7 http://www.gratisexam.com/ COMPTIA CLO-001 EXAM QUESTIONS & ANSWERS Exam Name: CompTIA

More information

Technology in Action. Chapter Topics. Scope creep occurs when: 3/20/2013. Information Systems include all EXCEPT the following:

Technology in Action. Chapter Topics. Scope creep occurs when: 3/20/2013. Information Systems include all EXCEPT the following: Technology in Action Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Chapter 10 Behind the Scenes: Software Programming Ninth Edition Chapter Topics Understanding software programming Life

More information

New Zealand Government IBM Infrastructure as a Service

New Zealand Government IBM Infrastructure as a Service New Zealand Government IBM Infrastructure as a Service A world class agile cloud infrastructure designed to provide quick access to a security-rich, enterprise-class virtual server environment. 2 New Zealand

More information

Technology Competence Initiative

Technology Competence Initiative THE INSTITUTE OF CHARTERED ACCOUNTANTS OF NIGERIA (Established by Act of Parliament No. 15 of 1965) Technology Competence Initiative Initial Implementation of IFAC Education Guideline No 11 on Information

More information

Microsoft Office SharePoint Server 2007

Microsoft Office SharePoint Server 2007 Microsoft Office SharePoint Server 2007 Enabled by EMC Celerra Unified Storage and Microsoft Hyper-V Reference Architecture Copyright 2010 EMC Corporation. All rights reserved. Published May, 2010 EMC

More information

IT Governance ISO/IEC 27001:2013 ISMS Implementation. Service description. Protect Comply Thrive

IT Governance ISO/IEC 27001:2013 ISMS Implementation. Service description. Protect Comply Thrive IT Governance ISO/IEC 27001:2013 ISMS Implementation Service description Protect Comply Thrive 100% guaranteed ISO 27001 certification with the global experts With the IT Governance ISO 27001 Implementation

More information

"The Internet. All the piracy and none of the scurvy." -- Anonymous

The Internet. All the piracy and none of the scurvy. -- Anonymous Bridges To Computing General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited and encouraged to use this presentation to promote

More information

A Better Approach to Leveraging an OpenStack Private Cloud. David Linthicum

A Better Approach to Leveraging an OpenStack Private Cloud. David Linthicum A Better Approach to Leveraging an OpenStack Private Cloud David Linthicum A Better Approach to Leveraging an OpenStack Private Cloud 1 Executive Summary The latest bi-annual survey data of OpenStack users

More information

networks List various types of networks and their

networks List various types of networks and their Chapter 15 Networks Chapter Goals Describe the core issues related to computer networks List various types of networks and their characteristics Explain various topologies of local-area networks Explain

More information

Campus IT Modernization OPERATIONAL CONTINUITY FLEXIBLE TECHNOLOGY MODERNIZED SYSTEMS

Campus IT Modernization OPERATIONAL CONTINUITY FLEXIBLE TECHNOLOGY MODERNIZED SYSTEMS Campus IT Modernization OPERATIONAL CONTINUITY FLEXIBLE TECHNOLOGY MODERNIZED SYSTEMS Managing the Complexity of IT Modernization Constructing and modernizing a new campus is a complex undertaking, requiring

More information

System Programming. Introduction to computer networks

System Programming. Introduction to computer networks Content : by Dr. B. Boufama School of Computer Science University of Windsor Instructor: Dr. A. Habed adlane@cs.uwindsor.ca http://cs.uwindsor.ca/ adlane/60-256 Content Content 1 Introduction to Computer

More information

Feasibility Evidence Description (FED)

Feasibility Evidence Description (FED) Feasibility Evidence Description (FED) United Direct Marketing Team 9 Fall Semester Chun-Ling Chen Project manager/ Prototyper Chun-Pei Su Lifecycle Planner Shao-yen Cheng System Architect Yuan-Chang Chang

More information

C H A P T E R SYSTEM DESIGN

C H A P T E R SYSTEM DESIGN C H A P T E R SYSTEM DESIGN Chapter Twelve Systems Design Describe the design phase in terms of your information building blocks. Identify and differentiate between several systems design strategies. Describe

More information

Perfect Balance of Public and Private Cloud

Perfect Balance of Public and Private Cloud Perfect Balance of Public and Private Cloud Delivered by Fujitsu Introducing A unique and flexible range of services, designed to make moving to the public cloud fast and easier for your business. These

More information

The Need for a Holistic Automation Solution to Overcome the Pitfalls in Test Automation

The Need for a Holistic Automation Solution to Overcome the Pitfalls in Test Automation The Need for a Holistic Automation Solution to Overcome the Pitfalls in Test Automation Abstract Many organizations opt for test automation with the primary objectives of reducing the cost of quality and

More information

Flash Decisions: Which Solution is Right for You?

Flash Decisions: Which Solution is Right for You? Flash Decisions: Which Solution is Right for You? A Guide to Finding the Right Flash Solution Introduction Chapter 1: Why Flash Storage Now? Chapter 2: Flash Storage Options Chapter 3: Choosing the Right

More information

Cloud Strategies for Addressing IT Challenges

Cloud Strategies for Addressing IT Challenges Cloud Strategies for Addressing IT Challenges Mark Bowker Senior Analyst Enterprise Strategy Group Introduction Mark Bowker, Senior Analyst U.S. Headquarters 20 Asylum Street Milford, MA 01757 2011 Enterprise

More information

Magento Enterprise Edition Customer Support Guide

Magento Enterprise Edition Customer Support Guide Magento Enterprise Edition Customer Support Guide April 2017 magento.com/support 2017 Magento, Inc. All rights reserved. Thank You for using Magento Enterprise Edition Customer support is a vital part

More information

Chapter 1 Living in a Network Centric World

Chapter 1 Living in a Network Centric World Chapter 1 Living in a Network Centric World Introduction The globalization of the Internet has succeeded faster than anyone could have imagined. The manner in which social, commercial, political and personal

More information

MAKING THE BUSINESS CASE MOVING ORACLE FORMS TO THE WEB

MAKING THE BUSINESS CASE MOVING ORACLE FORMS TO THE WEB MAKING THE BUSINESS CASE MOVING ORACLE FORMS TO THE WEB About Us Agenda Strategic Direction of Oracle Forms Applications Migration Options Migrating to 10g and 11g Migrating to J2EE and ADF Migrating to

More information

Architectural Design

Architectural Design Modeling and Systems Development Lecture 9 Architectural Design Creating a clear plan of what needs to be built and the infrastructure to build it on Design The purpose of the analysis phase is to figure

More information

BUS Chapter 4 Building an E-commerce Presence: Web Sites, Mobile Sites, and Apps

BUS Chapter 4 Building an E-commerce Presence: Web Sites, Mobile Sites, and Apps BUS 168 - Chapter 4 Building an E-commerce Presence: Web Sites, Mobile Sites, and Apps Imagine Your E-commerce Presence What s the idea? Vision Mission statement Target audience Intended market space Strategic

More information

CA Test Data Manager Key Scenarios

CA Test Data Manager Key Scenarios WHITE PAPER APRIL 2016 CA Test Data Manager Key Scenarios Generate and secure all the data needed for rigorous testing, and provision it to highly distributed teams on demand. Muhammad Arif Application

More information

CLOUD COMPUTING PRIMER

CLOUD COMPUTING PRIMER CLOUD COMPUTING PRIMER for Small and Medium-Sized Businesses CONTENTS 1 Executive Summary 2 ABCs of Cloud Computing An IT Revolution 3 The Democratization of Computing Cloud Computing Service Models SaaS

More information

Full file at

Full file at ch02 True/False Indicate whether the statement is true or false. 1. Computer networks and the Internet form the basic technology structure that underlies all electronic commerce. 2. The USENET was the

More information

Three Key Challenges Facing ISPs and Their Enterprise Clients

Three Key Challenges Facing ISPs and Their Enterprise Clients Three Key Challenges Facing ISPs and Their Enterprise Clients GRC, enterprise services, and ever-evolving hybrid infrastructures are all dynamic and significant challenges to the ISP s enterprise clients.

More information

Xceedium Xio Framework: Securing Remote Out-of-band Access

Xceedium Xio Framework: Securing Remote Out-of-band Access Xceedium Xio Framework: Securing Remote Out-of-band Access 1 Common Scenario A major corporation, with many domestic and international offices, has a massive network infrastructure that spans across many

More information

IBM Europe Announcement ZP , dated November 6, 2007

IBM Europe Announcement ZP , dated November 6, 2007 IBM Europe Announcement ZP07-0484, dated November 6, 2007 IBM WebSphere Front Office for Financial Markets V2.0 and IBM WebSphere MQ Low Latency Messaging V2.0 deliver high speed and high throughput market

More information

Networking Strategy and Optimization Services (NSOS) 2010 IBM Corporation

Networking Strategy and Optimization Services (NSOS) 2010 IBM Corporation Networking Strategy and Optimization Services (NSOS) Agenda Network Strategy and Optimization Services (NSOS) Overview IBM NSOS NAO Offerings Model IBM NSOS NIO Offerings Model Why IBM Lot of specialist

More information

Red Hat Virtualization Increases Efficiency And Cost Effectiveness Of Virtualization

Red Hat Virtualization Increases Efficiency And Cost Effectiveness Of Virtualization Forrester Total Economic Impact Study Commissioned by Red Hat January 2017 Red Hat Virtualization Increases Efficiency And Cost Effectiveness Of Virtualization Technology organizations are rapidly seeking

More information

Standardizing on Veritas Data Center Management Software from Symantec to Hit Service Levels and Cost Targets

Standardizing on Veritas Data Center Management Software from Symantec to Hit Service Levels and Cost Targets Standardizing on Veritas Data Center Management Software from Symantec to Hit Service Levels and Cost Targets It s challenging to manage one data center manages over 100. It also optimizes these data centers

More information

31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers

31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers 31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers CONTENTS Focus Questions... 2 Chapter 1: Explore the Network... 2 Chapter 2: Configure a Network Operating System... 5 Chapter 3: Network

More information

Don t You Just Care that Your Food Tastes Good...and that you can afford it! ITIL

Don t You Just Care that Your Food Tastes Good...and that you can afford it! ITIL Don t You Just Care that Your Food Tastes Good...and that you can afford it! ITIL ITSM Executive Overview PMI Southwest Ohio Mega Keith D. Sutherland April, 2016 Acknowledgements Service Management Dynamix,

More information

Musewerx support for Application Maintenance in Software AG NATURAL and ADABAS TM environment

Musewerx support for Application Maintenance in Software AG NATURAL and ADABAS TM environment Musewerx support for Application Maintenance in Software AG NATURAL and ADABAS TM environment Musewerx provides Application Maintenance Services for your applications written in NATURAL and ADABAS environment.

More information

Microsoft SharePoint Server 2013 Plan, Configure & Manage

Microsoft SharePoint Server 2013 Plan, Configure & Manage Microsoft SharePoint Server 2013 Plan, Configure & Manage Course 20331-20332B 5 Days Instructor-led, Hands on Course Information This five day instructor-led course omits the overlap and redundancy that

More information

Luckily, our enterprise had most of the back-end (services, middleware, business logic) already.

Luckily, our enterprise had most of the back-end (services, middleware, business logic) already. 2 3 4 The point here is that for real business applications, there is a connected back-end for services. The mobile part of the app is just a presentation layer that is unique for the mobile environment.

More information

The Corporate Intranet Gilbert Held

The Corporate Intranet Gilbert Held 51-10-52 The Corporate Intranet Gilbert Held Payoff The growth in the popularity of the Internet has significantly influenced software product development users today can access search tools and browsers

More information

PRIVATE MOBILE CONNECTION (formerly COMMERCIAL CONNECTIVITY SERVICE (CCS)) CUSTOM APN ATTACHMENT

PRIVATE MOBILE CONNECTION (formerly COMMERCIAL CONNECTIVITY SERVICE (CCS)) CUSTOM APN ATTACHMENT PRIVATE MOBILE CONNECTION (formerly COMMERCIAL CONNECTIVITY SERVICE (CCS)) CUSTOM APN ATTACHMENT Last Revised: 2/1/2017 1. Private Mobile Connection - Custom APN. Pursuant to the terms and conditions of

More information

AVOIDING HIGH ORACLE DBMS COSTS WITH EDB POSTGRES

AVOIDING HIGH ORACLE DBMS COSTS WITH EDB POSTGRES AVOIDING HIGH ORACLE DBMS COSTS WITH EDB POSTGRES An EDB White Paper For CIOs and IT Directors December 2015 TABLE OF CONTENTS 03 03 03 05 07 07 08 08 09 INTRODUCTION POSTGRES THE WORLD S MOST ADVANCED

More information

File services. Domains, DNS DHCP. Server Scripts. Intranet and Extranets. Web services. HNC COMPUTING - Network Concepts

File services. Domains, DNS DHCP. Server Scripts. Intranet and Extranets. Web services. HNC COMPUTING - Network Concepts File services Domains, DNS 1 DHCP Server Scripts Intranet and Extranets Web services HNC COMPUTING - Network Concepts A domain is a logical grouping of networked computers that share a central directory

More information

Seven Criteria for a Sound Investment in WAN Optimization

Seven Criteria for a Sound Investment in WAN Optimization Seven Criteria for a Sound Investment in WAN Optimization Introduction WAN optimization technology brings three important business benefits to IT organizations: Reduces branch office infrastructure costs

More information

Business Continuity & Disaster Recovery

Business Continuity & Disaster Recovery knowledge partner MARKET INSIGHT Business Continuity & Disaster Recovery Considerations for Saudi Organizations /mobily @MobilyBusiness 056 010 0901 I business.sales@mobily.com.sa About Us Mobily; the

More information

How the Web Works. Chapter 1. Modified by Marissa Schmidt Pearson

How the Web Works. Chapter 1. Modified by Marissa Schmidt Pearson How the Web Works Chapter 1 Modified by Marissa Schmidt 2015 Pearson Fundamentals ofhttp://www.funwebdev.com Web Development Objectives 1 Definitions and History 2 Internet Protocols 3 Client-Server Model

More information

The Business Case for a Web Content Management System. Published: July 2001

The Business Case for a Web Content Management System. Published: July 2001 The Business Case for a Web Content Management System Published: July 2001 Contents Executive Summary... 1 The Business Case for Web Content Management... 2 The Business Benefits of Web Content Management...

More information