Chapter 5: Planning in Web Engineering

Size: px
Start display at page:

Download "Chapter 5: Planning in Web Engineering"

Transcription

1 Chapter 5: Planning in Web Engineering 1

2 Do we really need Planning in WebE? Most WebApp increments are delivered over a time span that rarely exceeds 4 6 weeks. The questions are: 1. Do we really need to plan WebApp? 2. Shouls we let the WebApp evolve naturally? The answer is: Take an agile approach to Planning in WebE: WebApp_Planning = function1 (WebApp_Complexity) 2

3 In-Classroom Exercise 1. Informational read-only content is provided with simple navigation and links (ex: cnn.com) 2. Download a user downloads information from the appropriate server (ex: 3. Customizable the user customizes content to specific needs 4. Interaction communication among a community of users occurs via IM, chat rooms, bulletin boards) 5. User input forms-based input is the primary mechanism for communicating need (like, Search Bradley Course) 6. Transaction-oriented the user makes a request/purchase (e.g., places an order) that is fulfilled by the WebApp (online shopping like amazon.com) 7. Service-oriented the application provides a service to the user, e.g., assists the user in determining a mortgage payment 8. Portal the application channels the user to other Web content or services outside the domain of the portal application 9. Online Databases the user queries a large database and extracts information 10. Data warehousing/data mining the user queries a collection of large databases and extracts information (stand-alone database and online database are 2 different types of databases) 11. Action-based Web-based games (one player, many players, etc.) 12. Educational Web-based simulators, animators, etc. (that require very high Internet speed). Complex WebApp: Simple WebApp: Group Name: 2 examples (web sites). Group Name: 2 examples (web sites). Complex WebApp - Why? Simple WebApp -- Why? 3

4 Simple WebApp Simple WebApp: - content is well defined, - functions are straightforward, - light modifications are expected - minimal risk Planning takes a very little time 4

5 Complex WebApp Source: Complex WebApp characteristics: - content objects are not clear, - functions require a lot of animations and simulations, - multiple modifications (increments) are expected, - multiple constraints exist (for example, a variety of Web browsers, a variety of technical platform, etc.), - performance is unpredictable, etc. Planning takes a long time. 5

6 Planning Complexity Scope Planning is a key activity of Web Engineering Take an agile approach to Planning in WebE: In other words, adapt your effort and time spent on planning to the complexity of the WebApp increment: WebApp_Planning = function1 (WebApp_Complexity) WebApp_Complexity = function2 ( WebApp_context, WebApp_constraints, WebApp_content_objects, WebApp_functionality, WebApp_performance ) The scope of planning activities varies among project team members (or, people) involved in a WebE project. Ex: A team leader plans, monitors, and coordinates the combined work of a WebE team (all team-relegated activities). Ex: A Web engineer manages day-to-day work planning, monitoring, and controlling just technical tasks. 6

7 WebApp Planning Guidelines Understand scope before you define work tasks or schedule for an increment Refine framework actions and tasks Assign right team members for each task (right team) Evaluate risks Define a schedule Identify quality filters Identify how you ll manage change 7

8 1. WebApp Project Scope To plan effectively, you need to understand project scope To establish scope be sure you understand: Context. How does the WebApp fit into a business context, and what constraints are imposed as a result of the context? Information objectives. What customer-visible content objects are used by the WebApp increment? Functionality. What functions are initiated by the end user or invoked internally by the WebApp to meet the requirements defined in usage scenarios? Constraints and performance. What technical and environmental constraints are relevant? What special performance issues (including security and privacy issues) will require design and construction effort? 8

9 2. Web Engineering Framework Activities Those framework activities must be refined for use on the increment to be built. However, the set of activities and actions for on increment in NOT necessarily the same that is used for the nest increment. 9

10 Refining Actions and Tasks: An Example (p. 75) 10

11 What Work Products Should be Produced Analysis Modeling (or, representations, or diagrams *) User scenarios Content objects Content details Relations between content objects List of functions (functional requirements) Interface sketches Navigation maps Design Modeling (or, representations, or models *) Logical design Physical design Content objects design User interface design Functional design *) In WebEng the number of diagrams and/or models should be minimized; only those that are critical for the next increment. 11

12 3. Project Team (People) Interestingly, people working together with good communication and interaction can operate at noticeably higher levels than when they use their individual talents. We see this time and again in brainstorming and joint problem-solving sessions. Therefore, agile project teams [WebE teams] focus on increasing both individual competencies and collaboration levels. [by Cockburn and Highsmith] But how do successful teams conduct their business? What are characteristics of a successful tem? A set of team guidelines should be established. Shared vision or goal Sense of team identity Strong leadership is a must. Result-driven structure Competence and deep knowledge in specific areas (competent team members) Interdependence among team members Mutual trust Respect for individual talents is critical. Put your own opinion second to the team. Commitments to the team Effective communication (verbal, written, with use of modern techn.) Sense of autonomy Small team size High level of enjoyment Team climate. It s easy to get started, but it s very hard to sustain momentum. 12

13 Team Toxicity WebEng team can suffer team toxicity: A frenzied (angry) work atmosphere (waiting of energy and creativity; loosing focus). High frustrations causing by personal, business, or technological factors. Improperly chose process model (becomes a roadblock to accomplishment and success of WebApp D&D). Unclear definition of roles in WebE team. Continuous and repeated exposure to failure (loss of motivation, confidence and low morale) 13

14 4. Managing Risk Many problems can arise during a project. Risk management focuses on understanding and managing these problems (1. Identify the risk; 2. Assess its probability of occurrence; 3. Estimate its impact; 4. Establish a contingency or emergency plan). Levels of Risks. Considers risk at two different levels of granularity (1) Macro Risk: the impact of risk on the entire WebApp project, and (2) Micro Risk: the impact of risk on the current WebApp increment Project domains and typical risks: Timetable: Is the timeframe defined and reasonable? Increments: Will the increments provide ongoing value for end users Changes. How will requests for change impact delivery schedules? Technologies. Is the available technology appropriate for the job? Skills. Does the team have the right mix of skills to build this increment 14

15 Identifying Risks Address the fundamental question: What can go wrong? Each team member is asked to make a list of risks Process risks: problems that are tied to the framework actions and tasks that have been chosen by the team People risks: potential problems that can be directly traced to some human action or failing. Product risks: potential problems associated with WebApp content, functions, constraints, or performance. 15

16 Risk Analysis (Risk Matrix, Risk Management Matrix) 16

17 5. Developing Project Schedule Approach: List all WebE actions and tasks for an increment Build a network that depicts interdependencies Identify tasks that are critical Track progress (especially critical tasks) During the first iteration a macroscopic schedule is developed. Identify all increments and dates on which each increment will be deployed. For each subsequent increment The entry for the increment on the macroscopic schedule is refined into a detailed schedule. The WebApp schedule evolves over time. 17

18 Macroscopic and Microscopic Project Schedules 18

19 The Schedule 19

20 6. Estimating Project Time and Effort Use-case based estimation (based on time and efforts for well-known use cases; however, there is a lack of standardization of use cases). Process-based estimation (decomposition based on tasks required to complete the software process framework) Final product (WebApp) size and/or functions (FP)-based estimation (LOC, functions, function point, standard subsystem and/or component, change) 20

21 Use-Case Diagram in UML format (an example) Login Register Courses View Schedule View Grades Staff Administrator View Holds Degree Audit Proffesor Student Change Address Advisor Change BRN Other Options Help Logout Program Of Study Opinion 21

22 Estimation with Use-Cases use cases scenarios pages scenarios pages LOC LOC estimate User interface e subsystem ,366 Engineering subsystem group ,233 Infrastructure e subsystem group ,970 Total LOC estimate stimate 42,568 Using 620 LOC/pm as the average productivity for systems of this type and a burdened labor rate of $8000 per month, the cost per line of code is approximately $13. Based on the use-case estimate and the historical productivity data, the total estimated project cost is $552,000 and the estimated effort is 68 person-months. 22

23 Process-Based Estimation Example Activity CC Planning Risk Analysis Engineering Construction Release CE Totals Task analysis design code test Function UICF 2DGA 3DGA CGDF DSM PCF DAM n/a n/a n/a n/a n/a n/a n/a 5.00 Totals % effort % 1% 1% 8% 45% 10% 36% CC = customer communication CE = customer evaluation Based on an average burdened labor rate of $8,000 per month, the total estimated project cost is $368,000 and the estimated effort is 46 person-months. 23

24 Example: LOC Approach 1. Average productivity for systems of this type = 620 LOC/pm. 2. Burdened labor rate =$8000 per month, the cost per line of code is approximately $ Based on the LOC estimate and the historical productivity data, the total estimated project cost is $431,000 and the estimated effort is 54 person-months. 24

25 Example: FP Approach The estimated number of FP is derived: FP estimated = count-total 3 [ S (F i )] FP estimated = 375 organizational average productivity = 6.5 FP/pm. burdened (above and beyond) labor rate = $8000 per month, approximately $1230/FP. Based on the FP estimate and the historical productivity data, total estimated project cost is $461,000 and estimated effort is 58 person-months. 25

26 Empirical Estimation Models General form: effort = tuning coefficient * size exponent usually derived as person-months of effort required either a constant or a number derived based on complexity of project usually LOC but may also be function point empirically derived 26

27 7. Managing Quality What Quality Assurance Mechanisms Can the Team Use? A thoughtful, thorough communication activity Careful requirements gathering Pair walkthroughs to assess the quality of all work products Create a generic checklist that you can use to assess models Use tests to evaluate quality 27

28 Quality Filters (or, Walkthrough, or Formal Technical Reviews = FTRs) Quality filters 28

29 Pair Walkthrough Review the product, not the producer. Set an agenda and maintain it. One of the key maladies of meetings of all types is drift. A walkthrough should be kept on track and on schedule. Limit debate and rebuttal. When an issue is raised by a reviewer, there may not be agreement on its impact. Rather than spending time debating the question, the issue should be recorded for resolution later. Enunciate problem areas, but don't attempt to solve every problem noted. A walkthrough is not a problem-solving session. Take written notes. Notes may be entered directly into a notebook computer. Spend enough time to uncover quality problems, but not one minute more. In general, a team walkthrough should be completed within 60 to 90 minutes at the most. 29

30 8. WebApp Change Management 30

Topic 01. Software Engineering, Web Engineering, agile methodologies.

Topic 01. Software Engineering, Web Engineering, agile methodologies. Topic 01 Software Engineering, Web Engineering, agile methodologies. 1 What is Software Engineering? 2 1 Classic Software Engineering The IEEE definition: Software Engineering is the application of a disciplined,

More information

Topic 02. Web Generations. Web Engineering. Web Systems Characteristics

Topic 02. Web Generations. Web Engineering. Web Systems Characteristics Topic 02 Web Generations. Web Engineering. Web Systems Characteristics 1 World Wide Web (Web) Generations 2 1 Web 1.0, Web 2.0, Web 3.0, Web 4.0 Web-Based Education/Learning 1.0, 2.0, 3.0, 4.0 2000 Web

More information

RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE.

RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE. RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE. Is putting Contact us INTRODUCTION You know the headaches of managing an infrastructure that is stretched to its limit. Too little staff. Too many users. Not

More information

Chapter 5 Practice: A Generic View

Chapter 5 Practice: A Generic View Chapter 5 Practice: A Generic View Moonzoo Kim CS Division of EECS Dept. KAIST moonzoo@cs.kaist.ac.kr http://pswlab.kaist.ac.kr/courses/cs550-07 Spring 2007 1 What is Practice? Practice is a broad array

More information

Functional Design of Web Applications. (partially, Chapter 7)

Functional Design of Web Applications. (partially, Chapter 7) Functional Design of Web Applications (partially, Chapter 7) Functional Design: An Overview Users of modern WebApps expect that robust content will be coupled with sophisticated functionality The advanced

More information

WHO SHOULD ATTEND? ITIL Foundation is suitable for anyone working in IT services requiring more information about the ITIL best practice framework.

WHO SHOULD ATTEND? ITIL Foundation is suitable for anyone working in IT services requiring more information about the ITIL best practice framework. Learning Objectives and Course Descriptions: FOUNDATION IN IT SERVICE MANAGEMENT This official ITIL Foundation certification course provides you with a general overview of the IT Service Management Lifecycle

More information

13.f Toronto Catholic District School Board's IT Strategic Review - Draft Executive Summary (Refer 8b)

13.f Toronto Catholic District School Board's IT Strategic Review - Draft Executive Summary (Refer 8b) AGENDA ADDENDU TE REGULAR EETING OF TE AUDIT COITTEE COITTEE PUBLIC SESSION Tuesday, June 6, 2017 6:30 P.. Pages 13. Staff Reports 13.f Toronto Catholic District School Board's IT Strategic Review - Draft

More information

Standard Glossary of Terms used in Software Testing. Version 3.2. Foundation Extension - Usability Terms

Standard Glossary of Terms used in Software Testing. Version 3.2. Foundation Extension - Usability Terms Standard Glossary of Terms used in Software Testing Version 3.2 Foundation Extension - Usability Terms International Software Testing Qualifications Board Copyright Notice This document may be copied in

More information

ISO9001:2015 LEAD IMPLEMENTER & LEAD AUDITOR

ISO9001:2015 LEAD IMPLEMENTER & LEAD AUDITOR ISO9001:2015 LEAD IMPLEMENTER & LEAD AUDITOR JPCANN ASSOCIATES LTD #58 NSAWAM ROAD, AVENOR JUNCTION, KOKOMLEMLE-ACCRA Office lines: +233 302 242 573 / +233 302 974 302 Mobile: +233 501 335 818 20 www.corptrainghana.com

More information

POSITION DESCRIPTION

POSITION DESCRIPTION POSITION DESCRIPTION Engagement Manager Unit/Branch, Directorate: Location: Outreach & Engagement, Information Assurance and Cyber Security Directorate Auckland Salary range: H $77,711 - $116,567 Purpose

More information

Position Description IT Auditor

Position Description IT Auditor Position Title IT Auditor Position Number Portfolio Performance and IT Audit Location Victoria Supervisor s Title IT Audit Director Travel Required Yes FOR OAG HR USE ONLY: Approved Classification or Leadership

More information

Using the Web in Your Teaching

Using the Web in Your Teaching Using the Web in Your Teaching November 16, 2001 Dirk Morrison Extension Division, University of Saskatchewan Workshop Outline What will we cover? Why use the Web for teaching and learning? Planning to

More information

Position Description. Engagement Manager UNCLASSIFIED. Outreach & Engagement Information Assurance and Cyber Security Directorate.

Position Description. Engagement Manager UNCLASSIFIED. Outreach & Engagement Information Assurance and Cyber Security Directorate. Position Description Engagement Manager Business unit: Position purpose: Direct reports: Directorate overview: Business Unit Overview Remuneration indicator: Outreach & Engagement Information Assurance

More information

Professional Services for Cloud Management Solutions

Professional Services for Cloud Management Solutions Professional Services for Cloud Management Solutions Accelerating Your Cloud Management Capabilities CEOs need people both internal staff and thirdparty providers who can help them think through their

More information

Manager, Infrastructure Services. Position Number Community Division/Region Yellowknife Technology Service Centre

Manager, Infrastructure Services. Position Number Community Division/Region Yellowknife Technology Service Centre IDENTIFICATION Department Position Title Infrastructure Manager, Infrastructure Services Position Number Community Division/Region 32-11488 Yellowknife Technology Service Centre PURPOSE OF THE POSITION

More information

COBIT 5 Implementation

COBIT 5 Implementation COBIT 5 Implementation Fifalde Consulting Inc. +1-613-699-3005 2017 Fifalde Consulting Inc. COBIT is a registered Trade Mark of ISACA and the IT Governance Institute. 2 1. Course Description: Get a practical

More information

PAGE - 16 PAGE - 1. Sometimes, the solution is just a benchmark away..

PAGE - 16 PAGE - 1. Sometimes, the solution is just a benchmark away.. PAGE - 16 PAGE - 1 Sometimes, the solution is just a benchmark away.. Post Box 301532, Riyadh 11372, Kingdom Of Saudi Arabia. Tel: +966 1 229 1819 Fax: +966 1 229 1801 PAGE - 2 PAGE - 3 The base of automation

More information

TECHNOLOGY WHITE PAPER. Java for the Real Time Business

TECHNOLOGY WHITE PAPER. Java for the Real Time Business TECHNOLOGY WHITE PAPER Executive Summary The emerging Real Time Business Imperative means your business now must leverage new technologies and high volumes of data to deliver insight, capability and value

More information

Threat and Vulnerability Assessment Tool

Threat and Vulnerability Assessment Tool TABLE OF CONTENTS Threat & Vulnerability Assessment Process... 3 Purpose... 4 Components of a Threat & Vulnerability Assessment... 4 Administrative Safeguards... 4 Logical Safeguards... 4 Physical Safeguards...

More information

Cloud solution consultant

Cloud solution consultant Cloud solution consultant Role brief Directorate Jisc technologies Base location Harwell or Bristol Grade B Level 18 Job family Professional services Date November 2017 Reports to Cloud services group

More information

3Lesson 3: Web Project Management Fundamentals Objectives

3Lesson 3: Web Project Management Fundamentals Objectives 3Lesson 3: Web Project Management Fundamentals Objectives By the end of this lesson, you will be able to: 1.1.11: Determine site project implementation factors (includes stakeholder input, time frame,

More information

Introduction to User Stories. CSCI 5828: Foundations of Software Engineering Lecture 05 09/09/2014

Introduction to User Stories. CSCI 5828: Foundations of Software Engineering Lecture 05 09/09/2014 Introduction to User Stories CSCI 5828: Foundations of Software Engineering Lecture 05 09/09/2014 1 Goals Present an introduction to the topic of user stories concepts and terminology benefits and limitations

More information

GET CLOUD EMPOWERED. SEE HOW THE CLOUD CAN TRANSFORM YOUR BUSINESS.

GET CLOUD EMPOWERED. SEE HOW THE CLOUD CAN TRANSFORM YOUR BUSINESS. GET CLOUD EMPOWERED. SEE HOW THE CLOUD CAN TRANSFORM YOUR BUSINESS. Cloud computing is as much a paradigm shift in data center and IT management as it is a culmination of IT s capacity to drive business

More information

Data governance and data quality: is it on your agenda or lurking in the shadows?

Data governance and data quality: is it on your agenda or lurking in the shadows? Data governance and data quality: is it on your agenda or lurking in the shadows? Associate Professor Anne Young Director Planning, Quality and Reporting The University of Newcastle Context Data governance

More information

Systems Analysis & Design

Systems Analysis & Design Systems Analysis & Design Dr. Ahmed Lawgali Ahmed.lawgali@uob.edu.ly Slide 1 Systems Analysis & Design Course Textbook: Systems Analysis and Design With UML 2.0 An Object-Oriented Approach, Second Edition

More information

for TOGAF Practitioners Hands-on training to deliver an Architecture Project using the TOGAF Architecture Development Method

for TOGAF Practitioners Hands-on training to deliver an Architecture Project using the TOGAF Architecture Development Method Course Syllabus for 3 days Expert led Enterprise Architect hands-on training "An Architect, in the subtlest application of the word, describes one able to engage and arrange all elements of an environment

More information

SERVICE OPERATION ITIL INTERMEDIATE TRAINING & CERTIFICATION

SERVICE OPERATION ITIL INTERMEDIATE TRAINING & CERTIFICATION SERVICE OPERATION ITIL INTERMEDIATE TRAINING & CERTIFICATION WHAT IS ITIL SO? The intermediate level of ITIL offers a role based hands-on experience and in-depth coverage of the contents. Successful implementation

More information

ISO/ IEC (ITSM) Certification Roadmap

ISO/ IEC (ITSM) Certification Roadmap ISO/ IEC 20000 (ITSM) Certification Roadmap Rasheed Adegoke June 2013 Outline About First Bank Motivations Definitions ITIL, ISO/IEC 20000 & DIFFERENCES ISO/ IEC 20000 Certification Roadmap First Bank

More information

A company built on security

A company built on security Security How we handle security at Flywheel Flywheel was founded in 2012 on a mission to create an exceptional platform to help creatives do their best work. As the leading WordPress hosting provider for

More information

GRADUATE CERTIFICATE IN BUSINESS CONTINUITY MANAGEMENT

GRADUATE CERTIFICATE IN BUSINESS CONTINUITY MANAGEMENT GRADUATE CERTIFICATE IN BUSINESS CONTINUITY MANAGEMENT If you are looking to develop expertise in a specialized area and broaden your knowledge base, but time and cost limitations are interfering with

More information

Cloud solution consultant

Cloud solution consultant Cloud solution consultant Role brief Directorate Jisc technologies Base location Harwell or Bristol Grade B Job level 18 Job family Professional services Date 23/10/2017 Reports to Cloud services group

More information

Education Network Security

Education Network Security Education Network Security RECOMMENDATIONS CHECKLIST Learn INSTITUTE Education Network Security Recommendations Checklist This checklist is designed to assist in a quick review of your K-12 district or

More information

Sustainable Security Operations

Sustainable Security Operations Sustainable Security Operations Optimize processes and tools to make the most of your team s time and talent The number and types of security incidents organizations face daily are steadily increasing,

More information

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS Continual disclosed and reported

More information

PECB Change Log Form

PECB Change Log Form GENERAL INFORMATION Owner / Department* Approver / Department * Training Development Department Quality Assurance Department Date of Approval* 2019-01-09 Course name: Language: New Version: Previous Version:

More information

TEST ENGINE SYSTEM (TES) SOFTWARE PROJECT PLAN PHASE I. April 8, Version 1.0

TEST ENGINE SYSTEM (TES) SOFTWARE PROJECT PLAN PHASE I. April 8, Version 1.0 TEST ENGINE SYSTEM (TES) SOFTWARE PROJECT PLAN PHASE I April 8, 2003 Version 1.0 Team Members Page 1 of 16 Test Engine System Table of Contents 1.0 Introduction 1.1 Project scope 1.2 Major software functions

More information

NHS Fife. 2015/16 Audit Computer Service Review Follow Up

NHS Fife. 2015/16 Audit Computer Service Review Follow Up NHS Fife 2015/16 Audit Computer Service Review Follow Up Prepared for NHS Fife April 2016 Audit Scotland is a statutory body set up in April 2000 under the Public Finance and Accountability (Scotland)

More information

European Commission. Immigration Portal Development Case. Date: 08/06/2007 Version: 1.0 Authors: Revised by: Approved by: Public: Reference Number:

European Commission. Immigration Portal Development Case. Date: 08/06/2007 Version: 1.0 Authors: Revised by: Approved by: Public: Reference Number: EUROPEAN COMMISSION DIRECTORATE-GENERAL INFORMATICS Information systems Directorate European Commission Immigration Portal Development Case Date: 08/06/2007 Version: 1.0 Authors: Revised by: Approved by:

More information

Analysis Modeling Week 5

Analysis Modeling Week 5 Analysis Modeling Week 5 Announcement Midterm I Monday March, 7 th Scope Ch. 1, 2, 3, 4 and Ch. 6 of the text book Ch. 1, 2 and 3 of the lab book Analysis modeling dli Agenda (Lecture) Agenda (Lab) Weekly

More information

Project Management Professional Training

Project Management Professional Training Project Management Professional Training About Cognixia Cognixia, formerly known as Collabera TACT, is a Collabera Learning Solutions Company. Being a consistently awarded Digital Technology Training Company,

More information

Cybersecurity. Securely enabling transformation and change

Cybersecurity. Securely enabling transformation and change Cybersecurity Securely enabling transformation and change Contents... Cybersecurity overview Business drivers Cybersecurity strategy and roadmap Cybersecurity in practice CGI s cybersecurity offering Why

More information

Q1) Describe business intelligence system development phases? (6 marks)

Q1) Describe business intelligence system development phases? (6 marks) BUISINESS ANALYTICS AND INTELLIGENCE SOLVED QUESTIONS Q1) Describe business intelligence system development phases? (6 marks) The 4 phases of BI system development are as follow: Analysis phase Design

More information

The main website for Henrico County, henrico.us, received a complete visual and structural

The main website for Henrico County, henrico.us, received a complete visual and structural Page 1 1. Program Overview The main website for Henrico County, henrico.us, received a complete visual and structural overhaul, which was completed in May of 2016. The goal of the project was to update

More information

Implementing ITIL v3 Service Lifecycle

Implementing ITIL v3 Service Lifecycle Implementing ITIL v3 Lifecycle WHITE PAPER introduction GSS INFOTECH IT services have become an integral means for conducting business for all sizes of businesses, private and public organizations, educational

More information

IT Governance ISO/IEC 27001:2013 ISMS Implementation. Service description. Protect Comply Thrive

IT Governance ISO/IEC 27001:2013 ISMS Implementation. Service description. Protect Comply Thrive IT Governance ISO/IEC 27001:2013 ISMS Implementation Service description Protect Comply Thrive 100% guaranteed ISO 27001 certification with the global experts With the IT Governance ISO 27001 Implementation

More information

Microsoft SharePoint Server 2013 Plan, Configure & Manage

Microsoft SharePoint Server 2013 Plan, Configure & Manage Microsoft SharePoint Server 2013 Plan, Configure & Manage Course 20331-20332B 5 Days Instructor-led, Hands on Course Information This five day instructor-led course omits the overlap and redundancy that

More information

Level 5 Diploma in Computing

Level 5 Diploma in Computing Level 5 Diploma in Computing 1 www.lsib.co.uk Objective of the qualification: It should available to everyone who is capable of reaching the required standards It should be free from any barriers that

More information

The Great TOGAF Scavenger Hunt. Enterprise Architecture Using TOGAF 9 Course Preparation Guide

The Great TOGAF Scavenger Hunt. Enterprise Architecture Using TOGAF 9 Course Preparation Guide Enterprise Architecture Using TOGAF 9 Course Preparation Guide 2011 Metaplexity Associates LLC All Rights Reserved Version 2.0 January 2, 2011 The Open Group Certification Mark logo and TOGAF are trademarks,

More information

University of British Columbia Library. Persistent Digital Collections Implementation Plan. Final project report Summary version

University of British Columbia Library. Persistent Digital Collections Implementation Plan. Final project report Summary version University of British Columbia Library Persistent Digital Collections Implementation Plan Final project report Summary version May 16, 2012 Prepared by 1. Introduction In 2011 Artefactual Systems Inc.

More information

2017 Trends in Security Metrics and Security Assurance Measurement Report A Survey of IT Security Professionals

2017 Trends in Security Metrics and Security Assurance Measurement Report A Survey of IT Security Professionals 2017 Trends in Security Metrics and Security Assurance Measurement Report A Survey of IT Security Professionals Sponsored by Contents Introduction....3 Key Takeaways from the 2017 Report:....3 Security

More information

National Initiative for Cyber Education (NICE) and the Cybersecurity Workforce Framework: Attract and Retain the Best in InfoSec.

National Initiative for Cyber Education (NICE) and the Cybersecurity Workforce Framework: Attract and Retain the Best in InfoSec. National Initiative for Cyber Education (NICE) and the Cybersecurity Workforce Framework: Attract and Retain the Best in InfoSec April 12, 2018 1 Introduction to NICE - The National Initiative for Cybersecurity

More information

Data Virtualization Implementation Methodology and Best Practices

Data Virtualization Implementation Methodology and Best Practices White Paper Data Virtualization Implementation Methodology and Best Practices INTRODUCTION Cisco s proven Data Virtualization Implementation Methodology and Best Practices is compiled from our successful

More information

EXIN BCS SIAM Foundation. Sample Exam. Edition

EXIN BCS SIAM Foundation. Sample Exam. Edition EXIN BCS SIAM Foundation Sample Exam Edition 201704 Copyright EXIN Holding B.V. and BCS, 2017. All rights reserved. EXIN is a registered trademark. SIAM is a registered trademark. ITIL is a registered

More information

Your Student s Head Start on Career Goals and College Aspirations

Your Student s Head Start on Career Goals and College Aspirations Your Student s Head Start on Career Goals and College Aspirations INFORMATION TECHNOLOGY (IT) NETWORKING PATHWAY The Destinations Networking Pathway prepares students to test and evaluate computer network

More information

Office of Human Resources. IT Database Administrator Associate CI2816

Office of Human Resources. IT Database Administrator Associate CI2816 Office of Human Resources IT Database Administrator Associate CI2816 General Statement of Duties Performs standard level professional information technology work installing, configuring, and upgrading

More information

The LUCID Design Framework (Logical User Centered Interaction Design)

The LUCID Design Framework (Logical User Centered Interaction Design) The LUCID Design Framework (Logical User Centered Interaction Design) developed by Cognetics Corporation LUCID Logical User Centered Interaction Design began as a way of describing the approach to interface

More information

CS 577A Team 1 DCR ARB. PicShare

CS 577A Team 1 DCR ARB. PicShare CS 577A Team 1 DCR ARB PicShare Team and Project Review (DEN) Project Evaluation Positives Resilient Agile detailed design promotes thoroughness before any code is written Development time should be reduced

More information

Web Evaluation Report Guidelines

Web Evaluation Report Guidelines Web Evaluation Report Guidelines Graduate Students: You are required to conduct a usability test for your final project in this course. Please review the project description and the evaluation rubric on

More information

THE JOURNEY OVERVIEW THREE PHASES TO A SUCCESSFUL MIGRATION ADOPTION ACCENTURE IS 80% IN THE CLOUD

THE JOURNEY OVERVIEW THREE PHASES TO A SUCCESSFUL MIGRATION ADOPTION ACCENTURE IS 80% IN THE CLOUD OVERVIEW Accenture is in the process of transforming itself into a digital-first enterprise. Today, Accenture is 80 percent in a public cloud. As the journey continues, Accenture shares its key learnings

More information

Business Analysis for Practitioners - Requirements Elicitation and Analysis (Domain 3)

Business Analysis for Practitioners - Requirements Elicitation and Analysis (Domain 3) Business Analysis for Practitioners - Requirements Elicitation and Analysis (Domain 3) COURSE STRUCTURE Introduction to Business Analysis Module 1 Needs Assessment Module 2 Business Analysis Planning Module

More information

Marine Institute Job Description

Marine Institute Job Description Marine Institute Job Description Position Contract Service Group Location Temporary Systems Administrator Team Leader Temporary Specified Purpose contract for a duration of up to 3 years Ocean Science

More information

CASA External Peer Review Program Guidelines. Table of Contents

CASA External Peer Review Program Guidelines. Table of Contents CASA External Peer Review Program Guidelines Table of Contents Introduction... I-1 Eligibility/Point System... I-1 How to Request a Peer Review... I-1 Peer Reviewer Qualifications... I-2 CASA Peer Review

More information

What is database continuous integration?

What is database continuous integration? What is database continuous integration? Database continuous integration (CI) is the rapid integration of database schema and logic changes into application development efforts and to provide immediate

More information

CS487 Midterm Exam Summer 2005

CS487 Midterm Exam Summer 2005 1. (4 Points) How does software differ from the artifacts produced by other engineering disciplines? 2. (10 Points) The waterfall model is appropriate for projects with what Characteristics? Page 1 of

More information

Project Management Professional (PMP) Exam Preparation elearning Course

Project Management Professional (PMP) Exam Preparation elearning Course Project Management Professional (PMP) Exam Preparation elearning Course Course Code: PMC001CL Duration: 4 Days, 35 Hours Format: elearning Certification Exam: PMI s PMP Exam Certification Track: N/A Course

More information

STAFF REPORT. January 26, Audit Committee. Information Security Framework. Purpose:

STAFF REPORT. January 26, Audit Committee. Information Security Framework. Purpose: STAFF REPORT January 26, 2001 To: From: Subject: Audit Committee City Auditor Information Security Framework Purpose: To review the adequacy of the Information Security Framework governing the security

More information

I D C T E C H N O L O G Y S P O T L I G H T

I D C T E C H N O L O G Y S P O T L I G H T I D C T E C H N O L O G Y S P O T L I G H T P ow e ring Digital Transfor m a t i o n T h r ough the C l o u d - R e a d y E n t e r p rise September 2016 Adapted from Developing a Cloud Strategy for Digital

More information

The Center for Internet Security

The Center for Internet Security The Center for Internet Security The CIS Security Metrics Service July 1 2008 Organizations struggle to make cost-effective security investment decisions; information security professionals lack widely

More information

Agenda. Bibliography

Agenda. Bibliography Humor 2 1 Agenda 3 Trusted Digital Repositories (TDR) definition Open Archival Information System (OAIS) its relevance to TDRs Requirements for a TDR Trustworthy Repositories Audit & Certification: Criteria

More information

PREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud.

PREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud. PREPARE FOR TAKE OFF Accelerate your organisation s journey to the Cloud. cloud. Contents Introduction Program & Governance BJSS Cloud Readiness Assessment: Intro Platforms & Development BJSS Cloud Readiness

More information

CITP Mentoring Program Guidelines

CITP Mentoring Program Guidelines CITP Mentoring Program Guidelines 1 AICPA CITP Mentoring Program Guidelines 2017 American Institute of CPAs. All rights reserved. DISCLAIMER: The contents of this publication do not necessarily reflect

More information

Chapter 2 Example Modeling and Forecasting Scenario

Chapter 2 Example Modeling and Forecasting Scenario Chapter 2 Example Modeling and Forecasting Scenario This scenario is for a hypothetical project that aims to re-launch a website. It demonstrates the thinking process and practical implementation of using

More information

Smart Data Center Solutions

Smart Data Center Solutions Smart Data Center Solutions New Data Center Challenges Require New Solutions Data Center Architecture. Inside and Out. Data centers are mission-critical facilities. A silo-based approach to designing,

More information

Work-ready skills in Business, Administration and IT

Work-ready skills in Business, Administration and IT Work-ready skills in Business, Administration and IT A guide for centres We believe in learning At the core of everything we do is the desire to make a measurable impact on improving people s lives through

More information

FDD Process #1: Develop an Overall Model

FDD Process #1: Develop an Overall Model FDD Process #1: Develop an Overall Model A initial project-wide activity with domain and development members under the guidance of an experienced object modeller in the role of Chief Architect. A high-level

More information

Module 3. Overview of TOGAF 9.1 Architecture Development Method (ADM)

Module 3. Overview of TOGAF 9.1 Architecture Development Method (ADM) Module 3 Overview of TOGAF 9.1 Architecture Development Method (ADM) TOGAF 9.1 Structure The Architecture Development Method (ADM) Needs of the business shape non-architectural aspects of business operation

More information

Business Impact Analysis (BIA)

Business Impact Analysis (BIA) Your BCM, Risk & Crisis Management software solution since 1999 Conducting an Effective Business Impact Analysis (BIA) Presented by: Sherri Flynn MBCP, CISM Agenda What is a Business Impact Analysis (BIA)?

More information

TX CIO Leadership Journey Texas CIOs Bowden Hight Texas Health and Human Services Commission Tim Jennings Texas Department of Transportation Mark

TX CIO Leadership Journey Texas CIOs Bowden Hight Texas Health and Human Services Commission Tim Jennings Texas Department of Transportation Mark TX CIO Leadership Journey Texas CIOs Bowden Hight Texas Health and Human Services Commission Tim Jennings Texas Department of Transportation Mark Stone Texas A&M University System Moderator Anh Selissen

More information

ORACLE SERVICES FOR APPLICATION MIGRATIONS TO ORACLE HARDWARE INFRASTRUCTURES

ORACLE SERVICES FOR APPLICATION MIGRATIONS TO ORACLE HARDWARE INFRASTRUCTURES ORACLE SERVICES FOR APPLICATION MIGRATIONS TO ORACLE HARDWARE INFRASTRUCTURES SERVICE, SUPPORT AND EXPERT GUIDANCE FOR THE MIGRATION AND IMPLEMENTATION OF YOUR ORACLE APPLICATIONS ON ORACLE INFRASTRUCTURE

More information

POSITION DESCRIPTION

POSITION DESCRIPTION Network Security Consultant POSITION DESCRIPTION Unit/Branch, Directorate: Location: Regulatory Unit Information Assurance and Cyber Security Directorate Auckland Salary range: I $90,366 - $135,548 Purpose

More information

BRING EXPERT TRAINING TO YOUR WORKPLACE.

BRING EXPERT TRAINING TO YOUR WORKPLACE. BRING EXPERT TRAINING TO YOUR WORKPLACE. ISACA s globally respected training and certification programs inspire confidence that enables innovation in the workplace. ISACA s On-Site Training brings a unique

More information

Hardening the Cloud: Assuring Agile Security in High-Growth Environments (Moving from span ports to virtual appliances)

Hardening the Cloud: Assuring Agile Security in High-Growth Environments (Moving from span ports to virtual appliances) SESSION ID: CSV-F01 Hardening the Cloud: Assuring Agile Security in High-Growth Environments (Moving from span ports to virtual appliances) Aaron McKeown Lead Security Architect Xero Fast or Secure Fast

More information

Proactive Security: Effective Cyber Risk Mitigation. Dave Shackleford Founder and Principal Consultant, Voodoo Security

Proactive Security: Effective Cyber Risk Mitigation. Dave Shackleford Founder and Principal Consultant, Voodoo Security Proactive Security: Effective Cyber Risk Mitigation Dave Shackleford Founder and Principal Consultant, Voodoo Security Agenda This talk will really be split into two sections The first will focus on new

More information

CORNERSTONE CONNECT REDESIGN Phase 2 (new UI!) GLOBAL SEARCH CONNECT (new UI!)

CORNERSTONE CONNECT REDESIGN Phase 2 (new UI!) GLOBAL SEARCH CONNECT (new UI!) 1 CORNERSTONE CONNECT REDESIGN Phase 2 (new UI!) The next phase of Cornerstone Connect is here! The user interface and experience of Knowledge Bank and Communities have been completely redesigned. This

More information

STRATEGIC PLAN

STRATEGIC PLAN STRATEGIC PLAN 2013-2018 In an era of growing demand for IT services, it is imperative that strong guiding principles are followed that will allow for the fulfillment of the Division of Information Technology

More information

Integrating ITIL and COBIT 5 to optimize IT Process and service delivery. Johan Muliadi Kerta

Integrating ITIL and COBIT 5 to optimize IT Process and service delivery. Johan Muliadi Kerta Integrating ITIL and COBIT 5 to optimize IT Process and service delivery Johan Muliadi Kerta Measurement is the first step that leads to control and eventually to improvement. If you can t measure something,

More information

Controlling the Project Pipeline: Managing Constraints to Maximize Outputs

Controlling the Project Pipeline: Managing Constraints to Maximize Outputs Washington, DC Metro Office Controlling the Project Pipeline: Managing Constraints to Maximize Outputs David Lendry, PMP Director, Project Solutions TenStep of Metro DC, Federal, Maryland & Eastern New

More information

Bridge Course On Software Testing

Bridge Course On Software Testing G. PULLAIAH COLLEGE OF ENGINEERING AND TECHNOLOGY Accredited by NAAC with A Grade of UGC, Approved by AICTE, New Delhi Permanently Affiliated to JNTUA, Ananthapuramu (Recognized by UGC under 2(f) and 12(B)

More information

Security Director - VisionFund International

Security Director - VisionFund International Security Director - VisionFund International Location: [Europe & the Middle East] [United Kingdom] Category: Security Job Type: Open-ended, Full-time *Preferred location: United Kingdom/Eastern Time Zone

More information

Chapter 6 Architectural Design

Chapter 6 Architectural Design Chapter 6 Architectural Design Chapter 6 Architectural Design Slide 1 Topics covered The WHAT and WHY of architectural design Architectural design decisions Architectural views/perspectives Architectural

More information

VMware vcloud Air Accelerator Service

VMware vcloud Air Accelerator Service DATASHEET AT A GLANCE The VMware vcloud Air Accelerator Service assists customers with extending their private VMware vsphere environment to a VMware vcloud Air public cloud. This Accelerator Service engagement

More information

Symantec Data Center Migration Service

Symantec Data Center Migration Service Avoid unplanned downtime to critical business applications while controlling your costs and schedule The Symantec Data Center Migration Service helps you manage the risks and complexity of a migration

More information

Certified Associate in Project Management (CAPM) Exam Prep Boot Camp - Brochure

Certified Associate in Project Management (CAPM) Exam Prep Boot Camp - Brochure Certified Associate in Project Management (CAPM) Exam Prep Boot Camp - Brochure Your first step to a Rewarding Career in Project Management Course Name : CAPM Version : IINVL_CAPM_BR_02_061_1.2 Course

More information

Architectural Design

Architectural Design Architectural Design Topics i. Architectural design decisions ii. Architectural views iii. Architectural patterns iv. Application architectures Chapter 6 Architectural design 2 PART 1 ARCHITECTURAL DESIGN

More information

Three Key Challenges Facing ISPs and Their Enterprise Clients

Three Key Challenges Facing ISPs and Their Enterprise Clients Three Key Challenges Facing ISPs and Their Enterprise Clients GRC, enterprise services, and ever-evolving hybrid infrastructures are all dynamic and significant challenges to the ISP s enterprise clients.

More information

The Key Business Benefits and Business Drivers of a Green IT Strategy in Education

The Key Business Benefits and Business Drivers of a Green IT Strategy in Education The Key Business Benefits and Business Drivers of a Green IT Strategy in Education Saving the planet, one classroom at a time. Mark Winter Founder Computers Off Australia South Pacific User Services Conference

More information

Drinking Water Emergency Management Ministry of the Environment 2012 Drinking Water Leadership Summit October 25, 2012

Drinking Water Emergency Management Ministry of the Environment 2012 Drinking Water Leadership Summit October 25, 2012 Drinking Water Emergency Management Ministry of the Environment 2012 Drinking Water Leadership Summit October 25, 2012 Christine Campbell Team Leader, Drinking Water Emergency Planning Ministry of the

More information

Sample Exam. Certified Tester Foundation Level

Sample Exam. Certified Tester Foundation Level Sample Exam Certified Tester Foundation Level Answer Table ASTQB Created - 2018 American Stware Testing Qualifications Board Copyright Notice This document may be copied in its entirety, or extracts made,

More information

Results Summary Show All Pages and Questions

Results Summary Show All Pages and Questions Page 1 of 8 Tuesday, November 14, 2006 Results Summary Show All Pages and Questions Filter Results To analyze a subset of your data, you can create one or more filters. : 1137 Visible: 1137 Share Results

More information

2 The IBM Data Governance Unified Process

2 The IBM Data Governance Unified Process 2 The IBM Data Governance Unified Process The benefits of a commitment to a comprehensive enterprise Data Governance initiative are many and varied, and so are the challenges to achieving strong Data Governance.

More information