Session 2. Getting started with a well-structured system specification

Size: px
Start display at page:

Download "Session 2. Getting started with a well-structured system specification"

Transcription

1 Session 2 Getting started with a well-structured system specification COMP 320/420 Spring, 2018 Conrad Weisert The situation A representative approaches us. (or vice versa) He or she may be a. an executive with funds b. or a worker with a perceived need and may represent a. a department or organization inside our company b. or a potential outside customer He or she makes us aware of the possible need for a computer application system a. to replace an unsatisfactory old (computerized or manual) system b. or to exploit a new opportunity c. or to avoid a future penalty d. (or whatever) Our response We need to determine, at least tentatively, the scope of the proposed system. Who (by role or job function) will use it? What activities will be included? what ones are specifically excluded? What current systems, if any, will it replace? What information will the system provide? Until everyone (who?) agrees on the above, there's no point in proceeding with: Designing the system, Estimating what it will cost, Estimating when it can be ready. Two easy things we can do early Document the preliminary scope One effective technique is the context diagram, a trivial form of dataflow diagram Discuss and negotiate it with stakeholders Give a very rough range of estimates (min & max) Specify some principal system outputs, the information the system will produce. Note: These two activities are largely independent of methodology or choice of tools. COMP 320 / copyright Conrad Weisert

2 Session 2a: Specifying System Outputs The importance of system outputs Why start with outputs? Modes and media Specifying output content Specifying format and presentation Avoiding false outputs COMP 320/420 Spring, 2018 Conrad Weisert What is a system output? A collection of information that is seen and used: a. either by end users (or customers) of the application system printed reports display screens other b. or by another application system or device files signals etc. What's the difference, if any, between information & data? What about other "outputs"? In I.T. the term output is also used to describe the result of a function or of an internal process. Such results are not system outputs or application outputs. They are seen not by users or other systems but by other components of the same system They are addressed (later) in internal system design or architecture, not by systems analysts but by software designers and programmers. The special importance of system outputs Often the very purpose of an application system ("information systems") The most visible components of an application system. End users understand outputs (or should) Suprisingly, many S.A. textbooks and courses don't emphasize (or even mention) system outputs! Outputs are just a special kind of data structure for them. COMP 320 / copyright Conrad Weisert

3 Why start with outputs? Old fashioned analysts often started by specifying system inputs! Probably because reading inputs was the first thing the system would have to do upon starting operation. Also because the analyst had in mind a preconceived system architecture. But once we know what information the system must produce, we can derive many of: The data items that must be stored or computed. The formulas, processes, and decision rules (and the system inputs) needed for producing that information. Methodology independence Of all the ESD components, system output specifications are the least dependent on our choice of systems analysis methodology. They fit well with Structured Analysis, UML, Discrete Requirements Lists, "Agile" methods Prototyping etc.,etc.. Therefore they ought to be non-controversial and should be specified early by every systems analyst on every system development project. So, are they? Specifying an output The analyst will: 1. Identify the output and its purpose 2. Specify the content (i.e. the information) 3. (optional) specify the format or appearance (output prototype or sample) How can an analyst know (or discover) all that? Interviews with (or input from) end-user representatives Examination or observation of the current (old) system, if there is one. Experience, insight, and imagination Step 1: Identifying an output Why are these necessary? The analyst specifies: a name for the output the purpose of the output the distribution (who gets it or may see it) the frequency (or schedule) for producing it the medium (or mode) the content (list of data items) expected volume (avg. & max.) unusual security, confidentiality, or audit requirements usually using a form (paper or screen) provided by some C.A.S.E. tools If yours doesn't, then design your own. COMP 320 / copyright Conrad Weisert

4 Specifying the purpose of an output This is usually straightforward and obvious However, be careful when replacing an existing (manual or computerized) system "We've always gotten that report!" A user may: feel threatened by losing a tool he or she has been using in everyday work, especially in working with other people (a status indicator?) like to examine areas not needed for his or her job (e.g. other employees' performance reviews) How can we handle that? Output frequencies or schedules Regular schedule daily, weekly, monthly, etc. On demand From whom? Why? When? On event content change / update exceptions, alarms, unusual conditions error Output Distribution List of people (roles) who either automatically get a copy each time it's produced or are authorized to view the output Step 2: Specifying output content` List of rigorously defined data items items from the data dictionary (next course session) or simple formulas on those data items What if the formulas aren't simple? Sequence, breaks, and totals What are those? Step 3 (optional): Specifying format In theory, user representatives ought to be able to review and approve output specifications, based on content, i.e the information to be produced: However, some potential users can be helped to understand by actually seeing what the output will look like. Such a presentation (printed report or screen display) is called an output prototype COMP 320 / copyright Conrad Weisert

5 Pitfalls and downside of I-O prototypes The format and appearance may distract some user-reviewers from the content. Users' expectations may be misdirected: They may be surprised, even disappointed, if the output from the final system doesn't look exactly the same. Unnecessary constraint on the system designers. Obstacle to choosing a packaged application system product. Special output modes Typical outputs of computer application systems are composed of text, often in tabular form. However, keep in mind that modern computer systems can also easily generate: Graphs or plots of various kinds Audio speech synthesis UPC labels and other specialized codes What else? Avoiding false outputs Some information that comes out of a system are not considered to be system outputs. For example: prompt messages error messages progress / status indicators transaction confirmation messages Why? Therefore the analyst doesn't need to (and usually shouldn't) specify them. Who will? When? COMP 320 / copyright Conrad Weisert

Session 2b: structured specifications Purpose and criteria Structured specification components Introduction to dataflow diagrams

Session 2b: structured specifications Purpose and criteria Structured specification components Introduction to dataflow diagrams Session 2b: structured specifications Purpose and criteria Structured specification components Introduction to dataflow diagrams COMP 320 / 420, Spring, 2018 Conrad Weisert Criteria for the ESD (from session

More information

Ways of documenting Session 5: detailed requirements The Data Dictionary one any The Project A data dictionary Data Dictionary may be maintained

Ways of documenting Session 5: detailed requirements The Data Dictionary one any The Project A data dictionary Data Dictionary may be maintained Session 5: The Data Dictionary relationship to systems analysis methodologies relationship to project management data definition vs. data representation taxonomy of data types COMP 477 /377, Spring, 2017

More information

Ways of documenting Session 5: detailed requirements The Data Dictionary one any The Project A data dictionary Data Dictionary may be maintained

Ways of documenting Session 5: detailed requirements The Data Dictionary one any The Project A data dictionary Data Dictionary may be maintained Session 5: The Data Dictionary relationship to systems analysis methodologies relationship to project management data definition vs. data representation taxonomy of data types COMP 477 /377, Fall, 2018

More information

Session 3b: Defining data items

Session 3b: Defining data items Session 3b: Defining data items Sources of data items Establishing a project data dictionary Defining an elementary item Defining a composite data item COMP 320 / 420, Spring, 2018 Mr. Weisert Q: Which

More information

Session 1b: Overview of systems analysis methodology

Session 1b: Overview of systems analysis methodology Session 1b: Overview of systems analysis methodology The system specification (ESD) Ways of documenting an ESD Criteria to be satisfied Historical survey Comp 320 / 420, spring, 2018 Alternative names

More information

Session 3: Data. Session 3a: Data

Session 3: Data. Session 3a: Data Session 3: Data Part a: 1. Data types 2. Data representation Part b: Data definition Computer programs manipulate two kinds of data Which are of interest to the analyst? A. Application domain data Exist

More information

Week 11: Case study: Designing, building, & testing a Person class Background for the Project Needed in many applications Is it possible? practical?

Week 11: Case study: Designing, building, & testing a Person class Background for the Project Needed in many applications Is it possible? practical? Week 11: Case study: Designing, building, & testing a Person class Background for the Project Needed in many applications Is it possible? practical? Background Many applications deal with records representing

More information

Do these criteria apply to work in this course?

Do these criteria apply to work in this course? Bonus topic fo COMP 170 Program Quality Part 2: Review of Program readability Commentary Choosing data names Code layout Commentary Pitfalls Reading a program A program is not only something to be run

More information

Week 6: Data. Let's focus first on application domain data.

Week 6: Data. Let's focus first on application domain data. review of things we already (should) know criteria for external & internal representation basic elementary data types composite data types container data types derived subtypes abstract data types (ADT)

More information

Session 6b: Specifying constraints

Session 6b: Specifying constraints Session 6b: Specifying constraints Analysis vs. Design Constraints on the end product Constraints on the development COMP 320 / 420 Spring, 2018 Mr. Weisert "Analysis & Design" (review from session 1)

More information

Week 2: The Clojure Language. Background Basic structure A few of the most useful facilities. A modernized Lisp. An insider's opinion

Week 2: The Clojure Language. Background Basic structure A few of the most useful facilities. A modernized Lisp. An insider's opinion Week 2: The Clojure Language Background Basic structure A few of the most useful facilities A modernized Lisp Review of Lisp's origins and development Why did Lisp need to be modernized? Relationship to

More information

Session 4b: Review of Program Quality

Session 4b: Review of Program Quality Session 4b: Review of Program Quality What makes one program "better" than another? COMP 170 -- Fall, 2013 Mr. Weisert What is a good program? Suppose we give the same assignment to two programmers (or

More information

Session 8: UML The Unified Modeling (or the Unstructured Muddling) language?

Session 8: UML The Unified Modeling (or the Unstructured Muddling) language? Session 8: UML The Unified Modeling (or the Unstructured Muddling) language? A few observations, opinions, pros & cons COMP 320 / 420 Spring, 2018 Mr. Weisert Where did the UML come from? Object-oriented

More information

Week 5: Background. A few observations on learning new programming languages. What's wrong with this (actual) protest from 1966?

Week 5: Background. A few observations on learning new programming languages. What's wrong with this (actual) protest from 1966? Week 5: Background A few observations on learning new programming languages What's wrong with this (actual) protest from 1966? Programmer: "Switching to PL/I as our organization's standard programming

More information

Designing a Database -- Understanding Relational Design

Designing a Database -- Understanding Relational Design Designing a Database -- Understanding Relational Design Contents Overview The Database Design Process Steps in Designing a Database Common Design Problems Determining the Purpose Determining the Tables

More information

CHAPTER 19: Building a Preliminary Behavioral Model

CHAPTER 19: Building a Preliminary Behavioral Model 1 z 7 CHAPTER 19: Building a Preliminary Behavioral Model Things are always at their best in their beginning. Blaise Pascal Lettres Provinciales, 1656-1657, no. 4 IN THIS CHAPTER, YOU WILL LEARN: Why a

More information

Defining Data Items Conrad Weisert (2003)

Defining Data Items Conrad Weisert (2003) Defining Data Items Conrad Weisert (2003) Background -- one more missing component The failed-project documentation I described last month 2 lacked not only output specifications, but, worse, any data

More information

6.033 Computer System Engineering

6.033 Computer System Engineering MIT OpenCourseWare http://ocw.mit.edu 6.033 Computer System Engineering Spring 2009 For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. Lec 19 : Nested atomic

More information

The Need for Agile Project Management

The Need for Agile Project Management The Need for Agile Project Management by Mike Cohn 21 Comments originally published in Agile Times Newsletter on 2003-01-01 One of the common misperceptions about agile processes is that there is no need

More information

Business Analysis for Practitioners - Requirements Elicitation and Analysis (Domain 3)

Business Analysis for Practitioners - Requirements Elicitation and Analysis (Domain 3) Business Analysis for Practitioners - Requirements Elicitation and Analysis (Domain 3) COURSE STRUCTURE Introduction to Business Analysis Module 1 Needs Assessment Module 2 Business Analysis Planning Module

More information

What is the Joint Application Development (JAD) Process?

What is the Joint Application Development (JAD) Process? What is the Joint Application Development (JAD) Process? By Joy Matthews, Vice President, Pierson Requirements Group, Inc. jmatthews@piersonrequirementsgroup.com JAD is an Important Technique for Software

More information

The Definitive Guide to Office 365 External Sharing. An ebook by Sharegate

The Definitive Guide to Office 365 External Sharing. An ebook by Sharegate The Definitive Guide to Office 365 External Sharing An ebook by Sharegate The Definitive Guide to External Sharing In any organization, whether large or small, sharing content with external users is an

More information

CHAPTER 18: CLIENT COMMUNICATION

CHAPTER 18: CLIENT COMMUNICATION CHAPTER 18: CLIENT COMMUNICATION Chapter outline When to communicate with clients What modes of communication to use How much to communicate How to benefit from client communication Understanding your

More information

MIS5206-Section Protecting Information Assets-Exam 1

MIS5206-Section Protecting Information Assets-Exam 1 Your Name Date 1. Which of the following contains general approaches that also provide the necessary flexibility in the event of unforeseen circumstances? a. Policies b. Standards c. Procedures d. Guidelines

More information

Why do we have to know all that? The stored program concept (the procedural paradigm) Memory

Why do we have to know all that? The stored program concept (the procedural paradigm) Memory Session 1b: Background & Preliminaries What is computer programming? The stored-program concept. The procedural paradigm. What is a programming language? The object-oriented paradigm C#: ancestors & origins

More information

WAKEFLY WEBSITE USER EXPERIENCE AUDIT

WAKEFLY WEBSITE USER EXPERIENCE AUDIT WAKEFLY WEBSITE USER EXPERIENCE AUDIT Is your website properly optimized to provide the best user experience? BEYOND EXPECTATION USER EXPERIENCE AUDIT SUMMARY The user experience audit provides insight

More information

FLOW CHART AND PSEUDO CODE

FLOW CHART AND PSEUDO CODE FLOW CHART AND PSEUDO CODE Flowchart A Flowchart is a pictorial representation of an algorithm. The First flowchart is made by John Von Newman in 1945. It is a symbolic diagram of operation sequence, dataflow,

More information

What's that? Why? Is one "better" than the other? Terminology. Comparison. Loop testing. Some experts (e.g. Pezze & Young) call it structural testing

What's that? Why? Is one better than the other? Terminology. Comparison. Loop testing. Some experts (e.g. Pezze & Young) call it structural testing Week 9: More details of white-box testing What is it? Comparison with black-box testing What we should not validate Automated versus interactive testing Testing conditional and loop constructs COMP 370

More information

Sample Exam. Certified Tester Foundation Level

Sample Exam. Certified Tester Foundation Level Sample Exam Certified Tester Foundation Level Answer Table ASTQB Created - 2018 American Stware Testing Qualifications Board Copyright Notice This document may be copied in its entirety, or extracts made,

More information

Does anyone actually do this?

Does anyone actually do this? Session 11: Polymorphism Coding type-dependent logic Virtual functions Pure virtual functions and abstract classes Coding type-dependent logic Suppose we need to do something different depending on what

More information

Ans 1-j)True, these diagrams show a set of classes, interfaces and collaborations and their relationships.

Ans 1-j)True, these diagrams show a set of classes, interfaces and collaborations and their relationships. Q 1) Attempt all the following questions: (a) Define the term cohesion in the context of object oriented design of systems? (b) Do you need to develop all the views of the system? Justify your answer?

More information

In our first lecture on sets and set theory, we introduced a bunch of new symbols and terminology.

In our first lecture on sets and set theory, we introduced a bunch of new symbols and terminology. Guide to and Hi everybody! In our first lecture on sets and set theory, we introduced a bunch of new symbols and terminology. This guide focuses on two of those symbols: and. These symbols represent concepts

More information

CHAPTER 4. About TMS and the SAN

CHAPTER 4. About TMS and the SAN CHAPTER 4 About TMS and the SAN Recently, during assistance visits to the field, it came to our attention that there is confusion between the Security Assistance Network (SAN) and the Training Management

More information

Aesop QuickStart User Guide for Campus Users

Aesop QuickStart User Guide for Campus Users Aesop QuickStart User Guide for Campus Users This guide will show you how to: Log on to the Aesop system View absences View substitute assignments View unfilled absences View available substitutes Assign

More information

My SAS Grid Scheduler

My SAS Grid Scheduler ABSTRACT Paper 1148-2017 My SAS Grid Scheduler Patrick Cuba, Cuba BI Consulting No Batch Scheduler? No problem! This paper describes the use of a SAS DI Studio job that can be started by a time dependent

More information

Learn to use the vector and translation tools in GX.

Learn to use the vector and translation tools in GX. Learning Objectives Horizontal and Combined Transformations Algebra ; Pre-Calculus Time required: 00 50 min. This lesson adds horizontal translations to our previous work with vertical translations and

More information

Oracle Database Express Edition: what you need to know about its license rights and limitations

Oracle Database Express Edition: what you need to know about its license rights and limitations Oracle Database Express Edition: what you need to know about its license rights and limitations Author: Iuliana Donisa Many things are said on a daily basis about licensing rules and their implications

More information

REENGINEERING SYSTEM

REENGINEERING SYSTEM GENERAL OBJECTIVES OF THE SUBJECT At the end of the course, Individuals will analyze the characteristics of the materials in the industries, taking into account its advantages and functionality, for their

More information

Design Proposal: Outline

Design Proposal: Outline Design Proposal: Outline This outline should be used as a checklist to help each member of the team make sure that every section of the document meets the requirements for a design proposal. Writing Style

More information

Introduction to User Stories. CSCI 5828: Foundations of Software Engineering Lecture 05 09/09/2014

Introduction to User Stories. CSCI 5828: Foundations of Software Engineering Lecture 05 09/09/2014 Introduction to User Stories CSCI 5828: Foundations of Software Engineering Lecture 05 09/09/2014 1 Goals Present an introduction to the topic of user stories concepts and terminology benefits and limitations

More information

HIPAA RISK ADVISOR SAMPLE REPORT

HIPAA RISK ADVISOR SAMPLE REPORT HIPAA RISK ADVISOR SAMPLE REPORT HIPAA Security Analysis Report The most tangible part of any annual security risk assessment is the final report of findings and recommendations. It s important to have

More information

05. SINGLETON PATTERN. One of a Kind Objects

05. SINGLETON PATTERN. One of a Kind Objects BIM492 DESIGN PATTERNS 05. SINGLETON PATTERN One of a Kind Objects Developer: What use is that? Guru: There are many objects we only need one of: thread pools, caches, dialog boxes, objects that handle

More information

Foundation Level Syllabus Usability Tester Sample Exam

Foundation Level Syllabus Usability Tester Sample Exam Foundation Level Syllabus Usability Tester Sample Exam Version 2017 Provided by German Testing Board Copyright Notice This document may be copied in its entirety, or extracts made, if the source is acknowledged.

More information

Business Requirements Document (BRD) Template

Business Requirements Document (BRD) Template Business Requirements Document (BRD) Template Following is a template for a business requirements document (BRD). The document includes many best practices in use today. Don t be limited by the template,

More information

Transcript: A Day in the Life Desiree: 7 th Grade Learning Coach Profile

Transcript: A Day in the Life Desiree: 7 th Grade Learning Coach Profile Transcript: A Day in the Life Desiree: 7 th Grade Learning Coach Profile Transcript (Video) Transcript (Video with Audio Description) Transcript (Audio Description) Transcript (Video) 00:00:00.000 [MUSIC]

More information

Project design process by Heartgrenade

Project design process by Heartgrenade Project design process by Heartgrenade The following document aims to familiarize you with the process of software development that we carry out with our Clients. We divided it into subsequent steps and

More information

Windows 10 Tips and Tricks

Windows 10 Tips and Tricks Windows 10 Tips and Tricks You've made the move to Windows 10. The Start Menu has returned and its cloud integration is obvious, but most everything else is unfamiliar. This session will help you setup

More information

Writing Diploma Exams Using Computers Humanities Part(ie) A, Mathematics 30-2 and Science 30

Writing Diploma Exams Using Computers Humanities Part(ie) A, Mathematics 30-2 and Science 30 Writing Diploma Exams Using Computers Humanities Part(ie) A, Mathematics 30-2 and Science 30 BACKGROUND Examinees are permitted to use computers when writing some diploma exams. The principles, directives,

More information

DESCRIPTION HOURS / QTY HOURLY RATE / FEE TOTAL. .

DESCRIPTION HOURS / QTY HOURLY RATE / FEE TOTAL.  . DESCRIPTION HOURS / QTY HOURLY RATE / FEE PROJECT: Monthly Social Media Marketing Retainer 0 0.00 0.00 PAYMENT TERMS: 1) Month to month. 5 days cancellation notice required to stop for first month. 30

More information

Answers Java Technical

Answers Java Technical Building Architect Interview Questions And Answers Java Technical I recently appeared for an interview with Adobe for Technical Architect role Answer:We do not use any of them and I gave the explanation

More information

P1_L6 Mandatory Access Control Page 1

P1_L6 Mandatory Access Control Page 1 P1_L6 Mandatory Access Control Page 1 We discussed access control in the last lesson. But that was only one kind of access control called discretionary access control, or DAC. That allows you to decide

More information

How Can a Tester Cope With the Fast Paced Iterative/Incremental Process?

How Can a Tester Cope With the Fast Paced Iterative/Incremental Process? How Can a Tester Cope With the Fast Paced Iterative/Incremental Process? by Timothy D. Korson Version 7.0814 QualSys Solutions 2009 1 Restricted Use This copyrighted material is provided to attendees of

More information

Virginia Commonwealth University School of Medicine Information Security Standard

Virginia Commonwealth University School of Medicine Information Security Standard Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Personnel Security Standard This standard is applicable to all VCU School of Medicine personnel. Approval

More information

Working with Health IT Systems is available under a Creative Commons Attribution-NonCommercial- ShareAlike 3.0 Unported license.

Working with Health IT Systems is available under a Creative Commons Attribution-NonCommercial- ShareAlike 3.0 Unported license. Working with Health IT Systems is available under a Creative Commons Attribution-NonCommercial- ShareAlike 3.0 Unported license. Johns Hopkins University. Welcome to the Fundamentals of Health Workflow

More information

Best Practices for Collecting User Requirements

Best Practices for Collecting User Requirements Federal GIS Conference February 9 10, 2015 Washington, DC Best Practices for Collecting User Requirements Gerry Clancy Glenn Berger Requirements Provide direction for program success Why Requirements are

More information

1 of 10 5/11/2006 12:10 AM CS 61A Spring 2006 Midterm 3 solutions 1. Box and pointer. > (let ((x (list 1 2 3))) (set-car! (cdr x) (cddr x)) x) (1 (3) 3) +-------------+ V --------- -- ------ ---------

More information

The Client Survey Current Site Reasons for Redesign

The Client Survey Current Site Reasons for Redesign (Note: The following survey is an example. The actual survey is customized for the particular client, eliminating any inappropriate questions and adding when necessary). The Client Survey Client input

More information

TASKS IN THE SYSTEMS DEVELOPMENT LIFE CYCLE

TASKS IN THE SYSTEMS DEVELOPMENT LIFE CYCLE SUMMARY AND REFERENCE ACTG 313 TASKS IN THE SYSTEMS DEVELOPMENT LIFE CYCLE PREPARATION PHASE 1. Identification of the Need for a new Information System 2. Initial Feasibility Study (always flawed because

More information

Mastering Content Marketing

Mastering Content Marketing Mastering Content Marketing (while juggling 97 other tasks) Presented by: Danielle Gray Keep in Mind Be Social! Tweet using hashtag #ContentWhisperer @dgmarketingco Connect on LinkedIn: Danielle Gray,

More information

The process of interaction design and Prototyping

The process of interaction design and Prototyping Chapter 6 edited The process of interaction design and Prototyping 1 Overview What is involved in Interaction Design? Importance of involving users Degrees of user involvement What is a user-centered approach?

More information

Project Management Certification

Project Management Certification Project Management Certification PM Certification Project Management Practice June 2015 Four Certification Levels in Project Management If you love your craft, then challenge yourself every day to improve

More information

What is orbac? ability to group several authorizations in to profiles to easily add/remove a set of authorizations to an employee

What is orbac? ability to group several authorizations in to profiles to easily add/remove a set of authorizations to an employee What is orbac? orbac orbac (opns Role Based Access Control) is a IT security solution that enables a structured, centralized, hierarchical and delegated management of IT privileges. orbac is based on the

More information

Losing Control: Controls, Risks, Governance, and Stewardship of Enterprise Data

Losing Control: Controls, Risks, Governance, and Stewardship of Enterprise Data Losing Control: Controls, Risks, Governance, and Stewardship of Enterprise Data an eprentise white paper tel: 407.591.4950 toll-free: 1.888.943.5363 web: www.eprentise.com Author: Helene Abrams www.eprentise.com

More information

Identify the guidelines for system development. Discuss the purpose of the activities performed in the analysis phase

Identify the guidelines for system development. Discuss the purpose of the activities performed in the analysis phase Discovering Computers 2010 Living in a Digital World Objectives Overview Define system development and list the system development phases Identify the guidelines for system development Discuss the importance

More information

Managing intranets: opportunities and challenges

Managing intranets: opportunities and challenges 1 Managing intranets: opportunities and challenges IN THIS CHAPTER: Life in a workflow world The intranet opportunity Life as an intranet manager The challenges of intranet management A framework for intranet

More information

Writing Agile User Stories

Writing Agile User Stories RefineM s January 2014 Lunch & Learn Webinar Writing Agile User Stories NK Shrivastava, PMP, RMP, ACP CEO/Consultant - RefineM Agenda 1. What is Virtual Lunch & Learn 2. Your expectations from this webinar

More information

2. COURSE DESIGNATION: 3. COURSE DESCRIPTIONS:

2. COURSE DESIGNATION: 3. COURSE DESCRIPTIONS: College of San Mateo Official Course Outline 1. COURSE ID: CIS 278 TITLE: (CS1) Programming Methods: C++ C-ID: COMP 122 Units: 4.0 units Hours/Semester: 48.0-54.0 Lecture hours; 48.0-54.0 Lab hours; and

More information

isolve page launches with a Single-Sign-On, so you don't need to enter a separate password

isolve page launches with a Single-Sign-On, so you don't need to enter a separate password USER MANUAL Introduction Welcome to Celebrating You!!!! Celebrating You allows you to recognize your people in a simple way using Recognition portal. The user interfaces on the portal have been designed

More information

BTEC Nationals IT - Unit2 FAQs

BTEC Nationals IT - Unit2 FAQs BTEC Nationals IT - Unit2 FAQs Q1 Q2 I need more clarity on what is required in the design task Is it expected that the race officials are entering times as raw times and then the table is set up so it

More information

FACETs. Technical Report 05/19/2010

FACETs. Technical Report 05/19/2010 F3 FACETs Technical Report 05/19/2010 PROJECT OVERVIEW... 4 BASIC REQUIREMENTS... 4 CONSTRAINTS... 5 DEVELOPMENT PROCESS... 5 PLANNED/ACTUAL SCHEDULE... 6 SYSTEM DESIGN... 6 PRODUCT AND PROCESS METRICS...

More information

Privacy Breach Policy

Privacy Breach Policy 1. PURPOSE 1.1 The purpose of this policy is to guide NB-IRDT employees and approved users on how to proceed in the event of a privacy breach, and to demonstrate to stakeholders that a systematic procedure

More information

Scope and Sequence: CCNA Discovery

Scope and Sequence: CCNA Discovery Scope and Sequence: CCNA Discovery Last updated June 19, 2009 Target Audience The Cisco CCNA Discovery curriculum is primarily designed for Cisco Networking Academy students who are seeking entry-level

More information

The process of interaction design

The process of interaction design Chapter 9 The process of interaction design 1 Overview What is involved in Interaction Design? Importance of involving users Degrees of user involvement What is a user-centered approach? Four basic activities

More information

Advanced Accounting Software & Secure Internet Solutions. Advanced Security Administrator Reference Manual

Advanced Accounting Software & Secure Internet Solutions. Advanced Security Administrator Reference Manual Advanced Accounting Software & Secure Internet Solutions Advanced Security Administrator Reference Manual Version 7.3 Information in this document is subject to change without notice and does not represent

More information

Lo-Fidelity Prototype Report

Lo-Fidelity Prototype Report Lo-Fidelity Prototype Report Introduction A room scheduling system, at the core, is very simple. However, features and expansions that make it more appealing to users greatly increase the possibility for

More information

The PROCESS of Interaction DESIGN

The PROCESS of Interaction DESIGN The PROCESS of Interaction DESIGN O V E R V I E W What is involved in Interaction Design? Importance of involving users Degrees of user involvement What is a user-centered approach? Four basic activities

More information

Sharing the Calendar

Sharing the Calendar Sharing the Calendar The new feature allows you to Share your calendar. To enable this feature, select the Calendar icon on the lower left side of your screen also known as the Navigation Pane. Then Click

More information

University of Cambridge International Examinations Teacher Support Site User Guide for Coordinators

University of Cambridge International Examinations Teacher Support Site User Guide for Coordinators University of Cambridge International Examinations Teacher Support Site User Guide for Coordinators Getting started Log into the Teacher Support Site http://teachers.cie.org.uk/ Click the Administer Users

More information

CMGt Style Guide: Discovery, Strategy & Design

CMGt Style Guide: Discovery, Strategy & Design CMGt Style Guide: Discovery, Strategy & Design 2 Table of Contents INTRODUCTION UX Process Overview... 3 DISCOVERY Stakeholder Interviews... 4-5 Discovery Summary... 6 STRATEGY White boarding...7 Sitemap...

More information

Table of Contents INTRODUCTION TO VIDEO MARKETING... 3 CREATING HIGH QUALITY VIDEOS... 5 DISTRIBUTING YOUR VIDEOS... 9

Table of Contents INTRODUCTION TO VIDEO MARKETING... 3 CREATING HIGH QUALITY VIDEOS... 5 DISTRIBUTING YOUR VIDEOS... 9 Table of Contents INTRODUCTION TO VIDEO MARKETING... 3 CREATING HIGH QUALITY VIDEOS... 5 DISTRIBUTING YOUR VIDEOS... 9 ENHANCING YOUR VIDEO RESPONSE RATE... 11 Introduction To Video Marketing There is

More information

balancer high-fidelity prototype dian hartono, grace jang, chris rovillos, catriona scott, brian yin

balancer high-fidelity prototype dian hartono, grace jang, chris rovillos, catriona scott, brian yin balancer high-fidelity prototype dian hartono, grace jang, chris rovillos, catriona scott, brian yin Problem and Solution Overview A healthy work-life balance is vital for both employers and employees.

More information

ITG. Information Security Management System Manual

ITG. Information Security Management System Manual ITG Information Security Management System Manual This manual describes the ITG Information Security Management system and must be followed closely in order to ensure compliance with the ISO 27001:2005

More information

Early programming languages ca. 1960

Early programming languages ca. 1960 Session 5: Intro. to Java collections History Collection / container concept Shortcoming of original version Parameterized collections Example: ArrayList Comp 271, Spring, 2012 Mr. Weisert Early programming

More information

Characteristic of the Proposed System. Characteristic of the Proposed System DFD. ER Diagram. Functions used DISADVANTAGES OF PRESENT WORKING SYSTEM

Characteristic of the Proposed System. Characteristic of the Proposed System DFD. ER Diagram. Functions used DISADVANTAGES OF PRESENT WORKING SYSTEM Table of contents:- Project Description Functions used Project Vision Feasibility Study Working Of Present System DISADVANTAGES OF PRESENT WORKING SYSTEM Characteristic of the Proposed System Characteristic

More information

Find funding on Research Professional Training session

Find funding on Research Professional Training session Find funding on Research Professional Training session Gaelle Jolly Senior Information & Communications Officer Research Services research.services@admin.ox.ac.uk Hilary term 2018 Research funding opportunities

More information

OVERVIEW. 120 minutes. Technology tools / Platforms Tested (Mandatory) i) NA ii) Technology tools / Platforms Tested (Select any one) i) NA ii)

OVERVIEW. 120 minutes. Technology tools / Platforms Tested (Mandatory) i) NA ii) Technology tools / Platforms Tested (Select any one) i) NA ii) QP CODE: QP TITLE: Q6702 Software Developer OVERVIEW Test Duration Duration - SSC/N0502 Duration - SSC/N9001 Duration SSC/N9002 Duration SSC/N9003 Duration SSC/N9004 Duration SSC/N9005 Natural Language

More information

Department of Organizational Performance and Workplace Learning, Boise State University Basic Use of Qualtrics Instructional Materials for OPWL 530

Department of Organizational Performance and Workplace Learning, Boise State University Basic Use of Qualtrics Instructional Materials for OPWL 530 Department of Organizational Performance and Workplace Learning, Boise State University Basic Use of Qualtrics Instructional Materials for OPWL 530 OPWL 530 Evaluation Basic Use of Qualtrics Instructional

More information

ADDING VALUE TO PERFORMANCE MANAGEMENT WITH BUSINESS METRICS

ADDING VALUE TO PERFORMANCE MANAGEMENT WITH BUSINESS METRICS ADDING VALUE TO PERFORMANCE MANAGEMENT WITH BUSINESS METRICS Scott Chapman American Electric Power A great deal of system and human effort is expended to collect detailed technical measurements. These

More information

Perfect Timing. Alejandra Pardo : Manager Andrew Emrazian : Testing Brant Nielsen : Design Eric Budd : Documentation

Perfect Timing. Alejandra Pardo : Manager Andrew Emrazian : Testing Brant Nielsen : Design Eric Budd : Documentation Perfect Timing Alejandra Pardo : Manager Andrew Emrazian : Testing Brant Nielsen : Design Eric Budd : Documentation Problem & Solution College students do their best to plan out their daily tasks, but

More information

Process of Interaction Design and Design Languages

Process of Interaction Design and Design Languages Process of Interaction Design and Design Languages Process of Interaction Design This week, we will explore how we can design and build interactive products What is different in interaction design compared

More information

VoIP INTERNET-BASED PHONE SYSTEMS CHOCK FULL OF FEATURES

VoIP INTERNET-BASED PHONE SYSTEMS CHOCK FULL OF FEATURES VoIP INTERNET-BASED PHONE SYSTEMS CHOCK FULL OF FEATURES VoIP Internet-based phone systems chock full of features TABLE OF CONTENTS What is VoIP? Switching to VoIP is easy Business Telecom Features Improved

More information

Using X-Particles with Team Render

Using X-Particles with Team Render Using X-Particles with Team Render Some users have experienced difficulty in using X-Particles with Team Render, so we have prepared this guide to using them together. Caching Using Team Render to Picture

More information

Oracle Adapter for Salesforce Lightning Winter 18. What s New

Oracle Adapter for Salesforce Lightning Winter 18. What s New Oracle Adapter for Salesforce Lightning Winter 18 What s New TABLE OF CONTENTS REVISION HISTORY... 3 OVERVIEW... 4 RELEASE FEATURE SUMMARY... 5 PRE-UPGRADE CONSIDERATIONS... 6 POST-UPGRADE REQUIREMENTS...

More information

Validation and Use of Excel Spreadsheets in Regulated Environments

Validation and Use of Excel Spreadsheets in Regulated Environments Validation and Use of Excel Spreadsheets in Regulated Environments February 13, 2007 Ludwig Huber Fax.: +49 7802 981948 Tel.: +49 7802 980582 E-mail:Ludwig_Huber@labcompliance.com Today s Agenda Regulatory

More information

NetLogo Lab 3 Tutorial: Finding Peaks

NetLogo Lab 3 Tutorial: Finding Peaks NetLogo Lab 3 Tutorial: Finding Peaks You've already been exposed to the three types of agents you can give commands to in NetLogo: turtles, patches, and the observer. As you start to write your own procedures,

More information

Image Application Proposal

Image Application Proposal Executive Summary Image Application Proposal 6.9.2010 Jesse Warden, Web App Solution Draft 2 Company X is creating a new application to help their clients better streamline their work flow and add additional

More information

This is an oral history interview conducted on. October 30, 2003, with IBM researcher Chieko Asakawa and IBM

This is an oral history interview conducted on. October 30, 2003, with IBM researcher Chieko Asakawa and IBM This is an oral history interview conducted on October 30, 2003, with IBM researcher Chieko Asakawa and IBM Corporate Archivist, Paul Lasewicz, conducted the interview. Thank you, and welcome. Thank you

More information

The Office, Procedures and Technology Chapter 4 Test 1

The Office, Procedures and Technology Chapter 4 Test 1 Chapter 4 Test 1 True/False Name Indicate whether the statement is true or false by writing T or F on the line below the statement. 1. Employees must often read at work to understand directions for using

More information

9/17/2017. The Brain and Neuroplasticity. Why is this any of this important? Have you ever had an angry outburst at work?

9/17/2017. The Brain and Neuroplasticity. Why is this any of this important? Have you ever had an angry outburst at work? The Brain and Neuroplasticity Finding Space to Live and Work Better Trainnovations, Moving from Better to Brilliant 1 Why is this any of this important? 1. I feel stressed at work most days 2. I find myself

More information

CHAPTER 1: INTRODUCTION TO GOOGLE APPS

CHAPTER 1: INTRODUCTION TO GOOGLE APPS CHAPTER 1: INTRODUCTION TO GOOGLE APPS 1.1 What is Google Apps Google Apps is a collection of advance Gmail which is the premier email solution which bundle up with few more online collaborative applications

More information