Session 6b: Specifying constraints
|
|
- Samson Russell
- 5 years ago
- Views:
Transcription
1 Session 6b: Specifying constraints Analysis vs. Design Constraints on the end product Constraints on the development COMP 320 / 420 Spring, 2018 Mr. Weisert "Analysis & Design" (review from session 1) There is no such single discipline or activity, despite many book titles, etc. They are two separate activities: done at different times during a project done (usually) by different people requiring different skills The analyst specifies WHAT the proposed new application will do. The designer determines HOW the proposed application will do it. This course is about systems analysis. "Non-functional requirements" Some authors, especially those who advocate a discrete requirements list methodology like that term: What they call "functional requirements" are bona fide specifications for the proposed new application system. Those requirements specify what the system is to do. What they call "non-functional requirements" are actually restrictions upon the project. Many (not all) of them are unnecessary or premature in this phase of a project. We prefer the more accurate term "constraint". Part 1: overview summary of the kinds of constraint A. Constraints on the end product (What we build) B. Constraints on the development project (How we build it) COMP 320, spring copyright 2010 Conrad Weisert
2 A: Constraints on the end product Performance constraints Availability Reliability Transaction response time Batch run time Interfaces with other application systems Environment Hardware Operating system Network deployment DBMS Analyst should usually specify these Analyst should try to avoid specifying these B: Constraints on the project Development tools Programming language Editor, source library control, etc. Use of software libraries or application products Methodology Programming paradigm Analyst should try to avoid specifying these Activity sequence, etc. Organization Use of contract development firm Choice or qualifications of personnel Why would a systems analyst want to specify any of those? Implicit constraints Most large organizations have a body of I.T. standards that specify many of the choices we've just discussed. Those standards and conventions apply to every project in the organization, whether done by in-house staff or by a contractor. The analyst needs to specify a constraint only when it has to deviate from or augment those organization-wide standards. Who approves the deviation? Part 2: Some important constraints a. Constraints that the systems analyst should always (usually) specify as part of the ESD. b. Constraints that the systems analyst may specify in unusual situations. c. Constraints that the systems analyst should try to avoid specifying. s? COMP 320, spring copyright 2010 Conrad Weisert
3 Situation We've installed a new application system for a demanding user organization. During the first six months of operation The system goes down ("crashes") 5 times with outages lasting between five minutes and 50 minutes. One of those crashes resulted in lost transactions requiring re-entry of two hours worth of high-volume input data. Data entry clerks complain the response time is often sluggish in the late afternoon. User management is irate, proclaiming the system a failure. Whose fault is this? Managing expectations Many users are naive about operational performance: They expect perfection! Why? Every failure or complaint is a "black mark" against the system (and its developers) When a certain number of black marks are accumulated, users rebel. The analyst must prepare the sponsoring users for reality: Perfection is unattainable We can usually get closer to it if we spend more money and take more time. How? Specifying on-line availability System Q will be available to on-line users between 07:30 and 18:00 (EST) Monday through Saturday. Incidents of unplanned unavailability (outages) will occur no more than: up to 5 minutes once a month 5 to 20 minutes twice a year up to 4 hours once in 2 years How can the analyst know that's possible? What if the user says it's unacceptable? Specifying reliability File maintenance transactions may be lost and require re-entry no more than: 15 minutes worth twice in 6 months 60 minutes worth once in 2 years Undetected system errors resulting in erroneous account information will never occur. How can the analyst know that's possible? What if the user says it's unacceptable? COMP 320, spring copyright 2010 Conrad Weisert
4 Specifying response time Order status inquiry transactions will display results in 0.5 seconds (avg.) 4.0 seconds (max.) Keystrokes on all on-line data entry (forms or dialogs) will be displayed instantly (0.1 sec.) How can the analyst know that's possible? What about Internet deployment? What if the user says it's unacceptable? Specifying batch turn-around Month-end accounts reconciliation run will take no longer than 2 hours elapsed time, starting after on-line shut-down the last working day of the month. Negotiating reliability and performance Sponsoring users may be alarmed when they first hear mention of failures or sluggish response, however infrequent. We can give them choices: Everything has a price. You can spend more (and wait longer) to get faster, more reliable operation. The choice depends upon the nature of the application. How do we involve the prospective developers? The other side of negotiation We expect the user community to press for higher reliability and faster response time. But the prospective developers may take the opposite view! Remember that the developers (or vendors) are the second audience for the ESD. They get a chance to approve or reject performance constraints based on their expertise. Outside contractors (developers or software product vendors) should be required to include the performance constraints in the formal contract. COMP 320, spring copyright 2010 Conrad Weisert
5 Levels of reliability and performance for different kinds of application 1. Application used by internal staff. They will be inconvenienced by failures. 2. Applications that affect outside people. Our company will be embarrassed. 3. Applications that can cause hardship (such as?) to outside people We may get sued. 4. Super-critical applications People may die Prolonged negotiations We may not know enough about the feasibility and cost of a committed level of performance and reliability until some internal design work is done. What can we do about that? Platform constraints In the mainframe era this was easy: If the organization had million-dollar machines with plenty of capacity, you needed overwhelming justification to deploy an application on anything else. Today we may have options: Server Shared Dedicated Internet ("cloud") Operating system UNIX Windows etc. Work stations Desktop Dumb terminals Portables DBMS Oracle SQL Server etc. Does the analyst have to worry about the platform? Often not The organization may have established a standard operating environment machines system software support staff If that's an acceptable platform for the new application, just accept it. Otherwise, trust the devlopers to use their judgment COMP 320, spring copyright 2010 Conrad Weisert
6 Avoiding unnecessary platform constraints Avoid using physical or implementationspecific terms to label DFD elements Windows PC Server Oracle database Those can be specified later during the design phase. Specifying the configuration The analyst may and often should state: The minimum logical configurations required (needn't work on anything smaller) The impact on capacity of shared resources (must we upgrade the configuration?) Who needs that information, and what will they do with it? Those are just estimates. Later system design will make them firm. Minimum logical configuration Today's distributed platforms make this harder to specify than it used to be. But we still have to try: to help estimate operating cost. to avoid surprising the central I.T. facility to provide lead time for ordering equipment. Some components (clients, servers, network): Permanent ("persistent") storage Transient memory (real / virtual) Processor speed Network capacity etc. etc, etc. Does a systems analyst know how to estimate these? If not, what do we do? Specifying interfaces to other application systems Three possibilities: 1. The proposed new system will send output (by communication link or file) to another system. 2. The proposed new system will receive input from another system. 3. The proposed new system will share a database with another system a. The database must be used without change, or b. The project can specify additions and changes. Are these really constraints, or just output / input specifications? COMP 320, spring copyright 2010 Conrad Weisert
7 Development constraints Programming languages and other tools Documentation standards Use of contractors etc. Why would we care about that at this phase of the project? Is that any of the users' or the analyst's business? Specifying project constraints: Why would an analyst want to? a. The systems analyst may also be the project manager, who will be responsible for building and installing the proposed new application. b. The systems analyst may be a former senior programmer, who has strong opinions (or biases) about development methodology. c. The systems analyst may currently also be a senior programmer, who will actually participate in building the new application. Which of those is a valid reason? Making suggestions The analyst is always free to suggest a technique or approach, based on special knowledge of the application system preferences expressed by the sponsoring users. Unless such a suggestion is specifically flagged as a constraint the developers are free to use their judgment whether to comply. How do we flag it? COMP 320, spring copyright 2010 Conrad Weisert
Session 2. Getting started with a well-structured system specification
Session 2 Getting started with a well-structured system specification COMP 320/420 Spring, 2018 Conrad Weisert The situation A representative approaches us. (or vice versa) He or she may be a. an executive
More informationSession 8: UML The Unified Modeling (or the Unstructured Muddling) language?
Session 8: UML The Unified Modeling (or the Unstructured Muddling) language? A few observations, opinions, pros & cons COMP 320 / 420 Spring, 2018 Mr. Weisert Where did the UML come from? Object-oriented
More informationContinuous Processing versus Oracle RAC: An Analyst s Review
Continuous Processing versus Oracle RAC: An Analyst s Review EXECUTIVE SUMMARY By Dan Kusnetzky, Distinguished Analyst Most organizations have become so totally reliant on information technology solutions
More informationSession 2b: structured specifications Purpose and criteria Structured specification components Introduction to dataflow diagrams
Session 2b: structured specifications Purpose and criteria Structured specification components Introduction to dataflow diagrams COMP 320 / 420, Spring, 2018 Conrad Weisert Criteria for the ESD (from session
More informationMISGUIDED GUIDE SPECS What Specifiers Want and Need
MISGUIDED GUIDE SPECS What Specifiers Want and Need About the Presentation (my responsibilities) The success of this presentation depends on YOU!! I have been to a number of presentations where the presenter
More informationThe Case for Virtualizing Your Oracle Database Deployment
June 2012 The Case for Virtualizing Your Oracle Database Deployment Much has been written about the benefits of virtualization over the last few years. Hypervisor software promises to revolutionize the
More informationWeek 2: The Clojure Language. Background Basic structure A few of the most useful facilities. A modernized Lisp. An insider's opinion
Week 2: The Clojure Language Background Basic structure A few of the most useful facilities A modernized Lisp Review of Lisp's origins and development Why did Lisp need to be modernized? Relationship to
More informationManagement & Operations Excellence
Management & Operations Excellence Scott Roots Business Development Director EMEA Operational Excellence 2015 Uptime Institute, LLC The global Data Center Authority 1000+ Certifications in over 80 Countries
More informationSession 3: Data. Session 3a: Data
Session 3: Data Part a: 1. Data types 2. Data representation Part b: Data definition Computer programs manipulate two kinds of data Which are of interest to the analyst? A. Application domain data Exist
More informationWays of documenting Session 5: detailed requirements The Data Dictionary one any The Project A data dictionary Data Dictionary may be maintained
Session 5: The Data Dictionary relationship to systems analysis methodologies relationship to project management data definition vs. data representation taxonomy of data types COMP 477 /377, Spring, 2017
More informationSENIOR SYSTEMS ANALYST
PERSONNEL COMMISSION Class Code: 5120 Salary Range: 45 (C1) SENIOR SYSTEMS ANALYST JOB SUMMARY Under general direction, analyze work procedures of application systems and coordinate the work of project
More informationFAQ: Database System Development Life Cycle
Question 1: Why study database management system (DBMS) designs? Answer 1: Understanding and designing databases is truly an evolutionary learning process. There is not a right way or a wrong way to develop
More informationPassword Management Project Roadmap
2016 Hitachi ID Systems, Inc. All rights reserved. This document will guide you through the entire life of a successful password management project, including: A needs analysis. Who to involve in the project.
More informationMeltem Özturan misprivate.boun.edu.tr/ozturan/mis515
Meltem Özturan misprivate.boun.edu.tr/ozturan/mis515 1 2 1 Selecting the Best Alternative Major Activities in the Analysis Phase Gather information Define system requirements Prototype for feasibility
More informationSimplifying IT through Virtualization
E X E C U T I V E S U M M A R Y G E T T E C H N O L O G Y R I G H T C U S T O M P U B L I S H I N G Microsoft-powered virtualization offers tremendous potential to help IT executives drive innovation while
More informationSession 1b: Overview of systems analysis methodology
Session 1b: Overview of systems analysis methodology The system specification (ESD) Ways of documenting an ESD Criteria to be satisfied Historical survey Comp 320 / 420, spring, 2018 Alternative names
More informationWeek 6: Data. Let's focus first on application domain data.
review of things we already (should) know criteria for external & internal representation basic elementary data types composite data types container data types derived subtypes abstract data types (ADT)
More informationWeek 5: Background. A few observations on learning new programming languages. What's wrong with this (actual) protest from 1966?
Week 5: Background A few observations on learning new programming languages What's wrong with this (actual) protest from 1966? Programmer: "Switching to PL/I as our organization's standard programming
More informationOptimisation drives digital transformation
January 2017 Executive summary Forward-thinking business leaders are challenging their organisations to achieve transformation by harnessing digital technologies with organisational, operational, and business
More information*ANSWERS * **********************************
CS/183/17/SS07 UNIVERSITY OF SURREY BSc Programmes in Computing Level 1 Examination CS183: Systems Analysis and Design Time allowed: 2 hours Spring Semester 2007 Answer ALL questions in Section A and TWO
More information2013 Cloud Computing Outlook: Private Cloud Expected to Grow at Twice the Rate of Public Cloud
Private Cloud Expected to Grow at Twice the Rate of Public Cloud In This Paper Security, privacy concerns about the cloud remain SaaS is the most popular cloud service model in use today Microsoft, Google
More informationPage 1 of 15. Applicability. Compatibility EACMS PACS. Version 5. Version 3 PCA EAP. ERC NO ERC Low Impact BES. ERC Medium Impact BES
002 5 R1. Each Responsible Entity shall implement a process that considers each of the following assets for purposes of parts 1.1 through 1.3: i. Control Centers and backup Control Centers; ii. Transmission
More informationGet your business Skype d up. Lessons learned from Skype for Business adoption
Get your business Skype d up Lessons learned from Skype for Business adoption On the rise with Skype for Business Recent figures from Microsoft found that 90% of Fortune 500 companies and over 100 million
More informationMidpeninsula Regional Open Space District
Midpeninsula Regional Open Space District SENIOR TECHNOLOGIST DEFINITION Under general direction, performs the most complex and varied technical tasks related to the design, configuration, troubleshooting,
More informationUnlocking Office 365 without a password. How to Secure Access to Your Business Information in the Cloud without needing to remember another password.
Unlocking Office 365 without a password How to Secure Access to Your Business Information in the Cloud without needing to remember another password. Introduction It is highly likely that if you have downloaded
More informationEffective: 12/31/17 Last Revised: 8/28/17. Responsible University Administrator: Vice Chancellor for Information Services & CIO
Effective: 12/31/17 Last Revised: 8/28/17 Responsible University Administrator: Vice Chancellor for Information Services & CIO Responsible University Office: Information Technology Services Policy Contact:
More informationOPTIMIZATION MAXIMIZING TELECOM AND NETWORK. The current state of enterprise optimization, best practices and considerations for improvement
MAXIMIZING TELECOM AND NETWORK OPTIMIZATION The current state of enterprise optimization, best practices and considerations for improvement AOTMP.com The Next Evolution of Telecom Management OVERVIEW As
More informationReducing Cybersecurity Costs & Risk through Automation Technologies
Reducing Cybersecurity Costs & Risk through Automation Technologies Sponsored by Juniper Networks Independently conducted by Ponemon Institute LLC Publication Date: November 2017 Ponemon Institute Research
More informationWays of documenting Session 5: detailed requirements The Data Dictionary one any The Project A data dictionary Data Dictionary may be maintained
Session 5: The Data Dictionary relationship to systems analysis methodologies relationship to project management data definition vs. data representation taxonomy of data types COMP 477 /377, Fall, 2018
More informationPredictive Insight, Automation and Expertise Drive Added Value for Managed Services
Sponsored by: Cisco Services Author: Leslie Rosenberg December 2017 Predictive Insight, Automation and Expertise Drive Added Value for Managed Services IDC OPINION Competitive business leaders are challenging
More informationEmbarking on the next stage of hosted desktop delivery for international events management company
Embarking on the next stage of hosted desktop delivery for international events management company Richmond Events is an international events management company, delivering a diverse range of forums and
More informationPractical Database Design Methodology and Use of UML Diagrams Design & Analysis of Database Systems
Practical Database Design Methodology and Use of UML Diagrams 406.426 Design & Analysis of Database Systems Jonghun Park jonghun@snu.ac.kr Dept. of Industrial Engineering Seoul National University chapter
More informationTELESPEX AMERICA S #1 BUSINESS PHONE SYSTEMS. [All-in-One] Phones - Phone Systems - Phone Lines - Fax
TELESPEX AMERICA S #1 BUSINESS PHONE SYSTEMS Phones - Phone Systems - Phone Lines - Fax [All-in-One] Business Phone Systems Made Easy! iben Consulting San Jose, CA Find Local Resellers telespex.com/local
More informationWeek 11: Case study: Designing, building, & testing a Person class Background for the Project Needed in many applications Is it possible? practical?
Week 11: Case study: Designing, building, & testing a Person class Background for the Project Needed in many applications Is it possible? practical? Background Many applications deal with records representing
More informationWhite Paper: Backup vs. Business Continuity. Backup vs. Business Continuity: Using RTO to Better Plan for Your Business
Backup vs. Business Continuity: Using RTO to Better Plan for Your Business Executive Summary SMBs in general don t have the same IT budgets and staffs as larger enterprises. Yet just like larger organizations
More informationThe Value of Migrating from Cisco Tidal Horizon to Cisco Process Orchestrator
White Paper The Value of Migrating from Cisco Tidal Horizon to Cisco Process Orchestrator Migrating from Cisco Tidal Horizon for SAP to Cisco Process Orchestrator can help you reduce total cost of ownership
More information6 Tips to Help You Improve Configuration Management. by Stuart Rance
6 Tips to Help You Improve Configuration Management by Stuart Rance Introduction Configuration management provides information about what assets you own, how they are configured, and how they are connected
More informationMagento Enterprise Edition Customer Support Guide
Magento Enterprise Edition Customer Support Guide April 2017 magento.com/support 2017 Magento, Inc. All rights reserved. Thank You for using Magento Enterprise Edition Customer support is a vital part
More informationBusiness Requirements Document (BRD) Template
Business Requirements Document (BRD) Template Following is a template for a business requirements document (BRD). The document includes many best practices in use today. Don t be limited by the template,
More informationREQUEST FOR INFORMATION (RFI) ELECTRONIC FORMS AUTOMATION DEP Solicitation Number: C
Request for Information Electronic Forms Automation DEP RFI No.: 2016040C REQUEST FOR INFORMATION (RFI) ELECTRONIC FORMS AUTOMATION DEP Solicitation Number: 2016040C This is a Request for Information (RFI)
More informationLecture 5: Requirements Specifications
Lecture 5: Requirements Specifications Why we need to write specifications Purpose and audience Choosing an appropriate size and formality Desiderata for Specifications Properties of good specifications
More informationBasic Service Request Management. BMC Remedyforce Winter 11
Winter 11 Virginia Leandro 01 March 2012 Table of Contents Service Request Management 3 Preparation 4 Accounts (Vendors and Service Providers) 5 Users/Profiles 6 Business Hours (Service Hours) 7 Default
More informationBECOME A LOAD TESTING ROCK STAR
3 EASY STEPS TO BECOME A LOAD TESTING ROCK STAR Replicate real life conditions to improve application quality Telerik An Introduction Software load testing is generally understood to consist of exercising
More informationSession 3b: Defining data items
Session 3b: Defining data items Sources of data items Establishing a project data dictionary Defining an elementary item Defining a composite data item COMP 320 / 420, Spring, 2018 Mr. Weisert Q: Which
More informationService Level Agreement Research Computing Environment and Managed Server Hosting
RCE SLA 2013 Service Level Agreement Research Computing Environment and Managed Server Hosting Institute for Quantitative Social Science (IQSS) and Harvard- MIT Data Center (HMDC) August 1, 2013 1. Overview
More informationBackup vs. Business Continuity: Using RTO to Better Plan for Your Business
Backup vs. Business Continuity: Using RTO to Better Plan for Your Business Executive Summary SMBs in general don t have the same IT budgets and staffs as larger enterprises. Yet just like larger organizations
More informationAnnual Public Safety PSAP Survey results
Annual Public Safety PSAP Survey results 573 PSAP Employees Surveyed March - July 2016 2016 Stratus Technologies. All Rights Reserved. 1 Stratus PSAP Survey March 2016 From March 2016 through July of 2016,
More informationCloud Strategies for Addressing IT Challenges
Cloud Strategies for Addressing IT Challenges Mark Bowker Senior Analyst Enterprise Strategy Group Introduction Mark Bowker, Senior Analyst U.S. Headquarters 20 Asylum Street Milford, MA 01757 2011 Enterprise
More informationSoftware Development Process Models
Software Development Process Models From classical notions to more agile approaches th@cs.toronto.edu, BA8134 Code & Fix or Cowboy Coding 1) Write program 2) Test and fix program Problems: program users
More informationTable of Contents. Oracle SQL PL/SQL Training Courses
Table of Contents Overview... 7 About DBA University, Inc.... 7 Eligibility... 8 Pricing... 8 Course Topics... 8 Relational database design... 8 1.1. Computer Database Concepts... 9 1.2. Relational Database
More informationTotal Cost of Ownership: Benefits of ECM in the OpenText Cloud
Total Cost of Ownership: Benefits of ECM in the OpenText Cloud OpenText Managed Services brings together the power of an enterprise cloud platform with the technical skills and business experience required
More informationTotal Cost of Ownership: Benefits of the OpenText Cloud
Total Cost of Ownership: Benefits of the OpenText Cloud OpenText Managed Services in the Cloud delivers on the promise of a digital-first world for businesses of all sizes. This paper examines how organizations
More informationRoadmap to the Efficient Cloud: 3 Checkpoints for the Modern Enterprise
Roadmap to the Efficient Cloud: 3 Checkpoints for the Modern Enterprise Roadmap for the Modern Enterprise As your AWS environment grows, the importance of instilling governance and following best practice
More informationCITY OF SAN ANTONIO invites applications for the position of: Web Design Senior Analyst
CITY OF SAN ANTONIO invites applications for the position of: Web Design Senior Analyst SALARY: $24.83 - $37.24 Hourly $51,644.58 - $77,467.00 Annually OPENING DATE: 02/23/17 CLOSING DATE: 03/23/17 11:59
More informationThree Key Considerations for Your Public Cloud Infrastructure Strategy
GOING PUBLIC: Three Key Considerations for Your Public Cloud Infrastructure Strategy Steve Follin ISG WHITE PAPER 2018 Information Services Group, Inc. All Rights Reserved The Market Reality The race to
More informationNEW WEB BROWSER-BASED APPLIANCE ADDS TO DATA CENTER SECURITY
CASE STUDY Standby Generation for Data Centers NEW WEB BROWSER-BASED APPLIANCE ADDS TO DATA CENTER SECURITY Taking the Next Step to Protect Critical Data If you live or work there, you understand that
More informationRed Hat Virtualization Increases Efficiency And Cost Effectiveness Of Virtualization
Forrester Total Economic Impact Study Commissioned by Red Hat January 2017 Red Hat Virtualization Increases Efficiency And Cost Effectiveness Of Virtualization Technology organizations are rapidly seeking
More informationThe Internet Society. on behalf of. The IETF Administrative Oversight Committee. for. Software Development IDIQ Contract
The Internet Society on behalf of The IETF Administrative Oversight Committee REQUEST FOR PROPOSALS for Software Development IDIQ Contract Date of Issuance: January 7, 2015 Proposal Submission Deadline:
More informationStaffing Services Manager (SSM)
Healthcare Staffing Services Staffing Services Manager (SSM) Agency User Manual table of contents section one: staffing services manager (SSM) information... 2 1.1 Access the Site... 2 1.2 Home Page Icons...
More informationAUTHORITY FOR ELECTRICITY REGULATION
SULTANATE OF OMAN AUTHORITY FOR ELECTRICITY REGULATION SCADA AND DCS CYBER SECURITY STANDARD FIRST EDITION AUGUST 2015 i Contents 1. Introduction... 1 2. Definitions... 1 3. Baseline Mandatory Requirements...
More informationIT Project Management Challenges with Open Source. George A Pace
IT Project Management Challenges with Open Source George A Pace Tonight s agenda Two parts to the Presentation What is Open Source? A background primer on the key elements of Open Source. A specific focus
More informationIPv6 Deployment Lessons-Learned and Keys to Success
Lessons-Learned and Keys to Success Ron Broersma, DREN Chief Engineer 25 February 2015 Background 14 years of active IPv6 deployment activities on various DOD networks, on wide-area and enterprise scales
More informationProposal for Deep Freeze Solution. Copyright Topbit System Sdn Bhd
The Deep Freeze Concept Absolute System Integrity Deep Freeze makes computer configurations indestructible Any changes made to a computer are wiped out at the end of the session Provides immunity from:
More information-archiving. project roadmap CHAPTER 1. archiving Planning, policies and product selection
INSIDE email archiving Planning, policies and product selection CHAPTER 1 Ready to dive into email archiving? Try this four-phased approach to get your project up and running Email-archiving project roadmap
More informationFlorida Board of Governors General Office Legislative Budget Request
Florida Board of Governors General Office 2018-2019 Legislative Budget Request Funding of $9.16 million is needed to support the 65 authorized positions and associated operating expense for the Board Office.
More informationStandard CIP Cyber Security Physical Security
A. Introduction 1. Title: Cyber Security Physical Security of Critical Cyber Assets 2. Number: CIP-006-1 3. Purpose: Standard CIP-006 is intended to ensure the implementation of a physical security program
More informationDigital Workflow 10 Tech Rules to Guide You
Last updated: 10/11/10 Digital Workflow 10 Tech Rules to Guide You Introduction Whether your goal is to become paperless, or just to get more out of the technology you use, you need to (1) find the easy
More informationThe Internet Society. on behalf of. The IETF Administrative Oversight Committee. Request for Proposal. RFC Editor RFC Format CSS Design
The Internet Society on behalf of The IETF Administrative Oversight Committee Request for Proposal RFC Editor RFC Format CSS Design Date of Issuance: July 22, 2016 Proposal Submission Deadline: September
More information5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief
5 Trends That Will Impact Your IT Planning in 2012 Layered Security Executive Brief a QuinStreet Excutive Brief. 2011 Layered Security Many of the IT trends that your organization will tackle in 2012 aren
More informationMajor travel and hospitality organizations often have
Trimming Data Processing Time by Months; Saving Millions by Keeping Software Releases on Track Major travel and hospitality organizations often have extensive technology footprints, from complex online
More informationEnsure that all windows servers are patched and virus checked to the correct levels and that changes are made in line with ISO standards
Job description and person specification Senior ICT Officer Reports to: ICT Manager Purpose This role supports the provision of a high quality and measurable ICT infrastructure support service whilst delivering
More informationWriting Proposals that Win 1
All You Need to Know to Win: Writing Proposals that Win A PROPOSAL WORTH WRITING SHOULD BE WORTHY OF WINNING Please Note Materials contained within this presentation are proprietary to MarkeTrainer under
More informationSupporting The Zero Trust Model Of Information Security: The Important Role Of Today s Intrusion Prevention Systems
A Custom Technology Adoption Profile Commissioned By IBM September 2013 Supporting The Zero Trust Model Of Information Security: The Important Role Of Today s Intrusion Prevention Systems 1 Introduction
More information77% 56% 74% 52% PACKAGING WORLD SURVEY: Ethernet And Wireless In Production Facilities
Ethernet Usage + Strategy Survey 2012 A joint survey by Packaging World and XYZ Company was conducted in late 2012 to obtain insight into current engineering and management applications and opinions surrounding
More informationRED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE.
RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE. Is putting Contact us INTRODUCTION You know the headaches of managing an infrastructure that is stretched to its limit. Too little staff. Too many users. Not
More informationFree ITIL Foundation Exam Paper 40 Questions 60 Minutes Allowed. Minimum of 26/40 to Pass. With the Compliments of www.itservicesuccess.com Good Luck!! GIVE YOURSELF THE UNFAIR ADVANTAGE! MULTIPLE CHOICE
More informationOracle Certified Program
Oracle Certified Program Agenda Value of Oracle Skills in the Current Job Market Oracle Certification Value What it means to be an Oracle Technology Professional Benefits of earning an Oracle Certification
More informationData Centers and Mission Critical Facilities Access and Physical Security Procedures
Planning & Facilities Data Centers and Mission Critical Facilities Access and Physical Security Procedures Attachment B (Referenced in UW Information Technology Data Centers and Mission Critical Facilities
More informationWhat To Ask Your SD-WAN Vendor
#FutureWAN What To Ask Your SD-WAN Vendor Ramesh Prabagaran, VP of Product Management Twitter: @ramsba Motivation & Rationale Marketing vs Reality Network auto provisions, auto corrects, auto everything
More information<Project Name> Vision
Version [Note: The following template is provided for use with the Rational Unified Process. Text enclosed in square brackets and displayed in blue italics (style=infoblue) is included
More informationEvaluating Archiving Solutions
Evaluating Email Archiving Solutions THE CLIPPER GROUP ExplorerTM Published Since 1996 Report #TCG2006036 May 9, 2006 Evaluating Email Archiving Solutions Analyst: Dianne McAdam Navigating Information
More informationWeighing in on the Benefits of a SAS 70 Audit for Third Party Administrators
Weighing in on the Benefits of a SAS 70 Audit for Third Party Administrators With increasing oversight and growing demands for industry regulations, third party assurance has never been under a keener
More informationMHA Consulting BCM Metrics Resiliency Through Measurement
0 MHA Consulting BCM Metrics Resiliency Through Measurement Presented by: Michael Herrera, CBCP March, 2013 2009 2013 MHA MHA Consulting All All Rights Rights Reserved. Reserved. Agenda 1 Overview A Menu
More informationVisual Studio Subscriptions Administration Guide
Visual Studio Subscriptions Administration Guide 2 Contents INTRODUCTION... 4 ROLES AND RESPONSIBILITIES OF A VISUAL STUDIO SUBSCRIPTIONS ADMINISTRATOR... 4 BENEFITS AND LIMITATIONS OF VISUAL STUDIO SUBSCRIPTIONS...
More informationThe New CARLI Selection System: Library Instructions
The New CARLI Selection System: Library Instructions Why a New System? CARLI has been using a locally built relational database to track pricing and subscriptions since 2004. The underlying software is
More informationState of the. Union. (or: How not to use Krebs as an IDS ) (Information Security) Jeff McJunkin Senior Technical Analyst Counter Hack Challenges
State of the (Information Security) Union (or: How not to use Krebs as an IDS ) Jeff McJunkin Senior Technical Analyst Counter Hack Challenges My background IT Systems / Network Administrator for City
More informationDatacenter Care HEWLETT PACKARD ENTERPRISE. Key drivers of an exceptional NPS score
Datacenter Care The things I love about Datacenter Care is the a la carte nature of the offering. The contract is really flexible and the services delivered correspond exactly to what we bought. The contract
More informationCERTIFIED FINANCIAL PLANNER BOARD OF STANDARDS, INC. ANONYMOUS CASE HISTORIES NUMBER 30648
CERTIFIED FINANCIAL PLANNER BOARD OF STANDARDS, INC. ANONYMOUS CASE HISTORIES NUMBER 30648 This is a summary of a decision issued following the October 2017 hearings of the Disciplinary and Ethics Commission
More informationTop 5 Myths about Cisco CCIE Certification
Top 5 Myths about Cisco CCIE Certification Myths are fun, as long as you don t confuse them with the truth Long term beliefs become strong facts irrespective of their reality and that is where myths come
More informationService Level Agreement
This ( ) sets forth the specific terms and conditions under which LightEdge Solutions, Inc. ( LightEdge ) shall supply all Managed Services to Customer. The Master Agreement entered into between LightEdge
More informationINFORMATION TECHNOLOGY AUDIT &
One day training on INFORMATION TECHNOLOGY AUDIT & 10 th May 2018 - Mövenpick Hotel, Karachi 14 th May 2018 - Sunfort Hotel, Lahore (10:00 AM to 5:00 PM) TRAINING OVERVIEW Every time people get to hear
More informationResource Mapping A Wait Time Based Methodology for Database Performance Analysis
Resource Mapping A Wait Time Based Methodology for Database Performance Analysis Prepared for NYOUG, 2005 Presented by Matt Larson Chief Technology Officer Confio Software Presentation Agenda Introduction
More informationThe Hopper System: How the Largest* XE6 in the World Went From Requirements to Reality! Katie Antypas, Tina Butler, and Jonathan Carter
The Hopper System: How the Largest* XE6 in the World Went From Requirements to Reality! Katie Antypas, Tina Butler, and Jonathan Carter CUG 2011, May 25th, 2011 1 Requirements to Reality Develop RFP Select
More informationTroubleshooting Converged Enterprise Networks
Troubleshooting Converged Enterprise Networks VoiceCon San Francisco 2008 Steven Guthrie Director, Product Marketing CA, Inc. Agenda > What I m hearing >What is QoS? > Network and Voice Service Management
More information10 Hidden IT Risks That Might Threaten Your Business
(Plus 1 Fast Way to Find Them) Your business depends on intelligence. But can you count on your technology? You may not be in the intelligence technology business, but it s probably impossible to imagine
More informationThe Project Charter. Date of Issue Author Description. Revision Number. Version 0.9 October 27 th, 2014 Moe Yousof Initial Draft
The Project Charter Project Title: VDI Data Center Design and Build Project Sponsor: South Alberta Data Centers Inc. (SADC Inc.) Project Customer: The City of Calgary Project Manager: Moe Yousof Document
More informationStand: File: gengler_java_e. Java Community Process: Not perfect, but operating very successfully
Stand: 14.04.03 File: gengler_java_e Java Community Process: Not perfect, but operating very successfully While Sun Microsystems was the original sole driving force behind Java at one time, the company
More informationFifteen Best Practices for a Successful Data Center Migration
Fifteen Best Practices for a Successful Data Center Migration Published: 6 March 2017 ID: G00324187 Analyst(s): Henrique Cecci Data center migrations are often complex and risky. These best practices will
More informationROI CASE STUDY IBM SPSS CITY OF LANCASTER. ROI: 1301% Payback: 1.5 months Average annual benefit: $1,344,338. Cost : Benefit Ratio 1 : 45.
ROI CASE STUDY IBM SPSS CITY OF LANCASTER THE BOTTOM LINE The City of Lancaster, California needed to gain greater visibility into where Part I crimes were occurring and where they were expected to occur
More informationWhy is it Difficult to Find a Good Free Web Host
From the SelectedWorks of Umakant Mishra February, 2012 Why is it Difficult to Find a Good Free Web Host Umakant Mishra Available at: https://works.bepress.com/umakant_mishra/102/ Why is it difficult to
More information