Session 6b: Specifying constraints

Size: px
Start display at page:

Download "Session 6b: Specifying constraints"

Transcription

1 Session 6b: Specifying constraints Analysis vs. Design Constraints on the end product Constraints on the development COMP 320 / 420 Spring, 2018 Mr. Weisert "Analysis & Design" (review from session 1) There is no such single discipline or activity, despite many book titles, etc. They are two separate activities: done at different times during a project done (usually) by different people requiring different skills The analyst specifies WHAT the proposed new application will do. The designer determines HOW the proposed application will do it. This course is about systems analysis. "Non-functional requirements" Some authors, especially those who advocate a discrete requirements list methodology like that term: What they call "functional requirements" are bona fide specifications for the proposed new application system. Those requirements specify what the system is to do. What they call "non-functional requirements" are actually restrictions upon the project. Many (not all) of them are unnecessary or premature in this phase of a project. We prefer the more accurate term "constraint". Part 1: overview summary of the kinds of constraint A. Constraints on the end product (What we build) B. Constraints on the development project (How we build it) COMP 320, spring copyright 2010 Conrad Weisert

2 A: Constraints on the end product Performance constraints Availability Reliability Transaction response time Batch run time Interfaces with other application systems Environment Hardware Operating system Network deployment DBMS Analyst should usually specify these Analyst should try to avoid specifying these B: Constraints on the project Development tools Programming language Editor, source library control, etc. Use of software libraries or application products Methodology Programming paradigm Analyst should try to avoid specifying these Activity sequence, etc. Organization Use of contract development firm Choice or qualifications of personnel Why would a systems analyst want to specify any of those? Implicit constraints Most large organizations have a body of I.T. standards that specify many of the choices we've just discussed. Those standards and conventions apply to every project in the organization, whether done by in-house staff or by a contractor. The analyst needs to specify a constraint only when it has to deviate from or augment those organization-wide standards. Who approves the deviation? Part 2: Some important constraints a. Constraints that the systems analyst should always (usually) specify as part of the ESD. b. Constraints that the systems analyst may specify in unusual situations. c. Constraints that the systems analyst should try to avoid specifying. s? COMP 320, spring copyright 2010 Conrad Weisert

3 Situation We've installed a new application system for a demanding user organization. During the first six months of operation The system goes down ("crashes") 5 times with outages lasting between five minutes and 50 minutes. One of those crashes resulted in lost transactions requiring re-entry of two hours worth of high-volume input data. Data entry clerks complain the response time is often sluggish in the late afternoon. User management is irate, proclaiming the system a failure. Whose fault is this? Managing expectations Many users are naive about operational performance: They expect perfection! Why? Every failure or complaint is a "black mark" against the system (and its developers) When a certain number of black marks are accumulated, users rebel. The analyst must prepare the sponsoring users for reality: Perfection is unattainable We can usually get closer to it if we spend more money and take more time. How? Specifying on-line availability System Q will be available to on-line users between 07:30 and 18:00 (EST) Monday through Saturday. Incidents of unplanned unavailability (outages) will occur no more than: up to 5 minutes once a month 5 to 20 minutes twice a year up to 4 hours once in 2 years How can the analyst know that's possible? What if the user says it's unacceptable? Specifying reliability File maintenance transactions may be lost and require re-entry no more than: 15 minutes worth twice in 6 months 60 minutes worth once in 2 years Undetected system errors resulting in erroneous account information will never occur. How can the analyst know that's possible? What if the user says it's unacceptable? COMP 320, spring copyright 2010 Conrad Weisert

4 Specifying response time Order status inquiry transactions will display results in 0.5 seconds (avg.) 4.0 seconds (max.) Keystrokes on all on-line data entry (forms or dialogs) will be displayed instantly (0.1 sec.) How can the analyst know that's possible? What about Internet deployment? What if the user says it's unacceptable? Specifying batch turn-around Month-end accounts reconciliation run will take no longer than 2 hours elapsed time, starting after on-line shut-down the last working day of the month. Negotiating reliability and performance Sponsoring users may be alarmed when they first hear mention of failures or sluggish response, however infrequent. We can give them choices: Everything has a price. You can spend more (and wait longer) to get faster, more reliable operation. The choice depends upon the nature of the application. How do we involve the prospective developers? The other side of negotiation We expect the user community to press for higher reliability and faster response time. But the prospective developers may take the opposite view! Remember that the developers (or vendors) are the second audience for the ESD. They get a chance to approve or reject performance constraints based on their expertise. Outside contractors (developers or software product vendors) should be required to include the performance constraints in the formal contract. COMP 320, spring copyright 2010 Conrad Weisert

5 Levels of reliability and performance for different kinds of application 1. Application used by internal staff. They will be inconvenienced by failures. 2. Applications that affect outside people. Our company will be embarrassed. 3. Applications that can cause hardship (such as?) to outside people We may get sued. 4. Super-critical applications People may die Prolonged negotiations We may not know enough about the feasibility and cost of a committed level of performance and reliability until some internal design work is done. What can we do about that? Platform constraints In the mainframe era this was easy: If the organization had million-dollar machines with plenty of capacity, you needed overwhelming justification to deploy an application on anything else. Today we may have options: Server Shared Dedicated Internet ("cloud") Operating system UNIX Windows etc. Work stations Desktop Dumb terminals Portables DBMS Oracle SQL Server etc. Does the analyst have to worry about the platform? Often not The organization may have established a standard operating environment machines system software support staff If that's an acceptable platform for the new application, just accept it. Otherwise, trust the devlopers to use their judgment COMP 320, spring copyright 2010 Conrad Weisert

6 Avoiding unnecessary platform constraints Avoid using physical or implementationspecific terms to label DFD elements Windows PC Server Oracle database Those can be specified later during the design phase. Specifying the configuration The analyst may and often should state: The minimum logical configurations required (needn't work on anything smaller) The impact on capacity of shared resources (must we upgrade the configuration?) Who needs that information, and what will they do with it? Those are just estimates. Later system design will make them firm. Minimum logical configuration Today's distributed platforms make this harder to specify than it used to be. But we still have to try: to help estimate operating cost. to avoid surprising the central I.T. facility to provide lead time for ordering equipment. Some components (clients, servers, network): Permanent ("persistent") storage Transient memory (real / virtual) Processor speed Network capacity etc. etc, etc. Does a systems analyst know how to estimate these? If not, what do we do? Specifying interfaces to other application systems Three possibilities: 1. The proposed new system will send output (by communication link or file) to another system. 2. The proposed new system will receive input from another system. 3. The proposed new system will share a database with another system a. The database must be used without change, or b. The project can specify additions and changes. Are these really constraints, or just output / input specifications? COMP 320, spring copyright 2010 Conrad Weisert

7 Development constraints Programming languages and other tools Documentation standards Use of contractors etc. Why would we care about that at this phase of the project? Is that any of the users' or the analyst's business? Specifying project constraints: Why would an analyst want to? a. The systems analyst may also be the project manager, who will be responsible for building and installing the proposed new application. b. The systems analyst may be a former senior programmer, who has strong opinions (or biases) about development methodology. c. The systems analyst may currently also be a senior programmer, who will actually participate in building the new application. Which of those is a valid reason? Making suggestions The analyst is always free to suggest a technique or approach, based on special knowledge of the application system preferences expressed by the sponsoring users. Unless such a suggestion is specifically flagged as a constraint the developers are free to use their judgment whether to comply. How do we flag it? COMP 320, spring copyright 2010 Conrad Weisert

Session 2. Getting started with a well-structured system specification

Session 2. Getting started with a well-structured system specification Session 2 Getting started with a well-structured system specification COMP 320/420 Spring, 2018 Conrad Weisert The situation A representative approaches us. (or vice versa) He or she may be a. an executive

More information

Session 8: UML The Unified Modeling (or the Unstructured Muddling) language?

Session 8: UML The Unified Modeling (or the Unstructured Muddling) language? Session 8: UML The Unified Modeling (or the Unstructured Muddling) language? A few observations, opinions, pros & cons COMP 320 / 420 Spring, 2018 Mr. Weisert Where did the UML come from? Object-oriented

More information

Continuous Processing versus Oracle RAC: An Analyst s Review

Continuous Processing versus Oracle RAC: An Analyst s Review Continuous Processing versus Oracle RAC: An Analyst s Review EXECUTIVE SUMMARY By Dan Kusnetzky, Distinguished Analyst Most organizations have become so totally reliant on information technology solutions

More information

Session 2b: structured specifications Purpose and criteria Structured specification components Introduction to dataflow diagrams

Session 2b: structured specifications Purpose and criteria Structured specification components Introduction to dataflow diagrams Session 2b: structured specifications Purpose and criteria Structured specification components Introduction to dataflow diagrams COMP 320 / 420, Spring, 2018 Conrad Weisert Criteria for the ESD (from session

More information

MISGUIDED GUIDE SPECS What Specifiers Want and Need

MISGUIDED GUIDE SPECS What Specifiers Want and Need MISGUIDED GUIDE SPECS What Specifiers Want and Need About the Presentation (my responsibilities) The success of this presentation depends on YOU!! I have been to a number of presentations where the presenter

More information

The Case for Virtualizing Your Oracle Database Deployment

The Case for Virtualizing Your Oracle Database Deployment June 2012 The Case for Virtualizing Your Oracle Database Deployment Much has been written about the benefits of virtualization over the last few years. Hypervisor software promises to revolutionize the

More information

Week 2: The Clojure Language. Background Basic structure A few of the most useful facilities. A modernized Lisp. An insider's opinion

Week 2: The Clojure Language. Background Basic structure A few of the most useful facilities. A modernized Lisp. An insider's opinion Week 2: The Clojure Language Background Basic structure A few of the most useful facilities A modernized Lisp Review of Lisp's origins and development Why did Lisp need to be modernized? Relationship to

More information

Management & Operations Excellence

Management & Operations Excellence Management & Operations Excellence Scott Roots Business Development Director EMEA Operational Excellence 2015 Uptime Institute, LLC The global Data Center Authority 1000+ Certifications in over 80 Countries

More information

Session 3: Data. Session 3a: Data

Session 3: Data. Session 3a: Data Session 3: Data Part a: 1. Data types 2. Data representation Part b: Data definition Computer programs manipulate two kinds of data Which are of interest to the analyst? A. Application domain data Exist

More information

Ways of documenting Session 5: detailed requirements The Data Dictionary one any The Project A data dictionary Data Dictionary may be maintained

Ways of documenting Session 5: detailed requirements The Data Dictionary one any The Project A data dictionary Data Dictionary may be maintained Session 5: The Data Dictionary relationship to systems analysis methodologies relationship to project management data definition vs. data representation taxonomy of data types COMP 477 /377, Spring, 2017

More information

SENIOR SYSTEMS ANALYST

SENIOR SYSTEMS ANALYST PERSONNEL COMMISSION Class Code: 5120 Salary Range: 45 (C1) SENIOR SYSTEMS ANALYST JOB SUMMARY Under general direction, analyze work procedures of application systems and coordinate the work of project

More information

FAQ: Database System Development Life Cycle

FAQ: Database System Development Life Cycle Question 1: Why study database management system (DBMS) designs? Answer 1: Understanding and designing databases is truly an evolutionary learning process. There is not a right way or a wrong way to develop

More information

Password Management Project Roadmap

Password Management Project Roadmap 2016 Hitachi ID Systems, Inc. All rights reserved. This document will guide you through the entire life of a successful password management project, including: A needs analysis. Who to involve in the project.

More information

Meltem Özturan misprivate.boun.edu.tr/ozturan/mis515

Meltem Özturan misprivate.boun.edu.tr/ozturan/mis515 Meltem Özturan misprivate.boun.edu.tr/ozturan/mis515 1 2 1 Selecting the Best Alternative Major Activities in the Analysis Phase Gather information Define system requirements Prototype for feasibility

More information

Simplifying IT through Virtualization

Simplifying IT through Virtualization E X E C U T I V E S U M M A R Y G E T T E C H N O L O G Y R I G H T C U S T O M P U B L I S H I N G Microsoft-powered virtualization offers tremendous potential to help IT executives drive innovation while

More information

Session 1b: Overview of systems analysis methodology

Session 1b: Overview of systems analysis methodology Session 1b: Overview of systems analysis methodology The system specification (ESD) Ways of documenting an ESD Criteria to be satisfied Historical survey Comp 320 / 420, spring, 2018 Alternative names

More information

Week 6: Data. Let's focus first on application domain data.

Week 6: Data. Let's focus first on application domain data. review of things we already (should) know criteria for external & internal representation basic elementary data types composite data types container data types derived subtypes abstract data types (ADT)

More information

Week 5: Background. A few observations on learning new programming languages. What's wrong with this (actual) protest from 1966?

Week 5: Background. A few observations on learning new programming languages. What's wrong with this (actual) protest from 1966? Week 5: Background A few observations on learning new programming languages What's wrong with this (actual) protest from 1966? Programmer: "Switching to PL/I as our organization's standard programming

More information

Optimisation drives digital transformation

Optimisation drives digital transformation January 2017 Executive summary Forward-thinking business leaders are challenging their organisations to achieve transformation by harnessing digital technologies with organisational, operational, and business

More information

*ANSWERS * **********************************

*ANSWERS * ********************************** CS/183/17/SS07 UNIVERSITY OF SURREY BSc Programmes in Computing Level 1 Examination CS183: Systems Analysis and Design Time allowed: 2 hours Spring Semester 2007 Answer ALL questions in Section A and TWO

More information

2013 Cloud Computing Outlook: Private Cloud Expected to Grow at Twice the Rate of Public Cloud

2013 Cloud Computing Outlook: Private Cloud Expected to Grow at Twice the Rate of Public Cloud Private Cloud Expected to Grow at Twice the Rate of Public Cloud In This Paper Security, privacy concerns about the cloud remain SaaS is the most popular cloud service model in use today Microsoft, Google

More information

Page 1 of 15. Applicability. Compatibility EACMS PACS. Version 5. Version 3 PCA EAP. ERC NO ERC Low Impact BES. ERC Medium Impact BES

Page 1 of 15. Applicability. Compatibility EACMS PACS. Version 5. Version 3 PCA EAP. ERC NO ERC Low Impact BES. ERC Medium Impact BES 002 5 R1. Each Responsible Entity shall implement a process that considers each of the following assets for purposes of parts 1.1 through 1.3: i. Control Centers and backup Control Centers; ii. Transmission

More information

Get your business Skype d up. Lessons learned from Skype for Business adoption

Get your business Skype d up. Lessons learned from Skype for Business adoption Get your business Skype d up Lessons learned from Skype for Business adoption On the rise with Skype for Business Recent figures from Microsoft found that 90% of Fortune 500 companies and over 100 million

More information

Midpeninsula Regional Open Space District

Midpeninsula Regional Open Space District Midpeninsula Regional Open Space District SENIOR TECHNOLOGIST DEFINITION Under general direction, performs the most complex and varied technical tasks related to the design, configuration, troubleshooting,

More information

Unlocking Office 365 without a password. How to Secure Access to Your Business Information in the Cloud without needing to remember another password.

Unlocking Office 365 without a password. How to Secure Access to Your Business Information in the Cloud without needing to remember another password. Unlocking Office 365 without a password How to Secure Access to Your Business Information in the Cloud without needing to remember another password. Introduction It is highly likely that if you have downloaded

More information

Effective: 12/31/17 Last Revised: 8/28/17. Responsible University Administrator: Vice Chancellor for Information Services & CIO

Effective: 12/31/17 Last Revised: 8/28/17. Responsible University Administrator: Vice Chancellor for Information Services & CIO Effective: 12/31/17 Last Revised: 8/28/17 Responsible University Administrator: Vice Chancellor for Information Services & CIO Responsible University Office: Information Technology Services Policy Contact:

More information

OPTIMIZATION MAXIMIZING TELECOM AND NETWORK. The current state of enterprise optimization, best practices and considerations for improvement

OPTIMIZATION MAXIMIZING TELECOM AND NETWORK. The current state of enterprise optimization, best practices and considerations for improvement MAXIMIZING TELECOM AND NETWORK OPTIMIZATION The current state of enterprise optimization, best practices and considerations for improvement AOTMP.com The Next Evolution of Telecom Management OVERVIEW As

More information

Reducing Cybersecurity Costs & Risk through Automation Technologies

Reducing Cybersecurity Costs & Risk through Automation Technologies Reducing Cybersecurity Costs & Risk through Automation Technologies Sponsored by Juniper Networks Independently conducted by Ponemon Institute LLC Publication Date: November 2017 Ponemon Institute Research

More information

Ways of documenting Session 5: detailed requirements The Data Dictionary one any The Project A data dictionary Data Dictionary may be maintained

Ways of documenting Session 5: detailed requirements The Data Dictionary one any The Project A data dictionary Data Dictionary may be maintained Session 5: The Data Dictionary relationship to systems analysis methodologies relationship to project management data definition vs. data representation taxonomy of data types COMP 477 /377, Fall, 2018

More information

Predictive Insight, Automation and Expertise Drive Added Value for Managed Services

Predictive Insight, Automation and Expertise Drive Added Value for Managed Services Sponsored by: Cisco Services Author: Leslie Rosenberg December 2017 Predictive Insight, Automation and Expertise Drive Added Value for Managed Services IDC OPINION Competitive business leaders are challenging

More information

Embarking on the next stage of hosted desktop delivery for international events management company

Embarking on the next stage of hosted desktop delivery for international events management company Embarking on the next stage of hosted desktop delivery for international events management company Richmond Events is an international events management company, delivering a diverse range of forums and

More information

Practical Database Design Methodology and Use of UML Diagrams Design & Analysis of Database Systems

Practical Database Design Methodology and Use of UML Diagrams Design & Analysis of Database Systems Practical Database Design Methodology and Use of UML Diagrams 406.426 Design & Analysis of Database Systems Jonghun Park jonghun@snu.ac.kr Dept. of Industrial Engineering Seoul National University chapter

More information

TELESPEX AMERICA S #1 BUSINESS PHONE SYSTEMS. [All-in-One] Phones - Phone Systems - Phone Lines - Fax

TELESPEX AMERICA S #1 BUSINESS PHONE SYSTEMS. [All-in-One] Phones - Phone Systems - Phone Lines - Fax TELESPEX AMERICA S #1 BUSINESS PHONE SYSTEMS Phones - Phone Systems - Phone Lines - Fax [All-in-One] Business Phone Systems Made Easy! iben Consulting San Jose, CA Find Local Resellers telespex.com/local

More information

Week 11: Case study: Designing, building, & testing a Person class Background for the Project Needed in many applications Is it possible? practical?

Week 11: Case study: Designing, building, & testing a Person class Background for the Project Needed in many applications Is it possible? practical? Week 11: Case study: Designing, building, & testing a Person class Background for the Project Needed in many applications Is it possible? practical? Background Many applications deal with records representing

More information

White Paper: Backup vs. Business Continuity. Backup vs. Business Continuity: Using RTO to Better Plan for Your Business

White Paper: Backup vs. Business Continuity. Backup vs. Business Continuity: Using RTO to Better Plan for Your Business Backup vs. Business Continuity: Using RTO to Better Plan for Your Business Executive Summary SMBs in general don t have the same IT budgets and staffs as larger enterprises. Yet just like larger organizations

More information

The Value of Migrating from Cisco Tidal Horizon to Cisco Process Orchestrator

The Value of Migrating from Cisco Tidal Horizon to Cisco Process Orchestrator White Paper The Value of Migrating from Cisco Tidal Horizon to Cisco Process Orchestrator Migrating from Cisco Tidal Horizon for SAP to Cisco Process Orchestrator can help you reduce total cost of ownership

More information

6 Tips to Help You Improve Configuration Management. by Stuart Rance

6 Tips to Help You Improve Configuration Management. by Stuart Rance 6 Tips to Help You Improve Configuration Management by Stuart Rance Introduction Configuration management provides information about what assets you own, how they are configured, and how they are connected

More information

Magento Enterprise Edition Customer Support Guide

Magento Enterprise Edition Customer Support Guide Magento Enterprise Edition Customer Support Guide April 2017 magento.com/support 2017 Magento, Inc. All rights reserved. Thank You for using Magento Enterprise Edition Customer support is a vital part

More information

Business Requirements Document (BRD) Template

Business Requirements Document (BRD) Template Business Requirements Document (BRD) Template Following is a template for a business requirements document (BRD). The document includes many best practices in use today. Don t be limited by the template,

More information

REQUEST FOR INFORMATION (RFI) ELECTRONIC FORMS AUTOMATION DEP Solicitation Number: C

REQUEST FOR INFORMATION (RFI) ELECTRONIC FORMS AUTOMATION DEP Solicitation Number: C Request for Information Electronic Forms Automation DEP RFI No.: 2016040C REQUEST FOR INFORMATION (RFI) ELECTRONIC FORMS AUTOMATION DEP Solicitation Number: 2016040C This is a Request for Information (RFI)

More information

Lecture 5: Requirements Specifications

Lecture 5: Requirements Specifications Lecture 5: Requirements Specifications Why we need to write specifications Purpose and audience Choosing an appropriate size and formality Desiderata for Specifications Properties of good specifications

More information

Basic Service Request Management. BMC Remedyforce Winter 11

Basic Service Request Management. BMC Remedyforce Winter 11 Winter 11 Virginia Leandro 01 March 2012 Table of Contents Service Request Management 3 Preparation 4 Accounts (Vendors and Service Providers) 5 Users/Profiles 6 Business Hours (Service Hours) 7 Default

More information

BECOME A LOAD TESTING ROCK STAR

BECOME A LOAD TESTING ROCK STAR 3 EASY STEPS TO BECOME A LOAD TESTING ROCK STAR Replicate real life conditions to improve application quality Telerik An Introduction Software load testing is generally understood to consist of exercising

More information

Session 3b: Defining data items

Session 3b: Defining data items Session 3b: Defining data items Sources of data items Establishing a project data dictionary Defining an elementary item Defining a composite data item COMP 320 / 420, Spring, 2018 Mr. Weisert Q: Which

More information

Service Level Agreement Research Computing Environment and Managed Server Hosting

Service Level Agreement Research Computing Environment and Managed Server Hosting RCE SLA 2013 Service Level Agreement Research Computing Environment and Managed Server Hosting Institute for Quantitative Social Science (IQSS) and Harvard- MIT Data Center (HMDC) August 1, 2013 1. Overview

More information

Backup vs. Business Continuity: Using RTO to Better Plan for Your Business

Backup vs. Business Continuity: Using RTO to Better Plan for Your Business Backup vs. Business Continuity: Using RTO to Better Plan for Your Business Executive Summary SMBs in general don t have the same IT budgets and staffs as larger enterprises. Yet just like larger organizations

More information

Annual Public Safety PSAP Survey results

Annual Public Safety PSAP Survey results Annual Public Safety PSAP Survey results 573 PSAP Employees Surveyed March - July 2016 2016 Stratus Technologies. All Rights Reserved. 1 Stratus PSAP Survey March 2016 From March 2016 through July of 2016,

More information

Cloud Strategies for Addressing IT Challenges

Cloud Strategies for Addressing IT Challenges Cloud Strategies for Addressing IT Challenges Mark Bowker Senior Analyst Enterprise Strategy Group Introduction Mark Bowker, Senior Analyst U.S. Headquarters 20 Asylum Street Milford, MA 01757 2011 Enterprise

More information

Software Development Process Models

Software Development Process Models Software Development Process Models From classical notions to more agile approaches th@cs.toronto.edu, BA8134 Code & Fix or Cowboy Coding 1) Write program 2) Test and fix program Problems: program users

More information

Table of Contents. Oracle SQL PL/SQL Training Courses

Table of Contents. Oracle SQL PL/SQL Training Courses Table of Contents Overview... 7 About DBA University, Inc.... 7 Eligibility... 8 Pricing... 8 Course Topics... 8 Relational database design... 8 1.1. Computer Database Concepts... 9 1.2. Relational Database

More information

Total Cost of Ownership: Benefits of ECM in the OpenText Cloud

Total Cost of Ownership: Benefits of ECM in the OpenText Cloud Total Cost of Ownership: Benefits of ECM in the OpenText Cloud OpenText Managed Services brings together the power of an enterprise cloud platform with the technical skills and business experience required

More information

Total Cost of Ownership: Benefits of the OpenText Cloud

Total Cost of Ownership: Benefits of the OpenText Cloud Total Cost of Ownership: Benefits of the OpenText Cloud OpenText Managed Services in the Cloud delivers on the promise of a digital-first world for businesses of all sizes. This paper examines how organizations

More information

Roadmap to the Efficient Cloud: 3 Checkpoints for the Modern Enterprise

Roadmap to the Efficient Cloud: 3 Checkpoints for the Modern Enterprise Roadmap to the Efficient Cloud: 3 Checkpoints for the Modern Enterprise Roadmap for the Modern Enterprise As your AWS environment grows, the importance of instilling governance and following best practice

More information

CITY OF SAN ANTONIO invites applications for the position of: Web Design Senior Analyst

CITY OF SAN ANTONIO invites applications for the position of: Web Design Senior Analyst CITY OF SAN ANTONIO invites applications for the position of: Web Design Senior Analyst SALARY: $24.83 - $37.24 Hourly $51,644.58 - $77,467.00 Annually OPENING DATE: 02/23/17 CLOSING DATE: 03/23/17 11:59

More information

Three Key Considerations for Your Public Cloud Infrastructure Strategy

Three Key Considerations for Your Public Cloud Infrastructure Strategy GOING PUBLIC: Three Key Considerations for Your Public Cloud Infrastructure Strategy Steve Follin ISG WHITE PAPER 2018 Information Services Group, Inc. All Rights Reserved The Market Reality The race to

More information

NEW WEB BROWSER-BASED APPLIANCE ADDS TO DATA CENTER SECURITY

NEW WEB BROWSER-BASED APPLIANCE ADDS TO DATA CENTER SECURITY CASE STUDY Standby Generation for Data Centers NEW WEB BROWSER-BASED APPLIANCE ADDS TO DATA CENTER SECURITY Taking the Next Step to Protect Critical Data If you live or work there, you understand that

More information

Red Hat Virtualization Increases Efficiency And Cost Effectiveness Of Virtualization

Red Hat Virtualization Increases Efficiency And Cost Effectiveness Of Virtualization Forrester Total Economic Impact Study Commissioned by Red Hat January 2017 Red Hat Virtualization Increases Efficiency And Cost Effectiveness Of Virtualization Technology organizations are rapidly seeking

More information

The Internet Society. on behalf of. The IETF Administrative Oversight Committee. for. Software Development IDIQ Contract

The Internet Society. on behalf of. The IETF Administrative Oversight Committee. for. Software Development IDIQ Contract The Internet Society on behalf of The IETF Administrative Oversight Committee REQUEST FOR PROPOSALS for Software Development IDIQ Contract Date of Issuance: January 7, 2015 Proposal Submission Deadline:

More information

Staffing Services Manager (SSM)

Staffing Services Manager (SSM) Healthcare Staffing Services Staffing Services Manager (SSM) Agency User Manual table of contents section one: staffing services manager (SSM) information... 2 1.1 Access the Site... 2 1.2 Home Page Icons...

More information

AUTHORITY FOR ELECTRICITY REGULATION

AUTHORITY FOR ELECTRICITY REGULATION SULTANATE OF OMAN AUTHORITY FOR ELECTRICITY REGULATION SCADA AND DCS CYBER SECURITY STANDARD FIRST EDITION AUGUST 2015 i Contents 1. Introduction... 1 2. Definitions... 1 3. Baseline Mandatory Requirements...

More information

IT Project Management Challenges with Open Source. George A Pace

IT Project Management Challenges with Open Source. George A Pace IT Project Management Challenges with Open Source George A Pace Tonight s agenda Two parts to the Presentation What is Open Source? A background primer on the key elements of Open Source. A specific focus

More information

IPv6 Deployment Lessons-Learned and Keys to Success

IPv6 Deployment Lessons-Learned and Keys to Success Lessons-Learned and Keys to Success Ron Broersma, DREN Chief Engineer 25 February 2015 Background 14 years of active IPv6 deployment activities on various DOD networks, on wide-area and enterprise scales

More information

Proposal for Deep Freeze Solution. Copyright Topbit System Sdn Bhd

Proposal for Deep Freeze Solution. Copyright Topbit System Sdn Bhd The Deep Freeze Concept Absolute System Integrity Deep Freeze makes computer configurations indestructible Any changes made to a computer are wiped out at the end of the session Provides immunity from:

More information

-archiving. project roadmap CHAPTER 1. archiving Planning, policies and product selection

-archiving. project roadmap CHAPTER 1.  archiving Planning, policies and product selection INSIDE email archiving Planning, policies and product selection CHAPTER 1 Ready to dive into email archiving? Try this four-phased approach to get your project up and running Email-archiving project roadmap

More information

Florida Board of Governors General Office Legislative Budget Request

Florida Board of Governors General Office Legislative Budget Request Florida Board of Governors General Office 2018-2019 Legislative Budget Request Funding of $9.16 million is needed to support the 65 authorized positions and associated operating expense for the Board Office.

More information

Standard CIP Cyber Security Physical Security

Standard CIP Cyber Security Physical Security A. Introduction 1. Title: Cyber Security Physical Security of Critical Cyber Assets 2. Number: CIP-006-1 3. Purpose: Standard CIP-006 is intended to ensure the implementation of a physical security program

More information

Digital Workflow 10 Tech Rules to Guide You

Digital Workflow 10 Tech Rules to Guide You Last updated: 10/11/10 Digital Workflow 10 Tech Rules to Guide You Introduction Whether your goal is to become paperless, or just to get more out of the technology you use, you need to (1) find the easy

More information

The Internet Society. on behalf of. The IETF Administrative Oversight Committee. Request for Proposal. RFC Editor RFC Format CSS Design

The Internet Society. on behalf of. The IETF Administrative Oversight Committee. Request for Proposal. RFC Editor RFC Format CSS Design The Internet Society on behalf of The IETF Administrative Oversight Committee Request for Proposal RFC Editor RFC Format CSS Design Date of Issuance: July 22, 2016 Proposal Submission Deadline: September

More information

5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief

5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief 5 Trends That Will Impact Your IT Planning in 2012 Layered Security Executive Brief a QuinStreet Excutive Brief. 2011 Layered Security Many of the IT trends that your organization will tackle in 2012 aren

More information

Major travel and hospitality organizations often have

Major travel and hospitality organizations often have Trimming Data Processing Time by Months; Saving Millions by Keeping Software Releases on Track Major travel and hospitality organizations often have extensive technology footprints, from complex online

More information

Ensure that all windows servers are patched and virus checked to the correct levels and that changes are made in line with ISO standards

Ensure that all windows servers are patched and virus checked to the correct levels and that changes are made in line with ISO standards Job description and person specification Senior ICT Officer Reports to: ICT Manager Purpose This role supports the provision of a high quality and measurable ICT infrastructure support service whilst delivering

More information

Writing Proposals that Win 1

Writing Proposals that Win 1 All You Need to Know to Win: Writing Proposals that Win A PROPOSAL WORTH WRITING SHOULD BE WORTHY OF WINNING Please Note Materials contained within this presentation are proprietary to MarkeTrainer under

More information

Supporting The Zero Trust Model Of Information Security: The Important Role Of Today s Intrusion Prevention Systems

Supporting The Zero Trust Model Of Information Security: The Important Role Of Today s Intrusion Prevention Systems A Custom Technology Adoption Profile Commissioned By IBM September 2013 Supporting The Zero Trust Model Of Information Security: The Important Role Of Today s Intrusion Prevention Systems 1 Introduction

More information

77% 56% 74% 52% PACKAGING WORLD SURVEY: Ethernet And Wireless In Production Facilities

77% 56% 74% 52% PACKAGING WORLD SURVEY: Ethernet And Wireless In Production Facilities Ethernet Usage + Strategy Survey 2012 A joint survey by Packaging World and XYZ Company was conducted in late 2012 to obtain insight into current engineering and management applications and opinions surrounding

More information

RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE.

RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE. RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE. Is putting Contact us INTRODUCTION You know the headaches of managing an infrastructure that is stretched to its limit. Too little staff. Too many users. Not

More information

Free ITIL Foundation Exam Paper 40 Questions 60 Minutes Allowed. Minimum of 26/40 to Pass. With the Compliments of www.itservicesuccess.com Good Luck!! GIVE YOURSELF THE UNFAIR ADVANTAGE! MULTIPLE CHOICE

More information

Oracle Certified Program

Oracle Certified Program Oracle Certified Program Agenda Value of Oracle Skills in the Current Job Market Oracle Certification Value What it means to be an Oracle Technology Professional Benefits of earning an Oracle Certification

More information

Data Centers and Mission Critical Facilities Access and Physical Security Procedures

Data Centers and Mission Critical Facilities Access and Physical Security Procedures Planning & Facilities Data Centers and Mission Critical Facilities Access and Physical Security Procedures Attachment B (Referenced in UW Information Technology Data Centers and Mission Critical Facilities

More information

What To Ask Your SD-WAN Vendor

What To Ask Your SD-WAN Vendor #FutureWAN What To Ask Your SD-WAN Vendor Ramesh Prabagaran, VP of Product Management Twitter: @ramsba Motivation & Rationale Marketing vs Reality Network auto provisions, auto corrects, auto everything

More information

<Project Name> Vision

<Project Name> Vision Version [Note: The following template is provided for use with the Rational Unified Process. Text enclosed in square brackets and displayed in blue italics (style=infoblue) is included

More information

Evaluating Archiving Solutions

Evaluating  Archiving Solutions Evaluating Email Archiving Solutions THE CLIPPER GROUP ExplorerTM Published Since 1996 Report #TCG2006036 May 9, 2006 Evaluating Email Archiving Solutions Analyst: Dianne McAdam Navigating Information

More information

Weighing in on the Benefits of a SAS 70 Audit for Third Party Administrators

Weighing in on the Benefits of a SAS 70 Audit for Third Party Administrators Weighing in on the Benefits of a SAS 70 Audit for Third Party Administrators With increasing oversight and growing demands for industry regulations, third party assurance has never been under a keener

More information

MHA Consulting BCM Metrics Resiliency Through Measurement

MHA Consulting BCM Metrics Resiliency Through Measurement 0 MHA Consulting BCM Metrics Resiliency Through Measurement Presented by: Michael Herrera, CBCP March, 2013 2009 2013 MHA MHA Consulting All All Rights Rights Reserved. Reserved. Agenda 1 Overview A Menu

More information

Visual Studio Subscriptions Administration Guide

Visual Studio Subscriptions Administration Guide Visual Studio Subscriptions Administration Guide 2 Contents INTRODUCTION... 4 ROLES AND RESPONSIBILITIES OF A VISUAL STUDIO SUBSCRIPTIONS ADMINISTRATOR... 4 BENEFITS AND LIMITATIONS OF VISUAL STUDIO SUBSCRIPTIONS...

More information

The New CARLI Selection System: Library Instructions

The New CARLI Selection System: Library Instructions The New CARLI Selection System: Library Instructions Why a New System? CARLI has been using a locally built relational database to track pricing and subscriptions since 2004. The underlying software is

More information

State of the. Union. (or: How not to use Krebs as an IDS ) (Information Security) Jeff McJunkin Senior Technical Analyst Counter Hack Challenges

State of the. Union. (or: How not to use Krebs as an IDS ) (Information Security) Jeff McJunkin Senior Technical Analyst Counter Hack Challenges State of the (Information Security) Union (or: How not to use Krebs as an IDS ) Jeff McJunkin Senior Technical Analyst Counter Hack Challenges My background IT Systems / Network Administrator for City

More information

Datacenter Care HEWLETT PACKARD ENTERPRISE. Key drivers of an exceptional NPS score

Datacenter Care HEWLETT PACKARD ENTERPRISE. Key drivers of an exceptional NPS score Datacenter Care The things I love about Datacenter Care is the a la carte nature of the offering. The contract is really flexible and the services delivered correspond exactly to what we bought. The contract

More information

CERTIFIED FINANCIAL PLANNER BOARD OF STANDARDS, INC. ANONYMOUS CASE HISTORIES NUMBER 30648

CERTIFIED FINANCIAL PLANNER BOARD OF STANDARDS, INC. ANONYMOUS CASE HISTORIES NUMBER 30648 CERTIFIED FINANCIAL PLANNER BOARD OF STANDARDS, INC. ANONYMOUS CASE HISTORIES NUMBER 30648 This is a summary of a decision issued following the October 2017 hearings of the Disciplinary and Ethics Commission

More information

Top 5 Myths about Cisco CCIE Certification

Top 5 Myths about Cisco CCIE Certification Top 5 Myths about Cisco CCIE Certification Myths are fun, as long as you don t confuse them with the truth Long term beliefs become strong facts irrespective of their reality and that is where myths come

More information

Service Level Agreement

Service Level Agreement This ( ) sets forth the specific terms and conditions under which LightEdge Solutions, Inc. ( LightEdge ) shall supply all Managed Services to Customer. The Master Agreement entered into between LightEdge

More information

INFORMATION TECHNOLOGY AUDIT &

INFORMATION TECHNOLOGY AUDIT & One day training on INFORMATION TECHNOLOGY AUDIT & 10 th May 2018 - Mövenpick Hotel, Karachi 14 th May 2018 - Sunfort Hotel, Lahore (10:00 AM to 5:00 PM) TRAINING OVERVIEW Every time people get to hear

More information

Resource Mapping A Wait Time Based Methodology for Database Performance Analysis

Resource Mapping A Wait Time Based Methodology for Database Performance Analysis Resource Mapping A Wait Time Based Methodology for Database Performance Analysis Prepared for NYOUG, 2005 Presented by Matt Larson Chief Technology Officer Confio Software Presentation Agenda Introduction

More information

The Hopper System: How the Largest* XE6 in the World Went From Requirements to Reality! Katie Antypas, Tina Butler, and Jonathan Carter

The Hopper System: How the Largest* XE6 in the World Went From Requirements to Reality! Katie Antypas, Tina Butler, and Jonathan Carter The Hopper System: How the Largest* XE6 in the World Went From Requirements to Reality! Katie Antypas, Tina Butler, and Jonathan Carter CUG 2011, May 25th, 2011 1 Requirements to Reality Develop RFP Select

More information

Troubleshooting Converged Enterprise Networks

Troubleshooting Converged Enterprise Networks Troubleshooting Converged Enterprise Networks VoiceCon San Francisco 2008 Steven Guthrie Director, Product Marketing CA, Inc. Agenda > What I m hearing >What is QoS? > Network and Voice Service Management

More information

10 Hidden IT Risks That Might Threaten Your Business

10 Hidden IT Risks That Might Threaten Your Business (Plus 1 Fast Way to Find Them) Your business depends on intelligence. But can you count on your technology? You may not be in the intelligence technology business, but it s probably impossible to imagine

More information

The Project Charter. Date of Issue Author Description. Revision Number. Version 0.9 October 27 th, 2014 Moe Yousof Initial Draft

The Project Charter. Date of Issue Author Description. Revision Number. Version 0.9 October 27 th, 2014 Moe Yousof Initial Draft The Project Charter Project Title: VDI Data Center Design and Build Project Sponsor: South Alberta Data Centers Inc. (SADC Inc.) Project Customer: The City of Calgary Project Manager: Moe Yousof Document

More information

Stand: File: gengler_java_e. Java Community Process: Not perfect, but operating very successfully

Stand: File: gengler_java_e. Java Community Process: Not perfect, but operating very successfully Stand: 14.04.03 File: gengler_java_e Java Community Process: Not perfect, but operating very successfully While Sun Microsystems was the original sole driving force behind Java at one time, the company

More information

Fifteen Best Practices for a Successful Data Center Migration

Fifteen Best Practices for a Successful Data Center Migration Fifteen Best Practices for a Successful Data Center Migration Published: 6 March 2017 ID: G00324187 Analyst(s): Henrique Cecci Data center migrations are often complex and risky. These best practices will

More information

ROI CASE STUDY IBM SPSS CITY OF LANCASTER. ROI: 1301% Payback: 1.5 months Average annual benefit: $1,344,338. Cost : Benefit Ratio 1 : 45.

ROI CASE STUDY IBM SPSS CITY OF LANCASTER. ROI: 1301% Payback: 1.5 months Average annual benefit: $1,344,338. Cost : Benefit Ratio 1 : 45. ROI CASE STUDY IBM SPSS CITY OF LANCASTER THE BOTTOM LINE The City of Lancaster, California needed to gain greater visibility into where Part I crimes were occurring and where they were expected to occur

More information

Why is it Difficult to Find a Good Free Web Host

Why is it Difficult to Find a Good Free Web Host From the SelectedWorks of Umakant Mishra February, 2012 Why is it Difficult to Find a Good Free Web Host Umakant Mishra Available at: https://works.bepress.com/umakant_mishra/102/ Why is it difficult to

More information