Chapter 5: Planning in Web Engineering
|
|
- Angel Paul
- 6 years ago
- Views:
Transcription
1 Chapter 5: Planning in Web Engineering 1
2 Do we really need Planning in WebE? Most WebApp increments are delivered over a time span that rarely exceeds 4 6 weeks. The questions are: 1. Do we really need to plan WebApp? 2. Shouls we let the WebApp evolve naturally? The answer is: Take an agile approach to Planning in WebE: WebApp_Planning = function1 (WebApp_Complexity) 2
3 In-Classroom Exercise 1. Informational read-only content is provided with simple navigation and links (ex: cnn.com) 2. Download a user downloads information from the appropriate server (ex: 3. Customizable the user customizes content to specific needs 4. Interaction communication among a community of users occurs via IM, chat rooms, bulletin boards) 5. User input forms-based input is the primary mechanism for communicating need (like, Search Bradley Course) 6. Transaction-oriented the user makes a request/purchase (e.g., places an order) that is fulfilled by the WebApp (online shopping like amazon.com) 7. Service-oriented the application provides a service to the user, e.g., assists the user in determining a mortgage payment 8. Portal the application channels the user to other Web content or services outside the domain of the portal application 9. Online Databases the user queries a large database and extracts information 10. Data warehousing/data mining the user queries a collection of large databases and extracts information (stand-alone database and online database are 2 different types of databases) 11. Action-based Web-based games (one player, many players, etc.) 12. Educational Web-based simulators, animators, etc. (that require very high Internet speed). Complex WebApp: Simple WebApp: Group Name: 2 examples (web sites). Group Name: 2 examples (web sites). Complex WebApp - Why? Simple WebApp -- Why? 3
4 Simple WebApp Simple WebApp: - content is well defined, - functions are straightforward, - light modifications are expected - minimal risk Planning takes a very little time 4
5 Complex WebApp Source: Complex WebApp characteristics: - content objects are not clear, - functions require a lot of animations and simulations, - multiple modifications (increments) are expected, - multiple constraints exist (for example, a variety of Web browsers, a variety of technical platform, etc.), - performance is unpredictable, etc. Planning takes a long time. 5
6 Planning Complexity Scope Planning is a key activity of Web Engineering Take an agile approach to Planning in WebE: In other words, adapt your effort and time spent on planning to the complexity of the WebApp increment: WebApp_Planning = function1 (WebApp_Complexity) WebApp_Complexity = function2 ( WebApp_context, WebApp_constraints, WebApp_content_objects, WebApp_functionality, WebApp_performance ) The scope of planning activities varies among project team members (or, people) involved in a WebE project. Ex: A team leader plans, monitors, and coordinates the combined work of a WebE team (all team-relegated activities). Ex: A Web engineer manages day-to-day work planning, monitoring, and controlling just technical tasks. 6
7 WebApp Planning Guidelines Understand scope before you define work tasks or schedule for an increment Refine framework actions and tasks Assign right team members for each task (right team) Evaluate risks Define a schedule Identify quality filters Identify how you ll manage change 7
8 1. WebApp Project Scope To plan effectively, you need to understand project scope To establish scope be sure you understand: Context. How does the WebApp fit into a business context, and what constraints are imposed as a result of the context? Information objectives. What customer-visible content objects are used by the WebApp increment? Functionality. What functions are initiated by the end user or invoked internally by the WebApp to meet the requirements defined in usage scenarios? Constraints and performance. What technical and environmental constraints are relevant? What special performance issues (including security and privacy issues) will require design and construction effort? 8
9 2. Web Engineering Framework Activities Those framework activities must be refined for use on the increment to be built. However, the set of activities and actions for on increment in NOT necessarily the same that is used for the nest increment. 9
10 Refining Actions and Tasks: An Example (p. 75) 10
11 What Work Products Should be Produced Analysis Modeling (or, representations, or diagrams *) User scenarios Content objects Content details Relations between content objects List of functions (functional requirements) Interface sketches Navigation maps Design Modeling (or, representations, or models *) Logical design Physical design Content objects design User interface design Functional design *) In WebEng the number of diagrams and/or models should be minimized; only those that are critical for the next increment. 11
12 3. Project Team (People) Interestingly, people working together with good communication and interaction can operate at noticeably higher levels than when they use their individual talents. We see this time and again in brainstorming and joint problem-solving sessions. Therefore, agile project teams [WebE teams] focus on increasing both individual competencies and collaboration levels. [by Cockburn and Highsmith] But how do successful teams conduct their business? What are characteristics of a successful tem? A set of team guidelines should be established. Shared vision or goal Sense of team identity Strong leadership is a must. Result-driven structure Competence and deep knowledge in specific areas (competent team members) Interdependence among team members Mutual trust Respect for individual talents is critical. Put your own opinion second to the team. Commitments to the team Effective communication (verbal, written, with use of modern techn.) Sense of autonomy Small team size High level of enjoyment Team climate. It s easy to get started, but it s very hard to sustain momentum. 12
13 Team Toxicity WebEng team can suffer team toxicity: A frenzied (angry) work atmosphere (waiting of energy and creativity; loosing focus). High frustrations causing by personal, business, or technological factors. Improperly chose process model (becomes a roadblock to accomplishment and success of WebApp D&D). Unclear definition of roles in WebE team. Continuous and repeated exposure to failure (loss of motivation, confidence and low morale) 13
14 4. Managing Risk Many problems can arise during a project. Risk management focuses on understanding and managing these problems (1. Identify the risk; 2. Assess its probability of occurrence; 3. Estimate its impact; 4. Establish a contingency or emergency plan). Levels of Risks. Considers risk at two different levels of granularity (1) Macro Risk: the impact of risk on the entire WebApp project, and (2) Micro Risk: the impact of risk on the current WebApp increment Project domains and typical risks: Timetable: Is the timeframe defined and reasonable? Increments: Will the increments provide ongoing value for end users Changes. How will requests for change impact delivery schedules? Technologies. Is the available technology appropriate for the job? Skills. Does the team have the right mix of skills to build this increment 14
15 Identifying Risks Address the fundamental question: What can go wrong? Each team member is asked to make a list of risks Process risks: problems that are tied to the framework actions and tasks that have been chosen by the team People risks: potential problems that can be directly traced to some human action or failing. Product risks: potential problems associated with WebApp content, functions, constraints, or performance. 15
16 Risk Analysis (Risk Matrix, Risk Management Matrix) 16
17 5. Developing Project Schedule Approach: List all WebE actions and tasks for an increment Build a network that depicts interdependencies Identify tasks that are critical Track progress (especially critical tasks) During the first iteration a macroscopic schedule is developed. Identify all increments and dates on which each increment will be deployed. For each subsequent increment The entry for the increment on the macroscopic schedule is refined into a detailed schedule. The WebApp schedule evolves over time. 17
18 Macroscopic and Microscopic Project Schedules 18
19 The Schedule 19
20 6. Estimating Project Time and Effort Use-case based estimation (based on time and efforts for well-known use cases; however, there is a lack of standardization of use cases). Process-based estimation (decomposition based on tasks required to complete the software process framework) Final product (WebApp) size and/or functions (FP)-based estimation (LOC, functions, function point, standard subsystem and/or component, change) 20
21 Use-Case Diagram in UML format (an example) Login Register Courses View Schedule View Grades Staff Administrator View Holds Degree Audit Proffesor Student Change Address Advisor Change BRN Other Options Help Logout Program Of Study Opinion 21
22 Estimation with Use-Cases use cases scenarios pages scenarios pages LOC LOC estimate User interface e subsystem ,366 Engineering subsystem group ,233 Infrastructure e subsystem group ,970 Total LOC estimate stimate 42,568 Using 620 LOC/pm as the average productivity for systems of this type and a burdened labor rate of $8000 per month, the cost per line of code is approximately $13. Based on the use-case estimate and the historical productivity data, the total estimated project cost is $552,000 and the estimated effort is 68 person-months. 22
23 Process-Based Estimation Example Activity CC Planning Risk Analysis Engineering Construction Release CE Totals Task analysis design code test Function UICF 2DGA 3DGA CGDF DSM PCF DAM n/a n/a n/a n/a n/a n/a n/a 5.00 Totals % effort % 1% 1% 8% 45% 10% 36% CC = customer communication CE = customer evaluation Based on an average burdened labor rate of $8,000 per month, the total estimated project cost is $368,000 and the estimated effort is 46 person-months. 23
24 Example: LOC Approach 1. Average productivity for systems of this type = 620 LOC/pm. 2. Burdened labor rate =$8000 per month, the cost per line of code is approximately $ Based on the LOC estimate and the historical productivity data, the total estimated project cost is $431,000 and the estimated effort is 54 person-months. 24
25 Example: FP Approach The estimated number of FP is derived: FP estimated = count-total 3 [ S (F i )] FP estimated = 375 organizational average productivity = 6.5 FP/pm. burdened (above and beyond) labor rate = $8000 per month, approximately $1230/FP. Based on the FP estimate and the historical productivity data, total estimated project cost is $461,000 and estimated effort is 58 person-months. 25
26 Empirical Estimation Models General form: effort = tuning coefficient * size exponent usually derived as person-months of effort required either a constant or a number derived based on complexity of project usually LOC but may also be function point empirically derived 26
27 7. Managing Quality What Quality Assurance Mechanisms Can the Team Use? A thoughtful, thorough communication activity Careful requirements gathering Pair walkthroughs to assess the quality of all work products Create a generic checklist that you can use to assess models Use tests to evaluate quality 27
28 Quality Filters (or, Walkthrough, or Formal Technical Reviews = FTRs) Quality filters 28
29 Pair Walkthrough Review the product, not the producer. Set an agenda and maintain it. One of the key maladies of meetings of all types is drift. A walkthrough should be kept on track and on schedule. Limit debate and rebuttal. When an issue is raised by a reviewer, there may not be agreement on its impact. Rather than spending time debating the question, the issue should be recorded for resolution later. Enunciate problem areas, but don't attempt to solve every problem noted. A walkthrough is not a problem-solving session. Take written notes. Notes may be entered directly into a notebook computer. Spend enough time to uncover quality problems, but not one minute more. In general, a team walkthrough should be completed within 60 to 90 minutes at the most. 29
30 8. WebApp Change Management 30
Topic 01. Software Engineering, Web Engineering, agile methodologies.
Topic 01 Software Engineering, Web Engineering, agile methodologies. 1 What is Software Engineering? 2 1 Classic Software Engineering The IEEE definition: Software Engineering is the application of a disciplined,
More informationTopic 02. Web Generations. Web Engineering. Web Systems Characteristics
Topic 02 Web Generations. Web Engineering. Web Systems Characteristics 1 World Wide Web (Web) Generations 2 1 Web 1.0, Web 2.0, Web 3.0, Web 4.0 Web-Based Education/Learning 1.0, 2.0, 3.0, 4.0 2000 Web
More informationRED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE.
RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE. Is putting Contact us INTRODUCTION You know the headaches of managing an infrastructure that is stretched to its limit. Too little staff. Too many users. Not
More informationChapter 5 Practice: A Generic View
Chapter 5 Practice: A Generic View Moonzoo Kim CS Division of EECS Dept. KAIST moonzoo@cs.kaist.ac.kr http://pswlab.kaist.ac.kr/courses/cs550-07 Spring 2007 1 What is Practice? Practice is a broad array
More informationFunctional Design of Web Applications. (partially, Chapter 7)
Functional Design of Web Applications (partially, Chapter 7) Functional Design: An Overview Users of modern WebApps expect that robust content will be coupled with sophisticated functionality The advanced
More informationWHO SHOULD ATTEND? ITIL Foundation is suitable for anyone working in IT services requiring more information about the ITIL best practice framework.
Learning Objectives and Course Descriptions: FOUNDATION IN IT SERVICE MANAGEMENT This official ITIL Foundation certification course provides you with a general overview of the IT Service Management Lifecycle
More information13.f Toronto Catholic District School Board's IT Strategic Review - Draft Executive Summary (Refer 8b)
AGENDA ADDENDU TE REGULAR EETING OF TE AUDIT COITTEE COITTEE PUBLIC SESSION Tuesday, June 6, 2017 6:30 P.. Pages 13. Staff Reports 13.f Toronto Catholic District School Board's IT Strategic Review - Draft
More informationStandard Glossary of Terms used in Software Testing. Version 3.2. Foundation Extension - Usability Terms
Standard Glossary of Terms used in Software Testing Version 3.2 Foundation Extension - Usability Terms International Software Testing Qualifications Board Copyright Notice This document may be copied in
More informationISO9001:2015 LEAD IMPLEMENTER & LEAD AUDITOR
ISO9001:2015 LEAD IMPLEMENTER & LEAD AUDITOR JPCANN ASSOCIATES LTD #58 NSAWAM ROAD, AVENOR JUNCTION, KOKOMLEMLE-ACCRA Office lines: +233 302 242 573 / +233 302 974 302 Mobile: +233 501 335 818 20 www.corptrainghana.com
More informationPOSITION DESCRIPTION
POSITION DESCRIPTION Engagement Manager Unit/Branch, Directorate: Location: Outreach & Engagement, Information Assurance and Cyber Security Directorate Auckland Salary range: H $77,711 - $116,567 Purpose
More informationPosition Description IT Auditor
Position Title IT Auditor Position Number Portfolio Performance and IT Audit Location Victoria Supervisor s Title IT Audit Director Travel Required Yes FOR OAG HR USE ONLY: Approved Classification or Leadership
More informationUsing the Web in Your Teaching
Using the Web in Your Teaching November 16, 2001 Dirk Morrison Extension Division, University of Saskatchewan Workshop Outline What will we cover? Why use the Web for teaching and learning? Planning to
More informationPosition Description. Engagement Manager UNCLASSIFIED. Outreach & Engagement Information Assurance and Cyber Security Directorate.
Position Description Engagement Manager Business unit: Position purpose: Direct reports: Directorate overview: Business Unit Overview Remuneration indicator: Outreach & Engagement Information Assurance
More informationProfessional Services for Cloud Management Solutions
Professional Services for Cloud Management Solutions Accelerating Your Cloud Management Capabilities CEOs need people both internal staff and thirdparty providers who can help them think through their
More informationManager, Infrastructure Services. Position Number Community Division/Region Yellowknife Technology Service Centre
IDENTIFICATION Department Position Title Infrastructure Manager, Infrastructure Services Position Number Community Division/Region 32-11488 Yellowknife Technology Service Centre PURPOSE OF THE POSITION
More informationCOBIT 5 Implementation
COBIT 5 Implementation Fifalde Consulting Inc. +1-613-699-3005 2017 Fifalde Consulting Inc. COBIT is a registered Trade Mark of ISACA and the IT Governance Institute. 2 1. Course Description: Get a practical
More informationPAGE - 16 PAGE - 1. Sometimes, the solution is just a benchmark away..
PAGE - 16 PAGE - 1 Sometimes, the solution is just a benchmark away.. Post Box 301532, Riyadh 11372, Kingdom Of Saudi Arabia. Tel: +966 1 229 1819 Fax: +966 1 229 1801 PAGE - 2 PAGE - 3 The base of automation
More informationTECHNOLOGY WHITE PAPER. Java for the Real Time Business
TECHNOLOGY WHITE PAPER Executive Summary The emerging Real Time Business Imperative means your business now must leverage new technologies and high volumes of data to deliver insight, capability and value
More informationThreat and Vulnerability Assessment Tool
TABLE OF CONTENTS Threat & Vulnerability Assessment Process... 3 Purpose... 4 Components of a Threat & Vulnerability Assessment... 4 Administrative Safeguards... 4 Logical Safeguards... 4 Physical Safeguards...
More informationCloud solution consultant
Cloud solution consultant Role brief Directorate Jisc technologies Base location Harwell or Bristol Grade B Level 18 Job family Professional services Date November 2017 Reports to Cloud services group
More information3Lesson 3: Web Project Management Fundamentals Objectives
3Lesson 3: Web Project Management Fundamentals Objectives By the end of this lesson, you will be able to: 1.1.11: Determine site project implementation factors (includes stakeholder input, time frame,
More informationIntroduction to User Stories. CSCI 5828: Foundations of Software Engineering Lecture 05 09/09/2014
Introduction to User Stories CSCI 5828: Foundations of Software Engineering Lecture 05 09/09/2014 1 Goals Present an introduction to the topic of user stories concepts and terminology benefits and limitations
More informationGET CLOUD EMPOWERED. SEE HOW THE CLOUD CAN TRANSFORM YOUR BUSINESS.
GET CLOUD EMPOWERED. SEE HOW THE CLOUD CAN TRANSFORM YOUR BUSINESS. Cloud computing is as much a paradigm shift in data center and IT management as it is a culmination of IT s capacity to drive business
More informationData governance and data quality: is it on your agenda or lurking in the shadows?
Data governance and data quality: is it on your agenda or lurking in the shadows? Associate Professor Anne Young Director Planning, Quality and Reporting The University of Newcastle Context Data governance
More informationSystems Analysis & Design
Systems Analysis & Design Dr. Ahmed Lawgali Ahmed.lawgali@uob.edu.ly Slide 1 Systems Analysis & Design Course Textbook: Systems Analysis and Design With UML 2.0 An Object-Oriented Approach, Second Edition
More informationfor TOGAF Practitioners Hands-on training to deliver an Architecture Project using the TOGAF Architecture Development Method
Course Syllabus for 3 days Expert led Enterprise Architect hands-on training "An Architect, in the subtlest application of the word, describes one able to engage and arrange all elements of an environment
More informationSERVICE OPERATION ITIL INTERMEDIATE TRAINING & CERTIFICATION
SERVICE OPERATION ITIL INTERMEDIATE TRAINING & CERTIFICATION WHAT IS ITIL SO? The intermediate level of ITIL offers a role based hands-on experience and in-depth coverage of the contents. Successful implementation
More informationISO/ IEC (ITSM) Certification Roadmap
ISO/ IEC 20000 (ITSM) Certification Roadmap Rasheed Adegoke June 2013 Outline About First Bank Motivations Definitions ITIL, ISO/IEC 20000 & DIFFERENCES ISO/ IEC 20000 Certification Roadmap First Bank
More informationA company built on security
Security How we handle security at Flywheel Flywheel was founded in 2012 on a mission to create an exceptional platform to help creatives do their best work. As the leading WordPress hosting provider for
More informationGRADUATE CERTIFICATE IN BUSINESS CONTINUITY MANAGEMENT
GRADUATE CERTIFICATE IN BUSINESS CONTINUITY MANAGEMENT If you are looking to develop expertise in a specialized area and broaden your knowledge base, but time and cost limitations are interfering with
More informationCloud solution consultant
Cloud solution consultant Role brief Directorate Jisc technologies Base location Harwell or Bristol Grade B Job level 18 Job family Professional services Date 23/10/2017 Reports to Cloud services group
More informationEducation Network Security
Education Network Security RECOMMENDATIONS CHECKLIST Learn INSTITUTE Education Network Security Recommendations Checklist This checklist is designed to assist in a quick review of your K-12 district or
More informationSustainable Security Operations
Sustainable Security Operations Optimize processes and tools to make the most of your team s time and talent The number and types of security incidents organizations face daily are steadily increasing,
More informationCyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS
Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS Continual disclosed and reported
More informationPECB Change Log Form
GENERAL INFORMATION Owner / Department* Approver / Department * Training Development Department Quality Assurance Department Date of Approval* 2019-01-09 Course name: Language: New Version: Previous Version:
More informationTEST ENGINE SYSTEM (TES) SOFTWARE PROJECT PLAN PHASE I. April 8, Version 1.0
TEST ENGINE SYSTEM (TES) SOFTWARE PROJECT PLAN PHASE I April 8, 2003 Version 1.0 Team Members Page 1 of 16 Test Engine System Table of Contents 1.0 Introduction 1.1 Project scope 1.2 Major software functions
More informationNHS Fife. 2015/16 Audit Computer Service Review Follow Up
NHS Fife 2015/16 Audit Computer Service Review Follow Up Prepared for NHS Fife April 2016 Audit Scotland is a statutory body set up in April 2000 under the Public Finance and Accountability (Scotland)
More informationEuropean Commission. Immigration Portal Development Case. Date: 08/06/2007 Version: 1.0 Authors: Revised by: Approved by: Public: Reference Number:
EUROPEAN COMMISSION DIRECTORATE-GENERAL INFORMATICS Information systems Directorate European Commission Immigration Portal Development Case Date: 08/06/2007 Version: 1.0 Authors: Revised by: Approved by:
More informationAnalysis Modeling Week 5
Analysis Modeling Week 5 Announcement Midterm I Monday March, 7 th Scope Ch. 1, 2, 3, 4 and Ch. 6 of the text book Ch. 1, 2 and 3 of the lab book Analysis modeling dli Agenda (Lecture) Agenda (Lab) Weekly
More informationProject Management Professional Training
Project Management Professional Training About Cognixia Cognixia, formerly known as Collabera TACT, is a Collabera Learning Solutions Company. Being a consistently awarded Digital Technology Training Company,
More informationCybersecurity. Securely enabling transformation and change
Cybersecurity Securely enabling transformation and change Contents... Cybersecurity overview Business drivers Cybersecurity strategy and roadmap Cybersecurity in practice CGI s cybersecurity offering Why
More informationQ1) Describe business intelligence system development phases? (6 marks)
BUISINESS ANALYTICS AND INTELLIGENCE SOLVED QUESTIONS Q1) Describe business intelligence system development phases? (6 marks) The 4 phases of BI system development are as follow: Analysis phase Design
More informationThe main website for Henrico County, henrico.us, received a complete visual and structural
Page 1 1. Program Overview The main website for Henrico County, henrico.us, received a complete visual and structural overhaul, which was completed in May of 2016. The goal of the project was to update
More informationImplementing ITIL v3 Service Lifecycle
Implementing ITIL v3 Lifecycle WHITE PAPER introduction GSS INFOTECH IT services have become an integral means for conducting business for all sizes of businesses, private and public organizations, educational
More informationIT Governance ISO/IEC 27001:2013 ISMS Implementation. Service description. Protect Comply Thrive
IT Governance ISO/IEC 27001:2013 ISMS Implementation Service description Protect Comply Thrive 100% guaranteed ISO 27001 certification with the global experts With the IT Governance ISO 27001 Implementation
More informationMicrosoft SharePoint Server 2013 Plan, Configure & Manage
Microsoft SharePoint Server 2013 Plan, Configure & Manage Course 20331-20332B 5 Days Instructor-led, Hands on Course Information This five day instructor-led course omits the overlap and redundancy that
More informationLevel 5 Diploma in Computing
Level 5 Diploma in Computing 1 www.lsib.co.uk Objective of the qualification: It should available to everyone who is capable of reaching the required standards It should be free from any barriers that
More informationThe Great TOGAF Scavenger Hunt. Enterprise Architecture Using TOGAF 9 Course Preparation Guide
Enterprise Architecture Using TOGAF 9 Course Preparation Guide 2011 Metaplexity Associates LLC All Rights Reserved Version 2.0 January 2, 2011 The Open Group Certification Mark logo and TOGAF are trademarks,
More informationUniversity of British Columbia Library. Persistent Digital Collections Implementation Plan. Final project report Summary version
University of British Columbia Library Persistent Digital Collections Implementation Plan Final project report Summary version May 16, 2012 Prepared by 1. Introduction In 2011 Artefactual Systems Inc.
More information2017 Trends in Security Metrics and Security Assurance Measurement Report A Survey of IT Security Professionals
2017 Trends in Security Metrics and Security Assurance Measurement Report A Survey of IT Security Professionals Sponsored by Contents Introduction....3 Key Takeaways from the 2017 Report:....3 Security
More informationNational Initiative for Cyber Education (NICE) and the Cybersecurity Workforce Framework: Attract and Retain the Best in InfoSec.
National Initiative for Cyber Education (NICE) and the Cybersecurity Workforce Framework: Attract and Retain the Best in InfoSec April 12, 2018 1 Introduction to NICE - The National Initiative for Cybersecurity
More informationData Virtualization Implementation Methodology and Best Practices
White Paper Data Virtualization Implementation Methodology and Best Practices INTRODUCTION Cisco s proven Data Virtualization Implementation Methodology and Best Practices is compiled from our successful
More informationEXIN BCS SIAM Foundation. Sample Exam. Edition
EXIN BCS SIAM Foundation Sample Exam Edition 201704 Copyright EXIN Holding B.V. and BCS, 2017. All rights reserved. EXIN is a registered trademark. SIAM is a registered trademark. ITIL is a registered
More informationYour Student s Head Start on Career Goals and College Aspirations
Your Student s Head Start on Career Goals and College Aspirations INFORMATION TECHNOLOGY (IT) NETWORKING PATHWAY The Destinations Networking Pathway prepares students to test and evaluate computer network
More informationOffice of Human Resources. IT Database Administrator Associate CI2816
Office of Human Resources IT Database Administrator Associate CI2816 General Statement of Duties Performs standard level professional information technology work installing, configuring, and upgrading
More informationThe LUCID Design Framework (Logical User Centered Interaction Design)
The LUCID Design Framework (Logical User Centered Interaction Design) developed by Cognetics Corporation LUCID Logical User Centered Interaction Design began as a way of describing the approach to interface
More informationCS 577A Team 1 DCR ARB. PicShare
CS 577A Team 1 DCR ARB PicShare Team and Project Review (DEN) Project Evaluation Positives Resilient Agile detailed design promotes thoroughness before any code is written Development time should be reduced
More informationWeb Evaluation Report Guidelines
Web Evaluation Report Guidelines Graduate Students: You are required to conduct a usability test for your final project in this course. Please review the project description and the evaluation rubric on
More informationTHE JOURNEY OVERVIEW THREE PHASES TO A SUCCESSFUL MIGRATION ADOPTION ACCENTURE IS 80% IN THE CLOUD
OVERVIEW Accenture is in the process of transforming itself into a digital-first enterprise. Today, Accenture is 80 percent in a public cloud. As the journey continues, Accenture shares its key learnings
More informationBusiness Analysis for Practitioners - Requirements Elicitation and Analysis (Domain 3)
Business Analysis for Practitioners - Requirements Elicitation and Analysis (Domain 3) COURSE STRUCTURE Introduction to Business Analysis Module 1 Needs Assessment Module 2 Business Analysis Planning Module
More informationMarine Institute Job Description
Marine Institute Job Description Position Contract Service Group Location Temporary Systems Administrator Team Leader Temporary Specified Purpose contract for a duration of up to 3 years Ocean Science
More informationCASA External Peer Review Program Guidelines. Table of Contents
CASA External Peer Review Program Guidelines Table of Contents Introduction... I-1 Eligibility/Point System... I-1 How to Request a Peer Review... I-1 Peer Reviewer Qualifications... I-2 CASA Peer Review
More informationWhat is database continuous integration?
What is database continuous integration? Database continuous integration (CI) is the rapid integration of database schema and logic changes into application development efforts and to provide immediate
More informationCS487 Midterm Exam Summer 2005
1. (4 Points) How does software differ from the artifacts produced by other engineering disciplines? 2. (10 Points) The waterfall model is appropriate for projects with what Characteristics? Page 1 of
More informationProject Management Professional (PMP) Exam Preparation elearning Course
Project Management Professional (PMP) Exam Preparation elearning Course Course Code: PMC001CL Duration: 4 Days, 35 Hours Format: elearning Certification Exam: PMI s PMP Exam Certification Track: N/A Course
More informationSTAFF REPORT. January 26, Audit Committee. Information Security Framework. Purpose:
STAFF REPORT January 26, 2001 To: From: Subject: Audit Committee City Auditor Information Security Framework Purpose: To review the adequacy of the Information Security Framework governing the security
More informationI D C T E C H N O L O G Y S P O T L I G H T
I D C T E C H N O L O G Y S P O T L I G H T P ow e ring Digital Transfor m a t i o n T h r ough the C l o u d - R e a d y E n t e r p rise September 2016 Adapted from Developing a Cloud Strategy for Digital
More informationThe Center for Internet Security
The Center for Internet Security The CIS Security Metrics Service July 1 2008 Organizations struggle to make cost-effective security investment decisions; information security professionals lack widely
More informationAgenda. Bibliography
Humor 2 1 Agenda 3 Trusted Digital Repositories (TDR) definition Open Archival Information System (OAIS) its relevance to TDRs Requirements for a TDR Trustworthy Repositories Audit & Certification: Criteria
More informationPREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud.
PREPARE FOR TAKE OFF Accelerate your organisation s journey to the Cloud. cloud. Contents Introduction Program & Governance BJSS Cloud Readiness Assessment: Intro Platforms & Development BJSS Cloud Readiness
More informationCITP Mentoring Program Guidelines
CITP Mentoring Program Guidelines 1 AICPA CITP Mentoring Program Guidelines 2017 American Institute of CPAs. All rights reserved. DISCLAIMER: The contents of this publication do not necessarily reflect
More informationChapter 2 Example Modeling and Forecasting Scenario
Chapter 2 Example Modeling and Forecasting Scenario This scenario is for a hypothetical project that aims to re-launch a website. It demonstrates the thinking process and practical implementation of using
More informationSmart Data Center Solutions
Smart Data Center Solutions New Data Center Challenges Require New Solutions Data Center Architecture. Inside and Out. Data centers are mission-critical facilities. A silo-based approach to designing,
More informationWork-ready skills in Business, Administration and IT
Work-ready skills in Business, Administration and IT A guide for centres We believe in learning At the core of everything we do is the desire to make a measurable impact on improving people s lives through
More informationFDD Process #1: Develop an Overall Model
FDD Process #1: Develop an Overall Model A initial project-wide activity with domain and development members under the guidance of an experienced object modeller in the role of Chief Architect. A high-level
More informationModule 3. Overview of TOGAF 9.1 Architecture Development Method (ADM)
Module 3 Overview of TOGAF 9.1 Architecture Development Method (ADM) TOGAF 9.1 Structure The Architecture Development Method (ADM) Needs of the business shape non-architectural aspects of business operation
More informationBusiness Impact Analysis (BIA)
Your BCM, Risk & Crisis Management software solution since 1999 Conducting an Effective Business Impact Analysis (BIA) Presented by: Sherri Flynn MBCP, CISM Agenda What is a Business Impact Analysis (BIA)?
More informationTX CIO Leadership Journey Texas CIOs Bowden Hight Texas Health and Human Services Commission Tim Jennings Texas Department of Transportation Mark
TX CIO Leadership Journey Texas CIOs Bowden Hight Texas Health and Human Services Commission Tim Jennings Texas Department of Transportation Mark Stone Texas A&M University System Moderator Anh Selissen
More informationORACLE SERVICES FOR APPLICATION MIGRATIONS TO ORACLE HARDWARE INFRASTRUCTURES
ORACLE SERVICES FOR APPLICATION MIGRATIONS TO ORACLE HARDWARE INFRASTRUCTURES SERVICE, SUPPORT AND EXPERT GUIDANCE FOR THE MIGRATION AND IMPLEMENTATION OF YOUR ORACLE APPLICATIONS ON ORACLE INFRASTRUCTURE
More informationPOSITION DESCRIPTION
Network Security Consultant POSITION DESCRIPTION Unit/Branch, Directorate: Location: Regulatory Unit Information Assurance and Cyber Security Directorate Auckland Salary range: I $90,366 - $135,548 Purpose
More informationBRING EXPERT TRAINING TO YOUR WORKPLACE.
BRING EXPERT TRAINING TO YOUR WORKPLACE. ISACA s globally respected training and certification programs inspire confidence that enables innovation in the workplace. ISACA s On-Site Training brings a unique
More informationHardening the Cloud: Assuring Agile Security in High-Growth Environments (Moving from span ports to virtual appliances)
SESSION ID: CSV-F01 Hardening the Cloud: Assuring Agile Security in High-Growth Environments (Moving from span ports to virtual appliances) Aaron McKeown Lead Security Architect Xero Fast or Secure Fast
More informationProactive Security: Effective Cyber Risk Mitigation. Dave Shackleford Founder and Principal Consultant, Voodoo Security
Proactive Security: Effective Cyber Risk Mitigation Dave Shackleford Founder and Principal Consultant, Voodoo Security Agenda This talk will really be split into two sections The first will focus on new
More informationCORNERSTONE CONNECT REDESIGN Phase 2 (new UI!) GLOBAL SEARCH CONNECT (new UI!)
1 CORNERSTONE CONNECT REDESIGN Phase 2 (new UI!) The next phase of Cornerstone Connect is here! The user interface and experience of Knowledge Bank and Communities have been completely redesigned. This
More informationSTRATEGIC PLAN
STRATEGIC PLAN 2013-2018 In an era of growing demand for IT services, it is imperative that strong guiding principles are followed that will allow for the fulfillment of the Division of Information Technology
More informationIntegrating ITIL and COBIT 5 to optimize IT Process and service delivery. Johan Muliadi Kerta
Integrating ITIL and COBIT 5 to optimize IT Process and service delivery Johan Muliadi Kerta Measurement is the first step that leads to control and eventually to improvement. If you can t measure something,
More informationControlling the Project Pipeline: Managing Constraints to Maximize Outputs
Washington, DC Metro Office Controlling the Project Pipeline: Managing Constraints to Maximize Outputs David Lendry, PMP Director, Project Solutions TenStep of Metro DC, Federal, Maryland & Eastern New
More informationBridge Course On Software Testing
G. PULLAIAH COLLEGE OF ENGINEERING AND TECHNOLOGY Accredited by NAAC with A Grade of UGC, Approved by AICTE, New Delhi Permanently Affiliated to JNTUA, Ananthapuramu (Recognized by UGC under 2(f) and 12(B)
More informationSecurity Director - VisionFund International
Security Director - VisionFund International Location: [Europe & the Middle East] [United Kingdom] Category: Security Job Type: Open-ended, Full-time *Preferred location: United Kingdom/Eastern Time Zone
More informationChapter 6 Architectural Design
Chapter 6 Architectural Design Chapter 6 Architectural Design Slide 1 Topics covered The WHAT and WHY of architectural design Architectural design decisions Architectural views/perspectives Architectural
More informationVMware vcloud Air Accelerator Service
DATASHEET AT A GLANCE The VMware vcloud Air Accelerator Service assists customers with extending their private VMware vsphere environment to a VMware vcloud Air public cloud. This Accelerator Service engagement
More informationSymantec Data Center Migration Service
Avoid unplanned downtime to critical business applications while controlling your costs and schedule The Symantec Data Center Migration Service helps you manage the risks and complexity of a migration
More informationCertified Associate in Project Management (CAPM) Exam Prep Boot Camp - Brochure
Certified Associate in Project Management (CAPM) Exam Prep Boot Camp - Brochure Your first step to a Rewarding Career in Project Management Course Name : CAPM Version : IINVL_CAPM_BR_02_061_1.2 Course
More informationArchitectural Design
Architectural Design Topics i. Architectural design decisions ii. Architectural views iii. Architectural patterns iv. Application architectures Chapter 6 Architectural design 2 PART 1 ARCHITECTURAL DESIGN
More informationThree Key Challenges Facing ISPs and Their Enterprise Clients
Three Key Challenges Facing ISPs and Their Enterprise Clients GRC, enterprise services, and ever-evolving hybrid infrastructures are all dynamic and significant challenges to the ISP s enterprise clients.
More informationThe Key Business Benefits and Business Drivers of a Green IT Strategy in Education
The Key Business Benefits and Business Drivers of a Green IT Strategy in Education Saving the planet, one classroom at a time. Mark Winter Founder Computers Off Australia South Pacific User Services Conference
More informationDrinking Water Emergency Management Ministry of the Environment 2012 Drinking Water Leadership Summit October 25, 2012
Drinking Water Emergency Management Ministry of the Environment 2012 Drinking Water Leadership Summit October 25, 2012 Christine Campbell Team Leader, Drinking Water Emergency Planning Ministry of the
More informationSample Exam. Certified Tester Foundation Level
Sample Exam Certified Tester Foundation Level Answer Table ASTQB Created - 2018 American Stware Testing Qualifications Board Copyright Notice This document may be copied in its entirety, or extracts made,
More informationResults Summary Show All Pages and Questions
Page 1 of 8 Tuesday, November 14, 2006 Results Summary Show All Pages and Questions Filter Results To analyze a subset of your data, you can create one or more filters. : 1137 Visible: 1137 Share Results
More information2 The IBM Data Governance Unified Process
2 The IBM Data Governance Unified Process The benefits of a commitment to a comprehensive enterprise Data Governance initiative are many and varied, and so are the challenges to achieving strong Data Governance.
More information