Free Essay

Cis 210 Term Paper

In: Computers and Technology

Submitted By big007hed
Words 2926
Pages 12
Website Migration – Tony’s Chips

Website Migration – Tony’s Chips
With Tony's Chips being purchased by the Acme Company, they would like a new change the way the website is used for the business. The old method was an externally hosted site with no online ordering options. The new website plan is for it to be redesigned to allow for online ordering, onsite web hosting, and site redundancy to allow for maximum uptime. What they are asking for is called the system development life cycle (SDLC). Systems development life cycle is defined as "activities and functions that systems developers typically perform, regardless of how those activities and services fit a particular methodology” (Shelly & Rosenblatt, 2011). The systems development life cycle contains the following steps in the model: required analysis, testing, implementation, documentation, deployment, and maintenance.
Discuss what it will take to build a Web architecture, move an existing Website with minimal downtime, and provide a disaster recovery solution to ensure the site is always available.
The new web architecture is a complete change from the previous implementation of the site causing an entirely new template and architecture. Previous setup used manual ordering, so they would have to call in or physically come in to order the chips. The new architecture will allow for online ordering that will free up more user time in answering phones taking orders. I am assuming the previous network architecture is up to date and running properly. With this assumption, few technology upgrades will be fully required.
Improving the technology infrastructure would require an upgraded internet connection to help offset the new traffic that will be occurring with the web site being hosted locally. A new physical server to become a web server, using one of the current servers and repurposing it to become the new database server. Also, a more advanced router/firewall would be recommended to help keep security measures high with the new traffic that will be coming to the network infrastructure.
Moving a website from an external source to an internal source can be easy if all of the account information is current. With an external party hosting the site, there are security measures in place to make sure it isn't changed without authorization. Once all of the account information has been verified the external source will need to know a date to move the DNS entries for the website name (http://www.tonyschips.com) to the business IP address that will be assigned to the site. The website certificate will have to be purchased from a company (example GoDaddy and BlueHost) for you to host on your network. Multiple IP addresses will need to be purchased for your business location, so the website is on another IP address than the main business internet traffic.
For the backup and disaster recovery plan there are many options that could support and accomplish what is asked. The primary choice for maximum uptime is a hot site. "Hot sites provide the ultimate disaster recovery experience, with instantaneous or near real-time recovery of operations when the primary site fails” (Chappelle, 2012). A hot site is a location where it is setup the same as the primary installation. Servers are up and running with the software loaded and up to date. Hot sites allow for real-time backup from the primary location to be sent to the hot site and copied over for a minimal loss of time down and data. Real-time is relative as the system will have to be copied and sent through the internet to the hot site location using software (example SnapMirror). With an upgraded internet connection or a dedicated line to the hot site, it should not affect business functions. Why a hot site is ideal is that if a fire burned the main building down the hot site could pick up the website traffic and data transactions without the users noticing a difference, allowing for time to rebuild the previous server infrastructure.
The Web architecture should describe and justify operating system choices (i.e., Linux, Apache, MYSQL, PHP, Windows, IIS, SQL, etc.).
As my expertise with project and system management is with Windows systems the new architecture will be based off of Windows Server 2012 R2 for server OS, IIS for the website hosting, and SQL for the database with Visual Studio for the site design. If this software is not available for the current system licensing will need to be purchased. When getting the members together who will be developing, implementing, and deploying a website they will have to have Visual Studio and SQL backgrounds to make a seamless transition in use and cooperation.
Windows Server 2012 R2 is the most up to date version of Windows server operating systems, with this operating system you can make a single server "play" multiple roles. It can be a file server, print server, domain controller, web server, or database server. In our instance, there will be at least two dedicated servers, one for the web hosting and the other for the database. Windows Server 2012 R2 "can use the Web Server (IIS) role to set up and manage multiple websites, web applications, and FTP sites” all from a single application (TechNet, 2012). SQL databases are an industry standard; it is a database program that allows for multiple connections to it. SQL can support having the inventory database, customer information database, and order history database all stored on the same SQL server. Visual Studio is not the top end of website design like C++, where C++ components perform faster but it does allow for the "ability to be created quickly and easily by a wide group of developers” as it is easier to use (Homer, 1999).
Evaluate alternatives to the company self-hosting the site.
With alternatives for self-hosting the site, the main choice is an externally hosted site. Now that can come in different flavors of externally hosted solutions. The options include free web hosting which is a basic service where the provider allows ads and other means to generate revenue, colocation which provides your business a dedicated server and internet connection, or e-commerce web hosting that provides SSL (secure socket layer) connections for safety with purchasing items.
For Tony's Chips website, the best solution would be the e-commerce choice as a new site requires online ordering. This version can be set as we own the hardware and pay for physical space in their data center and support time or where the hosting company owns the equipment, support team time and backup responsibilities. I would recommend the option where the hosting site owns the hardware as this ensures up to date software and hardware, no depreciating hardware or licensing to have to worry about, or increased bandwidth purchasing. This option can also be setup where the entire building of the site and maintenance of the data be handled by them thus reducing the employee time or physical workers needed at the central office.
Build a Gantt chart using Microsoft Project or equivalent software, showing all tasks associated with implementing the Website. The chart should include a minimum of five (5) tasks, each with three (3) sub-tasks.

This Gantt chart shows the time it would take to go from developing a project idea to the full implementation if the job were a time sensitive project. I am assuming it as the purchasing of Tony's Chips by Acme Company means a change in management. Developing the idea and getting approval would take around three business days. Specifying project responsibilities and getting a general template together would take seven working days, this allows for changes and data manipulation ideas to be hashed out before infrastructure is fully built. Infrastructure building and deployment is a process that would take three business days. Testing is the next step, and it would require six days including weekends for a complete testing experience. Implementation and deployment is the final step and would require two days for moving to a production server and training of the users.
The last piece is maintenance of the system. It is built into this chart, but it is a continual process. Maintenance includes system updates, upgrades, bug fixes, security fixes, and other items found that require support. Maintenance of this kind should be shared among multiple employees in the IT department so that there is not one person responsible for the whole system and allows for better support. The more staff familiar with the system means quicker and better user support.
Explain and justify the system architecture you have selected.
The new architecture is based on systems development life cycle (SDLC) which “includes the following steps: Systems planning, Systems analysis, Systems design, Systems implementation, Systems support and security” (Shelly & Rosenblatt, 2011). These steps are a guideline for how to make a significant systems change for the business. The change from externally hosted site with no online ordering capabilities to an internally hosted site with online ordering options marks an important system change.
The planning step is about how to design a new site with the new features, how to move the old website to our control, and how to implement the best and safest website internally. Working with management to figure out what they want the site to look like as well as the other departments helps build a template or idea of what is going to be the final system look. Moving the old website to our control so users will be directed to the proper site is a crucial step, if missed users could be pointed to the old site or no site at all. Working with all required departments allows for the greatest communication and can reduce changes or issues with the site before it becomes a major problem. This step requires management, programmers, and systems administrators to work together as expectations and actual possibilities of what the site and project can do come into play.
The analysis step is about budgeting for the proper infrastructure, checking with services and other businesses on internet requirements, and bringing all information to the project team for review and approval. With the new site coming in house there will need to be a new network infrastructure such as a new servers and an improved router/firewall for security. Speaking with internet service providers (ISPs) can help alleviate the issue of slow site response or business usage with heavy traffic. If the proper bandwidth is purchased ahead of time, it will alleviate those concerns. Getting together to discuss the bandwidth options, server options, and other network infrastructure items help get everyone on the same page and make some changes if necessary. With this step the finance department, systems administrators, and management would be required to review the cost of the changes proposed.
System design stage is where the ideas of what the site will look like and how it will operate. The blueprint for the whole system is figured out in this step. Design process covers how the site will look, what type of internet connection, and what kind of server and back-end support it will have. The information gathered during the planning phase is the guideline for what is conceptualized during this stage.
System implementation brings the ideas to fruition. The different parts of the project team will begin work on their parts like building a generic website for testing, building a server with web capabilities, and creating the structure of the database. Once the pieces have been constructed they will begin the process of putting them together until it is a seamless system. That leads to a better understanding of how things will work and allows for changes to be made before it is in production. Once everything is tested, and it is running smoothly it is put into production. Implementation step requires that the programmers, database administrators, and systems administrators all collaborate to fulfill this.
System support and security step is a crucial step in the whole process. If there is no support or security the system could crash and there would be no one to bring it back up, or on a smaller scale if there is a wrong name entered for a bag of chips it could affect sales. Providing timely and appropriate support for the new system means there is a maintenance plan in place. Updates, bug fixes, security patches, testing of any changes before implementation, and monitoring are all essential to making sure the system is running at its best. The piece of this that is forgotten is licensing for software or hardware, if the license runs out the software could stop working which could be catastrophic.
Illustrate the system architecture using Visio or equivalent software.
The diagram above shows the architecture and how it will work: * Website visited by user * Primary web server answering the request * Primary database server pulling up the required data * Real-time backups running to hot site location * If primary web server is unresponsive, the traffic will be directed to the backup web server at the hot site * Data differences between primary and backup site depend on change size and internet speeds * Allowing for seamless use for the end user
Create a use case that documents the event of a customer ordering a bag of chips from the new Website. The use case should include a graphical representation using Visio or equivalent software and a text description of the events.
Brief Description: This use case will describe how a customer will order a bag of chips through the website.
Actors: Customer
Preconditions: The customer has a working laptop with an active internet connection. The website is up and functional.
Basic flow of events: Customer navigates to http://www.tonyschips.com and searched the inventory. To accomplish this the web server points to the database server with the up to date stock. The customer finds the type of chips they want to purchase. They select an amount of bags and click purchase. The web server checks with the database server to make sure the quantity is available and then moves forward with the sale. The customer is presented with the cost and enters a valid payment option. The web server communicates with the payment options bank to make sure the funds are available. Once verified there are adequate funds the purchase is approved, and the inventory is removed from the database it is set to be withdrawn from the warehouse for shipment. The customer receives payment verification and waits for the chips. The warehouse pulls the inventory ordered and set it to be shipped to the customer. The chips are then sent to the customer. Once a shipment is marked as delivered the sale is closed and marked as successful. Discuss the support operations that the internally hosted Website will require after implementation.
Support for an internally hosted website will need work and support from different sections of the IT department. The systems administrator will have to make sure that the hardware is up and running properly. That encompasses servers, routers, firewalls, and internet connections. Programmers will be required to fix code issues, bugs, or database changes that are requested. Support technicians will be tasked with supporting the end users in the company and issues reported from customers who need help.
Maintenance will be required for the systems themselves with updates and upgrades but if there is a change than the support technicians will need to be informed and possibly trained on any changes. When the upgrade is made, it is imperative that all support groups are aware and have a functional idea of what the changes entail. If the company is large enough there could call/support centers after regular business hours to support customers and log work tickets for issues experienced.
Explain how you will evaluate the performance of the new site and the success of your project.
The project would be considered a success when the website is up and running with orders being received and processed correctly. To put a timeframe for the project to be considered a success would be a fiscal year, this is long enough for proper reporting and data collection and have it presented. Within a financial year, there will have also been updates done and maintenance showing that the procedures in place are working.
The evaluation of the project would be determined by the ease in which the site is running and how many changes the support staff has had to make to get it fully working. One evaluation step I would like conducted before anything could be considered a success would be a set outage at the primary site and testing the backup and hot site procedures. If the internet is disconnected at the main site does the hot site come up within the allotted time? If so than that part of the project is a success. As always if the customer is satisfied with the site and orders and leave compliments that make management happy.
References
Chappelle, M. (2012, June). Which Disaster Recovery Site Strategy Is Right for You? Retrieved from Biztech: http://www.biztechmagazine.com/article/2012/06/which-disaster-recovery-site-strategy-right-you
Homer, A. (1999, September). Components and Web Application Architecture. Retrieved from Microsoft Developer Network: http://msdn.microsoft.com/en-us/library/bb727121.aspx
Shelly, G., & Rosenblatt, H. (2011). Systems Analysis and Design. Cengage Learning.
TechNet. (2012, February 29). Web Server (IIS) Overview. Retrieved from Microsoft TechNet: http://technet.microsoft.com/en-us/library/hh831725.aspx…...

Similar Documents

Premium Essay

Cis 550, Term Paper: Diginotar, Part 6b

...Running head: CIS 500, Case Study 1: Stratified Custom Manufacturing, Part 2 
 ABSTRACT This paper develops a security policy document for my mid-sized organization “Canar Networkung Organization”. The paper will include measures to protect against breaches and act as a proactive defense. It defines the segments of policy that are purpose, audience, document information and scope for the success of organization. This paper also develops the policy criteria that protect the organization from proactive defense and organizational risks. It examines the objectives, complains, responsibilities, implementations and control of policy criteria in order to enhance the organization. The paper also details the policy measurement in order to mitigate the organizational threats, and provides an effective security elements for the enhancement of the organization. Introduction: The policy This policy is the procedure and principle that guides the decisions and the rational outcomes of an organization. The subjective and the objective decisions can be assisted by policy in order to make better environment to the organization. Policies include the set of decision that can be associated by the senior management in an organization. Document information: The framework of Canar Networkung Organization could be provided by document information for the development of......

Words: 7361 - Pages: 30

Premium Essay

Cis 210 Term Paper

...Benjamin Porter 12/13/13 Benjamin Porter 12/13/13 Abstract Developing and designing an effective in house e-commerce website for Tony’s Chips. Abstract Developing and designing an effective in house e-commerce website for Tony’s Chips. Website MIGRATION PROJECT [Document subtitle] Website MIGRATION PROJECT [Document subtitle] Introduction Tony’s Chips has been acquired by a new independent company. The new company’s intention is to focus on the e-commerce website that they have planned. Currently, the old website is externally hosted and it is required to be moved to an internal one. This new system will store, retrieve, and have data recovery solutions for the company. An additional backup site will need to be created as a failover if the main site goes down. The new and improved site will need to allow customers access to order products online. Project Goal This project has an overall goal of producing a system and website that is in accordance to the demands of Tony’s Chips. The systems architecture will involve all of the systems requirements in its design. The architecture will make use of programs that perform efficiently and properly. Application compatibility is also key to for all of the system components that are going to be used in the system. The project is also aimed at creating a reliable backup and recovery solution for the system. Available system component alternatives The requirements for the system is one that has a system......

Words: 2669 - Pages: 11

Free Essay

Cis 210

...Assignment 1: Inventory Management Systems CIS 210 Prof. Souza April 16, 2014 In this paper I’m going to describe how I can come up with a plan to run automated inventory system on a low budget, for a retail clothing store. In detail I will describe the necessary equipment that it takes to run such a project. Also, I will be explaining the overall cost and the maintenance that is required to run the system properly. First off, we need to purchase an inventory management system. According to Inflow, (2014) over 300,000 small businesses use Inflow inventory. Joelle Krummenacher a uniform retailer states “I recommend it to any small business that needs software to manage all their inventory and orders with a limited budget.” For this software you have a choice to download it for free or pay $299 for the regular edition, which I recommend because you can read and write your data. To execute this plan fully, you would also need to purchase a barcode scanner, barcode printer, and labels. According to Barcodesinc.com, (2014) a barcode scanner cost $74, labels $18.00 and a high speed label printer with built in Ethernet and wireless cost $195, making this project total cost come to $586 dollars. Although this sounds good but, maintenance is required to keep this system running smooth. Wireman, (2014) states this catalog is not used for planning, since the on-hand or order information would be dated. But the catalog allows......

Words: 927 - Pages: 4

Premium Essay

Cis Term Paper

...perceived notion that there are unmovable roadblocks to designing and developing these mobile apps. There are many ways that developers can tackle the screen size issues as part of the development. One new technique for smartphone web app developers and mobile app developers alike involves the concepts behind a relatively new term called “responsive design.” The term “responsive design” was first coined by Ethan Marcotte in his article “Responsive Web Design” for A List Apart. (Responsive Web Design, Most Complete Guide, n.d.). The initial concept behind responsive design is based on the emerging responsive architecture, in which rooms and spaces have the capacity of automatically adjusting according to the number and flow of people within it. (Responsive Web Design, Most Complete Guide, n.d.) Some key points regarding the user-centric approach of “responsive design” are further noted, “The concept of responsive web design makes reference to the process of designing and developing websites that are able to react to user’s actions and detect the medium where the site is currently being watched in order to provide the best experience possible to the user in terms of navigability and readability.”(Responsive Web Design, Most Complete Guide, n.d.) The key with “responsive design” is that the issues of navigability and readability can be tackled by using several grid and layout systems, image optimization and CSS media queries. (Responsive Web Design, Most Complete Guide, n.d.)......

Words: 3229 - Pages: 13

Free Essay

Cis 210 – Systems Analysis and Development Website Migration Term Paper

...Website Migration Project Chinnasut Nhurod CIS 210 – Systems Analysis and Development Dr. Wesley E. Phillips Strayer University September 15, 2013 Website Migration Project for Tony’s Chips Building the Web Architecture In order to build the web architecture, the system analyst would be required to analyse the business requirements of the organization and then develop a clear statement of goals of the organization. Since, the old site of the company is running it would be vital to understand the technological and business related issues associated with the previous website. Along, with that it should also be determined whether the IT staffs of the company possesses necessary experience and skills essential for the implementation of the project. The company might have to consider additional resources, training programs, and hiring of consultants for the project’s success (Nelson et.al, 2010). The project should be developed on a modular manner so the users can approve and test the various functional elements of the website. Since the Tony’s Chips website was already operating, it would be essential for the developer to gather the existing functional requirements for the website. During the data collection process the system analyst will conduct interviews of the people from the product support department, and they will gather the system documentation using the fact finding techniques (McArdle et.al, 2010). Once all the requirements are fulfilled the next step......

Words: 3871 - Pages: 16

Free Essay

Cis 106 Wk 10 Term Paper - the Future of It

...CIS 106 WK 10 Term Paper - The Future of IT To Purchase Click Link Below: http://strtutorials.com/CIS-106-WK-10-Term-Paper-The-Future-of-IT-CIS1062.htm CIS 106 WK 10 Term Paper - The Future of IT You are the new chief information officer for ACME Widgets. The president of the company recently asked you what you think the future of information technology will be. After a lengthy discussion, he further challenged you to write a position paper that will help direct the company’s allocation of resources based on your understanding of the future and potential paradigm shifts. Write a five to eight (5-8) page paper in which you: 1. Identify and describe a future information technology that you believe will create a paradigm shift. 2. Identify and describe the domain in which the shift will occur. 3. Explain the technology, how it works, and how it is different from what we have today. 4. Give at least five (5) reasons why the technology will create a shift. 5. Use at least three (3) quality resources in this assignment. Note:Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: • Be typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. • Include a cover page containing......

Words: 279 - Pages: 2

Free Essay

Cis 210

...Assignment 1: Inventory Management Systems Vanessa Mozie Professor Kurt Brandquist CIS 210 System Analyst and Development October 28, 2014 The following is a plan that I have laid out for an inventory management system for your clothing business. In this blueprint I will include the type of hardware as well as software that you will need to help streamline your business. I will also include general prices form the above mentioned. Included in this cost will be maintenance costs. I will try to keep the total cost as low as possible. Your needs are as follows, a desktop computer, a scan gun, inventory control software, a barcode printer, pole display, signature pad, magnetic strip reader, barcode software, if you want multiple registers you will need to purchase them as well as set up a Local Area Network. In regards to the Local Area Network (LAN) I would recommend that you use a wireless router which will run about $400. It is worth it considering that installation is fast and easy and you will not have to pay for wiring. Now the prices for all of these components varies depending on who makes them, where you purchase them, and if they are purchased on an individual basis or in bundles. Let me start by discussing how we actually decide what the business needs are. As a retailer your needs would be different from a manufacturer or a restaurant. These needs determine the software that we will be using, hardware is......

Words: 1236 - Pages: 5

Premium Essay

Cis 500 Term Paper

...Term Paper Keenan Rhines Strayer University Dr. Hammond Elbedour November 26th, 2014 People are moving into a new era of mobile computing, one that promises greater variety in applications, highly improved usability, and speedier networking. The 3G iPhone from Apple is the poster child for this trend, but there are plenty of other developments that point in this direction. In addition to this trend, many mobile applications were designed that perform specific tasks for the mobile user. * Assess the effectiveness and efficiency mobile-based applications provide to capture geolocation data and customer data, and quickly upload to a processing server without users having to use a desktop system. Nowadays, according to statistic, Ninety-seven percent of all smartphone users use mobile applications. Fifty-eight percent of those smart phone users use location-based applications. The results were raised from surveys done by a nonprofit global information security association called ISACA (previously known as the Information Systems Audit and Control Association). The location-based activities were implemented via applications installed on smartphone. These apps using the users current locations was calculated fifty-nine percent of the time but tagging photos on social media such as Twitter or Facebook was estimated forty-four percent. Besides, several mobile apps that capture geographical information, sim-card information and other personal information to share on social...

Words: 2148 - Pages: 9

Free Essay

Cis 106 Wk 10 Term Paper - the Future of It

...CIS 106 WK 10 Term Paper - The Future of IT To Purchase Click Link Below: http://strtutorials.com/CIS-106-WK-10-Term-Paper-The-Future-of-IT-CIS1062.htm CIS 106 WK 10 Term Paper - The Future of IT You are the new chief information officer for ACME Widgets. The president of the company recently asked you what you think the future of information technology will be. After a lengthy discussion, he further challenged you to write a position paper that will help direct the company’s allocation of resources based on your understanding of the future and potential paradigm shifts. Write a five to eight (5-8) page paper in which you: 1. Identify and describe a future information technology that you believe will create a paradigm shift. 2. Identify and describe the domain in which the shift will occur. 3. Explain the technology, how it works, and how it is different from what we have today. 4. Give at least five (5) reasons why the technology will create a shift. 5. Use at least three (3) quality resources in this assignment. Note:Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: • Be typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. • Include a cover page containing......

Words: 279 - Pages: 2

Premium Essay

Cis 500 Complete Class Assignments and Term Paper

...CIS 500 Complete ClasCIS 500 Complete Class Assignments and Term Paper Click link Below To Download Entire Class: http://strtutorials.com/CIS-500-Complete-Class-Assignments-and-Term-Paper-CIS5006.htm CIS 500 Complete Class Assignments and Term Paper CIS 500 Assignment 1 Predictive Policing CIS 500 Assignment 2: 4G Wireless Networks CIS 500 Assignment 3 Mobile Computing and Social Networking CIS 500 Assignment 4 Data Mining CIS 500 Term Paper Mobile Computing and Social Networks CIS 500 Assignment 1 Predictive Policing Click link Below To Download: http://strtutorials.com/CIS-500-Assignment-1-Predictive-Policing-CIS5001.htm In 1994, the New York City Police Department adopted a law enforcement crime fighting strategy known as COMPSTAT (COMPuter STATistics). COMPSTAT uses Geographic Information Systems (GIS) to map the locations of where crimes occur, identify “hotspots”, and map problem areas. COMPSTAT has amassed a wealth of historical crime data. Mathematicians have designed and developed algorithms that run against the historical data to predict future crimes for police departments. This is known as predictive policing. Predictive policing has led to a drop in burglaries, automobile thefts, and other crimes in some cities. Write a four to five (45) page paper in which you Compare and contrast the application of information technology (IT) to optimize police departments’ performance to reduce crime versus random patrols of the streets...

Words: 2044 - Pages: 9

Premium Essay

Cis 210

...“Inventory Management Systems” Strayer University Joshua Watson Prof. Irene Hoskins CIS 210 (Systems Analysis and Development) April 15, 2015 After discussing your frustration with managing your clothing stores’ inventory using a manual software, I researched and developed a low-cost plan that will implement an automated inventory system to track better inventory. Though our discussion was brief, your business issues seem straight forward. There are a few variable that will require further clarification in order to ensure you have the best tools at your disposal. Information such as # of employees, estimation of inventory, transaction history, and most important, budget are all details required to tailor your automated systems. I am assuming you are currently using an “Excel” type tracking tool to manage your inventory. If you continue to use this type of manual software, there are certain pitfall associated with these types of tools. Excel can’t provide you with real-time inventory tracking. Part of the reason you are frustrated with your tracking system is due to the constant manual changes. Another issue is the lack of error monitoring. Since you manually enter your inventory information, you are the last line of defense when it comes to error monitoring. As your business expands, you will look to add employees. When this occurs, if your business still operates using Excel, you will have limited user access control, and......

Words: 754 - Pages: 4

Premium Essay

Cis 525 Week 10 Term Paper

...CIS 525 WEEK 10 TERM PAPER A+ Graded Tutorial Available At: http://hwsoloutions.com/?product=cis-525-week-10-term-paper Visit Our website: http://hwsoloutions.com/ Product Description CIS 525 Week 10 Term Paper, Term Paper: Using Agile Project Management on Mobile Application Development Due Week 10 and worth 150 points Fictitious assumptions and details may be assumed or created for the completion of this assignment. Imagine you are the project manager for a critical project for an organization. The organization wants to implement an application on an iPad and Android Tablet such that the marketing executives and managers can get near real-time updates on how effective their marketing campaigns are doing. Since this project is so critical to the overall financial health of the company, you were asked to complete this project in three (3) months. Your business sponsors are very interested in your approach to manage this project and they are also demanding to see what the project team can deliver on a weekly basis. Due to the tight deadline, the project team was assembled quickly with ten (10) team members of various backgrounds. There are three (3) offshore developers in India and two (2) QA testers in San Francisco, CA. The rest of the project team and the product owner are in Herndon, VA. The team members were unfamiliar with each other. Additionally, there are ethical issues. For example, a developer has been consistently blaming an analyst for his accent......

Words: 653 - Pages: 3

Free Essay

Cis 417 Week 10 Term Paper

...CIS 417 WEEK 10 TERM PAPER To purchase this visit here: http://www.activitymode.com/product/cis-417-week-10-term-paper/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 417 WEEK 10 TERM PAPER – INVESTIGATING DATA THEFT Suppose a large aerospace engineering firm has immediately hired you as a consultant to investigate a potential violation of corporate policy and data theft. You have been informed that an employee may have been using corporate email to send confidential corporate information to one or more personal email accounts, which may or may not belong to him. You have been told that this action has been happening each business day for the last 13 days and the employee is unaware of any suspicion. Write an eight to ten (8-10) page paper in which you: 1. Explain, in detail, the initial actions you would take based on the provided information including formal plans to preserve the crime scene(s) and eventual transportation of evidence to a lab. 2. Analyze the physical and logical places where you would look for potential evidence on the suspect’s computer(s) and / or network servers. 3. Describe, in detail, how you proceed with the email investigation, including the review of email headers and tracing. 4. Describe the processes that would be utilized in order to recover data that may have been deleted from the suspect’s computer(s). More Details hidden… Activity mode aims to provide quality study notes and tutorials to the students of CIS 417 Week......

Words: 784 - Pages: 4

Free Essay

Cis 534 Week 10 Term Paper

...CIS 534 Week 10 Term Paper To purchase this visit here: http://mindsblow.us/question_des/CIS534Week10TermPaper/2792 Contact us at: help@mindblows.us CIS 534 Week 10 Term Paper Network Design CIS 534 Week 10 Term Paper To purchase this visit here: http://mindsblow.us/question_des/CIS534Week10TermPaper/2792 Contact us at: help@mindblows.us CIS 534 Week 10 Term Paper Network Design CIS 534 Week 10 Term Paper To purchase this visit here: http://mindsblow.us/question_des/CIS534Week10TermPaper/2792 Contact us at: help@mindblows.us CIS 534 Week 10 Term Paper Network Design CIS 534 Week 10 Term Paper To purchase this visit here: http://mindsblow.us/question_des/CIS534Week10TermPaper/2792 Contact us at: help@mindblows.us CIS 534 Week 10 Term Paper Network Design CIS 534 Week 10 Term Paper To purchase this visit here: http://mindsblow.us/question_des/CIS534Week10TermPaper/2792 Contact us at: help@mindblows.us CIS 534 Week 10 Term Paper Network Design CIS 534 Week 10 Term Paper To purchase this visit here: http://mindsblow.us/question_des/CIS534Week10TermPaper/2792 Contact us at: help@mindblows.us CIS 534 Week 10 Term Paper Network Design CIS 534 Week 10 Term Paper To purchase this visit here: http://mindsblow.us/question_des/CIS534Week10TermPaper/2792 Contact us at: help@mindblows.us CIS 534 Week 10 Term Paper Network Design CIS 534 Week 10 Term Paper To purchase this visit......

Words: 600 - Pages: 3

Free Essay

Term Paper Cis 500

... Assignment: 1 Error Handling in an Activity Diagram LaShantel Wilson Strayer University Dr. Richard Brown April 18th 2016 Error handling are routines in a program that responds to errors (Encyclopedia). The measurement of quality in error handling is based on how the system informs the user of such conditions and what alternatives it provides for dealing with them (Encyclopedia). This paper will give a narrative which describes the changes and added error handling pathways in the diagram within this paper. There will be an overview of the errors, an explanation as of the main changes checking are imperative within the process, and overview of possible errors. A diagram will illustrate the updates of two (2) error handling pathways. Error Handling Pathway Ridgeline Mountain Outliners (RMO) is a large retail company that specialize in clothing and related accessories for all types of outdoor and sporting activities (BOOK). One approach to handling errors in received data is for the receiving system to send the data back to the sending system, often with an indication that an error has been detected by the receiving system (GOOGLE). When an enterprise IT system includes a sales system and a financial system, the sales system may send data to the financial system, which is only capable of accepting data that passes particular types of validity checks and other types of data consistency checks. When data received by the financial system does not pass the......

Words: 408 - Pages: 2