We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byAmy Spindler
Modified over 2 years ago
MIDDLE EAST TECHNICAL UNIVERSITY COMPUTER ENGINEERING DEPARTMENT CENG 492 – COMPUTER ENGINEERING DESIGN II DSK4BRM
Team Members Doruk Tekniker Gürkan İlhan Mehmet Daşıran Elman Hamidli Hüseyin Uygun
Cybersoft Sponsor Company Dr. Semih Çetin Company Consultant Asst. Prof. Dr. Pınar Karagöz Şenkul Instructor Selma Süloğlu Teaching Assistant
Problem Definition 1 Rule’em All 2 Progress 3 Snapshot Demo 4
Problem Definition 1 Segregation of BRM from core application code Definition and management of decision logic Combination of internal & external resources A user – friendly runtime environment
Rule’em All 2 DSK = DSL + DSE + DST Provides several business rule & fact operations Designed for different types of business domains & users Gathers data from both internal & external resources
LEVEL 3LEVEL 2LEVEL 1 BUSINESS ANALYST IT STAFF EMPLOYEE EMPLOYEE EMPLOYEE EMPLOYEE
Data & Connections Layer Object Entity Layer Business Logic Layer Implementation Layer
Modules Rule Management Inner & Outer Conditions Derived Rules Fact Management Internal DB Handling User Operations Department Definitions Content Translation Connection Web Services External DB’s Other Applications
JanuaryFebruary Progress 3 Final Design Task Assignment Web Page BRM
AprilMarch Derived Rules Internal DBMS Fact Management User Operations
JuneMay Content Trans. Ext. Connection Final Testing Final Demo
Snapshot Demo 4
CAUSE & EFFECT DIAGRAM (Fishbone or Ishikawa Diagram) Dr. Ömer Yağız Department of Business Administration Eastern Mediterranean University TRNC.
Deploy Ace An Application Deployment Methodology Version 1.1 Anifa ICT Management Consulting & Projects Tel +32(0) Cell +32(0) Mail
Deiva Preetha/Sornalakshmi Asst Prof SRM University, Kattankulathur School of Computing, Department of IT 1.
The IT Quality Assurance Specialists Phone: 877-MGD-TEST ( ) n n n n Web Site: Running.
Developing Database Specifications TRACK 3. Learning Objectives At the end of the session, the participants should be able to Identify the information.
Towards a simpler and more efficient BR June 19, 2007 ICES-III Montréal (QC)
1 Notes content copyright © 2004 Ian Sommerville. NU-specific content copyright © 2004 M. E. Kabay. All rights reserved. System Models IS301 – Software.
Automotive Embedded System Development in AUTOSAR.
Presence Aware Location-Based Services For Managing Mobile Communications Vishal K. Singh, Henning Schulzrinne Department of Computer Science, Columbia.
Infrastructure for E-Business DIS 302: E-Business Laudon & Laudon.
COREP and FINREP: Start of real XBRL reporting in the European Banking Supervision Committee of European Banking Supervisors XBRL Network Daniel Hamm Katrin.
International Technology Alliance in Network & Information Sciences Dave Braines, John Ibbotson, Graham White (IBM UK) SPIE Defense Security & Sensing.
©Ian Sommerville 2000 Software Engineering, 6th edition. Chapter 28Slide 1 Chapter 28 Software Re-engineering.
ICS 434 Advanced Database Systems Dr. Abdallah Al-Sukairi Second Semester (032) King Fahd University of Petroleum & Minerals.
©Ian Sommerville 2000 Software Engineering, 6th edition. Chapter 7 Slide 1 Chapter 7 System Models.
CSS Data Warehousing for BS(CS) Lecture 1-2: DW & Need for DW Khurram Shahzad Department of Computer Science.
Irwin/McGraw-Hill Copyright © 2000 The McGraw-Hill Companies. All Rights reserved Whitten Bentley DittmanSYSTEMS ANALYSIS AND DESIGN METHODS5th Edition.
1 Don Schaefer – Mission Engineering TM - a transformational business analysis and system engineering approach Challenge the Dominant Paradigm.
Establishing an OU Hierarchy for Managing and Securing Clients Base design on business and IT needs Split hierarchy Separate user and computer OUs Simplifies.
Copyright Maveo Systems Shanghai1 Becoming a Good Software Architect By Terry Cheng (郑书玄 ) Chief Technology Officer 万域系统软件（上海）有限公司.
McGraw-Hill/Irwin © The McGraw-Hill Companies, All Rights Reserved BUSINESS PLUG-IN B14 Systems Development.
10-1. Systems Analysis & Programming 10.1 Systems Development 10.2 Programming: A Five-Step Procedure Generations of Programming Languages 10.4.
Relational Database and Data Modeling Lecture 10 (Chapter 4)
In search of.... October 3, 2014Computing Services 2 Overview Definition of Middleware Background Project Methodology Technology Choices IT.
Management Information Systems, 4 th Edition 1 Chapter 10 Organizing Information Technology Resources.
Lightweight Grid Computing Worksop 2 nd May 2006, Losehill Hall, Derbyshire Requirements and Expectations from Workflows Asif Akram e-Science Grid Technology.
Supporting further and higher education 19th APAN Meetings in Bangkok Innovative Uses of Pervasive Broadband Network Is adoption of technology running.
THIS MATERIAL IS STRICTLY CONFIDENTIAL. The information contained in this document, and any attachments thereto, is owned by Blackbaud and is strictly.
The PLANETS Testbed DPE, PLANETS and CASPAR 2nd Annual Conference Lisbon, 5–6 September, 2007 Max Kaiser, Austrian National Library
Technical System Options 1 Technical System Options Specify technical environment Confirm functionality of new system Analyse impact on organisation Provide.
© 2016 SlidePlayer.com Inc. All rights reserved.