The System Life Cycle Week 14 LBSC 690 Information Technology.

Slides:



Advertisements
Similar presentations
Virtual University - Human Computer Interaction 1 © Imran Hussain | UMT Imran Hussain University of Management and Technology (UMT) Lecture 16 HCI PROCESS.
Advertisements

MIS 2000 Class 20 System Development Process Updated 2014.
“Systems” ILS, DAMS, and other Acronyms Week 12 LBSC 690 Information Technology.
Software Engineering Session 14 INFM 603. Software Software represents an aspect of reality –Input and output represent the state of the world –Software.
Requirement Analysis Week 10 INFM 603. Agenda Systems analysis –Required for complex multi-person tasks User-centered design –Multiple stakeholders complicate.
SECOND MIDTERM REVIEW CS 580 Human Computer Interaction.
4.1.5 System Management Background What is in System Management Resource control and scheduling Booting, reconfiguration, defining limits for resource.
Web-Database Integration Week 8 LBSC 690 Information Technology.
© 2005 Prentice Hall7-1 Stumpf and Teague Object-Oriented Systems Analysis and Design with UML.
The System Life Cycle Week 14 LBSC 690 Information Technology.
Chapter 1 Software Development. Copyright © 2005 Pearson Addison-Wesley. All rights reserved. 1-2 Chapter Objectives Discuss the goals of software development.
Integration Week 7 LBSC 690 Information Technology.
CS CS 5150 Software Engineering Lecture 13 System Architecture and Design 1.
The System Life Cycle Week 14 LBSC 690 Information Technology.
The System Life Cycle Week 12 LBSC 690 Information Technology.
Library Automation and Digital Libraries Class #5 LBSC 690 Information Technology.
1 Chapter 6 Systems Development. 2 Learning Objectives  Know the characteristics of systems development.  Understand what professional systems analysts.
Data Centers and IP PBXs LAN Structures Private Clouds IP PBX Architecture IP PBX Hosting.
Web Programming Language Dr. Ken Cosh Week 1 (Introduction)
System Analysis and Library Automation Session 12 LBSC 690 Information Technology.
Architectural Design.
PHASE 3: SYSTEMS DESIGN Chapter 7 Data Design.
Chapter 11 Databases.
CIS 321—IS Analysis & Design
Chapter 2: Approaches to System Development
2013Dr. Ali Rodan 1 Handout 1 Fundamentals of the Internet.
IT Terminology Quiz VSB 1002: Business Dynamics II Spring 2009.
ITEC224 Database Programming
CS 360 Lecture 3.  The software process is a structured set of activities required to develop a software system.  Fundamental Assumption:  Good software.
1 ISA&D7‏/8‏/ ISA&D7‏/8‏/2013 Systems Development Life Cycle Phases and Activities in the SDLC Variations of the SDLC models.
CHAPTER FOUR COMPUTER SOFTWARE.
Introduction to Interactive Media Interactive Media Tools: Software.
SCSC 311 Information Systems: hardware and software.
Chapter 4 Networking and the Internet. © 2005 Pearson Addison-Wesley. All rights reserved 4-2 Chapter 4: Networking and the Internet 4.1 Network Fundamentals.
Systems Development AIMS 2710 R. Nakatsu. Overview Why do IT projects succeed and fail? Two philosophies of systems development –Systems Development Life.
Okay, here’s a scenario… You’re sitting at a computer…. Type in www. yourcompany.com As soon as you click on search your browser will ask your Operation.
Chapter 10 Information Systems Analysis and Design
Requirements Analysis Session 12 INFM 603. Different Perspectives on Design Thanks to Satish Mishra.
1 Systems Analysis and Design in a Changing World, Thursday, January 18, 2007.
C6 Databases. 2 Traditional file environment Data Redundancy and Inconsistency: –Data redundancy: The presence of duplicate data in multiple data files.
4 - 1 Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Computer Software Chapter 4.
IS 325 Notes for Wednesday August 28, Data is the Core of the Enterprise.
Class 13 LBSC 690 Information Technology More Multimedia Compression and Recognition, and Social Issues.
MI703: Computer Information Systems Goals Goals Logistics Logistics Technical Topic: Analyzing Application Development Technical Topic: Analyzing Application.
Requirements Analysis Session 12 INFM 603. The System Life Cycle Systems analysis –How do we know what kind of system to build? User-centered design –How.
Systems Analysis and Design in a Changing World, Fourth Edition
ITGS Databases.
9 Systems Analysis and Design in a Changing World, Fourth Edition.
Rehab AlFallaj.  OSI Model : Open system Interconnection.  is a conceptual model that characterizes and standardizes the internal functions of a communication.
1 Pre-Introduction What is computer network?. 2 Pre-Introduction Suppose you want to build a computer network The question is: –What available technologies.
System Analysis and Library Automation
Connecting with Computer Science2 Objectives Learn how software engineering is used to create applications Learn some of the different software engineering.
Unit 17: SDLC. Systems Development Life Cycle Five Major Phases Plus Documentation throughout Plus Evaluation…
1 SYS366 Week 1 - Lecture 1 Introduction to Systems.
Software Development Process CS 360 Lecture 3. Software Process The software process is a structured set of activities required to develop a software.
Application architectures Advisor : Dr. Moneer Al_Mekhlafi By : Ahmed AbdAllah Al_Homaidi.
2.2 Interfacing Computers MR JOSEPH TAN CHOO KEE TUESDAY 1330 TO 1530
Final Review Systems Analysis and Design in a Changing World, 4th Edition 1 Final Review u Chapters 1-6, 8-10, 13, 14, 15 u Multiple choice, short answer,
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Creating the Network Design Designing and Supporting Computer Networks – Chapter.
Unit F451 Computer Fundamentals Components of a Computer System Software Data: Its representation, structure and management in information.
Software Engineering Session 12 INFM 603. Software Software represents an aspect of reality –Input and output represent the state of the world –Software.
Information Retrieval in Practice
Information Systems Development
Web Programming Language
Vocabulary Prototype: A preliminary sketch of an idea or model for something new. It’s the original drawing from which something real might be built or.
CT1303 LAN Rehab AlFallaj.
Understanding the OSI Reference Model
Requirements Analysis
Presentation transcript:

The System Life Cycle Week 14 LBSC 690 Information Technology

Agenda Questions Systems analysis Building complex systems Managing complex systems Final exam review

The System Life Cycle Systems analysis –How do we know what kind of system to build? User-centered design –How do we discern and satisfy user needs? Implementation –How do we build it? Management –How do we use it?

Systems Analysis First steps: –Understand the task Limitations of existing approaches –Understand the environment Structure of the industry, feasibility study Then identify the information flows –e.g., Serials use impacts cancellation policy Only then can you design a solution

Analyze the Information Flows Where does information originate? –Might come from multiple sources –Feedback loops may have no identifiable source Which parts should be automated? –Some things are easier to do without computers Which automated parts should be integrated? What other systems are involved? –And what information do they contain?

Analyzing Information Flows Process Modeling –Structured analysis and design –Entity-relationship diagrams –Data-flow diagrams Object Modeling –Object-oriented analysis and design –Unified Modeling Language (UML)

Some Library Activities Acquisition Cataloging Reference –Online Public Access Catalog (OPAC) Circulation Weeding Reserve, recall, fines, interlibrary loan, … Budget, facilities schedules, payroll,...

Discussion Point: Integrated Library System What functions should be integrated? What are the key data flows? Which of those should be automated?

User-Centered Design Start with user needs –Who are the present and future users? –How can you understand their needs? Evaluate available technology –Off-the-shelf solutions –Custom-developed applications Implement something Evaluate it with real users

The Waterfall Model Key insight: invest in the design stage –An hour of design can save a week of debugging! The motivation behind DoD Standard 2167 –Requirements Specifies what the software is supposed to do –Specification Specifies the design of the software –Test plan Specifies how you will know that it did it

The Waterfall Model Requirements Specification Software Test Plan

The Spiral Model Build what you think you need –Perhaps using the waterfall model Get a few users to help you debug it –First an “alpha” release, then a “beta” release Release it as a product (version 1.0) –Make small changes as needed (1.1, 1.2, ….) Save big changes for a major new release –Often based on a total redesign (2.0, 3.0, …)

The Spiral Model

Some Unpleasant Realities The waterfall model doesn’t work well –Requirements usually incomplete or incorrect The spiral model is expensive –Redesign leads to recoding and retesting

The Rapid Prototyping Model Goal: explore requirements –Without building the complete product Start with part of the functionality –That will (hopefully) yield significant insight Build a prototype –Focus on core functionality, not in efficiency Use the prototype to refine the requirements Repeat the process, expanding functionality

Rapid Prototyping + Waterfall Update Requirements Choose Functionality Build Prototype Initial Requirements Write Specification Create Software Write Test Plan

Implementation Requirements Availability –Mean Time Between Failures (MTBF) –Mean Time To Repair (MTTR) Capacity –Number of users for each application –Response time Flexibility –Upgrade path

Alternative Architectures Batch processing (e.g., recall notices) –Save it up and do it all at once Timesharing (e.g., OPAC) –Everyone uses the same machine Client-Server (e.g., Web) –Some functions done centrally, others locally Peer-to-Peer (e.g., Kazaa) –All data and computation is distributed

Management Issues Retrospective conversion –Even converting electronic information is expensive Management information –Peak capacity evaluation, audit trails, etc. –Sometimes costs more to collect than it is worth! Training –Staff, end-users Privacy

Hands On: What Goes Wrong? Check out Risks Digest for a random date – –Pick a random date near your birthday Find a case of unexpected consequences Try to articulate the root cause –Not the direct cause

Discussion Points: Managing Complex Systems Critical system availability –Why can’t we live without these systems? Understandability –Why can’t we predict what systems will do? Nature of bugs –Why can’t we get rid of them? Auditability –How can we learn to do better in the future?

Critical Infrastructure Protection Telecommunications Banking and finance Energy Transportation Emergency services Food and agriculture Water Public health Postal and shipping Defense industrial base Chemical industry and hazardous materials SCADA: Supervisory Control and Data Acquisition

National Cyberspace Strategy Response system –Analysis, warning, response, recovery Threat and vulnerability reduction Awareness and training program –Return on investment, best practices Securing government systems International cooperation

Summary Systems analysis –Required for complex multi-person tasks User-centered design –Multiple stakeholders complicate the process Implementation –Architecture, open standards, … Management –Typically the biggest cost driver

Talk to Me About the Exam! About 5 questions –Same question styles as the midterm –Some may require use of the computer Comprehensive - covers the entire course –Emphasis and structure from the second half Two hours Post-exam discussion at Bentley’s

The Grand Plan Networks XML Multimedia Computers Interaction Search Communication Web Life Cycle Policy Databases Programming Web Databases Midterm Project Final Quiz

Computer Systems Hardware –Types of hardware –Storage hierarchy –Moore’s law Software –Types of software –Types of interfaces

Networks Types of Networks –LAN, WAN, Internet, Wireless Packet Switching –Ethernet, routers, routing tables Layered Architecture and protocols –TCP/UDP –IP address/domain name Encryption

Structured Documents My Browser The Web –HTTP, HTML, URL XML

Multimedia Compression, compression, compression –Image: lossy vs loseless –Video: frames are alike –Speech: voice predictable –Music: masking Streaming Media Sever Internet Buffer

Human-Computer Interaction Human-machine synergy Mental models Input and output devices Interaction styles –Direct manipulation, menu, language based

Programming Programming languages –Machines require low-level specific instructions –Humans require high-level abstraction Can create any behavior from 3 control structures –Sequential execution –Conditional –Iteration Javascript interpreters are in Web browsers

Databases Structured information –Field->record->table->database –Primary key Normalized tables (relations) –Remove redundancy, inconsistency, error –Easy update, search Join links tables together –Through foreign key Access provides visual operations

Web-Database Integration Access “Data Access Pages” PHP SQL

Computer-Mediated Communication Synchronous / Asynchronous Remote / local One-to-one / many-to-many Computer-Supported Cooperative Work

The Web Huge, dynamic, redundant, and diverse Multimedia, multilingual, multicultural Deep Web Internet Archive

Search Exact match Term-based ranked retrieval Recommender systems Web search –Links and anchor text Evaluation

Policy Ownership –Equitable access –Controlled access Identity –Choosing good passwords Privacy –Government / commercial Integrity

Life Cycle Systems analysis Software development models Managing complex systems

R.J. Bentley’s Filling Station Thursday Dec 15, 2005 at 8:30 P.M.