Systems Analysis and Design in a Changing World, 6th Edition

Slides:



Advertisements
Similar presentations
Distributed Data Processing
Advertisements

Chapter 10: Designing Databases
Chapter 10 Site Architecture McGraw-Hill/Irwin Copyright © 2004 by The McGraw-Hill Companies, Inc. All rights reserved.
Chapter 9 Designing Systems for Diverse Environments.
8.
Technical Architectures
1 Pertemuan 13 Servers for E-Business Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi: >
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 Systems Design, Implementation, Maintenance, and Review Chapter 13.
Asper School of Business University of Manitoba Systems Analysis & Design Instructor: Bob Travica System architectures Updated: November 2014.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 6.
Chapter 9: Moving to Design
Cloud Computing (101).
Cambodia-India Entrepreneurship Development Centre - : :.... :-:-
SPRING 2011 CLOUD COMPUTING Cloud Computing San José State University Computer Architecture (CS 147) Professor Sin-Min Lee Presentation by Vladimir Serdyukov.
The Internet & The World Wide Web Notes
Irwin/McGraw-Hill Copyright © 2000 The McGraw-Hill Companies. All Rights reserved Whitten Bentley DittmanSYSTEMS ANALYSIS AND DESIGN METHODS5th Edition.
Web application architecture
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
INFO 355Week #61 Systems Analysis II Essentials of design INFO 355 Glenn Booker.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 6.
PHASE 3: SYSTEMS DESIGN Chapter 8 System Architecture.
For more notes and topics visit:
Basic Technology for Electronic Commerce Fan Fan address: GUANGXI UNIVERSITY BUSINESS SCHOOL 2005.
Systems Analysis and Design in a Changing World, 6th Edition
Chapter 9 Moving to Design Part 2.
Chapter 9 Elements of Systems Design
2 Object-Oriented Analysis and Design with the Unified Process Objectives  Describe the differences between requirements activities and design activities.
Moving to Design.
The Design Discipline.
What is Enterprise Architecture?
Networks and Hackers Copyright © Texas Education Agency, All rights reserved. 1.
Systems Analysis and Design in a Changing World, 6th Edition
An Introduction to Software Architecture
1 SA Capstone Requirements and Design Week 6 SYST Winter 2015 Some slides adapted from: Systems Analysis and Design in a Changing World, 6th Edition,
Explain the purpose of an operating system
Principles of Information Systems, Sixth Edition Systems Design, Implementation, Maintenance, and Review Chapter 13.
Cloud Computing Characteristics A service provided by large internet-based specialised data centres that offers storage, processing and computer resources.
9 Systems Analysis and Design in a Changing World, Fourth Edition.
9 Systems Analysis and Design in a Changing World, Fourth Edition.
Systems Analysis and Design in a Changing World, 6th Edition
Principles of Information Systems, Sixth Edition 1 Systems Design, Implementation, Maintenance, and Review Chapter 13.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 6 Essentials of Design.
Chapter 1 Introduction to HTML, XHTML, and CSS HTML5 & CSS 7 th Edition.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 1 INTRODUCTION TO SYSTEMS ANALYSIS AND DESIGN: AN AGILE, ITERATIVE APPROACH From.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 6 - Essentials of Design an the Design Activities.
Systems Analysis and Design in a Changing World, 6th Edition
INTRODUCTION TO COMPUTER NETWORKING  Definition of computer network  Devices that could be connected to the network  Connection media  Resources shared.
Microsoft Visual Basic 2015 CHAPTER ONE Introduction to Visual Basic 2015 Programming.
9. 9 Systems Analysis and Design in a Changing World, Fourth Edition.
ISC321 Database Systems I Chapter 2: Overview of Database Languages and Architectures Fall 2015 Dr. Abdullah Almutairi.
9 Systems Analysis and Design in a Changing World, Fifth Edition.
Lecture 1: Network Operating Systems (NOS)
Successfully Implementing The Information System Systems Analysis and Design Kendall and Kendall Fifth Edition.
E-Business Infrastructure PRESENTED BY IKA NOVITA DEWI, MCS.
Unit 3 Virtualization.
Chapter 7. Identifying Assets and Activities to Be Protected
Chapter 6: Securing the Cloud
Business System Development
Systems Analysis and Design in a Changing World, Fourth Edition
Object-Oriented Analysis Chapter 6 – Summary Notes
Database System Concepts and Architecture
Lecture 1: Network Operating Systems (NOS)
Physical Architecture Layer Design
Introduction to Cloud Computing
Objective Understand web-based digital media production methods, software, and hardware. Course Weight : 10%
Systems Analysis and Design in a Changing World, 6th Edition
Chapter 21 Successfully Implementing The Information System
Presentation transcript:

Systems Analysis and Design in a Changing World, 6th Edition INTRODUCTION TO SYSTEMS ANALYSIS AND DESIGN: AN AGILE, ITERATIVE APPROACH SATZINGER | JACKSON | BURD CHAPTER 6 Chapter 6 Systems Analysis and Design in a Changing World, 6th Edition

Essentials of Design and the Design Activities Chapter 6 Introduction to Systems Analysis and Design: An Agile, Iterative Approach 6th Ed Satzinger, Jackson & Burd

Introduction to Systems Analysis and Design, 6th Edition Chapter 6 Outline The Elements of Design Inputs and Outputs for Systems Design Design Activities Design Activity: Design the Environment Introduction to Systems Analysis and Design, 6th Edition © 2012 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part.

Introduction to Systems Analysis and Design, 6th Edition Learning Objectives Describe the difference between systems analysis and systems design Explain each major design activity Describe the major hardware and network environment options Describe the various hosting services available Introduction to Systems Analysis and Design, 6th Edition © 2012 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part.

Introduction to Systems Analysis and Design, 6th Edition Overview Analysis says “what” is required and design tells us “how” the system will be configured and constructed Chapters 2, 3, 4 and 5 covered systems analysis activities (requirements) This chapter introduces system design and the design activities involved in systems development Design bridges the gap between requirements to actual implementation Objective of design is to define, organize, and structure the components of the final solution to serve as a blue print for construction Introduction to Systems Analysis and Design, 6th Edition © 2012 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part.

Systems Analysis and Design in a Changing World, 6th Edition

Major Components of Design Introduction to Systems Analysis and Design, 6th Edition © 2012 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part.

Introduction to Systems Analysis and Design, 6th Edition Two Levels of Design Architectural Design Broad design of the overall system structure Also called General Design and Conceptual Design Detailed Design Low level design that includes the design of the specific program details Design of each use case Design of the database Design of user and system interfaces Design of controls and security Introduction to Systems Analysis and Design, 6th Edition © 2012 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part.

Analysis Objectives versus Design Objectives Systems Analysis and Design in a Changing World, 6th Edition Introduction to Systems Analysis and Design, 6th Edition © 2012 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part.

Analysis vs. Design Models Introduction to Systems Analysis and Design, 6th Edition © 2012 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part.

Introduction to Systems Analysis and Design, 6th Edition Design Activities Design activities are usually done in parallel The various systems design documents must be consistent and integrated to provide a comprehensive set of specifications for the complete system All these systems design tasks are model-building tasks Introduction to Systems Analysis and Design, 6th Edition © 2012 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part.

Design Activities and Key Question Introduction to Systems Analysis and Design, 6th Edition © 2012 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part.

Design Activities: Design the environment The environment is all of the technology required to support the software application Servers, Desktop computers Mobile devices, Operating systems Communication capabilities, Input and output capabilities In Chapter 2 this was called the Technology Architecture This activity is discussed in more detail later in the chapter Introduction to Systems Analysis and Design, 6th Edition © 2012 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part.

Design Activities: Design the application architecture and software Include decision about the structure and configuration of the new system as well as the design of the computer software itself Partition system into subsystems Define software architecture Detailed design of each use case Design class diagrams Sequence diagrams Design State machine diagrams CH 10 & 11 Introduction to Systems Analysis and Design, 6th Edition © 2012 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part.

Systems Analysis and Design in a Changing World, 6th Edition Use case— an activity that the system performs, usually in response to a request by a user Systems Analysis and Design in a Changing World, 6th Edition

Introduction to Systems Analysis and Design, 6th Edition Design Class Diagram Detail design for two use cases: Process New Sale Make payment Introduction to Systems Analysis and Design, 6th Edition © 2012 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part.

Design Activities: Design the user interfaces Dialog design begins with requirements Use case flow of activities System sequenced diagram Design adds in screen layout, look and feel, navigation, user experience Now we require interface design for many different environment and devices Smart phone Notebooks, tablets, iPads Introduction to Systems Analysis and Design, 6th Edition © 2012 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part.

Design Activities: Design the system interfaces Information system interacts with many other systems, internal and external Much more integration now System interfaces connect with other systems in many different ways Save data another system uses Read data another system saved Real time request for information Software services Introduction to Systems Analysis and Design, 6th Edition © 2012 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part.

Design Activities: Design the database Starting with the domain model class diagram (or ERD) Choose database structure Usually relational database Could be ODBMS framework Design architecture (distributed, etc.) Design database schema Tables and columns in relational Design referential integrity constraints Foreign key references Introduction to Systems Analysis and Design, 6th Edition © 2012 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part.

Database Table Definition Using mySQL Introduction to Systems Analysis and Design, 6th Edition © 2012 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part.

Design Activities: Design the security and system controls Protect the organization’s assets Becomes crucial in Internet and wireless User interface controls Application controls Database controls Network controls Introduction to Systems Analysis and Design, 6th Edition © 2012 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part.

Design the Environment The design activity now in more detail The environment is all of the technology required to support the software application It is the first activity of design activities because it permeates all other design decision Design for Internal Deployment Stand alone software systems Run on one device without networking Like Microsoft office suite ,Apple I work suite They often need to be deployed on various devices

Network Diagram Internal Network System Introduction to Systems Analysis and Design, 6th Edition © 2012 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part.

Internal network-based systems For the exclusive use of the organization that builds it or buys it . It meant to be used by the employees who are located within the organization's building Local area network, client-server architecture There are two kinds of systems that can be deployed in client-server architecture :a desktop applications and browser-based applications Advantages & disadvantages Local area network a computer network in which the cabling and hardware are confined to a single location Client-server architecture a computer network configuration with user’s computers and central computers that provide common services

Design the Environment The design activity now in more detail Three-layer client server architecture a client/server architecture that divides an application into view layer, business logic layer, and data layer Is used for all types of systems View layer :the part of the three-layer architecture that contains the user interface Business logic layer or domain layer :the part of a three-layer architecture that contains the programs that implement the business rules and processes Data layer :the part of a three-layer architecture that interacts with the data

Design the Environment The design activity now in more detail Advantages : Effective because the programmers can focus on one layer at a time It easier to upgrade and enhance different portions of the system Layers relatively independent of one another .they only need a common language for requests and responses and reliable network Provides the flexibility needed by modern organization to deploy and redeploy systems in response to rapidly changing conditions

Internal Deployment with Three Layer Architecture Introduction to Systems Analysis and Design, 6th Edition © 2012 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part.

Design the Environment (continued) Design for External Deployment Configuration for Internet deployment Hosting Alternatives for Internet deployment Diversity of Client Devices with Internet deployment Introduction to Systems Analysis and Design, 6th Edition © 2012 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part.

Configuration for Internet Deployment Almost all internet-deployed applications use a three-layer architecture © 2012 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part.

Configuration for Internet Deployment The Advantages of implementing an application via the internet : Accessibility—Web-based applications are accessible to a large number of potential users (including customers, suppliers, and off-site employees). Low-cost communication—Connections to the Internet can be purchased from a variety of private Internet service providers at relatively low costs. Widely implemented standards—Web standards are well known, and many computing professionals are already trained in their use. Introduction to Systems Analysis and Design, 6th Edition © 2012 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part.

Configuration for Internet Deployment Potential Problems Security—Web servers are a well-defined target for security breaches because Web standards are open and widely known. Wide-scale interconnection of networks and the use of Internet and Web standards make servers accessible to a global pool of hackers. Throughput—When high loads occur, throughput and response time can suffer significantly. The configuration must support not only daily average users but also a peak-load number of users. Changing standards—Web standards change rapidly. Client software is updated every few months. Developers of widely used applications are faced with a dilemma: Use the latest standards to increase functionality or use older standards to ensure greater compatibility with older user software. Introduction to Systems Analysis and Design, 6th Edition © 2012 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part.

Configuration for Internet Deployment Security improved by: Hypertext Transfer Protocol Secure (HTTPS) an encrypted form of information transfer on the Internet that combines HTTP and TLS Transport Layer Security (TLS) An advanced version of Secure Sockets Layer (SSL) protocol used to transmit information over the Internet securely Introduction to Systems Analysis and Design, 6th Edition © 2012 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part.

Performance improved by multiple server configurations Data center Performance improved by multiple server configurations As volumes increase ,increased capacity is provided by utilizing larger more powerful servers, and by adding more servers Many companies that support very high volumes also build server farms, which consist of multiple datacenters around the country or even around the world

Systems Analysis and Design in a Changing World, 6th Edition Throughput can also be increased by using content delivery network: a set of server computers used to delver such static content as images or videos Systems Analysis and Design in a Changing World, 6th Edition

Hosting Alternatives for Internet Deployment Running and maintaining a computer system on someone’s behalf where the application software and the database reside The process of providing physical servers at a secure location and selling those services to other businesses that wish to deploy Web sites Issues when considering hosting alternatives Reliability, security, physical facilities, staff, potential for growth Introduction to Systems Analysis and Design, 6th Edition © 2012 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part.

Systems Analysis and Design in a Changing World, 6th Edition

Hosting Alternatives for Internet Deployment (continued) Colocation a hosting service with a secure location but in which the computers are usually owned by the client businesses Advantage : it doesn’t incur the costs of a physical, secure, complex data center Managed Services a client owns software but may want to purchase additional services, such as installing and managing the operating system, the Internet servers, database servers, and load balancing software Advantage :the client company doesn’t have to hire technical staff to manage the server system software Virtual servers the client company leases a virtual server that is configured as a real server, with a certain amount of CPU capacity, internal memory, hard drive memory, and bandwidth to the Internet Companies use this service for application with very low volume that don’t require the computing power of a whole server Advantage: the client company can start small and add more capacity as needed

Hosting Alternatives for Internet Deployment (continued) Cloud Computing an extension of virtual servers in which the resources available include computing, storage, and Internet access and they appear to have unlimited availability a client should be able to buy computing capacity much like one purchases such a utility as water or electricity the client shouldn’t have to be concerned with such environmental issues as how or where this computing capacity is provided, just as an individual doesn’t have to worry about how electricity is generated Advantage: saves the client company money because it doesn’t have to buy capacity that it doesn’t need Service Level Agreement For all alternatives, part of the contract between a business and a hosting company that guarantees a specific level of system availability Introduction to Systems Analysis and Design, 6th Edition © 2012 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part.

Diversity of Client Devices with Internet Deployment The problem is that the various devices have different screen sizes, screen display characteristics , internet browser, and operating environments Full size devices Desktops, laptops, 15-27” high resolution Mid level tablet devices Tablets 8-10 inches, landscape or portrait mode, lower resolution, might need specific view layer Small mobile computing devices Very small screens, regular web sites hard to read, really need specific view layer for mobile web viewing It is common to build two or three separate view layers so software application can be viewed on all three types of devices

Design for Remote, Distributed Environment It has characteristics of the internal and external environment Historically ,many companies have built their own WANs Today almost all these systems are built by using the internet and are called Virtual private network (VPN) Closed network with security and closed access built on top of a public network (Internet) Introduction to Systems Analysis and Design, 6th Edition © 2012 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part.

Virtual Private Network (VPN) Special software is used to establish a secure connection and to encrypt all data transmissions Introduction to Systems Analysis and Design, 6th Edition © 2012 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part.

RMO’s Current Technology Architecture Introduction to Systems Analysis and Design, 6th Edition © 2012 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part.

Introduction to Systems Analysis and Design, 6th Edition Summary This chapter discussed system design, the six design activities, and designing the environment. System design is he bridge between requirements and implementation—a blue print for what needs to be built. Design occurs at two levels: architectural design and detail design. Models of the functional requirements (domain model class diagrams, use case diagrams, system sequence diagrams, use case descriptions, state machine diagrams, and activities diagrams) are used as the basis for creating design models. Introduction to Systems Analysis and Design, 6th Edition © 2012 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part.

Introduction to Systems Analysis and Design, 6th Edition Summary (continued) There are six design activities: design the environment, design the application architecture and software, design user interfaces, design system interfaces, design the database, and design system controls and security. The first activity, Design the environment, is covered in detail. This includes designing for internal deployment and design for external deployment. Important issues are three layer architecture, deploying using the Internet, and hosting alternatives. Hosting alternatives include colocation, managed services, virtual servers, and cloud computing. Introduction to Systems Analysis and Design, 6th Edition © 2012 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part.

Systems Analysis and Design in a Changing World, 6th Edition A financial corporation has desktop applications running in several different offices that are all supported by a centralized application bank of two computers. In addition, there is a centralized database, which requires three servers. Draw a network diagram representing this requirement. Systems Analysis and Design in a Changing World, 6th Edition

Systems Analysis and Design in a Changing World, 6th Edition A sales organization has an Internet-based customer support system that needs to support every type of client device. The server configuration should be a normal layered application server and database server. Draw a network diagram representing this requirement. Systems Analysis and Design in a Changing World, 6th Edition

Systems Analysis and Design in a Changing World, 6th Edition A medium-sized engineering firm has three separate engineering offices. In each office, a local LAN supports all the engineers in that office. Due to the requirement for collaboration among the offices, all the computers should be able to view and update the data from any of the three offices. In other words, the data storage server within each LAN should be accessible to all computers, no matter where they are located. Draw a network diagram that will support this configuration. Systems Analysis and Design in a Changing World, 6th Edition

Systems Analysis and Design in a Changing World, 6th Edition A small start-up company has a Web-based customer sales system that is written by using PHP and JavaScript. The company is deciding whether to host the system on its own servers, contract with a hosting company for a virtual server, or go to Amazon’s cloud. Volumes are expected to be low at the beginning, and it is hard to predict a growth pattern, although there is potential for rapid growth. Decide which alternative the company should choose. Defend your decision by giving advantages and disadvantages of each solution based on the characteristics of the start-up company. It appears that the cloud might be the best option. With the Virtual server second, and hosting it in-house as the least desirable. Systems Analysis and Design in a Changing World, 6th Edition