The System Life Cycle Week 12 LBSC 690 Information Technology.

Slides:



Advertisements
Similar presentations
Virtual University - Human Computer Interaction 1 © Imran Hussain | UMT Imran Hussain University of Management and Technology (UMT) Lecture 16 HCI PROCESS.
Advertisements

CS487 Software Engineering Omar Aldawud
“Systems” ILS, DAMS, and other Acronyms Week 12 LBSC 690 Information Technology.
Software Engineering Session 14 INFM 603. Software Software represents an aspect of reality –Input and output represent the state of the world –Software.
Requirement Analysis Week 10 INFM 603. Agenda Systems analysis –Required for complex multi-person tasks User-centered design –Multiple stakeholders complicate.
INFM 603: Information Technology and Organizational Context Jimmy Lin The iSchool University of Maryland Thursday, November 21, 2013 Session 12: Developing.
Copyright © 2014 Pearson Education, Inc. 1 Managers from across organizations are involved in developing and acquiring information systems Chapter 5 -
11© 2011 Hitachi Data Systems. All rights reserved. HITACHI DATA DISCOVERY FOR MICROSOFT® SHAREPOINT ® SOLUTION SCALING YOUR SHAREPOINT ENVIRONMENT PRESENTER.
Security Controls – What Works
INFM 700: Session 13 System Building Issues Jimmy Lin The iSchool University of Maryland Monday, April 28, 2008 This work is licensed under a Creative.
CIM2564 Introduction to Development Frameworks 1 Overview of a Development Framework Topic 1.
System Analysis and Design (SAD )
The System Life Cycle Week 14 LBSC 690 Information Technology.
The System Life Cycle Week 14 LBSC 690 Information Technology.
LBSC 690: Session 12 Building and Deploying Systems Jimmy Lin College of Information Studies University of Maryland Monday, November 26, 2007.
Chapter 6 Systems Development.
The System Life Cycle Week 14 LBSC 690 Information Technology.
LBSC 690: Week 13 Building and Deploying Systems Jimmy Lin College of Information Studies University of Maryland Monday, April 30, 2007.
Library Automation and Digital Libraries Class #5 LBSC 690 Information Technology.
Pertemuan Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
1 Chapter 6 Systems Development. 2 Learning Objectives  Know the characteristics of systems development.  Understand what professional systems analysts.
Computer Security: Principles and Practice
LBSC 690 Session #12 Building and Deploying Technology Jimmy Lin The iSchool University of Maryland Wednesday, November 19, 2008 This work is licensed.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
© 2006, Cognizant Technology Solutions. All Rights Reserved. The information contained herein is subject to change without notice. Automation – How to.
System Analysis and Library Automation Session 12 LBSC 690 Information Technology.
November 2009 Network Disaster Recovery October 2014.
Software Engineering Week 12 INFM 603. The System Life Cycle Systems analysis –How do we know what kind of system to build? User-centered design –How.
Cloud Computing. 2 A division of Konica Minolta Business Solutions USA Inc. What is Cloud Computing? A model for enabling convenient, on-demand network.
12 Enterprise and Global Management of e-Business Technology.
Distributed Teams Week 13 INFM 603. Agenda Distributed teams Project presentation prep Final exam prep.
-Nikhil Bhatia 28 th October What is RUP? Central Elements of RUP Project Lifecycle Phases Six Engineering Disciplines Three Supporting Disciplines.
Class 5 Computer Software. Outline System Software Application Software (“Applications”) Markup languages for Internet (HTML, XML) User Interface Client-Server.
MSF Requirements Envisioning Phase Planning Phase.
Isdefe ISXXXX XX Your best ally Panel: Future scenarios for European critical infrastructures protection Carlos Martí Sempere. Essen.
Information Systems Analysis and Design
SOLUTIONS FOR THE EFFICIENT ENTERPRISE Sameer Garde Country GM,India.
1 ISA&D7‏/8‏/ ISA&D7‏/8‏/2013 Systems Development Life Cycle Phases and Activities in the SDLC Variations of the SDLC models.
SCSC 311 Information Systems: hardware and software.
Beyond Call Recording: Speech Improves Quality Assurance Larry Mark Chief Technology Officer SER Solutions, Inc.
Chapter 10 Information Systems Analysis and Design
 CS 5380 Software Engineering Chapter 2 – Software Processes Chapter 2 Software Processes1.
Requirements Analysis Session 12 INFM 603. Different Perspectives on Design Thanks to Satish Mishra.
Enterprise and Global Management of e-Business Technology
Database Design and Management CPTG /23/2015Chapter 12 of 38 Functions of a Database Store data Store data School: student records, class schedules,
C6 Databases. 2 Traditional file environment Data Redundancy and Inconsistency: –Data redundancy: The presence of duplicate data in multiple data files.
Requirements Analysis Session 12 INFM 603. The System Life Cycle Systems analysis –How do we know what kind of system to build? User-centered design –How.
Cloud Computing Project By:Jessica, Fadiah, and Bill.
Systems Analysis and Design in a Changing World, Fourth Edition
Service Level Agreements Service Level Statements NO YES The process of negotiating and defining the levels of user service (service levels) required.
Computer Concepts 2014 Chapter 10 Information Systems Analysis and Design.
Lecture 4. IS Planning & Acquisition To be covered: To be covered: – IS planning and its importance Cost-benefit analysis Cost-benefit analysis Funding.
System Analysis and Library Automation
Connecting with Computer Science2 Objectives Learn how software engineering is used to create applications Learn some of the different software engineering.
Sistemas de Información Agosto-Diciembre 2007 Sesión # 9.
1 The Requirements Problem Chapter 1. 2 Standish Group Research Research paper at:  php (1994)
It’s tough out there … Software delivery challenges.
Data Center Management Microsoft System Center. Objective: Drive Cost of Data Center Management 78% Maintenance 22% New Issue:Issue: 78% of IT budgets.
1 TCS Confidential. 2 Objective : In this session we will be able to learn:  What is Cloud Computing?  Characteristics  Cloud Flavors  Cloud Deployment.
TRANSITION FROM SCADA TO A CLOUD SOLUTION: MARKETING, DESIGN, RESULTS. D GOLOVACHEV.
© 2010 VMware Inc. All rights reserved Why Virtualize? Beng-Hong Lim, VMware, Inc.
Software Development. The Software Life Cycle Encompasses all activities from initial analysis until obsolescence Analysis of problem or request Analysis.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Software Engineering Session 12 INFM 603. Software Software represents an aspect of reality –Input and output represent the state of the world –Software.
Software Development.
Constructing Deploying and Maintaining Enterprise Systems
Requirements Analysis
Presentation transcript:

The System Life Cycle Week 12 LBSC 690 Information Technology

Muddiest Points Search component model –Work a “shuttle launch” example –Term weighting; TF and DF Combining evidence –Content, metadata, behavior –Anchor text Why it doesn’t work better than it does! Precision-Recall curves

Search Component Model Comparison Function Representation Function Query Formulation Human Judgment Representation Function Retrieval Status Value Utility Query Information NeedDocument Query RepresentationDocument Representation Query Processing Document Processing

Agenda Questions Systems analysis Building complex systems Managing complex systems Final exam review

Strategic Choices Acquisition strategy –Off-the-shelf (“COTS”) –Custom-developed Implementation strategy –“Best-of-breed” –Integrated system

Architecture Choices Self-contained (e.g., PDA) –Requires replication of software and data Client-server (e.g., Web) –Some functions done centrally, others locally Peer-to-peer (e.g., Skype) –All data and computation is distributed “Cloud computing” –Centrally managed data and compute centers

Source: Harper’s (Feb, 2002) What do Oregon, Iceland, abandoned mines have in common?

Maximilien Brice, © CERN

Cloud Computing: Rent vs. Buy Centralization of computing resources –Space –Power –Cooling –Fiber Issues: –Efficiency –Utilization –Redundancy –Management

Interaction Modality Choices Interactive (“timesharing”) –Usually multiple processes on one machine –Possibly supporting different users Batch processing (e.g., recall notices) –Save it up and do it all at once

The System Life Cycle Systems analysis –How do we know what kind of system to build? User-centered design –How do we discern and satisfy user needs? Implementation –How do we build it? Management –How do we use it?

Types of Requirements User-centered –Functionality System-centered –Availability Mean Time Between Failures (MTBF) Mean Time To Repair (MTTR) –Capacity Number of users for each application Response time –Flexibility Upgrade path

Systems Analysis First steps: –Understand the task Limitations of existing approaches –Understand the environment Structure of the industry, feasibility study Then identify the information flows –e.g., Serials use impacts cancellation policy Then design a solution –And test it against the real need

Analyze the Information Flows Where does information originate? –Might come from multiple sources –Feedback loops may have no identifiable source Which parts should be automated? –Some things are easier to do without computers Which automated parts should be integrated? What existing systems are involved? –What information do they contain? –Which systems should be retained? – What data will require “retrospective conversion”?

Analyzing Information Flows Process Modeling –Structured analysis and design –Entity-relationship diagrams –Data-flow diagrams Object Modeling –Object-oriented analysis and design –Unified Modeling Language (UML)

Some Library Activities Acquisition Cataloging Reference –Online Public Access Catalog (OPAC) Circulation Weeding Reserve, recall, fines, interlibrary loan, … Budget, facilities schedules, payroll,...

Discussion Point: Integrated Library System What functions should be integrated? What are the key data flows? Which of those should be automated?

The Waterfall Model Requirements Specification Implementation Verification

The Waterfall Model Requirements analysis –Specifies what the software is supposed to do Specification –“Specification” defines the design of the software Implementation Verification –“Test Plan” defines how you will know that it did it Maintenance

The Spiral Model Build what you think you need –Perhaps using the waterfall model Get a few users to help you debug it –First an “alpha” release, then a “beta” release Release it as a product (version 1.0) –Make small changes as needed (1.1, 1.2, ….) Save big changes for a major new release –Often based on a total redesign (2.0, 3.0, …)

The Spiral Model

Some Unpleasant Realities The waterfall model doesn’t work well –Requirements usually incomplete or incorrect The spiral model is expensive –Redesign leads to recoding and retesting

“Rapid” Prototyping Goal: explore requirements –Without building the complete product Start with part of the functionality –That will (hopefully) yield significant insight Build a prototype –Focus on core functionality, not in efficiency Use the prototype to refine the requirements Repeat the process, expanding functionality

Rapid Prototyping + Waterfall Update Requirements Choose Functionality Build Prototype Initial Requirements Write Specification Create Software Write Test Plan

Management Issues Policy –Privacy, access control, appropriate use, … Training –System staff, organization staff, “end users” Operations –Fault detection and response –Backup and disaster recovery –Audit –Cost control (system staff, periodic upgrades, …) Planning –Capacity assessment, predictive reliability, …

Total Cost of Ownership Planning Installation –Facilities, hardware, software, integration, migration, disruption Training –System staff, operations staff, end users Operations –System staff, support contracts, outages, recovery, …

Total Cost of Ownership

Some Examples ProprietaryOpen Source Operating systemWindows XPLinux Office suiteMicrosoft OfficeOpenOffice Image editorPhotoshopGIMP Web browserInternet ExplorerMozilla Web serverIISApache DatabaseOracleMySQL

Some Opinions Bill Gates on Linux (March, 1999): –“I don’t really think in the commercial market, we’ll see it in any significant way.” Microsoft SEC filing (January, 2004): –“The popularization of the open source movement continues to pose a significant challenge to the company’s business model”

Open Source “Pros” More eyes  fewer bugs Iterative releases  rapid bug fixes Rich community  more ideas –Coders, testers, debuggers, users Distributed by developers  truth in advertising Open data formats  Easier integration Standardized licenses

Open Source “Cons” Communities require incentives –Much open source development is underwritten Developers are calling the shots –Can result in feature explosion Proliferation of “orphans” Diffused accountability –Who would you sue? Fragmentation –“Forking” may lead to competing versions Little control over schedule

Iron Rule of Project Management You can control any two of: –Capability –Cost –Schedule Open source software takes this to an extreme

Open Source Business Models Support Sellers Loss Leader Widget Frosting Accessorizing Sell distribution, branding, and after-sale services. Give away the software to make a market for proprietary software. If you’re in the hardware business, giving away software doesn’t hurt. Sell accessories: books, compatible hardware, complete systems with pre-installed software

Hands On: What Goes Wrong? Check out Risks Digest for a random date – –Pick a random date near your birthday Find a case of unexpected consequences Try to articulate the root cause –Not the direct cause

Discussion Points: Managing Complex Systems Critical system availability –Why can’t we live without these systems? Understandability –Why can’t we predict what systems will do? Nature of bugs –Why can’t we get rid of them? Auditability –How can we learn to do better in the future?

Critical Infrastructure Protection Telecommunications Banking and finance Energy Transportation Emergency services Food and agriculture Water Public health Postal and shipping Defense industrial base Hazardous materials SCADA: Supervisory Control and Data Acquisition

National Cyberspace Strategy Response system –Analysis, warning, response, recovery Threat and vulnerability reduction Awareness and training program –Return on investment, best practices Securing government systems International cooperation

Summary Systems analysis –Required for complex multi-person tasks User-centered design –Multiple stakeholders complicate the process Implementation –Architecture, open standards, … Management –Typically the biggest cost driver

The Grand Plan Computers, Networks Web, XML, Social Software MultimediaDatabasesProgrammingSearch Building and Deploying Systems Policy

Data-Intensive Computing NOAA climate data: ~1 PB climate data (2007) Wayback Machine: 2 PB + 20 TB/month (2006) CERN’s LHC: 15 PB a year (2008) Google processes 20 PB a day (2008) All words ever spoken: ~ 5 EB