You were tasked by the IC-dean to evaluate the enrollment system of the university, list and briefly describe the characteristics that an anlayst(you) examines when choosing or defining deployment environment.
The characteristics that an analyst examines when defining deployment environment:
Security Configuration
The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible and productive to its intended users. The term computer system security means the collective processes and mechanisms by which sensitive and valuable information and services are protected from publication, tampering or collapse by unauthorized activities or untrustworthy individuals and unplanned events respectively. The strategies and methodologies of computer security often differ from most other computer technologies because of its somewhat eluding objective of preventing unwanted computer behavior instead of enabling wanted computer behavior.
Security has to be compared to related concepts: Safety, continuity, reliability. The key difference between security and reliability is that security must take into account the actions of people attempting to cause destruction.
Usability Planning
Usability planning provides an important means of managing individual usability activities as well as the overall role played by usability input within a software engineering programme. It defines the scope of usability work required to produce a user- interface design that is efficient, effective and satisfying in use.
Usability planning involves defining and managing user-centred design activities that will take place during the development of a product. A usability plan report is created, which details the scope of selected usability activities and defines actions and time-scales required to implement them. Usability planning should be carried out for all development projects, but in particular development projects purporting a high degree of user-centred design.
Cost benefit analyses of user-centred design activities may be carried out and its results summarised in the first part of the usability plan. Wherever an investment in user-centred design activities is made during development, one or more tasks will be identified. A task manager is appointed for each task, an appropriate activity is selected and a schedule specified. The usability plan is a living document, and undergoes regular reviews as the project progresses.
Benefits
• Ensures that usability work is co-ordinated and not performed in a piecemeal fashion.
• Provides clear visibility of what usability work is going on and what its overall aims are.
• Enables priorities to be assessed, and facilitates the efficient allocation of resources.
However, it is important to remember that usability plans may not be stable because of continually changing project plans. Also, usability plans are constrained by the need to schedule the delivery of results in sufficient time for them to be acted upon by designers and implementers.
Cost and schedule
Identify the deployment pattern or strategy used.
The target deployment environment for an application may already be rigidly defined, and so the application design must reflect the restrictions. Sometimes design tradeoffs are required; for example, because of protocol or port restrictions, or specific deployment topologies. Identify constraints early in the design phase to avoid surprises later, and involve members of the network and infrastructure teams to help with this process.
Sources: http://en.wikipedia.org/wiki/Security
http://www.usabilitynet.org/tools/planning.htm
The characteristics that an analyst examines when defining deployment environment:
Security Configuration
The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible and productive to its intended users. The term computer system security means the collective processes and mechanisms by which sensitive and valuable information and services are protected from publication, tampering or collapse by unauthorized activities or untrustworthy individuals and unplanned events respectively. The strategies and methodologies of computer security often differ from most other computer technologies because of its somewhat eluding objective of preventing unwanted computer behavior instead of enabling wanted computer behavior.
Security has to be compared to related concepts: Safety, continuity, reliability. The key difference between security and reliability is that security must take into account the actions of people attempting to cause destruction.
Usability Planning
Usability planning provides an important means of managing individual usability activities as well as the overall role played by usability input within a software engineering programme. It defines the scope of usability work required to produce a user- interface design that is efficient, effective and satisfying in use.
Usability planning involves defining and managing user-centred design activities that will take place during the development of a product. A usability plan report is created, which details the scope of selected usability activities and defines actions and time-scales required to implement them. Usability planning should be carried out for all development projects, but in particular development projects purporting a high degree of user-centred design.
Cost benefit analyses of user-centred design activities may be carried out and its results summarised in the first part of the usability plan. Wherever an investment in user-centred design activities is made during development, one or more tasks will be identified. A task manager is appointed for each task, an appropriate activity is selected and a schedule specified. The usability plan is a living document, and undergoes regular reviews as the project progresses.
Benefits
• Ensures that usability work is co-ordinated and not performed in a piecemeal fashion.
• Provides clear visibility of what usability work is going on and what its overall aims are.
• Enables priorities to be assessed, and facilitates the efficient allocation of resources.
However, it is important to remember that usability plans may not be stable because of continually changing project plans. Also, usability plans are constrained by the need to schedule the delivery of results in sufficient time for them to be acted upon by designers and implementers.
Cost and schedule
Identify the deployment pattern or strategy used.
The target deployment environment for an application may already be rigidly defined, and so the application design must reflect the restrictions. Sometimes design tradeoffs are required; for example, because of protocol or port restrictions, or specific deployment topologies. Identify constraints early in the design phase to avoid surprises later, and involve members of the network and infrastructure teams to help with this process.
Sources: http://en.wikipedia.org/wiki/Security
http://www.usabilitynet.org/tools/planning.htm