Nowadays technology is really indispensable in a community. Mostly people depend on the technology it has become necessary to understand the importance of technology so that we can keep up with the racing time. Technology has become important in the fast life of today. We can't deny the fact that with the use of technology we can do things easier.
It is very essential to study technology because it allows people to utilize tools that allow overcoming of mental and physical boundaries. There are many discoveries that really help people to do a thing. Example the internet made it possible for this information to reach far and wide, the students can make their research and assignment easily and comfortable because the information they needed is already in the internet. Another discovery is the Radio communication has made it possible to broadcast programs that can reach to radios in the remotest households. Besides people aware of the happenings of the world and the latest news. After the discovery of electricity, technology was employed to bring electricity to households in every corner of the world. The world could light up in the dark, thanks to the effective generation and distribution of electricity. People use technology in everyday life, such as farming, and things like that. So if we didn't have technology it would be a way slow process with a bunch of unhappy people that want things now. There are so many examples of technology and why people need it. Thanks to technology, many of the critical and time-consuming processes have been automated. Technology has the potential of changing the face of the world. In addition With the developments in technology, we may be able to enjoy all the pricey luxuries but miss out on the little priceless joys of life.
Friday, December 10, 2010
Why do we need study technology?
Posted by ApRiL KAye BiGonTe at 11:48 AM 0 comments
Labels: Future Technology
Friday, October 15, 2010
Assingnment 4 (SAD)
Contrast and discuss the enrolment input form (PRF) with the enrolment university interface. (at least 1000words, not to include illustrations/figures/diagrams)
SRIS from Joan Dandoy of the University Enrollment System
PRF it is a form which the students needs it during enrollment.It contains the basic requirement for the enrollment process.
SRIS it is an automated system that will arrange the information.
Posted by ApRiL KAye BiGonTe at 12:44 PM 0 comments
Assingnment 3 (SAD2)
Interview your university network specialist. Ask how various parts of the system communicates with each other throughout the university. (Q) Given the chance to redesign the existing setup, enumerate and discuss your keypoints for an effective and efficient network environment ideal for the university.
(at least 3000 words)
Here are the questions being asked to a network specialist in university:
1. In system development, how various parts of the system communicate with each other throughout the university? In what way?
Answer: Regarding System Development, the best person to ask is our University Programmers, Mr. Fortich and Dr. Mercado.
2. What are the components involved in the system(s) in the university? (hardware, software, technology, etc.)
Answer: I am not in the right position to discuss the details of the software components used as there are other assigned personnel for such job. However, talking about hardware component and technology used, basically I, assigned as the network administrator, is entrusted to maintain our different servers to run 24/7. Currently, we have our Web Server hosted here in our University in our HP ProLiant ML350 Server. Its an old but stable server set-up here in our Networks Office and has been active since Engr. Val A. Quimno , not yet a dean, was appointed as the Network Administrator. The said server has the following specification:
• Intel Xeon 3.0 GHz, 3.2 GHz, or 3.4 GHz processors (dual processor capability) with 1MB level 2 cache standard. Processors include support for Hyper-Threading and Extended Memory 64 Technology (EM64T)
• Intel® E7520 chipset
• 800-MHz Front Side Bus
• Integrated Dual Channel Ultra320 SCSI Adapter
• Smart Array 641 Controller (standard in Array Models only)
• NC7761 PCI Gigabit NIC (embedded)
• Up to 1 GB of PC2700 DDR SDRAM with Advanced ECC capabilities (Expandable to 8 GB)
• Six expansion slots: one 64-bit/133-MHz PCI-X, two 64-bit/100-MHz PCI-X, one 64-bit/66-MHz PCI-X, one x4 PCI-Express, and one x8 PCI-Express
• New HP Power Regulator for ProLiant delivering server level, policy based power management with industry leading energy efficiency and savings on system power and cooling costs
• Three USB ports: 1 front, 1 internal, 1 rear
• Support for Ultra320 SCSI hard drives (six hot plug or four non-hot plug drives supported standard, model dependent)
• Internalstorage capacity of up to 1.8TB; 2.4TB with optional 2-bay hot plug SCSI drive
• 725W Hot-Plug Power Supply (standard, most models); optional 725W Hot-Pluggable Redundant Power Supply (1+1) available. Non hot plug SCSI models include a 460W non-hot plug power supply.
• Tool-free chassis entry and component access
• Support for ROM based setup utility (RBSU) and redundant ROM
• Systems Insight Manager, SmartStart, and Automatic Server Recovery 2 (ASR-2) included
• Protected by HP Services and a worldwide network of resellers and service providers. Three-year Next Business Day, on-site limited global warranty. Certain restrictions and exclusions apply. Pre-Failure Notification on processors, memory, and SCSI hard drives.
Aside from it, our mail server running under Compaq Proliant ML330 Server, our oldest server, is also hosted here in our Networks Office. Together with other Servers, such as Proxy and Enrollment Servers, both proxy and our enrollment servers are running in a microcomputer/personal computers but with higher specifications to act as servers.
3. How do these communicate with one another? (topology, network connectivity, protocols, etc.) – may include data flow/ UML diagrams to better explain.
All Servers are connected in a shared medium grouped as one subnetwork. In general, our network follows the extended star topology which is connected to a DUAL WAN Router that serves as the load balancer between our two Internet Service Providers. All other workstations are grouped into different subnetworks as in star topology branching out from our servers subnetwork as in extended star topology. At present, we are making use of class C IP Address for private IP address assignments. Other workstations IP assignments are configured statically (example: laboratories) while others are Dynamic (example: offices). All workstations are connected via our proxy servers that do some basic filtering/firewall to control users access to the internet aside from router filtering/firewall management. So, whenever any workstation has to connect to the internet, it has to pass through software and hardware based firewall.
4. What are the processes involved in the communication (each system to other systems)?
As mentioned above, in item 3, all workstations are connected via a proxy server. It means that whenever a workstation is turned on, it requests for an IP address from the proxy server (for dynamically configured IP address) and connect to the network after IP address is acquired. As connection is established, each system can now communicate and share resources within the same subnetwork and to server following the concepts discuss in your Computer Network Class.
5. How do you go along with the maintenance of the system?
Basically, our servers are expected to be in good condition since it is required to be up 24/7. Daily, during my vacant period, monitoring on the servers are observed that includes checking logs, checking hardware performance such as CPU health, etc. If problems are observed, remedies are then and then applied. Once in a week, regular overall checkup is observed as preventive maintenance to ensure not to experience longer downtime if possible.
6. Does the system follow a specific standard? Explain Please.
As I was appointed as the Network Administrator, everything was already in place except for some minor changes. Basically, different networking standards was already observed such as cabling standards, TIA/EIA 568A-B, different IEEE standards as discussed in your Computer Networks Subject, etc.
7. How is the security of the system? Are there any vulnerabilities? Risks? Corresponding mitigation techniques? Access control?
As I have mentioned, we have implemented both software and hardware based filtering/firewall. Basically, Risks or vulnerabilities and different mitigation techniques were considered to increase security in our network. Aside from filtering/firewall, constant monitoring on networks activity also increases the security of the system.
8. Are there any interference? During what (most) times do these occur? Explain their effects especially with regards to the business of the university?
Major Interferences are normally encountered as an effect of unforeseen and beyond our control events such as black outs, and the like. The said interference would of course affect University’s day-to-day businesses for obviously this will paralyze all our activities that rely on electricity and further this might cause damage on our network devices, etc. that may later be the reason for longer downtime. Problems encountered by our providers such as connection to the National/International Gateway also affect University’s business such as correlating to University’s Business Partners outside and within the country.
Posted by ApRiL KAye BiGonTe at 12:37 PM 0 comments
Assingnment 2 (SAD2)
Relative to your answer in Assignment 1 .... what's your take on the design of the enrollment system?
As a student of a state university it is a burden for us during enrollment time as we observe it has many process to be considered in order for us to enroll, and we can help to lessen the burden of the students in this university during enrollment days.
As what i've noticed on the design of the enrollment system it is good but we need to develop it more just like lessen the steps of enrollment process so that the students can do their other concerns.
Laughing
Posted by ApRiL KAye BiGonTe at 12:31 PM 0 comments
Assingnment 1 (SAD2)
Assuming you were tapped by the university president to evaluate the new enrollement system implemented this semester, enumerate your observations/comments and suggest possible areas and ways where improvements can be made. Your observations/suggestions should be properly validated with facts and literatures...(you may start with the diagrams posted in the strategic locations of the university)... (1000words)
I think the new enrollment system may have numerous advantages technically but for me as a student, I think that the new system’s procedure has a very slight difference compared from the old enrollment system. In my own opinion, I believed that more than anything else, the admin should find ways to help lessen the burden of the students in this university. I suggest that it would be better if they will also find ways to simplify the procedure and not just change the software system alone. Although it is too early to judge the new system, I believed that they should consider these factors. I believed that the newly implemented system will still undergo several revisions because the developers were only given a very limited period of time to implement the said system.
Posted by ApRiL KAye BiGonTe at 12:27 PM 0 comments
Wednesday, June 9, 2010
Assignment 11 (SAD 1)
You were tasked by the IC-dean to evaluate the enrollment system of the university, list and briefly describe the characteristics that an anlayst(you) examines when choosing or defining deployment environment. (at least 500 words)
You were tasked by the IC-dean to evaluate the enrollment system of the university, list and briefly describe the characteristics that an analysts (you) examines when choosing or defining deployment environment. (At least 500 words)
It is very important to consider the deployment environment in developing a system because it helps also IT people enhance their skills.
Let me define deployment environment. As I have my research, I found out that deployment environment or application deployment environment comprises the computer hardware (specifically computer platforms), operating systems, system software, and networks that will hold up the application program.
In evaluating the enrollment system of our university there are some characteristics on the analyst in choosing the deployment environment for the particular system one of this is that
The system requirements may refer to the functional and non-functional requirements of a system that will be deployed. Conducting an analysis on system requirements would be beneficial to the future system or application that will be deployed, hardware and software interfaces and also to human involvement in the system. That is because determining the compatibility with system requirements would show whether what is needed to be given and to be done in order to run the application.
Consider the topology. As a system analyst, you have to select the best networking topologies suited for the system.
The location or area to be deploy on the system. It is essential to consider the location because this place where the developers/ analyst deploying the system. It’s clear that most of the locations in deploying the system are located in the MIS offices, server rooms, network and system’s office and sometimes the control room.
Compatibility among hardware and system software. Of course, compatibility of the application, hardware and system component must be considered. This would check whether your application has reached the minimum and/or maximum requirements on the hardware interfaces.
As an analyst, I should oversee the development, deployment, and direction of complex programs and processes as part of the tactical execution. Good communication skill is also required. Analyst must communicate clearly and concisely both on verbal and written.
Reference:
http://www.google.com.ph/url?sa=t&source=web&ct=res&cd=2&ved=0CA0QFjAB&url=http%3A%2F%2Fhercules.gcsu.edu%2F~adahanay%2Fcbis3210%2FChapter%25208-reviewQ.doc&rct=j&q=characteristics+that+an+anlayst+examines+when+choosing+or+defining+deployment+environment.&ei=7FaOS7mdBorsswOTm7HbCA&usg=AFQjCNEjAujz6gbFma0-N7KpwUDhwRvsbw
Posted by ApRiL KAye BiGonTe at 4:55 AM 0 comments
Assignment 10 (SAD 1)
With reference to assignments 8 and 9, what characteristics does an analyst (you) examine when evalauating DFD quality? (1500 words)
Before going through the characteristics that an analyst must have in order to properly evaluate a DFD, let us first define what Data Flow Diagram is and how to create it. After showing the basics of a DFD, I will enumerate and briefly explain the characteristic as based on the previous assignments.
What is a DFD?
A data-flow diagram (DFD) is a graphical representation of the "flow" of data through an information system. DFDs can also be used for the visualization of data processing (structured design). A DFD provides no information about the timing of processes, or about whether processes will operate in sequence or in parallel. It is therefore quite different from a flowchart, which shows the flow of control through an algorithm, allowing a reader to determine what operations will be performed, in what order, and under what circumstances, but not what kinds of data will be input to and output from the system, nor where the data will come from and go to, nor where the data will be stored (all of which are shown on a DFD).
The data flow diagram has a purpose and it provide a semantic semantic bridge between users and systems developers. And it diagrams are first graphical, eliminating thousands of words; second is logical representations, modeling WHAT a system does, rather than physical models showing HOW it does it; third is hierarchical, showing systems at any level of detail; and last jargonless, allowing user understanding and reviewing
One of the characteristic for the evaluation of the DFD quality: Completeness. DFDs offer a way to check the completeness of the process model, particularly with regards to the understanding of the data that would be required by an information system (e.g., is all the data that would be needed for input actually available? Does each processing step produce data that could be used by subsequent steps? Is all data generated usable by an information system where necessary?). DFDs can provide a fast way to generate further questions that need to be asked about the process.
All diagrams must have a basic DFD symbol present for the system.
Here are examples of symbol of a DFD using Gane and Sarson notation.
*Squares representing external entities, which are sources or destinations of data.
*Rounded rectangles representing processes, which take data as input, do something to it, and output it.
*Arrows representing the data flows, which can either, be electronic data or physical items.
*Open-ended rectangles representing data stores, including electronic stores such as databases or XML files and physical stores such as or filing cabinets or stacks of paper.
Data flow Diagram symbols:
Reference:
http://www.agilemodeling.com/artifacts/dataFlowDiagram.htm
Posted by ApRiL KAye BiGonTe at 4:52 AM 0 comments
Assignment 9 (SAD 1)
Create at least 3 different types of Data flow diagram of USEP's pre-enrollment system
Posted by ApRiL KAye BiGonTe at 4:49 AM 0 comments
Assignment 8 (SAD 1)
Using the same narrative as refelcted in your assignment 4, develop an activity diagram and a fully developed description for a use case.
Activity diagrams are graphical representations of workflows of stepwise activities and actions with support for choice, iteration and concurrency
Posted by ApRiL KAye BiGonTe at 4:47 AM 0 comments
Assignment 7 (SAD 1)
Consider USEP's pre-enrollment system, develop a use case diagram and write a brief use case description.
Posted by ApRiL KAye BiGonTe at 4:45 AM 0 comments
Assignment 6 (SAD 1)
Consider the following dialogue between a systems professional, John Juan, and a manager of a department targeted for a new information system, Peter Pedro:
Juan: The way to go about the analysis is to first examine the old system, such as reviewing key documents and observing the workers perform their tasks. Then we can determine which aspects are working well and which should be preserved.
Pedro: We have been through these types of projects before and what always ends up happening is that we do not get the new system we are promised; we get a modified version of the old system.
Juan: Well, I can assure you that will not happen this time. We just want a thorough understanding of what is working well and what isn’t.
Pedro: I would feel much more comfortable if we first started with a list of our requirements. We should spend some time up-front determining exactly what we want the system to do for my department. Then you systems people can come in and determine what portions to salvage if you wish. Just don’t constrain us to the old system.
Required:
a.Obviously these two workers have different views on how the systems analysis phase should be conducted. Comment on whose position you sympathize with the most.
b.What method would you propose they take? Why?
On the conversation of Juan and Pedro It is very important in planning a system to listen the both sides, Juan and Pedro and then decide what is the best for the system they have been discuss. As IT professional, he must examine the old system that company wants to do. Since, the manager has planned to develop a new system which previously ended was the modified version of old system. It professionals are mostly depend on the requirements of the client. And he ask his client to identify the possible scenarios based on the old system set by the client. As a clienthe must know the whole scenario set by the old system and he must find a best strategy and adding new requirements in order to establish the new system. Also, he experienced his past scenarios and ended up a modified version of the said system. And he ended up unsatisfied.
On creating a system there are a lot of methods would be useful to the development. There are a lot of process models which can be functional, but they should choose which can be more fitted on creating their system.
I would like to propose a Software Life Cycle Model
A software life cycle model is either a descriptive or prescriptive characterization of how
software is or should be developed. A descriptive model describes the history of how a particular
software system was developed. Descriptive models may be used as the basis for understandingand improving software development processes, or for building empirically grounded prescriptive models (Curtis, Krasner, Iscoe, 1988). A prescriptive model prescribes how a new software system should be developed. Prescriptive models are used as guidelines or frameworksto organize and structure how software development activities should be performed, and in what order. Typically, it is easier and more common to articulate a prescriptive life cycle model for how software systems should be developed. This is possible since most such models are intuitive or well reasoned. This means that many idiosyncratic details that describe how a software systems is built in practice can be ignored, generalized, or deferred for later consideration. This, of course, should raise concern for the relative validity and robustness of such life cycle models when developing different kinds of application systems, in different kinds of development settings, using different programming languages, with differentially skilled staff, etc. However,prescriptive models are also used to package the development tasks and techniques for using a given set of software engineering tools or environment during a development project. On Tactical processes help in the achievement of a plan are more concerned with the tactics to be adopted for actual plan achievement than with the development of a plan of achievement. Lastly, Implementation processes are the lowest level processes are directly concerned with the details of the what an how of plan implementation.
One of the System life cycle model
Reference:
http://www.ics.uci.edu/~wscacchi/Papers/SE-Encyc/Process-Models-SE-Encyc.pdf
Posted by ApRiL KAye BiGonTe at 4:42 AM 0 comments
Assignment 5 (SAD 1)
Consider your school, how do you know that the life cycle was developed specifically for the university. How do we know it meets our needs? at least 500 words ..
In assignment 5 it tends to discuss how life cycle was develop and how do we know that it meets our needs. It’s an honor for me to be part and one of the student of the University of Southeastern Philippines. In developing the life cycle of the university it takes time and as what I have observe Our university requires a big real time system that could be adaptive to any changes that may occur from time to time. The vital parts of the system are the data, records or accounts, the system governance flow, and the management which must be taken care of seriously. Since it caters educational related professions, it is expected to last for a long period of time be it in a number of decades or century. An exclusive system for the university itself must be able to support the university needs and that would last up to the university’s existence. Yes It meets our needs.
We should discuss what is a system life cycle development:
Systems Development Life Cycle
According to the free encyclopedia the wikipedia "The Systems Development Life Cycle (SDLC), or Software Development Life Cycle in systems engineering and software engineering, is the process of creating or altering systems, and the models and methodologies that people use to develop these systems”.
Organizations should review and complete user, operator, and maintenance manuals during the testing phase. Additionally, they should finalize conversion, implementation, and training plans. In System Development Life Cycle methodology there are steps that an IT people or the organization should follow first If there is an existing system, its deficiencies are identified. This is accomplished by interviewing users and consulting with support personnel.Second The new system requirements are defined including addressing any deficiencies in the existing system with specific proposals for improvement. Third The proposed system is designed. Plans are created detailing the hardware, operating systems, programming, and security issues. Forth The new system is developed. The new components and programs must be obtained and installed. Users of the system must be trained in its use, and all aspects of performance must be tested. If necessary, adjustments must be made at this stage.Fifth The system is put into use. This can be done in various ways. The new system can phased in, according to application or location, and the old system gradually replaced. In some cases, it may be more cost-effective to shut down the old system and implement the new system all at once. And lastly Once the new system is up and running for a while, it should be exhaustively evaluated. Maintenance must be kept up rigorously at all times. Users of the system should be kept up-to-date concerning the latest modifications and procedures. It is very important to for us students to be aware of what the university being developed and how to implement and most especially follow the steps of SDLC.
References:
http://en.wikipedia.org/wiki/Systems_Development_Life_Cycle
Posted by ApRiL KAye BiGonTe at 4:40 AM 0 comments
Assignment 4 (SAD 1)
Identify and discuss at least 3 systems development models .. discuss each phases ... (at least 500 words/model).
There are many systems development models that can help IT people and having these models there are strategies what should be done for the system and help create the algorithm of the program.
Before any software is made there is a process to go through to make it work. It passes through phases to make it as faultless as possible for the users. It might go through planning, coding, developing and other steps before one can create a software system work. This now relates to process model. If I were to define it from the word itself it is a flow of steps to organize the building or engineering of a software system. For a better understanding and for a more concrete definition, here follows the definition of process model from Wikipedia.
“Process models are processes of the same nature that are classified together into a model. Thus, a process model is a description of a process at the type level. Since the process model is at the type level, a process is an instantiation of it. The same process model is used repeatedly for the development of many applications and thus, has many instantiations. One possible use of a process model is to prescribe how things must/should/could be done in contrast to the process itself which is really what happens. A process model is roughly an anticipation of what the process will look like. What the process shall be will be determined during actual system development.”
According to Kerem Kosaner (2008), Process models are processes of the same nature that are classified together into a model. Thus, a process model is a description of a process at the type level. Since the process model is at the type level, a process is an instantiation of it. The same process model is used repeatedly for the development of many applications and thus, has many instantiations. One possible use of a process model is to prescribe how things must/should/could is done in contrast to the process itself which is really what happens. A process model is roughly an anticipation of what the process will look like. What the process shall be will be determined during actual system development. Here are some Process models:
Waterfall Model
It is one of a process model, by definition waterfall model is a popular version of the systems development life cycle model for software engineering. Often considered the classic approach to the systems development life cycle, the waterfall model describes a development method that is linear and sequential. Waterfall development has distinct goals for each phase of development. Imagine a waterfall on the cliff of a steep mountain. Once the water has flowed over the edge of the cliff and has begun its journey down the side of the mountain, it cannot turn back. It is the same with waterfall development. Once a phase of development is completed, the development proceeds to the next phase and there is no turning back. There are phases of Waterfall model here are the following :
Phase 1: A Software Requirements Specification (SRS) is a complete description of the behavior of the system to be developed. It includes a set of use cases that describe all the interactions the users will have with the software. Use cases are also known as functional requirements. In addition to use cases, the SRS also contains non-functional (or supplementary) requirements. Non-functional requirements are requirements which impose constraints on the design or implementation (such as performance engineering requirements, quality standards, or design constraints).
Phase 2: Software design is a process of problem-solving and planning for a software solution. After the purpose and specifications of software are determined, software developers will design or employ designers to develop a plan for a solution. It includes low-level component and algorithm implementation issues as well as the architectural view.
Phase 3: Implementation is a realization of a technical specification or algorithm as a program, software component, or other computer system. Many implementations may exist for a given specification or standard. For example, web browsers contain implementations of World Wide Web Consortium-recommended specifications, and software development tools contain implementations of programming languages.
In the IT Industry, implementation refers to post-sales process of guiding a client from purchase to use of the software or hardware that was purchased. This includes Requirements Analysis, Scope Analysis, Customizations, Systems Integrations, User Policies, User Training and Delivery. These steps are often overseen by a Project Manager using Project Management Methodologies set forth in the Project Management Body of Knowledge. Software Implementations involve several professionals that are relatively new to the knowledge based economy such as Business Analysts, Technical Analysts, Solutions Architect, and Project Managers.
Phase 4: Verification is a methodical process of finding and reducing the number of bugs, or defects, in a computer program or a piece of electronic hardware thus making it behave as expected. Debugging tends to be harder when various subsystems are tightly coupled, as changes in one may cause bugs to emerge in another.
Phase 5: Software maintenance in software engineering is the modification of a software product after delivery to correct faults, to improve performance or other attributes, or to adapt the product to a modified environment.
Spiral Model
The spiral model, also known as the spiral lifecycle model, is a systems development method (SDM) used in information technology (IT). This model of development combines the features of the prototyping model and the waterfall model. The spiral model is intended for large, expensive, and complicated projects.
This is the phase of the spiral model wherein we determine the objectives, alternatives and constraints.
Objectives: functionality, performance, hardware/software interface, critical success factors, etc.
Alternatives: build, reuse, buy, sub-contract, etc.
Constraints: cost, schedule, interface, etc.
The Spiral Model has its strengths as a process model and these are as follows:
• Provides early indication of insurmountable risks, without much cost
• Users see the system early because of rapid prototyping tools
• Critical high-risk functions are developed first
• The design does not have to be perfect
• Users can be closely tied to all lifecycle steps
• Early and frequent feedback from users
• Cumulative costs assessed frequently
If the Spiral Model has its strengths, it also has weakness as a process model. These are as follows:
• Time spent for evaluating risks too large for small or low-risk projects
• Time spent planning, resetting objectives, doing risk analysis and prototyping may be excessive
• The model is complex
• Risk assessment expertise is required
• Spiral may continue indefinitely
• Developers must be reassigned during non-development phase activities
• May be hard to define objective, verifiable milestones that indicate readiness to proceed through the next iteration
V-Model
One of the process model , by definition The V-model is a software development process which can be presumed to be the extension of the waterfall model. Instead of moving down in a linear way, the process steps are bent upwards after the coding phase, to form the typical V shape. The V-Model demonstrates the relationships between each phase of the development life cycle and its associated phase of testing.
The V-model deploys a well-structured method in which each phase can be implemented by the detailed documentation of the previous phase. Testing activities like test designing start at the beginning of the project well before coding and therefore saves a huge amount of the project time.
The V-model has a two major phases it is the Verification Phases and Validation Phases. In the verification phases it discuss the Requirements analysis, System Design, Architecture Design and Module Design and in the validation phases it discuss Unit Testing, Integration Testing, System Testing and User Acceptance Testing.
References:
http://www.acmesoffware.com/acme/default.asp
http://en.wikipedia.org/wiki/Capability_Maturity_Model
http://en.wikipedia.org/wiki/Waterfall_model
http://en.wikipedia.org/wiki/V-Model_
Posted by ApRiL KAye BiGonTe at 4:38 AM 0 comments
Assignment 3 (SAD 1)
Discuss the role of a systems analyst as a project manager. (at least one thousand words) .... you need to interview an analyst/project manager ..
The third assignment also related in assignment 2 which discuss the role of a system analyst as project manager. Same in Assignment 2 we visited the Rhine Marketing for an interview regarding for our assignment. During our interview, we have been given a chance to ask some question. To answer that question, we approached Mr. Chris Abella of Rhine Marketing. Concerning our interview it is about systems analyst, but regarding the role of a project manager Mr. Chris give us few information yet is also the same in role of system analyst. He has also touched the some discussions in which some of our assignments are answered prior to its post. That’s why, we are able to answer our assignments and tackle about our discussion. That made me think that we are lucky and should I say thankful enough to interview IT people.
It is very important to have a Project Manager / Business System Analyst because project manager will be responsible for the project planning, execution, and implementation of technology-enabled solutions to an internal business unit which provides revenue generating services for the district. In addition to the project management responsibilities, this position requires demonstrated abilities to partner, collaborate and manage the relationship of a customer –focused and excellence driven team. The right candidate will have extensive organizational, strong leadership and relationship management skills in a multifaceted matrix organization. As the Project Manager / Business System Analyst you will be a full partner with the business unit in setting the strategic vision for future growth and expansion.
Posted by ApRiL KAye BiGonTe at 4:34 AM 0 comments
Friday, April 30, 2010
Assignment 2(SAD1)
Interview a Systems Analyst and ask what skills and characteristics must a systems analyst develop in order to be more effective in any design modeling process [include in your answer evidences (pix, ltrs, etc)]? At least 1000 words excluding your evidences.
Assignment 2 tends to discuss what skills and characteristics must a system analyst develop in order to be more effective in any design modeling process. Recently we have interviewed Sir Chris of Rhine Marketing. He is a system analyst and According to him as a system analyst it is not only a programming language and it is very essential to consider the time limit of the system being favor by the client, he said also that good communication and socialization to your team mate is a very effective way on developing a good system. But of course he said that in order to become an analyst you should have enough knowledge or at least finished a degree course related to this job. According to him also as a system analyst it should well-verse in the procedure in making a system so that it is easy to resolve the problem being experience of the system also consistent in hardware, update the information from time to time because of the rapid changes of technology, and adapt changes as time goes by.
Sir Chris also discuss us that the worst thing he experienced is that from manual to computerization because as we all know nowadays it is very important to be more knowledgeable in new technology being developed by the IT people. Also consider in designing program it is essential to know the procedure and application of the system in order to easily implement by the user that it is advantage to the user.
The other question that we ask to him is "What are the qualities or Characteristics should a system analyst have?" I summarized his answers in order to become a system analyst; you should have finished a computer science degree course or information technology degree course. An analyst should have knowledge on computer programs for different purposes. Skills are the most effective way to become a better system analyst, skill such as effective conveying information to other people, can appropriately communicate with other people for documenting data, logic and reasoning skills for identifying the strength and weaknesses of alternative solutions or approach to the problem. Can understand the needs of other people. In Skills As what the system analyst being shares to us it very important to adapt the new technology
Technical Understanding Skills:
•Possesses understanding in the areas of application programming, database and system design.
•Understands Internet, Intranet, Extranet and client/server architectures.
•Understands how legacy and web-based systems interface with each other.
•Architect technical web solutions in support of corporate IT/business objectives.
•Review technical designs & specifications and identify website or system deficiencies, and thereby recommending appropriate solutions.
•Support and maintain the existing corporate website and functionalities, including documentation of functional and systems specifications.
•To undertake research and investigation for all development related technologies, techniques, best-practices and forums.
What is the importance of SDLC?
The importance of using software development lifecycle is that it helps systems analyst to develop an information system in an organized way for, it has phases -- including requirements, validation, training, and user ownership through investigation, analysis, design, implementation, and maintenance. In developing project using SDLC you cannot jump into the next phase if the current phase you are working is not yet done for, in most cases the output of the first phase happened to be the input of the succeeding phase. That’s why for the documenter to feel at ease in documenting the project he/she must set timelines and work breakdown structures to manage each phases of the cycle effectively.
[img]
Posted by ApRiL KAye BiGonTe at 7:44 AM 0 comments
Tuesday, April 27, 2010
Assingment1(SAD!)
Assignment 1
Based on your learning’s of chapter 1 identify and discuss some characteristics you have as a good system analyst. At least 1000 words.
In chapter 1 I learned that as a system analyst it is not only about programming yet it has other responsibilities that really help in making a project. During the time that the reporters discuss the first chapter which is the “The World of the Information System Analyst”. I realized that As a system analyst its an advantage to have a good skills in programming because as we all know system analyst design a system therefore before they can expand their idea for the particular system to become a good and reliable system he must know the feasibility of each phase of the model that are going to use to develop the system and one of those phase is implementation phase which is dealing with programming. I learned also that in this chapter it explain the key role of a systems analyst in business, describe the various types of systems an analyst might work on, explain the importance of technical, people, and business skills for an analyst, explain why ethical behavior is crucial for a system analyst’s career, describe various job titles and places of employment where analysis and design work is done and discuss the analyst role in a system development project.
As a System Analyst it is very important that he/she understand how people Think, Learn, React to change, Communicate, motivating people, obtaining information, getting cooperation, interpersonal and communication skills also crucial and understanding the complexity and workings of an organization in order to provide necessary support.
Here are some characteristics as a good system analyst:
People Oriented- is one of the factors that should be consider to become an effective analyst is to establish good interpersonal relationship with his/her team so they can work effectively as they share their ideas and skills with each other. I always establish good relationship with other people. I believe that acknowledging their strength is one way of making them realize what makes them important and how will they become the best that they could be. In which it maybe leads them to be more competitive not only to others but to them selves. So they can be more effective in their career as individuals. Also, I have learned in life that you should not criticized vocally because it will be treated against you, instead let them realized their mistakes as it will give them the impact enough for them to realize and become a better person.
Communication Skills - Communication is best achieved through simple planning and control. Most conversations sort of drift along; in business, this is wasteful; as a manager, you seek communication rather than chatter. To ensure an efficient and effective conversation, there are three considerations: you must make your message understood, you must receive/understand the intended message sent to you, and you should exert some control over the flow of the communication .The analyst must be a good listener and be able to react to what people say. The system analyst must be able to communicate in writing and orally. I believe that I can communicate well in both written and oral. As with most personal skills oral communication cannot be taught. Instructors can only point the way. So as always, practice is essential, both to improve my skills generally and also to make the best of each individual presentation I make.
Has Time Management – As good systems analyst must be a time conscious and must manage his/her time. Why? Some of the consultation and project design proposals requires strict deadlines. Also, he/she must be able to cope up with the deadlines and project durations. Be sure that your task will be done on-time and accurately because a single mistake wastes much time and effort for the particular project or a module. If you’re assigned to two or more modules which will end from a day or more, he/she must make a strategy in order to finish it within the deadline. He also thinks that time will be the valuable for this project. Why? A waste of time could also be waste of money and resources and you will end up in a risk for project failures.
Competitive in some aspect - As an analyst he/she must foresee things to be better. Being competitive is one of the characteristic an analyst should posses so that he/she will persistently aim for improvement. As a human I am competitive enough because I am surviving in life.. Also, dealing with problems in life and the risk we encounter are some factors that mold us to be more competitive.
Patience -This is the most important characteristics of becoming systems analyst. Why? To become a good systems analyst, you must have to be patient in terms of the factors that ended up in project failures. You have to control your temper and mood when you’re interacting with stakeholders, programmers, business analyst and more. You have to endure your mind for possible big projects.
Problem Solver- a System Analyst solves business problems using information system technology. Problem Solving means looking into business problem in great detail, completely understanding problem, and choosing best solution. It is very essential role of a system analyst because it helps to solve the problem being experienced of the people involve in the project and also the system being implemented. As a problem solver it has computer technology knowledge and programming expertise, understands business problems, uses logical methods for solving problems, has fundamental curiosity, wants to make things better and is more of a business problem solver than a technical programmer. A great skill to have is the ability to solve problems effectively. Not only that, it's also a great skill to teach students. There are a few key requirements to solve problems effectively. In and out of the classroom, we're often confronted with problems and effective problem solvers often employ a few key remedies.
Reference:
www.itk.ilstu.edu/.../Chapter%201%20-%20System%20Analyst.ppt
Posted by ApRiL KAye BiGonTe at 6:37 AM 0 comments
Wednesday, March 17, 2010
Assignment 7(MIS2)
oogle is a highly successful Internet business. Recently they have broadened their scope with a multitude of new tools. Research Google’s business model and answer the following questions below. You may add additional information not included in these questions.
Questions :
Explain Google’s business model.
1. Who are their competitors?
2. How have they used information technology to their advantage?
3. How competitive are they in the market?
4. What new services do they offer?
5. What makes them so unique?
The challenge, and how Google AdWords fits in
Acquiring business and recognition in a highly competitive market was the key initial challenge that PurelyGadgets faced. Initially PurelyGadgets toyed with the idea of taking a hands-off approach to their advertising, by hiring a company who would take care of it for them. This approach wasn’t successful however, as Lim explains. “We believed that we could do this better [than an outside company] because we know our products and services.” Instead, PurelyGadgets turned to Google AdWords to assist them in creating an online presence. “I actually learned about online advertising from Google,” admits Lim. “We find Google very easy to use. The main reason is that we can control the budget so easily. We were a very new start-up company then and we were very concerned with costs and Google let us see…results within twenty-four hours.”
Advancing with AdWords
Having begun trading from home in 2004, as a company of four to five employees, PurelyGadgets now employs over 40 people in their London based offices. “We grew about 700% over the past two years,” declares Lim. “Without using Google we would not grow this fast.”
Expanding further on this point, Lim says “Google initially put us on a par with other big brands…I think Google is a trusted brand…the demographic feels more confident buying from us…because they see us from Google…If you’re looking at increasing market share, branding…and also customer acquisition… Google is a much better choice because it has a much bigger audience.”
Google tools
Given the competitiveness of the market in which PurelyGadgets operates it is necessary for them to be both extremely dynamic and make full use of all AdWords features available to them. This is something which they do to excellent effect, as Lim explains. “We eliminate a lot of unqualified leads with negative keywords…Although it’s a very simple functionality, I find negative keywords extremely useful.”
“We use Google Analytics which is fabulous,” he further comments. “AdWords Editor is very good as well…we change our prices every day…only Google allow us to have that sort of flexibility.”
Future Plans
Not content with entering into new territories from a retail perspective, PurelyGadgets intend to do so geographically as well. At present due to a lack of viable payment platforms, PurelyGadgets restrict their activities to the UK market. However, Lim is enthusiastic and optimistic about the imminent launch of the Google payment platform, Google Checkout. “I think that once the Google Checkout has been launched [we will] have a payment platform all across the world. I think that will open up our market totally’.
Speaking of future plans to continue growing with Google AdWords, Lim states “It feels like you do have somebody working for you in Google…I can’t find anything better.”
Google's Unique Advantage:
The fact can't be denied. Google have achieved a massive success and almost every developer wants to work for. Google is best known for search and for ads associated with search, that was obvious. This is in essence Google’s one true product. It is the one feature Google developed for the outside world. When Google developed search it was no different from a small company. It is what Google has done since then that makes Google different. Google doesn’t answer to any external power. They don’t have anyone they have to deliver a product to. There is no contract with a deadline. Due to not having any external dependencies, Google can continuously iterate over a product until it reaches a state of near perfection. It can stay in internal testing as long as Google wants and no one is going to care. See Gmail, Google Maps, etc. This then allows Google to use the perfect form of the agile process. Continuous iterations and testing and development, continues improvement. Then as Google sees fit, release the products. As they get better and better, more people use them and more money from ads come in. And that's undeniably beautiful! Another thing is that Google hit on the formula for ads before anyone else. They now have such a commanding lead in that arena that to compete with them you need deep pockets of money of your own. That makes it difficult to launch a company and follow Google’s lead of avoiding external dependencies and having the near perfect product development process. Google does have external contracts, especially for serving up ads on other sites. But notice that Google’s contracts are different from most companies’ contracts. Google isn’t developing a product for these companies. All they are doing is giving them an existing product that Google has already completed and released. Development on that product might still be happening, but it happens within Google, not within the realms of the contract. Google is still free to develop how ever they want (Mark Mzyk | March 17, 2008). And i agree to this point that Google has its unique advantage.
>
GOOGLE APPS
Reference:
https://www.google.com/intl/en_uk/adwords/select/success/purelygadgets.htmlhttp://www.programmersparadox.com/2008/03/17/googles-unique-advantage/
http://www.atlassian.com/software/crowd/images/features/google_apps_diagram.png
Posted by ApRiL KAye BiGonTe at 3:13 PM 0 comments
Labels: Management Information System 2
Assignment 9(MIS2)
The pace of change seems to increase relentlessly, especially changes involving information technology. Using your crystal ball, identify and discuss three changes likely to have substantial impact on your school services in the next three years. (1500 words)
It's hard to believe in advances that are poised to change the world when everyone's just trying to survive. But these tireless innovators are developing technologies that are making the future worth looking forward to again. After the Internet bubble burst, people stopped thinking about the transforming powers of technology. And technology companies were forced to stop crowing about how they were set to change the world. Instead, they ate crow -- and concentrated on staying alive.But technology didn't stop evolving and maturing, no matter what the Nasdaq did. Imaginative researchers and engineers, by their nature, aren't very good at throttling back to a conservative idle. Day by day, we see new technologies springing up, taking shape and literally transforming our entire world. Discoveries are made on a daily basis in all areas of Technology. Our passion is to share these new developments with you. Technology is such an integral part of our lives these days that it is not only much of the time taken for granted, but often it seems we can't even keep up with the latest advances and developments. We regularly feature stories on the latest technologies, and we do so with the viewpont that a single breakthrough in some area of technology may have an impact on our lives in a totally different dimension.Because technology is becoming more 'inter-twined', one area often affects another. On our site, we try to give you a glimpse of how various technologies are developing and impacting our lives
Assuming that I have my my own crystal ball, I assume that three (3) years from now the University would likely develop and will have so much changes involving information technology. therefore, it would give more impact to the school services offered by the University.
[img]http://www.buzzle.com/img/articleImages/275188-968-10.jpg[/img]
[b] Wireless fidelity (WI-Fi)[/b]
- A communication technology that uses the 'Direct-sequence spread spectrum radio technology' and the 'Orthogonal Frequency Division Multiplexing radio technology', Wi-Fi is the trademark used by a trade group known as Wi-fi Alliance. The essence of the Wi-Fi technology is that, it acts as a bridge between wireless devices that operate on different technologies. So what does Wi-Fi stand for? The term Wi-Fi is used for wireless fidelity. Although the word, Wi-Fi is used as a substitute for 'wireless LAN', every single LAN (Local Area Network) is not necessarily certified by the Wi-Fi Alliance.
How Does Wi-Fi Work
Radio waves are used for the working of Wi-Fi technology. The wireless adapter of the computer and the wireless router play an important role in its working. The adapter receives data from the computer in digital form. This data, after its conversion in radio waves is sent to the router by means of an antenna. The router decodes the signal and sends it to the Internet. The process is reversed when information is sent from the Internet to a computer.
The difference between the radio waves sent by Wi-Fi and those sent by walkie-talkies and cell phones is that Wi-Fi uses high frequency waves of 2.4 GHz or 5 GHz. The Wi-Fi technology operates on the platform of IEEE 802.11 networking standards. Implemented by the IEEE LAN/MAN Standard Committee, the 802.11 networking standards have different forms such as 802.11a, 802.11b, 802.11g and 802.11n.
[b] Library Integrated Systems [/b]
- An integrated library system (ILS), also known as a library management system (LMS),[1][2] is an enterprise resource planning system for a library, used to track items owned, orders made, bills paid, and patrons who have borrowed.
An ILS usually comprises a relational database, software to interact with that database, and two graphical user interfaces (one for patrons, one for staff). Most ILSes separate software functions into discrete programs called modules, each of them integrated with a unified interface. Examples of modules might include:
- acquisitions (ordering, receiving, and invoicing materials)
- cataloging (classifying and indexing materials)
- circulation (lending materials to patrons and receiving them back)
- serials (tracking magazine and newspaper holdings)
- the OPAC (public interface for users)
[b] Online Examination Systems and internet based online examination .[/b]
- The first step in stream-lining the examination system is to computerise everything. The examinations are defined as computer files (ideally in some standardised format). The examinations are taken by the students with each student on one computer. The answers entered by the student are then retained on the computer, later processed by computer, and finally distributed by computer.
[b] RFID (New Student’s ID)[/b]
- RFID or Radio Frequency Identification is currently being used around the world. Philippines tried to implement a system with Radio Frequency Identification as their tool but unfortunately it’s implementation is being suspended (As Far As I know ) because some motorist in our country are complaining on the extra cost of installing a RFID on their vehicle and some people are concerned of privacy issues. RFID works like an identification card where every RFID is distinct and unique from each other. A gadget is pointed towards the RFID sticker and then data would be retrieved from the said RFID stickers. This is a big help to the authorities as they can know the driver of the vehicle even though they are far away from the field.
So how does this technology be useful to our school? It is simple. Give RFID cards to students instead of the normal plastic cards. This may sound useless but think of the relief that it could give to the authorities of the school. The security of the school would be improved if this technology would be utilized by the university. How could I say that the security may improve? Imagine a gadget similar to a close circuit television camera that could read RFID would be installed on the gate for example and a live feed of the entrance of the gate is being displayed on the guards monitor. If you have an RFID card clipped on your uniform, a mark would be put onto you by the system saying that you are a student of the university and people without marks could be easily identified as outsiders. Breach of security on the university would be minimized. Another possible use of this technology is could be a database of information for a specific student. Flashing your card to a gadget would easily retrieve your unique information and perform processes that a system may provide. For example, instead of lining up on the student’s account section of the finance division and asking how much your balance is but instead you may just flash your card on the gadget and after that a slip would be printed with all your liabilities to the school. This process could really hasten the process as you don’t have to wait for the personnel to check, compute and write your liabilities. (This could take up time especially if there is a long queue).
I foresee that processes around the school would be hastened with the help of RFID. It may replace all Identification Card being used inside the school such as our school identification card, library card, scholarship card and other cards that are being used inside the university. RFID cards are useful because it could serve as your walking database of school information.
my blog:
Reference:
http://bigdatamatters.com/bigdatamatters/2009/10/need-for-infrastructure-change.html
http://www.new-technology-world.com/newtechnology/2co-subscribe-1.htm?gclid=CN-bnsvcwKACFcFR6wodXDSX7g
http://www.1729.com/blog/InternetBasedExamSystem.html
Posted by ApRiL KAye BiGonTe at 2:57 PM 0 comments
Labels: Management Information System 2
Assignment 8 (MIS2)
Fast forward ..., you were hired and have been tasked to develop a strategic information systems plan for a company. The company officers have extended an invitation for you to meet with them to discuss the direction of the company. Before this meeting, they have asked that you provide a list of questions with some explanation about the "why" of the question so they can be prepared, thus maximizing the output from this meeting.
Develop a list of questions you would ask the officers of the company and give an explanation and justification for each question. (1000 words).
Strategic Information Systems Planning
Strategic information systems planning (SISP) has been defined as the process of identifying a portfolio of computer-based applications that will assist an organization in executing its business plans and realizing its business goals. SISP is an important activity for helping information executives and top management identify strategic applications and align IT with business needs. Previous researchers and practitioner observers have identified measures of successful SISP and have recommended many prescriptions for achieving success.
In this research, the SISP experiences of 105 planners contribute a new perspective on these prescriptions and the success of SISP. Planners extensively follow the prescriptions that promote the efficient management of the SISP study. Although they also extensively follow those prescriptions that lead to their own greater satisfaction, they do not so rigorously follow those that meet SISP objectives. However, the fit between information technology capabilities and the needs of the organization is important to them. Furthermore, plan implementation remains critical to meeting SISP objectives.
Combined, these generalizations suggest the central contribution of this research-planner's paradox: The planner must complete the SISP study rapidly to facilitate its implementation but in doing so risks compromising its fit to the organization and therefore reduces its chances of implementation. The planner must thus plan rapidly enough to produce the plan quickly but carefully enough to produce a relevant one.
Ten Reasons Why You Need a Strong Business Plan
A business plan is the cornerstone of starting a business as well as a significant tool for monitoring the progress and growth of your company. Below are 10 key reasons why you should have a business plan.
1. To Attract Investors. Before investors can decide whether or not to back your business financially, they will need to know as much as possible about how the business will operate and how their investment will be spent.
2. To See If Your Business Ideas Will Work. By writing a business plan and outlining each aspect of your business, you can determine if your idea is actually viable.
3. To Outline Each Area of the Business. A business plan will provide an overview of all aspects of the business. You will be able to detail the who, what, where, when, and why of your day-to-day business operations, costs, and projected profitability.
4. To Set Up Milestones. By forecasting where your business will be in six months, one year, or five years, you are not only letting potential investors know your plans, but also setting up realistic milestones for yourself and your employees.
5. To Learn About the Market. Researching, analyzing, and writing about the market not only provides you with an overview for the business plan, but gives you greater insight into the overall market.
6. To Secure Additional Funding or Loans. Your business plan can demonstrate that you have met goals and illustrate the company’s growth and need for additional funding.
7. To Determine Your Financial Needs. The process of writing your business plan will force you to analyze your financial picture.
8. To Attract Top-Level People. Your business plan will give talented people an overview of your business.
9. To Monitor Your Business. A business plan should serve as an ongoing business tool that you can use to monitor your progress.
10. To Devise Contingency Plans. While business plans often include some contingency plans, by virtue of having the document available, you can see how and where you can make such changes relatively quickly if, and when, necessary.
Here are the following questions that I may discuss in the said meeting:
What is the company’s business plan?
The Strategic information systems plan must be inline or linked to the company’s business plan. Because the strategic information systems plan that will be developed will support the organization’s overall business plan.
― What is the scope and limitation of the Strategic Information Systems plan?
It is important to know the scope and limitation of the strategic information systems plan that I will develop so that I will not go overboard beyond the company’s needs. And it can also help prevent miss understanding between me and the company.
Does your organization ready for Strategic Planning?
-Planning for information systems, as for any other system, begins with the identification of
needs. In order to be effective, development of any type of computer-based system should be a
response to need--whether at the transaction processing level or at the more complex information and
support systems levels. The plan must be specific enough to enable understanding of each application and to know where it stands in the order of development. Also the plan should be flexible so that priorities can be
adjusted if necessary.
What are the company’s objectives and goals?
-This question is mostly asked by many interviewers, knowing that every company should possess an ideal success to the business. In making a business proper, the company should provide an objective and goal, because these two main words denote the achievement and success of the business. It would help give a direction and organize strategy to the business.
Is the company willing to provide risk involving budget?
-To know if in what way the company use money for implementing project.This would identify if the company is worthy in hiring to develop their Strategic
information system plan .Having a good budget SISP would be more success.
References:
http://www.jmis-web.org/articles/v13_n1_p35/index.html
http://www.allbusiness.com/business-planning-structures/business-plans/1716-1.htm
Posted by ApRiL KAye BiGonTe at 2:16 PM 0 comments
Labels: Management Information System 2
Assignment 1(MIS2)
Think about yourself worthy to be called as IT professional, how you see yourself 10 years from now, what are your strategies to get there? At least 3000 words.
Its is very important to set our goals in order to achieve what we want in the future. We can't deny the fact that each of us can encounter trials but it is part of our life to face this kind of a thing. Ten years from now for my own view as a student of Bachelor of Science in Information Technology my future job of course is related of this course either i will be a successful one or not, the position i want is Being an IT consultant. It is not easy to work as a career person but i know if a person has a determination to his/her work he/she can manage it and become a sucessful one. Why 10 years from now i want to be IT consultant? It is because an IT consultant works in partnership with clients, advising them how to use information technology in order to meet their business objectives or overcome problems. Consultants work to improve the structure and efficiency and of an organization's IT systems.
IT consultants may be involved in a variety of activities, including marketing, project management, client relationship management and systems development.
They may also be responsible for user training and feedback. In many companies, these tasks will be carried out by an IT project team. IT consultants are increasingly involved in sales and business development, as well as technical duties.
Typical work activities
Task typically involve:
* meeting with clients to determine requirements;
* working with clients to define the scope of a project;
* planning timescales and the resources needed;
* clarifying a client's system specifications, understanding their work practices and the nature of their business;
* travelling to customer sites;
* liaising with staff at all levels of a client organisation;
* defining software, hardware and network requirements;
* analysing IT requirements within companies and giving independent and objective advice on the use of IT;
* developing agreed solutions and implementing new systems;
* presenting solutions in written or oral reports;
* helping clients with change-management activities;
* project managing the design and implementation of preferred solutions;
* purchasing systems where appropriate;
* designing, testing, installing and monitoring new systems;
* preparing documentation and presenting progress reports to customers;
* organising training for users and other consultants;
* being involved in sales and support and, where appropriate, maintaining contact with client organisations;
* identifying potential clients and building and maintaining contacts.
What is An IT profession?
it is refer to a disciplined group of individuals who adhere to high ethical standards and are accepted by the public as possessing special knowledge and skills in a widely recognised, organized body of learning derived from specialized education and training. Inherent in this definition is the idea that the responsibility for the welfare, health and safety of the community takes precedence over personal considerations.
There are strategic planning that can give us an idea to have a good output.It is an organization's process of defining its strategy, or direction, and making decisions on allocating its resources to pursue this strategy, including its capital and people. Various business analysis techniques can be used in strategic planning, including SWOT analysis (Strengths, Weaknesses, Opportunities, and Threats ), PEST analysis (Political, Economic, Social, and Technological), STEER analysis (Socio-cultural, Technological, Economic, Ecological, and Regulatory factors).
In today's highly competitive business environment, budget-oriented planning or forecast-based planning methods are insufficient for a large corporation to survive and prosper. The firm must engage in strategic planning that clearly defines objectives and assesses both the internal and external situation to formulate strategy, implement the strategy, evaluate the progress, and make adjustments as necessary to stay on track.
Strategic planning is the PROCESS by which the GUIDING MEMBERS of an organization ENVISION its future and develop the necessary PROCEDURES AND OPERATIONS to achieve that future.
The planning process can be viewed as a somewhat circular flow of topics and action steps, where the results from one step initiate study and action in the next step. However, the process does not necessarily always flow in one direction. Issues that arise in a particular step may cause the planning team to go back to an earlier step to do additional work. If desired, the order of the steps can even be altered to suit the particular needs of the planning team. The implementation step also does not end the planning process. Analysis of results could easily result in additional analysis or a change in strategic direction. Also, it is recommended that the plan be reviewed on an annual basis to verify that all the base assumptions are still valid and that the implementation plan is progressing according to expectations.
Steps of the Strategic Planning Process:
Role of the Planning Consultant
- Initiating a strategic planning process can be very scary with many new activities that can trigger internal cultural and political hot spots. It is for this reason that many companies hire a planning consultant to lead the organization through the process, not only the first time, but in succeeding annual reviews. The role the consultant plays can range from being an outside expert on planning to being actively involved with the planning results. The critical point is that the role be clearly defined up-front so as not to cause any organizational confusion during the planning period. If necessary, the role can shift as different needs arise during the planning process. Ideally, the outside consultant can team with someone inside the organization to guide the planning team through the process together. The possible roles of the Planning Consultant are:
1. Trainer - Explain the process.
2. Facilitator - Provide assistance in moving through difficult phases.
3. Coach - Provide active direction throughout the process.
4. Strategist - Actively help set strategy.
5. Advocate - Actively pursue certain ideas.
6. Stakeholder - vested interest in results.
Planning to Plan
- emember that the process of development is much important than the final product, which is just a plan on paper.
Planning to plan includes the work that must be accomplished before the formal start of the strategic planning process.
Determine whether the organisation is ready for strategic planning. Key people in the organisation should be aware that:
• Planning needs expenditure and resources;
• Strategic planning is planning for change.
Typical questions to ask before starting a strategic plan include:
• How much commitment is there to a planning process?
• Who should be involved?
• How can we involve stakeholders who are not participating now?
• How does the planning process fit into the financial year and other organisational planning?
• How long will planning take?
• What information do we need to plan successfully?
• Who will collect and develop the data?
In assessing wether an organisation or team is ready to start the process of strategic planning we should be aware of:
• The organisation's (or team’s) fiscal viability;
• The vitality of product and services;
• The organisational culture;
• How resources are spread now;
• The commitment of the CEO;
• The risk that commitment will change.
Commitment, especially from the organisation's CEO (or the person with executive responsibility over the project), is needed for successful planning.
• The CEO can simply abort the planning process.
• A CEO may see danger in a planning process that is not under his/her direct control.
• A CEO may verbally commit to planning, but not follow through, or be too busy to get involved.
Reluctant to support may due to a CEO:
• Seeing planning as imposing a discipline on themselves which are not comfortable with;
• Being reluctant to share power and information;
• Having a different vision to that guiding planning;
• Lack of faith in the planning process or planning team;
• Prior involvement for an unfortunate planning experience.
Form a Planning Team
The size of the team will depend on many factors. Effective team for large projects have no fewer than 5 and no more than 12 members. Experience shows planning teams of 7 to 9 often work best. Teams of more than 12 have a tendency to break down into sub-groups, which can then generate conflict.
Pay attention to group process and group dynamics in forming the team. How will the members work together? Are there members who will facilitate group processes? Aim for a mixture of people with skills in the strategic planning, and people without previous experience.
Educate the entire organisation, especially the planning team, about the process of strategic planning,
• Find ways to involve the team members in the planning process
• Tasks should be given as an 'opportunity' not as obligation
• Be explicit about how the team members are selected and what is expected of them.
Values Scan
- Evaluation of Business Culture is Critical
• Personal values of the Planning team
- not to change, but to understand each other
• Values of Organization as a whole
- profit vs. growth
- to what extent is this to be a value added organization
- importance of being a good "corporate citizen"
- importance of being a "good" place to work
• Company's operating philosophy
- How work is done
- How conflict is managed
- Accounting procedures
• Impact of and on other stakeholders
simplified view of the strategic planning process is shown by the following diagram:
The Strategic Planning Process
1.Mission &
Objectives
2.Environmental
Scanning
3.Strategy
Formulation
4.Strategy
Implementation
5.Evaluation
& Control
Mission and Objectives
The mission statement describes the company's business vision, including the unchanging values and purpose of the firm and forward-looking visionary goals that guide the pursuit of future opportunities.
Guided by the business vision, the firm's leaders can define measurable financial and strategic objectives. Financial objectives involve measures such as sales targets and earnings growth. Strategic objectives are related to the firm's business position, and may include measures such as market share and reputation.
Environmental Scan
The environmental scan includes the following components:
* Internal analysis of the firm
* Analysis of the firm's industry (task environment)
* External macroenvironment (PEST analysis)
The internal analysis can identify the firm's strengths and weaknesses and the external analysis reveals opportunities and threats. A profile of the strengths, weaknesses, opportunities, and threats is generated by means of a SWOT analysis
An industry analysis can be performed using a framework developed by Michael Porter known as Porter's five forces. This framework evaluates entry barriers, suppliers, customers, substitute products, and industry rivalry.
Strategy Formulation
Given the information from the environmental scan, the firm should match its strengths to the opportunities that it has identified, while addressing its weaknesses and external threats.
To attain superior profitability, the firm seeks to develop a competitive advantage over its rivals. A competitive advantage can be based on cost or differentiation. Michael Porter identified three industry-independent generic strategies from which the firm can choose.
Strategy Implementation
The selected strategy is implemented by means of programs, budgets, and procedures. Implementation involves organization of the firm's resources and motivation of the staff to achieve objectives.
The way in which the strategy is implemented can have a significant impact on whether it will be successful. In a large company, those who implement the strategy likely will be different people from those who formulated it. For this reason, care must be taken to communicate the strategy and the reasoning behind it. Otherwise, the implementation might not succeed if the strategy is misunderstood or if lower-level managers resist its implementation because they do not understand why the particular strategy was selected.
Evaluation & Control
The implementation of the strategy must be monitored and adjustments made as needed.
Evaluation and control consists of the following steps:
1. Define parameters to be measured
2. Define target values for those parameters
3. Perform measurements
4. Compare measured results to the pre-defined standard
5. Make necessary changes
In order for me to reach what i want 10 years from now i will strive hard and study hard so that i will be able to help my family and besides i can pursue my desire to have this job.
Reference:
http://www.quickmba.com/strategy/strategic-planning/
http://www.prospects.ac.uk/p/types_of_job/it_consultant_job_description.jsp
Posted by ApRiL KAye BiGonTe at 2:12 PM 0 comments
Labels: Management Information System 2
Assignment 6 (MIS2)
Identify and discuss the steps for "critical success factors" approach?
(at least 1,500 words)
Critical Success Factor (CSF) is the term for an element that is necessary for an organization or project to achieve its mission. It is a critical factor or activity required for ensuring the success of your business. The term was initially used in the world of data analysis, and business analysis. For example, a CSF for a successful Information Technology (IT) project is user involvement. An element of organizational activity which is central to its future success. Critical success factors may change over time, and may include items such as product quality, employee attitudes, manufacturing flexibility, and brand awareness. This can enable analysis. Any of the aspects of a business that are identified as vital for successful targets to be reached and maintained. Critical success factors are normally identified in such areas as production processes, employee and organization skills, functions, techniques, and technologies. The identification and strengthening of such factors may be similar. ..
How are they important to your business?
Identifying CSF's is important as it allows firms to focus their efforts on building their capabilities to meet the CSF's, or even allow firms to decide if they have the capability to build the requirements necessary to meet Critical Success Factors (CSF's).
A plan should be implemented that considers a platform for growth and profits as well as takes into consideration the following critical success factors:
• Money: positive cash flow, revenue growth, and profit margins.
• Your future: Acquiring new customers and/or distributors.
• Customer satisfaction: How happy they are.
• Quality: How good is your product and service?
• Product or service development: What's new that will increase business with existing customers and attract new ones?
• Intellectual capital: Increasing what you know is profitable.
• Strategic relationships: New sources of business, products and outside revenue.
• Employee attraction and retention: Your ability to extend your reach.
• Sustainability: Your personal ability to keep it all going.
Management factors
Key success factors generally include exceptional management of several of the following:
• Product design
• Market segmentation
• Distribution and promotion
• Pricing
• Financing
• Securing of key personnel
• Research and development
• Production
• Servicing
• Maintenance of quality/value
• Securing key suppliers
• New product development
• Good distribution
• Effective advertising
• Innovative response to customer needs
• Consumer loyalty
• Linkage of technology to market demand
• Link marketing to production
• Investment in growth markets
• Unique positioning advantage
• Strong brand image and awareness
• Prevention of price wars
• High product quality
• Patent protection
• Low product cost
• Large marketing resource budget
• Marketing research quality
• Information system power
• Analytic support capability
• Develop human resources
• Attract the best personnel
• Managerial ability and experience
• Quick decision and action capability
• Organizational effectiveness
• Learning systematically from past strategies
Five key sources of Critical Success Factors
MAIN ASPECTS OF Critical Success Factors and their use in analysis
CSF's are tailored to a firm's or manager's particular situation as different situations (e.g. industry, division, individual) lead to different critical success factors. Rockart and Bullen presented five key sources of CSF's:
1. The industry,
2. Competitive strategy and industry position,
3. Environmental factors,
4. Temporal factors, and
5. Managerial position (if considered from an individual's point of view). Each of these factors is explained in greater detail below.
The Industry
Industry: There are some CSF's common to all companies operating within the same industry. Different industries will have unique, industry-specific CSF's
An industry's set of characteristics define its own CSF's Different industries will thus have different CSF's, for example research into the CSF's for the Call centre, manufacturing, retail, business services, health care and education sectors showed each to be different after starting with a hypothesis of all sectors having their CSF's as market orientation, learning orientation, entrepreneurial management style and organizational flexibility.
In reality each organization has its own unique goals so while thee may be some industry standard - not all firms in one industry will have identical CSF's.
Some trade associations offer benchmarking across possible common CSF's.
Competitive strategy and industry position
Competitive position or strategy: The nature of position in the marketplace or the adopted strategy to gain market share gives rise to CSF's Differing strategies and positions have different CSF's
Not all firms in an industry will have the same CSF's in a particular industry. A firm's current position in the industry (where it is relative to other competitors in the industry and also the market leader), its strategy, and its resources and capabilities will define its CSF's
The values of an organization, its target market etc will all impact the CSF's that are appropriate for it at a given point in time.
Environmental Factors
Environmental changes: Economic, regulatory, political, and demographic changes create CSF's for an organization.
These relate to environmental factors that are not in the control of the organization but which an organization must consider in developing CSF's Examples for these are the industry regulation, political development and economic performance of a country, and population trends.
An example of environmental factors affecting an organization could be a de-merger
Temporal Factors
Temporal factors: These relate to short-term situations, often crises. These CSF's may be important, but are usually short-lived.
Temporal factors are temporary or one-off CSF's resulting from a specific event necessitating their inclusion.
Theoretically these would include a firm which "lost executives as a result of a plane crash requiring a critical success factor of rebuilding the executive group".
Practically, with the evolution and integration of markets globally, one could argue that temporal factors are not temporal anymore as they could exist regularly in organizations.
For example, a firm aggressively building its business internationally would have a need for a core group of executives in its new markets. Thus, it would have the CSF of "building the executive group in a specific market" and it could have this every year for different markets.
Managerial Position
Managerial role: An individual role may generate CSF's as performance in a specific manager's area of responsibility may be deemed critical to the success of an organization.
Managerial position. This is important if CSF's are considered from an individual's point of view.
For example, manufacturing managers who would typically have the following CSF's: product quality, inventory control and cash control.
In organizations with departments focused on customer relationships, a CSF for managers in these departments may be customer relationship management.
Finding information for writing Critical Success Factors (CSF's)
• For the organization following the CSF method, the foundation for writing good CSF's is a good understanding of the environment, the industry and the organization In order to do so, this requires the use of information that is readily available in the public domain. Externally, industry information can be sourced from industry associations, news articles, trade associations, prospectuses of competitors, and equity/analyst reports to name some sources. These would all be helpful in building knowledge of the environment, the industry and competitors. Internally, there should be enough sources available to management from which to build on their knowledge of the organization. In most cases, these won't even have to be anything published as managers are expected to have a good understanding of their organization Together, the external and internal information already provides the basis from which discussion on CSF's could begin.
References:
http://en.wikipedia.org/wiki/Critical_success_factor
http://en.wikipedia.org/wiki/Critical_success_factor
http://rapidbi.com/created/criticalsuccessfactors.html#top
Posted by ApRiL KAye BiGonTe at 2:10 PM 0 comments
Labels: Management Information System 2