• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Sys & Infrast Lifecycle Mngt 1

Information Technology Audit and Cybersecurity, Temple University

Sys & Infrast Lifecycle Mngt 1

MIS 5203.001 ■ Spring 2021 ■ Wade Mackey
  • Home
  • Syllabus
    • Gradebook
  • Announcements
  • Course Work
    • 1 – Intro/SDLC
    • Planning
      • 2 – Prjct Mngmt & Governance
      • 3 – Business Case & Feasibility
    • Analysis
      • 4 – Requirements Determination
      • 5 – Process Modeling
      • 6 – Data Modeling
      • 7 -Test One
    • Design
      • 10 – HCI (UI)
      • 8 – Database
      • 9 – Software
      • 11 – Test Two
    • Implementation
      • 12 – Architecture
      • 13 – Development & Testing
      • 14 – Migration & Deployment
      • Test 3: Implementation
  • Projects
    • Project 1: Business Case Development
    • Project 2: SDLC
    • Project 3: Systems Design
    • Project 4: Process Re-engineering
    • Project 5: Controls

Unit 13 Reading – Mettus

April 15, 2021 9 Comments

After reading through Chapter 12 and our discussion in class, I think it’s easy to see that a lot of cloud computing is just the classic client/server architecture, but connected over the Internet, so the server in this case is in a data center somewhere rather than on site in the office. One section I found myself disagreeing with was the section on characteristics in order for something to be truly considered a cloud resource. The book stated that “the customer only rents a resource, with no knowledge or control over how it is provided or where it is located.” In my limited experience, there are many times that customers of major cloud services, such as AWS, specifically choose fairly defined and small regions where their cloud resources will be primarily hosted. With the contract with AWS, those organizations negotiated for primary resources to be located in a specific group of data centers in Northern Virginia and for backups also hosted by AWS to be stored in a data center in a different particular region based on the organization’s BCP and DRP. I’ve also seen instances where the contract dictates what other types of organizations may share the same physical hardware. For something to be labeled as being in the cloud, you don’t have to completely give up all of that control and be in the dark about what is going on. At least that’s my opinion.

Reader Interactions

Comments

  1. Priyanka Ranu says

    April 15, 2021 at 8:20 pm

    This chapter talks about cloud computing and its characteristics which are on-demand self-service, rapid elasticity, broad network access, resource pooling, and measured service. On-demand self-service is one of the most valuable features of cloud computing as users can continuously monitor the server uptime, capabilities, and allotted network storage. Another advantage is broad network access where users can access the data on the cloud from anywhere with the help of a device and an internet connection which makes it so much easier to access and upload data.

    Reply
  2. Michael Doherty says

    April 18, 2021 at 9:37 pm

    I found the section of this chapter most interesting was about the client/server architecture of a virtual machine. A VM “is a software emulation of a physical computer system, both hardware and operating system, that allows more efficient sharing of physical hardware resources.” The concept of virtualization is the “act of creating virtual (rather then physical) versions of a variety of of computing capabilities, including, hardware platforms, operating systems, storage devices and networks”.

    The book describes Virtualization as similar to Cloud Computing. I feel that this is an appropriate comparison because with Cloud computing and virtualization, the user is not using their physical computer. By having the book describe virtualization first, it made it easier to understand cloud computing.

    Reply
    • Priyanka Ranu says

      April 29, 2021 at 2:19 pm

      Virtualization is definitely similar to cloud computing in terms of not using a physical computer. There are some differences between the two. For example:

      1. Scalability – cloud can be extended as much as you want whereas virtual machines configuration limits its scalability.
      2. Flexibility – cloud can be accessed from any location with internet. For virtual machines proper authentication is required before accessing them.

      Reply
  3. Shaneil Wilson says

    April 22, 2021 at 11:20 am

    When buying software or hardware from external parties, the company should consider several factors before sealing the deal. A few of them are review of delivery schedules against the requirements, the software or hardware capability, security control of facilities. The one I’m more interested in is reviewing of delivery schedules against the requirements. This is a very important factor to consider because if the vendor must be able to meet all requirements of the system. A request for proposal (RFP) should be sent and evaluated. Some criteria to evaluating the proposal are turnaround time, response time, system reaction time throughput, workload, compatibility, capacity, and utilization. Our role in all of this determine whether the acquisition process was followed and whether the criteria for selecting the vendor was followed.

    Reply
  4. Elias Harake says

    April 22, 2021 at 1:13 pm

    I think chapter 12 presented a great introduction and summary of various aspects of the six-system implementation process that we learn, which are coding, testing, installation, documentation, training, and support. We also learned about the 4 types of system installation, which are direct, parallel, single-location, and phased. I think it is important to bring up the importance of system training for employees, users, and business partners. Usually, computer training has been provided in-person or online classes. I think the trend will be to moving more to on-demand online tutorials so that employees, users, and business partners can learn or review important technical aspects on a needed basis. Once a system is fully implemented, the business should focus on threats from both inside and outside the systems’ security.

    Reply
    • Jonathan Mettus says

      April 22, 2021 at 8:32 pm

      Training is definitely important. If you throw a user into a new system without them knowing how to use it, they will push back and hate that system forever. Training comes in many different forms. I think each one has its place. For example, when I worked as a grocery store cashier, there was computer training briefly on how to use the register, but the more indepth training came in person. Training is probably easier when you’re using commercial off the shelf software and can rely on the vendor or already produced material. It may be more difficult when a system is completely custom and training has to be created from scratch.

      Reply
  5. Taylor Trench says

    April 23, 2021 at 8:28 pm

    The most interesting part of this unit’s reading, to me, was the discussion of the evolving state of cloud computing, as well as its evolving role in organizations. In terms of IT developments, cloud computing is fairly new to most organizations. The text emphasized the increasing need to cater to wireless mobile computing devices, which are sometimes referred to as thin-client technologies. Therefore, mobile applications must be designed to utilize the standards of cloud computing, such as XML and JSON. These applications must then be designed to cater to a plethora of devices that range in screen size and resolution. Therefore, as computing services grow and develop, they must take into account the variety of devices and seek consistency across such. However, as noted by the text, consistency across platforms is an incredibly difficult thing to achieve. Most website designers use cascading style sheets, or CSS, in search of this consistency. As a user, I can agree that consistency across platforms is crucial, as I expect the same application to provide a similar experience no matter what device or platform I am using.

    Reply
  6. Cami Chen says

    May 1, 2021 at 10:33 pm

    The one of key points in Chapter 12 is how organizations use beta testing to reduce software failure risk and provide a high quality of software. Since beta test applies to “real users” in a “real environment” through the software application, the programming team can receive the most useful feedback from the users to improve the application. In doing so, the team will identify the bugs and usability issues, and solve them before the official version is released. Although alpha testing can find out some issues, beta testing provides an opportunity to find out some big problems that are not able in the alpha testing, and it can the application security and mitigate project risk. Beta testing is a valuable analysis to improve the new system quality and help the organization to implement the project.

    Reply
  7. Richard Hertz says

    May 2, 2021 at 9:28 pm

    The area of cloud computing that is experiencing the most expansion right now is ‘everything As A Service’. I wish the readings had expanded more on this element of the large public clouds. It is really a rapid expansion of the term Software As A Service, but it changes the way that applications are architected and built in the cloud. As a result, it also changes the way an auditor does their function for applications that are cloud native! A brief example will help explain this. In the past if you wanted to send SMS text messages as part of an application you were building (an e-commerce site for example to confirm orders), you would have to procure software to send SMS messages, set up servers and get an account with a tel-communications company and then manage all that complexity every day – availability, capacity, patching of servers etc. In a modern public cloud you can purchase sending SMS messages as a service. All of a sudden the process of implementing SMS message sending from an ecommerce site can be achieved with just a few clicks on a screen to configure the service. You no longer have to purchase software, hardware, setup telco contracts and manage all that complexity. As you think about how easy and fast it became to implement that function, think about how on earth you would audit SMS messages as a service embedded in the middle of an e-commerce site!

    Reply

Leave a Reply to Cami Chen Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

RECENT ANNOUNCEMENTS

Week 14 Implementation Plan Risks – Prince Patel

What Are the Risks of an Implementation Plan? As is the case with any … [More...] about Week 14 Implementation Plan Risks – Prince Patel

Week 13 Smoke Testing- Prince Patel

Smoke Testing Smoke testing is performed on the ‘new’ build given by … [More...] about Week 13 Smoke Testing- Prince Patel

Week 12 (FaaS) Function as a Service! – Prince Patel

You all must have heard IaaS, PaaS & SaaS. But let me introduce you to … [More...] about Week 12 (FaaS) Function as a Service! – Prince Patel

Week 10 What is Guerrilla Usability Testing? – Prince Patel

Guerrilla testing In guerrilla testing, test subjects are chosen … [More...] about Week 10 What is Guerrilla Usability Testing? – Prince Patel

Week 9 Dev-ops Software Development Methodology – Prince Patel

DevOps development methodology DevOps is not just a development … [More...] about Week 9 Dev-ops Software Development Methodology – Prince Patel

Week 8 Database Design Steps – Prince Patel

How to Design Database: Steps of Designing Database Database designing … [More...] about Week 8 Database Design Steps – Prince Patel

[More Announcements...]

Copyright © 2025 · Department of Management Information Systems · Fox School of Business · Temple University