• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Sys & Infrast Lifecycle Mngt 1

Information Technology Audit and Cybersecurity, Temple University

Sys & Infrast Lifecycle Mngt 1

MIS 5203.001 ■ Spring 2021 ■ Wade Mackey
  • Home
  • Syllabus
    • Gradebook
  • Announcements
  • Course Work
    • 1 – Intro/SDLC
    • Planning
      • 2 – Prjct Mngmt & Governance
      • 3 – Business Case & Feasibility
    • Analysis
      • 4 – Requirements Determination
      • 5 – Process Modeling
      • 6 – Data Modeling
      • 7 -Test One
    • Design
      • 10 – HCI (UI)
      • 8 – Database
      • 9 – Software
      • 11 – Test Two
    • Implementation
      • 12 – Architecture
      • 13 – Development & Testing
      • 14 – Migration & Deployment
      • Test 3: Implementation
  • Projects
    • Project 1: Business Case Development
    • Project 2: SDLC
    • Project 3: Systems Design
    • Project 4: Process Re-engineering
    • Project 5: Controls

Instructor

Week 2 PM 5 Phases PRINCE PATEL

May 4, 2021 Leave a Comment

Most projects have five phases:

  1. Initiation: Here is where you set out the project scope, the goals, the organization of the project, its business case, its constraints, who the stakeholders are, what the risks are, the project controls, the reporting framework, etc.
  2. Planning: This is where you build the roadmap to take you from Point A to Point B, which means creating a schedule of the tasks, deadlines and resources needed to complete everything on time.
  3. Execution: The project begins and the project plan is put into action.
  4. Monitoring & Controlling: To make sure the project is proceeding as planned, you need to set up mechanisms for monitoring progress. If the project isn’t proceeding as planned, work to control and resolve issues before they become problems.
  5. Closing: Projects are temporary endeavors, so they eventually come to an end and need to be formally closed. But it’s not as simple as producing deliverables, there’s paperwork to sign off on, resources to reallocate and other loose ends to tie up.

    Prince Patel

Week 1 Agile SDLC Model PRINCE PATEL

May 4, 2021 Leave a Comment

Agile SDLC Model

In the agile methodology after every development iteration, the customer is able to see the result and understand if he is satisfied with it or he is not. This is one of the advantages of the agile software development life cycle model. One of its disadvantages is that with the absence of defined requirements it is difficult to estimate the resources and development cost. Extreme programming is one of the practical use of the agile model. The basis of such model consists of short weekly meetings – Sprints which are the part of the Scrum approach.

-Prince Patel

Unit 14 Reading – Mettus

April 27, 2021 2 Comments

I found the different types of installation methods and the pros and cons of each to be fairly interesting. While direct installation is most likely the quickest and least expensive implementation option, it comes with the most risks. And trying to save some time and a few bucks could end up costing you significantly in both areas if something goes wrong. Meanwhile parallel installation means running two systems at the same time and duplicating work. I can imagine that as an employee that would be a frustrating situation to have to, for example, enter information twice. The phased and single-location options are kind of a happy medium. I’m sure it all depends on the size and specifics of the project and organization, but I’m curious what the most popular, go-to installation strategy is.

Unit 14 – Elias Harake

April 22, 2021 9 Comments

After reading this week’s assignment, I think an important takeaway that is worthy to discuss is how organizations should be managing their system maintenance since it is one of the most costly expenditures for many types of organizations. According to the book, more programmers today work on maintenance activities than work on new development of software or applications. The maintenance phase can begin soon after the system is officially installed. As with the initial design of a system, maintenance activities are not limited only to software changes or updates, but can also include changes to hardware and business procedures. Some of the maintenance phases include are, Obtaining Maintenance Requests, Transforming Requests into Changes, Designing Changes, and Implementing Changes. The maintenance phase is always ongoing and a never-terminating phase of the system development life cycle (SDLC). This chapter helped me better understand the maintenance process and the different types of issues that must be considered when maintaining a system.  

Unit 13 Reading – Mettus

April 15, 2021 9 Comments

After reading through Chapter 12 and our discussion in class, I think it’s easy to see that a lot of cloud computing is just the classic client/server architecture, but connected over the Internet, so the server in this case is in a data center somewhere rather than on site in the office. One section I found myself disagreeing with was the section on characteristics in order for something to be truly considered a cloud resource. The book stated that “the customer only rents a resource, with no knowledge or control over how it is provided or where it is located.” In my limited experience, there are many times that customers of major cloud services, such as AWS, specifically choose fairly defined and small regions where their cloud resources will be primarily hosted. With the contract with AWS, those organizations negotiated for primary resources to be located in a specific group of data centers in Northern Virginia and for backups also hosted by AWS to be stored in a data center in a different particular region based on the organization’s BCP and DRP. I’ve also seen instances where the contract dictates what other types of organizations may share the same physical hardware. For something to be labeled as being in the cloud, you don’t have to completely give up all of that control and be in the dark about what is going on. At least that’s my opinion.

Unit 12 Reading – Mettus

April 15, 2021 9 Comments

One of the most important aspects of implementation, I think, is user acceptance testing. At the end of the day, systems are made to be used by users. They’re the ones who will be doing work or utilizing the system on a regular basis. When the users can actually get their hands on the system and start working with it, they can decide whether or not their requirements have been met. As the book describes, acceptance testing can be split into two types: alpha and beta. Alpha testing comes first and involves simulated data in a test environment. There are different types of tests that get run during this process, including stress tests, performance tests, recovery testing, and security testing. The goal is to identify bugs and the ways a system will react to different situations. Beta testing is where the actual users get involved. The system is put into their environment with real data and they get to try it out. As the book points out, it’s like a rehearsal. The system, training, documentation, etc. are all evaluated by real users.

I’m sure that user acceptance testing and actually getting users to accept a system can be a challenging, long process. But systems that skip it entirely are at great risk of a disastrous implementation. In those situations, the acceptance testing essentially comes when the system is put in place in production. It’s much harder to fix bugs and keep users happy then.

Unit 10 – Elias Harake

March 25, 2021 5 Comments

After reading Chapter 10, I thought it was interesting to learn about disabilities such as visual impairment or hand movement restrictions and how operating systems such as Windows are attempting to help users with these disabilities use Windows 10. Visual impairment refers to a decreased ability to see that cannot be fixed by usual means or due to total blindness. For instance, if a person has difficulty with reading the screen on the monitor Windows can provide that person with plenty of tools to help with reading. Some of the tools available are a magnifier to get a close look at the text or a high contrast theme with bigger text and darker and brighter colors. Windows 10 can even provide a narrator to read some text depending on the type of coding format. Windows will not be able to read out loud text in picture forms such as jpeg or png. The speech recognition function tool can help users navigate through applications by inputting voice commands into the computer to open certain programs.

Week 10 Presentation

March 25, 2021 1 Comment

10_MACKEY_Uman Machine Interface

Unit 10 Reading – Mettus

March 25, 2021 9 Comments

My thoughts after reading Chapters 10 and 11 are that forms and interfaces have a significant impact on how effective users think a system is and how well it performs as well. You can have a perfect database on the back end, but if it’s too hard to input information then it won’t be used to its potential. The success of forms, reports, interfaces, etc. really comes down to usability. I liked how the book discussed usability. First, it broke usability down into five factors: 1. consistency, 2. organization, 3. clarity, 4. format, and 5. flexibility. It also talked about measuring usability in terms of learnability, efficiency, error rate, memorability, and satisfaction and aesthetics.

It seems to me that multiple iterations of prototyping can be an effective way to develop forms, reports, and interfaces.

I was surprised, though, that accessibility wasn’t emphasized more within the chapters. I think you need to strongly consider how accessible your application or system is. For instance, having alt text for images and how easily it is to navigate with a screen reader. 

Unit 9 Reading – Mettus

March 25, 2021 7 Comments

The “Modular Mayhem” section of the reading discussed modular programming and also the risks of code reuse. I found the most interesting discussion to be about the benefits and risks of code reuse. It can save time and resources. However, it can undermine the security of your program. Something that likely gets overlooked by slopping developers is that any internal libraries or APIs that you’re calling can be a concern. Internal libraries were often created before security was even thought about much so there may be many vulnerabilities. Developers can research vulnerabilities for any public libraries or APIs they will use. Code reviews can be done for internal code. The big idea is that you need to know and evaluate the entire attack surface for the system and application, which can be increased by libraries, modules, and APIs called from other sources. Those risks need to be mitigated.

  • « Go to Previous Page
  • Page 1
  • Page 2
  • Page 3
  • Page 4
  • Page 5
  • Go to Next Page »

Primary Sidebar

RECENT ANNOUNCEMENTS

Week 14 Implementation Plan Risks – Prince Patel

What Are the Risks of an Implementation Plan? As is the case with any … [More...] about Week 14 Implementation Plan Risks – Prince Patel

Week 13 Smoke Testing- Prince Patel

Smoke Testing Smoke testing is performed on the ‘new’ build given by … [More...] about Week 13 Smoke Testing- Prince Patel

Week 12 (FaaS) Function as a Service! – Prince Patel

You all must have heard IaaS, PaaS & SaaS. But let me introduce you to … [More...] about Week 12 (FaaS) Function as a Service! – Prince Patel

Week 10 What is Guerrilla Usability Testing? – Prince Patel

Guerrilla testing In guerrilla testing, test subjects are chosen … [More...] about Week 10 What is Guerrilla Usability Testing? – Prince Patel

Week 9 Dev-ops Software Development Methodology – Prince Patel

DevOps development methodology DevOps is not just a development … [More...] about Week 9 Dev-ops Software Development Methodology – Prince Patel

Week 8 Database Design Steps – Prince Patel

How to Design Database: Steps of Designing Database Database designing … [More...] about Week 8 Database Design Steps – Prince Patel

[More Announcements...]

Copyright © 2025 · Department of Management Information Systems · Fox School of Business · Temple University