Professional Documents
Culture Documents
e
Module I: Understanding System Concepts and Use
lin
within Industry
Unit 1. 1: Int rod uct ion t o t he Sy st em a nd It s Imp ort an c e
On
Le ar nin g O b j ect i ve s:
• De f in e t he I ntr o d uc t i o n a nd M e a ni n g of Sy s t em .
• Dis c us s t he Sy s t e m Im por t anc e .
• Ex pl a i n th e C har ac ter i s tic s of a Sy s t e m .
• Dis c us s t he E le m en ts of a Sy s t e m .
ty
• Dis c us s R ol e o f s y s te m / In fo rm at i o n s y s t em in c re at i n g ef fec t iv e
org a n iz a t io n .
• Ex pl a i n th e Ty p es o f S y s te ms
• Ex pl a i n th e C at e gor i es o f i nf or ma t io n
dev e l op m en t.
ou t pu t.
ity
Th e v ar io us c o m po n en ts of a s y s t e m ar e i nt e rd e p e nd e nt a n d c on n e c te d t o on e
an o th er. T h e hu m a n b ody , f or ex a m p le , is a c om p l et e n at ur al s y s t e m. We are als o
ti e d by a n u mb er o f n a ti o na l s y s t e ms , s uc h a s t he po l it ic a l, ec o no m ic , an d
ed uc at i on a l s y s t ems . Th e s y s te m's g o a l n ec es s it at es t ha t s o me ou tp ut be pr o d uc e d
as a r es u lt o f pr oc es s i ng t h e a ppr o pr ia te i np uts . A w e ll - d es ig n e d s y s te m a ls o
m
1. 1. 2 S y st em Im po rt a nc e
)A
e
l im i ta t io ns , s y s t e m an a ly s is an d d es i g n as s is ts a f ir m in i de n ti fy in g b ot h
op p ort u n it i es a nd c h a l l en g es . F oc us i n g on t he c om p any 's s tr en gt hs wh i l e s tr iv in g
for c o nt i n uo us d ev e l o pm e nt i n ar eas w h er e it f a lls s h or t al l ows th e c o mp a ny to
lin
i mpr ov e q ua l ity f r o m a c r os s b oar d .
Comp et ing
Mo re an d mor e o r g a n is a t io ns , ac c ord i n g to T h e O h i o S t at e Un iv ers ity F is her
Co l l eg e o f B us i nes s , mus t d is c ov e r s tra t eg i es to c o mp et e g l o ba l l y . In ma ny c as es ,
On
th is e nt a ils t h e lar g e - s c a le d ev e l o pm e nt a n d de p loy m e nt of e - c o m merc e. I n c as es
wh e n t h e in te gr at i o n of a g lo b a l in fo rm at i o n s y s t e m is nec es s ary , s y s t e m a n a ly s is
an d des i g n a r e c r i t ic a l. Im pr ov e d m ark e t c ov er a g e ar e a, wh ic h of te n r es ul ts i n
i nc re as ed ear n i ngs , is o n e of t h e be n ef i ts of c o m pe t in g g l ob a l ly .
1. 1. 3 Ch a ra ct e ri st i c s of a S yst em
Ch ar ac t er is t ic s a n d ty pes of s y s t em :
ty
O rg an iz at ion
• ord er a n d s tr uc t ur e
• A n ex a m p le is a c o m p any 's h ier arc h ic a l s tr u c tur e.
• Co m pu te r s y s t em : t he a r r a n ge m e nt of n u m e rous c o mp o ne n ts s uc h as i n pu t,
ou t pu t, C P U, a n d s tor ag e d ev ic es .
si
• Str uc tur e a n d or d er a r e i m p li e d by or g an is at i on . It c an a ls o be de f in e d as
th e c o nf i gu r a t io n o f c o mp o ne n ts th at a ids in th e ac h iev e me n t of g o a ls .
• For ex a mp l e, i n t he d es ig n of a c om p any s y s te m, t h e or ga n is a t io n s truc t ure
er
is re pr es e n te d by th e h i er arc h ic a l l i nk s t ha t s tar t w it h t h e pr es id en t a t t he
to p a n d l ea d d o wn to t h e work ers . As a r es u l t, t h e a ut h or ity s t ruc t ur e is
es t a bl is h ed , as w e ll a s t he off ic i a l c o mm u n i c at i on f l ow .
• A n i np ut d ev ic e, a c en tr al proc es s i ng u n it , an o ut p ut d ev ic e, a nd o n e or
iv
mo re s t o r ag e u n its ar e a l l b u il t i nt o a c o m p ut er s y s te m .
Int er a ctio n
•
Un
the input device. The main memory, in turn, stores programmes and data that the arithmetic
unit utilises to do calculations.
Int er dep en de nc e
m
• L ink a ge b e tw e en c o m po n en ts
• De p en d enc e o n c o mp o ne n ts
• Th is is o n e of a s y s t e m's m os t s ig n if ic a nt pr op er ti es .
• In ter d ep e n de nc e r ef er s t o th e i n ter d ep e nd e n c e of t h e p arts or c om po n en ts
)A
of a n or g an is at i o n or c om p ut er s y s t em . E ac h c o m po n en t or s ec t io n s o f a n
org a n is a t io n s h o ul d b e d e pe n de nt on t h e ot h er c o mp o ne n ts . F or op ti m a l
fu nc t i o ni n g, o n e c o mp on e nt or s ubs y s t em r e qu ir es t he in p ut o f a no th er
s ubs y s t em , i .e . o ne s u bs y s t e m's o ut p ut is r e qu ir e d i np u t for a n ot h er
s ubs y s t em . For ex a m p l e, t he us er in i t ia tes t h e d ec is i o n to c o m p ut er is e an
ap p l ic a t io n , th e a n aly s t an a ly s es an d d es i gn s i t, a n d t he c o m p ut er op er at or
(c
On
• Ho w s u bs y s t e ms ar e c on n ec t e d to m e et t h e s y s te m's g o a l
• Th e t er m " i nt e gr at i on " a l l ud es t o t he ho l is ti c n a tur e o f s y s t ems . To f u lf i l
th e or g an iz at i o n's f un da m en t a l g oa l , s y nt h e s is c o m es a ft er a n aly s is . It is
c onc er n ed w it h th e way a s y s t em is c o nn ec te d. I t's m ore t h an j us t
s har i n g a p hy s ic a l s p a c e or por t io n . I t me a n s th a t ev e n if e ac h p o rti o n of
th e s y s te m p er f or ms a dis t inc t fu nc t i o n, t h e pi ec es of th e s y s t e m w ork
to g et her w i t hi n t he s y s te m.
ty
Cen tr al O b j ect iv e
• I t s h o ul d b e k n ow n t hr o u g ho ut t h e e arl y s t ag es o f th e a n aly s is .
• A s y s t em 's fu n da m en ta l g o al is i ts fi n a l c ha rac t er is t ic . Re a l or d e c l are d g o als
si
are bo th ac c e p ta b le . T he c r uc i a l e l em e nt is t ha t f or a s uc c es s f u l d es ig n a nd
c onv ers i on , us er s m us t un d er s t a nd t h e c or e go a l o f a c o mp u ter a p p lic a ti o n
ear ly in t h e a na ly s is .
er
iv
Un
ity
m
)A
1. 1. 4 E l em ent s o f a S yst e m
s y s te m k e eps t r ac k o f go o ds . T he t w o s y s t e ms ar e i nd e pe n d en t of o n e an o th er .
Th ere are n i n e c h ar ac t er is t ic s t ha t d ef i ne a s y s te m. E ac h a ttr i b ut e i s ex p la i n ed in
de p th b e l ow ; th e s y s t e m oc c ur s i n s id e a br o a der w or l d, o r env ir o nm en t. T he
s y s te m is s e p ar at ed f r om its s u r r o u nd i n gs by a b or de r. Th e s y s t e m rec e iv es i n pu t
fro m t he ou ts id e w or ld , pr oc es s es i t, a n d th e n r et ur ns t he o u tc o m e to its
e
s urr ou n di n gs .
El e men ts of a Sy st e m:
lin
On
ty
si
er
1. Comp on ent s: A s u bs y s te m is a n i rre d uc ib l e par t or a g gr eg at e o f p i ec es t h at
mak es u p a s y s t e m.
2. Int er r el at ed co mpon e nt s: D ep e n de nc e of o ne s y s t e m c o mp o ne n t on on e or
iv
mo re o t her s y s t e m c o mp o ne n ts .
3. Bound a r y: T h e b ou n d ar y b et we e n th e i n ne r an d ex ter i or o f a s y s t e m,
s ep ar at i n g it fr o m i ts s ur r ou n di n gs .
4. Pu rpo s e: A s y s t e m ’s ov er a l l o bj ec t iv e o r f u nc t i ons .
Un
5. En vi ro nm ent : Ev er y th i ng t h at i n ter ac ts wi t h a s y s te m fr o m th e o ut s i de .
6. Int erf a ce s: T he p o i nt at w h ic h a s y s te m i n te rac ts w i th its s urr o u nd i ngs or
wh er e s u bs y s t ems in t e r ac t w i th o n e a no t her .
7. Con st ra int s: Th er e is a l i mi t t o wh at a s y s te m c a n ac h i ev e.
8. Input : T he i nf or ma t io n t ha t e nt ers t he s y s t e m fo r proc es s i ng is r ef err ed t o
as i np u ts .
9. O utput : A s y s te m's m a in g o a l is t o pr od uc e an ou tp u t th at is us ef u l t o its
ity
us er . Th e f i na l r es u lt of pr oc es s in g is c al l e d o ut p ut .
As a s y s t e ms a n aly s t, y ou w i ll b e ab l e t o ha v e a b i g i m p ac t on h o w y o ur c om p any
m
fu nc t i o ns . Th is l uc r at i v e an d r a p id ly r is i n g ro le c a n b e fo u nd in bo t h la rg e a nd
s ma l l b us in es s es . Ac c or d i n g t o ID C, a re n o wn e d c ons u lt i ng f ir m, e mp l oy me n t in
i nf or ma t io n t ec hn o l og y ( IT) w i l l ex p a nd at a r at e of mo re th a n 3 % eac h y ear u nt i l
at le as t 20 1 3. Fr o m 2 00 4 t hr ou g h 2 01 4, t h e B ur e au of L a bor St a t is t ic s f or ec as ts
)A
an d i nf or ma t io n t ec hn o lo gy c an b e b es t u ti l is e d to i mp rov e t h e org a n is a t io n . A
s y s te ms a n a ly s t as s is t s s y s te m us ers a n d o t her c o m pa ny ma n ag e me n t i n d ef i ni n g
th e ir n ee ds f or n ew or i mpr ov ed in f orm a ti o n s erv ic es .
Th e r o le of s y s t e ms a n aly s ts is c r uc ia l i n th e c re at i o n of s y s te ms . T o b e
s uc c es s f ul as a s y s te ms a na ly s t, y o u' l l n ee d to mas te r fo ur d if f er en t s k i l ls :
e
• an a ly t ic a l,
• tec h nic a l,
lin
• ma n ag er i a l, a n d
• i nt erp er s o na l
On
or th e c a p ac i ty t o un d er s t a nd o r g a nis a ti o ns an d i n for m at i on s y s t e ms as s y s t ems ,
are o ne of t h e m os t c r it ic a l a n aly t ic a l t a l e nts y ou c an le ar n. S y s te ms t h ink i n g
prov i d e a fr a m ew or k f or u n der s t an d in g t h e i mp or ta nt l i nk a g es t ha t ex is t be tw e en
i nf or ma t io n s y s te ms , t he or g a nis a ti o ns i n w h ic h t hey ex is t, a n d t h e env ir o nm e nt i n
wh ic h th e c o m pa n i es o pe r a te .
Tec hn ic a l s k i l ls en a bl e y o u t o c o m pr eh e nd b o th th e be n ef its a n d dr aw b ac k s o f
ty
i nf or ma t io n tec h no l o g y . As an a n aly s t, y o u mus t b e a b l e t o i m ag i ne a n i nf or ma t io n
s y s te m t ha t w i ll as s is t us er s i n s o lv i ng pro b l ems wh i l e a ls o gu i d in g th e d es i gn a n d
dev e l op m en t o f t he s y s t e m. Y ou mus t a ls o b e f a m il i ar w it h p ro gr am m i ng
l an g ua g es l ik e C an d J av a , o pe ra t in g s y s te ms lik e W in d ows an d Li n ux , an d
c om p ut er h ar dw ar e p l at for ms lik e I B M a nd Mac .
si
Pr oj ec t m a na g em e nt , r es o ur c e m a na g em en t, r is k ma n ag e me nt ,
ma n ag e m en t ar e a l l th i ngs t h at m a na g em e nt s k i l ls as s is t y o u w it h.
a nd c h an g e
er
W ork in g w i t h e n d us er s , as w e l l as o th er an a ly s ts a nd pr o gra m mers , r eq u ir es
i nt erp ers o na l s k i l ls . As a s y s t e ms an a ly s t , y ou 'l l s e rv e as a k ey l i nk be tw e en
us ers , pr ogr a mm er s , an d ot h er I T ex p erts . A na ly s ts mus t gras p ef fec t iv e wr it t en
an d or al c o m mu n ic at i o n, as we l l as ex p ert is e i n c o n duc t in g m ee t in gs , i nt erv i ew i ng
en d us ers , an d l is t en i n g. Th es e fo ur c at e gor i es of s k i lls a re s uc c es s f u lly
iv
c om b i ne d by e ff ec tiv e an a ly s ts .
E xa mpl e s:
Un
Co ns id er tw o s c e n a r i os in w h ic h y o u c a n enc o un t er org a n is a t io na l is s u es as a
s y s te ms a na ly s t.
Fir st ,
Y ou w ork i n a l ar ge ma g az in e c o m pa ny 's i nf or ma t io n s y s te ms d ep ar tm e nt . T h e
org a n is a t io n is h av i ng t r o u bl e k ee p i ng i ts s ubs c r i pt i o n l is t u p to da t e a n d c orr ec t,
an d s o m e c o n s u m er s ar e r ec e iv in g t wo p u bl ic at i o ns i ns t e ad o f o ne . If t h e
ity
pro b l ems pe r s is t, th e c o m pa ny w i l l l os e mo n ey a n d s u bs c r ib e rs . Us e rs of th e
c urr en t c o mp u ter s y s t em , as w e l l as f in a nc i a l m an a gers , s u b mi t t he ir pro b l ems t o
y ou an d y o ur c o l l ea gu es i n t h e i nf or ma t i on s y s t e ms d ep ar tm en t i n or d er t o
es t a bl is h a m or e ef f ec tiv e tr ac k in g s y s t em .
S ec ond ,
m
Tr an sa ct ion P ro c e ss i ng S yst em s (T P S)
Tra ns ac t io n pr oc es s i n g s y s t e ms ( T P S) ar e t he f ou n da t io n a l b us i n es s s y s t e ms t h at
s up p ort a n or g an iz at i on 's op er at i on a l l ev el . A tr a ns ac t io n pr oc es s i ng s y s t e m is a
c om p ut er is ed s y s t e m th at ex ec u tes an d rec ords th e ev ery day r o u ti n e tr ans ac t i o ns
th at ar e re q ui r e d f or b us in es s o p er at i ons . T he tra ns ac t i o n pr oc es s i ng s y s te ms t h at
s up p ort t h e b us i n es s 's d ay - to - d ay o pe ra t i ons are f o un d a t t h e b ot to m o f th e
(c
org a n is a t io n a l s tr uc t ur e.
Co ntr o l Sy s te ms for P r oc es s es M on i tor a n d c on tr ol i n d us tr i al or p hy s ic a l pr oc es s es
wi t h proc es s c o n tr o l s y s te ms .
e
Co ntr o l Sy s te ms for P r oc es s es M on i tor a n d c on tr ol i n dus tr i al or p hy s ic a l pr oc es s es
wi t h proc es s c o n tr o l s y s te ms .
lin
P etr o le u m r ef i n in g , p o wer g e ner at i n g, a nd s t ee l pr o duc t io n s y s te m s ar e on ly a fe w
ex a m p les . A p e tr o l e u m r ef i ner y , f or ex a m p le , us es e lec tr on ic s ens ors l i nk e d t o
c om p ut ers t o c o nt i n uo us ly m on i tor c he m ic a l proc es s es a n d m ak e i ns t a nt (r ea l - ti m e)
mo d if ic at i o ns to c o n tr o l t h e r ef i n ery pr oc es s . Eq u i pm e nt , c o mp ut er pr ogr a m mes ,
an d op er at i o na l p r oc e dur es a ll m ak e u p a proc es s c on tr o l s y s t e m. Co l l ab or at i o n
On
S of tw ar e f or Bus i nes s es ( O f f ic e A ut o ma t io n Sy s t e ms ) O ne of th e mos t ex t ens iv e ly
ut i l is e d for ms of i n for ma t io n s y s te ms for as s is t i n g m a na g ers in c on tr ol l i n g t he f l ow
of i n for m at i o n i n bus i n es s es is of f ic e a u to m a ti o n s y s te ms . E nt er pri s e c o l la b ora t io n
s o lu t io ns ( o ff ic e a u to ma t io n s y s t e ms ) i m p rov e c o mm u n ic a t io n an d p ro d uc t iv ity
wi t hi n t ea ms a n d w or k gr o u ps . O t h er for ms o f i nf or ma t io n s y s te ms i nc lu d e of fi c e
au t om at i o n s y s t ems , wh ic h ar e n ot pa rt ic ul ar t o a ny o ne l ev e l of t h e c o mp a ny b ut
prov i d e v i ta l s up p or t t o a w i de r a ng e o f us ers . I n for m at i o n tec h n o lo gy is us e d t o
ty
s up p ort o ff ic e t as k s v i a of f ic e in fo rm at i o n s y s te ms . O ff ic e i nf or ma t i on s y s t e ms c an
ha n d le v o ic e ma i l, m u lt i me d i a s y s t e ms , e l ec tr o nic m a i l, v i d eo c on f ere nc i ng , f i l e
s har i n g, a n d ev en g r o up dec is i ons .
si
Ma na ge me nt Inf o rm a t ion S y st em s
Ma n ag e m en t i nf or ma t i on s y s t e ms ar e a ty p e of c o mp u ter i n for m at i on s y s t e m t h at
may c o l l ec t a n d p r oc es s da ta fr o m ma ny s ourc es t o ai d i n m a na g er ia l d ec is io n -
mak i n g. I nf or m at i on s y s te ms f or m an a ge m e nt T o a id i n c or por at e d ec is io n - m ak i n g,
er
prov i d e i nf or ma t io n i n th e f or m of pre - d e fi n ed r ep or ts a nd dis p lay s . L ow - l ev e l
ma n ag ers a nd s u p er v i s or s oc c u py th e nex t l ev e l o f t he or g an iz a ti o na l h i erarc hy .
Th is l ev e l c o nt a i ns c om p ut er s y s t ems t h at ar e d es i g ne d t o a i d o p er at i on a l
ma n ag e m en t i n mo n it or i ng a n d s up erv is i ng t he c ler ic a l l ev e l's tra ns ac t i on
iv
De ci s ion S uppo rt Sy st e m s
A C h o ic e S u pp or t S y s te m is a c o mp u ter - bas e d s y s t e m d es i g ne d t o as s is t a
ma n ag er or , mor e c o m mo n ly , a gr ou p of ma n ag ers a t a ny or ga n is a t io n al l ev e l in
mak i n g a d ec is io n i n t he pr oc es s of s o lv i n g a s e m i - s truc tur e d d ec is io n .
He i da rk h a ni c la i ms th at . D ec is i on S u pp or t Sy s t e ms ar e a ty p e of c o m pu te ris e d
ity
ac c or d i ng to S h im , is a c o m pu t er - b as ed i nf o rm at i on s y s te m t h at a i ds m an a g ers i n
mak i n g a v ar i ety of c o mp l ic at e d d ec is io ns , s uc h as th os e r eq u ir ed to tac k l e po or ly
de f in e d or s e m i - s tr uc t ur e d s i t ua t io ns .
)A
E xe cut iv e Inf or m at io n Sy st em s
Ex ec u t iv e I nf or ma t io n Sy s t e ms ( E IS ) h av e b ee n d es i g ne d to a l l ow q uic k ac c es s to
bo t h in t ern a l a nd ex t er n a l i nf or m at i on , wh i c h is of t en pr es e nt ed i n a gr ap h ic a l
fas h io n b ut c a n a ls o pr es e nt m or e ex t e ns iv e un d er ly in g d at a if n ee d ed . Ex ec ut iv e
i nf or ma t io n s y s te ms o ff er ex ec u tiv es a nd m an a ge rs w i th es s e nt i al i nf or ma t io n fr om
a v ar i ety o f i n ter n a l a n d ex ter n a l s o urc es ( MI S, D SS , a n d ot h er s o u rc es c us to m is ed
(c
to t he i n for m at i on n ee ds of ex ec ut iv es ) i n e as y - to- us e d is p l a y s . Ac c or d i ng t o
P at ters o n, a n EI S is a s y s te m t h at as s is ts t op ma n ag ers in mak i ng s tr a te g ic a nd
tac t ic a l dec is i ons . An ex ec u tiv e in f orm a t io n s y s te m, ac c ord i n g t o S hi m , is m ea n t t o
ge n er at e in fo r m at i o n th at is a bs tr ac t e n ou g h t o d is p l ay t h e en t ir e c or p or at e
fu nc t i o n i n a s i m pl i f ie d m a nn er t o s at is fy to p ma n ag e m en t.
e
E xp ert Sy st em s
Ex per t s y s t e ms ar e t h e AI c at e g ory t h at h a s ha d th e m os t s uc c e s s i n d ev e lo p i ng
lin
c om m erc i al a p pl ic a ti o ns . Ex p er t s y s t ems , ac c or d i ng t o O ' Br i e n a nd M ark , a re
k no w le d ge - b as ed s y s te ms th a t prov i d e e x per t a dv i s e a n d op era t e as ex p er t
c ons u lt a nts t o us er s . A n ex p er t s y s t e m, a c c ord i n g t o P at t ers o n , is a c o m p ut er
s of tw ar e t h at a tt e m pt s t o m im i c h u ma n r e as o n i ng . Ex pe rt Sy s te ms , ac c or d in g t o
S hi m , ar e a c o l lec t io n o f c o m pu te r pr og ra m mes t h at d o t as k s at t h e l ev e l o f a
On
hu m an ex p er t.
ty
s y s te ms a pp ly i n for ma t io n t ec h n o lo gy to a c o mp a ny 's pr o du c ts , s erv ic es , or
bus i n es s o p er at i ons i n or d er to pr ov i de i t a c om p et i tiv e a dv a nt a ge . Str a te g ic
i nf or ma t io n s y s t e ms , ac c or d i ng t o Be l l e e t a l. , ar e a u n i qu e ty p e of or ga n is at i on a l
i nf or ma t io n s y s t em th at is us ed t o g a i n or ma i nt a i n a c o m pe t it iv e a dv an t ag e i n t he
si
ma rk e tp l ac e. B us i n es s Sy s t e ms T ha t Work (I n for m at i o n Sy s t ems fr o m F unc t io n a l
P ers p ec tiv e) In f or m a t i on s y s te ms th at f oc us o n op er at i o na l an d a d m in is tra t iv e
ap p l ic a t io ns i n s up p or t o f es s e n ti a l b us i n es s o per a ti o ns are k n o wn as fu nc t io n al
bus i n es s s y s t ems . Ac c ou n ti n g, f in a nc e , m a rk et i ng , op er at i ons m an a ge m e nt an d
er
hu m an r es our c e ma n a ge m en t a r e ex a m p les of in f orm a t io n s y s t e ms t h at s erv e th es e
ap p l ic a t io ns . S a l es a n d m ar k et i ng s y s te ms , ma n uf ac t ur i ng a nd pr o duc t io n s y s t e ms ,
fi n anc e an d ac c o u nt i n g s y s t ems , an d h u m an r es o urc e s y s t e ms ar e t h e f ou r ty pes of
i nf or ma t io n s y s t ems c l as s if i ed by org a n iz a t io na l f u nc t i on .
iv
dec i d in g w h at t h ey n e ed or d es ir e , p l an n i ng an d d es i gn i ng pr od uc t s a n d s erv ic es to
fu l fi l t he ir d e ma n ds , an d a dv er t is in g a nd ma rk e t in g th es e pr od uc ts a n d s erv ic es .
Co nt ac ti n g c o ns u m er s , s el l i ng it e ms an d s e rv ic es , rec e iv in g or d e rs , an d f ol l ow i n g
up o n s a l es ar e a l l par t o f s a l es . Th es e op er at i ons ar e a i de d by s a les an d
ma rk e t in g i nf or ma t io n s y s te ms . Ac c or d i ng to S h i m, a ma rk e t i ng m a na g em e nt
i nf or ma t io n s y s te m ( MI S) h e l ps ma n ag ers w it h pr od uc t c r ea t io n, m ark et i ng mix ,
d is tr i bu t io n , pr ic i n g, p r o mo t io n al ef fec t iv e n e s s , an d s a l es for ec as t i ng .
ity
s tor a ge , an d av a i la b i li ty o f pr od uc ti o n m at er i als , a nd t he s c h e du l i ng o f eq u i pm e nt ,
fac i l it i es , m at er ia ls , an d la b o ur re q ui re d t o f as h io n f i n is h e d pro d uc ts . Th es e
op er at i o ns a r e a i de d by ma n uf ac t ur i ng a n d pr od uc ti o n in f orm a t io n s y s t e ms . Th e
pro d uc t i o n in fo r m at i o n s y s te m , ac c or d i ng t o Her n a nd ez an d R iv e r a, is a c o mp u ter
)A
s of tw ar e t ha t h a n dl e s a d at a bas e of pr o duc t io n - r e la t ed d at a. A ma n uf ac t ur i ng
i nf or ma t io n s y s t em 's o bj ec t iv e , ac c ord i n g to S hi m , is t o u s e c o m pu ter t ec hn o l ogy t o
i mpr ov e a pr o duc t io n s y s te m's pr oc es s a nd e ff ic i enc y , r es u lt i ng i n h ig h er pr od uc t
qu a l ity a n d lo w er m an uf ac t ur i ng c os ts . A m an u fac tur i n g s y s te m, i n ot h er w or ds , is
a s y s t em t ha t t ak es ma te r i a l, e qu i p me nt , da ta , ma n ag e me n t, an d in f o rm at i o n
s y s te ms t ec h n ol o gy as i n pu t a nd e m p loy s m a nu f ac t ur in g a nd in f orm at i on p roc es s es
(c
e
k ee p i ng a nd m on i tor i ng th e c om p any 's f i na nc ia l r ec ords , s u c h as r ec e ip ts ,
de pr ec ia t io n , a nd pay r o ll . S h i m c l a i ms th a t Ac c ou nt i n g s o ft war e's pr i m ary f unc t io n
is t o au to m at e t h e t e d io us w or k of e nt er in g a n d p os t i n g ac c o un ti n g tr a ns ac t io ns .
lin
Th is da t a is s tr uc t ur e d in a n e lec tr on ic f or ma t s o t h at f i na nc ia l s ta te m en ts c a n b e
ge n er at ed , a n d it m a y b e ac c es s i bl e ins ta nt ly t o a i d i n t he f ir m's m a na g e me nt .
Fi na nc i a l in for m at i o n i s pr ov i d ed t o al l f in a nc ia l m an a ger s ins i de a n or g a nis a ti o n
us in g a f i n anc i a l m an ag e me n t i nf or m at i on s y s te m. T h e i nf or m at i on ge n er at ed by
th e ac c ou n ti n g s y s te m is oft e n us ed t o m ak e f i na nc ia l d ec is i ons .
On
Hum an R es ou rc e Inf o rm at i on S y ste m s
Hu m an R es our c es I nf o r m at i on Sy s t e ms ( HR I S) ar e a m e th o d of g a t her i n g,
org a n is in g, s t or i ng , a n d d is s e m i na t in g h u ma n r es ourc e d at a t o as s is t ma n ag ers a t
a ll lev e ls o f a c o mp a n y i n m ak in g in for m e d d ec is i o ns . H u ma n res o u rc e i nf or ma t i on
s y s te ms ar e n ow us e d by t h e maj or ity of s uc c es s f u l f irms t o s u p po rt da i ly h u ma n
res o urc e ac tiv i t ies Kh an or e. T he hu m an r es ourc es d e par t me n t is i n c h arg e o f
ty
at trac t in g , dev e l op i n g, a n d r et a i ni n g th e c o m pa ny 's w ork forc e . Hu m an r es o urc es
i nf or ma t io n s y s t ems h e lp w i th t as k s i nc lu d i n g d is c ov er i ng po s s i b le e m pl oy e es ,
k ee p i ng c o m p le t e r ec o r ds o n c ur r en t e mp l oy ees , a nd dev e lo p i ng p rog ra m mes t o
he l p p eo p l e d ev e l op t h e ir ab i l i ti es a n d s k i l ls . Co nc lus i o n In c o m m er c i al
si
org a n is a t io ns , v ar io us ty pes of i n for m at i on s y s te ms ar e e mp l oy ed . Tra ns ac t io n
proc es s i ng s y s t e ms ar e us ed t o k e ep tr ac k o f t h e d a ily tr a ns ac t i on s t ha t ar e
req u ir ed t o r u n a f ir m.
er
1. 1. 6 Ty pe s of S y st e ms
Ty p es of Sy s t e ms
iv
Th e s y s te ms c a n b e d i v i de d i nt o t he f o l lo w i n g ty p es −
Ph y si ca l or A bst r a ct S yst em s
• Physical systems are real-world objects. We can reach out and touch them.
Un
• Physical systems can be either static or dynamic. Desks and chairs, for example, are static
physical components of a computer centre. A programmable computer is a dynamic system
that allows programmes, data, and applications to alter in response to the needs of the user.
• Abstract systems are non-physical or conceptual entities that can be formulas, models, or
representations of real systems.
O pen o r Cl os ed Sy st em s
ity
is u nc o m m on .
Ada pti v e and N on - A d apt iv e S y ste m
• A da pt iv e s y s t ems ad a pt t o c h an g es i n th e e nv iro n me n t i n or der t o i m pr ov e
th e ir p er f or ma nc e a nd ens ur e th e ir s urv iv a l. Hu m ans an d a n im a ls , for
)A
ex a m p le .
• Th e ter m " n o n- a d ap t iv e s y s te m" re fe rs to a s y s te m t ha t d oes n o t r e s po n d to
its s ur r o u nd i n gs . M ac h i nes , for ex a m p le .
P er ma ne nt o r T emp o ra r y S y st e m
(c
e
d is m a nt l ed af ter wa r d .
Nat ur al and M an uf a ct ur ed S y st e m
lin
• Na tur e is t h e o ne w h o c r ea t es na t ura l s y s t e m s . F or i ns ta nc e, c o ns i der t h e
s o lar s y s t e m a nd t h e s eas o na l s y s t e m.
• Th e ter m " m a nu fa c t ur ed s y s t e m" r ef ers t o a s y s te m t ha t h as be e n c rea t ed by
hu m ans . R oc k e ts , da m s , an d ra i l way s , for ex am p l e.
Det e rm ini st ic o r P rob abi li st ic Sy st em
On
• Th e i nt er ac t i on b et w e en s y s t e m c o mp o ne nt s is k n o wn w it h c o nf i de nc e i n
de t er m i n is t ic s y s t ems . W at er, f or ex am p l e, is m a de up o f tw o hy dr o g en
mo l ec u les a n d o ne ox y ge n m o l ec u l e.
• Th e be h av io ur of t h e Pr ob a b il is t ic Sy s t e m is i nc o nc l us iv e . T he pr ec is e
ou t pu t is u nk no wn . W e at h er for ec as t i ng an d ma i l d e l iv ery are t w o e x am p l es .
ty
So ci a l, Hu ma n - M a ch i ne, Ma ch in e S ys te m
• P eo p l e mak e u p t he s oc ia l s y s t em . S oc i al c l ubs an d s oc i et i es , f or ex a m p le .
si
• In a H u ma n - M ac h i n e S y s te m, bo th hu m ans a nd mac h i nes w ork t og et h er to
c om p l et e a t as k . T ak e , f or i ns t a nc e , c o mp u te r pr o gra m m i ng .
• Hu m an inv o lv em e nt is no t a l lo w ed in a mac h i ne s y s t e m. T he
er
mac h i nec o mp l et es a l l of t h e du t ies . Tak e, f o r ex a mp l e, a s e lf - dr iv i ng r ob ot .
Ma n – M ad e Inf o rm at io n Sy st em s
iv
O p era t io n a l- l ev e l s y s t ems , m an a g em e nt - l ev e l s y s t e ms , a n d s tr at e g ic - l ev e l s y s te ms
are t h e t hr e e bas ic ty pes o f i nf or ma t io n s y s te ms th a t s erv e d is t in c t org a nis a t io n al
)A
e
s uc h s y s te ms is w he th er or n ot t h i ngs ar e ru n ni n g s m o ot h ly . M an a ge m e nt - l ev e l
s y s te ms of te n g en er at e r ep or t s o n a r eg u l ar bas is ra th er th a n pro v i di n g r ea l - t im e
da t a o n ac t iv i ti es . A r e loc at i o n c o ntr o l s y s te m, for ex a m p le , re por ts o n ov er a ll
lin
re loc at i n g, ho us e - h u n ti n g, an d h o m e - f i na n c i ng c os ts f or em p l o y ees ac r os s a l l
c orp or at e d iv is io ns , h i gh l i gh t in g a ny ar e as w her e ac tu a l c os ts ex c e ed bu d ge ts .
Ro ut i n e dec is i on - m ak i ng is no t s u pp ort e d b y s ev er al m a n ag e me n t - l ev e l s y s te ms .
Th ey pre fe r t o c o nc e nt r at e o n les s - s tr uc t ur ed d ec is i o ns w i th a m b ig uo us i nf or m at i on
On
req u ir e me nts . T h es e s y s te ms fr eq u en t ly s o lv e " w h at - i f" pro b l ems , s uc h as : W h at
wo u ld h ap p en to pr o duc t io n pl a ns i f s a l e s d o u bl e d i n D ec e m b er? W h at i mp ac t
wo u ld a s ix - m o nt h de l ay i n a pro d uc t i on s c h e du l e hav e o n our re t urn o n
i nv es tm e nt ? A ns w er s to t h es e c o nc erns f req u e nt ly n ec es s i ta te n ew d at a fr om
ou ts id e t he or g an is at i on , as we l l as d at a fr om w i th i n th e or ga n is at i on t h at c a nn ot
be eas i ly ex tr ac t ed fr o m o per a ti o na l - l ev el s y s te ms .
S en i or ma n ag e me n t c an us e s tr at e g ic - l e v e l s y s t ems to a tt a c k an d ad dr es s
ty
s tra te g ic c o nc er ns a nd l on g - ter m tr e nds bo t h w it h in t h e c o m pa ny a n d i n t he
ex t er na l env ir o nm e nt . T he ir ma i n f oc us is ens ur i ng th at c ha n ge s in t h e ex ter n a l
env ir o nm e nt ar e m atc he d w i th or g a n is a t io n a l c a pac i ty . W ha t w i ll t h e e mp l oy me n t
s it u at i on be l ik e i n f iv e y e ar s ? W h at a re t h e l o ng - t erm c os t t re n d s in t h e i n dus try ,
si
an d h ow d oes o ur c om p any f i t in ? In f iv e y ears , wh at pr o d uc ts s h o u ld w e be
pro d uc in g ?
S al es a nd m ar k et i ng , ma n uf ac t ur i ng a n d pr od uc ti o n, f in a nc e a n d ac c o u nt i n g, an d
er
hu m an res o ur c es ar e a m on g th e p ri m a ry c orp or at e op er at i ons s erv ed by
i nf or ma t io n s y s t e ms . Eac h f u nc t i on a l ar e a i n a ty p ic a l or ga n is at i on c on ta i ns
op er at i o na l , m a na g e me n t, an d s t ra te g ic s y s te ms . O n an o pe r at i on a l lev e l, th e
s a les f unc t io n, f or ex am p l e, us ua l ly h as a s a les s y s t em t o rec or d d a i ly s a les d at a
iv
an d ex ec u te or d er s . A s y s t e m at th e m a na g em e nt l ev el tr ac k s m on th ly s a l es
nu m be rs by s a le s r eg i on an d g en er at es re p orts o n t err it or i es wh e re s a les ex c e e d
or fa l l s h or t o f ex pe c ta t io ns . T he s tr at e g i c l ev el is s erv e d by a s y s t em t h at
for ec as ts s a les tr e n ds ov er a f iv e - y ear p er i od . We b eg i n by d es c ri bi n g t h e m a ny
Un
ty p es o f s y s te ms t ha t s er v e e ac h or ga n is a t i on a l l ev e l , as w e ll a s t he ir us e fu l n es s
to th e c om p a ny . T h en , f or e ac h im p ort a nt b us in es s f u nc t i on , w e de m ons tr at e ho w
fir ms us e t hes e p l at fo r ms .
Four Ma jo r Ty pe s of S yst em s
Th e ty p es o f i nf or ma t i on s y s t ems t ha t c orr e s po n d t o e ac h or g an is at i on a l l ev e l ar e
de p ic t e d i n t h e d i ag r am . At t h e s tr at e g ic l ev e l , t he org a n is a t io n h as ex ec ut iv e
ity
s up p ort s y s t e ms ( E S S ) ; at th e m a na g em e nt l ev e l , it h as m an a ge me n t in f orm a ti o n
s y s te ms (M I S) a n d d e c is io n - s u pp ort s y s te m s (D S S) ; a nd at t h e o per a ti o n al l ev e l , i t
has tr ans ac ti o n pr oc e s s i ng s y s te ms ( T PS ). E ac h o f t he pr i m ary f u nc t i on a l are as is
s erv e d by s pec i a l is e d s y s te ms at e ac h l ev e l. As a r es u lt , s t an d ar d o rg a nis a ti o n al
s y s te ms ar e des i gn e d to a i d wor k ers or m a na g ers at a l l l ev e ls , a s we l l as i n th e
m
fu nc t i o ns of s a l es a nd mar k e ti n g, m a nu f ac t ur in g a n d pr od uc t i on , f in a nc e an d
ac c o u nt i ng , a nd hu m a n r es our c es .
)A
(c
e
lin
On
ty
si
Th e fo ur m aj or ty p es o f i nf or ma t io n s y s t ems are de p ic t e d i n F i g ure 1.
er
TP S , D S S, MI S , a nd E S S ex a mp l es ar e s ho wn in th is d ia gr am , a l on g w i th th e lev e l
of t h e org a n is a t io n a n d b us i n es s fu nc ti o n th at e ac h s u pp or ts .
iv
A s ec r e tary m ig h t n ee d t o us e a M I S t o f in d in for m at i o n, or a m i d d le ma n ag e m en t
m ig ht ne e d to ex tr ac t da t a fr o m a T P S.
Tra ns ac t io n pr oc es s i n g s y s t e ms ( T P S) ar e t he f ou n da t io n a l b us i n es s s y s t e ms t h at
s up p ort a n or g an iz at i on 's op er at i on a l l ev el . A tr a ns ac t io n pr oc es s i ng s y s t e m is a
c om p ut er is ed s y s t e m t h at ex ec ut es a n d r ec or ds t h e ev ery d ay nor m a l b us in es s
(c
e
c us t o mer b as e d o n pr e d et er m in e d c ri t er i a. A l l t ha t re m a ins is t o s e e if t h e
c ons u me r s at is fi es t he r e q ui r e m en ts .
lin
A pay r o l l T P S, as s ho w n i n F i g ure 2 - 3, is a c o m mo n ac c o u nt i ng tr ans ac ti o n
proc es s i ng s y s t em s e en i n mos t bus i nes s es . T h e mo n ey p a i d to e mp l oy ees is
trac k e d by a p ay r o l l s y s te m. D at a el e m en ts are d is ti nc t p i ec es o f i nf or ma t io n (s uc h
as a n a me , a d dr es s , or e m pl oy ee nu m b er) th at mak e u p t h e m as ter f i l e. T he da t a
e le m en ts ar e u pd a te d as d at a is e n ter e d i nt o t he s y s t e m. T h e ma s t e r f il e's c on t en ts
On
are m ix ed a n d m atc h ed i n v ar io us w ay s t o c re a te r e p orts for ma n ag e m en t a n d
gov er n me nt a ge nc ies , as we l l as to d is tr i bu t e p ay c h ec k s t o e mp l oy ees . O t h er
rep or t c o mb i n at i ons o f c ur r e nt d a ta p i ec es c an be g e ne ra te d us i ng t hes e T P S.
ty
si
er
iv
Un
Figu r e: A gr a ph ic a l i l l us tr at i o n of a T P S f or pay r o l l.
Fi gu re s ho ws s om e o th er c om m o n TP S ap p l ic a t io ns . S al es /m ark et i n g,
ity
si
TP S is d iv i de d i nt o f iv e f u nc ti o na l c a te g or ies : s a l es / m ark e t in g,
ma n uf ac t ur i ng / pr o d uc t i on , f in a nc e / ac c o u nt i ng , h u ma n res o urc es , a n d o th er
i nd us try - s p ec if ic s y s t ems . T h er e ar e s ub - fu nc t i o ns w i th i n eac h of t hes e maj or
fu nc t i o ns . T h er e is a s i gn i fic a nt a pp l ic at i on s y s te m f or e ac h o f t hes e s u b tas k s ( fo r
er
ex a m p le , s a l es ma n a g em e nt) .
TP S is us ed by m an ag er s to k e e p tr ac k of i nt er na l o pe ra t io ns an d th e f irm 's
re la t io ns h ips w i th t h e o uts i d e wo r l d . T P S are a ls o k ey i nf or ma t i on prov i d ers for
ot h er s orts of s y s t e m s . ( F or ex a m p le , t h e pay r o l l s y s te m s h ow n b el o w, to g et h er
wi t h o t her ac c o un t in g TP S , f e eds d at a to t he c o m pa ny 's g en er a l l ed g er s y s t e m,
wh ic h k ee ps tr a c k o f th e fir m 's inc o me a n d ex pe ns es an d g en er at es r e por ts l ik e
i nc o m e s ta te m e nts a n d b al a nc e s he ets .)
ity
MA NAG E M E NT IN FO R MA TIO N S Y ST E M S
Th e s t u dy of i nf or m a ti o n s y s t e ms i n bus i nes s a n d ma n ag e me nt is d ef i n ed as
ma n ag e m en t i nf or ma t i on s y s t e ms . M a na g e me n t i nf or ma t io n s y s te ms ( M I S) a ls o
ref ers to a s ubs et o f i nf or ma t io n s y s te ms th at s u pp ort m a na g em e nt - l ev e l fu nc t io ns .
m
si
Thr ee TP S g iv e s u m ma r is e d tr a ns ac t io n d at a t o t h e M I S r ep or ti ng s y s te m at th e
c onc l us io n o f th e t i m e p er i o d i n th e s y s t e m d ep ic te d i n t his d i agr a m. Ma n ag ers
hav e ac c es s to or ga n i s at i on a l da ta v i a t h e MI S , w h ic h a ls o pr ov i des th e m w i th th e
er
nec es s ary r e po r ts .
iv
Un
ity
m
A s a m pl e M I S r e por t i s s h ow n i n FIG
Th e MI S in F i g c r ea t e d a r e po r t t ha t s u m ma ris ed a n n ua l s a l es d at a.
ne e de d , m os t MI S s er v e m an a ge r s wh o ar e pr im ar i ly i nt er es t e d i n we ek ly , mo nt h ly ,
an d y e ar ly r es u l ts . M I S ty p ic a l ly r es p o nd t o ro ut i ne q u er ies t h at hav e b ee n pr e -
de f in e d a nd h av e a pr e - d e fi n e d s tra te gy f or res p o n di n g to t h em . F or ex am p l e, M I S
rep or ts m i gh t lis t t h e to ta l po u nds of l et tuc e c o ns um e d by a f as t - fo o d c h a in th is
qu ar ter , or c om p ar e to ta l an n ua l s al es n um b ers f or v ar i o us g oo ds t o p l an n e d
tar g ets , as s h o wn i n Fi g ur e 2 - 6 . I n g en e ra l, t hes e s y s te ms ar e r i gi d a nd l ac k
(c
an a ly t ic a l c a pa b i li t ie s . I n c o ntr as t t o s op h is t ic at e d m at he m at ic a l mo d e ls or
s ta t is t ic al m e th o do l og i es , m os t M I S us e s i m p le pr oc es s es s uc h as s u mm ar i es an d
c om p ar is o ns .
DE CI S IO N - SU P PO RT S Y ST E M S
e
c om p any . D S S as s is t m a na g er s i n mak i ng d ec is i o ns t ha t ar e o n e - o f- a- k in d,
fre q ue nt ly c ha n g in g, an d d i ff ic u lt t o pr e dic t i n a dv a nc e. T hey a re us ed to s olv e
lin
pro b l ems wh er e th e t e c hn i q ue f or a rriv i n g at a s ol u ti o n is n' t c o mp l et e ly pr ed e fi n e d
ah e ad o f t im e . A lt ho u gh D S S us es i nt er na l da t a fr o m T P S a n d MI S, t h ey f re q ue nt ly
us e d at a fr o m o uts i de s o ur c es , s uc h as c ur ren t s toc k pr ic es or c om p et i tor pr o duc t
pr ic es .
On
an a ly s e d a ta us i ng a n um b er of a l gor i th ms or c o nd e ns e v as t am o un ts o f da t a in to a
for m at th a t d ec is io n mak er s c a n u n ders t an d. D S S ar e c r e at ed i n s uc h a way t ha t
c ons u me rs c a n i nt er a c t w it h th e m di rec t ly ; t h es e s y s t e ms f e at u re us er - fr i en d ly
s of tw ar e. D S S a r e i nt e r ac t iv e in t he s e ns e t h at th e us er c an a lt er a s s um p ti o ns , as k
ne w q ues t io ns , an d a d d n ew d at a .
Th e v oy a g e - es t im a ti n g s y s te m o f a s u bs i di ar y of a l ar g e Am er ic an me t als f ir m th at
ty
op er at es ex c l us iv e ly t o t r a ns por t bu lk c ar g o es of c o a l, o i l, or es , a nd f i nis h e d g o o ds
for its p are n t c o m pa n y is a n in tr ig u i ng , m o des t, b ut po we rf u l D S S. T h e c o m p any
ow ns s om e s h ips , c ha r ter s o th er s , a n d c o m pe t es f or ge n era l c ar go tr ans p ort at i o n
c on tr ac ts o n th e fr ee ma r k e t. Th e f in a nc ia l an d t ec h n ic a l d et a i ls of a v oy a ge ar e
si
c a lc u l at e d by a v oy ag e - es t i ma t in g s y s te m. S hi p /t i me c os ts (f u e l, l ab o ur, c a p it a l),
fre i gh t ra tes f or v ar i o us ty p es o f c ar go , a n d p ort c h ar ges are al l i nc l ud e d i n th e
fi n anc i a l c a lc ul a ti o ns . Sh i p c ar g o c a pac i ty , s p e ed , p ort d is t anc e s , fu e l a n d wa t er
us a g e, a nd l o ad i n g p at ter ns ar e o n ly a f e w o f t h e t ec hn ic a l f e a tur es ( l oc a t io n of
er
c arg o f or d if f er e n t por t s ) .
Q u es t i ons l ik e t h es e c an be ans we re d by th e s y s t em : W h ic h v es s e l s h o u ld be
as s ig n ed a t wh a t r a t e t o op t im is e pr of it a b i li ty giv e n a c l i en t de l iv ery s c he d u le a n d
iv
an of f ere d f r e i gh t r at e ? Wh at is th e o p ti m u m s pe e d a t w h ic h a v es s e l c a n m ax i m is e
pro f it w h i le s t i l l m e et i ng its d e l iv ery d ea d l in e? W ha t is t h e bes t l o ad i n g pa tt er n f or
a s h i p s a i l in g fr o m M a lay s i a t o t he W es t Co as t of th e U n it e d St a tes ? T he D SS
Un
FIG A s y s t e m for es t i ma t in g a n d m ak i n g d e c is io ns a b ou t a tr i p.
(c
e
of D S S ar e l es s mo d el - dr iv e n , f oc us e d ins t e ad o n r etr i ev in g me a n i ng f ul i nf or m at i on
fro m l ar ge a m ou n ts of d at a to a i d dec is i on - mak i n g. I ntr aw es t, fo r ex a m p le , c o ll ec ts
lin
an d m a i nt a ins mas s i v e a mo u nts o f c l i e nt d at a fr o m it s W eb s it e , c a ll c en tr e ,
ac c o m m od at i o n r es er v at i ons , s k i s c ho o ls , a nd s k i e q ui p m en t r en t a l o u tl e ts , a mo n g
ot h er p l ac es . It a na l y s es t hes e d a ta w i t h s o p h is t ic at e d s of tw a re t o as s es s t he
v a lu e, i nc om e po t en t i a l, an d l oy a l ty o f e ac h c o ns um er s o t h at ma n ag e m en t may
be tt er ta rg et t he ir m a r k et i ng in i ti a tiv es . C u s to m ers are d iv i de d i nt o s ev e n gr ou ps
On
de p en d i ng on th e ir n e eds , a tt i tu d es , a n d h a b its , w it h c l as s if ic at i o ns r a n gi n g fr om
" pas s i o na te ex p er ts " t o " v a lu e - c o ns c i o us f a m ily v ac a t io n ers ." T h e c or p or at i on t h en
s en ds o ut v id e o s n ip p ets t o e ac h p ar t i n or der t o e nt ic e m or e pe op l e t o v is it i ts
res o rts .
ty
E xe cut iv e Supp ort Sy st e m s
Ex ec u t iv e s u pp or t s y s te ms ( E S S) as s is t s en i or m a na g ers i n m ak i n g d ec is io ns . T he
si
s tra te g ic l ev e l of t he or g a n is a t io n is s erv e d by ES S . B ec aus e t he re is n o a gr ee d -
up o n t ec hn i q ue f or a r r iv in g at a s o l ut i on , t hey h a nd l e no n - r ou t in e d ec is i ons t ha t
req u ir e j ud g e me nt , a p pr a is a l, an d i ns ig h t.
er
Ex t er n al ev e nts , l ik e as ne w t ax r e gu l at i o n s or c o mp et i to rs , ar e i nc or p ora t ed i n to
E S S, bu t t hey a ls o p u ll s um m ar y d a ta fr o m i nt er n al MI S an d DS S . Th ey f i lt er ,
c om pr es s , a n d t r ac k i mp or ta n t d a ta , d is p l a y i ng o n ly t h e i nf or ma t i o n t ha t ma tt ers
mos t t o s e n ior ex ec u t iv es . F or ex am p l e, t h e C EO o f L e in er H e al th Pro d uc ts , t he
iv
wi d e r a ng e of is s u es . E S S ar e l es s l ik e ly t o ut i l is e a n a ly t ic a l mo de ls , des p it e t he
fac t th at ma ny D S S ar e s u pp os ed t o b e ex t r em e ly a n aly t ic a l .
Th e f ol l ow i n g ar e s o me of th e q u es t i on s th at E S S c a n h e l p w i th : W h at k i nd of
bus i n es s s h o u ld w e b e in ? W h at ar e y o ur r i v a ls u p to ? W h at fres h p urc h as es mi g ht
m
s h ie l d us fr om c om p a ny c y c l ic al s w i n gs ? W h ic h as s e ts s ho u l d we s e l l i n or d er to
ra is e f un ds f or ac qu is i ti o ns ? A m o de l of a n E S S is s h o wn i n F i gu r e 2 - 8 . I t c ons is ts
of work s t at i ons wi t h me n us , i nt er ac t iv e gr a ph ic s , a n d c o m mu n ic a ti o ns c a p ab i l it i es
for ac c es s in g h is tor ic a l an d c o mp e ti t iv e d a ta fr o m in t ern a l c or po rat e s y s te ms a n d
)A
de p ic t e d i n Fi g . T P S a r e us ua l ly a k ey da t a s ourc e f or o th er s y s t e ms , w h ere as E SS
are l ar ge ly d at a r ec e i v er s fr o m lo wer - l ev e l s y s te ms . O t her ty pes of s y s te ms may
a ls o c o mm u n ic a te w it h o n e a n ot h er. Da ta c an a ls o b e s har e d a m on g s y s te ms t h at
s erv e v ar i ous f u nc t i o n a l ar eas . An ord er c a pt ur ed by a s al es s y s t em , f or ex a mp l e ,
Un
1. 1. 7 S y st em Mo de l s
S ch em ati c Mo de ls
• A s c h em a tic mo d e l is a tw o - d im e ns io n a l d i agr a m th a t de p ic t s s y s t em
e
e le m en ts a nd t h e ir c o nn ec ti o ns .
• In for m at i o n f l ow , m at e r i al f l ow , a nd i n for m at i on f e ed b ac k are a l l re pres e nt e d
by d if fer e nt a r r o ws .
lin
Flow Sy st em M od el s
• Th e or d er ly f l ow o f m at er ia l , e ner gy , an d i n for m at i on t h at h o l ds t he s y s t e m
to g et her is d ep ic te d i n a f l ow s y s t e m m od e l.
On
• For ex a mp l e, t h e Pr o g r a m Ev al u at i o n an d R ev ie w T ec h ni q ue ( P ER T) is us ed
to a bs tr ac t a r e a l - w or l d s y s te m i n to a mo d e l.
St ati c S y st e m Mo de l s
ty
qu a nt i ty .
• Th e G a nt t c h ar t, f or ex a m p le , d e pic ts t h e ac t iv ity - t im e r el a ti o n s h ip i n a
s ta t ic ma n ne r .
Dyn a mi c S y st e m Mod el s
si
O rg an iz at i o ns i n th e b us in es s w or ld ar e dy n am ic s y s t e ms . T he s o r t of or g an is at i o n
er
or a pp l ic at i on t h at a n a ly s ts de a l w it h is a p pr ox im at e d by a dy n am i c m o de l .
• E nt er in g t he s y s t e m's i np uts
• Th e dev ic e t ha t a l lo ws m et a m orp h os is to t ak e p lac e .
• Th e pr ogr a m( s ) n ee d e d to proc es s t he d a ta
• Th e it e m( s ) t ha t ar e pr od uc ed as a r es u lt o f t he proc es s i ng .
Un
e
i n th e n ex t y e ar s . Tr e n ds i n r ev en u e, f i na nc i a l i nv es tm e nt , h um a n res o urc es ,
an d p o pu l at i o n i nc r e as e, f or ex a mp l e.
lin
• W it h t he he l p of a Dec is io n S u p por t Sy s te m , th is ty pe of i n for m at i o n c a n be
ob t ai n ed ( DS S) .
Ma na ge r ia l Inf o rm at i on
• M id d l e ma n ag e m en t r e qu ir es t h is ty p e o f da t a for s hor t a nd in t erm ed i at e -
On
ter m p l an n i ng , wh ic h i s m e as ur e d i n m on t hs . S a l es an a ly s is , c as h f l ow
proj ec t i o ns , a n d a nn u a l fi n anc i a l s ta t em e nts ar e j us t a fe w ex am p l es .
• It is ac c o m pl is h ed t hr o ug h t he us e o f M a na g em e nt I nf or m at i on Sy s te ms
(MI S)
ty
O pe r atio na l inf o r mat i on
• Lo w m an a g em e nt r e q u ir es th is i n for m at i o n fo r d a i ly a nd s h or t - t er m p la n ni n g
i n or d er t o e nf or c e d a y - to- d ay o per a ti o na l a c ti o ns . Ke e p in g tr ac k of
em p l oy e e a tt e nd a nc e , ov er d u e purc h as e ord ers , a n d c urr e nt s t oc k l ev e ls , for
ex a m p le .
si
• Da ta Pr oc es s i ng Sy s t e ms ar e us ed t o d o th is (D P S) .
er
1. 1. 8 C ate go ri e s of i n f or mat ion
Fur th er C at e gor iz ed a s :
• Formal Information Systems (FIS) are in charge of the flow of data from upper management
iv
to lower management. Lower authority, on the other hand, might provide feedback to top
management.
• Informal Information Systems: Informal information systems are built on employees. These
Un
are designed to address difficulties that arise in the workplace on a regular basis.
• Computer-Based Information Systems (CBIS): These systems rely on computers to manage
business applications.
ity
m
)A
(c
e
lin
On
Info rm at ion s y st e ms ( IS )
Data is captured and managed in businesses in order to provide meaningful information that benefits
the organization's employees, customers, suppliers, and partners. Many businesses believe that
information systems are critical to their capacity to compete and obtain a competitive advantage. Most
ty
businesses have realised that employees must be involved in the development of information
systems.
1. Tra ns ac t io n pr oc es s in g s y s te ms (T P Ss )
si
2. Ma n ag e m en t In f or m a ti on s y s t e ms ( M I Ss )
3. D ec is i o n s u pp or t s y s t ems ( DS Ss )
4. Ex ec u t iv e in f or m a ti o n s y s te m (E I S)
5. Ex per t s y s t ems
er
6. Co m mu n ic at i ons an d c o ll a bo ra t io n s y s t em
A ut o ma t io n s y s t ems
iv
1. Dec o mp os it i o n
2. Mo d u lar i ty
3. Co u pl i n g
4. Co h es i o n
dec o mp os i ti o n. T h es e c om p on e nts m ay c o n s ti t ut e s y s t e ms (s u bs y s te ms ) i n a n d o f
th e ms e lv es , a n d t h ey c an b e s p l it d ow n f ur t her . Dec o mp os i ng a s y s te m a ls o a l l ows
us t o f oc us on a s i ng l e c o m p on e nt of t he s y s te m, m ak in g i t e as i er t o c onc e iv e o f
way s t o i mpr ov e th at c o m po n en t wi t ho u t a ff ec ti n g th e r es t of t h e s y s t e m.
Dec o mp os it i o n is a t ec hn i q ue t h at a l l ows a s y s te ms a na ly s t to do t he f o l lo w in g :
e
1. Bre ak a s y s t e m do w n i nt o s m a l l, m a na g ea b le , a nd u n de rs t oo d s ubs y s t ems .
lin
2. C o nc e ntr a te y our a tt e nt i on o n o n e a rea (s ubs y s t em) at a t im e, fr e e o f
d is tr ac t i o ns fr om o th e r r eg i o ns . Co nc en tr at e o n t h e p ar ts o f t h e s y s t e m t h at a r e
re lev a nt t o a s p ec if ic gr o u p of us ers , r a th er th a n d is tr ac t i n g th e m wi t h irr e lev a nt .
3. B u i ld di ff er en t e l em en ts of t h e s y s t e m at d if fer e nt t i mes a n d wi t h th e as s is t a nc e
On
of v ar i o us a na ly s ts .
ty
Co u pl i n g T h is i n d ic a te s t ha t s u bs y s t e ms ar e i n ter d ep e nd e nt . S u bs y s te ms m us t be
as s e lf - c o nt a i ne d as pos s i b le . I f o ne s ubs y s te m f a il s a nd ot he r s u bs y s te ms ar e
he av i ly r e li a nt o n it , th e ot h er s w i l l e i t h er f a i l or hav e d if fic u lty o per at i n g. A
si
ha n dh e l d M P3 p lay er 's c o m po n en ts ar e t ig ht l y c o n nec te d .
re me dy th e pr ob l e m may b e gr ea t er t h an th e v a l ue o f t h e c ir c u it b oar d i ts e l f.
B ec a us e t h e s ubs y s t e ms , s uc h as th e s p eak ers , a m p li f ier , r ec e iv er , a n d CD p l ay er ,
are p hy s ic a l ly s e p ar a te a nd o per a te i nd e p en d en t ly , th e c o mp o n en ts in a ho m e
au d i o s y s t em ar e l o o s e ly c o nn ec te d. O n ly th e a m p l if i er i n a h o me s te re o s y s t e m
Un
has t o b e f ix e d i f i t fa i l s .
Coh es ion
Cohesion Is the amount to which a subsystem carries out a single task? Providing electricity is a
single function in the MP3 player example. This quick overview of systems should help you better
ity
understand computer-based information systems and how they are constructed. Many of the same
ideas apply to information systems as they do to systems in general. In the next section, we'll look at
how the process of developing information systems has evolved over time, as well as the
technologies that have aided it.
m
1. …… … …… … … is a s er v ic e pr ov i d er to t h e a p p lic a ti o n pr ogr a ms .
2. To ac c es s th e s er v ic e s o f th e o p era t in g s y s t em , t he in te rf ac e is pr ov id e d by th e
…… … …… … …
3. O p era t in g s y s t em pl ac ed in …… …. . m e mory .
(c
4. If a process fails, most operating system write the error information to a .............
5. .................is not a real time operating system?
True/False
e
be tw e en t h e A P I an d a pp l ic at i on pro gr a m
2) In O per at i n g Sy s te m s , pr i or ity is a C P U s c h ed u l in g a l g ori t hms
lin
3) CP U s c h e du l i ng is th e b as is of mu l ti pr o gra m m in g o p era t in g s y s t em s
4) K ern e l is t h e pr ogr a m th at c ons t it ut es t he c e ntr a l c or e of t h e o per a ti n g s y s te m
5) P ow er f ai l ur ew i l l b e h an d l e by th e o p era t in g s y s t em
On
Su mm ar y
ty
• Tec hn o l ogy im pr ov e m en ts o n a r e g ul ar b as i s g iv e or ga n is at i ons w it h
op p ort u n ity t o i nc or p or at e t he m os t up - t o- da t e k n ow l ed g e i nt o t he ir d a i ly
op er at i o ns . Th e us e o f s y s t em an a ly s is a nd des i g n to a d dr es s i nt e rna l
pro b l ems , i nc r eas e e ff ic ie nc y , an d ex te n d pr os p ec ts has a d irec t i mp ac t on a
si
c om p any 's b ot to m l i n e . As a r es u lt , w ei g h in g t he be n ef its is a w ort hy e nd e av o ur
for b us i nes s ow ner s a nd ma n ag ers .
• A s y s te m is a n i nt e r c on n ec t e d s et of b us i n es s op er at i ons (o r c o mp o ne n ts ) t h at
er
fu nc t i o n t o ge th er fo r a s pec i f ic g o a l w i th i n a s i ng l e bus i n es s u n it . In th e p ay ro l l
de p art m en t, for ex a m p l e, a s y s t e m k e e ps tra c k o f c h ec k s , w h er eas a n i nv en t ory
s y s te m k ee ps tr ac k of go o ds . T h e tw o s y s te ms ar e i nd e pe n de nt o f on e a n ot h er.
Th ere a r e n i ne c har ac ter is tic s t h at d ef i n e a s y s te m. Eac h a ttr i bu t e is ex p l ai n ed
i n d e pt h be l ow ; t h e s y s te m oc c urs i ns i de a bro a d er w or ld , or env i ron m e nt . T he
iv
Act iv it y
Pr ep ar e a P P T on V ar i ous ty p es of s y s t e m .
1. De f in e t he I ntr o d uc t i o n a nd M e a ni n g of Sy s t em .
2. Dis c us s t he Sy s t e m Im por t anc e .
3. Ex pl a i n th e C har ac ter i s tic s of a Sy s t e m .
4. Dis c us s t he E le m en ts of a Sy s t e m .
m
5. Dis c us s R o le o f s y s t e m / In f or m a ti o n s y s te m i n c r e at i ng ef fec t iv e or g an iz at i o n .
6. Ex pl a i n th e Ty p es o f S y s te ms
7. Ex pl a i n th e C at e gor i es o f i nf or ma t io n
)A
G lo ss a ry
•
(c
e
• Pu rpo s e: Th e ov er al l go a l or f u nc t i on o f a s y s te m.
lin
• En vi ro nm ent : Ev er y th i ng ex t ern a l t o a s y s te m th a t i nt er ac ts w it h t he s y s t e m.
On
• Con st ra int s: A li m i t t o wh a t a s y s te m c a n a c c om p l is h.
• Input: I n pu ts ar e t he i nf or ma t io n t ha t e nt ers i n to t h e s y s te m f or pr oc es s i n g.
• O utput : T he ma i n o bj ec t iv e of a s y s t em is t o g et a n o u t p ut wh ic h is he l pf u l f or
its us er . O u tp ut is th e fi n a l ou tc om e o f pr oc e s s i ng .
ty
Furt he r R ea din gs
• Ho w t o D o Sy s t e ms A na ly s is , J o h n E . G i b s on , W i ll i a m T. Sc h er er, W i l l ia m F .
G i bs o n , M ic h a e l C. S m it h
• Sy s t e ms A n aly s is an d Des i gn Pr in t ed Ac c es s C ard ), H arry J . R os e n b la tt
si
• Th e Sy s te ms T hi nk e r , A na ly t ic a l Sk i l ls : Lev e l U p Y o ur Dec i s i on Mak i ng ,
Pr ob l e m S o lv i n g, a n d De d uc t i on Sk il ls . No t ic e T h e De t ai ls O t h ers M is s .
er
Ans w e r s t o S elf - A ss e ss me nt Q ue st ion s
2. Sy s t e m c a l ls
3. l ow or h i g h
4. l og f i l e
Un
5. Palm OS
Tru e/ Fa l se :
1. Fa ls e
2. Tru e
3. Tru e
4. Tru e
5. Tru e
ity
Unit - 2 .1 R ol e o f S yst em
m
Le ar nin g O b j ect i ve s:
• De f in e t he R o l e of s y s te m / i n for m at i o n s y s te m i n v a l u e ge n er at i on w i th i n
org a n iz a t io n a l l ev e l .
• Dis c us s t he A ut om a ti o n Sy s te m S tr uc t ur e i n bus i n es s pr oc es s .
• Ex pl a i n th e In t egr a t ed b us i nes s m o du l e s - ma n uf ac t ur i ng a n d s erv ic e
i nd us tr y .
•
(c
Dis c us s t he Tr a di t io n a l E R P Sy s te m .
• Dis c us s O n l i ne ER P S y s te m .
Int rodu ct ion
e
Ma n go has a c or e of d es i gn er s a n d pr od uc ti o n fac i l i ti es c a pa b l e of r ap i d ly
pro d uc in g n ew f as h io n d es i g ns . M a n go , o n t he ot her ha n d, w o ul d n ot b e a b le t o
s toc k its s t or es w it h tr e ndy f as h io n tr en d s as r ap i d ly w it h ou t its s op h is t ic at e d
lin
i nf or ma t io n s y s t e ms . T o pr o mo te i nv e nt ory re p le n is hm e nt , t hes e in fo rm at i o n
s y s te ms as s is t f in e ly c a li br at e d b us in es s p r oc es s es t h at org a n is e it e ms d ep e nd i n g
on s ty l e a nd c us t o mer tas tes .
On
ma n ag er . Yo u' l l n ee d to k n ow wh a t k in ds of i nf or ma t io n s y s te ms are av a i la b l e a n d
wh at t h ey c a n do f or f i r ms .
ty
ma n ag e m en t s y s te ms , ar e n ex t br i ef ly d is c u s s ed . Th es e en t erpr is e ap ps c ov er t he
en t ire c or p or a t io n , i n t egr a ti n g da ta fr om m a ny f u nc t i ons a nd b us i n es s pr oc es s es t o
i mpr ov e ov er a l l p er for ma nc e.
si
Ma jo r Ty pe s of S y st e ms n O r gan iz atio ns
fi n anc e a nd ac c o un t i ng , an d h um a n r es o urc es ar e fu rt he r s e gm e nt e d. Th es e
v ar io us or g an is at i o na l i n ter es ts are s erv e d t hro u g h s y s t e ms (A n th ony , 1 96 5) .
Un
ity
m
)A
(c
Fi g: Ty pes of i n for m at i on s y s t e ms
S al es a nd m ar k e t in g , ma n uf ac t ur i ng a n d pr od uc ti o n, f in a nc e a nd ac c o u nt i ng , an d
hu m an res o ur c es ar e t he f our b as ic f un c t i on a l c a te g or ies t ha t org a n is a t io ns c an b e
e
s ep ar at e d i n to at th e s tr a te g ic , m an a ge m e nt , an d o p er at i on a l lev e l s . E ac h o f t hes e
l ev e ls a n d fu nc t i o ns is s er v e d by i nf or m at i on s y s t ems .
lin
2. 1. 1 Ro le of s y st em / i nf o rm at i on s y ste m in v alu e ge ne r ati on w ithi n
org an iz at ion a l le v el
By de l iv er in g ac c ur a t e an d up - t o- d a te d at a an d pe rf or mi n g an a ly t ic ac t iv it i es ,
On
ma n ag e m en t i nf or m at i on s y s t e ms c a n as s is t y ou in mak i n g s o un d d ec is i o ns . Yo u
mus t e ns ur e t h at t h e ma n ag e m en t i nf or m at i on s y s t e m y o u s e l ec t i s c o m pa t ib l e w it h
th e in fo rm at i o n f or ma t s us e d in y o ur f ir m a n d i nc l ud es t h e c a p ab i l i ti es y ou r e qu ir e.
Th e b as ic da t a ac c e s s i bl e fr o m y o ur c om pa ny 's ac tiv i t ies a nd rec ords c a n be
s truc tu re d i n to r ep or ts by s u it a bl e ma n ag e m en t i n for m at i o n s y s te ms , prov i d in g y ou
wi t h d irec t io n f or y o ur dec is i ons .
ty
W he n y o u m ak e j u d g me n ts b as ed o n da t a fro m m an a ge m en t i nf o rm at i on s y s t ems ,
y ou 're r ef l ec t i n g i n for ma t io n f r o m y o ur c o mp a ny 's ac t iv it i es . Da ta c r ea t ed at th e
work i n g lev e l is o r g a ni s ed in t o us e f ul f or m at s by m a na g e me nt in f o rm at i on s y s t e ms .
si
S al es fi g ur es , ex p e n s es , i nv es t me nts , an d l a b our d at a a re c om m o nly s e en i n
ma n ag e m en t in fo r m at i on s y s te ms . M a na g e me n t i n for m at i on s y s t ems c a n pr ov i de
re li a b le s ta t is t ic s i f y ou ne e d t o k n ow h o w m uc h pr of i t y o ur f ir m h as m a de e ac h
y ear f or t h e pas t f iv e y ear s in or d er t o m ak e a d ec is i o n.
er
Cap ab il it y t o R un S c en ar io s
iv
s c en ar i os d em o ns tr at e h ow s ev er a l v ar i ab l es c h a ng e as a r es u l t of a d ec is i o n.
Y ou c a n e nt er l ow er s t a ff l ev e ls or h i g h er pr o m ot i on b ud g ets t o ex a m i ne h ow
d if fer e nt de gr ees of c ut b ac k s or inc r e as es af fec t re v e nu e , ex pe n d it ures , a n d pr of i t.
Ma n ag e m en t i n for m at i on s y s te ms ( MI S) s y s t ems ar e es s en t i al for c rea t in g r ea l is tic
s c en ar i os .
ity
A tr en d a na ly s is e n ab l es y ou t o d e mo ns tr a te w ha t th es e ou tc om es w ou l d b e in t h e
c urr en t c irc u ms t anc es a n d ho w t hey w i l l c h an g e o nc e t h e d ec is i ons y ou 'v e m a d e
)A
Imp le me nt a t io n and E va lu at i on
Y ou mus t tr ac k c om p a ny r es ul ts t o ens ur e t h ey ev olv e as a n tic i p at ed , ev en if y o u
mak e d ec is io ns w it h p ar t ic u lar go a ls i n m i nd a n d hav e d oc um e nt at i on fr o m
(c
e
ex tr a m e as ur es .
lin
2. 1. 2 Aut om at i on S y s t em St r uct ur e in bu s i ne ss p ro ce s s
On
to d ay 's gu i de . W e' l l l o ok a t t h e v a ri o us as p e c ts o f B PA , as w e l l as th e in f lu e nc e i t
has on bus i nes s es , a s w e ll as h ow i t m ay b e a pp l i e d an d t h e us u a l t oo ls o f t he
tra d e.
ty
par t of t he ins tr um e n ts us e d to c o nt i n uo u s ly i mpr ov e en t erp ris es , fr om ro b ot ic
pro d uc t i o n to ar t if ic i a l i nt e ll i g enc e.
Th e B as ic s of Bus i n es s P r oc es s A ut o m at i on
si
" A pr oc es s of ma n a g in g i nf or m at i on , d at a, a n d pr oc es s es t o d ec r eas e c os ts ,
res o urc es , an d i nv es t me n t," ac c or d in g t o B us in es s Pr oc es s A ut o ma t io n .
er
B us i n es s Pr oc es s A u to m at i on , or B P A, is i n te n de d t o m ak e b us in es s es m ore
ef f ic i e nt a n d to as s is t o r g a nis a t io ns m a in ta i n l o ng - t erm ef f ic ie nc y . Cer ta i n
ac t iv it i es ar e a ut o m at e d us i n g a r a n ge of t ec h n ol o g y - bas e d s o l ut i o ns , m os t
iv
Ac c ord i n g t o a r es ea r c h by V en tur e B e at , B P A c a n he l p f ir ms s av e up t o 40 0
Un
perc e nt of t he ir c os ts . It w as th e f as t es t - gr ow i ng s of tw ar e c at e g ory i n t he f o ur t h
qu ar ter of 2 01 9, a nd i t w i ll c o nt i nu e t o ex p a nd as it bec o mes m or e w i de ly ad o pt e d
ac ros s in d us tr i es .
B us i n es s pr oc es s a ut o ma t io n is b as ed on thr e e f un d am en t al pr i nc i p l es .
O rc h es tr at i o n is t he f ir s t of t h es e . B ec aus e of t h e w ay a B P A s y s te m is s et u p ,
fir ms w i l l b e a b le to c ons tr uc t ma ny c o nc u rre nt s y s t e ms to be tt er m a na g e th e ir
ity
c om p ut er i n fr as tr uc t ur e.
A no th er o f t h es e i d ea s is i nt e gr a t io n . Wh e n al l o f t h es e p arts a re s i mp l if i e d in t o
on e s y s t e m, t h ey c a n wor k t o ge t her for be tt er e ff ic ie nc y a n d s y n e rgy w he n i t c o m es
to ac h i ev i n g fu t ur e c or por a te o bj ec t iv es .
m
tas k s t h at s t af f m us t a c c om p l is h.
B us i n es s pr oc es s a ut om a ti o n s y s t ems are c om p l ic at ed in an d o f t he ms e lv es , b ut
th ey a i m t o dr as t ic al ly s i m p l ify h o w a c o m pa ny o per a tes . B P A s y s t ems en a b l e y ou
to c o or d in a te a s tr a t egy , i nt e gr at e a l l o f y our bus i n es s pr oc es s es , a n d ex ec u t e
(c
i mp or ta nt t as k s a ut o m at ic a lly .
e
box es ar e c o ns ol i d at e d as m uc h as p os s i b l e .
Fi na l ly , as pr ev io us ly s ta te d , t he g oa l of b u s i nes s pr oc es s a ut o m at i on is to r e duc e
lin
hu m an en g ag e m en t. Dev ot i n g i mp or ta n t p ers o n n el r es o urc es , mo n ey , a n d o th er
res o urc es t o o p er at i o ns t ha t m ay be a ut o ma t ed wi l l s wi ft ly de p l et e a c om p a ny 's
res o urc es a nd br in g i t do w n i n th e l o ng r u n .
Th es e s y s t e ms pr ov i d e nu m er ous a dv an ta g es f or b us in es s es , a n d it is c r it ic a l t o
On
dev e l op th e m as q u ic k ly as p os s ib l e in or d er t o max i m is e a c o m pa ny 's p ot e nt i al .
Th e m aj ori ty of t h es e s y s te ms ar e m ad e up of thr e e pr i m ary c o m p on e nts , w h ic h w e
wi l l g o t hro u gh in t h e nex t p ar t .
ty
W he n y o u lo ok a t t h e t hr e e es s e nt i a l " bu i ld i n g bl oc k s " of a b us in es s pr oc es s
au t om at i o n s y s te m t h at y o u j us t r e ad a b o u t, t her e ar e s o m e is s ues t h at t h ey ar e
des i g ne d t o a d dr es s , j u s t l ik e any ot h er s y s t em th at is in tro d uc ed to he l p i nc r eas e
org a n is a t io n a l e ff ic i e nc y . Th e as p ec ts o f th e s t ra te gy th a t b us i nes s es ne e d t o
si
c rea t e to mak e t his ha pp e n w il l b e re f erre d t o as t he c h a l le n ge s t h at B PA s olv es .
B P A s y s t e ms c an b e q ui t e c o m p l ic a t e d , h ow ev er t h ey us u a l ly c ons is t of th re e
er
c om p on e nts . T he f ir s t o f t h es e f ac tors is b us in es s ru l es a n d l o g i c . B us in es s r ul es
are es s en t ia l ly t h e p o l ic ies th at a c om p any im p l em e nts ; h o wev er , t his is a m or e
for m a l um br e l la w or d th at e nc o mp as s es a ll of t hos e p o l ic i es . B us i nes s l o g ic is i n
l in e w it h th is s i nc e it is h ow p o lic i es ar e c o nv er t ed i n to pr oc es s e s , w h ic h a re t he
proc e d ures th a t m ov e a c o m pa ny to w ard i ts obj ec t iv es . Th is e le m e nt of th e s y s te m
iv
wi l l b e t h e b as e li n e t h at i nf or ms t h e r em a i n der o f t h e s y s t e m in b us in es s proc es s
au t om at i o n.
Un
Th e r e as o n i ng w i l l b e de f in e d by t h e r u l es , a nd mos t o f t he lo g ic c an be au t om a te d.
Ev en p ar ti a l a ut o ma t i on c a n h e lp t o r e duc e hu m a n erro r an d k e ep t h in gs m ov in g
a lo n g s m oo th ly .
Th is is th e ty pe o f da t a t h at a na ly t ic s u s es t o as s is t in fo rm fu t ure b us i nes s
proc es s es a n d as s es s p er for m a nc e . B P A pl ans of te n c o n ta i n pr o c es s e s th at he l p
ex p e d it e t he c o l lec t io n a n d i n te gr at i on of th i s d a ta i nt o us a bl e an d s uc c i nc t r e por ts
s o th a t it may b e e ff ic i en t ly us ed .
m
W he n fac e d w i th th e t as k o f c ons tr uc t i ng a s y s te m t h at is p l ai n ly c om p l ex , i t c a n be
d if fic u lt to s ee th e v a lu e i n inv es ti n g i n o n e w it h ou t k n o wi n g w ha t t he en d
ou tc om es w i l l b e. S o, le t's t ak e a lo ok a t a f e w o f B P A's m os t i m por t an t
adv a nt a ges .
e
Inc r e as e d pr o d uc t iv ity is t h e m os t ev i de n t be n ef i t. W he n y ou a u to m at e b us i nes s
proc es s es a nd w or k f l ows , t h e a mo u nt o f t i me i t t ak es t o e x ec u t e ac t iv it i es
lin
dec r e as es dr a ma t ic a l l y . Wh e n y o ur work f orc e is n o l on g er r eq u ir e d f or c ert a i n j o bs
th at hav e be e n a ut o ma t ed , y o u c a n be tt e r ma n ag e y o ur r es o ur c es . T h e t im e of
th os e p e o pl e c a n no w b e s pe nt o n ac t iv i ti e s th a t w i l l i nc re as e r e v en u e an d dr iv e
i nn ov at i on in t h e or g a n is a t io n. T hey ' ll als o hav e m or e ti m e t o f o c us on c us t o mer
s erv ic e .
On
As a res u lt , i m pr ov e d c us t o m er s erv ic e wi l l b e a p ri m ary b e ne f it o f b us in es s
proc es s a ut o m at i on . C us t o mer s w i l l b e ne f it fr o m i nc re as ed ac c ur ac y an d
c ons is te nc y s i nc e th e w or k f or c e wi l l h av e mo re t i me t o d ev o t e to t hes e g o als .
Fur th er mor e , B P A l o wer s th e pos s i b i li ty of hu m a n m is tak e a c ros s t h e w ho l e
c orp or at e s t r uc tur e . T he a ut o ma te d ac t i ons wi l l be pe rf or me d e x ac tly th e s am e w ay
ev ery t i m e, w i th n o o p por t un i ty for erro r.
ty
As a r es u lt , t h e c us t o me r s w h o r e ly on y o ur b us in es s w il l n o t s uf f er as a r es ul t of
th es e er r or s , a n d y o u wi l l n ot be ar t he c os t of c or rec t in g t he m .
si
Re d uc e d ex pe ns es , t i me s pe nt on d u ti es , c us t o mer ha p pi n es s , an d o th er f ac t ors
wi l l a l l c o ntr i b ut e to i mp r ov e d op er at i o na l e ff ic ie nc y i n t he lo n g r u n.
er
A no th er a dv an t ag e o f bus i n es s pr oc es s a u to ma t io n is t h at it im pr o v es tra ns pa re nc y
thr o ug h ou t th e or g a n is a t io n. Bec a us e a ut o ma te d s y s t ems gi v e a v is ua l a n d
s truc tu re d e nv ir on m e nt w h er e a l l o f t he pe o p le pa rt ic ip a ti n g i n a proj ec t c a n
ex a m i ne t h e s a me i nf or ma t io n a n d fo l l ow p rog res s , c o mm u n ic a t i on c an be m or e
s i mp l if i e d. . D et a ils m i gh t b e los t a nd i ns tru c ti o ns m is c o ns tru e d w he n as s i gn m en t s
iv
are g iv en m an u a l ly or c om m u nic a ti o n oc c ur s v i a p h on e c al ls a nd em a i ls . Th is wi l l
ha p pe n f ar les s f r e q ue n tly wh e n ev ery t h i ng is a ut o m at ed a nd h o us e d in on e
l oc a t io n, wh ic h w i l l h e l p k e ep ev e ry o n e o n t he s a me pa g e. I n for m at i on c a n b e k e pt
Un
Inc r e as i n g c o mm u n ic a ti o n t hr o ug h ou t y ou r c om p any in t h is w ay w i l l he l p it b ec o me
mo re c o l l a bor at iv e a n d e ns ur e t h at ev ery on e i nv o lv e d is o n t he s am e p a ge .I t a ls o
en a b les t h e p er s o n i n c har g e t o k ee p tr ac k o f wh er e ev ery o n e is a t a n d ens ur e t ha t
is s ues ar e a d dr es s e d as s o on as t h ey e mer g e.
ity
Th is me t ho d of c o r p or at e m an a ge m en t a ls o a ll o ws y ou t o mak e gr ea t er us e o f y our
me tr ic s . Yo u' l l h av e a b et t er u nd ers t a n di n g o f pr oc es s es as t h ey oc c ur, an d y o u
wo n' t h av e t o w ai t f or i nf or ma t io n t o b e c om mu n ic at e d t o y o u b ef o re i t c a n be us ed .
Me tr ic s ar e c r it ic a l f o r g u id i ng s tr at e g ies a nd ac h i ev i n g obj ec t iv es . Y o u c an g et
m
v a lu a bl e me tr ic s i nf or ma t io n fr o m t he pr oc e dur es y ou au to m at e t ha t y o u w o ul d n't
hav e g ot t en o t her w is e .
)A
B ey o n d t h is , t h er e ar e a s l ew o f ot he r a dv a n ta g es t o b us i n es s pr o c es s au to m at i o n,
bu t t his is o nly a tas te o f wh a t th is ty pe of s y s te m c a n d o for a c o mp a ny .
th e b e ne f it f ar o u tw e ig hs t he da n ger , b ut it is b e ne f ic ia l t o h av e a h o lis t ic p ic t ur e o f
s om e th i n g t h at c a n b e c om e s o i m po rt an t to a c om p a ny 's fu nc t i o n ov er t i m e. I n t h is
s ec t i on , w e' l l g o ov er t h e m aj or pr o bl e ms . Ma ny in d iv i du a ls re g a rd a ut o m at i on as
th e w ay of t h e f ut ur e an d ar e a nx io us t o j u mp o n b o ard ; y et, t her e ar e ma ny ot h ers
wh o w an t to lo ok a t th e s i tu at i o n fro m a l l a n g les b e for e m ov in g f or war d.
e
It's c ruc i a l t o r e me m b er t h at b us in es s pr oc e s s a ut om a t io n do es n ot a lw ay s r e p lac e
ev ery o n e e n ga g ed . As th e s y s te m ma t ures a nd is c o m pl e te ly i nt e g rat e d t hr ou g ho u t
lin
a ll as pec ts of a f ir m, s om e it e ms w i l l ne e d t o be ev a lu at e d, ov ers e en , or m o n it or ed
on a r eg u l ar b as is .
On
me a ns o n a s t e p - by - s te p b as is . Eac h s t a ge m us t be c l ear ly des c ri be d i n s uc h a
way t ha t it c a n be a u t om a te d s o th at t h e p r op er c o nd i t io ns w il l a l way s tr i gg er th e
ri gh t ac t i o ns . I f a c om p any do es n ot go i n to g re at de ta i l w h il e d ef i n i ng its
work f lo ws , t h e s y s te m may no t b e ab l e t o fu l l y a ut o ma t e pr oc es s es .
A no th er pr ob l e m t ha t bus i n es s es e nc o u nt er is g e tt i ng of f t h e gr o un d t o o q u ic k ly .
Do i ng to o muc h at onc e a n d f ul ly ov e rh a u l i n g ev ery p roc e dur e m ig ht be d if f ic u l t f or
ty
em p l oy e es a nd ma n a ger s . W h en a u to m at i ng a bus i nes s , y o u s ho u l d au t om at e
work f lo ws on e at a t i me or i n p has es t o e n s ure t h at ev ery as p ec t of t he s y s t e m is
th or ou g h ly ev a l ua te d . Inv es ti n g in a b us in e s s pr oc es s a ut o m at i o n t ec hn o l ogy c a n
be b e ne f ic i a l to a c o mp a ny or , i f no t us e d a ppr o pr ia te ly , c an q u ic k ly de p le t e b o th
si
pers o n ne l a n d r es our c es .
of d ev e lo p in g t h is s y s t e m ( or n ot) . T h os e me c ha n is ms c a n be mo d i fi e d i f it is n 't .
In a de q ua te s of tw ar e c an po t en t ia l ly l e ad to t he f a i l ure of a wh o le b us in es s pr oc es s
Un
au t om at i o n s t r a te gy . Th er e w i l l be a v ar i e ty o f s of tw ar e to o ls t ha t do d i ff er en t
th i ngs , a nd eac h b us in es s w il l h a v e i ts ow n s et o f r e qu ir e m en ts .
Mak i n g s ur e y o u fo l l o w t h e a p pr opr i at e m et ho ds fo r s e tt i n g g o a ls a nd m e as ur i n g
th e m, as w el l as k n o w i ng eac h w ork f lo w a t i ts m os t bas ic l ev e l , w i l l a i d y o ur t e am
i n d ec i d in g wh ic h s of t war e is b es t f or y ou . W h en s o ft war e d oes n't d o e no u gh , it
l im i ts th e ex te nt of a u to m at i on in y o ur c o m pa ny a n d mak es t he s y s te m f ee l m or e
ity
l ik e a bu rd e n th a n a b en e fi t.
au t om at i o n is a m a in ly pr of i ta b l e i nv es tm e nt . Th e k ey t ak e a way fr o m th is s h o u ld b e
th at au to m at i n g y ou r bus i n es s w il l p ay o ff h a nds o me ly if y o u mak e s ur e y o u'r e
do i n g ev ery t h in g y o u c an to mak e t h e m os t o f it , s uc h as i de nt i fy in g w ha t y o u n ee d ,
purc h as in g s of tw ar e to m ee t t h os e n ee ds , a n d tr ac k in g ho w i t's h e l p in g y our
c om p any ac h i ev e its o bj ec t iv es ov er t i me .
(c
e
work f or y o u.
lin
No w t ha t y o u k no w h o w b us in es s pr oc es s a ut o ma t io n c a n he l p y o ur c o m pa ny , l et 's
l ook a t t h e ma ny f o r ms of b us in es s pr o c es s au to m at i o n. W h en i t c o mes t o
au t om at i o n, n ot ev e r y or g a n is a t io n w il l h av e t h e s a m e lev e l of d em a nd , an d eac h
ty p e m ay b e th e g r e a tes t f it f or y o ur c o m p any . D ep e nd i n g on th e s c a le of t h ei r
On
ne e ds , s o m e b us in es s es us e a c o mb i n at i on of t h es e s or ts o f au t o ma t io n .
Th ere ar e fo ur d i ff er e nt f or ms o f B P A, ra n g in g fro m t he m os t b as ic t o th e m os t
c om p l ic at ed . Th es e ar e th e f o ll o wi n g:
• B as ic A ut om a t io n
• Pr oc es s Au t hor iz at i o n
ty
• In te gr at i o n A ut o ma t io n
• Art i f ic ia l I nt e l li g e nc e A ut o ma t io n
si
foc us es on t he mos t b as ic t as k s i n a n o rga n is at i on a n d or ga n is es a l l r e l at ed
i nf or ma t io n i n o n e ea s y - to- f in d l oc at i o n s o th at ev ery o ne w h o n e eds it c a n f i nd it .
As we s a i d ea r l i er , o n e s i mp l e ex a m p le o f t h is is us i n g a mes s a g i ng p l at fo rm f or a
gro u p o f e mp l oy ees o r a s pec i f ic pr oj ec t, ens ur i ng th at a ll c o m mu n ic at i on tak es
er
p lac e i n o ne t o o l a nd t ha t n o i nf or ma t io n is l os t b e tw ee n t ea m m e mb ers .
wh ic h w il l p r o m ot e tr a ns p ar e nc y .
ex a m p le , ar e o n e ar e a wh er e t h is ty p e o f a ut o ma t io n c o u l d be us ef u l. A c us t o m er
s erv ic e p l atf or m t h at c o ll ec ts c us to m er c om p l a in ts c a n b e pr oc es s e d t hr ou g h
s of tw ar e t ha t as s i g ns a c h ec k l is t t o an e mp l oy e e w h o is r es po ns i b le for r es olv i n g
th os e c o mp l a in ts ; t h i s m e ans th at pr oc es s a ut o m at i on or pr oc es s m an a ge m e nt
s of tw ar e is i n te gr at e d i n to t h e c us t o mer s er v ic e s of tw ar e, w h ic h i s w hy i t is c a l le d
i nt egr a ti o n a ut o ma t io n .
m
Fi na l ly , Ar t if ic ia l I n te l l ig e nc e A ut o ma t io n is t he m os t c o m p lex s o rt of B P A. Mor e
th a n ev er b ef or e, AI i nt egr a ti o n is dr iv in g bus i n es s in n ov a t i on a nd s tr e am l i n in g
)A
e
As y ou m ay r ec a l l, b us in es s pr oc es s au t o ma t io n b eg a n w it h th e inv e nt i on of t he
as s e m b ly l i ne i n th e a ut o mo t iv e in d us try . I t' s d i ff ic u lt t o b e l iev e t h at s o m et h i ng t h at
lin
no w a p pe ar s t o be s o i mp or ta nt to b us i n es s es h a d s uc h h u mb l e b eg i n ni n g s , bu t it's
tru e. O v er t he la s t s e v er a l dec a des , t ec h n o l ogy h as a dv anc e d t o t he po i nt wh er e
th e e nt ir e l a nds c a p e of b us i nes s proc es s au t om at i o n h as s h if te d, a n d i t is no w
s om e th i n g t h at any c o mp a ny c a n us e to m ak e p os i t iv e i mpr ov em e n ts .
On
Hav i ng s a i d th a t, t her e ar e p art ic u lar i n dus tr ies w h ere bus i n es s proc es s
au t om at i o n is mos t p r ev a l e nt . I n t h is pa rt , we' l l d is c us s v ar i o us i nd us tri es a nd h ow
th ey e mp l oy B P A in t h e ir op er at i o ns .
Ev ery in d us tr y is d is ti nc t i n ho w i t o p er at e s a nd t he ro l e it p l ay s for i ts c l i en ts ,
wh et h er t hr o ug h pr o d uc ts , s e r v ic es , or o th er me a ns . F ur th er m or e, e ac h c o m pa ny
wi l l h av e a d iv e r s i f ie d wor k f or c e w it h i ts u n i qu e s et o f s tr e ng th s an d o per a ti o na l
ty
s truc tu re . T h es e ar e c r it ic a l c o ns id er at i ons i n d et er mi n i ng w h ic h b us in es s es ut i l is e
B P A an d h ow th ey e m p loy i t. B P A m ay be b en e fic i a l t o a ny s ec t or ; b e l ow ar e s om e
i ns t anc es of i nd us t r i es w her e it is es s en t ia l to th e bas i c op er at i ons o f
org a n is a t io ns w it h i n th at in d us tr y .
Ban k ing
si
er
S om e b ank i n g an d f i na nc e pr oc es s es , s u c h as au t om at i n g c r ed i t an d m on ey
tra ns f ers , pr oc es s in g l oa ns , a nd i nt erf ac i ng w i th ot h er f i na nc i a l s y s te ms t h at may
hav e d i ff er en t p o l ic ie s a n d pr oc ed ur es i n p lac e, ar e ex t re m ely rep e ti t io us . I n th e
ba nk i ng i n dus tr y , o ff i c e p r oc es s es a re a ls o lar g e ly a u to m at e d b ec a us e t h e s am e
bas ic ac ts m us t b e c o nd uc te d o n a re g ul ar b as is .
iv
Hu m an e rr or may b e d is as tr o us f or b ot h i n d iv i d ua ls w h o r e ly on b ank s an d t he
ba nk s ' c or p or at e r e p ut at i o ns , h e nc e bus i n es s pr oc es s au t om a ti on i n ba nk i ng is
Un
He alt hc a r e
B us i n es s pr oc es s a ut om a ti o n is us e d i n ev ery t h in g fr o m b i ot ec h n o lo gy b us in es s es
ity
ou tc om es t ha t e ac h bu s i nes s s tr iv es fo r.
e
scenes. Billing, customer and technical support, databases, and office systems are just a few of the
things that BPA systems have automated for telecoms firms.
lin
Tr adi ng an d Ma nuf ac t ur ing
On
mo r e , a n d m or e pr od u c ts ar e m a de av ai l a bl e, purc h as e d , a n d us e d. F or t h e t hi n gs
th ey n e ed t o s u r v iv e an d t h e th i n gs th ey u s e t o e nt ert a i n th e ms e lv es , ev ery on e i n
th e w orl d r e l i es o n th e m a nu fac t ur in g a nd t ra d in g o f go o ds .
ty
ma n ag e m en t, an d a v ar ie ty o f ot h er pr oc e d ures are au t om a t e d t o k e ep t h e w orl d
mov i n g a nd e ns ur e t h a t c ons u me r s hav e ac c es s to w h at t h ey ne e d.
si
No w th a t y o u'v e l ear n ed ab o ut t h e m any f or ms of bus i n es s pr oc es s a ut o m at i on a n d
th e in d us tr i es t ha t u t i l is e th e m, l et's tak e a c l os er l o ok a t t h e d if fer e nt s orts of
proc es s es th a t c a n an d s h ou l d b e au t om a te d w it h t he he l p of a B P A s y s t em .
er
B us i n es s pr oc es s a ut om a ti o n is u ni q ue in t ha t it is n o t l im i te d to a s i ng l e ty p e of
work or gr ou p of pr oc e s s es . Ins t ea d, i f t h e t h i ngs y o ur c o m p any p er for ms fa l l un d er
a s p ec if ic s e t o f c r it er i a, it c a n be ex ec u t ed i n a v ar i ety of w ay s . W he n it c o m es t o
iv
au t om at i n g a b us i n es s pr oc es s , t her e ar e a f ew f ac t ors t o k ee p i n m in d . T o b eg i n
s tar te d , he r e ar e s o m e f an t as t ic q ues t io ns t o as k :
•
Un
Is t h er e a l ar ge n u m be r o f tas k s in t h is pr oc e s s ?
• Is it n ec es s ar y to as s i gn t h es e r es p o ns ib i l it i es to nu m ero us p e op l e ?
• Is it n ec es s ar y to d o t hes e ac t iv i t ies w i th i n a c ert a i n a mo u nt o f t i me ?
• Is t h er e a b en ef i t to a ut o ma t in g t h is proc es s f or ot h er s y s t ems o r p roc es s es ?
• W i l l a ut om a t in g t h is pr oc es s a l l ow us to r em a i n c o mp l i an t w i th c urre n t
reg u l at i ons ?
• W i l l au t om at i n g th is pr oc e d ur e mak e f ut ur e a ud i t in g e as ier ?
ity
E mp l oy ee o n bo ar d in g is a mu l ti- s t ep p roc e s s t ha t i nc lu d es th i ng s l ik e f il l i ng ou t
)A
e
A ut o ma t in g t h is pr oc e s s el i m i na tes th e c ha nc e of h um a n m is tak e an d e ns ur es t ha t
a ll of t h e i nf or m at i on y o ur c o m p any ne e ds is ac c u ra te an d in o ne p lac e. I t a ls o
lin
me a ns t ha t th e pr oc e s s c a n b e tr ac e d fr o m o ne s t a ge to t h e n ex t , e ns ur i n g th at
no t hi n g is m is s e d a lo ng t he w ay . R e lev a nt pers o n ne l , s uc h as H R a n d s up erv is ors
wh o w i l l b e ac c o u nt a b le for th e ne w e m p l oy e e, c a n b e k e p t i nf or me d as t his
oc c urs , a nd au t om at i o n c a n mak e t h e proc es s g o m uc h mor e q u ic k l y .
On
Pu r ch as ing Th ing s Y our Bu s in es s N ee ds
ty
W he n t h is p r oc es s is no t a ut o ma t ed , er ro rs in th e i ni t ia l r e qu es ts c an oc c ur,
nec es s it a ti n g t h e us e of ad d it i o na l r es ourc e s t o f ix . T her e c ou l d b e a wa i t b et w ee n
per m is s i on a n d t h e a c tu a l pur c h as e o f th e pr od uc ts , a nd t hos e g oo ds c o ul d b e
si
m is h a nd l e d w he n t h ey a r r iv e . W h en a p urc h as e or der is p l ac ed , i t is c r it ic al to k ee p
ac c ur a te r ec or ds s o th at c o r p or at e m o ney c a n b e fo l l ow e d a nd no t h in g g o es wro n g.
A ny pr o bl e ms t h at de v e lo p t hr ou g ho u t t his proc e d ure c an h av e a ne g at iv e i m pac t
er
on t he p ur c has i n g t e am 's ov er a l l pro d uc t i v ity . T o k ee p th i n gs mov i n g w e l l, t hey
mus t b e a b l e t o p ut ou t a s i mp l e an d c orr ec t r e q ues t an d r ec e i v e t h e r es o urc es
th ey r e qu ir e i n a t i m el y m a nn er .
iv
In t h is c as e, b us in es s pr oc es s a ut o m at i on is a p ow erf u l ac c ou n ta b i l ity t o o l. By
c ha n g in g t he w ay r es o ur c es ar e us e d, s at is f y i ng t h e d irec t n ee ds of y o ur t ea m w i th
ef f ic i e nc y , a n d e ns ur i n g th a t wh at eac h t ea m h as is m o n it or e d a n d ac c o u nt e d for ,
y ou c an av o i d du p l ic at e or der s an d u nn ec es s ary r es ourc e us e . B ec aus e t her e w i l l
Un
i n ad d it i o n to t h es e m et h ods .
AI Aut om at i on
Th ere 's AI A ut o ma t io n , f or s t ar ter s . Ar ti f ic ia l i nt e l li g enc e , as pr ev i ous ly s a i d, is th e
mos t d i ff ic u lt f or m o f b us i nes s pr oc es s au to m at i on ; t he re for e , we are a na ly s i ng
m
res p o ns ib i l i t i es .
AI Au to m at i o n c an b e us ed t o an a ly s e v as t v o lu m es of d at a a nd pr ov id e a r e por t
bas e d on t h at d at a, e l i mi n at i n g t h e ne e d f or a p ers o n t o f i lt er t hro ug h a nd a n a ly s e
th e d a ta , s av i n g t im e an d mak i ng th e da t a mor e ac t i on a b le . A rt i fic i a l i n te l l i ge nc e
(c
e
c us t o mers o n hi g he r pr ior i ty w a it i n g l is ts a nd e ns u re th a t t h ey r eac h th e r e lev a nt
rep res e nt at iv e by a n al y s i ng t h e ter ms t hey u s e to des c r i b e t h e ir is s ues .
lin
IT S e rv ic e s E xp an s io n
IT Au to m at i o n, ac c or d i ng to m u lt i p le s ou rc es , h as b e en s te a d i ly i nc reas i n g a n d c a n
res u l t in s i g ni f ic a n t i n c r eas es i n pr o d uc t iv it y . Th is is a mor e ma nu a l ap pr oac h to
On
th e pr oc ed ur e t ha t r e qu ir es y o ur I T t ea m t o d ev is e a t ec h n i qu e t o i n te gr at e a n d
s i mp l ify a l l o f y o ur c o mp a ny 's ex is t in g s y s t ems . Fr om a t e mp or a l as p ec t , t h is m ay
be m or e r es o ur c e - in t e ns iv e . Ex is t i ng A P Is a nd s o ft war e ov er la p c an b e l ev er a ge d
to c o n nec t a l l of y our s y s te ms .
S om e ex p er ts s ay t h at wh i l e t his is on e of th e m os t ex p ens iv e t ec h n i qu es of
ty
bus i n es s pr oc es s i nt e gr a t io n bu t t ha t i t is n ot ap pr op ri a te f or a ll fir ms , i t c a n p ay
of f. If y o ur o r g a nis at i on c a n' t ru n a ny ot h er w ay bu t ne e ds t o s e iz e th e
op p ort u n it i es th at bus i nes s pr oc es s a ut o ma t i on may g iv e, t h is is t h e b es t o pt i o n.
si
Cor p ora t e pr oc es s ma na g em e nt s y s t e ms h a v e b ee n d oc um e nt e d a s o n e of t h e m os t
er
ef fec t iv e w ay s t o be g i n au t om at i n g bus i n es s pr oc es s es , a nd t h e y n e ed t he le as t
am o un t of f i n anc i a l a nd t im e in p ut . T her e are d ed ic at e d t oo ls fo r t h is , b ut it m ay
a ls o be d on e ma n ua l l y w i th a b as ic s p re a d s he e t or w or d d oc u m en t if it is m or e
ap pr o pri a te f or y o ur c om p any .
iv
au t om at i o n s tr at e gy a ft er y o u h av e i t. T h is r es o urc e m ay b e us ed by a ny t e am
me m b er t o o bs er v e h ow wor k f lo ws s h o u ld be f lo w in g in or der to g e t t he gr ea tes t
res u l ts , a n d i t e ns ur es t ha t ev er y o n e w ho n e eds t h e k n ow l ed g e c a n g et i t.
Th is o n e r es o ur c e wi l l s ho w y ou h ow to es t a b lis h a n ov er a ll r o a dm a p f or
i mp l e me nt i n g a f u l l - f l e dg e d bus i n es s p roc es s a ut o ma t io n s tra t egy . E ac h p h as e w i l l
l et y o u s e e wh er e o th e r s o ft wa r e t o ols c an b e us ed , as w el l as ot h er th i n gs .
ity
A bus i nes s o f a ny k in d m us t b uy fr o m, s e l l to , tr a ns ac t w it h , a n d c on d uc t b us i n es s
wi t h o th er b us i n es s e s l on g be f ore i t c a n s tar t s el l i ng , t ra ns a c ti n g, a nd d o in g
bus i n es s w it h c us t o m er s . W h en i t c o m es t o b e g in n i ng a bus i n e s s of a ny k in d,
bu i l d in g tr us t i n g b us i nes s t i es is c r i tic a l. B ut , o nc e f or m ed , t h os e bus i n es s t ies
)A
mus t b e m a na g ed ef f i c i en t ly – a n d i n t he d i g it a l er a, t h at inv o lv e s b u i ld i n g d i gi t al
l ink s b et w ee n s u pp l i er s , p ar t n ers , m an uf ac t ur ers , res e l lers , a nd a l l ot h er
org a n is a t io ns wi t h w h i c h a f ir m r e l i es an d d oes b us in es s i n t he s up p ly c ha i n. Th is
is why a s o l id b us i nes s i nt e gr a t io n s tr at egy i s s o i mp or ta nt . T h e na tur e of b us in es s
is c h a ng i n g, a n d d i g it iz at i on is dr iv i ng th is s h i ft . C us t o mers , s u pp l i ers , par t ners ,
s erv ic e prov i d er s , a n d a l l o th er s t ak eh o l der s i n t h e s u pp ly c h a i n mus t a n d m ay b e
(c
d ig i ta l ly c o nn ec t e d, c om m u nic a te d w it h, a n d c o ll a bo ra te d w it h i n t o d ay 's g lo b a l
bus i n es s ec os y s t e m. In d ee d, th e mo d er n s up p ly c h a i n h as ev o lv ed i nt o a d i gi t al
ec os y s t em i n a nd of i ts e l f, a l l ow i ng for de e per c o l la b ora t io n a n d ne w c o o per a tiv e
work me th o ds .
B us i n es s es s t a nd t o g a in a l o t f r o m t he d i g i tiz a ti o n of s u p p ly ne t work s . Ac c or di n g
to r es e arc h, h ig h er l ev e ls of di g it iz at i o n c an i nc re as e f i l l r a te s (t h e a m ou nt of
e
c us t o mer de m an d m e t thr o ug h s t oc k av a il a b il ity ) by u p to 80 % a nd s hor t en c as h - t o-
c as h (C 2 C) c y c l e t im e s ( t he t i m e b et we e n w he n a c o m p any s e n ds c as h t o s u p pl i ers
an d r ec e iv e s c as h fr o m c us t o mer s ), wh ic h l ea ds t o inc r e as e d pr of it a b il i ty i n 75 % of
lin
c as es . Ac c or di n g to Mc K ins ey , o rg a nis a ti o ns wi t h h ig h ly - di g it iz e d s up p ly c h a ins
may ex p ec t y e ar ly E BI T ( ear n i ngs be for e in t eres t a n d tax es ) gr o wt h of 3. 2 p erc en t
– th e h i gh es t i nc r e as e o f a ny i nd us try – a nd an n ua l s a l es gr ow t h of 2 .3 perc e nt .
Th e a dv an t ag es ar e obv i o us , bu t ho w c an bus i n es s es g o a b ou t ac h i ev in g th e m?
On
B us i n es s i nt e gr a t i on i s t he ans wer .
S i mp ly p ut , b us in es s i n te gr at i on ( a ls o r ef err ed t o as B2 B in t e gra t io n o r s i mp ly
B 2 Bi) is a c o m pr e h en s iv e d i gi t al s tr at egy th at en a b les th e in t egr a ti o n, au t om a ti o n,
an d o pt i miz a ti o n of k ey b us i nes s pr oc es s e s th at c o n nec t an or g an is at i o n w i th i ts
tra d e pa rt ne r s – c u s to m er s , s u pp l i ers , l og is tic s c o m pa n i e s , a n d f i na nc i al
i ns t it u ti o ns . It is t h e ex c h a ng e a nd in te gr a ti o n of e l ec tr o nic m es s ag es , d a ta , an d
ty
tra ns ac t i ons by a n or g an is at i o n ac r os s a b u s i nes s ne tw ork of ex t e rna l p art ne rs v i a
i nt er - c om p any bus i nes s pr oc es s es .
si
bus i n es s i nt egr a t io n a ls o r ef er s t o th e tec h no l o gy arc h i tec t ure t h at f ac il i ta t es th e
c o ll a bo ra t iv e p ar tn er s h ips t h at dr iv e m od er n s u p ply c ha i ns .
Th e ul t im a te g o al o f b us in es s i nt e gra t io n is to i nc r eas e t he s p e ed an d ef f ic ie nc y of
d ig i ta l tr a ns ac t io ns ac r os s th e s u p p ly c ha i n a n d v a l ue c ha i n. F urt h er mor e ,
bus i n es s in te gr at i o n e li m i na t es t he n e ed f or t i m e - c o ns u mi n g, c os t ly , a n d er ror -
pro n e m an u a l o per at i o ns .
m
th e in fo rm at i o n i n to s om e s or t of or de r f ul f i l me nt s y s t em . Wh e n a c orp or at i o n us es
a bus i nes s in te gr at i on s o l ut i on , h ow ev e r , a p urc has e or der is a ut o ma t ic a l ly
rev ie w ed a nd s e nt i nt o t h e or d er f u lf i l m en t s y s t e m, r e duc i n g ord er fu l fi l m en t
de l ay s .
e
to ta l c o ntr o l ov er t he ir tr ad e p art n ers ' o per a ti o ns , fr o m b us in es s pr oc es s
ma n ag e m en t ( B P M) t o s u pp ly c h a in v is ib i l i ty an d g l ob a l c o m mu n ity m a na g em e nt .
Thr ou g h a c en tr al is e d p er s p ec t iv e o f r ev e n ue - dr iv i ng B 2 B pr oc e s s es , f ir ms may
lin
e li m i na t e s h ip m en t de l ay s , an t ic i p at e s up p ly c h a in b o tt l en ec k s , a n d g et
c om pr e he ns iv e v is i bi l i ty , e n ab l i n g i m prov e d e n d - t o- en d r es p o ns iv en es s a n d b et t er
c us t o mer s er v ic e .
On
l ie aro u nd t h e c o l la b or at iv e p ar t n ers h i ps a nd n ew w ork p a tt erns t h a t are en a b le d.
ty
mak e t h e ir v e h ic les s ma r t an d c o n nec t t h e m t o t he i nt er ne t, r a th er t ha n j us t en g in e
par ts .
si
an d i ns t i tu t es hav e f or m e d a s tra t eg ic p art n ers h i p to inc reas e c ros s ov er
c o ll a bo ra t io n a n d s tr e ng t he n n a ti o na l i nd us tri a l s t a nd ar ds . V eh ic l e dr iv ers s p e nd
91 h ours c o n nec te d t o t h e i n ter n et du ri n g th e ir j o ur ney s e ac h y ear , ac c or d i ng to
K urt L e hm a n n, f or m er CTO o f C on t in e n ta l , th er ef or e c o ll a b ora t io n b e tw ee n
er
c ar mak ers a n d te l ec o m mu n ic a t io n s erv ic e p rov id ers is es s e nt i a l.
B us i n es s in t egr at i o n t ec h n i qu es t h at a l lo w f or t h e f as t a nd s ec ur e s har i n g o f di g it a l
i nf or ma t io n ac r os s a l l par tn er s i n a s u p p ly c ha i n ec os y s te m are es s e nt i al t o
iv
In t h e 1 98 0s a n d 1 99 0 s , E DI s t a nd ar ds w ere i m p le m e nt ed , a n d E D I pr ov e d t o b e a
hu g e t im e s av er f or ma ny b us in es s es – a l be i t it w as f ar fro m i de a l. T o be g i n,
bus i n es s es ne e de d t o p ur c has e v ar i o us ge ar an d s o ft wa re , a s w e l l as t e ac h
m
e
ad d it i o n to b as ic E DI c ap a b il i t ies .
lin
O rg an iz at i o ns m ay ex c ha n ge e lec tr on ic pro c ure m e nt a n d s u p p ly c ha i n d oc um e nts
wi t h tr ad i ng pa r t ne r s us i n g a s o l ut i o n l i k e Ac t io n — a f u ll y - m an a ge d B2 B
In te gr at i o n as a S er v ic e s o lu t io n – in d ep e nd e nt o f fo rm a t or e nt er pr is e s y s te m.
On
th e ac c ou n ts pay a b le ( AP ) pr oc es s , as w e ll as a ll o wi n g f or e as y i nf or ma t io n
s har i n g w i th s u pp l i er s v i a a c o m mu n ic at i on l ay er . D ay s s a les o u ts t an d i ng ( D SO )
rat es f or s u p p l ier s ar e dr a ma t ic a l ly dec r e a s ed wh e n t he or ders to c as h c y c l e is
s pe d up an d th e in v o ic e s en d i ng pr oc e dur e is a u to m at e d. B ot h b uy ers a n d
s up p l ie rs b en ef i t fr om a c l ou d - bas e d p ort a l t h at a l l ows f or e as y o n b o ar d in g a n d
c on n ec t i ons w i th t r a d i ng par tn er s o f a l l s iz es a nd lev e ls of I T s op h is t ic at i o n, as
we l l as p o wer f ul k ey p er f or ma nc e i n dic a tor ( K PI) das h bo ar ds t ha t trac k D SO , d ay s
ty
pay a b le o uts t an d in g ( DP O ) , a nd err ors , as we l l as v is ib i l ity i n to o rde r, i nv o ic e , a n d
re mi tt a nc e doc u me n t s ta tus .
How Bu si ne s s Int eg r at i on Wo r k s
si
To be g i n w i th b us i nes s i n te gr at i on , a c o mp a ny m us t f irs t d ec i de o n t h e
tec h no l og ic a l p la tf or m i t w i l l us e. Th e o pt i o ns are d iv i de d i nt o f o ur c at e gor i es : o n -
pre m is es , h os te d, c lo u d, a n d hy br id .
er
Th e es s e nt i a l i nt e gr at i on s o ft w are is in s ta l l ed o n - s it e at t h e org a n iz a t io n's
pre m is es w it h on - pr e m is es b us in es s in t egr at i on s o lu t io ns . H os t e d i nt e gra t io n r ef ers
to s of tw ar e t h at is d e p loy e d o ff - s i te , c l ou d i nt eg ra t io n r ef ers to s of tw ar e t h at is
iv
a c o mp a ny ut i l is es for its ow n r e as o ns .
th ey s ou r c e a nd /o r s e ll c o m mo d it i es t hro u g h i n ter n at i on a l s up p ly c ha i n
par t ner s .
3. Tr an spo rt Pr ot o col : Na tur a l ly , a l l p art i es mus t a gr e e o n t he c om m u nic a ti o n
rou t e – or pr o t oc o l – f or in fo r m at i o n t o b e s en t. Th er e ar e a v a ri e t y of adv a nc ed
)A
e
ap pr o pri a te tr a ns p or t pr o t oc o l .
Le t's t ak e a l o ok a t a hy p ot h et ic a l r et a il or d er - t o- c as h s it ua t io n in wh ic h
lin
S up er ma rk e t A is l ook i ng t o p ur c has e c a t fo o d fro m Su p pl i er B.
On
thr o ug h t h e in t er n e t ( tr a ns por t pro t oc o l) a nd pr oc es s e d by Su pp l i er B. ( t arg et
ap p l ic a t io n) . S u pp l i er B t he n r ep l i es w i th a Fu nc t i o na l Ac k no w le d ge m e nt ,
c on f ir mi n g r ec e ip t of t he or d er .
ty
th e S hi p p in g No t ic e i nt o its b ac k - e n d ER P s y s t em , pre p ar i ng f or d e l iv ery .
S up er ma rk e t A s en ds a n ot h er F u nc t i o na l Ac k no w le d ge m e nt t o S up p l ier B a ft er
S up p l ier B s h ips t h e c at f oo d or d er, a n d S up er m ark e t A s e n ds a no t her I nv oic e t o
S up p l ier B. Su p er m ar k et A t h en s en ds a P ay m e nt O r der t o S u pp l ier B to c o n fi rm
si
pay m en t d et a i ls , a nd S up er ma r k e t A s e nds an o th er Fu nc t i o na l Ac k no w le d ge m e nt t o
S up p l ier B t o ac k n o wl ed g e r ec e ip t of t h e d o c um e nt .
A l l o f t h is is h a nd l e d a ut o ma t ic a l ly by t h e b u s i nes s i nt e gra t io n s o lu ti o n, wh ic h us es
er
th e s am e d at a b e i ng tr a ns f er r e d b e tw ee n t he tw o or ga n is at i ons to c o mm u n ic a t e
wi t h ot h er d is tr ib ut i o n, w ar eh o us in g, a nd f u lf i lm e nt ap p l ic a t io ns in ord er t o pre p are
for a n d ex pe d it e t he o r de r 's c o mp l et i o n.
iv
Re d uc e d ex pe ns es fr o m r e mov i ng h u m an h a nd l i ng in ar e as l ik e d a ta e ntry , c l er ic a l
doc u me n t pr e par at i o n , a nd ma i lr o om s ort i ng ar e j us t a f ew of t h e b e ne f its .
Fur th er mor e , th e pos s i bi l i ty of hu m a n err o r is r e duc e d, r es u l t in g i n l es s c os t ly
bus i n es s doc u m en t a d j us t me n ts .
ity
W it h i n t h e ir tr a d i ng c om m u ni ty , o rg a nis a ti o ns c an als o ex p ec t gr ea t er op er at i o na l
ef f ic i e nc ies . Tr a d in g par t ner s c a n c o op er at e, c o l l ab or at e, a n d c o m mu n ic a t e mor e
s uc c es s f ul ly wh e n da t a is tr a ns m i tt ed s ec ur e ly , qu ic k ly , a n d e ff ec tiv e ly . I mpr ov ed
c om m u nic a ti o n a ls o i mp r ov es s p e nd i n g v is i b il i ty , as w e l l as v is i bi l ity in t o i nv e n tory
m
fl o ws an d s u p pl i er ac t i v ity .
B us i n es s i nt e gr a t io n s o lu t io ns a ls o i mpr ov e da t a qu a l ity b ec a us e s ta ff m a n ua l ly
en t eri n g d at a ar e l es s lik e ly t o m ak e m is tak es . Ma n ua l da t a e ntry h as a 1% err or
)A
be f ore it r e ac h es en ter pr is e a pp l ic at i o ns . As a r es ul t, b u s in es s es c a n h av e
c om p l et e c o nf i de nc e i n d at a i nt e gr ity a n d, as a res u lt , i n t he bu s i nes s in t egr at i o n
s y s te m's ab i l ity t o s up p or t en d - to- e nd da ta in t erc h a ng e , wh ic h is es s en t ia l t o
au t om at e b us i nes s o p er a t io ns .
Fin al Tho ught s
In te gr at i o n w i th o t her fir ms , s up p l ie rs , r es e ll ers , a n d ot he r tr a d in g p art n ers is v i ta l
e
to y o ur s uc c es s u nl es s y o u'r e A ma z o n or W a lm ar t, w ho c a n b a s ic al ly d ic ta te an d
ow n t he s u p p ly c ha n n e l fr o m m a nu f ac t ur in g to e n d s a le .
lin
Tot a l tr ad i n g p ar t n er e n ab l e me nt is pr ov i de d by bus i nes s i nt e gra t io n s o l ut i o ns .
B us i n es s i nt e gr a t io n s o lu t io ns g iv e y ou t h e ed g e y o u ne e d to s t a y c o m pe t it iv e i n
th e d ig i ta l a g e, fr o m r ed uc i ng t i me a n d c os t s as s oc ia te d w it h m an ua l pr oc es s in g to
e li m i na t in g h um a n er r or s , i m pr ov i n g da ta q ua l i ty , i nc r eas i ng pr o duc t iv ity , g a i ni n g
s up p ly c ha i n v is i bi l i ty , a nd e nh a nc in g c o l la b ora t io n w it h y ou r e n tir e tr a d in g p art n er
On
c om m u ni ty . O r g an iz a ti o ns h av e c om e a l o ng way s inc e t h e e ar ly da y s of
i nf or ma t io n ex c h a n ge th a nk s t o mo d er n b us i nes s i nt e gr at i on t oo ls a nd pr oc es s es .
Da ta c a n n ow b e s e nt i n t h e b li nk o f a n ey e th a nk s t o th es e tec h n o lo g ies , a l lo w in g
y our f ir m t o o per a te m or e ef fic i e nt ly , c om p et it iv e ly , a n d c os t - e ff ec t iv ely .
ty
In a v er t ic a l ly i n te gr at ed c o r p or at e m od e l, v ar io us s t eps in t he no rm al d is tr ib u ti o n
proc es s ar e c o ns ol i d a te d . A v er t ic a l ly in te gr at e d c or p ora t io n , ra t h er t h an o per a ti n g
ex c lus iv e ly as a ma n uf ac t ur er , d is tr i b ut or, or r et a il er , p er for ms f unc t io ns th at ar e
ty p ic a lly p er f or m ed by s up p l ier s or tra d e b u y ers . V ert ic a l in te gr at i on h as a n um b er
si
of a dv a n ta g es an d d i s adv a n t a ges w he n c o mp ar e d t o c o nc e ntr a t i ng i n a s i ng l e
bus i n es s fu nc t i o n.
er
Forw a rd Int eg r at i on
In m any c ir c um s t anc es , a f ir m g ro ws v er tic a l ly i n te gr at e d fr o m a s i ng l e tr a d e
c onc e ntr at i o n. O n e m e th o d f or th is t o h a p pe n is f or a m an u fac tur e r or d is tr i b ut or to
iv
ha n d le i ts o wn c o ns u me r d is t r i b ut i on . A c o mp a ny m ay c ho os e t o bu i l d d is tr ib ut i o n
c en tr es a nd op er at e it s o w n d is tr i b ut i on agr ee m en ts w i th r et a i lers , or s e l l d ir ec t ly
to c us t om er s . F or war d i n te gr at i on is w he n a m a nu f ac t ure r tak es c on tr ol of i ts o wn
d is tr i bu t io n .
Un
Ba c kw a rd I nt e gr at ion
W he n a pr o d uc t r es e l l er d ec i des t o b uy its s ourc e or dev e lo p its o wn m an uf ac tur i n g
or d is tr i bu t io n b us in es s , t h is is t he p o l ar op pos i te o f v er tic a l i nt e g rat i on . B ac k w ar d
i nt egr a ti o n oc c ur s w he n a d is tr i bu t or e n ga g es i n m a nu f ac t ur i ng or a r et a i ler
en g ag es i n m an uf ac t ur in g or d is tr i b ut i on ac t iv it i es . T his is a ty p e of v er t ic a l
i nt egr a ti o n us ed by r et a il s t or es th a t s e l l pr iv at e l a be l or s t or e br an ds .
ity
Ben ef its
Th ere are a f ew k ey a dv a n ta g es of v ert ic a l i nt e gra t io n . C o n tro l is on e o f t he m . Y o u
hav e m or e c o nt r o l ov er t he en t ir e fl o w o f g oo ds t i l l t hey r eac h t h e f in a l c l i e nt t h e
mo re ac t iv i ti es y ou p er f or m in th e ma n uf a c tur i ng a nd d is t ri b ut i on pr oc es s . Yo u
m ig ht a ls o be ab l e t o s av e mo n ey . W he n y o u m an u fac tu re it e ms , y ou on ly hav e t o
m
pay f or t h e c os ts of pr od uc ti o n. W h en a w ho l es a l er or r et a i ler b uy s s o me th i n g fr o m
a m an uf ac tur er , th ey a dd a ma r k u p t o th e pr i c e.
Con ce rn s
)A
e
W ha t d is t i n gu is h es c ur r en t E R P s y s te ms fro m tr ad i t io n a l E RP s y s t ems ? I t's a
fa nt as tic q u es t i on t ha t we g et a l ot o f. Y o u m ig ht f ee l a l it t le ov er wh e lm e d by al l o f
th e a l t ern at iv es ac c es s i bl e to y o u. B ut t h at ' s ok ay ; I' l l try my b es t t o c l e ar u p any
lin
m is u n ders t an d i ngs y o u m i gh t h av e a bo ut w ha t d is ti n gu is h es a m od er n c l o ud E RP
fro m a tr a di t io n a l o ne .
ER P ( en ter pr is e r es o ur c e pl a nn i n g) s of tw a re h as lo n g h ad s tr o n g c ap a b il i t ies f or
ha n d li n g o per at i o na l da t a an d i nc r eas i n g b us in es s ef f ic ie nc y . T o day 's bus i n es s es
On
rec o g n is e t h e i m por ta nc e of E R P s o l ut i ons i n as s is t i ng t h em in s erv in g c us to m ers
thr o ug h ou t th e ir l i fec y c l es an d pr ov id i n g t h e c orr ec t , up - t o- d a te da t a t h ey r e qu ir e
to m ak e b et ter dec is i o ns m or e qu ic k ly .
ty
ER P s ol u ti o ns ar e t he t wo ty p es of tr a d it i o na l ER P s o l ut i o ns . I n t he f irs t c as e, a
c om p any p ur c h as es a s o ft w ar e l ic e nc e f or its c hos e n s y s t em an d i ns t a ls i t i n its
da t a c en tr e. As a r es u lt , th e c o m pa ny c ov ers t he c os ts of r ep a ir in g a nd ma i nt a i ni n g
th e i nt er n al in fr as tr uc t ur e as we l l as t h e ac q u is i t io n o f a ny ad d it i o na l e q u ip m en t.
si
Cl o ud ER P, o n th e ot her h a nd , is hos t ed i n th e c l ou d ( w it h in a d at a c en tr e, o n a
s erv e r c o nt r o l l ed by s om e on e e ls e , ty p ic a ll y th e ER P pr ov id er) a nd ac c es s e d v i a
er
an I nt er n et c o nn ec ti o n by y ou ( t h e us er). Th ere is no n e ed t o p urc h as e h ard w are
wi t h m od er n E R P, a nd up d at es ar e us u a l ly h an d l ed au t om at ic a lly by t he ER P
v en d or. Th e S of tw ar e as a S er v ic e ( Sa a S) p ara d i gm , in w h ic h t he s up p l ie r d e l iv ers
th e a pp l ic at i on t o c o n s um er s v i a t he I nt er n e t, is us e d i n mo d er n E RP . It a ls o o ff ers
iv
Cl o ud ER P s y s t e ms c an he l p y o u av oi d a l l of t h e is s ues l is t ed be l ow . T h ey pr ov id e
a fe w b en e fi ts t ha t r e g u lar ER Ps d o n ot :
1. A l l s y s te ms r ec e iv e i n s ta nt up gr ad es .
2. Th er e is o nly on e v er s i on o f t he tr ut h .
ity
3. Pr od uc tiv i ty h as i nc r e as e d .
4. Ma i nt e n anc e h ea d ac h es ar e r e duc e d.
5. Ac c es s at a ny t i me an d fr o m a ny l oc at i on
B us i n es s es t h at ar e as s es s i n g ER P b us i n es s s of tw ar e fre q ue n tl y f oc us on t h e
pr ic i n g a n d f unc t io n a li ty of th e pr o gr a mm e . W h il e t h e c a p ac i ty o f s of tw ar e t o a da p t
m
ad a pt a bi l i ty .
2. 1. 5 O nl in e E R P S ys t em
(c
e
an d f u lf i l me nt , a nd pr o v i des a s in g l e s ou rc e of d a ta .
G iv en th is s c a le , a ny ER P s y s t e m m us t pr ov id e a c o ns is t en t, u p - t o- da t e v i ew of
lin
da t a to a l l b us in es s u n its , r e ga r d l es s o f w h ere p ers o n ne l ar e w or k i ng . Th es e n e eds
are m et by c l ou d - b as ed E R P as a s erv ic e. B ec a us e t h e s o ft wa r e is ac c es s ed v i a
th e i nt er n et, a ll t h at is r e q ui r e d is a n i n ter n e t c on n ec t i on an d a br o ws er .
Wh at I s Clo ud E R P S of t w a r e?
On
Cl o ud ER P s o ft war e of f er s th e s a me , o r b et te r, c a pa b i l it i es as o n - p re m is es
s y s te ms w it h o ut t h e maj or ity of t h e dr aw b ac k s , s uc h as u pfr o n t l ic enc i ng fe es ,
bec a us e it is hos t ed b y t he ER P v e n do r an d g iv e n as a s e rv ic e t o e nt er pr is es .
" De m an d f or c l ou d- ba s ed E R P s y s t e ms c o nt i nu es t o gro w bec a us e of th e ir c a p ac ity
to ac c es s an d a n aly s e l ar g e v o l um es o f d at a i n ne ar re a l t i me ," ac c ord i n g to ID C's
an a ly s is .
S al es t e ams wi l l hav e r e a l - ti m e i nv en t ory i nf or ma t io n , a nd f i n an c e t ea ms w i l l b e
ty
ab l e to k e ep a c l os e ey e o n c as h ru n way an d r es po n d s w i ft ly t o au d its or o th er
req u es ts f or p er f or m a nc e da ta .
si
Comp on ent s of C lou d ER P Sof t w a re
Core financial and accounting functionality is provided by all cloud-based ERP software. The types of
modules or apps that an organisation implements after that are determined by its industry and specific
business requirements. The following are some of the cloud ERP modules that are available:
er
• Fi na nc i a ls an d ac c o un ti n g
• Hu m an c ap i ta l m a na ge m en t (H CM) an d/ o r H u ma n r es o urc e m an a ge m e n t
s of tw ar e ( HR M S)
•
iv
Cus to m er r e l at i ons h i p ma n ag e m en t ( CR M)
• Inv e nt or y m an a ge m e nt
• O rd er m an a ge m en t
• Pr oc ur e m en t
Un
• S up p ly c h a in m a n ag e me n t
• Pr oj ec t m an a ge m e nt
• Ma t er ia l r e q u ir e m en ts p la n ni n g ( M R P)
Clou d E R P Con ce pt s
It ’s i mp or ta nt t o un d er s ta n d s o m e bas ic c o n c ep ts as s oc i at e d wi t h c l ou d E RP as w e
d iv e d e ep er in to t h e s ubj ec t :
ity
an d c o nf i g ur a t io n , an d e m pl oy e e t ra i n in g i n bo t h s c en ar i os .
2. Clou d - b as ed ER P : C l ou d - b as e d E R P r ef ers t o en te rpr is e r es ourc e p la n ni n g
s of tw ar e t h at is h os te d of fs it e on t h e ER P v en d or's s erv ers a nd ac c es s e d
v i a a we b br o ws er .
)A
c om p an i es w a nt to ou t s our c e t h e ir IT op er at i ons , t h ey fr eq u en t ly u s e h os t e d
de p l oy m e nt m o de ls . W h il e t his s o l u ti o n ha s c er ta i n c l ou d b en e f i ts , i t is n ot
tru ly " as a s er v ic e ."
5. End - t o - end se cu r it y: A l i nk b e tw ee n a c lo ud - b as ed E R P c o m pa ny a n d its
c us t o mer s t h at is s ec u r e a nd e nc ry pt e d.
e
6. Sub s c ript ion li c en sin g: T he C om p any p ay s a f ix ed s u bs c r ip t io n c os t to us e
th e pr o gr am m e a t pr e de t erm i n ed per i o ds (a nn u a lly or m o nt h ly ). Th is pr ic e
us u a l ly c ov er s al l s of tw ar e u pg ra d es a n d m a in t en a nc e , a n d it c an b e
lin
c har g e d per per s o n or p er or g an is at i on ..
Clou d E R P vs . O n - P r em is e s E R P
Th e f ol l ow i n g br e ak d o wn pr o b ab ly r a is es th e q u es t i on : w hy us e t h e c l o ud wh e n o n -
pre m is es E R P s y s te m s pr ov id e e q u iv a l en t f unc t io n a li ty ?
On
A c o m pa ny 's IT s t af f o r a m a na g e d s erv i c e pr ov id er ins t als a nd m an a ges on -
pr em is e s E R P s o ft w ar e . T he c om p any b uy s or r en ts e nt er pr i s e - g ra d e s erv ers ,
ne tw ork i ng , a n d s t or a ge to p hy s ic a l ly ru n a nd h ous e t h e s o ft war e a n d i ts re l at e d
da t a af ter i n it i a l ly l ic en c i n g t h e ba s ic s of tw ar e p la tf or m. M a i nt en a nc e ,
tro u bl es h oo t in g, s up p l em e nt ar y s o ft war e , up da t es , a n d c us t o miz a ti ons a re a l l ex tra
c os ts fo r on- p r em i se s ER P us er s . A d di t io na l c os ts i nc l ud e an t i v ir us a n d s ec ur i ty
s of tw ar e, as w e l l as s t or a g e a nd s erv er bac k u p s ol u ti o ns .
ty
Clou d - b as ed ER P , on t he o th er h a nd , is h o s te d a nd c o nt ro l l ed by th e v e n dor , wh o
d is tr i bu t es t he s o ft war e v ia th e c l ou d as a " as a s erv ic e" m o d el . Th e a p p lic a ti o n,
da t a s t or ag e , un d er ly in g o per a ti n g s y s t em , s erv ers , p hy s ic a l d a ta c e nt re
si
arc h i te c t ur e , an d s ec ur ity up d at es an d f e a tur e up gr ad es are a l l ha n dl e d by t he
v en d or.
er
W h il e t he l oc a t io n o f t he pr o gr a mm e a n d wh o c o ntr o ls i t ar e t he mos t o bv io us
d if fer e nc es be tw e en on - pr e m is es a n d c l o ud ER P , th er e ar e ot h er s i gn i f ic a nt
d if fer e nc es .
To b eg i n w it h , no t a l l c l ou ds ar e c r e at e d e q ua l . S o me le g ac y E RP s u p pl i ers h av e
up gr a de d t he ir s o ft w ar e to r un fr o m i nt er ne t - c on n ec t e d da t a c en tr e s . B us i n es s e s
wh o us e tra d i ti o na l ER P s y s t ems may mis s o ut o n a l l o f th e a dv a n t ag es o f c l ou d -
Un
th e d a ta of o ne c o mp a ny is i n ac c es s i b le to t he d at a o f t h e o th ers . Ty p ic a l ly ,
a r e al c l ou d E R P s o lu t i on is a m u lt i - t e na n t S aa S .
• Si ngl e- t en ant Sa a S: O n ly o ne or ga n is a t io n c a n us e a s i ng l e v ers i on of ER P
s of tw ar e an d i ts r e l at e d in fr as tr uc t ur e. I n ot h er wor ds , priv a te s erv ers
run n i ng a s i ng l e s o ft wa r e i ns ta nc e h os t a n or ga n iz at i on 's d at a. C us t o mers
m
e
wi t h im p l em e nt at i o n. A c o mp a ny 's up fr on t c os ts f or o n - pre m i s es ER P i nc lu d e
s erv e r pu r c h as es , d at a bas e c o ns tr uc ti o n , firs t d e pl oy m en t, c o ns ul t an ts , I T
ma n po w er, s ec ur i ty , a nd bac k u p.
lin
As a f ir m gr ows , it w i l l i nc ur hi g he r c os ts f or m ai n te n anc e , s pec i a lis t i n - ho us e or
on- c a l l res o ur c es , u p gr a d es a n d u pd at es , as w el l as n ew s erv e rs . C lo u d E R P is
ty p ic a lly 30 % l es s ex p ens iv e t ha n o n - pr em is es E R P. Bus i n es s es e l im i n at e u pfr o nt
i nfr as tr uc tur e ex pe n d it ur es as w el l as ad d it i o na l c os ts for IT e m p loy e es ,
On
ma i nt e n anc e, s ec ur i ty , an d u p gr ad es b ec a us e t h e c l o ud ER P v en d or h os ts an d
ad m i n is t ers th e s of tw a r e on its o wn s erv ers . IT s u pp or t is prov i d e d by t h e pr ov i d er
on an o n go i n g b as is .
Imp le me nt a t io n sp e e d . Th e im p l em e nt at i o n t im e of a ny ne w E R P s o l ut i o n is o n e
of t he m os t s ig n if ic an t r oa d bl oc k s , w h ic h c an h av e a dir ec t im p ac t o n bus i n es s
ty
do w nt i me a n d t im e t o v a l ue — i n on e res e ar c h, a b ou t h a lf o f or g an is at i o ns s ta te d
th e ir i mp l em e nt a ti o ns wer e c o mp l et e d o n ti m e. A c l o ud - b as e d ER P s y s t em c a n
us u a l ly ge t a c o mp a n y u p an d o per a ti n g fa s ter t ha n a n on - pr e m i s es ER P s y s t e m
bec a us e it d o es no t n ee d s e l ec t i ng a n d s et t i ng u p h ard w are o r hi ri ng a n d tra i n in g
si
IT pr of es s io n a ls .
Ac c es si bi lit y. Us er s of c l ou d- b as e d ER P s y s te ms c an ac c es s r e a l - t i me b us in es s
da t a fro m a ny loc at i o n a nd on any dev ic e. Th is m e ans t h at e m p l oy e es ac r os s t h e
er
fir m , r eg ar d les s o f bu s i nes s u n it or l oc at i o n, ar e work i n g w i th t h e s am e d at a an d
c an mak e c h o ic es mor e q uic k ly a n d r e l ia b ly .
iv
S ca la bi lit y. C l o ud- b a s ed ER P s o l ut i o ns en ab l e s c a l in g a f ir m e a s i er by e l im i n at i ng
th e c h al l e ng es of ins t a ll i n g ne w s erv ers f or m or e us ers , r e gi o ns , or s u bs id i ar ies .
As a c o m pa ny ex p an d s , s o d oes its c l o ud E RP .
Un
W it h ou t a dd i n g mo r e h ar dw ar e, a n or ga n i s at i on c a n s t art w i th t he m os t bas ic ,
fu n da m en t al fu nc t io ns an d ex p a nd as ne e d ed . A c lo u d E R P s ol u ti o n a ls o al l ows
us ers a l l ov er t he wor l d t o ac c es s b us in es s da t a by j us t c o nn ec t in g t o th e in t ern e t.
B ec a us e no l oc a l s er v er s ar e r eq u ire d , ne w u n its c a n b e bro u g ht u p fas t w h e n a
fir m gro ws t hr ou g h m er g er s an d ac q u is it i o ns . Cl o ud v e nd ors of t en p os s es s da t a
c en tr es al l ov er t he wor l d a nd s t ore e ac h c us t o m er's d at a i n v ar io us l oc at i ons ,
a ll o wi n g t he m t o pr ov i de be tt er a n d m or e r e li a b le s erv ic e t h an mos t e nt er pr is e s
ity
ab o ut c us t o miz a ti o ns . J us t as c l ou d - bas e d ER P c an s c a le w it h a n or g an is at i on , it
c an a ls o b e mor e eas i ly c us t om is ed t o m e e t s p ec if ic bus i n es s g o a ls , ei t her fr om
th e s tar t or as a c om p any gr o ws a n d ev o lv e s . Wh i l e on - pr e mi s es ER P s o ft wa re c a n
be c us t o m is e d, th os e adj us t m e nts a re bo u n d t o t he c urr en t v ers i o n o f t he s of tw ar e
)A
an d m ay b e di ff ic u lt t o r e im p l em e nt i n f ut u re v ers io ns , es p ec i al l y i f i nt eg ra t io ns
wer e dev e l op e d i n - h o us e . T h is is o ne o f t h e pr i m ary r eas o ns w h y s om e c o mp a ni es
ref us e to u p gr a d e th e ir o n - p r e m is es ER P s y s te ms a nd c o n t in u e to us e o ut d at ed
tec h no l og i es . In a dd i t i on , c l o ud E R P s o l ut i ons te n d t o c o n nec t ef fec t iv e ly wi t h
ot h er c lo u d - b as ed pr o duc ts , a nd n ew m o du l es c a n be a d de d t o a c l ou d ER P s y s t em
wi t ho ut r e qu ir i ng a ny do w nt i me o r a d di t io n a l h ar dw ar e. T h is ty pe o f a gi l i ty a l lo ws a
(c
e
c us t o mers ar e us i ng th e m os t c urr e nt t e c hn o l ogy . Up d at i ng o r u pgr a d in g o n -
pre m is es ER P s of tw a r e t ak es l o ng er an d may n ec es s i ta te th e ap p oi n tm e nt of
c on tr ac t ors to ov er s ee th e pr oc es s . Up d at es to c l o ud ER P c an t ak e as li tt l e as 30
lin
m in ut es a n d ar e fr e q ue n tly per f orm e d d ur i ng of f - p e ak h ours t o av o id bus i nes s
d is ru pt i o ns .
On
S ec ur i ty , c o m p li a nc e , an d d is as t er r ec ov ery are a l l i m po rt an t c o ns i der a ti o ns . M a ny
fir ms ar e u nd er s t a n d ab ly c o nc er n e d ab o ut e ntr us t i n g t h e ir bus i nes s d at a t o an
ex t er na l s o ur c e. C lo u d - b as e d ER P v e nd ors , o n t h e ot h er ha n d, m ay prov i d e be tt er
s ec ur i ty a n d c o m pl i a n c e t ha n b us i nes s es c ou l d o t her w is e af fo rd . F urt h erm or e, a
c om p any m ay r es t as s ur e d t h at its da ta is a lw ay s b ac k e d up , a n d t ha t t he v en d or
has dis as ter r ec ov er y p la ns i n p l ac e .
ty
O n- pre m is es ER P s o l ut i ons c ar r y t h e d a ng e r of c a t as tr op h ic d at a l os s in t he ev e nt
of har d war e or s o ft war e f a i lur e , n at ur a l dis as ter , f ir e, or bre ak - i n u n l es s
en t erpr is es h av e a d is as t er rec ov ery a n d bus i n es s c o nt i nu i ty p la n i n
p lac e. E nt er pr is e - gr a d e s ec ur i ty an d e n d - t o- e n d e nc ry p t io n of da t a be tw e en t he
si
v en d or an d th e or ga n is at i on ar e c om m o n f ea t ures o f c lo u d prov i ders . Co m pa n i es
are r es p o ns i b l e for m an a g in g c l o ud ER P u s ers ' i d en t it i es an d a c c es s , as w e l l as
s af e gu ar d in g d ev ic es s uc h as PCs an d c e l l p ho n es .
er
St or a ge ac c es s an d r e s i l ie nc y I f o n - pre m is e s h ar dw ar e d i es , mov i ng da t a t o a n e w
s tor a ge s y s t e m c o u ld tak e a lo n g t im e a n d c os t a l ot o f m o ney . Da ta is s t ore d in
th e c l ou d- b as e d E R P pr ov i d er 's d at a c e ntr e s , w h ic h are fr e qu e nt l y re du n d an t an d
ge o gr ap h ic a l ly d is tr ib ut e d. T his is a ls o a dv an t ag e ous in ter ms o f prov i d i ng in t ern et
iv
ac c es s t o c or p or a t e i nf or ma t io n a n d da t a, wh ic h is b ec om i n g i n c reas i n g ly c r uc ia l
as m ore e m p loy m e nt a nd o p er at i ons s h i ft o n l i ne a n d bus i n es s es s tr iv e t o a ut o m at e
an d s tr ea m l i ne p r oc e d ur es .
Un
Clou d E R P Ch all en ge s
W h il e t he r e is a c l e ar tr en d t ow ar d gr ea ter c lo u d a do pt i o n, t her e ar e s o m e
po t en t ia l pr o b le ms t ha t c om p an i es m ay f ac e :
Sy s t e ms t h at ar e no l on g er in us e. If a l a rge r c o m pa ny h as b e en us i ng a n on -
pre m is es E R P s y s t e m for a lo n g ti m e a nd w a nts t o s w itc h to c lo u d - bas e d E R P, t he
ity
tra ns it i o n c an be d i ff ic u lt a n d ti m e - c ons u m in g.
ou ts id e , a n d IT t ea m s l os e c o ntr o l ov er s om e o per at i o na l ac t iv it i es w h en t he
v en d or m an a ges a ll m a i n te n anc e a n d i nfr as t ruc t ur e.
Net Su it e E R P
Ne t Su i te w as d es i gn e d fo r th e c l o ud an d s u pp or ts s m a ll t o m i ds iz ed en te rpr is es i n
a v ar ie ty o f i nd us tr i es , pr ov id i n g r e a l - t i me in s i gh ts , im pr ov e d c us to me r ex p er i enc e ,
an d l o wer s up p ly c h a in c os ts by i n te gr at i ng a n d a ut o ma t in g k ey f in a nc i a l a n d
op er at i o na l o p er a t io ns .
e
lin
Che c k Yo ur U nd er st a nding
Fil l in the b la nk s:
On
2) ... .. .. .. .. .. .. .. is a l i nk b et we e n a c l o ud - b as e d ER P c om p any an d i ts c us t o mers
th at is s ec ur e a n d e nc r y pt e d.
3) ... .. .. .. .. .. .. .. .. . s y s t e ms h av e be e n d oc u m en t e d as o ne of t he mos t e ff ec t iv e way s
to b e g in a u to m at i ng b us in es s pr oc es s es .
4) .................... is a broad term that includes broadcasting, telephone communication, and internet
communication, among other things.
5) ... .. .. .. .. .. .. .. .. is t h e pr oc es s of em p l oy i n g t e c hn o l ogy an d o t her m et h ods t o h e l p
ty
bus i n es s es r un m or e s mo o th ly .
Tru e/ Fa l se
1) Th ere ar e o n ly t wo ty p es of c lo u d E R P s of tw are .
si
2) B us i n es s es t h at ar e a s s es s in g E R P b us i n es s s o ft war e fr e qu e nt ly f oc us on t h e
er
pr ic i n g a nd f u nc t i on a l i ty of t he pro gr a mm e .
3) Core financial and accounting functionality is provided by rare cloud-based ERP software
4) Healthcare pr ov i d es s tr i ng e nt r e q u ire m e nts o n w ha t m et h ods s ho u ld be us e d a nd
ho w pr oc es s es s h o u ld be c ar r ie d o ut
5) Th ere ar e f o ur d if fe r e n t f or ms o f B P A
iv
Su mm ar y
Un
Y ou m us t ens ur e th at t he ma n ag e me n t i nf or ma t io n s y s t em y ou s e l ec t is
c om p at i b le w i th t h e i nf or ma t io n f or ma ts u s ed in y our f ir m a n d i nc l ud es t he
c ap a b il i t ies y o u r e q u ir e. Th e b as ic da t a ac c es s ib l e fro m y o ur c o mp a ny 's
ac t iv it i es an d r ec or ds c a n b e s truc t ure d i n to r e po rts by s u it ab l e m an a ge m en t
)A
i nf or ma t io n s y s t e ms , pr ov i d i ng y ou w it h d ir ec t i on fo r y o ur d ec is i ons . Bus i n es s
Pr ac t ic e A ut o ma t io n ( B P A) is t he pr oc es s of e m pl oy i ng t ec hn o l o gy an d o th er
me t ho ds t o he l p b us in es s es r un mor e s m o ot h ly , a n d it is th e s u bj ec t o f to d ay 's
gu i d e. We ' ll l ook at t h e v ar i ous as p ec ts o f B P A, as w el l as t he i n fl u enc e it has
on b us in es s es , as w e l l as h o w it m ay be ap p l ie d a nd t he us u a l to o ls of t he
tra d e.
•
(c
e
Act iv it y
lin
1) Pr e pa re a c o mp ar a tiv e c h ar t of d if fer e nc e b et we e n Tra d it i o na l a n d O n l i ne E PR
Sy s t e m
On
Q ue sti on s & E xe r ci s e
1) De f in e th e Ro l e of s y s te m / in f orm a ti o n s y s te m i n v al u e ge n era t io n w it h in
org a n iz a t io n a l l ev e l .
2) Dis c us s t he A ut om a ti o n Sy s te m S tr uc t ur e i n bus i n es s pr oc es s .
3) Ex pl a i n th e I nt e gr a te d b us in es s m o du l es - ma nu f ac t ur in g a n d s erv ic e i nd us try .
4) Dis c us s t he Tr a di t io n a l E R P Sy s te m .
ty
5) Dis c us s O n l i ne ER P S y s te m .
si
G lo ss a ry
Th is is a mor e m a nu a l a p pr o ac h to t h e pr oc e s s t ha t r e qu ir es y o ur I T t e am t o
c rea t e a way f or a l l o f th e ex is t i n g s y s te ms w it h i n y ou r bus i n es s to be mor e
i nt egr a te d a n d s tr e a m l i ne d. T h is m ay be mor e r es ourc e - i nt e ns iv e fr om a ti m e
s ta n dp o in t. Ex is t i ng A PIs an d s o ft war e ov er l ap c an b e us e d to mak e a l l of y o ur
s y s te ms m or e i nt er c on nec t ed .
• Bus in e ss p ro c es s m an ag em ent sy st em s are d oc u m e nt ed as o ne of t he m os t
ef fec t iv e m et ho ds t o ge t s t ar t e d w it h bus i nes s pr oc es s a ut om a t i on , a n d t hey
ity
req u ir e t h e l eas t am o un t of i nv es t m en t in t er ms o f bo t h mo n ey a nd t i me . T h e re
are to o ls t ha t ar e d e d ic a te d t o d o in g t h is bu t, it c an als o b e d on e m a nu a l ly
us in g a s t a nd ar d s pr e ads h ee t or w or d doc u me n t if th a t is a b et t er f i t f or y o ur
bus i n es s .
• Sou r c e Ap pl ic at ion: To be g i n, d at a m us t be ex tra c t ed fr o m a n org a n iz a t io n ’s
fro nt - e n d bus i n es s a p p lic a ti o n. T h is m ig h t be a pu rc h as e or der fro m a n E R P
m
e
of te n d ic t at e t he tr an s por t m ec h a n is m t o b e us e d. As s uc h , c om pa n i es s ho u ld
ens ur e t h at th ey s el e c t a bus i n es s i n te gr a ti o n s o l ut i o n t ha t s up por ts al l th e
pro t oc o ls th at th e ir t r a d in g p a r tn ers r e qu ir e, wi t h t he fl ex i b il i ty t o i nt e gra te n ew
lin
c om m u nic a ti o n pr ot oc o ls as th ey a p pe ar .
• Ta rg et App li c at i on: T he fi n a l s t ep i nv o lv es th e t ar ge t a pp l ic at i o n of t h e tr ad i n g
par t ner . Th e t ar g e t a pp l ic at i on mus t b e ab l e t o rec e iv e an d pr o c es s th e d at a
On
th at w as s e nt , m ak e i t r ea d a bl e , an d i nt e gra te t h e i nf or m a ti o n i nt o t he
rec ip i e nt ’s c or e b us in e s s s y s t ems .
Furt he r R ea din gs
• Sy s t e ms A n aly s is an d Des i gn , Sc ot t T il l ey
ty
• B un d l e, Sy s t ems An a l y s is a nd D es i gn , L oos e - le af V ers io n, 12 th + M in dT a p,
1 ter m Pr in te d Ac c es s Car d, Sc ot t T i l le y
Fil l Up s si
er
1) Ne t Su i te
2) E nd- t o- e n d s ec ur i ty
3) Cor p ora t e pr oc es s m a na g em e nt
4) Telecommunications
iv
5) B us i n es s Pr ac tic e A u t om a ti o n ( B P A )
Tru e/ Fa l se
Un
1) Fa ls e
2) Tru e
3) Fa ls e
4) Tru e
5) Tru e
ity
Le ar nin g O b j ect i ve s:
• De f in e t he Sy s t e m A n a ly s is an d D es i g n C on c ep ts .
• Dis c us s t he P has es o f S D LC .
• Ex pl a i n th e v ar i ou s r e as o ns f or c o nd uc ti n g s y s te m a na ly s is .
• Dis c us s Ma n ag e m en t r ol e i n s y s t em a na ly s is t o c a te r c o m pe ti t io n an d
i nc or p or a t in g l a tes t te c hn o l ogy .
•
(c
Dis c us s R o le o f Sy s t e m A n aly s t .
• Ex pl a i n th e S of tw ar e d ev e l o pm e nt f ir ms r o le i n E R P/ B us in es s I nt e ll i g en t
Sy s t e m
• Des c r i b e t h e S A P, O R AC L E, B A A N, P E O P L E SO FT , MI CRO S O FT an d
G O O G L E r o l e i n E R P /B us i nes s I nt e l l ig e nt S y s te m
e
Int rodu ct ion
lin
Sy s t e m an a ly s is is a m et ho d of o bs erv in g a s y s t e m i n o rd er t o inv es ti g at e or
en h anc e it. It is us e d i n th e f i el d o f i nf or m at i on t ec hn o l ogy , wh er e c o m pu t er - b as ed
s y s te ms m us t b e d es c r i be d i n or de r t o b e ex a m i ne d b as e d o n th e ir s t ruc tu re a n d
des i g n.
On
Sy s t e ms an a ly s is in t he I nf or ma t io n T ec hn o lo gy do m a in m i gh t i nc lu d e l o ok in g at
en d- us er us a ge o f a p r od uc t b u n dl e or it e m, as we l l as lo ok i ng a t s ourc e c o de fr o m
to p t o bo tt o m to c har a c ter is e th e s y s t e ms us ed in pro gr a mm i n g.
Ex per ts in s y s te m an a ly s is ar e fr e q ue nt ly c a l le d up o n t o ex a m in e s y s te ms c r it ic a lly
an d rec o m me n d n ec es s ar y a dj us t me nts . . Sy s te ms a n a ly s is is us e d b o th ins i d e a nd
ou ts id e t h e b us in es s wor l d t o d et er m in e w h et h er a s y s t e m is p os s i bl e o r ef f ec t iv e
ty
wi t hi n th e c on t ex t of its ov er al l d es ig n an d to s h ow th e o pt i ons av a i l ab l e to th e
em p l oy in g i n dus tr y or an o th er p ar ty .
As a r es u l t, s y s t em a n a ly s is is u n iq u e t o s y s te m of f ic i a ls , w h o m a i nt a in s y s t ems o n
si
a da i ly b as is , a n d t h e i r j o bs ty p ic a lly e n ta i l a h ig h- l ev e l v i e w on a s y s t em in or d er
to d e ter m i ne its g e ner a l v i ab i l ity in ac c or d an c e w it h i ts p la n.
er
S yst em s An a ly si s
It is th e pr oc es s o f g at h er i n g an d i nt er pr et i ng d at a, f i nd i n g f a u lt s , a n d bre ak i ng
iv
do w n a s y s te m in to its c o ns t i tu e nt p ar ts .
A s y s t e m a na l y s is is c ar r ie d o u t to i nv es t ig a te a s y s te m or i ts c o m po n en ts i n o rd er
Un
to d e ter m i ne its g o a ls . It is a pr ob l e m - s o lv i ng s tr a te gy t ha t e nh a nc es t h e s y s te m
an d g uar a nt e es t h at a l l of th e s y s te m's c o m po n en ts work t og e th er to ac h iev e th e ir
go a ls .
S yst em s D e sig n
ity
It is t he pr oc es s o f s pec i fy in g t h e c o m po ne n ts or m od u les of a n ew b us in es s
s y s te m or r e pl ac i ng a n ex is t i n g s y s t em i n o rde r to m ee t c er ta i n n ee ds . B ef or e y o u
be g i n p l an n in g , y o u mus t f ir s t c o m pl e te ly gras p t h e o l d s y s t e m an d id e nt i fy h ow
c om p ut ers m ay b e e m p loy e d m os t e ff ec t iv e l y i n or d er to r un eff ic i en t ly .
Th e go a l o f s y s te m d e s i gn is to f i gu re o u t ho w t o ac h i ev e t h e s y s te m's g o al .
m
Th e m ai n f oc us of Sy s te m A n a ly s is an d D es i gn ( S AD) is o n−
)A
• Sy s t e ms
• Pr oc es s es
• Tec hn o l ogy
W ha t is a Sy s t e m?
(c
Th e w or d " s y s t e m" c om es fr o m th e G r e e k wor d " s y s t e m a," w h ic h i m pl i es " an
s truc tu re d r e l at i ons h i p b et we e n an y c o ll ec ti o n of c om p on e nts f o r t he pur p os e of
e
ac h i ev in g a c o m m on g oa l ."
lin
" A s y s t e m is a n or ga n is ed gr ou p i ng o f i n ter de p en d en t c om p o ne nt s l ink e d t o ge t her
ac c or d i ng t o a p l a n to ac h i ev e a c er ta i n o bj e c tiv e ," ac c or d i ng t o t h e d ef i ni t io n .
Con st ra int s o f a S ys t em
Thr ee f u nd a m en ta l li m it a ti o ns m us t b e pr es e nt in e ac h s y s te m .
On
• A s y s t em mus t h av e s om e s tr uc t ur e a nd be h av io ur t ha t is in te n de d t o
ac c o m p l is h a s pec i fic go a l.
• Th e s y s te m's c o m p on e nts m us t be in t erc o n n ec t e d an d i n ter d ep e nd en t.
• Th e or ga n iz a t io n's ai m s t ak e prec e de nc e a bo v e th e o bj ec t iv es of i ts
s ubs y s t ems .
ty
For i ns ta nc e, a tr af f ic ma n ag e m en t s y s te m , a p ay ro l l s y s t em , a n a ut o ma te d l i br ary
s y s te m, an d a h u ma n r es o ur c e i nf or m at i on s y s te m.
si
Th e ter m " s y s t e m" is c om m o nly us e d . W h en re f err in g t o i te ms or proc es s es , it has
er
bec o me p op u la r to u s e t he w or d s y s t em to ad d a c on te m p ora ry f l a ir. Ex e rc is e
s y s te ms , i nv es t m en t s y s te ms , d e liv ery s y s te ms , i nf or m at i on s y s te ms , e duc a ti o n
s y s te ms , c o mp u ter s y s te ms , a nd s o o n a re a l l m e nt i on e d. A ny gr o u p o f c o m po n en ts
th at w ork t og e th er t o a c h iev e a s h ar ed go a l o r re as on is r ef err e d to as a s y s t em .
iv
Def in itio n:
Th e wor d s y s t em c o mes f r o m t he G r eek wor d s y s t em a , wh ic h re fe rs t o a w e l l -
org a n iz e d i nt er ac t i o n b et we e n wor k i n g p arts or c o m p on e nts . A s y s t e m ex is ts
bec a us e i t is i nt en d e d t o ac c o mp l is h o ne o r m or e g oa ls . We i nt erac t w i th th e
Un
tra ns por t at i on s y s t e m, t h e p ho n e s y s te m, t h e ac c ou n ti n g s y s te m , th e
ma n uf ac t ur i ng s y s t e m, a n d, f or m or e th a n t wo d ec ad es , th e c o m p ut er s y s t em on a
da i ly b as is .
S i mi l ar ly , we r e fer to th e b us i nes s s y s te m a nd th e or ga n is a t io n as a s y s t em m ad e
up of in t er c o n nec t e d d e par t me n ts (s u bs y s te ms ) lik e pr o d uc t i o n, s al es , h um a n
res o urc es , a nd an i nf or ma t io n s y s t e m. As a s ta n da l o ne un i t, n o ne of th es e
ity
s i ng l e c o mp u ter w i th a k ey bo ar d, m e m ory , a n d pr in te r, or a s er i es of in te l l i ge nt
ter m i na ls l ink e d t o a ma i nf r a m e, ar e ex a mp l es . I n any i ns t a nc e , e ac h c o mp o ne n t is
a p art o f t he ov er a l l s y s te m a n d mu s t c o ntr i bu t e to t h e s y s te m's a b il i ty to f u lf i l its
i nt en d ed a i m. F or t h e d es i g n of a s uc c e s s f u l s y s t e m, t his or i e nt a ti o n nec es s it a tes
an ord er ly ar r a ng e me n t of t he c om p on e nts .
1. As a r es u lt , s t udy i ng s y s te ms c o nc e p ts h as t hre e m aj or i mp l ic at i o n s :
(c
e
th e or ga n iz at i on 's pr i v ac y , c o n fi d en t ia l i ty , an d s ec ur ity po l ic ies , as m us t m ak i n g
c hos e n d at a ( s uc h as pay r o l l) av a il a b le t o t h e ac c ou nt i n g d iv is i o n on de m an d .
lin
Cha r a cte r ist i cs of a S yst em
O ur d e fi n it i o n of a s y s t e m i m p li es t h at al l s y s t e ms h av e t he f o l l ow i ng
c har ac ter is t ic s : or ga n i s at i on ( or d er), i nt er ac ti o n, i nt er de p e n d e nc e , i nt eg ra t io n, a n d
a c or e go a l .
On
1. O rg aniz at ion
S tr uc t ur e a n d or d er a r e i mp l i ed by or g an is at i on . T h e arra n ge m e nt o f c o m p on e nts
a ids i n t he ac h i ev e me n t of g o als . T h e or ga n is at i on s tr uc t u re i l lus tr at es th e
h ier arc h ic a l li nk s in t h e d es i g n o f a c o m pa ny s y s t e m, f or ex a mp l e, s tar t in g w it h t he
pres i d en t a t t he to p a n d l e ad i n g d ow n t o t he b lu e - c o ll ar w or k ers . A s y s t e m -
s ubs y s t em r el a ti o ns h i p is d ep ic te d , th e a ut hor i ty s truc t ure is d ef i ne d, t h e for m a l
fl o w of c o m mu n ic a t i o n is s p ec i f ie d , an d t h e c ha i n of c o m m an d is for m a l is e d. A
ty
c om p ut er s y s t em is b u il t ar ou n d an in p ut dev ic e, a c e n tra l pr o c es s in g u ni t, a n
ou t pu t d ev ic e , a n d o n e or m or e s tor a ge u ni ts , as w el l as o th er c om p on e nts . Wh e n
l ink e d to g et h er , t h ey c om pr is e a c o m pl e te in f or ma t io n - pro d uc t i o n s y s te m.
si
2. Int e r act ion
Th e way eac h c o m po ne n t i nt er ac ts w it h t h e ot h er c o m po n en ts of t h e s y s te m i s
ref err ed to as i nt er ac ti o n. Pu r c h as in g , fo r ex a m p le , m us t work wi t h pr od uc ti o n,
adv er tis i n g w it h s a l es , a n d p ay r o l l w i th s t af f i n a c o m pa ny . T o s o lv e a pr o b le m i n a
er
c om p ut er s y s te m , t h e c e ntr a l pr oc es s i ng u n it m us t c o m mu n ic at e w i th t h e in p ut
dev ic e. T h e ma i n m e mo r y , i n t ur n, s t or es p rog ra m mes an d d at a t ha t t he a ri t hm et ic
un i t u t i lis es to d o c a lc ul a ti o ns . T h e c om p ut er's p erf or ma nc e is en a b le d by t he
i nt erp l ay b et w ee n t hes e c o mp o ne n ts .
iv
3. Int e rd ep end en c e
I nt er de p en d enc e r ef e r s t o th e f ac t t ha t d i f fer e nt s ec t i ons o f a n org a n is a t io n or
c om p ut er s y s t em ar e r e l ia n t on o n e a n ot h er. Ac c or d in g t o a s t rat e gy , t hey ar e
Un
To s u m m ar is e , n o s u bs y s t e m c a n f unc t io n in is o l at i o n b ec a us e it r el i es o n d a ta
(i np uts ) fro m o th er s u bs y s t e ms to c a rry ou t its f u nc t i ons .
Th e e ff orts a nd as s i s ta nc e o f s y s t ems a na ly s ts , pr ogr a mm ers , a nd o per a ti o na l
em p l oy e es i n a c o mp ut er c e nt r e f ur th er d e mo ns tra t e i nt e r de p en de nc e. T he us e r
i ni t ia t es th e c h o ic e to c o m p ut er is e an a pp l ic at i on , t he an a ly s t an a ly s es a nd
des i g ns it , t he pr o gr a m mer pr o gr a m mes a n d t es ts i t, a nd t he c o mp u ter o p era to r
m
O rg an iz at i o n St r uc tur e – An Ex a m p le
)A
(c
e
lin
On
ty
Int eg rat ion
Th e t er m " i nt e gr at i on " r ef er s t o t h e h o l is tic n at ur e o f s y s t e m s . To fu l f i l t he
org a n iz a t io n's f un d a m en t al g o a l, s y nt h es is c om es a ft er an a ly s is . T he w ay a s y s t e m
si
is c on n ec t e d is r ef er r ed t o as in te gr at i o n. It's m or e t h an j us t s h ar in g a phy s ic a l
s pac e or po r t i on . I t me a ns t h at ev en i f e ac h p ort i o n o f th e s y s te m pe rf or ms a
d is t i nc t f unc t io n, t h e p i ec es o f th e s y s t em w ork t og e th er w i th i n th e s y s t em .
S uc c es s fu l in t egr a ti o n us u al ly r es u l ts i n a s y ner g is t ic ef fec t a nd a s tr on g er ov er al l
er
i mp ac t t h an if e ac h c o mp o ne n t fu nc t i o ns a lo ne .
Cen tr al ob j ect i ve
Th e f in a l as p ec t o f a s y s te m is its pr i mary go a l. Re a l or dec l ar e d g oa ls are bo t h
iv
ac c e p ta b le . A lt ho u gh a d ec lar e d g o a l m ay be th e tr u e g o al , it is f a ir ly u nc om m o n
for a n or g an is at i o n t o dec l ar e o ne g o a l an d w ork to w ard a n o th er. T he c r uc i a l
as p ec t is t ha t us er s mus t be aw ar e of a c om p ut er ap p l ic a t io n's pr im ary go a l f ro m
th e s ta rt o f th e ir for m a l or ga n is at i on a l p os i t i ons . V ic e Pr es id e nt o f S a l es , Pr es i de n t
Un
Pr od uc ti o n V ic e - P r es i de n t Vic e Pr es i de nt , Ac c ou nt i n g D e pa rt me n t H e ad , As s em b ly
De p art i ng H e ad , P a i nt i ng Au t hor i ty L in es
Wo r ke r s
For a s uc c es s fu l d es ig n a nd c o nv ers io n , wor k ers m us t b e a n aly s e d . P ol i t ic a l a n d
org a n is a t io n a l c ons i d e r at i on s c an obs c ur e th e tru e g o a l. Th is me a n s t ha t th e
an a ly s t w i l l h av e t o w o r k t hr ou g h th es e r o ad b l oc k s i n or der t o d et er m in e t he tr u e
ity
go a l o f th e pr o pos e d mo d if ic at i o n.
3. 1. 2 P ha s es of SDL C
m
Th e So ft wa r e D ev e l o pm e nt L if e Cy c le ( S D LC) d es c r ib es th e en tir e d ev e l op m e nt
proc es s , inc l ud i n g a l l pr oc es s es i nv o lv ed i n d es i gn i n g, dev e l op i ng , t es ti n g, a nd
de p l oy i n g a s o ft war e p r od uc t .
Softw a r e De v elo pm e nt L if e C y cl e P ro c es s
(c
e
Fo l lo w in g th e S DL C p r oc es s e ns ur es t h at s of tw ar e is dev e l op e d i n a m e th o d ic a l
an d d is c i pl i n ed ma n ne r .
lin
Pu rpo s e:
On
Re q ui re m en t c o l l ec t i n g, d es i gn , c o d in g , tes t i ng , a nd ma i nt e n anc e are th e p h as es of
th e S DL C. T o s u pp ly th e Pr o duc t i n a m et h od ic a l m an n er, it is c r it ic a l to s t ic k t o
th e p has es .
As a n ex a m p le , A s of tw ar e m us t b e pr o duc e d, an d a t ea m i s s ep ar at e d i nt o
ty
s ec t i ons t o wor k o n d if f er e nt as p ec ts o f t h e pro d uc t , eac h of w h ic h is fr e e t o d o
any t hi n g t hey wa n t. O ne d ev e l op er c ho os es to des i g n f irs t , w h il e t he ot h er c h o os es
to c o d e f irs t a n d th e n wor k o n d oc um e nt at i o n.
si
Th is w i l l r es u l t in pr o j ec t fa i l ur e , t h us t e a m me m bers m us t h av e a h i gh l ev el o f
k no w le d ge an d c o m pr eh e ns io n i n or d er to d e liv er t h e des ir e d pr od uc t .
er
SD LC C y cl e
Th e S DL C Cy c le d e p ic ts t h e s o ft war e d ev el o pm e nt p roc es s .
B el o w is t he di a gr am m at ic r e pr es e n ta t io n o f th e S DL C c y c l e :
iv
Un
ity
m
)A
(c
SD LC Ph as e s
e
G iv en be l ow a r e t h e v ar io us p h as es o f a n S DL C :
• Re q ui r e m en t g at h er i n g a n d an a ly s is
• Des i gn
lin
• Im p le m e nt at i on or c o d i ng
• Tes t i n g
• De p loy m e nt
• Ma i nt e n anc e
On
#1) R eq ui r em ent G at he rin g and A na ly s is
ty
to o bt a in a l l of t h e n ec es s ar y i nf or m at i on , s uc h as w h at t he c u s to m er w a nts t o
c ons tr uc t , wh o w il l b e t he e n d- us er , an d w ha t th e pr o duc t's p ur pos e is . Pr i or to
c ons tr uc t i ng a pr o duc t, i t is c r it ic a l to h a v e a s o li d gr as p o r ex p er tis e o f t h e
pro d uc t .
si
For Ex a m pl e , A c us to me r r eq u es ts a fi n an c i al tr a ns ac t i on - r e l at e d a pp l ic at i on . I n
th is s c e n ar i o , th e r e qu ir em e nts m us t be s pec if ic , s uc h as wh at k in d o f tra ns ac t i ons
er
wi l l be c o n duc te d , h o w t hey w i l l b e c on d uc te d, a nd i n wh at c urr enc y t hey w i ll b e
c on d uc t e d.
#2) D e si gn
The requirements acquired in the SRS document are used as input in this phase, and the software
architecture required to implement system development is derived.
ity
W he n t h e d ev e lo p er r ec e iv es t h e D es ig n doc u me n t, th e im p l e me n ta t io n/c o d in g
proc es s be g ins . So ur c e c o de is c re a te d f ro m th e s o ft w are des i gn . D ur in g t h is
m
ph as e, a l l o f th e s o ft w ar e 's c o mp o ne n ts are i mp l e me nt e d.
#4) T e stin g
)A
e
pro d uc t i o n env ir o nm e n t or i n it i al ly s ubj ec t e d to U AT (Us er Ac c e pt a nc e T es t i ng ).
In U AT, a r e p l ic a o f t he pr od uc ti o n e nv ir on me n t is c o ns tr uc t e d, a nd th e c us t o mer ,
i n c o l l ab or at i on w it h t h e d ev e lo p ers , pe r for ms t h e t es t i n g. I f t h e c us t om er is
lin
s at is fi e d w it h th e a p pl i c at i on , t he c us t om er mus t s i g n of f fo r it t o go l iv e .
#6) Ma int en an ce
Af t er a pr od uc t is d ep l oy ed i n a pr od uc t i on env ir o n me nt , t h e dev e lo p ers are
On
res p o ns ib l e for pr o du c t m a i nt e na nc e, w hic h inc l u des f ix in g a ny is s ues t ha t ar is e
an d a ny e nh a nc em e nt s t ha t n ee d t o b e m ad e.
Re as ons f or I n it i at i ng Sy s t e m A n aly s is :
ty
1. It is re q u ir e d to s pec i fy t he s y s te m bo u nd a ri es , wh ic h w i l l d e fi n e t h e s y s t e m's
s c op e an d c ov er a ge . Th is a i ds in th e id e nt if ic at i o n a nd c o mp re h ens i o n o f t he
s y s te m's f u nc t i o na l bo un d ar ies , d e par t me n ta l b o un d ar ies , a n d p ers ons i nv o lv e d
si
i n t h e s y s t em . It a ls o a i ds i n th e i d en t if ic a ti o n of t h e nu m er ous s ub - s y s t ems '
i np uts an d o ut p uts , as w e ll as th e ov er al l s y s te m.
2. Th e s y s te m's a n a ly s i s a i ds th e s y s t em de s i gn er i n d et er m in i n g w he t her t h e
s y s te m is c l os e d or op e n, d et er m in is t ic or pro b a bi l is tic . T o ac h i ev e t h e
er
ap pr o pr i a te des i gn a r c h it ec t ur e, s uc h a n u n ders t an d in g o f t he s y s t e m is
req u ir ed pr ior t o d es ig n in g t he p roc es s .
3. It is v it a l t o s p ec ify t h e s y s te m's go a l (s ). Ma ny t i m es , i t is s ee n t ha t s y s t ems
hav e be e n i n us e f or a l o ng t im e a n d h av e los t s i g ht of th e ir pr i ma ry g oa l of
iv
ac h i ev in g obj ec t iv es . Th e us er s o f t he s y s te m, as w e ll as t he s ta ff e n g ag e d, a re
un a b le to i d en t ify th e g o a l( s ). S i nc e we are d ev e l o p in g a c om p ut er - b as e d
s y s te m, w e m us t r ed ef i ne or r es et t he o bj ec t iv es as a re fer e nc e p oi n t i n t h e
c on t ex t o f th e pr es en t bus i n es s de m a nd .
Un
4. Th e s tr a t eg ic g o a l of t he s y s t e m a na ly s is is to g e t th e p eo p l e's ac c ep t anc e o f a
ne w dev e lo p m en t. T h e pr oc es s o f s y s t e m an a ly s is g iv es pe o p l e a s e ns e o f
i nv o lv e me nt . T h is ai ds i n br e ak i ng d ow n r es i s ta nc e t o th e ne w dev e lo p me n t a n d
gu ar a nt ees t h at t h e ne w s y s te m is a d h ere d t o.
5. Th e im p or t a nc e of t h e s y s t e m in th e or ga n is a t io n mus t be u nd ers t o od . T h is
c l ari f ies i ts u ti l i ty a nd as s is ts t he d es i g ne r i n d et er m in i ng th e s y s te m's des i g n
e le m en ts . T hey w ou l d b e ab l e to p l ac e th e s y s te m i n r e la t io n t o ot h er s y s t e ms
ity
e
me m b ers w h o hav e b ee n c h os e n fo r t h e ir c om p et e nc e a n d c om pa t ib i l ity . Pr oj ec t
pro d uc t iv i ty go a ls m u s t be es t ab l is he d , an d m em b ers of s y s t e m s a na ly s is t e ams
mus t b e e nc o ur ag e d t o m ee t th e m.
lin
As s emb lin g a Te am
P ut ti n g t o ge t her a te a m is a g o od i d ea . Wh o s ho u l d a pr oj ec t ma n ag er c h oos e if h e
or s h e has t h e o pp or t un i ty to as s e m bl e a d r ea m t ea m o f h i gh ly t a l en t ed in d iv id u a ls
to d es i gn a s y s te m ? I n g en er a l, p roj ec t ma n ag ers s h o u ld s eek ou t t hos e w h o s h are
On
th e ir i d ea ls o f t ea m w or k a nd ar e mo t iv at ed by t h e g oa l t o pr o du c e a h i gh - q u al i ty
s y s te m o n t i me an d wi t hi n b u dg e t. O t h er ex c e l l en t t ea m me m b er tr a its i nc l ud e a
s tro n g w or k e th ic , h on es ty , a nd c o m pe t e nc y ; a w i ll i n gn es s to l ea d b as e d o n
ex p er tis e ; m ot iv at i on , ex c it em e nt f or t he proj ec t , a nd t e am m at es ' tr us t .
ty
be n ef ic i al t o hav e at l eas t on e a dd i ti o n al m em b er of t he t ea m wh o is . Th is p ers o n
s ho u l d i de a l ly b e an e x per t i n t he s am e f i el d as t h e s y s te m b e in g dev e l op e d. Wh e n
c rea t in g an ec o m m er c e s i te , t e ams c an s eek th e s u p po rt o f a m ark et er ; w he n
c rea t in g a n i nv en t or y s y s te m, t ea ms c an e n l is t t he h el p of s o me o n e k n o wl e dg e a bl e
i n pro d uc t i o n an d o p er at i ons .
si
A t e am s h ou l d id e al ly hav e t wo s y s t ems a na ly s ts . T h ey c a n as s is t o ne an o th er ,
do u b le- c h ec k e ac h ot her 's w or k , an d a dj us t th e ir w ork l oa ds as ne e de d . Th er e is
er
un d ou b te d ly a r e qu ir e me n t f or pr o gra m m ers to j o i n t h e t ea m . P e op l e w ho k n ow ho w
to do wa lk thr o ug hs , r ev ie ws , t es ti n g, an d d oc u m en t i ng s y s t e ms a re j us t as c ruc i a l
as t hos e w h o k n ow h ow t o c od e. S o me pe op l e ex c e l a t v i e wi n g t h e b i g p ic t ur e,
wh i l e o t her s t hr iv e w h en t as k s ar e br ok en d ow n i nt o s ma l l er c hu n k s . Bo th ty p es o f
pe o p le s h o u ld be pr es en t o n ev er y te a m.
iv
A pr oj ec t m a na g er s ho u l d s ea r c h f or p er s on n e l wh o h av e bo t h ex per i e nc e a n d
en t hus i as m i n a dd i ti o n t o t h e es s e nt i a ls . W he n es t i m at i n g th e ti m e r eq u ir ed to
Un
ac c o m p l is h a j o b, ex per i e nc e is v ery s i gn if ic a nt . W he n c o mp ar ed t o a te a m of
nov ic e pr og r a m me r s , ex pe r i e nc e in pro g ra mm i n g c an r es u l t i n c o de be i ng
dev e l op e d fiv e t i mes f as t er . A us ab i l ity s pec i al is t is a g o od ad d it i o n to t h e te a m as
we l l.
A t ea m's fo u nd a ti o n i s b u i lt on t r us t. A ll pr oj ec t p art ic i pa n ts m us t ac t r es p o ns ib l y
an d pr o m is e to do t h e i r b es t a nd f i n is h th e ir as s ig n ed t as k s . P e op l e m ay o p era te i n
a v ar ie ty o f way s , b ut th ey m us t a l l a gr ee t o work t o ge th er t ow ar d a s i m il ar g o a l.
)A
em er g es . V is ua l iz e t e ams as a l way s f in d i ng a ba l a nc e b et we e n c o mp l et i n g t h e t as k
at h a nd a n d ma i nt a i n i ng r e l a ti o ns h i ps a mo n g te a m me m b ers a s a w ay t o or g an is e
y our t h i nk in g a bo u t th em .
In f ac t , te a ms fr e q ue nt ly h av e t w o l ea d er s ra th er t ha n j us t on e. Ty pic a l ly , o n e
i nd iv i du a l wi l l e me r g e wh o w i ll le a d o t hers i n c o m p le t in g w ork , w h il e a no t her w i l l
e
em er g e w h o w i l l b e c onc er n ed w it h gro u p me m b ers ' s oc ia l r e la t i ons h i ps . B ot h are
es s e n ti a l t o t h e te a m' s s uc c es s . O t h er r es e arc h es h av e c l as s i f ie d t hes e i n div i d ua ls
as t as k l ea d er an d s oc i oe m ot i on a l l ea d er, r e s pec t iv e ly . Ev ery t e am h as c o n fl ic ts as
lin
a r es u l t o f at te m pt i ng to s tr ik e a b al a nc e b et we e n c o m p le t in g du t i e s an d pr es erv i n g
re la t io ns h ips a m o ng m em b er s .
Te ns i o ns m us t b e r es o lv e d o n a re g u lar b as is for t h e te a m t o re ma i n ef f ec t iv e.
In ef f ec t iv en es s a nd ev e n tu a l te a m bre a k up w i l l r es u l t fro m m in i m is in g or
On
d is re g ard i n g t ens i o ns . T he s k i l lf u l u t il is at i o n o f f e ed b ac k by a ll te am m em b ers c a n
prov i d e a s ig n if ic a nt a m o un t o f t he es s en t ia l t e ns io n r el i e f. H ow ev er, a ll
par t ic ip a nts mus t a gr ee th a t t he me t ho d t hey i nt er ac t ( i. e ., pro c es s ) is es s en t ia l
en o ug h t o w ar r a n t t im e. I n a s u bs eq u e nt p a rt, w e' l l t alk ab o ut pr o c es s pr od uc tiv i ty
tar g ets .
ty
Cre at i n g ex p l ic it a n d i m pl ic i t t e am n or ms (c o l lec t iv e ex p ec t at i ons , be l i efs , an d
way s o f b eh av in g) t ha t gu i de me m be rs in t h e ir r e la t io ns h ips is on e way t o s ec ure
c ons e ns us on p r o p er me m b er en g a ge m en t. Th e no rms o f a t ea m a re un i q ue t o th a t
te a m a nd wi l l n o t nec es s ar i ly tra ns fer to an ot h er. T h es e s ta n dar ds ev o lv e
si
thr o ug h ou t t im e a n d ar e be tt er v i ew e d as a c o l l ab or at iv e ef f or t r at h er th a n a
fi n is he d res u lt .
S etti ng P ro j e ct Pr od uct iv it y G o a ls
ity
an a ly s ts . H ow ev er , a s i n d us tr i al pr od uc t iv i ty r is es , it is ev id e nt t ha t m a na g er ia l
pro d uc t iv i ty mus t a ls o r is e . T h e pr od uc tiv i ty t arg e ts for t h e s y s te ms a na ly s is t ea m
are de f in e d w it h th is g oa l in m i n d.
Th e t e am m us t c r e a t e an d ag r e e on g o a ls , w h ic h s h ou l d b e bas e d on t ea m
me m b ers ' s k i l ls , pr ev i ous p er for m a nc e , a n d th e n a tur e o f th e proj ec t . B ec a us e
(c
s om e ti m es a w h ol e s y s te m wi l l b e i ns ta l l ed , an d ot h er t i m es o n ly a s ec t i on o f a n
ex is t i ng s y s t e m w il l b e m o di f ie d , th e g o als f o r e ac h pr oj ec t wi l l d i ff er s l i gh t ly .
Mot iv at ing P ro j ect T e am M em be r s
e
A lt h ou g h mo t iv a t io n is a c om p l ex s u bj ec t , it is on e wo rt h c ons i de r i ng , ev e n if o n ly
br ie f ly , a t t h is t i me . T o pu t i t an o th er w ay , p eo p l e j oi n gr o ups t o m ee t s o me o f t he ir
mos t bas ic ne e ds , s uc h as f o od , c lo th i ng , a n d s h e lt er . A ff i l ia t io n, c o ntr o l,
lin
i nd e pe n de nc e, an d c r ea t iv ity ar e j us t a f e w o f t he h ig h er - lev e l des ir es t h at al l
i nd iv i du a ls h av e . O n v ar io us l ev e ls , p e op l e a re m ot iv at e d to m e et u nm e t wa nts .
P art ic i pa t io n in go a l s et t in g, as o u tl i n ed i n t he pr ev i o us s ec t io n, c an e nc o ur ag e
te a m me m b er s to s o m e ex t e nt . S et ti n g a d if fic u lt b u t at ta i n ab l e o bj ec t iv e a n d th e n
On
c om p ar in g pe r f or ma nc e a g a ins t it on a r e g u lar b as is a p pe ars to be e ff ec t iv e in
mo t iv a t in g pe o p le . G o a ls dr iv e p e op l e t o at t a in th e m i n a s im i l ar way th at m ag n ets
do . G o a l s et t in g dr iv es e mp l oy e es i n p ar t b ec aus e te a m m e mb ers k n ow ex ac t ly
wh at is ex p ec te d o f t he m pr ior to a ny p er for m anc e as s e s s m en t . It c a n a ls o b e
c red i te d w it h th e s uc c es s of g oa l - s et t in g f or mo t iv a t io n , as it g iv es e ac h t e a m
me m b er s o me au to n o my i n ac c om p l is hi n g t he go a ls . T he me a ns t o at t ai n a go a l
may or m ay no t b e pr e de t er m i n ed . I n th is c a s e, t ea m m em b ers are a l lo we d to a p pl y
ty
th e ir ow n k n o wl e dg e a nd ex p er i enc e t o ac h i e v e th e ir o bj ec t iv es .
si
th ey de f in e th e l ev e l of ac hi ev e me n t t ha t i s ex p ec te d of th e m. Th is go a l - s et ti n g
ap pr o ac h s i m p l if i es t he w or k i ng e nv ir on m en t wh i l e s i mu l ta n eo us ly en er g is i n g it
wi t h th e p ot e nt i al of a c c om p l is hi n g wh a t is e x pec t ed .
er
Ma na gin g E com me r c e P ro je ct s
Ma ny of th e pr ev i o us i de as an d t ec h ni q ue s c an b e us e d t o ec om m erc e pr oj ec t
iv
ma n ag e m en t. H ow ev e r , y o u s h ou l d be a war e t h at , w h i le t he re ar e ma ny pa ra l l els ,
th er e ar e a ls o s i gn i f i c an t v ar i a nc es . O n e d is t i nc t i on is th at ec o m merc e s y s t e ms '
da t a is d is pe r s e d t hr o ug h ou t t he f ir m . As a res u l t, y ou' re no t j us t m a n ag i n g d at a i n
a s in g l e de p ar t m en t o r ev en a s i n g le u n it . S inc e a r es u lt , v a ri o u s or ga n is at i on a l
Un
A no th er s i g n if ic an t d is t i nc t i o n is t h at ec o m merc e pr oj ec t t e am s of t en re q ui re
ad d it i o na l p er s o n ne l fr o m v ar io us d ep art m en ts , i nc lu d i ng as d ev e lo p er s ,
c ons u lt a nts , da ta b as e ex per ts , a nd s y s t e m i nt e gra to rs . W i th i n a c oh er e nt I S gr o up
or s y s te ms d ev e lo p m en t t ea m, ne a tly de f i ne d , s ta b le proj ec t gr ou ps w i l l b e th e
ity
ex c e p ti o n r at h er t ha n th e r u l e. Fu rt her m or e, b ec a us e s o m uc h as s is t a nc e may b e
req u ir ed at f ir s t, ec om m er c e pr oj ec t m a na g ers m us t f or m p art n ers h i ps b ot h
ex t er na l ly an d in te r n a l ly w e ll i n a dv anc e of t h e i m p le m e nt at i on , pos s i b ly s h ar i ng
ta l en t ac r os s pr oj ec ts to r e d uc e ec o m merc e i mp l e me nt a ti o n c os t s a nd g at h er th e
req u ir ed n um b er s of pe o p le w it h t h e n ec e s s ary ex p ert is e. O rg a n iz a t io n al p o li t ic s
has t h e c a pac i ty to d e v e lo p a r ift be tw e en t e am me m be rs .
m
e
In ter n et , s ec u r i ty is p ar a m o un t. B e for e th e ne w s y s te m is i ns t a l l e d, d ev e l o p in g a nd
i mp l e me nt i n g a s ec ur i ty pl a n is a pr oj ec t i n a nd o f i ts e l f an d m us t be m a na g ed as
s uc h .
lin
Int eg rat ing T ec hno lo gie s f o r S ys te ms
As us ers a do p t n ew t ec h n o lo g ies , s om e of th e j o b of th e s y s te m s an a ly s t w i ll b e
dev o te d to i nt e gr a t in g tr a d it i on a l s y s t e ms wi t h n e w o n es in o rde r t o ens ur e a
On
re lev a nt c o nt ex t, as i nd ic at e d i n th e d ia gr a m be l o w. As p e op l e work t o i nt e gra t e
th e ir ec o m mer c e a p p l i c at i ons i nt o t h ei r o l d f ir ms or s tar t t ot a l ly n e w e bus i nes s es ,
th is s ec ti o n d es c r i b es s o m e of t he n e w in f o rm at i on t ec h n o lo g i es s y s te ms a na ly s ts
wi l l b e a do p ti n g.
ty
fro m t he s t ar t.
Th ere ar e n u m er o us a dv a n ta g es o f ins ta l l i n g o r d ev e l o p in g an a p p lic a ti o n v ia th e
In ter n et :
si
1. Inc r e as i n g us er a wa r en es s of a s erv ic e, pr od uc t , i nd us t ry , pers o n, or
gro u p's av a i la b i l ity .
2. Us er s h av e t he o p ti o n of h av i ng ac c es s 2 4 h ours a day , s ev e n day s a w e ek .
3. Im pr ov in g t he in te r f ac e d es i g n's u t il i ty a n d u s ab i l ity .
er
4. Dev e lo p i ng a s y s te m th at c a n b e ex t e n de d i nt er na t io n al ly r at h er t ha n
re ma i n in g loc a l, a ll o wi ng pe o p le i n r e m ot e r eg i o ns t o b e r e ac h e d reg ar d les s
of t h eir t i m e z o ne .
iv
Un
ity
m
)A
Ent e rp ri s e S yst e ms
Ma ny or ga n is at i ons s ee p ot e nt i a l b e n ef its fro m i nt e gra t i ng m u l ti p l e in fo rm at i o n
(c
s y s te ms t ha t ex is t at v ar io us l ev e ls o f m an ag e me n t a nd wi t hi n v ar io us ac t iv it i es .
S om e p ub l ic at i ons r ef er to i nt e gr at i on as a lay er - b as e d s erv ic e - or i e nt ed
arc h i tec t ur e ( SO A) . T he t op lay er wo u l d be m ad e u p of e nt er pr is e s y s t e ms . T his
i nt egr a ti o n is h a nd l e d v i a en t er pr is e s y s t ems , c o m mo n ly k n ow n as e nt er pris e
res o urc e p l a nn i ng ( E RP ) s y s te ms . E R P i m p le m en t at i on nec es s it at es a s i gn i fic a nt
e
am o un t o f de d ic at i on a nd or g a n is a t io n a l t rans f orm a ti o n. Sy s t e ms a na ly s ts are
fre q ue nt ly h ir ed as c o ns u l ta n ts f or ER P pr oj ec ts th a t us e pro pr i et a ry s of tw ar e. S A P
an d O r ac l e ER P s o ft war e ar e t wo ex a m p l es of po p u lar ER P s of tw ar e. So m e of
lin
th es e to o ls ar e d es i g ne d t o h el p b us i nes s es m ig ra te t o t he I n t ern e t. I n or de r t o
ef fec t iv e ly d es i gn , i ns ta l l, ma n ag e , u pd at e , an d us e a n E R P pr o g ra mm e, an a ly s ts
an d s o m e us er s ty p ic a l ly r e qu ir e v e nd or tr a i n in g, s up p ort , a nd m a i nt e na nc e.
S yst em s f o r W ir e le s s an d Mob il e D ev i ce s
On
A na ly s ts ar e be i n g tas k ed w i th dev e lo p i ng a s l e w of n e w s y s te ms an d a p pl ic at i o ns
for adv e nt ur ous us er s , i nc lu d i ng m any f or w ir e les s a nd m ob i l e d ev ic es l ik e t h e
A pp l e i Ph o ne , i P od , an d B l ac k Berry . A na l y s ts m ay a ls o b e c a l l ed u p on t o b u i ld
c onv e nt i on a l or w ir e l es s c om m u nic a ti o ns ne tw ork s f or c us t o me rs w ho w an t to
i nc or p ora t e ph o ne , v i de o , t ex t mes s a gi n g, a nd e m a il in to c o rp ora t e in tr an e ts or
i nd us tr i a l ex tr a n ets . M - c o m merc e re fe r s t o w ire l es s ec o m merc e (m o b il e
ty
c om m erc e) .
W ir el es s l oc a l ar e a ne tw or k s ( W L A Ns ), w ir el es s f id e l ity n et wo rk s (W i - Fi) , an d
pers o n al w ir e les s n e t wor k s ( P WNs ) t ha t c on n ec t a v ar i ety o f d ev ic es us i ng t h e
si
B lu e to ot h s ta n d ar d a r e al l s y s t ems y o u m ig ht b e as k e d to d ev e l o p. In m or e
adv a nc e d s it ua t io ns , an a ly s ts may be r e li ed up o n to c r e at e i n te l l ig e nt ag e nts ,
s of tw ar e th a t c an as s is t us er s w i th ac t iv it i es by l e arn i n g th e ir pre f ere nc es ov er
ti m e a n d ac ti n g o n t h em . F or ex a mp l e, a n i nt e ll i g en t a g en t us i n g p u l l t ec hn o lo gy
er
wo u ld s e ar c h t h e W eb for s t or ies o f in t eres t to t he u s er af te r o bs erv in g th e us er's
be h av io ur p at ter ns w it h in f or m a ti o n ov e r t i m e, a nd w o ul d c o nd uc t s earc h es on t he
W eb w i th o ut t h e us e r ' s c o ns t a nt pr o d di n g.
s tu dy , ex c h an g e, a n d m od i fy th e c o de , or c om p ut er i ns t ruc t io ns , w it h O S S . T h e
i de a th a t any s o ft w a r e m od i fi c a ti o ns m us t b e d is c los e d w i th e v ery o n e o n t h e
proj ec t is o ne of t he c om m u ni ty 's ru l es .
O S S d ev e lo p me n t h a s a ls o b e en des c ri b e d as a p hi l os op hy ra th er t ha n j us t a
me t ho d f or g en er at i ng ne w s of tw are . Ma ny pe o p le wh o pa rt ic ip a t e in o pe n s ourc e
c om m u ni t ies s e e it a s a m e th o d t o as s is t c iv i liz a ti o ns c h a ng e . A pac h e, a We b
ity
c om m u ni t ies in to f ou r ty p es —a d h oc , s t an d ard is e d, or g an is ed , a nd c o m me rc i a l —
a lo n g s ix d i ff er en t d i me ns i ons — ge n er al s t ruc t ur e, e nv ir on m e nt , a i ms , me t ho ds ,
us er c o m mu n ity , an d l ic e ns i ng —t o h el p u s be tt er c o mpr e he n d th e op e n s o urc e
mov e m en t. So m e s c h o lar s s ay t h at O S S i s a t a fo rk in t h e r o ad , a nd t h at b ot h
)A
dr iv e t he d ev e l o pm e nt of s t an d ards t ha t a ll o w d ev ic es t o c om m u nic a te m or e
s i mp ly . W id es pr e a d us e o f O S S c ou l d he l p a ll ev i at e s om e of t he s ev ere
pro gr a mm i n g s h or ta g e s by p ut t in g pr ogr a m m in g t o o ls i n th e ha n ds o f s t u de nts i n
dev e l op i ng c o un tr ies s oo n er t ha n if t h ey w er e l i m it e d to pr opr i et ar y p ac k ag es , a nd
it c o ul d l ea d t o la r ge - s c a l e pr o b le m s ol v i ng thr o ug h i nt ens e an d ex t ens iv e
c o ll a bo ra t io n.
e
lin
3. 1. 5 Ro le of Sy st em Ana l yst
By s tu dy i ng t he i n p u tt i ng a nd p roc es s in g of d at a as we l l as t he o ut p ut t in g of
i nf or ma t io n w it h t he go a l o f en h anc i n g or ga n is at i on a l pr oc es s e s , t h e s y s te ms
an a ly s t c ar ef u l ly ex am i n es h o w p e o pl e i nt er ac t w it h t ec h no l o gy a n d ho w
On
bus i n es s es fu nc ti o n. Ma ny of t h e a dv an c es i nv o lv e th e us e of c om p ut er is ed
i nf or ma t io n s y s te ms t o be tt er as s is t us ers ' w ork du t ies a n d b us i nes s pr oc es s es .
Th is c onc e pt e m ph a s is es a r ig or ous , s y s te m at ic a ppr o ac h t o a na ly z i ng — an d
po t en t ia l ly i m pr ov i n g —w h at is h a pp e ni n g i n t h e un i q ue c o nt e x t ex per i e nc e d by
us ers an d g e ner at e d b y a c o m pa ny .
ty
ab l e t o wo r k w i th p eo p le of v ar i o us ty p es a nd h av e pr ev i ous c o m pu t er s k il ls . T he
an a ly s t f i l ls a v ar ie ty of f unc t io ns , s o m et i m es j ug g l in g s ev era l a t onc e . C o ns u l ta n t,
s up p ort i n g ex p er t , a n d c ha n ge a ge n t ar e th e thr e e pr i m ary f u nc t i on s of th e s y s te ms
an a ly s t .
si
As a s y s t e ms c o ns u l t an t t o i nd iv i du a ls a n d t he ir en ter pr is es , t h e s y s t ems an a ly s t
may be rec r u i te d p ar t ic ul ar ly t o ad dr es s i nf or ma t io n s y s t ems d i ff i c u lt i es wi t hi n a
er
c om p any . Suc h h ir i n g m ig ht b e a dv a nt a g eo u s s inc e o u ts i d e c o ns ul ta nts c an br in g a
fres h v i ew po i nt t o a n or ga n is a t io n th a t o t her e m p loy e es d o no t h av e. O u ts i d e
an a ly s t s ar e a ls o a t a d is adv a nt a ge b ec a us e th ey w i l l n ev er be aw ar e o f t h e
ge n u in e or g a n is a t io n a l c ul t ur e . Y ou w i ll re ly l arg e ly on t he s y s t e ma t ic ap pr oac h es
me n ti o n ed t hr o ug h ou t t h is c o ur s e as a n ou ts i d e c o ns ul t an t t o a n a ly s e an d c r ea te
iv
S yst em s An a ly st a s Sup po rt in g E xp er t
par t ic u l ar d e par t me n t.
s erv ic e c o m p any .
ex t er na l t o t h e or ga n i s at i on , is th a t of a c h an g e a g en t. W he n y o u ex ec u t e a ny o f
th e ac t iv it i es i n t h e s y s te ms d ev e l op m e nt l if e c y c l e ( d es c r ib e d i n t h e fo l l ow i ng
s ec t i on) a n d ar e pr e s en t an d i nt erac t i ng wi t h us ers an d th e c om p any f or an
ex t e nd e d p er i od o f t i m e as a n a na ly s t, y o u a re an a ge n t o f c h an g e (fro m tw o we ek s
to m ore th a n a y e ar ) . A n a g en t o f c h a n ge i s s om e on e wh o ac ts as a c at a ly s t f or
c ha n ge , c r e a tes a s tr at e gy fo r c h an g e, an d c o l l ab or at es w it h o th ers t o m ak e i t
(c
ha p pe n .
Y our pr es e nc e in th e c om p any h as a n i mp a c t. As a s y s te ms an a l y s t, y ou m us t be
aw ar e of t h is a n d us e i t as a be g i nn i ng po i nt f or y o ur i nv es t i g at i on . As a r es ul t,
e
fro m th e s t ar t of y o ur pr oj ec t , y ou m us t i nt er ac t wi t h us ers an d m an a ge m en t
(as s u m i ng th ey ar e n o t o ne a nd t h e s a m e). Y ou wo n' t b e a b l e t o c om pr e he n d w ha t
pe o p le n ee d to s u pp o r t t he ir w or k in th e c o mp a ny w i th o ut th e ir h e lp , a n d g e n ui n e
lin
c ha n ge w o n' t ha p pe n .
If c h a ng e a p pe ar s t o b e n ec es s ary af ter a na ly s is , th e n ex t s ta g e is t o c re at e a
c ha n ge p l a n w i th t h e pe o p le w ho w i l l be re s po ns i bl e f or pu tt i n g i t in to ac t io n . Y ou
mus t c o ns t a nt ly i nt er a c t w i th t h os e w h o ar e c h an g i ng o nc e a c o n s ens us h as b ee n
On
ac h i ev ed o n t h e c h a n ge t ha t h as to b e m a de . . Y o u pr o m ot e a c ert a in av e nu e of
c ha n ge v ia t he u t il is at i on o f in f or m a ti o n s y s te ms as a s y s te ms a n a ly s t fu nc ti o n in g
as a c h an g e a ge n t. Y o u s h ou l d a ls o tra i n us ers a bo u t th e c h an g e proc es s , b ec a us e
c ha n ges in th e i nf or m at i on s y s t e m d o n ot h ap p en in a v ac uu m ; r a th er, t h ey tr ig g er
c ha n ges t hr o ug h ou t th e b us i n es s .
Q ua lit ie s of t he S y st em s An al y st
ty
It is c le ar fr om th e a b ov e d ef i n it i ons o f t he t as k s p l ay ed by s y s te m s an a ly s ts t ha t a
go o d s y s t ems an a ly s t m us t p os s es s a d iv e rs e s e t o f at tr i bu tes . B ec a us e s y s t ems
an a ly s ts c o m e in m a n y s h ap es an d s iz es , a ny des c r i pt i o n is b o un d t o fa l l s h o rt i n
si
s om e w ay . Ho wev er , th er e ar e s o me c ha ra c ter is tic s th at mos t s y s te ms a n aly s ts
ap p ea r t o p os s es s .
Th e a n aly s t is , ab ov e al l , a pr ob l e m s o lv er . H e or s h e is a p ro b le m - s o lv er wh o
er
ap pr ec ia t es th e c ha l l en g e o f a n aly s i n g d if fic u lt i es a n d c o m in g up w it h pr ac t ic a l
ans w ers . W he n ap pr o pr ia te , t h e a n aly s t mu s t b e a b le t o a pp ly to o ls , t ec hn i q ues ,
an d ex p er i enc e to s y s te m at ic al ly a ddr es s th e s it ua t io n at h an d . T he a na ly s t mus t
a ls o be a c o m m un ic a tor wh o c a n ma i nt a i n me a ni n gf u l re l at i o ns h ips wi t h o th ers
iv
Th e s y s te ms an a ly s t mus t b e s e l f - d is c i p li n e d a nd s e lf - m ot iv at ed , wi t h th e a b i l ity t o
ma n ag e an d c oor d i na t e a l ar g e nu m b er o f p eo p l e a n d pr oj ec t r es ourc es . Sy s t ems
an a ly s is is a t ou g h p r of es s io n , b ut it is a l s o o ne th at is a l way s d ev e lo p in g an d
c ha l l en g i ng .
ity
3. 1. 6 Att ri but es of Sy st e m An al y st
A s y s t e m a na ly s t is s om e on e w h o u nd er ta k es a s y s t e ma t ic s tu dy a nd r ev ie w o f
m
nu m er ous p ar ts of c o mp a ny i n or der t o es ta b l is h d es ir ed o bj ec t iv es an d d ev is e
proc e d ures t o ac h iev e t he m .
Th e s y s te m a n a ly s t p os s es s es a un i q ue s e t o f t al e nts , i nc lu d i ng c om m o n s e ns e , a
s y s te m at ic fr a me w or k , a n d a d is c i p l in e d a p p roac h t o p ro b le m s o lv i ng . As a res u lt ,
)A
s pe ak c l e ar ly , as w e l l as h av e t h e a bi l i ty to work w i th pe o pl e a t a l l l ev els of
th e or ga n iz at i on 's m an ag e me n t.
2. Und er st and ing - A s y s te m an a ly s t s h o ul d be a b le t o rec o gn is e pr ob l ems
an d an a ly s e th e ir s ol ut i ons , h av e a fi rm gr as p of th e c om p any 's ai ms an d
obj ec t iv es , be s e ns i tiv e t o th e s y s t em ' s i m pac t o n e mp l o y ees a n d
c om pr e he n d th e ir is s u es .
3. Te ac hin g and s e ll ing id e as — A s y s t e m a na ly s t s h ou l d b e a b le t o te ac h
e
ot h er s h o w t o us e c om pu t ers , as w e l l as s e l l i de as an d pro m ot e ad v anc es i n
c om p ut er - as s is t e d pr o b le m res o lu t io n .
lin
Th e v ar io us T EC HN IC A L S KI L L S th a t a s y s t em an a ly s t s ho u ld hav e ar e :
On
1. P rob le m sol vi ng and pro j ect m ana ge m en t - A s y s t em a n aly s t s ho u l d b e
c ap a b le o f s o lv i n g pr o b le ms , c o m i ng u p w it h a lt er na t e s ol u ti o ns , s c he d u li n g,
ov er c o m in g l i m its , or ga n is in g t ea m work , a nd k e e p in g tr ac k of c os ts a n d
ac c o u nts .
2. S yst em an al y st — In fu nc t i o na l s pec i fic a ti o ns a n d g en er a l d es ig n , a s y s t e m
an a ly s t s h ou l d h av e a g r e at c o mb i n at i on of bo t h t ec h n ic a l an d no n - t ec hn ic a l
s k i l ls . H e s h ou l d a ls o hav e a c ur i o us m in d a nd a qu es ti o n in g m e nt a li ty .
ty
3. Comp ut e r e xp ert i se - A s y s te m a na ly s t s h o ul d b e f a m il i ar wi t h t h e
fu n da m en t als of c o m p ut er s as w e l l as b us i n es s ac t iv i ti es .
A gr a ph d ep ic ti n g t he i mp or ta nc e of i nt er per s on a l a n d t ec h n ic a l ab i l i t i es fo r a g o od
si
s y s te m an a ly s t d ur i ng t he s y s te m d ev e lo p me n t p h as e is s ho w n b e lo w —
er
iv
Un
ity
In a d d it i on t o t hes e p e r s on a l s k i l ls , th e s y s t e m a na ly s t s h ou l d p os s es s a ppr o pr ia te
ac a d em ic qu a l if ic at i on s i n s y s t em an a ly s is a nd des i gn or ot h er c o mp u ter - re l at e d
m
de gr e es .
s of tw ar e.
Co m pa n i es us e En t er p r is e R es o urc e P l an n i ng ( ER P) s o ft wa re to c e n tra l is e
i nf or ma t io n an d g a i n be tt er v is ib i l ity i nt o da ta . ER P s of tw ar e is a c e ntr a l is e d
e
bus i n es s m a na g em e n t s y s t em th a t i nt e gr at es a n d s tr e am l i nes al l ar eas of a
c om p any 's o pe r a t io ns , s uc h as p la n ni n g, pro c ure m e nt , s a les an d m ark e t in g , a nd s o
on . B ut w ha t go o d is hav i n g al l o f y our d a ta i n o n e p l ac e i f y o u c a n't us e i t t o g a in
lin
de e pe r i ns i g hts a n d m ak e bus i nes s dec is i on s ?
Th is is w h er e B us in e s s I nt e l li g e nc e ( BI) c om es in to p lay in an ER P. It e n ab l es
us ers to ac c es s a mas s iv e am o un t o f da t a a nd ef f ec t iv e ly an a ly s e b us in es s
proc es s i n for m at i o n i n or d er to mak e b et t er dec is i ons .
On
Wh at i s Bu sin e ss I nt el lig en c e ( BI) ?
ty
i nf or me d d ec is io ns b a s ed on r ea l - t i me da ta , w h ic h c an he l p a c om pa ny s t ay a h ea d
of t h e c om p et i ti o n."
si
c urr en t d at a i n pr ac t is e. It ai ds i n t he r e duc ti o n o f i n ef f ic ie nc ies , th e id e nt if ic at i o n
of m ark et tr e nds , a n d th e s m oo t her r un n i ng of o p era t i ons .
Wh y Bu si ne s s Int el li gen c e in E R P?
er
In E R P s y s te ms , bus i nes s i n te l l ig e nc e en ab l es a n org a n is a t io n t o ex a m in e a n d
ex p l o it h u ge da t a c a pt ur ed by th e E R P s of tw ar e. T he BI s o f tw are t ak es t he
i nf or ma t io n, an a ly s es i t, a n d pr es e nts it i n a us a b l e an d u n ders t an d ab l e s ty le .
Th e fo l l ow i ng ar e s om e of t h e m os t i m p ort a n t as p ec ts of BI :
iv
Bus in e ss In t e ll ig en c e F e at u r es
ity
Da shb oa rd s:
Th e i nt era c t iv e das h b oar ds ar e i n c h ar ge o f pr ov id i n g bus i n es s es wi t h ins i g hts t ha t
th ey h av e n ev er ha d b ef or e. T h es e das h bo ar ds g iv e d ec is i o n - m ak ers a m ore
Un
ho l is tic v ie w of t h e f ir m by a l lo w in g t he m to as s es s d a ta fr o m ma n y v i ew p o in ts w it h
j us t a f ew c l ic k s .
To n a me a f e w adv a nt ag es :
• Da ta is e as i ly ac c es s i b le a n d us ef u l.
• Pr ov id es c o m pl e te f l ex i bi l i ty for b us i nes s ex p ans i o n.
ity
•
)A
Q u ic k d at a a bs or p ti o n i nc r e as es i ns ig hts an d s p e eds u p d ec is io n - m ak in g.
• Da ta is s i mp l e t o g et a nd c om pr eh e nd .
(c
Rep or tin g:
Re p ort i ng is a s ubs e t o f B us i n es s In te l l i ge nc e t h at v is u a lis es d a ta i n t he f or m of
e
ta b les , gr ap hs , an d c har ts . BI r e p ort i ng a n a ly s es d at a m or e pre c is ely f or e as ier
c om pr e he ns io n .
Sc orec ar ds , das h bo ar ds , K PI me tr ic s , O L A P, ad hoc qu er i es , an d ot h er b us in es s
lin
rep or t in g t o o ls t ha t pr ov i d e v a l u e t o s u m mar is e t h e p as t i n c l ud e s c orec ar ds ,
das h bo ar ds , K PI m e tr i c s , O L A P, a d h oc q uer i es , a n d s o o n.
B us i n es s In t e ll i g enc e Re p or t i ng 's A dv a n ta g e s :
• Da ta qu a l ity is i mpr ov ed .
• Th e pu r c h as e pr oc e d u r e is m a de eas i er.
On
P re di cti v e An al yt i c s:
ty
ha p pe n ed an d w ha t m i gh t h ap p en in t h e fu t u re.
Pr ed ic t iv e a n a ly t ic s h a s t he f o l lo w in g a dv an t ag es :
•
•
si
Im pr ov es pa tt er n r ec o gn i t io n a nd de te rs c r i m in a l ac t iv i ty .
As s is ts b us i nes s es i n at trac t in g , r et a in i n g, a n d gro w in g t he ir c o ns u m er
bas e .
er
Bus in e ss In t e ll ig en c e T ool s an d P latf or m s
Th e s y s t ems , s o ft wa r e, an d a p ps t ha t s tr iv e t o l oc at e, r etr i ev e, an d a n a ly s e d at a
are k n ow n as bus i nes s i nt e l l ig e nc e t o o ls . T h er e ar e n u me ro us bus i n es s
iv
i nt e ll i g enc e s ol u ti o ns av a i l ab l e t o as s is t y ou d is c ov er pa tt er ns an d ge t i ns i gh ts
fro m y o ur d at a i n or d e r t o m ak e s tr a te g ic a n d tac t ic a l d ec is io ns .
Th e G art ne r M a g ic Q u adr a nt is th e p in n ac le of res e arc h i n a c e rt a in m ark e t,
prov i d i ng y o u w i th a b r oa d v ie w of t h e m ark et's r iv als . Th e a n a ly t i c s a n d b us i n es s
Un
Mi c ro soft P ow er B I :
ity
i nf or ma t io n w hi l e a ls o dr iv i n g b us in es s o utc o mes .
M ic ros o ft BI is av a i l a b le as a c l ou d - b as e d Sa a S s o lu t i o n o r as an on - pr e m is e
s o lu t io n i n P o wer BI R ep or t S er v e r.
)A
Ac c ord i n g t o t he G ar tn er r es e ar c h, d ec o m pos i t io n tr e e gr a ph ic s , L i nk e dI n da t a
c on n ec t iv ity , a n d g eo gr a ph ic m a pp i n g en h anc e m en ts ar e am o ng th e n ew
c ap a b il i t ies a d d ed t o M ic r os o ft B I rec e nt ly .
(c
Tab le au :
Ta bl e a u's g oa l is t o pr ov id e a s im p l e , dy n a m ic , v is u a l - ba s ed ex p l or at i on
e
ex p er i enc e t ha t a ll o w s b us in es s us ers to ac c es s , pr ep ar e, a n a l y s e, a n d pres e nt
da t a r es u l ts w it ho u t r eq u ir i ng a ny t ec h n ic a l k no w le d ge or s c r i pt i ng . Ta b le a u's
s of tw ar e is m os t ly us ed o n- pr e m is es . I t c a n b e us e d as a s t an d - a l o ne d es k t op
lin
ap p l ic a t io n or as pa r t of a c on te n t s har i n g s erv e r.
• Des k to p v er s i o n of T a b le a u ( for any o ne)
• Ta bl e a u S er v er ( an a ly tic s f or b us in es s es ), w h ic h is i ns t a ll e d l oc al l y .
• O n l in e Ta b l ea u ( h os t e d a na ly tic s f or or g an iz at i ons ) .
On
Ta bl e a u O n l in e is a c l ou d - b as e d s o ft war e a s a s erv ic e ( S aa S) pr od uc t. Ac c or d i ng
to T a bl e au 's c us to m e r r ep or t, t h e c o mp a n y 's ov er a l l rev e nu e i nc re as e d by 1 4
perc e nt fro m th e f ir s t s ix m o nt hs of 20 1 8 t o th e f irs t s ix m on t hs o f 2 0 1 9, br in g i ng i t
to s li g ht ly ov er $ 9 00 m il l i o n.
Q li k Vi ew :
ty
In t h e Ma g ic Q u a dr an t 20 2 0, Q l ik is t he c le ar l ea d er. V is u a l iz a t io ns , d as hb o ar ds ,
an d ap ps ar e a l l pos s i b le w it h t h is t ec hn o l o gy . Q l ik V i ew a ls o h as s om e i nt er es t i ng
fe at ur es , s uc h as :
fl ex i bl e .
si
S i mp l e dr a g - an d- dr op in t er f ac es f or c r ea t in g dy n am ic d at a v is u a l is at i ons th a t ar e
SA S:
th at a ll o ws us er s t o m an i p ul a te da t a a nd a n a ly t ic s i n ord er t o mak e b et te r b us in es s
dec is i ons . S A S' s o p h is t ic at ed pr e d ic t iv e an a ly s is is o ne o f i ts mos t po p u lar
fe at ur es . S A S V iy a a l s o h as V is ua l An a ly t i c s . S A S V is ua l An a ly tic s is g en er a lly
us e d on - pr e m is es , b u t i t is a ls o av a i l ab l e i n t h e c l o ud a n d t hro u gh o th er hos t in g
c ho ic es .
m
c ap a b il i t ies o f V is u al A na ly tic s an d re l e as e d a n e w SD K .
e
me a n in g fu l k n ow l e dg e us i ng BI in te gr at e d E RP s of tw ar e.
To b et te r gr as p t h e be ne f its , l et's lo ok a t In 4 S ui t e® , a B I i nt e gr at e d E R P s of tw ar e.
(a) C us to m iz ab l e Re p or t G en er at i on
lin
Th e c r e at i o n of r ep or ts is t he f irs t s t e p i n t he da ta pr oc e s s i ng proc es s . It
rep res e nts da ta i n m u lt i p le l ev e ls of i nt erac t iv ity , i nc l ud i ng dr i l l - d o wn , s or t in g, a nd
fi l ter i n g c h o ic es . T h e r e a r e a ls o s o m e ex t ra o p t io ns t h at a l lo w th e en d - us e r t o
ta i l or th e d at a f or d e e per ins i g hts .
On
(b) I nt er ac t iv e D as h b oar d Cr e at i on
W ha t's t he s t at us o f y our le a ds th is m o nt h ? Hav e y o u no t ic e d a d e c reas e i n s a l es ?
If t h at's t he c as e, w h y di d it fa l l ? A ll of t h es e q ues t io ns s ho u l d be a ns w er ed by
y ou .
In 4 Su i te ® c a n d ev e lo p i nt er ac t iv e d as hb o ard s th at c a n be c us t o m i s ed ac c or di n g t o
th e n e eds of t h e us er . T he s of tw ar e of f ers a dr a g - an d- dro p f e at ur e t ha t i nc r eas es
y our c om p any 's o per at i on a l a nd c os t e ff ic ie n c i es .
ty
(c ) R e al- T im e L o ok At Th e Da ta
Th e n ic es t p ar t a b o ut B I s o ft war e t ha t's in te g r at ed wi t h an ER P s y s t em is th a t
dec is i ons .
si
ma n ag ers c an s e e d at a i n r e a l t i me , wh i c h m ak es it eas i er f or t he m t o m ak e
Co ns id er t he c as e o f a p iec e o f s of tw ar e l ik e In 4 S ui t e® . If t he C E O w an ts t o k no w
ho w m any le a ds wer e c r e at e d th is m o nt h, he c a n g o s tra i g ht t o t he d as hb o ar d ,
er
wh ic h d is pl ay s t h e m on t hly c us t o mer c ou nt , ex p l a na t io n p o i nts , l ea d a g e in g, le a d
i nt eres t i n pr oj ec t - w is e a na ly s is , an d ov er a l l l e ad c onv ers io n . T h i s i n for m at i on wi l l
a id in th e id e nt if ic at i on of pa tt er ns a n d p ot e nt i al for pr oc es s i mp rov e me n t i n a
l on g- t er m r es e ar c h .
iv
(d) M ov in g B ey on d El e me n tar y R e po rt i ng
A no th er ar ea w her e BI s of tw ar e c a n hav e a t rans f orm a tiv e ef f ec t o n t h e b us in es s is
Un
( e) C os t R ed uc ti o n
Th ere ar e c os ts c o nn ec t e d w it h th e o per a ti on a n d i ns ta l l at i on o f BI , bu t t h e r et ur n
on i nv es t m en t is s u ff ic ie n t t o j us t ify th e i nv es t me nt . D a ta c o ll ec ti n g, r e po rt
ge n er at i ng , pr ogr a m mi ng , a nd I T tra i n in g ex p en d it ur es ar e a l l r e duc ed .
m
(f) M in i m iz es T h e R is k
Na tur a l ly , any or g a n i s at i on en t ai ls s om e r is k , bu t B I re p ort i n g to o ls c a n as s is t
m it i ga te t h os e r is k s . Th e B I tec h n ol o g ies ac c o mp l is h th is by g iv i n g r e al - t i me ,
hy p er - ac c ur a t e r ep or t s a nd as s is t in g e nt er pr is es in f u lly c om pr e he n d in g t he d at a .
)A
In t h e en d , it ai ds i n t he el i m i na t io n o f th e n ee d f or g ues s w ork .
Futu re of Bu si ne s s I nt e lli ge nc e
W h il e w e s p ec u l at e o n t he f ut ur e o f B I, i t is c rit ic a l to r em e m ber t h a t t h e s c o pe of
B us i n es s In t e ll i g enc e s of tw ar e is c o nt i n ua l ly ex p an d in g . In t h e ne a r f ut ur e, BI t oo ls
(c
e
ab l e t o ha n d le a b ig v o lu m e of d a ta an d w i ll be ab l e to s up p ort b us i nes s
i nt e ll i g enc e s y s t ems b et ter .
lin
3. 1. 8 S A P, O RA CL E, BA AN , P EO PL E SO F T, M IC RO SO FT and G O O G LE rol e in
ER P /B us in es s Int e ll i gent Sy st em
SA P
On
W ha t d oes t h e ac r ony m S A P s t an d f or?
W he n tr ans l at e d, t he or i gi n a l na m e f or S A P is Sy s te m A n aly s is an d Pr o gr am
Dev e lo p m en t, a nd i t i s i n it i at ed as S A P . Be c aus e S A P is an i n it i a l ra t her t ha n a n
ac ro ny m, it is pr on o u nc e d as in d iv id u a l l et t ers r a th er t ha n as t h e w or d " s ap ." Th e
" S E" i n S A P SE r e f er s t o S oc ie t as E ur op a ea , w hic h is an a l og o us to I nc . i n th e
Un i te d S ta t es .
ty
S A P S E is a m ul t in a ti on a l s o ft war e c o m pa n y t ha t is a mark e t l ea der in t h e f ie l d of
en t erpr is e r es our c e p l an n i ng ( ER P) . T he c o mp a ny no w h as c us t o me rs in ov er 1 80
c ou n tri es , w it h t he m aj or i ty of th e m b ei n g s m a l l a nd me d i um - s iz ed bus i nes s es
(S M B). S A P d at a c e ntr es pr ov i de o n - pr e m is es , c l o ud , a n d h y br id de p l oy m e nt
si
mo d e ls , w it h c lo u d c o mp u ti n g p os s ib i l it i es b e in g a f oc us f or t h e c o mp a ny 's f ut ur e.
W ha t ex ac t ly is S A P E RP ( en t er pr is e res o urc e p la n n in g) ?
er
S A P S E is a le a d in g pr ov i d er o f e nt er pr is e res o urc e p la n n in g ( E RP ) s of tw ar e a n d
re la te d b us in es s s o lu ti o ns . C us t o mers c a n us e t h e c om p any 's ER P s y s t e m t o
ha n d le a l l o f t he ir bu s i nes s pr oc es s es in o ne p lac e , i nc l ud i ng a c c ou n ti n g, s a les ,
pro d uc t i o n, h u m an r es our c es , a nd f in a nc e . I t's a ls o re g ard e d as t he fo u nd a ti o n o f
iv
S A P's s o ft war e s o l ut i o ns .
Th e i nt erf ac e h e lps i mp os e f in a nc ia l , pr oc ed ur a l, a n d l e ga l c o n tro ls by ens ur i ng
th at i n for m at i o n f l ows fr o m o n e S A P c o m p on e nt t o an ot h er wi t h ou t th e n ee d for
red u n da nt d a ta e ntr y . It a ls o m ak es i t e as i er to m ak e th e m os t us e o f r es ourc es
Un
l ik e la b ou r , m ac hi n es , an d pr o duc t io n c a p ac i t y .
S A P E R P s o ft war e i s m a de up of s ev er a l k ey m o du l es t ha t ar e d iv i de d in to
fu nc t i o n a l a nd t ec h n i c a l c a te g or ies . T h e f o ll o wi n g are s o m e o f S A P's fu nc ti o na l
mo d u les :
•
ity
Hu m an C a p it a l M an a g em e nt ( S A P HC M)
• Pr od uc ti o n P l an n i ng ( S A P P P)
• Ma t er ia ls M a na g e me nt ( S A P MM)
• Pr oj ec t Sy s te m ( SA P P S)
m
• S al es a n d D is tr i bu t io n ( S A P SD)
• P la n t M ai n te n anc e ( S A P P M)
)A
• Fi na nc e a nd c on tr o l l i n g ( S A P FI CO )
• Q u al i ty M an a ge m e nt ( S A P Q M)
Th e S A P E R P s of tw ar e s y s te m , a ls o k n o wn as S A P E R P Ce n tra l C om p on e nt ( S A P
EC C) , is t he u m br el l a ter m f or S A P's f u nc t i o na l a n d tec h no l o g ic a l c om p on e nts t h at
(c
a ll o w bus i n es s es t o m an a ge t h e ir b us i n es s p roc es s es t hr ou g h a s i n g le s y s t e m.
EC C is S A P's o n - p r e m is es v er s io n , wh ic h is ty p ic a lly us e d i n m e di um - an d l ar g e -
s iz ed b us i nes s es . S A P 's Bus i n es s O n e E RP pro d uc t is d es i g ne d f o r s m a l l
bus i n es s es .
e
lin
On
ty
si
Th is d ia gr a m d ep ic ts S A P's f unc t io n a l an d t ec h n o lo g ic a l mo d ul es .
Wh at i s th e SA P E R P sy st em a nd how do e s it w or k?
iv
A t hr ee- t ie r , c l ie nt - s er v e r d es ig n is c o m mo n f or S A P E R P s y s t e ms . T h is
c on f ig ur at i o n i s pr e fer r ed s i nc e it a l lo ws f or gr ea ter f l ex i b i l ity a nd s c a la b i l ity . T he
pres e nt at i o n t i er , a pp l ic at i on t ier , an d da t a bas e ti er ar e t h e t hr e e lev e ls us e d by
S A P E R P s of tw ar e.
Un
Th e pres e nt at i o n ti er de l iv er s th e S A P gr a p h ic a l us er i nt er fac e t o th e us er ( S A P
G UI) . Th e S A P G U I c an be ins t al l e d on e it her a M ic r os o ft W i nd o ws or a M ac
c om p ut er . T he S A P G UI s er v es as a p o in t of c o nt ac t b et w ee n us ers an d th e S A P
ER P s y s t e m.
ity
W he n t h e a p pl ic at i o n a n d pr es e n ta t io n ti ers c ol l a bor a te , t he a p p l ic a t io n t i er
rec e iv es t h e d at a a n d s en ds it t o t h e pr es en t at i on t ier . Th e ou t pu t wi l l be d is p l ay e d
i n t he S A P G UI d ur i ng t he pr es e n ta t io n. Af t er t h at, t he d at a is s av e d in t he
)A
da t ab as e ti er .
A d is pa tc her an d n u m er o us w or k pr oc ed ur e s ar e pr es en t i n e ac h i ns ta nc e. T as k s
are as s i gn e d t o o ne of t h e w ork pr oc es s es by th e d is p atc he r. D if fe re nt work
proc es s es ar e av a i la b l e i n th e S A P E RP s y s te m to c orr es po n d t o v a ri o us t as k s .
Th e fo l l ow i ng ar e ex a mp l es o f work proc es s es :
e
• W or k f l ows f or m a na g i n g us er r e qu es ts f or o n l i ne tr a ns ac t io ns v i a d i a lo g ue ;
• W or k pr oc es s es t ha t c on d uc t d a ta b a s e u p d at es ar e up d at e d;
lin
• s po o l w or k pr oc es s es , w h ic h a l l ow t h e S A P s y s te m t o pr in t;
• ba tc h wor k pr oc es s es , wh ic h h an d l e any b ac k gr o u nd j o bs t ha t hav e b e en
s c he d u le d i n t he s y s t e m; a n d
• W or k pr oc e du r es t ha t a l lo w ap p l ic a t io ns to c o mm u n ic a te w it h o n e an ot h er,
s uc h as S A P R/ 3 a n d S A P R/ 2.
On
W h il e t h e S A P ER P s y s te m c a n h av e m u lt i p l e a pp l ic at i o n i ns t a nc e s , o ne par t ic u l ar,
c ore i ns t a nc e m us t al way s be pr es e nt ( CI) . Th e m es s ag e pr oc es s an d t h e e n qu e uer
s erv e r ar e th e tw o p ar ts of t he C I. Th e mes s a gi n g proc es s es t ab l i s hes
c om m u nic a ti o n b et w e en th e S AP s y s te m's a p p lic a t io n i ns ta nc e s . T h e e n qu e uer
s erv e r is i n c h ar ge o f da t ab as e ta b le loc k s .
ty
Th e S A P E R P s y s te m is m ad e u p o f v ar io us ap p l ic a t io n m o du l es i n a d di t io n t o th is
bre ak d ow n. E ac h mo d u le is m e an t to h o us e S A P ap p l i c a t io n a pp l ic at i ons as w e ll as
s pec i a l is e d b us in es s d at a f or a c er ta i n i nd us try .
O r ac le B us in es s Int e l lig en c e S er v e r
si
er
iv
Un
c om p l em e nt of ac c es s , a na ly s is , a nd i nf or ma t io n dis s e m in a ti o n c ho ic es . E ac h of
th es e c o mp o ne nts c at er s t o d if fer e nt au d ie n c es i ns id e t he c o mp a n y , eac h o f w ho m
has a v ar ie d ap p et it e f or th e s am e un d er l y i ng d at a b ut r e q uir e s dis t inc t ac c es s
me t ho ds .
)A
Un l ik e ot her BI t oo ls , ho w ev er , a ll o f th e c o mp o ne n ts are i n te gr at ed i n to a s i n g le
arc h i tec t ur e , r es u lt i ng i n a s e am l es s a nd s tr a i gh tf orw ar d us er ex pe r i enc e.
ty
is b as e d o n a p ur e W eb ar c h i tec t ure . Dr i ll i ng , ex p lor i n g, a l ter i n g , an d i n ter ac ti n g
wi t h t h es e f i nd i n gs a r e al l av a i la b l e t o th e us er . O r ac l e BI I nt e l li ge nc e Das h bo ar ds
c an a ls o pu l l d at a fr o m th e I nt er n et , s h ar ed fi l e s erv er s , an d d oc u me nt
rep os it or i es .
us er s el f - s uf f ic i e nc y i n a c o m p le te ly s af e a nd c o ntr o l l ed IT env ir o n me n t.
O r ac le B us in es s Int e l lig en c e De li v er s
m
)A
(c
O rac le BI D e l iv e r s is a pr o ac t iv e i nt e l l ig e nc e s ol u ti o n th a t m o n it ors a nd al er ts
us ers o n b us i nes s ac t iv it i es ac ros s a v ar ie ty o f c ha n ne ls , inc l u d in g em a i l,
das h bo ar ds , a n d mo b i l e d ev ic es . O rac l e B I De l iv ers fe a tur e s a s e lf - s erv ic e a l ert
c rea t io n a n d s u bs c r ip ti o n i nt er fac e t ha t is ac c es s ib l e v i a t he W eb . Th is n ex t -
ge n er at i on s o l u ti o n m ay s ta r t a mu l tis t ep , mu l t ip ers on , m u lt i a pp l ic at i on an a ly t ic a l
e
work f lo w a n d f e ed c o nt ex t u a l i nf or m at i on t o o th er a ler ts . It c a n a ls o d y n a m ic a l ly
c ho os e r ec i pi e nts a n d c us to m is ed c o n te nt t o e ns ur e t ha t th e c orr ec t us ers rec e iv e
th e r i g ht i n for m at i o n a t t h e r i g ht t i me .
lin
O r ac le B us in es s Int e l lig en c e Pub li sh e r
On
ty
O rac le B I P u bl is h er ( p r ev io us ly k n ow n as X ML P ub l is h er) is a s c a l ab l e a n d ef f ic i e nt
rep or t in g s o l ut i on f or c om p l ex a nd dis tr i bu t ed s y s t e ms . I t es ta b l i s hes a c e ntr a l is e d
si
i nfr as tr uc tur e f or s ec ur e ly c r ea t in g a n d tr ans m it t in g in f orm a ti o n t o e mp l oy ees ,
c us t o mers , a n d b us in es s p ar t n er s . M ic ros o ft Wo rd or A d ob e Ac r ob a t c a n b e us e d
to c r ea t e O r ac l e BI P u b lis h er r e p ort for m ats , w h ic h m os t us ers ar e alr e a dy f am i l i ar
wi t h. Yo u m ay a ls o us e O r ac l e B I P u bl is h er to c o m b in e d at a fr o m s ev er a l s o urc es
er
i nt o a s i n g le o ut p ut d oc u m en t. R ep or ts c a n be pr i nt e d, e ma i l ed , fax e d, s en t ov er
W eb D av , or p ub l is he d to a p or ta l . O r ac le BI P u bl is h er c an b e us e d in d e pe n de nt ly
or i n c o nj unc t io n w i th O r ac l e Bu s i n es s I nt e l l ig e nc e S ui t e E nt er pr is e E d it i on P l us .
O rac le B I P u b lis h er mak es us e of c o mm o n d as h b oar d i ng , m e ta d at a, s ec ur i ty ,
iv
c om p ut at i o n, c ac h i n g, an d in te l l i ge n t re q ue s t g en er at i o n s erv ic es w h en ut i l is ed as
par t o f th e s u it e .
Un
G O O G L E:
B us i n es s i nt e l li g enc e ( BI ) is th e ac t o f c o l l ec t i ng a n d an a ly s in g da t a f or us e by
org a n is a t io ns i n t h e ir s tr at e gi c a nd ev ery d ay d ec is io n - m ak in g p roc es s es ,
l ev er a g in g t he c o m b in ed po w e r of p e op l e a n d tec h no l o gy .
of y o ur c o m pa ny 's da t a.
Bus in e ss in t e ll ig en c e o v e rv ie w
Ty p ic a l ly , th e b us i ne s s i n te l l i ge nc e pr oc e s s is c o ll ec ti n g f ir m da t a i nt o a d a ta
m
war e ho us e or eq u iv a l en t r ep os i tory , t h e n a na ly s i ng t he d a ta w it h a pr op er ly bu i l t
to o l. A c or p or a t io n m i gh t, f or ex a m pl e , ex am i n e c l i en t o n l in e b uy in g b e hav i o ur,
op er at i o na l ex p en d it ur es , or r eg i on a l s a l es d at a. An o th er c o m pa ny c an c o m p are its
bus i n es s op e r at i o ns to i n dus tr y b e nc h m ark s .
)A
e
s ti l l n ec es s i t at e a c er t a in lev e l of un d e rs t a n d in g a nd ma n ua l c o d i n g to be e ff ec tiv e .
Cl o ud - b as ed : C l ou d - bas e d b us i nes s i nt e l l ig e nc e s o lu t io ns e x c e l a t h a nd l i ng
lin
s tre a m in g d at a a n d e nor m o us a mo u nts of i nf or ma t io n . T h ey c a n a ls o s av e mo n ey
bec a us e t he c l ou d v en dor t ak es c ar e o f t he i nfr as t ruc tur e a n d k no wl e dg e ne e de d to
k ee p t he env ir o nm e nt r un n i ng .
MI CRO S O FT
On
M ic ros o ft's bus i nes s i nt e l li g enc e ( BI) p ro d u c ts as s is t f ir ms i n tr ans f orm i n g d at a
i nt o s o ph is t ic a te d , e a s y - to- u nd er s ta n d r e pr es e n ta t io ns t ha t ar e s ho w n wh er ev er
dec is i ons ar e m ad e. O r g an iz at i o ns m ay us e th es e s o l ut i ons to dev e l op am as s i ng
da t a- ex p l or a t io n ex p er i enc es t h at lo ok an d a c t l ik e t he ot h er M ic r o s of t t ec h n o lo g ies
th ey us e on a d a i ly b as is , al l ow i n g t he m t o g e t u p a n d ru n n in g q u ic k ly . T hey m ay
a ls o us e t h e l i br a r y of d at a c o n ne c t ors t o c on n ec t t o m aj or c l o ud a n d o n - pr e m is es
ty
s ourc es i nc lu d i ng Ex c e l, S har e P o in t, Az ur e SQ L D at a bas e , Dy na m ic s 36 5 , a n d
S al es forc e , as we l l as dev e l op n e w o nes .
Pot ent ia l B en ef it s of BI S e r vi ce s
si
Thr ou g h b u il t - in au t o ma t io n a n d i nt e l l ig e n c e, M ic r os of t's B I s o l ut i ons mak e i t
s i mp l e f or b us i n es s es to pr ep ar e an d mo d e l da t a. T h ey may l ev e r ag e hu n dr eds of
er
da t a v is ua l is at i ons , A I - po w er e d f e at ur es , a n d br an d i ng op t io ns t o mak e t h ei r r e por t
mo re us er - fr i e nd ly . T he IT g ia nt 's BI s o lu t i ons pr ov id e s op h is t ic at e d, s e lf - s erv ic e
an a ly t ic a l an d en t er pr is e BI to o ls to ev ery o ne i n a n or g an iz a ti o n —fr o m bus i nes s
an a ly s ts a nd B I s p ec i a lis ts t o b us i nes s us ers — t o h e lp th e m m a k e b et t er, f as ter
dec is i ons .
iv
A no th er a dv an t ag e o f M ic r os o ft's BI s o l ut i o n is t h at d at a ac c ur ac y an d s ec ur ity c a n
be m ai n ta i ne d . Its bus i nes s in t e ll i g enc e s o l u ti o ns w ork w it h a n org an iz at i o n's m os t
Un
v a lu a bl e bus i n es s d at a, wh ic h n ec es s it at es a h i gh l ev el of s ec u rity a nd pr iv ac y .
W h il e em p l oy in g na t io na l c l ou ds t o m ee t loc a l res tr ic t i ons o n s erv i c e d e l iv ery , da ta
res id e nc y , ac c es s , an d c o ntr o l, us ers m ay be tt er s a fe g ua rd t h e i r d at a s o t ha t i t
me e ts i nd us t r y c o mp l i anc e s t an d ar ds an d c e rti f ic a t io ns .
Si gnif i ca nt BI t oo ls
ity
e
Circ u it I D, Az ur e Mo b i l e M an a ge m en t, Ma i lc h i mp , M S Ex c e l, an d o t hers .
lin
us e d by a ny on e , i nc l ud i ng Mar k e ti n g, Sa l es , a n d ot h er r e la t ed de p art m en ts .
A dd i ti o n al ly , M ic r os o ft 's t o ols ar e qu i te c os t - ef fec t iv e .
On
P EO PL E SO F T
ty
d irec t ly t o b us in es s pr oc es s es , re m ov in g i nt er na l a n d ex t er n a l in t erm e d iar i es ,
i nc re as i ng pr o d uc t iv ity , an d l o wer i n g ex p e ns es .
si
to o lk it i n to y our en t ir e b us in es s . It c a n h e l p y ou ma n ag e h u ma n re s ourc e ac t iv it i es ,
s tre n gt he n c us t o mer r e la t io ns hi ps , a n d s i m p li fy n arr at iv e r ep or ti n g. Y ou c a n ev e n
pro gr a mm e i t t o up d at e i ts e l f ac c or d i ng t o y our s c he d u le .
er
W ha t is P e o pl e S of t E RP , ex ac t ly ? It's a s et o f ap p l ic a t io ns c re a te d s pec i f ic a l ly f or
to d ay 's e nt er pr is es . P eo p l e So ft is a c o mp l e te s o ft w are pac k a ge f ro m O r ac l e th at
i nc l u des u n iq u e t oo ls an d ap p l ic a t io ns f or g en er a l c o m pa ny us e , s uc h as ma te ri a ls ,
pay r o l l, an d c o m mu n i c at i on ma n ag e m en t. Th is wo rk f orc e ma n a ge m en t s o l ut i on ,
iv
Wh at Do e s P eop le S of t D o ?
Un
P eo p l eS o ft pr ov i d es y ou wi t h a l l o f t he t o ols y o u' l l n ee d t o e ff ic ie n tl y a nd
ef fec t iv e ly m a na g e y o ur mos t i mp or ta n t b us i nes s t as k s . Th e P eo p l eS o ft s y s t em is
us er - fr i en d ly , a l lo w in g y ou to s e lec t t h e t oo l s y ou th i nk y o u' l l ne e d a n d o pt o ut of
th e res t. O n a dd i t io n, P eo p l eS o ft s t or es d at a i n t he c l ou d. As a r e s u lt , y o u' ll nev er
l os e s i g ht o f i m por ta n t ac t iv it i es or s e ns i t iv e i nf or ma t io n a ga i n. Y ou c a n a ls o us e
th is s erv ic e t o tr a ns fer d a ta t hr ou g h ou t y our c om p any , m a na ge r ep or ts , a n d
ity
dev e l op c us t om er r e l a t i o ns h i ps .
P eo p l eS o ft H u m an Ca p it a l M a na g em e nt ( HC M), for ex am p l e, al l o w s y ou to ma n a ge
te a m m em b er s , ap pr o v e pr o mo t io ns , c h an g e e mp l oy ee pe rs o n al i nf or ma t io n, an d
ex a m i ne p ay s t ubs , a mo n g o th er HR du t ies . Its an a ly tic s s of tw ar e a ls o a l l ows y ou
m
to ev a l ua te per s o nn e l an d or g an is at i o na l d at a.
)A
(c
P eo p l eS o ft HC M is e x tr e m e ly ad a pt ab l e. I t c a n be us e d to a l mo s t a ny s ec tor o r
s it u at i on . M or e im p or ta nt ly , its d iv ers e s u i te o f ap ps i nc l ud es i nd us try - s p ec if ic
e
c ap a b il i t ies an d o ff er s u nr iv a ll e d f l ex i b i l ity f or i m pr ov i n g c or p ora t e o pe ra t io ns a n d
c om p et i tiv e n es s .
lin
Y ou c a n tr ac k , ma n a ge , a nd a d m in is tr at e t as k s for y o ur w h ol e work f orc e w i th
P eo p l eS o ft , i nc l ud i ng em p l oy e es , m a na g ers , c on t in g en t w ork ers , s tu d en t w ork ers ,
c on tr ac t ors , a nd fac u lt y . Y o u m ay als o us e P eo p l eS o ft t o c ons tr u c t C lo u d c lus ters ,
l ev er a ge y o ur d at a i n ap p l ic a t io ns , a nd m i gra t e a n d t es t y ou r i nn ov at i ons t o t he
Cl o ud .
On
Wh at do es Pe opl e Sof t E R P O f f e r You?
P eo p l eS o ft is us e d by te ns o f t ho us an ds of c om p an i es a ro u nd th e wor l d. Ac c ord i n g
to O r ac l e's w e bs i t e, ar o u nd 3 0, 00 0 pe op l e u t i li s e it . Pe o p le S of t n o t o n ly
au t om at es , m o n it or s , a n d tr a c k s b us i nes s pr oc es s es , b ut i t a ls o s tr ea m l in es ,
ty
mo n it ors , a n d tr ac k s th e m. I t a ls o k e e ps t rac k o f p ers on n e l d at a, de p art m en ts ,
tas k s , a nd p er k s . Pe op l e S oft h as a s u bs t an t ia l pres e nc e i n n um er o us ar eas ,
i nc l u d in g h ea l thc ar e, pu b l ic s ec t ors , ed uc a ti o n , res e arc h , a nd p rof es s io n a l an d
fi n anc i a l s er v ic es , a n d is w e l l - s ui t ed f or s o lv i ng H u m an C a p it a l M an ag e me n t ( HC M)
si
an d E n ter pr is e Res o ur c e M an a ge m en t (E R P) d e ma n ds .
P eo p l eS o ft i nc l u d es a nu m be r o f im p ort a nt bus i n es s a p pl ic at i o ns , w h ic h ar e l is t e d
be l ow . T h es e pr o gr a m mes c a n as s is t y o u in g a in i n g a d is ti nc t c o mp e ti t iv e
er
adv a nt a ge .
th e m t o b e a p p li e d. E v er y t en we ek s or s o , t h ere w il l b e a ne w u pd a te . Wi t hi n
y our par a m et er s , t h e a p pl ic at i o n a ls o a l l o ws y ou t o k e e p pr im ary s tr at eg ic
adj us t m e nts .
• P eo p l eS o ft A pp l ic at i o n En g i ne – Cr ea te , tes t, a nd d e pl oy on l i ne b atc h
Un
pro gr a mm es t h at r eq u i r e h i gh - v o l um e b ac k gr ou n d pr oc es s i n g w it h t h is s of tw ar e.
Th e e n gi n e, l ik e CO BO L a p p lic a ti o ns , d e l iv ers m or e e ff ic i en t up d at es t h an
CO BO L , t h ank s t o a da t ab as e t ha t c o nt a i n s a l l of t h e i nf or m at i o n n ee d e d fo r
up d at i ng .
• P eo p l eS o ft D ep l oy me nt Fr am e work —T h is t oo l a l l ows y o u t o m o v e d at a fro m
P eo p l eS o ft D ev e l op m en t an d Tes t in g to t h e O r ac le C l ou d a nd tr ans f er da ta t o
v irt u a l s y s te ms o n t he O r ac le C l o ud .
ity
• P eo p l eTo o ls – T h is s of tw ar e is w h at m a k es Pe o p le S of t w h at it is . I t is a
po w erf u l ap p l ic at i on dev e l op m en t to o l t ha t al l o ws y ou t o a da pt Pe o pl e S of t
obj ec ts t o ma tc h y ou r s p ec if ic b us i n es s r eq u ir em e nts . P eo p l e To ols is a ls o
c ap a b le of i nt eg r a t i ng w it h P e op l e S of t Bus i n es s O bj ec ts as a " bo l t- o n"
ap p l ic a t io n .
• O rac le C l ou d P eo p l e S of t – Th is pr og ra m m e a l l ows y o u t o ac c e s s P eo p l e So ft
m
pro d uc ts ov er t h e c l o ud . Yo u c an a ls o us e th is ap p t o l au nc h o th er Pe o p le S of t
ap p l ic a t io ns , s uc h as P e op l e S of t HC M a nd o th er t oo ls y o u us e on a r eg u l ar
bas is , fr o m a s in g l e l o c at i on .
)A
e
Fil l Up s :
1) …… … …… … . m e ans a s tr uc tu re d l i nk b et we e n gr ou ps o f c o mp o ne n ts
lin
2) A s y s t em c on ta i ns a _ __ w h ic h is p l an n ed t o re ac h a s p ec if ic g oa l .
3) …… … …… … is t he m aj or g oa l o f a Sy s t em A na ly s is a n d Des i g n
4) Th er e ar e … … …. p has es in S AD
5) A n __ _ is a d et a il e d s t udy ab o ut a p ar t ic u l ar pro b l em .
On
Tru e/ Fa l se :
ty
4) Sy s t e m a na ly s is is a p r oc es s w h ic h is d o ne on t h e ex is t i ng mo d e l or th e n ew ly
c rea t ed mo d el
5) Str a te g ic I nf or ma t io n i s a c a t eg ory o f i nf or m at i on s y s t e m
Su mm ar y
si
er
• Sy s t e m a n aly s is is a me t ho d o f o bs e r v i n g a s y s te m in ord er t o i nv es t ig a te or
en h anc e i t. I t is us e d i n t he f i e ld o f i nf or m at i on t ec hn o l ogy , wh e re c o mp u ter -
bas e d s y s t e ms m us t be d es c r ib e d in or de r to b e ex a mi n e d b a s ed o n t h eir
s truc tu r e a n d d es i g n.
iv
• Sy s t e ms an a ly s is in th e I nf or m at i on Tec h no l o gy d o ma i n mi g ht i nc l ud e l ook i n g a t
en d- us er us a ge o f a p r od uc t b u nd l e or it e m, as w e l l as l o ok in g at s ou rc e c o de
fro m t op t o b ot t om t o c har ac ter is e t he s y s t e ms us ed in p ro gr am m i ng .
• Ex per ts i n s y s t e m a na ly s is ar e f re q ue nt l y c a l le d u po n to ex a m in e s y s te ms
Un
c r it ic a l ly a nd r ec o m me nd nec es s ary a dj us tm en ts . Sy s t e ms a na ly s i s is us e d b ot h
i ns i d e a nd ou ts id e t he bus i nes s wor l d t o d et er mi n e w he th er a s y s t e m is
pos s i b le or e ff ec t iv e wi t hi n t h e c on t ex t o f its ov er a l l d es ig n a n d t o s h ow t h e
op t io ns av a i la b l e to t h e e mp l o y in g i n dus try o r a n ot he r pa rty .
• As a res u lt , s y s t em an a ly s is is u n iq u e to s y s te m o ff ic i als , w ho ma i nt a in s y s t e ms
on a d a i ly b as is , an d t he ir j obs ty p ic a l ly e nt a il a h i g h - lev e l v i e w o n a s y s t e m in
ord er t o d et er m in e i ts ge n er al v ia b i l ity i n ac c ord a nc e wi t h its pl a n.
ity
• Th e S of tw ar e D ev e l o p me n t L if e Cy c l e ( S DL C) is a fra m ew ork t ha t l ay s o ut t h e
s te ps i nv olv e d i n s o ft war e d ev el o p me nt at e ac h s ta g e. I t c o nt a i ns a pr ec is e
b lu e pr in t for dev e l op i n g, d e p loy i ng , a nd s us t a in i ng s of tw ar e.
• Th e S of tw ar e Dev e lo p me n t L if e Cy c le ( SD L C) des c r i b es th e e nt ir e dev e l op m en t
proc es s , i nc l u d in g a l l pr oc es s es i nv o lv e d i n des i g ni n g, d ev e lo p in g , t es t i ng , a nd
m
de p l oy i n g a s o ft war e p r od uc t.
• Th e S of tw ar e D ev e l o pm e nt L if e Cy c le ( S D LC) is a me t ho d t ha t s p ec if i es t h e
ma ny s te ps r eq u ir ed i n s o ft w are d ev e l o pm e nt i n o rd er t o c r e at e a h i g h - q u a li ty
res u l t. SD LC s t a ges e nc o m pas s t h e en t ir e l i fe c y c l e o f a s of tw ar e pro d uc t , fro m
)A
c onc e pt i on t hr o ug h r e t ir em e nt .
• Th e r eq u ir em e nts ac qu ir e d in t h e SR S d oc u m en t ar e us e d as i np u t in t h is
ph as e, a nd th e s of tw a r e a r c h i tec tu re r e qu ir e d t o im p l em e nt s y s te m dev e l op m en t
is d er iv e d .
• W he n th e d ev e l op er r ec e iv es th e Des i gn d oc u m en t, t he i m p le m e nt at i o n/c od i n g
proc es s b eg i ns . S o ur c e c o d e is c r ea te d fr om t he s o ft war e des i gn . D ur i ng t his
(c
ph as e, a l l o f th e s o ft w ar e 's c o mp o ne n ts are i mp l e me nt e d.
• W he n th e c od i ng is f i n is h e d a n d t he m o du l es ar e av a i l a bl e for t es t i ng , t es ti n g
be g i ns . T he g e ne r a te d s of tw ar e is t h oro u g h ly tes te d i n t h is p h as e , a nd any
fl a ws d is c ov er ed ar e a s s i gn e d to d ev e lo p ers to b e c orr ec te d.
• Re tes t in g , a ls o k n ow n as r e gr es s i o n tes t in g , is c arr i ed ou t u n ti l t h e pr o gra m m e
me e ts t h e c us t o mer 's ex pec ta t io ns . T es t er s us e t h e SR S d oc um en t to e ns ure
e
th at t h e pr ogr a m me m ee ts t he c us t om er's r e qu ir e me n ts
• De p en d in g on t h e c u s to m er 's ex p ec t at i o ns , th e p ro d uc t is e it h er p ut i n th e
pro d uc t i o n env ir o nm e n t or i n it i al ly s ubj ec t e d to U AT (Us er Ac c e pt a nc e T es t i ng ).
lin
• In UA T, a r e p l ic a o f t he pr od uc t i o n e nv ir on m en t is c o ns tr uc t ed , a n d t h e
c us t o mer , i n c ol l a bor at i on wi t h t he dev e l o pers , p er for ms t h e t es t i ng . I f th e
c us t o mer is s a ti s f ie d wi t h th e a p pl ic at i o n, t he c us t o mer mus t s i g n o ff f or i t t o g o
l iv e .
• Af t er a pr o d uc t is d e p loy e d in a pr o duc t io n env ir o nm e nt , t h e d ev e l o pers ar e
On
res p o ns ib l e for pr o duc t m a i nt e na nc e, w hic h i nc lu d es f ix i ng a ny is s ues t ha t ar is e
an d a ny e nh a nc em e nt s t ha t n ee d t o b e m ad e.
Act iv it y
• Pr ep ar e a S u m mar y C har t o f d if fer e nt p h as e s o f S DL C
ty
Q ue sti on s & E xe r ci s e
1) De f in e t he Sy s t e m A n a ly s is an d D es i g n C on c ep ts .
2) Dis c us s t he P has es o f S D LC .
3) Ex pl a i n th e v ar i ou s r e as o ns f or c o nd uc ti n g s y s te m a na ly s is .
i nc or p or a t in g l a tes t te c hn o l ogy .
5) Dis c us s R o le o f Sy s t e m A n aly s t . si
4) Dis c us s M a na g e me nt r o l e i n s y s t em an a ly s is t o c a te r c o m pe t it i on an d
er
6) Ex pl a i n th e S o ft war e d ev e l o pm e nt f ir ms r o l e i n ER P / Bus i n es s In t el l i ge nt Sy s t e m
7) Des c r i b e t h e S A P, O R AC L E , B A AN , P EO P L E SO FT , M IC RO SO FT an d G O O G L E
ro le in ER P / Bus i nes s I nt e l li g en t Sy s t em
iv
G lo ss a ry
• De si gn: In t h is p h as e , t h e r eq u ir em e nt g at her e d i n t h e SR S d oc um e nt is us e d
as an in p ut a n d s of t war e ar c h it ec t ur e th a t is us ed f or i m pl e m en t in g s y s t em
Un
dev e l op m en t is d er iv e d.
• Imp le me nt a t io n o r C oding : I m p le m en t at i o n/ Co d i ng s t arts o nc e th e dev e l op er
ge ts t h e D es ig n doc u me n t. T h e So ft war e d es ig n is tr a ns l a te d in t o s o urc e c o d e.
A l l th e c o m po n en ts of th e s o ft war e ar e i m p le me n te d i n t h is ph as e.
• Te stin g: Tes t in g s t ar ts o nc e th e c o d i ng i s c o m p le t e a nd th e mo d u les ar e
re le as ed f or tes t in g. I n t h is ph as e, t he d ev e l op e d s o ft w are is t es t ed t ho ro u gh ly
an d a ny d ef ec ts f o un d ar e as s i gn e d to dev e l op ers t o g et t he m f ix e d.
ity
• Re tes t in g , r e gr es s i o n tes t in g is d on e u n ti l t he p o i n t at wh ic h t h e s of tw ar e is as
per t he c us to m er ’s ex pec t at i on . T es t ers r e f er SR S d oc um e nt to mak e s ur e t h at
th e s o ft war e is as per th e c us to m er ’s s ta n da rd.
• Dep lo ym ent : O nc e t he pr o duc t is tes t ed , i t is de p loy e d i n t h e pro d uc t i on
env ir o nm e nt or f ir s t U AT ( Us er Ac c ep ta nc e tes t in g) is d o n e d e p en d i ng o n th e
m
c us t o mer ex p ec t a ti o n.
• Ma int en an ce : Af t er th e de p l oy m e nt o f a pr o duc t o n th e pr od uc ti o n e nv iro n m en t,
ma i nt e n anc e o f t h e pr od uc t i. e . if any is s u e c o m es up an d n e eds to b e f ix ed or
any en h anc e me n t is t o b e d on e is t ak en c are by t h e dev e l op ers .
)A
Furt he r R ea din g
• Sy s t e ms A n aly s is an d Des i gn , J IJ U J O HN
• Sy s t e ms A n aly s is An d Des i gn A C om p le t e G u i de 2 0 20 E di t io n , G er a rdus
(c
B lok dy k
Ans w e r s t o ch ec k yo ur Und e r st a ndi ng
Fil l Up s
e
1) Sy s t e m
lin
2) Str uc tur e a n d b eh av io ur
3) Im pr ov e or g a n iz a t io n a l s y s t ems
4) 5
5) an a ly s is
Tru e/ Fa l se
On
1) Tru e
2) Fa ls e
3) Tru e
4) Tru e
5) Tru e
ty
Module II: Requirement Determination and
Development Cycle
si
Unit - 1: Und e rst an din g t h e n e ed s f or d ev e l oping /up gr ad ing sy st em
er
Le ar nin g O b j ect i ve s:
• Dis c us s t he ap pr oac h e s t o s y s te m i n te gr at i o n.
• Des c r i b e t h e v ar i ous d ep l oy me n t op t io ns f or i nt egr a te d s y s t ems .
• G o ov er th e m a i n s te p s o f s y s te m i n te gr at i o n.
•
Un
G o ov er s y s te m in te gr at i on me th o ds .
• Des c r i b e t h e a dv a n ta g es a nd d is a dv a nt a g es of s y s t e m i nt eg ra t io n.
Y ou s ho u ld c r ea t e an up gr ad e p l a n be for e y o u b eg i n a n up gr a de . T a b le - 1
des c r i b es s om e fu n d a me n ta l Fus i o n Mi d d le war e u pgr a de p l a nn i n g proc e du res a n d
ity
up gr a de r e q uir e m en ts to b e c ar e f ul ly c o ns id ere d b ef or e be g in n i ng a n u p gr ad e. T he
ta b le als o i n d ic a t es w her e t o g o for mor e i n f or ma t io n o n e ac h s t e p o f th e pr oc es s .
rev ie w th e m os t i mp or t an t pr e - up gr ad e c o ns i der a ti o ns .
e
pr oc es s .
lin
Un d ers t a nd wh ic h of Y ou s ho u l d u nd ers ta nd wh ic h o f " Pr od uc ts and
y our 1 1g pr o duc ts a nd y our 1 1 g c o m p on e nt s c a n be Fe at ur es Av a i l ab l e i n
fe at ur es c an be up gr a de d t o 12 . 1. 3. O rac le F us i o n
On
up gr a de d t o 12 . 1. 3 M id d l ew are 12c "
NO T E: If y ou p la n t o us e
11 g c o m po n en ts w i th up gr ad e d " Pr od uc ts and
12 . 1. 3 c o mp o ne n ts , y ou s ho u l d Fe at ur es N o t Av ai l a b l e
un d er s t a nd h o w t h e up gr a de in O r ac l e F us i o n
c ou l d i m pac t i n ter o p era b i l ity o r M id d l ew are 12"
c om p at i b i li ty .
ty
in t he U n ders t an d i n g
In ter o pe ra b i li ty and
Co m pa t ib i l ity gu i de .
V er ify t h at y our
da t ab as e is s u pp or te d . da t ab as e
s c he m as .
to
T he
si
Th e 1 2c d o m ai n req u ir es a
s t or e the
da t ab as e
new
th a t
hos ts t h e s c h e m as us ed i n F us io n
Up gr ad i n g and
Pr ep ar i ng Yo ur O r ac l e
Da ta b as es
(12 . 1. 3)
for 12 c
er
M id d l ew are mus t b e s up p ort e d.
s y s te ms t o 6 4 - Bi t, if r eq u ir e a 6 4 - B it o p era t in g O p era t in g Sy s t em
nec es s ary . s y s te m, y o u s ho u l d mi gra t e t o th e
ne w mac h i nes b ef or e t he
up gr a de .
Un
Dev e lo p a b ac k u p a nd B ef or e y o u b e g in an up gr a de , b e Dev e lo p i ng a B ac k u p
rec ov ery s tr at e gy . s ur e y o u h av e c om p l e te c op i es o f Str a te gy f or Up gr a de
y our s y s te m - c r i t ic a l f i les ;
i nc l u d in g t he d at a ba s e th at w i l l
hos t y o ur s c h em as .
(c
e
up gr a de . r u les a n d r es tr ic t i ons . Up gr ad e
lin
Co ns id er th e i mp ac t on If y o u w i ll be us i ng F us io n Un d ers t a nd i ng
de p l oy e d M id d l ew are 1 1 g c o m po n en ts i n In ter o pe ra b i li ty and
11 g a p pl ic at i o ns a nd y our u p gra d ed 12 c ( 12 .1 . 3) Co m pa t ib i l ity with
c om p on e nts . env ir o nm e nt , y ou s h ou l d r ev ie w Pr ev io us V ers i ons
On
an d u nd ers t a n d a n y p ot en t ia l
i nt er o p er ab i l ity an d c om p at i b i li ty
is s ues .
P la n f or s y s t em Th e up gr ad e pr oc es s i nv o lv es an P la n n in g f or Sy s te m
do w nt i me d ur i ng t he ” i n p lac e” u p gr ad e f or m os t Do wn t i me Du ri n g a n
up gr a de pr oc es s . Fus io n M i d dl e war e c om p on e nts . Up gr ad e
ty
Y ou w il l ne e d t o p re p are f or t he
s y s te m t o be do w n dur i n g th is
ti m e. To t es t ba c k up an d
r ec ov ery in c as e of a f a i lur e a n d
si
to p la n th e do wn t i me f or t h e
up gr a de , tes t t he u p gra d e
pr oc es s a nd t es t t he res t ore
fu nc t i o na l ity . T h is a l s o h e lp to
er
p la n for t he s c e n ari o i f s o m et h in g
go es wr on g dur i n g u pgr a d e a n d
th e 11 g s y s t em n e eds t o be
r es t or ed .
iv
G et t he pr o d uc t Y ou m us t ac q u ir e a nd ins t al l th e O bt a i ni n g Pro d uc t
d is tr i bu t io ns for y our Re l eas e 1 2c (1 2 .1 .3 ) s of tw ar e Dis tr ib u t io ns
up gr a de . be f or e y ou c an b eg i n t he up gr a de
Un
pr oc es s . Yo u wi l l ne e d to
do w nl o ad t h e a ppr o pr i at e pr od uc t
d is tr i bu t io ns f or y o ur u pgr a d e.
Un d ers t a nd ho w t o u s e O r ac le pr ov i des a s t a nd ar d s u it e Us i n g t he S ta n da r d
th e s t a nd ar d of t o o ls th a t c a n b e us ed to Ins ta l l at i on and
i ns t a ll a ti o n, au t om at e m any of th e Up gr ad e To o ls
c on f ig ur at i o n a nd i ns t a ll a ti o n, u pgr a de a nd
ity
up gr a de t o ols . c on f ig ur at i o n proc es s e s .
a s uc c es s f u l up gr a de .
e
c rea t in g a t es t env ir o n me n t to us e w h en ro l l i ng ou t a n up gr a de .
Pr e- u p gr ad e t es t i ng o n a c lo n ed env ir o nm e nt y ie l ds v a l ua b l e i nf o rm at i on t h at c an
lin
be a p pl i e d t o y our o v er a l l pr od uc ti o n up g rad e s tr at egy . A mo n g t h e a d d it i on a l
adv a nt a ges a r e :
• Id e nt ify an d r es o lv e a ny u pgr a de is s u es .
• Ex per i m en t w it h c o mp l et i ng an e n d - t o- en d u p gra d e.
On
• Rec o gn iz e u pgr a de pe r for m anc e a n d h ow p u rge s c r i pts c a n as s is t .
• Us i n g t he U p gr ad e As s is t a nt , d et er mi n e t he ti m e re q u ire d t o u pgr a d e
Me t ad at a a n d O p en I n s ta nc es .
• B e fa m i l iar w i th th e d at a bas e's r es o urc e us ag e (s uc h as t em p or ary
ta b les p ac e ; P G A , e tc ) .
ty
c ons i d era t io ns a nd pr oc e d ur es . B ef or e be g i nn i ng t h e u p gr ad e, ens ur e th at y o u
hav e rev i ew e d th is in f or ma t io n a nd per f orm e d a c o mp l et e b ac k up .
si
B ef or e i ns t a l l in g any ne w R e le as e 1 2c ( 1 2. 1. 3) d is tr i bu t io ns a nd b eg i n ni n g t he
up gr a de o f y our O r ac le Fus i o n Mi d d le w are 1 1 g de p l oy m e nt to R e le as e 12c
er
(12 . 1. 3), ens ur e th at a ll s y s t e m - c r it ic a l fi l e s h av e be e n b ac k e d u p. O r ac l e s tr o ng ly
adv is es y o u t o p er for m a c om p l et e b ac k up o f y o ur ex is t in g de p l oy m e nt , i nc l ud i n g
th e d a ta b as e th a t h o us es y o ur O r ac l e F us i on M id d l ew ar e s c h e mas . f or s pec i f ic
i nf or ma t io n o n e ns ur i ng t h at al l of y our e nv ir on m en t's c om p on e nts c ou l d b e
ren e we d i n t he oc c as i on of a t hw ar te d u p gra de
iv
W he n u p gr a d i ng y o ur 11 g e nv ir on m en t to 12 c (1 2. 1 .3) , y o u s h ou l d u n ders ta n d h ow
th e up gr ad e wi l l af f ec t y o ur pr e - u p gra d e e n v ir on m en t. U pgr a des to s c h em as an d
do m a in d ir ec t or i es , f or ex am p l e, ar e d on e " i n p l ac e ," wh ic h m ea ns t ha t th e ex is t i n g
11 g fi l es ar e u pd a te d dur i n g t h e u p gra d e. As t h e bi n ar ies ar e in s ta l l ed i n a n ew
d irec to ry , t h e 12c ( 1 2. 1. 3) O r ac l e H o me bi n ar ies are up gr ad e d " o ut o f p l ac e ." Th e
m id t ier a n d s c he m as ar e inc l ud e d i n t h e up gra d e to 1 2c ( 1 2. 1. 3) . A m i dt i er - on ly or
s c he m a- on ly u p gr a d e i s n ot pos s i b le .
ity
• O r ac le H o m e B i nar i e s - O ut of P l ac e Up gr a de
m
• Sc he m as - U p gr a d e d I n P l ac e
• Ins ta nc es - Mi gr at e d d ur in g t he s c he m a up gr ad e (F or SO A U p gra d es O n ly )
Th e u p gr a d e of ac t i v e a n d c los e d ins t a nc es fr om 1 1 g t o 1 2c h a pp e ns
au t om at ic a l ly as par t of t he s c h e ma u p gra d e. Y o u c an m a na g e t h e up gr ad e
e
us in g a d mi n is tr a ti o n s c r i pts .
• Do m ai n D ir ec t or y R e c on f ig ur at i o n - I n- P lac e Up gr a de
lin
T h e c ur r en t d o ma i n h as b e en " in p l ac e" u pgr a d ed . Y o u wi l l id e n ti fy t he loc a ti o n
of t h e 1 1 g d o ma i n d ur i ng t h e u p gra d e, an d t he 1 1g do m a in wo u l d be r ec on f ig ur ed
to p o i nt t o th e n ew 12 c ( 1 2. 1 .3) ho m e d irec t ory .
• Do m ai n C o mp o ne n t Co nf i g ur a t io n - In- P l ac e Up gr a de
On
1. 1. 1 N ee d f o r Up gr a dat ion of t he Sy st em
ty
If y o u ow n or m an a ge a s ma l l or m e di u m - s iz ed b us i nes s , y ou ar e we l l aw ar e of t he
adv a nt a ges of t ec h n o l ogy . Tec h no l o gy a l lo w s S M Bs t o c o m pe te wi th lar g er p l ay ers
i n w ay s t ha t w er e u nt h ink a bl e on ly a f ew y ears a go . H ow ev er, t ec h n o lo gy has a
dra w bac k f or m a ny S M B o wn er s : th e n ee d f or c o ns t a nt u p gr ad es .
si
" W he n w il l t he c o ns ta nt c h an g es c o me t o a n en d ?" " Wh e n c an I s to p up gr a di n g my
s y s te ms ?" is a fr e q u e nt ly as k e d q u es t i on a t Cor rec t S o l ut i ons . T h e tru t h is t h at
er
tec h no l og ic a l adv a nc e me n ts w i l l a lw ay s nec es s it at e up gr a des . C o ns u m er de m a nd
for n ew f e at ur es , c h an ges i n g ov er nm e nt c o mp l i a nc e an d r e por t in g, an d an ur g e f or
th i ngs t o p er for m b et t er ar e j us t t hre e of t he m a ny re as o ns w hy bus i n es s es w i l l
a lw ay s r e qu ir e u p gr a d es .
iv
G iv en t ha t u p gr a d es a r e h er e t o s t ay , t he k e y is t o r ec o g n is e th a t i nv es t in g i n t he m
wi l l b e ne f it y o ur b us i n es s r at h er t ha n v i e w t he m as a nu is a nc e . W e'v e c o mp i l ed a
l is t o f 1 3 r e as o ns w hy y ou s ho u ld k ee p u p gra d in g!
Un
1. Enh an c ed P ro du ct i vit y
2. Bett e r co mmu ni ca t io n
Ne wer t ec h n o lo gy al l o ws b us in es s es t o c om mu n ic at e w i th c us to m ers a n d p o te nt i a l
c us t o mers i n a v ar ie t y of w ay s . E m ai l , s o c i al m e di a , o r t hr ou g h y o ur w ebs i te .. .
Inc r e as e d b us in es s p o te nt i a l r es u lts fr o m mo re f lex i b le c om m un ic at i on o p ti o ns .
m
3. Imp ro v ed ef f ic ie nc y
W e n o w h av e t he tec h no l o gy t o d o t h i ngs th at we c o ul d no t do i n t he p as t . R e mo te
)A
4. Inc r e as ed s e cu rit y
B us i n es s es us i ng Wi n do ws X P, f or ex a m pl e , ar e v u ln er ab l e to i nf or ma t io n t h ef t or
(c
e
Ne w o per a ti n g s y s t em f ea t ur es c an be us e d to pr ov i de en h an c e me nts t h at w er e n o t
pos s i b le i n o l der s y s t ems . T his m ea ns t h at b us i nes s es us i n g o l d er t ec h n o lo gy w i l l
l ac k fu nc t i o na l ity t h at c ou l d pr ov id e t he m w i t h a c o mp e ti t iv e adv a nt ag e .
lin
6. V endo r a s si st an ce
On
y our v en d or s t il l s u p p or t i ng y our ol d t ec h n o l ogy ?
7. IT a ss is t an c e
Th is is r e l at ed t o th e pr ev i o us po i nt . IT pr of es s io n a ls are u na b l e t o s u pp or t
obs o l et e tec h n ol o gy . Y o u ng IT pro f es s i o na ls may b e u nf a m i l iar wi t h l eg ac y
s y s te ms . It w i l l t ak e t he m l on g er t o f in d an s wers t o y o ur IT qu es t i ons , r ais i n g y o ur
ty
s up p ort c os ts .
si
If y our s y s te m is s t i l l un d er w ar r an ty , it c a n b e r e p a ir ed an d r et urn e d t o s e rv ic e
qu ic k ly , c aus i n g l es s d is r u pt i o n to y our b us i nes s . Ho w ev er , s y s t e ms th a t ar e mo re
th a n f iv e y e ar s o l d an d ar e no l on g er c ov er ed by w arr a nty c an fa i l a n d f orc e t he
er
c om p any i nt o d is as t er r ec ov er y m o d e.
9. Cos t sa v ing s
iv
Up gr ad i n g m ay a p pe a r t o be c os t ly , h ow ev er t he fac t of t h e m at ter s ee ms to be
th at o ld er mo d e ls h av e f ar m or e is s u es – an d t h us m or e c os ts . T he ex pe ns e of
pro b l ems c aus e d by u ns t e ady h ar dw ar e a nd t ec h n o lo g ies c an qu i c k ly ex c ee d t he
c os t o f i nv es t i ng in a n u p gr a d ed s y s t e m.
Un
10 . Co mp at ib il it y
W he n s o m et h in g n ew e nt er s t he mark e t, it may b e i nc o mp at i b l e wi t h ex is t i ng
s y s te ms a n d s of tw ar e . F or ex a m pl e , th e n e x t up d at e t o W i n do ws 1 0 w i l l r e m ov e
s om e fe a tur es , m ak i n g it i nc o m p at i bl e w it h th e W i nd ows 2 0 03 s erv e r t h at s o me
S M Bs s ti l l us e.
ity
l es s po w er , r es u lt i n g i n s i gn i f ic a nt s av i n gs f o r y o ur c o mp a ny .
12 . St af f Sa t i sf a ct ion
)A
St a ff m em b er s bec o m e inc r e d ib ly a nn oy ed wi t h o ut - o f- d a te s y s t e ms an d s of tw ar e
bec a us e t h ey s i mp ly c an n ot d o t he ir j o bs as w el l or pro f ic ie nt ly as t hey w o ul d l ik e.
If t hey b ec om e s o d is s at is fi e d th a t t h ey l ea v e, y o u r is k los i n g bu s i nes s k n o wl e dg e
– a nd it's n o t go o d P R f or y o ur c o mp a ny i f i n d iv i d ua ls t e l l e ac h o t h er why t h ey l ef t.
(c
13 . Cus t om e rs w ho ar e i nt e re st ed
Cus to m ers , l ik e e mp l oy e es , m ay b ec o m e d is s at is f ie d if t h ey in te rac t w it h a
c om p any t ha t us es ou t da t ed tec h no l o gy . T h is c an g iv e y o ur c o m pa n y t h e re p ut at i o n
e
of be i n g " o ut of s t e p." By i nv es t i ng i n t ec h n o lo gy , y o u w i ll prov i d e a be tt er
c us t o mer ex p er i enc e wh i l e a ls o d e m ons tr at i ng t h at y o u ar e i n i t f o r t he lo n g h au l .
lin
1. 1. 2 S y st em int eg r at ion ap pr oa ch e s
Sy s t e m in t egr a ti o n i s m ul t if ac et ed a n d c an b e ap pr o ac h e d us i n g v a ri o us
On
arc h i tec t ur a l fr a m ew o r k s , b as e d u p on t h e nu m be r a nd es s e nc e of e l e me n ts th a t
mus t b e l i nk e d .
ty
an d s h ar e da t a. A P Is , w eb h ook s , or c us to m c o de c an b e us e d to i m p le m en t th is
mo d e l.
A po i nt - t o- p o in t c on n e c ti o n ex tr ac ts da t a fr o m o n e s y s t e m, m od i fi es or f orm a ts i t,
si
an d t he n s e nds it t o a no t her s y s t e m. E a c h ap p l ic a t i on i m p le me n ts a ll o f th e
rat i on a l e f or d at a tr a n s l at i on , tr a ns f or ma t io n , a n d r ou t in g wh i l e t ak i ng i nt o ac c o u nt
th e pr ot oc o ls an d d at a m o de ls s u p por t ed by ot h e r i nt e gra te d c o m p on e nts .
er
iv
Un
ity
m
)A
(c
Th e po i nt - t o- po i nt in te gr a t io n ar c h it ec tur e (s tar /s p a gh e tt i) .
Adv ant ag e s an d di s ad va nt a ge s : O n e o f th e pr i m ary b e ne f its of po i nt - t o- p o i nt
e
i nt egr a ti o n wo u l d b e th e a b i li ty of a n IT te a m to q u ic k ly b u i l d a s m a l l - s c al e
i nt egr a te d s y s t em . O n th e c o ntr ary , th e mo d e l is d if f ic ul t to s c a l e a nd t h e
lin
l ea d ers h i p of al l t he c o ll a bo r a t io ns c a n ge t v ery c h al l e ng i n g w h en ev er t h e r a ng e of
ap p l ic a n ts ex p a nds . A s s um e us ers ou g ht t o u nd er tak e 1 5 in te gr a ti o ns t o c o nn ec t
s ix m od u l es . As a r es u lt , th e s o- c a l l ed s t ar/s pa g he tt i in te gr at i o n oc c urs .
Wh en to a ppl y it : Th is a p pr o ac h is a p pr op ri at e f or b us i n es s es t ha t d o n ot hav e
c om p l ic at ed b us i n es s r at i on a l e a n d r e ly o n a f ew s of tw ar e c o m po ne n ts t o r u n t he ir
On
op er at i o ns . It is a ls o a n ex c el l e nt c h o ic e f or bus i n es s es lo ok i ng t o c on n ec t t o S a a S
ap p l ic a t io ns .
Hub - and - sp ok e mod e l
Th e hu b- an d- s p ok e mo d e l is a fa r mor e ef fec t iv e t ec hn i q u e of i n te gr at i on
arc h i tec t ur e t h at o u tl i nes p o i nt - to - p o in t is s ues w h i le av o i d in g t h e s tar /s pa g he tt i
mes s . B ec a us e th e r e la t io ns hi ps a mo n g a l l s ub - s y s t e ms are m an a ge d by a
ty
c en tr al iz e d l oc at i on ( mes s a ge br ok e r), th e y do no t c o n n ec t di rec t ly w i t h o ne
an o th er.
Th e h u b f unc t io ns as a m es s ag e - or ie n te d m i dd l ew ar e w it h a c e nt r a lis e d i n te gr at i on
en g i ne , t ra ns la t i ng pr o c es s es i n to a s o l it ary c l as s ic a l d ia l ec t a n d r ou t in g m es s a g es
si
to t h e ap pr o pr i a te d e s ti n at i ons . Th e s p ok e s (a d ap te rs ) th a t c on nec t t he c e n tre t o
th e s u b - s y s t e ms ar e ha n d le d s e pa ra te ly .
er
iv
Un
ity
m
)A
(c
Th e i nt eg ra t io n ar c h it e c tur e o f hu b - a nd- s p ok e.
Adv ant ag e s an d di s a dv ant ag es : I n c o m par is on to P 2 P, t h e m o d e l o ff ers s ev er a l
e
adv a nt a ges , inc l ud i n g gr e a ter s c a la b i l ity . B ec a us e e ac h s y s t e m o n ly h as on e
re la t io n t o t he ma i n loc at i o n, s a f ety a n d arc h it ec tur e s im p l ic i ty i mp rov e. T h e
lin
c en tr al iz a ti o n o f t h e hu b , o n t h e o t her h a nd , c ou l d b e a v u l n er ab i l i ty i n s uc h a
mo d e l. Th e en t ir e in fr as tr uc t ur e is r e l ia nt o n a s in g le in te gr at i o n en g i ne , w h ic h c an
bec o me a b ig hi n dr anc e as t he v o l u me of w or k gr ows .
Wh en to app l y it : In e - c o m m er c e , f i na nc i a l op er at i ons , a n d p ay me n t pr oc es s i n g,
th e hu b- an d- s p ok e m o de l is w id e ly us e d. Fu rth er mo re , it is a pre f err ed d es ig n f or
On
he av i ly r e gu l at e d i nd u s tr i es w it h s er i o us s ec ur ity r is k s .
Ent e rp ri s e S er v ic e B us ( E S B) mod e l
ty
Th e E SB is a s e qu e nc e o f m id d le w are s erv i c es t h at c o nn ec t m u lt i p le s y s te ms a nd
si
ac t as a mes s a gi n g b ac k b o n e. U nl ik e hu b - a nd- s p ok e , wh ic h us es a s in g l e
c en tr al is e d i nt eg r a t io n e ng i n e, E S B pr ov i de s e ac h s y s t e m wi t h it s o wn i n te gr at i o n
en g i ne a n d ad a pt er , wh ic h c o nv er ts a s ta t em e nt in to t h e c l as s i c a l t e m pl a te a n d
ret ur n t o t h e loc at i o n s up p or t e d f or ma t. E S Bs w er e ori g i na l ly des i gn e d t o c o n nec t
er
c om p l ic at e d i n ter n a l ne tw or k of lar g e en t erp ris es , b u t t h ey c a n als o wo rk w i th
c l ou d s erv ic es .
iv
Un
ity
m
)A
Th e arc hi t ec t ur e f or e nt er pr is e s e rv ic e b us i nt e gra t io n .
e
wa nts t o br i n g it al l t o ge t her o n - pr em is es , t h is is a go o d fi t.
lin
1. 1. 3 D epl oy me nt opt ion s f o r in t eg r at ed s yst e ms
On
fre q ue nt ly r e qu ir e d t o mer g e al l thr e e d i ff ere n t s e ts w i th i n a s i ng l e ec os y s te m ,
ut i l is in g m u lt i pl e k i n d s o f m id d le w are a n d A P I l ay ers b e tw e en IT c o m po n en ts .
For tu n at e ly , an i nc r e a s i ng n um b er of c l ou d p la tf or ms a re of f er in g th e ir s erv ic es to
de a l w i th c o m pl ex i nt e gr a t io ns . C o ns i d er t h e t w o p o pu l ar de p l oy m e nt o pt i ons l is t e d
be l ow .
Int eg rat ion pl at f or m as a S er v ic e (i P aa S)
ty
In te gr at i o n P la tf or m a s a S er v ic e r ef ers t o a c o ll ec t io n of c lo u d - bas e d i nt e gra t io n
s o lu t io ns t ha t ar e pr i m ar ily us e d f or i m pl e m e nt i ng in t egr a ti o ns i n th e c l ou d .
si
As a n a l l- inc l us iv e s er v ic e, i P a a S c on n ec ts s y s te ms , proc es s es , a n d d at a i nt o a
s i ng l e us er i nt er f ac e. I t pr ov i d es a l i bra ry of rea dy - to- us e c o nn ec to rs t ha t a l lo w
d is p ar at e us er to in t er ac t w i th o n e a no th er r eg ar d les s of w her e t h ey ar e p lac e d.
Da ta tr a ns f or m at i on a nd s hi p p in g fr om an d t o a pp l ic at i ons a re h a n d le d by i P a a S.
er
iv
Un
ity
m
)A
(c
Ex am p l es of p o te nt i a l i Pa a S c o n nec t io ns s i m p li f ie d .
P ro s a nd con s : iP a a S ar e a dv an t ag e ous i n a v ar i ety o f w ay s . It's a d ap ta b l e,
v ers a t i le , a n d s c a la b l e. I nt e gr at i on ac t iv it i e s ar e a u to m at e d w it h i P a a S, al l ow i n g
e
for t he r el a ti o n of s y s te ms a nd d at a d e pl oy ed in a ny e nv i ro n me nt a nd a l l ow i ng f or
fas ter pr oj ec t d e l iv er y . I n ter ms o f f l a ws , th ere m ay b e s ec u ri ty c onc er ns , as w it h
any pu b l ic c l ou d.
lin
Wh en to u s e it : i P a a S is i d ea l f or r e a l - t i me ap p l ic a t io ns a n d s up p orts a w i de r an g e
of in t egr a ti o n s c e n ar i os s uc h as en t erpr is e a pp l ic at i o n i nt e gr at i on ( E AI) , d a ta
i nt egr a ti o n, c l ou d in t e gr a t io n , B 2 B in t egr at i o n, A PI m an a ge m en t, I nt er ne t o f T hi n gs
i nt egr a ti o n, an d m a ny ot h er s .
On
Hyb r id int eg r at io n p l at f o rm ( H I P)
A hy br i d i nt e gr a t io n p l at for m ( H I P) is a m o re g en er a l is e d v ers i o n of wh at i P aa S
prov i d es . I t is a c ol l ec ti o n o f i nt e gr at i on s of t war e t h at inc l u des b ui lt - i n c a p ab i l i ti es
for mak i ng on - pr e m is es a nd c lo u d - bas e d me t ho ds w ork t og et h er as a c o h es iv e
ty
b loc k .
si
In te gr at i o n p la tf or ms s e r v e as a b ri d ge b e tw e e n le g ac y s y s te ms ru n n in g o n
phy s ic a l h ar dw ar e, a pp l ic at i ons a nd d at a b as es i n a pr iv at e c l o ud , a n d s y s t e ms
run n i ng i n t he p ub l i c c lo u d. S uc h p la tf o rms n ec es s it at e t h e l eas t a m ou n t o f
c on f ig ur at i o n. T h ey i n ter fac e an d i nt eg ra te wi t h a ny s y s t e m by ut i l is i n g t wo m aj or
er
c om p on e nts : pr o toc o l c o n nec t or s f or h a nd l i ng c om m u nic a ti o n pr ot oc ols s uc h as
HTT P, TC P , J MS , an d s o o n, a n d m es s ag e f or ma tt ers f or h a nd l in g v ar io us d at a
for m ats s uc h as J SO N , X ML , a nd s o on .
iv
Un
ity
m
)A
Di a gr am o f a hy br i d i n te gr at i on pl a tf or m.
(c
e
of- th e- b ox s o lu t io n.
Wh en to u s e it : HI P s ar e pr im ar i ly c o nc e rne d w i t h t he d ig i ta l tra ns f or m at i on of
lin
l eg ac y s y s t e ms . T h is is a n ex c e l l en t fr a m ew ork f or or ga n is a t io ns t ha t ne e d t o
re la te on - pr e mis e a n d c l ou d s o l ut i ons .
1. 1. 4 K ey st e ps of s y st e m int eg r atio n
On
Sy s t e m i nt e gr at i on k e y s t eps
By c o n nec t in g e n ter p r is e d at a a n d s y s te m s , b us i n es s es c ou l d c om p ut er is e a nd
ac q u ir e c o m pl e te d is c l os ur e o f t h eir b us i n e s s o p er at i ons . Th er e are a f ew c r i tic a l
s te ps t o t ak e i f y ou w an t to un d ert ak e fu l l i mp l e me n ta t io n a nd s e e a q u ic k r et ur n
on y our inv es tm e nt .
ty
si
er
iv
Un
ity
Pr oc e d ur es f or im p l em en t in g s y s t e m i nt egr a t i on .
Ana l ys is of f ea si bi lit y and p lan nin g
m
Ev ery i nt eg r a t io n pr o c es s be g i ns wi t h an as s es s me nt o f t he s y s t ems t o b e
i nt egr a te d an d t h e dev e l op m en t o f a fe as ib l e s tr at e gy . Cre at e a n ac c ur at e
rep res e nt at i on o f y o ur ex is t i n g s o ft w are a n d i ts t ec hn ic a l s pec i f ic a ti o ns , as w el l a s
a lis t of a ll i nt e gr at i on r eq u ir em e nts . W id e n th e pri or i ty , ti m e l in e, an d c os t of y o ur
)A
e
E xe cut ion
lin
Th e ne w i nt e gr a t ed fr am e wor k h as b e en ex te ns iv e ly c h ec k ed t o de t erm i n e t h at a l l
c om p on e nts i nt er ac t s ea m l es s ly w i t h e ac h ot her a nd th a t n o d at a is l os t d ur in g
tra ns m is s i o n. I t c o u l d t h en be i nc or p or at e d a nd i ntr o duc e d t o c ons u me rs . I t is
s ug g es t e d t h at th e i m p le m en t at i on s t ag e be k e pt as s hor t as pos s i bl e i n ord er to
av o i d c h al l e ng es r e l a te d to p o te nt i a l c h an ges in t he in t egr a ti o n pr oc es s . A g il e
On
proj ec t m an a ge m en t c ou l d b e us e d b ot h d ur in g a n d a ft er t h is p has e t o as s is t a
c om p any i n ad a pt i ng t o c h an g in g e nv ir on m e nt o f i nt e gra t i on s y s t e ms .
Rep a ir s
ty
an d t ha t n o er r or s oc c ur .
Fo ur Co m m on Sy s t e m In te gr at i o n Me t ho ds
si
er
V ert i ca l
Adv ant ag e s
Un
• Co nv en i en t – Si nc e i t do es n ot r eq u ir e m uc h c o d in g k n ow l e dg e , th i s is a
go o d m et h od f or c o m p an i es t ha t d o no t h av e a s tr o ng I T t e a m.
• S i mp l e to bu i l d – N o r em ark a bl e c o d i ng s k il l s ar e re q ui re d t o br in g t h is
i nt egr a ti o n t o l if e.
• S ec l u d ed s u bs y s te ms – Ins t ea d o f be i n g c on nec t ed , e ac h s u bs y s te m
s en ds i n d iv i d u al r eq u e s ts t o o t her s u bs y s te m s .
ity
Dr aw b a ck s
• V er t ic a l i nt e gr a t io n is t oo r i gi d – it w i l l n ot p er m it f or a ny f lex i b i l ity o r
a lt er a t io n .
• Fur th er s i l os m us t b e bu i l t ov e r ti m e – A ne w s i lo mus t b e b ui l t fo r e ac h
m
ne w s u bs y s t e m.
• Di ff ic u lt t o m a na g e – W he n a s y s te m h as t oo ma ny in fo rm at i o n s i los , i t
bec o mes c l ut ter e d an d s l o w.
)A
(c
Ho riz o nta l
Th e h or iz o n ta l me th od , as op p os e d t o v e rt ic al s y s te m in t egr a ti o n, a ll o ws
e
c om m u nic a ti o n b et we en s ubs y s t ems . Th is is ac c o m p l is h e d by es ta b l is hi n g a n
E nt er pris e S er v ic e B us ( E S B) . T he E S B s e rv es as b ot h a tra ns la t or a n d a
c on n ec t or b e tw ee n t h e s u bs y s te ms . T o c o m mu n ic at e w it h t h e E S B , e ac h s ubs y s te m
lin
req u ir es on ly o n e i nt er f ac e. O n e f ea tu r e of t his t ec hn i q ue is t ha t wh e n
mo d if ic a t i o ns ar e i nt r od uc ed to ot he r s u bs y s te ms , on ly t h e E S B ne e ds t o c h an g e,
i ns t ea d o f th e ov er a l l n et wor k . Nev er th e l e s s , s inc e t he E S B is t he o p era t io n's
c en tr al h u b, a ny is s ue s w it h th e s ubs y s t ems or th e E S B i ts e l f c an br i ng t he e nt ir e
proc es s t o a h a lt .
On
Adv ant ag e s
• Q u it e a da pt a b le – Su bs y s t e ms c ou l d e as i ly m ak e a n d r ec eiv e us er r e qu es t
v i a th e E S B .
• Few er m o d if ic at i ons – O n ly c h a ng es t o th e E S B ar e r e qu ir e d if a s ubs y s t em
c ha n ges .
• S ubs y s te m c o m mu n ic at i on – U n l ik e v er t ic a l in t egr at i o n, s u bs y s te ms c a n
ty
c om m u nic a te w i th e ac h ot h er.
Di sa dv ant ag e
• S ig n if ic a nt r is k of t ec hn ic a l e rror – If s o me t h in g go es wro n g w i th on e of t he
si
s ubs y s t ems o r th e E S B, it c o u l d hav e a n i m pac t o n th e e nt ir e s y s t em .
• S lo w er c o mm u n ic a t io n s p ee d – D ue t o t he v o lu m e of d at a b e in g p roc es s e d,
th e E S B m ay p er f or m s l ow ly .
• Ne ed s a de di ca t ed s t ru ct u r e – T he E S B r eq u ir es t o b e p art ic ul ar ly m a de
er
for a n i n d iv id u al ’s s y s t em .
St ar / Sp agh et t i
Th e s t ar, s p ag h et ti , or p o i nt - to- p o in t me t ho d , as it is a ls o i d en t if i ed , inv o lv es
iv
Adv ant ag e s
• In d ep e nd e nt – C o m mu n ic a t io n is a u to m at ic .
• Ev er y s ubs y s t em is l i nk e d – E ac h s u bs y s t em is i nd iv i du a l ly l i n k ed t o
ev er y ot he r s ubs y s t em .
• Fas t er c o m mu n ic at i on – W it h ou t th e c u m bers om e E S B , da t a mov es mo re
qu ic k ly ac r os s t he s tr u c tur e.
ity
Di sa dv ant ag e
• W he n on e s ubs y s t em c ha n ges , al l s u bs y s te ms mus t c h a n ge a s w e l l –
e ls e t h ey wo u ld no t b e a b le t o e ff ec t iv e ly c o m mu n ic a t e.
• Ex t r e m ely s o ph is t ic a t ed – A g re at d ea l o f pr e par a ti o n is n ec es s ary t o
m
gu ar a nt ee t h at e ac h s ub - s y s t em is c o nn ec t ed c orrec t ly to t h e ot h ers .
• Th er e is a h i gh r is k of pr o b l ems w he n t h e re ar e t o o m a ny c o n n ec t i ons –
Th e m or e s u bs y s te ms th er e ar e, t he mor e l ik e ly th er e w il l b e pr o b l ems .
)A
Adv ant ag e s
• E xc el l ent t r an s lat ion – A l l s u bs y s t ems a re 'f l ue n t' a nd c an i nt er ac t
fl a wl es s ly .
• Dig it aliz ed – T h er e is n o n ee d t o p hy s ic a l ly s ub m it us er r eq u es t .
• De vi c es n e ed n ot co l lab or at e – Ev ery s u b - s y s t em op er at es d if f e ren t ly .
e
Di sa dv ant ag e
• H igh c odi ng s ki ll r equ ir ed – T h is is a c om p l ex me t ho d t ha t n ec es s i ta t es a
h ig h l ev el of c o d i ng pr of ic i enc y .
lin
• T he ri s k of in it i a l prob l em s – A l o t o f i s s ues wi t h t he da t a f or ma t t en d t o
ar is e d ur i ng s et up .
On
1. 1. 6 Ben ef it s and c ha ll en ge s of sy st em int eg r ati on
ty
as s im i l at i on .
si
i nd iv i du a ls ar e n o l o n ger r e q u ir e d t o b ri d ge th e g ap b et w ee n s y s t ems , we ar e fr ee
to c o nc en tr at e o n m o r e pr od uc tiv e , h ig h er - l ev e l t as k s . M aj or s y s te m i nt e gr at i on
be n ef i ts i nc l u de i nc r e a s ed ef fic i e nc y an d s tr e am l i n ed o p era t i ons .
er
Enh an c ed Vo lum e O f sa l es — C o m pa n ies i n t h e eC om m erc e a n d r et a i l s ec tors (as
we l l as o t her s t ha t r e ly o n s a les ) ty pic a l l y s ee a s i g ni f ic a n t i nc re as e in s a l es
v o lu m e fo l l ow i ng an in v es t m en t i n s y s t em in t egr a ti o n. W he n i nv en t ory is u p da t ed in
rea l- t im e , c o ns u mer s wi l l h av e m or e pu rc has i n g o p p ort un i t ie s an d a be tt er
iv
Sc al a b i li ty is an i mp or ta nt f ac tor i n b ot h th e f i na nc i al an d s tr at e g i c as p ec ts o f t he
eq u at i on .
Th e c l o ud is v er y c o s t - e ff ec t iv e b ec aus e i t pr ov id es a l l o f t he b e ne f its of on -
pre m is es r es o ur c es w it h ou t t h e c os ts o f ac qu ir i n g a nd m a in ta i n i ng th e har d war e.
e
It's a ls o s c a l a bl e , as ad d it i o na l c l ou d r es ou rc e s are a ut o ma t ic a l ly m ad e av a i l ab l e
as y o ur bus i n es s ex pa nds . Sc a l in g b ac k is a ls o s i mp l e b ec a us e y o u'r e us ua l ly o n ly
c har g e d f or t h e r es our c es th a t th e c o mp a ny has ac t ua l ly us e d .
lin
Cha ll en ge s
On
obs t ac l es -
ty
s y s te ms ar e h e av i ly r e li e d o n by bus i nes s e s , a nd t h ey ar e m os tl y le g ac y s y s te ms
th at c an n ot b e r ep l ac ed f or t h e s ak e of i n te gr at i on . If a s of tw a re s y s t em has a
mo n o l it h ic ar c h i tec t ur e, it is r ef er r ed t o as mo n o l it h ic . Fu nc ti o n al l y d is ti nc t as p ec ts
are no t arc h it ec t ur a l ly s e p ar a t e c o mp o ne nts i n m o no l i th ic a rc h i tec tur e, bu t ar e a l l
si
i nt erw ov en . I nt e gr at i on bec o mes di ff ic u l t as a r es u l t of s uc h arc h it ec t ur e. A
s y s te ms i n te gr at or m us t k e e p h o ld t o rec og n is e a nd s e l ec t th e b es t m e th o d of
i nt egr a ti n g w it h m o no l i th ic b us in es s a p pl ic a ti ons .
•
er
Dat a i s vi ew ed dif f e r ent ly b y d iff er ent bu sin e ss un it s:
• Do it qui c kl y or do it bet t e r:
m
W he n I T re q u ir es to s up p ly a ny th i n g t o t he i r bus i n es s , t h ey a re f req u e nt ly li m i te d
by t i m e a n d b u d ge t. Pr oj ec ts a r e fr eq u en t l y m an a ge d by n o n - t e c hn ic a l ma n ag ers
wh o ar e b us in es s - foc us e d a n d l ac k k n ow l e dg e o f b es t pr ac tis es an d arc h it ec tur a l
)A
fu nc t i o na l r e q u ir e m e nt s , bu t a ls o p ot en t ia l f ut ur e a nd n o n - f u nc t i o na l r eq u ir em e nts
s uc h as ef fec t iv e n es s , ex p an d ab i l ity , r e - us a b il i ty , a n d pr es erv a ti o n.
• Pi c ki ng t he Ap p rop ri at e I nte gr at ion Too l:
e
Th ere are nu m er ous d ev ic es i n th e m ar k et t h at c l a i m to pr ov id e t he f i n es t
i nt egr a ti o n ex p er ie nc e . It is d i ff ic ul t t o s e l e c t th e bes t t oo l f or a n e nt er pr is e . A n
i nt egr a ti o n to o l i n m o der n c o n nec t iv i ty c a n qu i te d e fi n it e ly a i d f u s i on as s i m i la t io n.
lin
Hy br i d i nt e gr a t i on e n a b les o n - pr em is e s o ft w are t o w ork i n t an d em wi t h c l ou d - bas e d
ap p l ic a t io ns . I t c on n ec ts y o ur ex is t i ng e nt er p ris e n e tw ork to S a a S/ P aa S , B2 C, B 2 B ,
B YO D, an d B i g D at a . Hy br i d i nt egr a ti o n is des ir e d bec a us e e nt erp ris es m ay n o t
wa nt t o go c o m pl e te ly c l ou d du e to l e g ac y s y s te m de p e nd a bi l i ty , r e gu l at ory is s u es ,
an d wor ri es a bo ut t h e c on f id e nt i al i ty an d pro t ec t i on o f c r it ic a l ma t er ia l . Hy br i d
On
i nt egr a ti o n to o lk it c o nn ec t s uc h d is c r ep a n c i es by a l l ow i ng b us i nes s es to u t il is e
i nn ov at iv e w eb an d mo b i l e a pps of th e ir ex is t i ng pr ogr a ms v i a a s erv ic e or A PI
l ay er .
ty
“W he n y o u g o t o I B M , y ou ge t a n i nt eg ra te d I B M s o lu t io n . W he n y o u g o to H P , th ey
l ea d w it h a H P s o l ut i o n. Bu t wh e n y o u s ay , ‘ I a lre a dy h av e D e l l s er v ers , a n d I ’d l ik e
to a d d H P s tor a ge , ’ th at c a n b ec om e pr o bl e ma t ic , a n d th a t’s wh er e th e i n te gr at i on
c ha l l en g e c o mes fr o m, ” - Ro g er Ch a n ni n g , Ch i ef T ec h n o lo gy O f fi c er at C o ge n t
si
In br o ad s ens e , an or g an is at i o n s e lec ts a l o a d of pro d uc t l i n es fro m a s p ec if ic
ret a i ler , o n ly to d is c ov er th a t th e s t ac k is e it her v ery c o mp l ex t o m a in ta i n or d o es
no t m ee t t he ir n e eds . I t is c r i t ic a l t o s e l ec t t h e r i gh t s e t of p ro d uc ts f or y o ur
er
c om p any . Th e c o m mo d ity s e l ec t e d ou g ht t o be c ap a bl e o f i nt e gra t i ng w i th ot he r
s y s te ms or pr o d uc ts , e it h er th r o u gh a w e b s e rv ic e l ay er or thr o ug h th e us e of
l ibr ar i es . T h is wi l l as s i s t bus i n es s es in av o i d i ng a n ot h er m on o l it h a nd f or m ul a ti n g
an d d ev el o p in g i m p le me n ta t io ns f or pr es e n t or p ros p ec t iv e pr od uc t l in es .
iv
Che c k Yo ur U nd er st a nding
Un
Fil l in the B l an k
1. __ _ __ _ __ _ _ __ _ is r es po ns i bl e f or i nt e gr at i o n tes t in g .
2. Th e __ _ _ __ _ __ _ __ _ a l lo ws c o m mu n ic a t i on b et we e n s u bs y s t e ms .
3. A _ __ _ _ __ _ __ _ __ is a m or e g en er a liz e d v er s i on o f w ha t i P aa S p ro v i des .
4. A _ __ _ _ __ _ __ _ __ ex tr ac ts d a ta fr o m o ne s y s te m, mo d if i es or f or ma ts it , a nd
th e n s en ds i t t o an o th er s y s te m .
ity
5. __ _ __ _ __ _ _ __ _ as a S er v ic e re f ers to a c o l l ec t i on o f c l o ud - b as e d
i nt egr a t i o n s o l ut i ons t ha t ar e pr i mar i ly us e d for im p l em e nt i ng in t eg rat i ons i n
th e c l o ud .
Tru e- F al s e
m
1. Co m po n en t t es t i ng m a y b e d on e i n is o l at i on fro m res t of t h e s y s te m
de p en d i ng u p o n its l if e c y c l e m od e l.
2. St u bs a nd d r iv er s ar e us e d i n c o m po n en t a n d i nt e gra t io n t es t i ng . Tru e or
)A
fa ls e.
3. In b i g b an g i n te gr at i on , a ll t h e m od u l es are n ot re q u ire d t o b e c o mp l et ed
be f or e in t egr at i o n tes t i ng s t arts .
4. St u bs a nd d r iv er s ar e us e d i n b i g b an g i n te g rat i on .
5. Th e go a l o f i nt e gr a t io n t es t i ng is to f i n d de f e c ts i n c om m u nic a ti o n be tw e en
tw o m od u l es r at h er th an s ee i ng if mo d ul es a re wo rk i n g c orr ec t ly .
(c
Su mm ar y
e
Sy s t e m i n te gr at i on is mu l t id i m ens i o na l a n d c ou l d b e a d dr es s e d u s i ng
v ar io us ar c h i tec tu r a l c onc e pts , l i m it o n t he a mo u nt an d es s e nc e o f el e me n ts
th at mus t b e l ink e d.
lin
• In te gr at i o n P l at for m a s a S erv ic e r ef ers t o a c o l l ec t i on of c lo u d - ba s ed
i nt egr a ti o n s o l ut i o ns t ha t ar e pr im ar i ly us e d f or des i g ni n g a n d i m p le m en t in g
s ea m l es s i nt e gr a t io n i n th e c l o ud .
• i Pa a S is be n ef ic i al i n a v ar i ety o f w ay s . I t's a d ap ta b l e, v er s a t il e , an d
s c a la b le . I nt e gr a t io n op er at i o ns ar e d ig i ta l i z ed w i t h i P aa S , a l lo w i ng f or t h e
On
l ink a ge o f s of tw ar e a n d p r oc es s es u t i l iz e d i n a ny s urr o un d in gs a n d a l l ow i n g
for s h or ter c ons tr uc t i o n d el iv ery .
• As f or f la ws , t h er e ma y b e s ec ur ity c o nc ern s , l ik e any c lo u d p la tf or m.
A hy br i d i nt e gr a t io n p l at for m (H I P) s e e ms t o b e a mo re ge n era l iz e d v ers i on
of w h at i P a a S pr ov i des . It is a c o l lec t i on of i nt e gr at i on s o f tw are t h at
i nc l u des bu i lt - i n c a p ab i l it i es f or m ak i n g o n - pre m is es a nd c l ou d - bas e d
s o lu t io ns wor k t og e th er as a s i n g le u n it . T he E S B arc h it ec t ur e c a lls f or t h e
dev e l op m en t of a s ep ar a t e s p ec i al iz e d s u b s y s te m — a n e nt er pri s e s e rv ic e
ty
bus — th at ac ts as a s i mp l e us er i nt er fac i a l r eg i o n l ink i n g ot h er s u bs y s t e ms .
• Th e h ub - a nd - s p ok e mo d e l is a m ore adv anc e d ty pe of in te gr at i on
arc h i tec t ur e t h at ad dr es s es p o i nt - to- p o in t is s ues w h i le av o i d in g t he
s tar /s p a gh e tt i m es s . B ec a us e t h e li nk s b et w ee n a l l s u bs y s t e ms ar e h a nd l e d
on e a n ot he r .
• si
by a c e n tr a l hu b ( m e s s ag e br ok er) , th ey d o n ot c om m un ic at e d i rec t ly w i th
P oi n t- t o- po i nt i nt e g r at i on ( P 2 P) is an in te gr at e d d ev e l o p me n t
er
env ir o nm e nt wh er e in ev er y s y s te m is c l os e l y a tt ac he d t o ot he r a pp l ic at i ons
an d s y s te ms w it h wh ic h it m us t c o l la b or at e an d s ha re d at a. A PIs , we b -
ho ok s , or c us t o m c o de c a n b e us ed t o i m p le me n t th is m o de l .
iv
Act iv it y
G et d iv i de d i n to t h e g r ou p o f 5 a nd pr e pa re a pr es en ta t io n o n v ar i ous m e th o ds of
s y s te m i nt e gr at i on .
Un
Q ue sti on and E xe r ci s e
1. D ef i n e th e N ee d f or u p gr a d at i on of t he s y s te m.
2. D is c us s th e Sy s t em i n te gr at i on ap pr oac h e s .
ity
3. Ex p la i n t he D e pl oy m en t o pt i ons f o r in te gr a te d s y s t ems .
4. D is c us s th e K ey s t e ps of s y s t e m i nt e gra t i on .
5. D is c us s Sy s t e m i nt e gr a t io n m e th o ds
m
6. Ex p l a in t h e B en e fi ts a n d c ha l l en g es of s y s te m i nt e gr at i on
)A
G lo ss a ry
e
i nt egr a ti o n s of tw ar e th at inc l ud es b u i lt - i n c a pa b i l it i es for m a k i ng o n -
pre m is es a nd c lo u d - b a s ed s ol u ti o ns wo rk to g et h er as a s i n g le u n it .
• Th e E S B a rc hit e ct u r e e nt a i ls th e dev e lo p me n t of a s e p ara t e s pec i a l iz e d
lin
s ubs y s t em — a n e nt e r pr is e s erv ic e b us — th at s erv es as a c o m mo n us er
i nt er f ac e l ay er t h at c o nn ec ts ot h er s u bs y s t e ms .
• Th e hu b - a nd - spo k e mod el is a mo re a dv a nc ed ty p e of i nt e gra t i on
arc h i tec t ur e t h at ad dr es s es p o i nt - to- p o in t is s ues w h i le av o i d in g t he
s tar /s p a gh e tt i m es s . B ec a us e t h e r el a ti o ns h i ps a m o ng a l l s u b - s y s te ms are
On
ma n ag e d b y a c en tr a l iz ed l oc a t io n ( m es s a g e br ok er), t hey d o n o t c o nn ec t
d irec t ly w it h o ne a n ot h er .
• Po int - t o - poi nt in t eg r at i on ( P2 P) is an arc h it ec t ur a l p at te rn wh e re in ev ery
s y s te m is c los e ly r e la te d t o a ll o th er s y s te ms o r a p pl ic a ti o ns w i t h w h ic h i t
mus t c o l la b or a te a n d s har e d at a. A P Is , w eb - ho ok s , or c us t om c o de c a n be
us e d t o i mp l e me n t th is m o de l .
ty
Furt he r R ea din g
si
G i bs o n , M ic h a e l C. S m it h
2. Sy s t e ms A n aly s is an d Des i gn Pr in t ed Ac c es s C ard ), H arry J . R os e n b la tt
3. Th e Sy s t ems T h i nk er , A n a ly t ic al Sk i l ls : L ev e l Up Y ou r D ec is i on M ak in g,
Pr ob l e m S o lv i n g, a n d De d uc t i on Sk il ls . No t ic e T h e De t ai ls O t h ers M is s .
er
4. Mo d er n Sy s t e ms A na ly s is an d D es i g n, J e ffr ey A. H of f er, J o ey G e or ge ,
J os e p h S . V a lac ic h
5. Mo d e l in g a n d A n aly s is o f Dy na m ic Sy s t e ms , S ec o n d E d it i on , R a mi n S.
Es f a nd i ar i, B ei Lu
iv
6. Sy s t e ms A n aly s is a n d D es i g n, An O bj ec t - O r i en te d A p pr oac h w it h UM L A l an
De n nis , B ar ba r a W ix o m, D av id T e gar d en
7. Mo d er n Sy s te ms An a l y s is a n d Des i g n, G lo ba l Ed i t io n, J os e p h S Va l ac ic h ,
J oey F . G e or g e
Un
13 . Sy s t e ms An a ly s is An d D es ig n A C o m pl e te G u id e 20 2 0 Ed i t io n, G er ard us
B lok dy k
Fil l in the B l an k
2. Hor iz o nt a l me t ho d
3. Hy br i d i nt e gr a t io n p l at for m (H I P)
4. P oi n t- t o- po i nt I n te gr at i on
5. In te gr at i o n P la tf or m
(c
Tru e/ Fa l se
1. Tru e
2. Tru e
3. Fa ls e
e
4. Fa ls e
5. Tru e
lin
Unit - 2: R equ i re me nt Det e rm in at io n
On
Le ar nin g O b j ect i ve s:
• Des c r i b e t h e R eq u ir e me n ts de f in i t io n .
• Dis c us s t he D e ter m i n i ng r eq u ir em e nts .
• Ex pl a i n th e M aj o r ac t i v it i es i n r e q uir e m en t d et er m in at i o n
ty
• Dis c us s t he R e qu ir e m en t a na ly s is t ec h n i qu e s
• Dis c us s I nf or ma t io n g at h er i n g t ec h n iq u es ) .
• Des c r i b e t h e o n li n e m et h ods /t o ols f or re q u ir em e n t g a th er i ng fr o m us er
• Ex pl a i n th e A u to m at e d d at a c o l l ec t i on
2. 1. 1 . I nt rodu ct ion
si
Th e d et er m in a ti o n o f r eq u ir em e nts an d t h e s tr uc t ur i ng of r e qu i re me nts ar e t wo
er
c rit ic a l c o m p on e nts of s y s te m an a ly s is . I n terv i ew i n g, qu es ti on n a ires , d ir ec t
obs erv at i o n, an d doc u me n t a n a ly s is h av e tr ad i t io n al ly b ee n th e f o ur ma i n me th o ds
us e d by s y s te m a n a ly s ts to ga t her da t a. J AD an d pro to ty p in g a re tw o pro m i ne nt
me t ho ds f or d e ter m i n i ng r e qu ir e me nt s th a t wer e d ev e lo p ed an d b as e d o n prev i o us
tra d it i on a l m e th o ds . A w e ll - s tr uc t ur ed c har a c ter iz at i o n of s y s t e m r eq u ir em e nts c an
iv
Wh at i s Re qui r em ent s?
A r e qu ir e me n t is a n ec es s ar y as p ec t of a n ew s y s t em w h ic h m i gh t i nc l u de d a ta
proc es s i ng or c a pt ur e, b us in es s ac t iv i ty c o ntr o l, k n ow l e dg e pr od uc ti o n, a nd
s up erv is or s u pp or t.
ity
Th e pr oc es s o f d et er m in i n g r e qu ir e m en ts e nt a i ls s t udy i ng th e ex i s ti n g s y s t em a nd
ga t her i n g de ta i ls t o d et er m in e wh a t t h e pr e req u is it es ar e, h o w it ap p ea rs t o w ork ,
or wh er e a dv a nc e me nt s m us t be ma d e.
e
• A na ly s ts us e f ac t - fi n d in g s tr at e g ies , pr ot oty p in g , a nd c om p ut er - as s is t ed
to o ls t o d oc u m en t a n d des c r i b e s y s t e m f e at ur es at th e h ear t o f s y s t e m
lin
an a ly s is .
• It c o ns is ts o f d at a a na ly s is t o d et er mi n e t he r eq u ir em e nt s p e c if ic at i o n,
On
fu nc t i o na l ity of d es c r i pt i ons f or t he n e w s y s te m, an d c l e arl y s t at i ng ho w
muc h i n for m at i o n r eq u ir em e nts w o ul d b e m a de av a i l ab l e.
• It e nt a i ls th e ex am i n at i on of f ac t ua l d a ta , t he u n de rs t an d i ng o f t h e k ey
pre r e q uis i tes , a nd t h e c l as s i f ic a t io n o f r e qu ir em e nt - f ul f i ll m e nt s tr at eg i es .
ty
Th e pr i m ar y g o a l of i nf or ma t io n ga t h er in g me t ho ds is t o as c er ta i n a n
org a n iz a t io n's i nf or ma ti o n r e q ui r e m en ts , wh ic h ar e t he n ut i l is e d by an a ly s ts to
org a n is e a c onc is e S R S t ha t th e us er u n ders ta n ds .
Th e op t i mu m S R S d oc um e nt s h o u ld -
•
• si
be c om pr eh e ns iv e , d ef i ni t e an d j ar g on fr e e.
De f in e d, or g an is at i o na l, s tr a te g ic , a n d fu l f i ls tac t ic a l i n for m at i on ne eds .
er
• res o lv e a ny d is agr e em en ts t ha t m ay ar is e be tw ee n us ers a n d an a ly s ts .
• em p l oy s gr ap h ic al ai d s t o fac i l it a te c o m pr eh ens i o n an d d es i gn .
Int er vi ew ing
Un
• Uns tr uc t ur e d I nt er v i e w - Th e s y s t e m a na ly s t u nd er tak es a qu e s ti o n - a n d-
ans w er s es s io n t o g at her s t a nd ar d s y s t em i nf or ma t io n .
• Str uc tur e d I nt er v i ew - I t i nc lu d es v ar i ous b a s ic q ues t io ns t o w h ic h t h e us er
mus t a ns w er i n e i th er a c l os e ( obj ec t iv e) or op e n ( d es c r ip t iv e) s ty l e.
m
• Th is t ec hn i qu e is of t en th e m os t ef fec t iv e me t ho d of ga i n in g q ua l i ta t iv e
)A
da t a.
• It is b e ne f ic i a l f or t h os e wh o are u na b le to ef fec t iv e ly c om m u n ic a te i n
wri tt e n fo r m o r wh o d o n ot hav e t he o p po rt un ity t o f i nis h a q u es t i on na ir e.
• I nf or ma t io n c a n b e q u ic k ly af f ir me d a nd c r os s - c hec k e d.
• It is c a p a bl e o f d ea l i n g w it h c o mp l ic at e d s u bj ec ts .
(c
• It is s im p l e to d is c ov er k ey pr o b le m s by s o l ic it i n g op i n io ns ;
• It is s im p l e to c o m pr e he n d m a in c h a l le n ges by pr oc ur i n g op i n i ons ;
• It c ov er s u p t h e o p en i n gs i n th e r a ng e s of c o nf us io ns an d red uc es
for thc o m in g d i ff ic ul t ie s .
e
Q ue sti onn ai r es
lin
S uc h a t ec hn i q ue w ou l d b e us e d by a na ly s ts to c o l l ec t k no w le d ge ab o ut
v ar ie d s y s t em is s u es f r o m a l ar ge n u mb er o f p eo p le . Q u es t i on n a ir es are c l as s if i e d
i nt o tw o ty pes .
On
th at c o u ld b e q uic k ly a nd ac c ur at e ly be c ons tr ue d. it c o ul d i nv es t i ga t e a
d if fic u lty an d c o ntr i b ut e to a par t ic u l ar s o l ut i on .
• Clo s ed - end ed Q ue st i onna i re s - It c o nt a i n qu es ti o ns wh ic h are u s ed w h en
th e s y s t ems a n a ly s t e f fic ac i ous ly rec or ds a l l mu t ua l ly ex c l us iv e r es po ns es .
ty
• It is v e r y ef f ic ac i ous i n i nv es t i ga t in g n o n - c o- loc at e d us ers ' i n te res ts ,
be h av ior s , e mo t io ns , a nd op i n io ns .
• It is b e ne f ic ia l t o fi n d ou t h o w m a ny p eo p l e i n a s p ec if i ed p op u l at i on
•
si
s up p or t o r op p os e of a p art ic u l ar c ha rac ter is t ic o f t h e pr op os e d mo de l .
B ef or e giv i n g an y s p e c if ic d ir ec t i o n t o t he s y s te m pr oj ec t, i t is us ef u l to
as c er t ai n t h e ov er a l l o p in i on .
er
• It is m or e d e pe n da b l e a nd ens ur es t he a no ny m ity of c o m m en t s a n d
fe e db ac k .
• It is a de q u at e f or s e lec t in g c re d i b le da t a a n d pr ov id i n g s ta t is t ic a l
ev id e nc e t h at c o u l d b e e m ai l e d or m a i le d.
iv
Re vi ew of R ec or ds , P ro ce du re s, and Fo rm s
Un
Ben ef its
ity
m
)A
(c
• It e na b l es c o ns u mer s to ac c es s s o me i n for ma t io n a bo u t t h e org a n iz a t io n or
proc es s es b ef or e i mp o s i ng o n o th ers .
e
• It a ids in t he d oc um e n ta t io n of o p era t io n a l p roc es s es i n a br ie f s p an o f ti m e
bec a us e pr oc es s h an db o ok s a n d s tr uc t ur e s c h ar ac t er is e t he l a y ou t a n d
fe at ur es of t h e ex is t i n g ar r an g e me nt .
lin
• It c o u ld pr ov i de a s o li d k n ow l e dg e o f t h e tra ns ac t i ons ha n dl ed in t h e
org a n is a t io n , as w e l l as r ec o g n is e i n for m at i on f or c o mp ut a ti o n an d ev a l u at e
ef fec t iv e n es s .
• Th is c o u l d as s is t a n an a ly s t i n un d ers t a nd i ng t he s y s te m's pr oc es s es t ha t
mus t b e e nd or s ed .
On
• It a ddr es s es t he s it u at i on , t he p arts t h at are i mp ac te d, a nd t h e d es ire d
ou tc om e.
O bs e rv ati on
It is a w ay o f c o l l ec t i ng d at a t ha t i nv o lv es n ot ic i ng a nd s tu dy in g p eo p le ,
oc c ur re nc es , a n d o bj e c ts . T he an a ly s t v is its t h e or ga n is at i o n t o p erc e iv e h o w th e
c urr en t s y s te m w or k s an d t o c o mpr e he n d th e s y s te m's r eq u ir em e n ts .
ty
Ben ef its
• It is a s t r a i gh tf or war d way t o c o l lec t d at a.
si
• It is us e fu l wh e n t h e a ut h e nt ic ity of th e da ta c o l lec t ed is c a ll e d in to
qu es ti o n, or w h en t he c om p l ex i ty of c ert a i n as p ec ts o f t he s y s te m pr ev e nt s
c l ear ex p l an a ti o n by e nd - us ers .
•
er
It ge n er a t es qu i t e v a li d a nd pr ec is e i nf or ma t i on
• It y i e l ds a ll t h e fac e t o f r ec o rds t h at ar e i ns u ff ic ie n t an d o ut m o de d.
It is a nov e l I BM t ec h n iq u e th at us es or g an is ed a n d i nt e ns iv e w o rk s ho ps t o br i ng
ow n ers , us er s , a n aly s t s , d es i g ne r s , a n d b u i l ders to g et h er to d ef i n e a nd des i g n t he
s y s te m. J AD - tr a in e d a na ly s ts wh o h av e s om e s p ec i a l is e d s k i l ls s e rv e as w ork s h o p
Un
fac i l it at ors .
Ben ef its of J A D
• I t k ee ps c os ts d ow n by s u bs ti t ut i ng l e n gt hy tr ad i ti o n al i n terv i ew pr oc es s a n d
fo l l ow - u p me e ti n gs .
It is b e n ef ic ia l in c o r p or a t e s tr uc t ure t h at e n dors es m u tu a l c o nf l ic t res o l ut i o n.
• Pr om o tes p r o fes s i o n a l r e la t io ns h ip a m o ng work ers a t a l l l ev e ls .
ity
• T h is c o ul d r es u lt t o t he c r ea t iv e dev e lo p m e nt o f a d es ig n ; •
• I t E n ab l es ex p los iv e gr o wt h a n d e nh a nc es au t hor i ty of in f orm a ti o n m an a ge m en t.
S ec ond ar y R e se a rc h or B ac kg ro und R ea di ng
m
By ac c es s in g t he g l ea n ed in f orm a ti o n, t h is proc es s is f re q u en t ly us ed f or
i nf or ma t io n g at h er in g. It c on ta i ns s uc h a n or i gi n a lly c ol l ec te d i nf or ma t io n fr o m a ny
for e ig n or do m es t ic s o ur c e t h at t h e m ark e t er h as us ed .
)A
Ben ef its
• It is mor e e as i ly ac c es s i bl e g iv en t h e a bu n da nc e of t he in t ern e t.
• It pr ov i d es c r i tic a l i nf or ma t io n w it h r e d uc e d m o ney a n d ef f ort .
•
(c
e
lin
Fe as ib ili ty A na ly s is
On
ne w s y s t em , a nd pr o d uc in g s tr ea m l in e d f ore c as ts f or f urt h er s y s te m d ev e l o pm e nt .
Ben ef its
• It is us ed t o s k e tc h ou t t h e pr o b le m an d d et er m in e w h et h er a v i ab l e or s u i ta b l e
s o lu t io n c a n b e fo u nd .
ty
• T h e pr im ar y g o a l of a fe as i bi l i ty s tu dy is t o d et er mi n e th e s c o p e of t h e pr ob l em
rat h er th a n to s olv e i t.
si
•Th e o u tc o m e o f a f eas i b i li ty a n a ly s is is th at a for m a l s y s t em pro p os al ac t as
dec is i on d oc u m e nt th a t i nv o lv es th e c o mpr e he ns iv e c h ar ac t er is t ic s an d fe at ur es of
th e pr op os e d fr a m ew o r k .
er
2. 1. 2 . Req ui r em ent s def init ion
iv
Un
ity
m
)A
(c
e
lin
On
ty
si
er
iv
Un
De f in i ti o n o f r eq u ir em en ts is b o th a n ar t a nd a s c i enc e. It n ec e s s it a tes a na ly s ts
work i n g d ir ec t ly wi t h c l ie n ts an d dr a wi n g on t h e ir c o mm u n ic a t i on an d t ec h n ic a l
ab i l it i es t o unc ov er u nd er p in n i ng c l ie n t re q u ire m en ts t h at a s y s t em s o l ut i on c ou l d
ity
As prev i o us ly m en t i o ne d , a n it er at iv e pr o j ec t s t ra te gy m ig h t w e ll b e re q u ire d ,
wh er e in r e pe a te d s e qu e nc es o f R e qu ir e m en ts De f in i ti o n, Sy s t em D es ig n, a n d
Sy s t e m B u il d p has es wo u l d pr ogr es s iv ely de f in e a nd b u i ld t h e s o lu t i on i n a n
)A
it er at iv e or s p ir a l a ppr oac h .
s ta g es 1 - 4 ( De f in e F u nc t i on a l R e qu ir e m en ts , D ef i ne N on - Fu nc t i o n a l R eq u ir em e nts ,
an d C on d uc t Ex is t i ng S o l ut i on I nv en t ory a nd G ap A na ly s is ) b e ov er l ap p ed a n d
ex ec u te d c o nc u r r e nt ly wi t h a f in is h - t o- fi n is h r e li a nc e on t h e pu b l ic at i on .
S ol u ti o n r eq u ir em e nt s ar e c l as s if i e d a s " Fu nc t i on a l" or " No n - F un c t i on a l."
Fu nc t i on a l r e q u ir e m e nts de f in e w h at t h e s o l ut i o n m i gh t b e a b le t o do . N on -
e
Fu nc t i on a l r eq u ir em e nts ar e t hos e t h at are r e q uir e d f or t h e s ol u ti o n t o be
i nc or p ora t ed an d e n d or s e d b u t do no t c h a rac t er is e th e i n na t e b us in es s is s u e or
op p ort u n ity t o b e r ec t if i e d. F u nc t i on a l r eq u ir em e nts ar e d et er m i ne d i n a m a nn er
lin
th at e n ab l es th e m t o be in d ep e nd e nt o f a s pec i f ic t ec hn o l og ic a l i mp l e me n ta t io n s o
as t o b et t er c om pr e h en d t he c o ns um er's pro b l em a tic are a b ef o re for m u la t in g a
re me dy . T h ey c h ar ac t er is e th e a b i l it i es a n d f ea tu res of t h e n e c es s ary s o lu t io n
rat h er t h an s p ec if ic s of tw ar e f e at ur es . F o r ex am p l e, a F unc t io na l r e qu ir e me n t
m ig ht be : “ Th e s y s t e m s h a ll ac c e pt a s tu de n t r e gis tr at i on f or a c l as s ” or “T he
On
s y s te m s h a l l au t om a ti c a lly r ou t e th e a pp rov a l of a purc h as e r eq u i s it i o ns to a pre -
des i g na te d s i g n in g a ut hor i ty fo r a p art ic u lar un i t”.
Dur i n g t h e a na ly s is pr oc es s , r e qu ir e me nt s m us t al w ay s b e e mp h as is e d . It is
ac c o m p l is h e d pr i m ar i l y by c at e go ris i n g an d as s es s i n g ev ery r e qu ir em e nt w it h th e
he l p o f c ons u m er i ns ig ht a n d th e re q u ire m en t 's c os t - be n ef i t r at i o. A s a n i ns t a nc e :
Req ui r em ent
ty
De s cr ipt ion
P rio r ity
si
of li tt l e us e or b e ne f it
De m ons tr ab l e e ff ic i en c y , c os t s av in gs , or i nc o m e pr o duc i ng
Pr ef err ed
er
r eq u ir e me nt
Ca nc el To o c o mp l ex or c os t ly , or n o v a l u e ad d
▪ Th e an a ly s t mus t a ls o c h oos e t he me th o d fo r g at h e r in g d at a t ha t wi l l b e us ed
to c a p tur e r e q u ir e m en ts as a f i n al c o ns id er at i on . C us t o me rs m ay b e
i nt erv ie w ed in d iv id u a l l y , i n s m a ll gr ou ps , du ri ng f ac i l it at e d w ork s es s io ns , or
)A
i n s om e c o mb i n at i on of t hes e m et h ods . T h e ex ac t ap pr o ac h a n d s e qu e nc in g
of wo r k m us t b e de t er mi n ed a n d a gr ee d up o n w i th t he c l i en t i n or d er t o
m in i m is e d is r u pt i o n to t he ir da i ly o p era t io ns w h il e m ax i m is i n g p art ic ip a ti o n of
k ey s t ak e h ol d er s a n d s u bj ec t ma tt er ex p er ts . Bec a us e th e S o l ut i on C o nt ex t
Di a gr am s e r v es as a b o un d ary a nd b as e l i n e f or t h e an a ly s is ef for t, it is
s tro n gly adv is e d th at i t b e c r e at e d i n a f ac il i ta t ed w ork s es s i o n w it h th e
(c
l arg es t nu m be r of c us t om er re pr es en ta t iv es an d t he Pr oj ec t S po ns or pr es e n t.
▪ Conf ir m t he a va il abi lit y of User Sub j ect Ma tte r Ex pe rts fo r
Req ui r em ent s De f in it ion.
e
Th e f ir s t c r it ic a l s t ep in de f in i ng r e qu ir e m en ts is i de nt i fy in g t h os e pe o p le
wh o u n der s t an d t h e pr ob l e m d o ma i n a n d c a n s p e ak w it h a ut h or ity a b o ut t h e
c l ie n t's an d c us t o m er c o ns t it u enc y 's ne e ds . Wh e n a s ol u ti o n wi l l s erv e a
lin
l arg e an d div er s e s e t of c us t o mers , it w il l b e n ec es s ary t o c o l l ab ora t e w it h
c l ie n t l e ad er s h ip t o i de n ti fy a s ubs e t o f c us t o mers wh o c a n ad e qu a te ly
rep r es e nt t he la r g er s et o f c us to m ers wh o w i l l us e t h e IT s o l ut i on .
On
▪ Cr e at e a So lut ion Co nt e xt Di ag r am
It is nec es s ar y t o c r e at e a gr a p hic a l re pr e s en t at i on of t he i nt er fac es a n d
bo u nd ar i es o f t h e pr ob l e m ar e a or pr oc e s s t o be a na ly z e d. T he c o nt ex t
d ia gr am mus t d e pic t a l l k n ow n a n d re l e v an t ex ter n a l a ge nts or ac t ors
(or ga n iz a t io ns , s y s t em s , r o l es , ex t ern a l p roc es s es , a n d s o on ) as we l l as th e
maj or i n for m at i on s tr ea ms i n a n d ou t o f t he a re a f or th e e x c ha n ge of
i nf or ma t io n or r es p o ns e to ev e nts .
ty
• Cr e at e a P ro ce s s Mo del
Ex c el l e nt tr e at is es o n th e d ev e l o pm e nt of pr oc es s mo d e ls h av e be en w ri tt e n,
an d a c o m pl e te ex pl a na t io n is f ar be y o nd t he p urv ie w o f t h is h a nd b ook . T he
si
go a l o f c r e a ti n g a pr o c es s m o de l is t o c o m p reh e n d th e ef for ts b e i ng m ad e as
we l l as t he d ut i es of th e nu m er ous ac t ors in t he pr oc es s . Fu nc t i on a l
Dec o mp os it i o n D i a gr a ms an d Cr os s - F unc t i on a l W ork f l ow m o d el s m us t b e
dev is e d w it h c us t o me r s ubj ec t m at t er ex p ert s i n c as es wh er e t h e p roc es s f l ow
er
as p ec t of t he pr o b l e m d om a i n is s i gn i f ic an t. A F u nc t i on a l D e c om p os it i on
Di a gr am may b e s u ff ic ie n t i n s i mp l er c as es to par t it i on , d ec o mp os e, an d
des c r i b e th e ac t iv i t ies o f t h e ar ea u n d e r s t udy . T h e ex t e nt o f a po t en t ia l IT
s o lu t io n is c a lc u la te d by a na ly z i ng t h e ex i s ti n g s ta te pr oc es s m od e l to t h e
v i ab l e v is i o n o r " To B e" pr oc es s m o de l th at th e c l ie n t ex p ec ts th e ne w IT
iv
s o lu t io n t o s up p or t .
• Cr e at e a Hig h - L ev el Dat a Mo de l
Un
▪ Cr e at e U s e Ca s e s
Us e Cas es fac i l it a te t he tr ans i t io n fr o m t h e proc es s m od e l t o th e h u m an -
s y s te m in t er ac t io n t h at wi l l be s u pp or te d by t he IT s ol u ti o n. H i g h - lev e l
)A
A pp l ic at i on Dev e l op er s t o d ev e lo p mor e d et a i le d Us e C as es d ur in g t h e
Sy s t e m D es i g n P h as e .
Def in ing Fun ct i on al Req ui r em ent s
e
As a res u lt of t he pr ec ed i n g ac t iv it i es i n t his s t ag e , f u nc t i o na l re q u ire m en ts w i ll be
d is c ov er ed t hr o u gh a c om b i na t io n of c o nv er s at i ons w it h c us t o mer s an d a na ly s is of
th e c o nt ex t m o de l , p r oc es s mo d e ls , d at a mo d e l, a n d us e c as e s . T he B us i n es s
lin
A na ly s t s i mp ly d oc um en ts th es e Fu nc t i o na l R eq u ir em e nts d ur i ng t his ac t iv ity in
pre p ar at i on for m or e f or ma l r eq u ir em e nts s p ec if ic at i on , gr o up i n g, an d r ank i n g l a ter
i n th e s t ag e.
On
No n- f u nc t i o na l r e q ui r e me n ts i nc l u de al l o f th e c ha rac te ris t ic s th at t he s o l ut i o n m us t
hav e i n or der t o b e u s ab l e, f as t , r e l ia b l e, s ec ur e , an d a pp e a li n g to us ers . D ur i ng
th is s t ag e , th e t ea m wi l l i d en t ify , c at e go ris e, a n d pr io ri t is e t h e v a r io us ty pes o f
req u ir e me nts .
ty
If th e tec h no l o gy pl a tf or m r e q u ir e d t o s u p po rt t h e s o l u ti o n is k no w n at th is p o in t, i t
s ho u l d be s p ec if i ed . It is ex pec t ed t ha t i n m any c as es , t h e s ol ut i on w i l l be a n
ex t e ns i o n of a n ex is ti ng I T S er v ic e , an d t hu s t he t ec hn o lo gy p l at f or m r eq u ir em e nts
wi l l b e k n o wn . D ur in g th is ac t iv ity , c urr en t IT Arc h i tec t ure s t a n dar d s s h o u ld als o b e
c ons i d ere d .
req u ir e me nts .
▪ Def in e P e rf o rm an ce Req ui r em ent s
▪ A ny s y s te m p er for m anc e a n d v o lu m et ric i n for m at i o n (r es po n s e t im e ,
tra ns ac t i on v o lu m es a nd c y c l es , c onc urr en t us ers , d at as et s iz e a nd gr ow th
rat e, ar c h iv a l n ee ds , e tc .) th at c a n b e us e d t o d ef i n e t h e p erf or m a nc e n ee ds
an d m et r ic s f or t h e s o l ut i on s ho u ld be c a p tur ed an d es ti m at e d by t he t e am .
▪ Det e rm in e S ec ur it y, Leg al , R egul at or y, an d Co mp li an ce R eq ui r em ent s
ity
th at mus t b e m et w it h i n th e s y s t em des i g n.
▪ Det e rm in e t h e IT B ud get Co nst r ain ts on th e So lut ion
▪ If t he s o l ut i o n has any ex is t in g b ud g et c o ns tr a i nts , t h es e s ho u l d be
i de nt i f ie d i n th is ac t i v ity t o g ui d e d ec is i o n m ak in g a nd t h e ge n era t io n o f
)A
s o lu t io n o pt i o ns . T he te a m s h ou l d a ls o as s e s s t he f e as ib i l ity of m ee t in g t he
s o lu t io n r e qu ir e me n ts i n l ig h t of th e c l i en t's f in a nc ia l c o ns tr a in ts an d
ex p ec ta t io ns .
(c
Non - F unc t io na l Re qu ir em ent s M ust B e Do cum ent ed
e
Th e Bus i n es s A na ly s t d oc u me nts t h e N o n - F unc t io n a l r eq u ir em en ts d is c ov er e d
dur i n g th is s t a ge .
lin
3. Co ndu ct an i nv ent or y o f ex i st in g sol uti ons a nd a ga p an al y s is .
Th e fu nc ti o na l an d n o n - f u nc t i on a l re q ui re m e nts s h o u ld be ma p pe d a g ai ns t ex is t i n g
On
IT s erv ic es a nd s o lu t i ons to s ee if an ex is t i ng s o lu t io n c a n b e r e us e d , p art i a lly or
c om p l et e ly , t o m ee t t h e n ee ds o f th e c l i en t.
ty
• Cr e at e St rat eg i es t o Clo s e So lut ion G a ps
si
ga ps b et we e n t h e r e q u ir e m en ts a nd t he ex i s ti n g s ol u t io n. T hir d - p arty " b o lt - o ns " o r
ad d it i o na l m o du l es f o r s o ft war e p ac k ag e s o lu t io ns , us e o f ot h er ex is t i n g s o lu t io n
c om p on e nts , o r c us to m d ev e lo p me n t a n d i nt erf ac e d ev e lo p me n t are ex am p l es o f
th es e s tra te g i es .
er
• Sp e cif y t he Sol ut io n G ap R equ i re me nts
Th e fu nc t i o na l g a ps i n th e s o l ut i on a n d th e s tr at e gi es f or a ddr es s i ng t he m s h o u ld
iv
be r ef i n ed i nt o a s et o f s o l ut i on ga p r eq u ir e me n t s t at e me nts th a t wi l l be i nc l u de d in
th e f in a l R eq u ir em e nts S p ec if ic at i on doc u me nt .
4. Sp ec ify R eq ui r em e nt s
Un
Th e fu nc t i o na l g a ps i n th e s o l ut i on a n d th e s tr at e gi es f or a ddr es s i ng t he m s h o u ld
be r ef i n ed i nt o a s et o f s o l ut i on ga p r eq u ir e me n t s t at e me nts th a t wi l l be i nc l u de d in
th e f in a l R eq u ir em e nts S p ec if ic at i on doc u me nt .
▪ Req ui r em ent s Com pi l at i on
Ev en i n a m ed i u m - s i z ed pr oj ec t, th e nu m ber o f re q ui re m en ts c ap t ure d c an b e
d if fic u lt to ma n ag e a nd ev a l u at e w it h t h e c li e nt t e a m. T o a i d in t h is pr oc es s ,
req u ir e me nts s h ou l d be s p ec i f ie d in a c o n s is t e nt , s tr uc t ur ed m a nn er t o f ac i l it at e
ity
an d c ri t ic al i ty .
▪ Imp le me nt a t io n G rou p a nd P ha s e Re qui r e ment s
S om e r e q uir e m en ts wi l l s h ar e lo g ic a l d ep e nd e nc ies a n d af f i ni ty . Wh e n
c ons i d er in g t h e s c o p e of th e i ni t ia l s o l ut i on to b e i m p le m e nt ed , t h e t e am s h ou l d
)A
e
Th e R eq u ir em e nts S p ec if ic at i on was pu b l is he d a n d d is tr ib ut e d f or rev i ew to t h e
c l ie n t an d k ey s tak e ho l der s d ur i ng t h is ac t iv i ty . Doc u m en t v ers io n c on tr ol is c r it ic a l
i n th is a n d l at er s t ag es as f ee d bac k f ro m mu l t ip l e s t ak e h ol d ers is r ec e iv e d a nd
lin
c orr ec t i ons ar e m a d e. As a r es u lt , it is s ug ges t ed th a t a s i ng l e t ea m m em b er b e
as s ig n ed t o m a na g e v er s io n c o nt ro l f or t he Re q ui re m en ts S p ec if ic at i on doc u m en t
as we l l as t h e r ec or d i n g of t h e a ppr ov a l proc es s for agr e ed - u p on c ha n ges .
5. O bt ai n Req ui r em e nt s Ap pr ov al
On
Condu ct a re v iew of t he r equ i re me nts w ith th e spon so r s.
ty
Is s u es r ais e d d ur i ng t h e R e qu ir e me n ts Rev i ew s h ou l d b e d oc u m en t ed i n t h e
Pr oj ec t Is s ue lo g by t h e Pr oj ec t M a na g er a n d a ddr es s e d i n a s y s t em a tic m an n er by
th e t e a m. T o av oi d gr i dl oc k a nd " a na ly s is p ara ly s is ," is s u es s ho u l d b e pr io ri t iz e d
an d w ei g ht e d in r e l at i on t o th e s et o f pr ior i t iz ed re q ui re m en ts . Be f ore m ov i ng o n to
si
th e nex t ph as e, t he p r oj ec t t e a m a n d s po n s or s ho u l d s tr iv e t o r es o lv e a ll m aj or
is s ues . M i no r is s u es c an b e p os t p on e d a nd ad dr es s ed dur i n g t he s o lu t io n re l e as e
p la n ni n g pr oc es s .
er
O bta in t he Spo nso r' s Aut ho riz at i on of th e Req ui r em ent s
th e R eq u ir em e nts Sp e c if ic at i o n.
Un
A r e qu ir e me n t is a n ec es s ar y as p ec t of a n ew s y s t em w h ic h m i gh t i nc l u de d a ta
proc es s i ng or c a pt ur e, b us in es s ac t iv i ty c o ntr o l, k n ow l e dg e pr od uc ti o n, a nd
s up erv is or s u pp or t.
Th e pr oc es s o f d et er m in i n g r e qu ir e m en ts e nt a i ls s t udy i ng th e ex i s ti n g s y s t em a nd
ga t her i n g de ta i ls t o d et er m in e wh a t t h e pr e req u is it es ar e, h o w it ap p ea rs t o w ork ,
ity
or wh er e a dv a nc e me nt s m us t be ma d e.
Si gnif i ca nt Init i at i v e s in t he Pe r s ev e ra nc e o f Req ui r em e nt s
Anti c ipa tion of R equ i re m ent s
• I t pr ed ic ts s y s te m c h ar ac t er is t ic s b as e d o n pr ev io us ex p er ie nc e, s uc h as s pec i fic
pro b l ems or fe a tur es a nd s y s t e m r e qu ir e me n t s f or a n ew s y s t e m.
m
Th is c ou l d r es u lt t o an a ly z at i on o f as pec t s t ha t an in ex per i e nc ed a n a ly s t w o u l d
ot h erw is e ov er l ook . H ow ev er , if s h ortc uts a re o b ta i ne d an d pr ef e renc e is in i t ia te d
dur i n g th e i n qu ir y , m a nd a te es t im a t io n m i gh t w e ll be c o m pr om is e d.
)A
• It is r es e ar c h in g t h e ex is t i ng m od e l an d d es c r ib i n g i ts c har ac t e ris t ic s fo r
fu tur e us e.
•
(c
A na ly s ts us e f ac t - fi n d in g s tr at e g ies , pr ot oty p in g , a nd c om p ut er - as s is t ed
to o ls t o d oc u m en t a n d des c r i b e s y s t e m f e at ur es at th e h ear t o f s y s t e m
an a ly s is .
Req ui r em ent s De s c ri pt ion
e
• It c o ns is ts o f d at a a na ly s is t o d et er mi n e t he r eq u ir em e nt s p e c if ic at i o n,
fu nc t i o na l ity of d es c r i pt i ons f or t he n e w s y s te m, an d c l e arl y s t at i ng ho w
muc h i n for m at i o n r eq u ir em e nts w o ul d b e m a de av a i l ab l e.
lin
• It e nt a i ls th e ex am i n at i on of f ac t ua l d a ta , t he u n de rs t an d i ng o f t h e k ey
pre r e q uis i tes , a nd t h e c l as s i f ic a t io n o f r e qu ir em e nt - f ul f i ll m e nt s tr at eg i es .
On
Th e pr i m ar y g o a l o f f ac t - f i nd i n g m e th o d s is t o as c er t ai n a n or g an iz a ti o n's
i nf or ma t io n r e qu ir e m en ts , w h ic h ar e t he n ut i l is e d by a n aly s t s to o rg a nis e a
c onc is e S R S th a t th e us er un d er s t a nds .
Th e op t i mu m S R S d oc um e nt s h o u ld -
• be c om pr eh e ns iv e , d ef i ni t e an d j ar g on fr e e.
ty
• De f in e d, or g an is at i o na l, s tr a te g ic , a n d fu l f i ls tac t ic a l i n for m at i on ne eds .
• res o lv e a ny d is agr e em en ts t ha t m ay ar is e be tw ee n us ers a n d an a ly s ts .
• em p l oy s gr ap h ic al a i d s t o fac i l it a te c o m pr eh ens i o n an d d es i gn .
si
er
Int er vi ew ing
th e m. T he an a ly s t c o u ld b e pr o fes s i o na l , p res c r ip t iv e , p o l it ic al , or c as ua l , as t he
ef fec t iv e n es s of an i nt er v ie w is de p en d e nt o n t h e a n a ly s t's ex p er tis e as an
i nt erv ie w er .
Un
• Uns tr uc t ur e d I nt er v i e w - Th e s y s t e m a na ly s t u nd er tak es a qu e s ti o n - a n d-
ans w er s es s io n t o g at her s t a nd ar d s y s t e m i nf or ma t io n .
• Str uc tur e d I nt er v i ew - I t i nc lu d es v ar i ous b a s ic q ues t io ns t o w h ic h t h e us er
mus t a ns w er i n e i th er a c l os e ( obj ec t iv e) or op e n ( d es c r ip t iv e) s ty l e.
ity
• Th is t ec hn i qu e is of t en th e m os t ef fec t iv e me t ho d of ga i n in g q ua l i ta t iv e
da t a.
m
• It is b e ne f ic i a l f or t h os e wh o are u na b le to ef fec t iv e ly c om m u n ic a te i n
wri tt e n fo r m o r wh o d o n ot hav e t he o p po rt un ity t o f i nis h a q u es t i on na ir e.
• I nf or ma t io n c a n b e q u ic k ly af f ir me d a nd c r os s - c hec k e d.
)A
• It is c a p a bl e o f d ea l i n g w it h c o mp l ic at e d s u bj ec ts .
• It is s im p l e to d is c ov er k ey pr o b le ms by s o l ic it i n g op i n io ns ;
• It is s im p l e to c o m pr e he n d m a in c h a l le n ges by pr oc ur i n g op i n i ons ;
• It c ov er s u p t h e o p en i n gs i n th e r a ng e s of c o nf us io ns an d red uc es
(c
for thc o m in g d i ff ic ul t ie s .
Q ue sti onn ai r es
S uc h a t ec hn i q ue w ou l d b e us e d by a na ly s ts to c o l l ec t k no w le d ge ab o ut
v ar ie d s y s t em is s u es f r o m a l ar ge n u mb er o f p eo p le . Q u es t i on n a ir es are c l as s if i e d
e
i nt o tw o ty pes .
lin
th at c o u ld b e q uic k ly a nd ac c ur at e ly be c ons tr ue d. it c o ul d i nv es t i ga t e a
d if fic u lty an d c o ntr i b ut e to a par t ic u l ar s o l ut i on .
• Clo s ed - end ed Q ue st i onna i re s - It c o nt a i n qu es ti o ns wh ic h are u s ed w h en
th e s y s t ems a n a ly s t e f fic ac i ous ly rec or ds a l l mu t ua l ly ex c l us iv e r es po ns es .
On
Ben ef its of Q u e st io n nai r e s
• It is v e r y ef f ic ac i ous i n i nv es t i ga t in g n o n - c o- loc at e d us ers ' i n te res ts ,
be h av ior s , e mo t io ns , a nd op i n io ns .
• It is b e ne f ic ia l t o fi n d ou t h o w m a ny p eo p l e i n a s p ec if i ed p op u l at i on
s up p or t o r op p os e of a p art ic u l ar c ha rac te r is t ic o f t h e pr op os e d mo de l .
ty
• B ef or e giv i n g any s p e c if ic d ir ec t i o n t o t he s y s te m pr oj ec t, i t is us ef u l to
as c er t ai n t h e ov er a l l o p in i on .
• It is m or e d e pe n da b l e a nd ens ur es t he a no ny m ity of c o m m en t s a n d
si
fe e db ac k .
• It is a de q u at e f or s e lec t in g c re d i b le da t a a n d pr ov id i n g s ta t is t ic a l
ev id e nc e t h at c o u l d be e m ai l e d or m a i le d.
er
Re vi ew of R ec or ds , P ro ce du re s, and Fo rm s
A n an a ly s is o f av a i l ab l e da t a, m et h o ds , a n d f or ma t io n a i ds i n g e ner a ti n g i ns ig h ts
i nt o a fr am e wor k by a na ly s i ng t h e ex is t i n g s y s te m's a b i l it i es , pr oc es s es , or ac t io ns .
Ben ef its
iv
bec a us e pr oc es s h an db o ok s a n d s tr uc t ur e s c h ar ac t er is e t he l a y ou t a n d
fe at ur es of t h e ex is t i n g ar r an g e me nt .
• It c o u ld pr ov i de a s o li d k n ow l e dg e o f t h e tra ns ac t i ons ha n dl ed in t h e
org a n is a t io n , as w e l l as r ec o g n is e i n for m at i on f or c o mp ut a ti o n an d ev a l u at e
ef fec t iv e n es s .
• Th is c o u l d a s s is t a n an a ly s t i n un d ers t a nd i ng t he s y s te m's pr oc es s es t ha t
mus t b e e nd or s ed .
ity
qu es ti o n, or w h en t he c om p l ex i ty of c ert a in as p ec ts o f t he s y s te m pr ev e nt s
c l ear ex p l an a ti o n by e nd - us ers .
• It ge n er a t es qu i t e v a li d a nd pr ec is e i nf or ma t i on
• It y i e l ds a ll t h e fac e t o f r ec o rds t h at ar e i ns u ff ic ie n t an d o ut m o de d.
(c
Joi nt App li c at io n De ve lop me nt ( J AD)
It is a nov e l I BM t ec h n iq u e th at us es or g an is ed a n d i nt e ns iv e w o rk s ho ps t o br i ng
e
ow n ers , us er s , a n aly s t s , d es i g ne r s , a n d b u i l ders to g et h er to d ef i n e a nd des i g n t he
s y s te m. J AD - tr a in e d a na ly s ts wh o h av e s om e s p ec i a l is e d s k i l ls s e rv e as w ork s h o p
fac i l it at ors .
lin
Ben ef its of J A D
• I t k ee ps c os ts d ow n by s u bs ti t ut i ng l e n gt hy tr ad i ti o n al i n terv i ew pr oc es s a n d
fo l l ow - u p me e ti n gs .
It is b e n ef ic ia l in c o r p or a t e s tr uc t ure t h at e n dors es m u tu a l c o nf l ic t res o l ut i o n.
• Pr om o tes p r o fes s i o n a l r e la t io ns h ip a m o ng work ers a t a l l l ev e ls .
On
• T h is c o ul d r es u lt t o t he c r ea t iv e dev e lo p m e nt o f a d es ig n ; •
• I t E n ab l es ex p los iv e gr o wt h a n d e nh a nc es au t hor i ty of in f orm a ti o n m an a ge m en t.
S ec ond ar y R e se a rc h or B ac kg ro und R ea di ng
By ac c es s in g t he g l ea n ed in f orm a ti o n, t h is proc es s is f re q u en t ly us ed f or
ty
i nf or ma t io n g at h er in g. It c on ta i ns s uc h a n or i gi n a lly c ol l ec te d i nf or ma t io n fr o m a ny
for e ig n or do m es t ic s o ur c e t h at t h e m ark e t er h as us ed .
Ben ef its
•
• si
It is mor e e as i ly ac c es s i bl e g iv en t h e a bu n da nc e of t he in t ern e t.
It pr ov i d es c r i tic a l i nf or ma t io n w it h re d uc e d m o ney a n d ef f ort .
er
• It b eh av es as p i on e er t o pr im ary res e arc h an d l i n es up t h e e mp has is o f
pr im ar y r es e ar c h.
• It is us e d by th e r es e ar c h er t o c o nc l u d e if t he r es e arc h is w ort h i t as it is
av a i l ab l e w it h pr oc ed u r es us ed a n d is s u es i n c o l l ec t i ng t h em .
iv
Fe as ib ili ty A na ly s is
Un
Ben ef its
ity
• It is us ed t o s k e tc h ou t t h e pr o b le m an d d et er m in e w h et h er a v i ab l e or s u i ta b l e
s o lu t io n c a n b e fo u nd .
• T h e pr im ar y g o a l of a fe as i bi l i ty s tu dy is t o d et er mi n e th e s c o p e of t h e pr ob l em
rat h er th a n to s olv e i t.
m
St e ps Inv o lv ed in F ea s i bi l i ty A na ly s is
Th e fo l l ow i ng s t e ps ar e to be f o l lo we d w h i le per f orm i n g fe as i bi l i ty an a ly s is −
• For m a pr oj ec t t ea m a nd ap p oi n t a pr oj ec t l e ad er .
• Dev e lo p s y s t e m fl o wc har ts .
• Id e nt ify t h e d ef ic ie nc i es of c urre n t s y s te m a nd s et g o als .
(c
• E nu m er a t e t h e al t er n at iv e s ol u ti o n or po te nt i a l c a n d id at e s y s te m t o m ee t
go a ls .
• De ter m i ne t h e f eas i b i l ity o f e ac h a lt er na t iv e s uc h as t ec h n ic al f eas i b i li ty ,
op er at i o na l f eas i b i li ty , e tc .
•
e
W e ig ht t h e p er f or ma nc e a nd c os t e ff ec t i v en e s s o f e ac h c a n d id at e s y s te m.
• Ra nk t he o t her al t er n a tiv es a n d s e lec t th e b e s t c an d i da te s y s t e m.
• Pr ep ar e a s y s te m pr op os a l o f f in a l proj e c t d ir ec t iv e t o m a na g em e nt for
lin
ap pr ov al .
On
ty
Fe as ib ili ti es of v a ri o us k ind s
si
E cono mi c Fe a sib il it y
• It is as s es s i n g th e ef fec t iv e n es s of th e c an d i da te s y s t e m t hro u gh a c os t - b en e fi t
an a ly s is .
• I t d em o ns tr a tes t h e ne t b en e fi t of t h e c a n d id at e s y s t em in t er ms o f or ga n is a t io n a l
er
be n ef i ts an d c os ts .
• T h e pr im ar y g o al of Ec o n om ic F eas i b il i ty A na ly s is ( E F S) is t o es t i m at e th e
ec o n om ic r eq u ir em e nt s o f a c a nd i d at e s y s t e m b ef or e c o mm i tt i ng i nv es t me nt f u n ds
to a pro p os a l .
iv
• I t pr ef er s t he al t er na t iv e t h at w i l l m ax i m is e t h e or ga n iz a t io n's n et w or th by
ret ur n in g f un ds as s o on as pos s i b le an d w i th t he le as t a mo u nt o f r is k i nv olv e d i n
dev e l op i ng t h e c a nd i d at e s y s t em .
Tec hn ic a l S u it ab i l i ty
Un
• I t l o ok s i nt o t he pr ac tic a l i m p le m en ta t i on o f e ac h de p l oy m e nt o p ti on .
• I t a n a ly s es a n d d e t er mi n es w h et h er or n ot th e s o l ut i on is s u p por t ed by ex is t i n g
tec h no l ogy .
• T h e an a ly s t d e ter m i nes w h et h er ex is t i ng t ec h n ic al r es o urc es s h ou l d b e up gr a de d
or a dd e d to me et t h e n ew r e q u ir e m e nts .
• I t e ns ur es t ha t th e c a nd i d at e s y s te m re s po n ds ap pr o pr ia te ly to t he ex t en t to
ity
wh ic h i t c an s up p or t t h e tec h n ic a l e n ha nc em en t.
O pe r atio na l F e a sib il i t y
• It d e ter m i nes w h et her th e s y s t em is o p era t io n a l ly ef f ec t iv e a ft er i t h as b ee n
dev e l op e d an d im p le m en t ed .
m
• It ens ur es t ha t m a n ag e me n t w i ll s u pp ort t he pr op os ed s y s te m a nd th at it w il l be
op er at i o na l ly f eas i b le i n th e c ur r e nt or g an is a ti o na l e nv ir on m e nt .
• It d e ter m i nes wh et h er t he us er s wi l l b e i mp ac te d a n d w he th er t hey wi l l ac c e pt
mo d if i e d or n ew b us i nes s m et h ods th a t a ff ec t th e po t en t ia l s y s t em b en e fi ts . • I t
)A
e
of a ne w s y s te m .
• I t as s is ts i n d et er m i ni n g w he th er t h e s y s t em r e qu ir es s p ec ia l e ff ort t o e d uc a t e,
retr a i n, tr a ns f er , a nd c ha n ge e mp l oy e e j o b s t at us o n ne w w ay s of c on d uc t i ng
lin
bus i n es s .
S ch edu le F ea si bi lit y
• I t e ns ur es t ha t th e pr oj ec t is c o m p le te d wi t hi n th e ti m e c ons tr a in ts o r s c h e du l e
On
s pec i f ie d,
ty
2. 1. 4 M aj or act i vit ie s in r eq ui r em ent de te r min ati on
si
i nc l u de c er t a in pr o b l e ms or f ea t ures a n d r e q u ire m en ts f or a n ew s y s te m.
• Th is c o ul d r es u lt in t o ev a l u at i on o f as pe c ts t ha t m i gh t g o u nac k n o wl e dg e d
by i nc o m p et en t a na ly s t. H ow ev er, i f s h ortc u t s ar e t ak e n a n d b ias i s
er
i ntr od uc e d dur i n g th e i nv es t ig a ti o n, r eq u ir em en t A nt ic i p at i on m ay b e
c om pr o m is e d.
iv
Requirements Investigation
• At th e he ar t o f s y s t e m a n a ly s is , an a ly s ts doc u me n t a n d d es c r i be s y s te m
fe at ur es us i n g f ac t - f i nd i n g t ec h n i qu es , pr ot oty p i ng , a n d c o m p ut er - a id e d
to o ls .
• I t e nt a i ls th e ex a m in at i on of f ac t u al da ta , t he id e nt i fic a ti o n of c r it ic al
req u ir e me nts , a nd t h e s e lec t io n o f r e qu ir e me nt - fu l f il l m en t s tr at e gi e s .
m
Th e pr oc es s o f d ef i n in g th e ex p ec t at i ons of us ers f or a n a p pl ic at i o n th a t is t o be
)A
bu i l t or m od i f ie d is k n ow n as r e q u ire m en ts a na ly s is . It i nc l ud es a l l of t h e t as k s t h at
are c arr ie d o ut in or d e r t o i de n ti fy t he n e e ds of v ar i o us s tak e ho l d er s . As a res u lt ,
req u ir e me nts an a ly s is en t ai ls a n a ly s i n g, doc um e nt i n g, v a l i da t in g, an d m a na g i ng
s of tw ar e or s y s t em r e qu ir e me n ts . H i gh - q ua l i ty r eq u ir em e nts are d o c um e nt e d,
ac t i on a b le , m eas ur a bl e, t es t a b le , trac e a bl e , a id in t h e i de nt i f ic a t io n of bus i nes s
op p ort u n it i es , a n d ar e de f in e d to ai d i n s y s t e m d es i g n.
(c
P ro ce s s of A na l yz in g R equ ir e men ts
Th e fo l l ow i ng s t e ps / p h as es c om pr is e th e s o ft war e re q ui re m en ts a n a ly s is proc es s :
e
1. I d en t ify i ng r eq u ir e m en ts
lin
2. Ex a m i ni n g r e qu ir e m en ts
3. M o de l i n g of r e q u ir e me n ts
4. R etr os pec t iv e an d r ev ie w
On
1- Re m ov in g r e q u ir e m en ts
1. Eliciting Requirement
E l ic i t in g re q u ir e m e nts r ef er s t o th e pr oc es s o f ga t her i n g r eq u ir e me n ts t hr o ug h
c om m u nic a ti o n w it h c u s to m er s
ty
2. Ex am i n in g r e q u ir e m en t s
3. M o de l i ng of r e q ui r e m en ts si
Th es e is s u es m us t be r es o lv e d b ef ore proc e ed i n g to t h e nex t s t ep .
er
Re q ui re m en ts ar e ty p i c a lly doc u me n te d i n v ar io us f orm a ts s uc h a s us e c as es , us er
s tor i es , n at ur al - l a ng u ag e doc u m en ts , or p roc es s s p ec if ic at i ons i n re q u ire m en ts
mo d e l li n g.
iv
4. R etr os pec t iv e an d r ev i ew
Th is s t ep is t ak e n t o r e f le c t o n p rev i ous i t er at i o ns o f r e qu ir e m en ts g at h er in g in
Un
ord er t o i m pr ov e t he p r oc es s in t h e fu t ure .
ity
m
)A
(c
2. 1. 6 . Req ui r em ent s Ana l ys is T e chn iqu es:
B us i n es s Re q u ir e m e nt s A n a ly s is em p l oy s a v ar ie ty of t ec hn i q ues . Th e fo l l ow i ng is
e
a l is t of v ar i o us bus i n es s Re q u ir e m en ts A n a ly s is T ec hn i q ues :
1. B us i n es s pr oc es s mo d e li n g n ot at i on ( B P MN)
2. UM L (U n if i ed Mo d el i n g L a ng u ag e)
lin
3. Fl owc h ar t t ec hn i qu e
4. Da ta f l ow di a gr am
5. Ro l e Ac tiv i ty D ia gr a ms ( R A D)
6. G a nt t Ch ar ts
7. ID EF ( I nt e gr at ed D e fi n it i o n for F unc t io n M o d e li n g)
On
8. G a p A na ly s is
1- B us in es s pr oc es s m od e l in g n ot a ti o n ( B P M N)
A lt h ou g h B P MN has i ts ow n s y m b o ls a nd e le m en ts , t h is t ec hn i qu e is s i m i lar t o
c rea t in g pr oc es s fl o w c har ts . G r a p hs f or b us in es s proc es s es ar e c re a te d us i n g
bus i n es s pr oc es s m od e l l in g a n d n ot a t io n. T h es e gr ap hs m ak e i t e as ier to
un d ers t a nd t h e b us in es s pr oc es s . B P M N i s a w e l l - k n o wn proc e s s i m pr ov e m en t
me t ho d o lo gy .
ty
2- U ML (U n if i e d Mo d e l i ng L a ng u ag e)
UM L is an i nt egr a te d s et of di a gr ams u s ed t o s p ec ify , v is u a lis e , b ui l d, an d
doc u me n t t he ar t e fac ts of a s o ft w are s y s t em . Wh e n d ev el o p in g o bj ec t - or i en te d
si
s of tw ar e a nd w or k i ng w it h t he s of tw ar e d ev e l o pm e nt pr oc es s , UM L is a us e f ul
tec h ni q ue . U M L e mp l o y s gr a ph ic a l n ot a ti o ns t o re pr es e n t th e d es i gn of a s of tw ar e
proj ec t . U ML als o a i ds i n t he v al i d at i on o f t h e s of tw ar e's ar c h it ec tu ra l des i g n.
er
3- Fl o wc h ar t t ec h ni q u e
A f l o wc h ar t p or t r ay s t he s t ep w is e a pp ro ac h an d c o ntr o l lo g ic o f a fa m i ly o f r e la te d
op er at i o ns . Fl o wc h ar t s c o m e in a v ari e ty o f f or m ats , inc l u d in g l in e ar, c r os s -
fu nc t i o na l , an d t o p - d o wn . T h e f lo wc har t c a n d e pic t s y s t em in t erac ti o ns , d a ta f l ows ,
iv
an d s o o n. F lo w c h ar t s ar e s i m pl e to u nd er s ta n d a n d c a n b e us e d by m em b ers of
bo t h t ec h n ic a l a nd n on - t ec h n ic al te a ms . Th e f lo wc har t t ec hn i qu e is us ef u l f or
h ig h l ig ht i n g th e i m po r t an t as pec ts o f a pr oc e s s .
Un
4- Da t a fl o w d ia g r a m
Th is m et h od is o ft e n us e d to gr ap h ic a l ly c o m m un ic at e i m p ort an t a n d n ua nc ed
s truc tu res a n d pr oc e d ur es . Da t a f l ow d i a gr ams d e p ic t t he f l ow o f d a ta t hr ou g h a
proc es s or s y s t em . It a ls o i nc l ud es th e d at a i np u ts an d o ut pu ts , d at a s tor es , a n d
th e v ar io us s ub pr oc e s s es t h at th e d at a p a s s es t hr ou g h. DF D u s es s t a nd ar d is e d
no t at i ons an d s y m b o l s t o d es c r ib e v a ri o us e nt i t ies an d t h eir r e l at i ons h ips . I t is
eas i er t o id e nt i fy f la ws i n a s y s te m w h en a l l of its c o mp o ne nt s a re v is ua l iz ed .
ity
Th es e f l aws ar e t h en ad dr es s ed i n or d er t o c rea t e a s tr on g s o l ut i o n.
6- G a nt t Ch ar ts
G a nt t c h ar ts ar e c o m mo n ly us ed i n pr oj ec t p la n ni n g bec a us e t h ey pr ov id e a v is ua l
rep res e nt at i on of t he t as k s th at are s c h e du l ed as w e l l as th e t i me l in es . T h e G an tt
c har ts as s is t i n d et er m in i n g wh at is p l an n e d to be ac c o m p lis h ed by wh ic h d at e . A l l
of t h e proj ec t 's tas k s ' s ta r t a nd e n d d at es c a n b e s ee n i n a s in g l e v i ew .
(c
7- ID EF (I n te gr at e d D ef i n it i on f or Fu nc ti o n Mo d e l in g)
Th e I nt e gr at ed d ef i n it i on f or f u nc t i on m o de l l i ng ( ID E FM) t ec h n i qu e us es a box t o
e
rep res e nt th e f e at ur e s of a p r oc e dur e an d i ts re l at i ons h i ps t o c h il d an d p ar e nt
s y s te ms . I t s er v es as a b lu e pr in t f or un d ers t an d i ng a n or g an iz at i o n's s y s t em .
lin
8- G a p A n aly s is
G a p a na ly s is is a t ec h n i qu e f or an a ly s i ng p erf or ma nc e g a p s in a s of tw ar e
ap p l ic a t io n t o as c er ta i n wh e th er or n ot bu s i nes s r eq u ir em e nts are m et . It a ls o
i nc l u des t he s te ps t o b e t ak en to e ns ur e t ha t al l bus i n es s r eq u ir em e nts ar e
s uc c es s f ul ly me t. T he g a p d en ot es t h e d if f ere nc e b et we e n t he c urr en t a nd t ar g et
On
s ta tes . N ee d a n aly s is , n e ed as s es s m en t, an d n ee d - ga p a n a ly s is a re o th er t er ms for
ga p a n aly s is .
ty
Th e m ai n a i m o f f ac t - f in d i ng t ec hn i qu e s is t o d e ter m i ne th e i nf or m at i on
req u ir e me nts o f an o r ga n iz at i on us e d by an a ly s ts t o pre p ar e a prec is e S RS
un d ers t o od by us er .
Id e al SR S D oc um e nt s ho u l d −
•
• si
B e c o mp l et e, U n a mb i g uo us , an d J ar g on - fr ee .
S pec i fy op er at i o na l , ta c tic a l, an d s tr at e gic in for m at i on r eq u ir em e nt s .
er
• S olv e p os s i bl e d is pu t e s b et w ee n us ers a nd a na ly s t.
• Us e gr a p hic a l a i ds wh i c h s i mp l i fy u nd ers t a n d i ng a n d d es i g n.
Th ere are v a r i o us i nf o r m at i on g a th er i ng t ec h n iq u es −
iv
Int er vi ew ing
th e m. T he an a ly s t c o u ld b e pr o fes s i o na l , p res c r ip t iv e , p o l it ic al , or c as ua l , as t he
ef fec t iv e n es s of an i nt er v ie w is de p en d e nt o n t h e a n a ly s t's ex p er tis e as an
i nt erv ie w er .
• Uns tr uc t ur e d I nt er v i e w - Th e s y s t e m a na ly s t u nd er tak es a qu e s ti o n - a n d-
ity
ans w er s es s io n t o g at her s t a nd ar d s y s t em i nf or ma t io n .
• Str uc tur e d I nt er v i ew - I t i nc lu d es v ar i ous b a s ic q ues t io ns t o w h ic h t h e us er
mus t a ns w er i n e i th er a c l os e ( obj ec t iv e) or op e n ( d es c r ip t iv e) s ty l e.
m
• Th is t ec hn i qu e is of t en th e m os t ef fec t iv e me t ho d of ga i n in g q ua l i ta t iv e
da t a.
)A
• It is b e ne f ic i a l f or t h os e wh o are u na b le to ef fec t iv e ly c om m u n ic a te i n
wri tt e n fo r m o r wh o d o n ot hav e t he o p po rt un ity t o f i nis h a q u es t i on na ir e.
• I nf or ma t io n c a n b e q u ic k ly af f ir me d a nd c r os s - c hec k e d.
• It is c a p a bl e o f d ea l i n g w it h c o mp l ic at e d s u bj ec ts .
(c
• It is s im p l e to d is c ov er k ey pr o b le ms b y s o l ic it i n g op i n io ns ;
• It is s im p l e to c o m pr e he n d m a in c h a l le n ges by pr oc ur i n g op i n i ons ;
• It c ov er s u p t h e o p en i n gs i n th e r a ng e s of c o nf us io ns an d red uc es
for thc o m in g d i ff ic ul t ie s .
e
Q ue sti onn ai r es
lin
S uc h a t ec hn i q ue w ou l d b e us e d by a na ly s ts to c o l l ec t k no w le d ge ab o ut
v ar ie d s y s t em is s u es f r o m a l ar ge n u mb er o f p eo p le . Q u es t i on n a ir es are c l as s if i e d
i nt o tw o ty pes .
On
th at c o u ld b e q uic k ly a nd ac c ur at e ly be c ons tr ue d. it c o ul d i nv es t i ga t e a
d if fic u lty an d c o ntr i b ut e to a par t ic u l ar s o l ut i on .
• Clo s ed - end ed Q ue st i onna i re s - It c o nt a i n qu es ti o ns wh ic h are u s ed w h en
th e s y s t ems a n a ly s t e f fic ac i ous ly rec or ds a l l mu t ua l ly ex c l us iv e r es po ns es .
ty
• It is v e r y ef f ic ac i ous i n i nv es t i ga t in g n o n - c o- loc at e d us ers ' i n te res ts ,
be h av ior s , e mo t io ns , a nd op i n io ns .
• It is b e ne f ic ia l t o fi n d ou t h o w m a ny p eo p l e i n a s p ec if i ed p op u l at i on
•
si
s up p or t o r op p os e of a p art ic u l ar c ha rac ter is t ic o f t h e pr op os e d mo de l .
B ef or e giv i n g an y s p e c if ic d ir ec t i o n t o t he s y s te m pr oj ec t, i t is us ef u l to
as c er t ai n t h e ov er a l l o p in i on .
er
• It is m or e d e pe n da b l e a nd ens ur es t he a no ny m ity of c o m m en t s a n d
fe e db ac k .
• It is a de q u at e f or s e lec t in g c re d i b le da t a a n d pr ov id i n g s ta t is t ic a l
ev id e nc e t h at c o u l d b e e m ai l e d or m a i le d.
iv
Re vi ew of R ec or ds , P ro ce du re s, and Fo rm s
Un
Ben ef its
proc es s es b ef or e i mp o s i ng o n o th ers .
• It a i ds i n t h e d oc um e n ta t io n o f o p era t io n a l p roc es s es in a br i ef s p an of t i m e
bec a us e pr oc es s h an db o ok s an d s tr uc t ur e s c h arac t er is e t he l a y ou t a nd
fe at ur es of t h e ex is t i n g ar r an g e me nt .
m
• It c o u ld pr ov i d e a s o li d k n o wl e dg e o f t h e tr ans ac t i o ns h an d l ed i n th e
org a n is a t io n , as we l l as r ec o g nis e i nf or ma t i on f or c o m pu t at i on a n d ev a l ua te
ef fec t iv e n es s .
• Th is c o u l d as s is t a n an a ly s t i n un d ers t a nd i ng t he s y s te m's pr oc e s s es t h at
)A
mus t b e e nd or s ed .
• It a dd r es s es t h e s i t u at i on , t h e p arts t ha t are i m pac te d , a n d t h e d es ir ed
ou tc om e.
O bs e rv at i on
(c
It is a w ay o f c o l l ec t i ng d at a t ha t i nv o lv es n ot ic i ng a nd s tu dy in g p eo p le ,
oc c ur re nc es , an d obj e c ts . T he a na ly s t v is i ts t h e or g an is at i o n t o p erc e iv e ho w t he
c urr en t s y s te m w or k s an d t o c o mpr e he n d th e s y s te m's r eq u ir em e n ts .
Ben ef its
• It is a s t r a i gh tf or war d way t o c o l lec t d at a.
e
• It is us e fu l wh e n t h e a ut h e nt ic ity of th e da ta c o l lec t ed is c a ll e d in to
qu es ti o n, or w h en t he c om p l ex i ty of c ert a in as p ec ts o f t he s y s te m pr ev e nt s
c l ear ex p l an a ti o n by e nd - us ers .
lin
• It ge n er a t es qu i t e v a li d a nd pr ec is e i nf or ma t i on
• It y i e l ds a ll t h e fac e t o f r ec o rds t h at ar e i ns u ff ic ie n t an d o ut m o de d.
On
ou t da te d .
ty
th e re q ui r e m en ts g a th er in g p r oc es s m or e e as ily , m or e q uic k ly , an d m or e
s uc c es s f ul ly . Re m em b er ou r c h e f f ro m th e i ntr o duc to ry gu i de ? S h e w o u ld h av e a
har d t i me p u l li n g of f a s uc c es s f u l w e d di ng rec e pt i on w i th o ut k n ow i ng a b ou t
da n ge ro us f oo d a l le r g i es of t h e g ues ts ?
si
Do y o u rec a l l t he in f a mo us u tt er anc e fr o m t he las t ar t ic l e w h en a proj ec t fa i ls ? T h e
req u ir e me nts w er e no t c l e ar to us . Re q u ire m en ts g at he ri n g to o ls e ns ur e t ha t e ac h
er
s te p o f t h e pr oc es s is on - p o in t, t h oro u gh , a n d c o mp l et e.
• Ho w to l is t en , ev e n w h en t h ere is n ot h in g t o s ay
• Th e d is t i nc t i on be tw e e n a g oa l a n d a w is h l is t.
• O bt a i ni n g ex pr es s per m is s i o n a nd af fir m at i o n.
• S urv iv i n g m an o euv r a b l e a nd rec o g nis i n g th at c h a ng es w i ll oc c ur
J us t as e ac h pr oj ec t h as d if f er e nt ne e ds , ea c h pr oj ec t re q ui res di f f er e nt t o ols . T he
br id e's m ot h er , wh o i s a p ar t ic i p a nt i n t he ref err a l g u i de , s pe ak s d if fer e nt ly th a n
ity
is s ues . Hav e y o u ev e r h ad a n e m ai l s tr i ng w it h a d ep th o f 5 0 an d tr ie d t o f i n d
s om e th i n g s pec i f ic i n i t ? T h is is mor e t h a n fr us tr at i ng an d d es erv es s om e f o ur -
l et ter w or ds .
)A
Th e t o ols j us t m e nt i o ne d ar e b as ic t o o ls . Th e f o l lo w in g to o ls ar e b e tt er s of tw ar e
s y s te ms -
• Ha n dl i n g of p er m its
• Doc u me n t c ha n ges
• Ma n ag e r e l at i o ns a mo ngs t r e qu ir e m en ts
(c
• E l im i n at e u nc er t ai n ty , ex p ec ta t io ns , an d a m b it i o us i nt e ll ec tu a l
• Mak e s ur e a l l r e q ui r e me n ts ar e c l ear , g en u i ne an d s e tt l ed
G at h er in g r e q ui r e m en ts is a v ery s ig n if ic an t pr oc e d ur e for pr e li m i nary a ne w
proj ec t , s o t he i nd iv i d ua l r e q u ir es t o c h o os e t he bes t to o l f or th at t as k .
e
Top 1 0 r equi r em ent g at h er ing t oo l s
lin
Her e are th e t o p 1 0 r eq u ir em e nts c o l lec t io n t oo ls to c o ns i d er in 20 2 1. Le t's s t ar t
wi t h # 1 0
10 . J a ma S of tw ar e
On
Her e is ou r l is t of t h e to p t en r eq u ir e me nt g at h eri n g t oo ls t o c o ns i der i n 2 02 1. Le t's
be g i n wi t h #1 0 .
10 . S oftw ar e by Ja ma
J am a So ft w ar e of fer s an op p or t u n ity t ha t is s u it ab l e f or d ev e l o p in g s of tw ar e. It is a
v i ab l e ap pr o ac h f or p l ay er s w ho a re es t a b l is h i ng in tr ic a te m et h ods a n d
tec h no l og i es . A f ew o f t he pr o d uc t's qu i te s i gn i f ic a nt c har ac ter is ti c s ar e as f o ll o ws :
ty
• I t s h ort e ns i m pl e m en ta t io n t im e a n d i mp rov es pr od uc t iv i ty .
• Les s e ns d up l ic at i on
• G u ara nt e es o pt i mu m pr o duc t io n
• I t h as a us er - fr i e n dly , br o ws er - b as e d fu nc t i on a l ity .
si
Te ams c an us e J a ma' s p l at f or m to al i g n h ar dw ar e, s t ak eh o l ders , an d f ir mw ar e. I t is
ad a pt a bl e e n ou g h to s u p por t a v ar i ety o f dev e l op m en t m et h o do l o gi es . It a ls o
a ll o ws for mo r e ac c ur at e d at a c a pt ur e, in t e rac t i on , pr er eq u is it es , o bj ec t iv es , a n d
er
adv a nc e m e nt .
9. c od eB ea m er A LM
Co d eB e a mer AL M is s i mp l e to us e an d i n c l ud es A PI in te gr at i o ns . It 's a d ec e nt
iv
• Ev al u at i n g for Q & A
• Mo n it or i ng in t er r e l a t ed n es s
Co d eB e a mer A LM is a p l at for m f or Ap p l ic a ti o n L if es ty l e Ma n ag e me n t. I ts p l at for m
is s e am l es s , c oo p er a t i v e, a n d a da pt a b le .
ity
8. A c comp a
Ma ny o rg a nis a t io ns pr e f er Ac c o mp a's p l at for m as i t's s i m p l e t o us e a nd
i nc or p ora t e. W h at it l ac k s in a dv a nc ed c ap a b il i t ies , it c o m pe ns at es f or i t i n
us a b i l ity . A nd t h ey d o i mp l e me nt c ha n ges on a re g u lar bas is .
S om e of th e pu r p os es why y o u s h o u ld us e th is r eq u ir e me nt g at h er in g t o o l ar e as
m
fo l l ows :
• Trac ea b i l ity o f r e qu ir e me n ts
• Dis c us s i on b o ar ds
• No t if i es for c o l l a bor at or s
)A
7. C al ib e r
Ca l i ber is a g oo d r e q u ir e m en ts g at h eri n g t oo l f or s to ry b o ards a nd s im u l at i ons . It
work s w e l l for t es t i n g r o les , pr oc es s es , an d req u ir e me nts . It a ls o has gre at v is u a l
fe at ur es fo r mo d e l in g r eq u ir e me nts . O t her n ot a bl e C a li b er f ea tu re s i nc l ud e:
• Trac ea b l e r e qu ir e me nt s t oo ls
• It ’s m or e v is ua l ly i nt er ac t iv e
e
• E as y us e r ac c es s c on t r o ls
• A c o l lec t i on o f t he m o s t us e f ul f e at ur es
Ca l i ber us es a dr a g - a n d- dr o p s y s t e m f or re a di n g re q ui re m en ts . As f ar as
lin
req u ir e me nts g a th er i n g to o ls g o, i t ’s a go o d s t an d al o n e t o o l, a n d it ’s e as ie r t o us e
th a n o th er s . H ow ev er , it d oes n ’t i nt e gr at e we l l w i th o th er r e qu ir em e nts g at h eri n g
to o ls .
6. P e rfo rc e H el ix R M
On
Caliber is an excellent tool for gathering requirements for storyboards and simulations. It is effective
for testing roles, processes, and requirements. It also has excellent visual features for modelling
needs. Caliber also has the following notable features:
ty
• It has simple user access controls; and
si
Caliber's reading requirements are entered using a drag-and-drop system. It's a good standalone tool
for requirements gathering, and it's easier to use than others. It does not, however, integrate well with
other requirements gathering tools.
er
5. Pe a rl s
Pearls is a requirements elicitation tool that excels at providing useful team collaboration features. It is
simple to create user roles and backlogs, and it is adequate for specification management. It's also
reasonably priced and comes with a number of useful features, such as:
iv
Un
ity
m
)A
(c
• It generates Word documents with a single click
• Comments and notification settings for member activity
e
• A flexible pricing system
• Easily generates requirements and specifications documents
Pearls is better suited to small businesses, with a free Starter Plan for three or fewer users. For larger
lin
businesses, it also has a scalable pricing system. It also includes features for managing stakeholders
and defining project goals, as do most requirements gathering tools.
4. R eq Su it e
ReqSuite advertises itself as highly customizable, but it is more accurate to say that it treads a fine
On
line between simplicity and customization. It is simple to define relevant workflows. It also makes it
simple to create use cases and reusable requirements. The benefit further includes-
• Many definable templates
• Visual modelling tools
• Numerous collaboration features
• It's simple to use are just a few of the reasons to use ReqSuite as your requirements gathering tool.
ty
The ease of use may be the most compelling reason to choose ReqSuite, as it is not overly complex
and the tutorials are genuinely helpful. However, when compared to more robust requirements
gathering tools, it has fewer capabilities.
3. Vi su re
si
Visure is an excellent requirements gathering tool, particularly for configuration management. It keeps
track of traceability, verification, and defects with ease. Customers will appreciate the following
popular features:
er
• It is user-friendly.
• It is especially useful for traceability management.
• It has a more efficient requirements review process.
• It provides a platform for centralised requirements.
iv
Visure can help with a wide range of lifecycle processes. It is compatible with Microsoft products such
as Word and Excel. Furthermore, this requirements gathering tool provides compliance templates for
a wide range of international safety standards.
Un
2. O rc ano s
Th is re q u ir e m e nts e l ic it at i on to o l is e x t re me ly b e ne f ic i a l f or r ep or ta g e a n d
v is ua l is at i on . T h e O r c an os p l at for m e n ab l es dev e l op ers t o bu i l d an d c us to m is e
s pec i f ic a t io n d oc um e n ts an d pr o duc t re q uir em e nts , th o u gh c o l l a bor a ti o n f ea tur es
are l im i te d . A mo n g th e r e as ons w hy us ers pr ef er O rc a n os ar e:
• Ex c el l e nt c us t om er s e r v ic e
• G e nu i ne das h bo ar ds
ity
th ey w an t to us e n e w op t io ns s uc h as c us t o mer d is s at is fac t i on m a na g e me nt ,
qu a l ity s t a nd ar ds , v u l n er a b i l ity as s es s me n ts , a n d s o o n.
1. M ind M an ag er
)A
Th e eas e w it h w h ic h y ou c an c r e a te a c en tr a l d as h b oa rd o f i nf or m a ti o n th a t
v is ua l ly s e g me nts da t a a nd inc l ud es l i nk s a nd at tac h me nt s t o ex p an d o n - pa g e
c on t en t is o n e of t h e r eas o ns m any pe o pl e c ho os e M i nd M an a ger a s t he ir g o - to
req u ir e me nts ga th er i n g to o l. O th er us ef u l M i nd M an a g er fe at ur es i n c l ud e:
• It c a n b e e as i ly s o r t ed us i ng t a gs a nd f i lt ers
•
(c
Its hi g h ly a da pt a b le l ay o u t fi ts a v ar i ety o f ne e ds
• It e n ab l es s h ar in g a nd c o l l ab or at i on in ac t ua l o n m aps v i a M S T e a m a nd
prov i d es u nr iv a l l ed c u s to m er s u pp or t.
2. 1. 9 . Aut om at e d d at a co ll ec t ion
e
A ut o ma te d d at a c o l l e c ti o n is t he p roc es s of a ut o m at ic al ly c a p t ur in g d at a fr om
pr in te d m at er i a l an d c onv er ti n g th e m to d i g i ta l c o p ies e m p loy i n g s pec i f ic t o o ls an d
ap p l ic a t io ns . th e i nt e gr a t io n o f A I pro gr a m mi n g a nd m ac h in e l ear n i ng e n ab l es
lin
s of tw ar e t o r a p i d ly r ev ie w a nd tra ns l at e pa p er f i l es a n d i m a ges i nt o r ea d i ly
av a i l ab l e e- f il es .
A ut o ma t ic d at a c ap t ur e h as be e n c r it ic al i n tra ns it i o ni n g fr o m m a n ua l d at a e n try t o
ev e n m or e v ia b l e au to ma t ed pr oc es s es . A m on g ot h er a dv a nt a ge s , a ut o ma te d d at a
On
c o ll ec ti o n s of tw ar e h e l ps e nt er p r is es o pt i m is e th e ir d oc um e nt at i o n.
ty
P ap er for ms , s uc h as me d ic al c l a i ms , c an t ak e a l on g t i m e t o pr oc es s . O ne m us t
wa i t for d oc u m en ts t o b e pr oc es s e d, pr o ofr e ad , s c a n ne d, an d m a i le d t o t h e
ap pr o pri a te par t ies , o n ly to r ep e at t h e pr o c es s . Au t om at i o n h as t he po t en t ia l t o
red uc e th e t i me it t ak e s t o pr oc es s p a p er c l a i ms fro m d ay s t o m in u t es .
si
S av i n g t i me o n m u nd an e , s l ow pr oc es s es me a ns h av i ng m ore t i me to s p en d on
em p l oy e e tr a i n in g, g e tt i ng m or e work d on e , a nd d ev o t in g mor e en er gy t o d a ta
qu a l ity as s ur a nc e a n d an a ly s is .
er
Re d uc e d re l i anc e o n ma n ua l pr oc es s es
B us i n es s es wi l l b e a b l e to e l i m in a te in ef f ic i en t m an u a l pr oc es s es w it h t he he l p o f
au t om at e d da t a c o l l ec ti o n. P a per f or ms a n d d oc u m en ts ap p ear t o b e d is a pp e ar in g
a lm os t e n tir e ly as tec hn o l ogy a dv anc es a n d ex p a nds . T h e ma n u a l p roc es s in g o f
pa p er fo rms is a t hi n g of t h e pas t.
iv
wh i l e r e ma i n in g e as i ly ac c es s ib l e.
E rr or s a r e b e ing r ed u ce d.
Ma n ua l d at a e ntr y e x po s es y o u t o a mu c h - e l ev at e d r is k o f u nav o i da b le us er
m is t ak es . Ev e n w i th me t ic u l o us e du c a t io n a n d ex p er ie nc e, mis tak es c a n oc c ur .
Ho wev er , d ur in g a ut om a te d d at a pr oc es s i ng , ar ti f ic ia l i n te l l i g enc e a n d o pt ic al
c har ac ter r ec o g n it i on c an as s is t i n r e d uc i n g th e s e err ors .
Da ta c o l l ec t i on s o ft w a r e c ou l d e as i ly s c a n t hro u g h r ec or ds a nd e v a lu at e t he m to
ity
Enh an c ed Ef f i ci en cy
m
A no th er ad v a nt a ge o f a ut o ma t ic d at a c o l l ec t i on s y s te ms is t ha t t h ey re d uc e
c om p l ex t as k s to f ew er s t e ps , i nc r eas i n g ef f ic i e nc y in t hos e t a s k s a nd o th er s .
W he n t he ne e d f or ad d it i o na l s t e ps d uri ng ma n ua l proc es s e s is e li m i na t ed ,
)A
S av ing s on e xp en se s
(c
A ut o ma t io n c a n s av e y o ur c om p a ny m on e y o n ex tr a l a b our , o ng o i ng tra i n in g ,
eq u i pm e nt ma i n te n anc e, s y s te m u p d at es , an d d oc um e nt s tor a ge . I t m ay a ls o a l l ow
fu n ds t o b e r ed is tr ib ut ed to o th er de p art m en ts f or t he p ur pos e of i mp rov i ng i nt er n al
proc es s es , u p d at i ng c om p ut er s a n d ot h er m ac h i n es , a n d s o o n.
e
E nt er pris es c o u ld s av e s ig n if ic a nt ly by h ir i ng a n o uts i de or g an is at i on t o ma n ag e
i nf or ma t io n g at h er i n g i ns t e ad of a n i n- h o u s e te a m. Th is is bec om i n g ex tr e me ly
prev a l en t as b us i nes s es r ec og n is e th e tr e m en d ous be n ef i ts of pa y i ng a l ow er ra t e
lin
for t h e s a me , i f no t b e tt er , d a ta a n a ly s is as t hey di d d o i t th e ms elv es .
On
of c h arac t er r ec o g ni t i on a nd a ut o m at i on c o u ld a lt er an d s at is fy d iv ers e de m a nds .
Her e ar e s o m e of t h e mos t c o m mo n A DC me th o ds y ou w i l l e nc ou nt er.
O pti ca l Ch a ra ct er R e cogn it i on
O pt ic a l c h ar ac t er r ec og n it i o n is a tr i e d- a n d- tr u e tec h no l o gy th a t has lo n g b ee n
us e d as t h e pr i m ar y m et h od of a ut o ma t ed d a ta c a pt ure i n a v ar i ety of i nd us tri es . I t
ty
is Sm ar t D at a So l ut i o ns ' p r e fer r e d me th o d of da t a c a pt ur e. O CR is a tec h no l ogy
th at r e a ds h a nd wr it te n o r ty pe d d oc u m en ts , i m a ges , PDF f i les , or ot her s c a n ne d
doc u me n ts to c r ea te e d it ab l e, s earc h ab l e d i g it a l doc u m en ts .
O CR d if fer s fr o m s i m p ly s c a nn i n g d oc um e n ts i nt o a c o m pu ter i n th at i t r e ads t he
si
c har ac ters i n t h e doc um e nt a nd c o mp ar es th e m t o s p ec i fic t em p l at es an d f or m ats
to e ns ur e ac c ur a t e d at a tr a ns f er , r at h er t ha n s i m ply c o py in g a nd p as t i n g as a
s c an n er w ou l d. O CR i s ex tr em e ly us ef u l i n i nd us tri es t h at d e a l w it h s e ns i t iv e da t a,
s uc h as pa t ie n t i nf or m at i on on m e d ic a l c la i m s . I t res u lts in g re at er prec is i o n an d
er
Re cog nit ion of O pt i c al M a r ks
s uc h as f i l l ed i n b ub b l es or c h ec k m ar k s . Th is m et ho d is id e a l f or t es ts ,
qu es ti o nn a ir es , s ur v e y s , s y m pt om c he c k l is ts , f a mi ly his t or ies , a nd any t hi n g e ls e
th at nec es s it at es m ak i ng a ma r k on a for m r at h er th a n wr it i ng in in for m at i on .
Un
bu t u lt i m at e ly h el p tr a ns la te da ta muc h f as t e r t ha n m a nu a l d at a e nt ry .
Auto mat ed D at a Col l ect ion Sof t w a r e and Tool s.
en a b le q u ic k a nd eas y r e a di n g of f or ms a nd d oc um e nts . O nc e da t a is e nt er ed in t o
th e s y s te m , it c a n be qu ic k ly s c a nn e d an d r ea d by th e c o m pu ter b y at t ac h i n g la b e ls
an d b ar c od es to t he d oc u m en ts . Th is r e d uc es m a nu a l da t a e n t ry a nd a l l ows for
muc h f as t er a n d m or e ac c ur a te c o n te n t r etr i e v a l.
)A
No w, t h e s of tw ar e us ed by or ga n is a t i ons t ha t us e a ut o ma te d d at a c o l lec t io n is
fre q ue nt ly t a i lor e d to t he ir s p ec if ic n e eds . S ma rt D at a S o lu t io ns , f or ex a m p le , us es
tec h no l ogy t ha t h as b ee n s pec i f ic a l ly des i g ne d to m ee t t h e n e ed s of o ur c l i e nts
wh i l e a ls o inc or po r a t in g e nh a nc e d A I a nd ma c h in e l e arn i n g c ap a b i li ti es .
(c
Fill-Ups
e
1. The ________________ and the ________________ are two critical components of system
lin
analysis.
2. ________________ and ________________ are two prominent methods for determining
requirements.
3. ________________ is the process of automatically capturing data from printed material and
converting them to digital copies employing specific tools and applications.
4. ________________ has more reporting features than the other information gathering tools.
On
5. Caliber's reading requirements are entered using ________________.
True/False
1. Interviewing is a way of collecting data that involves noticing and studying people,
occurrences, and objects.
ty
2. Closed-ended Questionnaires contain questions which are used when the systems analyst
efficaciously records all mutually exclusive responses.
3. Gap analysis is a technique for analysing performance gaps in a software application to
ascertain whether or not business requirements are met.
4. A flowchart portrays the graphical communication.
si
5. The process of determining requirements entails studying the existing system and gathering
details.
er
Su mm ar y
iv
• A na ly z i ng pr oj ec t r e qu ir e me n ts w h en th ey a re g at he re d, a s we l l as
thr o ug h ou t t he pr oj ec t's l i fec y c l e, is c ri t ic a l f or pr oj ec t s uc c es s . So ft wa re
Re q ui r e m en ts An a ly s i s a i ds in k e ep i ng r e q u ire m en ts in l in e w i th b us i nes s
Un
ne e ds . A g oo d p r oj ec t r eq u ir em e nts an a ly s is proc es s w i l l r es u l t i n a
s of tw ar e ap p l ic at i on t h at m e ets t h e bus i n es s obj ec t iv es .
• A r e qu ir e m en t is a c r it ic a l fe at ur e of a ne w s y s t e m th a t may in c l ud e d at a
proc es s i ng or c ap tu r e , bus i nes s ac tiv i ty c o n t ro l, i nf or ma t io n pro d u c ti o n, an d
ma n ag e m en t s u pp or t.
• De ter m i n in g r e qu ir e m en ts e nt a ils s t u dy in g t he ex is t in g s y s t em a n d ga t her i n g
de t ai ls t o d e ter m i ne wh at t h e re q ui re m en t s ar e , h ow it w ork s , an d w h ere
ity
i mpr ov e me nts s ho u ld be ma d e.
• Re q ui r e m en ts Th e pr o c es s o f d ef i n in g us er ex p ec ta t io ns f or a n a pp l ic at i on
th at is t o b e b u i lt or mo d if i e d is k no wn as a n a ly s is . I t i nc lu d es a l l o f t he
tas k s t h at ar e c ar r i ed ou t i n or d er t o i d e nt ify th e n e eds o f v ar i ous
s tak e ho l de r s . As a r e s u lt , r eq u ir em e nts a n a ly s is re f ers t o t he p roc es s o f
an a ly s in g , d oc um e nt i ng , v a l i da t in g , a n d ma n ag i n g s o ft wa re or s y s t e m
m
req u ir e me nts .
• Th e pr im ar y g oa l o f i nt erv if ac t - f i nd i n g t ec h n i qu es is t o de t er mi n e an
org a n iz a t io n's in f or m a ti o n r e q u ir e me n ts , w h i c h ar e th e n us ed by a na ly s ts to
pre p ar e a pr ec is e SR S t ha t th e us er u n ders t an ds .
)A
• Re q ui r e m en ts g a th er i n g t oo ls ar e s i m p ly res ourc es th at c a n b e us ed to m ak e
th e r eq u ir em e nts g at her i n g pr oc es s e as i e r, f as t er, a nd m or e s uc c es s f ul .
Re m em b er our c h ef fr om t he b e gi n n in g ? Sh e' d h av e a d i ff ic u lt ti m e p l a nn i n g
a s uc c es s f u l we d di n g r ec e p ti o n i f s h e d id n' t k no w a bo u t da n g ero us f oo ds .
• A ut o ma te d da t a c o l l e c ti o n is t he pr oc es s of au t om a tic a l ly c a p t ur in g da ta
fro m p ap er d oc u m en t s a nd c o nv ert i ng t he m t o d i gi t al f i l es us i ng s p ec i al
(c
to o ls a nd s of tw ar e. A c om b i na t io n o f A I pr o gra m m i ng an d m ac hi n e l e arn i n g
en a b les s o ft war e to r ap i d ly r ea d an d tr ans l at e pa p er f i l es an d i ma g es in t o
eas i ly ac c es s ib l e e- f il es k ey .
Act iv it y
e
tra d it i on a l an d a dv an c ed m et ho ds of da t a c o ll ec ti o n. O ne gr ou p w i l l d ef e nd th e
tra d it i on a l m et h od s wh i le ot her wi l l d ef e nd t h e a dv a nc ed me th o ds .
lin
Q ue sti on s & E xe r ci s e
1. De f in e t he R e qu ir e me nts d e fi n it i o n .
On
2. Dis c us s t he D e ter m i n i ng r eq u ir em e nts .
3. Ex pl a i n th e M aj o r ac t i v it i es i n r e q uir e m en t d et er m in at i o n
4. Dis c us s t he R e qu ir e m en t a na ly s is t ec h n i qu e s
5. Dis c us s I nf or ma t io n g at h er i n g t ec h n iq u es ) .
6. Des c r i b e t h e o n li n e m et h ods /t o ols f or re q u ir em e nt g a th er i ng fr o m us er
7. Ex pl a i n th e A u to m at e d d at a c o l l ec t i on
ty
G lo ss a ry
si
A r eq ui r em ent is a c r it ic a l fe at ur e of a n e w s y s t e m t h at m ay i n c l ud e da t a
proc es s i ng or c ap tu r e , bus i nes s ac tiv i ty c o n t ro l, i nf or ma t io n pro d u c ti o n, an d
ma n ag e m en t s u pp or t.
• Th e pr oc es s of de t e r m in i n g re q u ire m e nts en t ai ls s tu dy i ng t h e ex is t in g
er
s y s te m a n d ga t her i n g de t ai ls t o d et er m in e w ha t t he r eq u ir em e nts are , h ow it
work s , a nd w h er e i mpr ov e m en ts s h o ul d b e m ad e .
• Req ui r em ent An al ys i s - T he pr oc es s o f de fi n i ng th e ex pec ta t io n s of u s ers
for a n a pp l ic at i o n t h a t is to b e b u i lt or m o d if i ed is k no wn as r e qu ir e me n ts
iv
a s uc c es s f u l w e d di n g r ec ep t io n i f s h e d id n' t k no w a bo u t t he g u es ts '
da n ge r o us f oo d a l le r g i es .
• Auto mat ed d at a co ll ect ion is t h e a ut o ma te d c a p tur e o f pr i n te d m at er i a l,
c onv er ti n g th e m t o e lec tro n ic i nf or ma t io n w it h t h e he l p of s pec i a l is e d
s y s te m s a n d e qu i p m en t. A i n te gr at i on of AI p ro gr am m i ng an d m ac h i n e
l ear n i ng e na b les s o ft war e t o r a pi d ly r ev ie w an d tra ns l at e p a pe r fi l es an d
m
doc u me n ts i nt o w id e ly o bt a i na b le e- f i l es .
)A
Furt he r R ea din g
Pr ob l e m S o lv i n g, a n d De d uc t i on Sk il ls . No t ic e T h e De t ai ls O t h ers M is s .
4. Mo d er n Sy s t e ms A na ly s is an d D es i g n, J e ffr ey A. H of f er, J o ey G e or ge ,
J os e p h S . V a lac ic h
5. Mo d e l in g a n d A n aly s is o f Dy na m ic Sy s t e ms , S ec o n d E d it i on , R a mi n S.
Es f a nd i ar i, B ei Lu
e
6. Sy s t e ms A n aly s is a n d D es i g n, An O bj ec t - O r i en te d A p pr oac h w it h UM L A l an
De n nis , B ar b a r a W ix o m, D av id T e gar d en
7. Mo d er n Sy s te ms An a l y s is a n d Des i g n, G lo ba l Ed i t io n, J os e p h S Va l ac ic h ,
lin
J oey F . G e or g e
8. Sy s t e ms A n aly s is an d Des i gn , Sc ot t T il l ey , H arry J . R os e n bl a tt
9. Sy s t e ms A na ly s is a n d D es i gn i n a C ha n g in g W or ld J o h n W . S atz i n ger ,
Ro b er t B. J ac k s o n, S t ep h en D . B ur d
10 . Sy s t e ms A n aly s is an d Des i gn , Sc ot t T il l ey
On
11 . B un d l e, Sy s t e ms A n al y s is a n d D es i g n, Lo os e - le af V ers io n , 1 2t h + Mi n dT ap ,
1 ter m Pr in te d Ac c es s Car d, Sc ot t T i l le y
12 . Sy s t ems An a ly s is a nd D es ig n, J IJ U J O H N
13 . Sy s t e ms An a ly s is An d D es ig n A C o m pl e te G u id e 20 2 0 Ed i t io n, G er ard us
B lok dy k
ty
Fil l- U ps
1. Determination of requirements, structuring of requirements
2. JAD, Prototyping
si
3. Automated data collection
4. Orcanos
5. Drag-and-drop system
er
True/False
1. False
2. True
3. True
iv
4. False
5. True
Un
Le ar nin g O b j ect i ve s:
ity
• De f in e t he Sy s t e m dev e lo p me n t me t ho d o lo g i es .
• Dis c us s t he Sy s t e m d e v e lo p me n t t o o ls .
• Ex pl a i n th e C om p ut er A id e d S of tw ar e E n gi n e er in g (C A S E) .
m
• Dis c us s t he J oi n t A pp l ic at i on D ev el o p me nt ( J AD )
• Dis c us s R ap i d A p p lic a ti o n Dev e l op m en t ( R A D) .
• Des c r i b e t h e Sy s te m d ev e l o pm e nt li f e c y c l e
• Ex pl a i n th e A g i le S of t war e d ev el o pm e nt
)A
3. 1. 1 Int ro du ct io n
e
en g i ne er i ng t o ols .
MO D E LLI NG
lin
Mo d e l in g g e ne r a tes a pic t or i a l de p ic t i on o f a t he ory or pr oc ed ur e, wh ic h s y s t e ms
dev e l op ers c o u l d ev a l ua t e, ex a m in e , a nd al ter . A s y s te m a n a ly s t c an us e a s e t of
bus i n es s , d a ta , o bj ec t , n et wor k , a n d pr oc es s m o d els to des c r i b e an d s im p l ify an
i nf or ma t io n s y s t em .
On
A b us i nes s m od e l, a ls o k n ow n as a r eq u ir e me n ts m o de l , d es c r ib es t he d at a t ha t a
s y s te m mus t pr ov i de . A d a ta m od e l d es c r i be s t h e s tr uc t ur e a n d d e s i gn of da t a. A n
obj ec t m od e l is a d es c r ip t io n of o bj ec ts t h at c om b i ne da t a an d proc es s es . A
ne tw ork m od e l d es c r i bes t he d es i g n a n d p r ot oc ols o f a n et work . A proc es s mo d e l
des c r i b es t h e lo g ic us ed by pr og r a m mers t o c re at e c od e mo d u les . Des p it e th e fac t
th at t h e mo d el s ap p e ar to ov er l ap , th ey a c tu a l ly w ork t og e th er to d es c r i be t h e
s am e e nv ir on m en t fr o m d if fe r e nt pers p ec t iv es .
ty
PR O TO T Y P ING
Pr ot oty p i ng a ll o ws y o u t o t es t s y s te m c on c ep ts a n d ex a m in e in pu t, o ut pu t, a nd
us er i nt er fac es be fo r e mak i n g f i na l dec is i on s . A pr ot oty p e is a w ork in g v ers io n o f
an in fo rm at i o n s y s te m t ha t is i n its ear ly s t a ges . Sy s te ms a na ly s ts b u il d a nd s t u dy
si
i nf or ma t io n s y s t em pr ot oty p es i n th e s a m e way t h at a irc r af t m a nu fac tur ers t es t ne w
des i g ns in w i nd t un n e l s . A pr o to ty pe c a n b e us e d as a n in i ti a l m od e l t o s erv e as a
be nc hm ark f or ev a l u at i ng t he f in is h ed s y s t e m, or i t c an ev o lv e i n t o t h e f i n al v ers i o n
of t he s y s t em . In e i th e r c as e, pr ot o ty p i ng s ig n if ic an t ly ac c e l er at es t he d ev e lo p me nt
er
proc es s .
O n e d is a dv a nt ag e o f p r o to ty pi n g is th at i mp or ta n t d ec is i o ns m ay b e m a de to o
ear ly , be fo r e b us in e s s or IT is s ues ar e t h oro u g hly u n ders to o d. A pr ot oty p e
pre m is ed on de ta i l e d f ac t - f in d i ng an d m o de l l i ng me th o ds , on t h e o th er h a nd , c o u ld
iv
be an inc r e d ib ly r es o u r c ef u l to o l.
CO M P UT E R - A ID E D S Y ST E M E NG I N E ER IN G (C A S E) T O O L S
Co m pu te r - a i d ed s y s t ems en g i ne er i ng ( C A S E), a ls o k no wn a s c o m pu t er - a i d ed
Un
s of tw ar e e n g in e er in g, is a t ec hn i q ue t ha t em p l oy s p o wer f ul s o f tw are k n ow n as
CA S E T oo ls t o as s is t s y s t em a n a ly s ts i n t he d ev e l o p me n t an d ma i nt e n anc e of
i nf or ma t io n s y s t ems . C A S E t oo ls pr ov i d e a g en er a l fr am e w ork fo r s y s te m
dev e l op m en t an d s u pp or t a w id e r an g e of d es i g n m e th o do l og i es , s uc h as
s truc tu re d a na ly s is a n d o bj ec t - or i e nt ed an a l y s is .
B ec a us e C A S E to o ls mak e i t e as i er t o bu i l d a n i nf or ma t io n s y s t em , t h ey inc re as e
pro d uc t iv i ty an d i m pr o v e pr od uc t qu a l ity .
ity
In a d d it i on t o tr a di t io na l C A S E t oo ls , s y s t em dev e l op ers fr e qu e nt ly us e pr oj ec t
ma n ag e m en t t oo ls , s u c h as M ic r os o ft Proj e c t, a n d s p ec i al - p ur pos e c h art i n g t oo ls ,
s uc h as M ic r os o ft Vi s i o, as il l us t ra te d i n Fi gu re 1 - 2 3. V is io c a n b e us e d by a
s y s te m a na ly s t t o c r e at e a v ar ie ty of d i ag r ams , i nc lu d in g b l oc k d i agr a ms V is i o is
des c r i b ed i n gr e at er d et a i l in Par t 2 of t he Sy s t e ms A na ly s t's T o o lk i t for c re a ti n g
p la ns , f or ms a nd c har t s , ma ps , ne tw ork d i a gr ams , a nd org a n is a t io n a l c har ts .
m
S Y ST E M S D EV E LO PM EN T M ET HO D S
Th ere ar e s ev er a l a p p r oac h es t o dev e lo p i ng c om p ut er - bas e d in fo r ma t io n s y s te ms .
Str uc tur e d a na ly s is is th e m os t wi d e ly us ed me t ho d, bu t a ne we r s tra te gy k n o wn as
)A
obj ec t- or i en t ed an a ly s is a n d d es i g n is a ls o w id e ly us ed . Ea c h m et h od has
nu m er ous v ar i at i ons . S om e bus i n es s es d ev e lo p t h e ir o wn a pp ro a c hes , w h i le o th ers
us e me th o ds pr ov id e d by s o ft war e v e n dor s , CA S E t o ol v en d ors , or c o ns u l ta nt s .
Mos t IT ex per ts a gr e e t h at t h er e is n o s i n g le b es t s y s t e m dev e l op m en t s tr at egy .
Ins te a d, a s y s te ms an a ly s t s h o u ld be fa m i l i ar w it h t h e v ar i ous m et h od o lo g i es , as
we l l as t he ir adv a nt ag es a nd d is a dv a nt a g es .
(c
ST RU CTU R ED A NA L Y SI S
Str uc tur e d a n aly s is is a tr i ed - a nd- tr ue s y s te m d ev el o p me nt tec h n i qu e t h a t is s i m p le
to g ras p. T o p l an , a n a ly s e, d es i gn , i m pl e m e nt , a nd s up p ort an in f or ma t io n s y s t em ,
e
s truc tu re d a na ly s is e m p loy s a s er i es of ph as es k no w n as th e s y s te ms dev e l op m e nt
c y c l e ( S DL C) . Des p it e t h e fac t t h at s tr uc t ur e d a na ly s is ev o lv ed wh en m os t s y s t e ms
wer e b as e d o n ma i nfr am e pr oc es s i n g, i t r e ma i ns a d om i na n t s y s te m d ev e l op m e nt
lin
me t ho d.
Str uc tur e d a na ly s is e mp l oy s a s e t of pr oc es s m od e ls to g ra p hi c a lly d es c r i be a
s y s te m. Str uc t ur ed a na ly s is is r e ferr e d t o as a pr oc es s - c e n t ere d tec h n iq u e
bec a us e i t f oc us es on pr oc es s es th at tr ans f orm d at a in to us ef u l i n for m at i o n.
Str uc tur e d an a ly s is , i n a d d it i on t o pr oc es s mo d e l li n g, i nc lu d es da t a or g an is at i o n
On
an d s tr uc t ur e, r e l a ti o n a l da t ab as e des i g n, a n d us er i nt erf ac e is s ue s .
Pr oc es s m o de l l i ng i d en t if i es t h e da ta f l ow i ng i n to a pr oc es s , th e bus i nes s ru l es
th at tr a ns f or m th e d at a, a n d th e o ut p ut o f t h e pr oc es s .
O BJ E CT –O RI E NT E D AN AL Y SI S
Un l ik e s truc t ur e d a n a ly s is , w h ic h tre ats pr oc es s es a n d d at a s e par a te ly , o bj ec t -
or ie nt e d an a ly s is ( O - O ) c o m bi n es da ta a n d th e pr oc es s es th a t ac t o n th e d at a in t o
obj ec ts . O - O is us ed by s y s te m a na ly s ts to m o de l re a l - w or l d bus i nes s pr oc es s es
ty
an d op er at i ons . As a r es u l t, a s e t o f s of tw a re o bj ec ts r epr es e nt i n g ac tu a l pe o pl e ,
th i ngs , tr a ns ac t io ns , a nd ev e n ts is c r ea t ed . A pr o gr am m er t he n wr i tes t h e c o d e th a t
c rea t es th e o bj ec ts i n an O - O p r o gr am m i ng l an g ua g e.
A n o bj ec t b el o n gs to a c l as s , w h ic h is a g rou p o f s i m i l ar o bj ec t s . O bj ec ts h av e
si
c har ac ter is t ic s k n ow n as pr op er ti es , wh ic h t hey in h er it fr o m th e ir c l as s or h av e on
th e ir ow n .
er
3. 1. 2 S y st em de v el op ment m et h odo log ie s
S uc c es s fu l pr oj ec ts ar e w e ll - m a na g ed . T o e ff ec tiv e ly m an a ge a proj ec t , t h e
ma n ag er or d ev e lo p m en t te a m m us t s e l ec t th e s of tw ar e dev e l op me n t me t ho d ol o gy
iv
th at is b es t s u it e d to t h e pr oj ec t a t h an d. Ev ery m et h od o l ogy h as i ts o wn s et of
adv a nt a ges a n d d is a d v an t ag es , an d i t ex is t s f or a v ar i ety o f r e a s ons . H ere 's an
ov erv i e w o f t h e m os t c om m o nly us ed s o ft wa re d ev e lo p me n t m e th o do l o gi es , as w el l
as why t h ey ex is t .
Un
W he n a dd i ng n ew f un c ti o na l i ty , te a ms us e th e ag i l e dev e lo p m en t m et ho d o lo gy to
red uc e r is k ( s u c h as bu gs , c os t ov err u ns , a n d c h a ng i ng re q ui re me nts ) . T e ams
dev e l op s o ft w ar e in it er a t io ns t ha t i nc lu d e m in i - i nc r em e nts o f n e w f u nc t i o na l ity in
a ll ag i l e m et h ods . T he ag i l e d ev e l o pm e n t m et ho d c o m es i n m a ny f lav o urs ,
ity
i nc l u d in g s c r u m, c r y s ta l , e x tr e me pr o g ra mm i n g ( X P), a n d fe a tur e - dr iv e n
dev e l op m en t ( FD D) .
m
)A
(c
e
lin
On
ty
si
er
iv
Un
Co ns : B ec a us e a g il e d ev e l o pm e nt me th o ds d ep e nd he av i ly o n c l e a r d i a l og u e, fr es h
c us t o mers r e gu l ar ly de ar th t h e p a per w or k t h ey r e qu ir e t o g et s t ar te d. T h ey
nec es s it a te a s ig n if ic an t t i m e c o m m it me n t fr o m us ers a nd ar e t i m e c o ns um i n g
bec a us e pr o gr am m er s s h ou l d ac t u al ly f i nis h e ac h c h ar ac t er is tic f or us er a p pr ov a l
m
hy br i d m o de l fr e qu e nt l y w or k s we l l f or t he m .
e
Cl e ar i n ter ac t i o n a n d c o nt i nu o us f ee d ba c k fr o m c us to m er s erv ic e
r ep r es e nt at iv es e l im i n at e a ny r o om f or er ror i n th e s y s t em .
lin
Agi le D e ve lop m ent M et hod olo gy D i sad v an tag es
• It is h ar d t o g a ug e t he w or k i nv o lv e d at t he s t art o f t he s of tw ar e
dev e l op m en t l i fe c y c le f or s o me s o ft w are de l iv er a b les , p art ic u lar ly l ar ge
on es .
• B ec a us e A gi l e c o nc e n tra tes o n w ork in g s o ft war e i ns t e ad o f p ap e rwor k ,
On
th er e m ay be a s c ar c it y o f s uc h doc u m en ts .
• If t he c us t om er r e pr e s en t at iv e is u ns u re o f t he des ir e d en d res u lt , th e
pr oj ec t c an eas i ly d er a il .
• O n ly c h i ef pr o gr a m m e r s s e em to b e c ap a b l e o f un d ert ak in g t he k i nds of
c ho ic es t h at ar e n ee de d dur i n g t he d ev e l op m en t ph as e. As a r es u l t,
un l es s c om b i ne d wi t h ex p er ie nc ed res o u rc es , i t h as no p l a c e f or
i nex p er ie nc ed p r o gr a m mers .
ty
De vO p s de plo ym ent met h odo log y
Dev O ps is a s et of pr a c tis es t ha t e nc o ur a ges a c o rp or at e e nv iro n m en t as w e l l as a
proc es s m od e l li n g. D ev O ps d e pl oy m en t f o c us es o n or g an is at i o n a l tr ans f orm a t i o n
th at i mp rov es c o l l ab or at i on a mo n g d e par t me nts i nv o lv ed i n m u lt i p l e p h as es of th e
si
dev e l op m en t l i fe c y c le , s uc h as gr o wt h , per f or ma nc e me as ur em e nt , an d pr oc es s es .
er
iv
Un
ity
m
P ro s: D ev O ps is c onc er n ed w i th r ed u c i ng t i m e to ma rk e t, re d uc in g t he
ma l fu nc ti o n in g , r at e of ne w u p da t es , r ed uc e th e a m o un t o f t i m e b e tw ee n f ix es , a nd
)A
• S o m e c us t o mer s do n ot w a nt t he ir s y s t e ms t o b e c ons t an t ly up d at e d.
• S om e i nd us t r i es hav e s tric t r eg u l at i ons t ha t nec es s it a te ex t e ns iv e tes t in g
be f or e a pr oj ec t c an p r oc e e d to t h e o per a ti o ns p has e.
•
e
W he n v ar i ous de p ar t me n ts us e d i ff er en t env ir o nm e nts , u nrec o gn is e d
c onc er ns m ay e nt er pr od uc ti o n.
• A f ew q u al i ty c h ar ac ter is tic s nec es s it at e s oc ia l c o nt ac t, s l o wi ng t h e
lin
de l iv er y c h an n e l.
Adv ant ag e s o f De vO ps
• F ast e r P ro ce s s- Mu l t ip l e on g o in g pr o c ed ur es r u n c o nc urr en t ly , m ak in g t he
proc e d ure muc h e as i e r f or c o mp a ni es t o c om p l et e o n t i m e. D e v O ps fac i l it a tes
On
c om p an i es t o t hr iv e e ff ec t iv e i n ac c o mp l is h i ng me as ura b l e c o mp any per f orm a nc e
by a da pt i n g to mar k et s h if ts .
• Pr ov id es Q u ic k D el iv e ri e s - M ic ros erv i c es an d c o nt i nu o us de l iv ery ar e t wo
Dev O ps c om p on e nts th at pr ov i d e c o n ti n u it y of op er at i ons a nd ti m e ly u p da tes .
Dev O ps en a b les b us in es s es t o c o ns t a nt ly c r ea t e a n d pr o m ot e t h ei r s erv ic e , le a d in g
to a n i m pr ov e d s o ft wa r e pr od uc t.
• Con si st en cy - W it h ex p an d in g m o d if ic at i ons an d i nf ras truc t ur a l fac i l it i es , t h e
ty
dev e l op e d p r o d uc ts ar e m or e s ec ur e a n d r el i a bl e , g iv i n g t h em a c o mp e t it iv e
adv a nt a ge ov er t h ei r p eer s .
• Co ll abo r at i on - T h is is a c o l la b ora t iv e p l a tf or m b u il t on s tro n g r es p o ns ib i l ity a nd
pos s es s i on pr i nc ip l es . Th e dev e lo p m en t an d op er at i o ns t e ams ar e bo t h u p to d at e
si
on al l o f t he p r oj ec t's ac t iv it i es .
Di sa dv ant ag e s of D e v O p s
er
• Dev O ps d e ma n ds Cu l t ur a l c h a ng e Yes , th is is tr ue if y o u a do pt D ev O ps i n y our
bus i n es s , i t de m an ds c u lt ur a l c ha n ge a n d b us in es s n ee ds to res t ar t t h e ir
proc es s es i n or de r to gr o w e ff ic i en t ly .
• O rg an iz at i o na l Up gr a da t io n is a no t her i m por t an t f ac t or for c om p an i es t o
iv
up gr a de t he ir b us i nes s fr o m c onv e nt i on a l m et ho ds t o d iv i d i ng i n to
mu l t id is c i p li n ar y tas k s th a t w i l l a l lo w th e m to us e m ul t ip l e s k i l ls at t he s a m e
ti m e.
• S pe e d an d s ec ur ity is no t s o me t hi n g th a t is ac h i ev ed a l l t he t i m e us in g D ev O ps .
Un
W at erf a l l d ev e l o pm e nt m et h od
Th e w a ter f al l m e th o d i s w id e ly r e ga rd e d as t he m os t t ra d it i on a l m e th o d of s o ft war e
dev e l op m en t. Th e w at er f a l l m et h o d is a r ig i d l i n ear m od e l c om pr i s ed of s e qu e nt i a l
ity
ph as es ( re q uir e m en ts , d es ig n , i m pl e m en ta t io n, v e ri f ic a t io n , a nd ma i nt en a nc e ) eac h
foc us in g on a s p ec if ic g o a l. Be f or e th e n ex t p h as e c a n b eg i n, e ac h p has e mus t b e
c om p l et e d c o m p le t ely . Th er e is us u a l ly no way t o go b ac k an d c ha n ge t h e p roj ec t
or d ir ec t i on .
m
)A
(c
e
lin
On
ty
P ro s: T he wa te r f a ll dev e lo p m en t m e th o d's l in e ar n at ur e m a k es i t s im p l e t o
un d ers t a nd a nd m an a ge . T he w at erf a l l m e th od is bes t s ui t ed fo r p roj ec ts w i th c l ea r
obj ec t iv es a nd s t a bl e r e qu ir e m en ts . Th e w at erf a l l d ev e l op m e nt me t ho d o lo gy m ay
si
be n ef i t les s ex p er i e n c ed pr oj ec t m an a gers a nd pr oj ec t te a ms , as w e l l as t e ams
wh os e c o mp os it i on c h an g es fr e q u en t ly .
Con s: B ec a us e of i ts r i gi d s tr uc t ur e an d s tr ic t c o n tro ls , t h e wa t er fa l l d ev e l op m e nt
me t ho d is fr e qu e nt ly s l ow an d c os t ly . Th e s e d is ad v a nt a ges m a y en t ic e wa t erf a l l
er
me t ho d us er s t o i nv es t i ga te al t er n a tiv e s o ft w are dev e l op m en t m et h od o l og i es .
Adv ant ag e s o f t h e W at e rf al l Mo de l
• T he w at er fa l l m od e l is s im p l e an d e as y t o u nd ers ta n d, an d i t em p l oy s
iv
me t ho d o lo gy . T h at is w hy it is a dv an ta g e ous for th e in ex pe ri e nc e d or n ov ic e
dev e l op er .
• B ec a us e o f th e m o d e l's r ig i d ity , pr oj ec t m a na g em e nt is s i m p le . F urt h erm or e, eac h
Un
ph as e h as its ow n s et of d e l iv e r a b les an d re v i ew pr oc es s .
• Th e W at er f a l l d ev e l op m en t me t ho d ol o gy s av es a s i gn i fic a nt a mo u nt of t im e by
proc es s i ng an d c o m pl et i ng al l p h as es at t he s a m e ti m e.
• T h e w at er f a l l m et h od ens ur es t ha t th e r eq u ir e me nts are we l l u n ders t oo d a n d
de f in e d. I t a ls o w or k s we l l f or s m al l er pr oj ec ts .
•Y o u c a n e as i ly p er for m t he tes t in g t h at r ef e rs t o t h e pr ev io us ly d ef i ne d s c en ar i os
i n th e f unc t io n al s pec i fic a ti o n.
ity
Di sa dv ant ag e s of W a t e rf a ll Mod el
• Th e w at er f a l l d ev e lo p me n t m et h o d c a n o n l y be us ed i f t he r e q u ire m en ts are
prec is e a n d av a i l ab l e up fr o nt .
• Th e wa ter f al l m e th o d is i n ap p l ic a b le t o pr oj ec ts t h at re q u ire o n go i n g
m
ma i nt e n anc e.
• Th e ma i n d is adv a nt a ge o f th is m e th o d is t ha t onc e a n a pp l ic at i on is in t h e
tes t in g s ta g e, i t is n ot r ec o mm e nd e d t o g o bac k a n d m ak e an y c h an g es t o
c om p l et e d s of tw ar e be c aus e i t m ay c a us e a l ot o f pr ob l e ms .
)A
• I f y our re q ui r e m en ts ar e no t w e l l - de f in e d an d c l ea r, th is m o de l wi l l n ot wo rk . It
work s w e l l for lo n g - t er m pr oj ec ts .
• D oc u me nt a ti o n tak e s u p a l ot o f t im e f o r d ev el o pe rs an d t es t ers i n wa te rf a ll
me t ho d o lo gy .
e
lin
Rap id a ppl ic at ion d e ve lop me nt
On
c ons t an t ly c h an g in g ma r k e t," s a i d Sc o tt St i ner , C EO a n d pres i d en t o f U M
Tec hn o l og i es , i n Fo r b es . T he a b i l ity t o adj u s t qu ic k ly is w h at a l lo ws f or s uc h a l o w
i nv es tm e nt c os t.
Th e r eq u ir e me nts p l an n i ng , us er des i g n, c o ns tr uc ti o n, a n d c ut ov er ph as es
c om pr is e t h e r a p id ap p l ic a t io n dev e l op m en t me th o d. T h e us er d es i gn a nd
c ons tr uc t i on p h as es a r e r ep e at e d u n ti l t he us er is s a t is f i ed t ha t t he pr o duc t me e ts
ty
a ll s pec i f ic a t io ns .
si
er
iv
Un
P ro s: R ap i d a pp l ic at i on dev e l op m en t is m os t e ff ec ti v e f or pr oj ec ts t h at h av e a
we l l- de f in e d b us in es s o bj ec t iv e an d a w e ll - d ef i n ed us er gro up bu t ar e n ot
c om p ut at i o na l ly c o mp l ex . R AD is es pec i a l ly us e f ul f or ti m e- s e ns it iv e s ma l l to
me d i um - s iz e d pr oj ec ts .
Con s: R a p id a p pl ic at i on d ev el o p me nt n ec e s s it a tes a s ta b l e t e a m c om p os it i on o f
h ig h ly s k i ll e d d ev e lo p er s a n d us ers w ho ar e i nt i ma t ely f am i l i ar w i t h t h e a p p lic a ti o n
ity
op p ort u n it i es for im pr o v em e nt in a ny s o ft w ar e d ev e l op m e nt pr oj e c t .
• T h ere is a p os s ib i l ity o f fe w er de f ec ts as a res u l t of pro t oty p in g i n n at ur e.
• E ac h p h as e of R A D pr ov i d es th e c l i e nt w it h th e h i gh es t pr ior i ty f unc t io n a li ty .
Di sa dv ant ag e s RA D mod el
(c
e
• T his m et h o d is n ot s u it ab l e for us e by d ev e lo p ers o n s m a ll b u dg et pr oj ec ts du e to
th e h i gh c os t o f m od e l l in g a n d au t om a te d c o de ge n era t io n .
lin
• Pr o gres s an d p r o b l ems ar e d if f ic u l t t o t rac k as t h ere is n o doc u me n ta t io n t o
de m ons tr at e w ha t h as be e n d on e.
On
th e i nd us tr y . E ac h ha s i ts ow n s et o f pros a nd c o ns , a n d eac h wo rk s w e l l i n a
v ar ie ty of s it u at i ons . Co ns id er i n te gr at i n g t he c om p on e nts o f ev e ry t ec h n i qu e t ha t
per f orm gr e a t for y our t ea m a n d c urr en t pr o j ec t w he n s e l ec t i n g y our dev e l op m en t
me t ho d o lo gy . As a r e s u lt , y o u c a n c r ea t e a hy br id d ev el o p me nt me t ho d o lo gy th at
wi l l g et y ou t o pr o duc t i on in a s ec ur e a n d ef f ic ie n t ma n n e r .
ty
3. 1. 3 . S y st em de v elo pme nt t ool s
A s y s t e m d ev e lo p me n t p l an i nv o lv es s ev er a l p h as e s , inc l u d in g f e as ib i l ity s tu d i es ,
req u ir e me nts a n a ly s is , s o ft w ar e d es i gn , s o ftw ar e c o di n g, t es t i ng a nd d e bu g g in g,
si
i ns t a ll a ti o n, a n d p r es er v a t io n . A ll o f th es e proc es s es c an b e m an a ge d us in g
v ar io us t oo ls .
5. C o des h ip
6. C o de fres h
7. N o de
8. Werc k er
Un
9. St a mp ly
10 . G i t hu b
11 . C od ek it
Eng in e Y a rd
E ng i n e Y ar d is a fr am ew or k as a n e tw ork o p er a t or th a t s tre a m li n es , c us t o mis es ,
an d s e ts u p c l ou d - bas ed ap p l ic a t io ns . E ng i n e Y ar d wi l l i ns ta l l a n d ma i nt a i n th e ir
ity
ap ps i n t he c lo u d, a l l o wi n g th e m to f oc us o n wh at t h ey d o bes t. c r e at i ng v is u a l ly
ap p ea l i ng ap ps
W ebs i te : ww w. e ng i n ey ar d .c om
Pr ic in g m o de l : P a id
De vD oc s
m
Dev e lo p er d oc u m e nt at i on s e ar c h e ng i n e th at is f as t , o ff l i ne , a nd fr ee . D ev d oc s . i o
is a us er - fr i e n dly an d qu ic k r e f er e nc e m an u a l a ggr e g at or fo r po p u l ar fr on t - e n d
l an g ua g es an d li br ar ie s .
W ebs i te : ww w. d ev d oc s .i o /
)A
Pr ic in g m o de l : F r e e
Pub li c Ap is
P ub l ic A P Is A c o ll ec t i on o f f r e e J SO N A P Is f or w eb d ev el o p m en t. Ap p l ic a t io n
pro gr a mm i n g i nt er fac e s ( A PIs ) ar e gr ou ps of t ec hn o l og i es t ha t a l l o w a pp l ic at i ons to
c om m u nic a te w it h o n e an ot h er . Wh e n y ou th i nk of AP Is , y o u pro b a bly t h ink o f
(c
e
Cre at e a b ac k e nd f or y our mo b i le ap p q u ic k l y . Div i d e. i o is a b ac k e nd l ibr ary t ha t is
op e n s o urc e . It 's s i mp l e, s a f e, a n d ef fec t iv e . De p loy w h er ev er y ou wa nt . M a in ta i n
c on tr ol ov er y our da ta . V is i t us o n G i th u b. I t i s fr ee an d o p en s o urc e.
lin
W ebs i te : ww w. d iv id e . i o/
Pr ic in g m o de l : F r e e
Cod es hip
Co d e s h ip a l l ows s o ft war e t o be r el e as e d q u ic k ly , a ut o ma t ic a l ly , an d m u lt i p le t i m es
On
per day . It s ho r t ens dev e l op m en t c y c l es , l ow er i ng t h e l ik el i h oo d of de f ec ts a n d
ex p a nd i n g tec h no l o gy .
W ebs i te :w ww .c od es h i p.c o m/
Pr ic in g m o de l : F r e e
Cod ef re sh
Co d efr es h is a c on ti n uo us d e liv ery a nd c o l la b ora t io n p l at fo rm for D oc k er.
Co d efr es h h e lps ag i l e t ea ms im pr ov e q ua l ity an d i nc r e as e s p e ed - t o- m ark et by
ty
fac i l it at i n g r a pi d f ee d b ac k a nd t es t i n g c y c l es .
W ebs i te : ww w.c o de fr e s h. i o
Pr ic in g m o de l : F r e e
Nod ej s
si
No d e.j s is li g ht we i g ht an d e ff ic i en t b ec a us e i t em p l oy s an ev e n t - dr i v en , n on -
b loc k i ng I /O m o de l . T h e No d e.j s p ac k ag e ec o s y s te m, np m , is t he w or ld 's l arg es t
er
ec os y s t em o f o p en s o ur c e l ibr ar i es .
W ebs i te : ww w. n od ej s . or g
Pr ic in g m o de l : F r e e
iv
W er c ke r
W erc k e r is a fr a me wo r k a n d ap p f or d ev e l o pi ng , b u il d i ng , a nd de p l oy in g
c on t ai n er iz e d a p pl ic at i ons an d m ic r os e rv ic es i n t he mo d ern c lo u d. Th is p la tf or m
was c re a te d t o m ak e d ev e l o per s ' l iv es eas i er by a l l ow i ng t h e m to m ov e qu ic k ly a nd
Un
c rea t e th i n gs .
W ebs i te : h tt p: // ww w. w er c k e r .c om /
Pr ic in g m o de l : F r e e
St amp l y
St a m pl ay is an A PI - b a s ed dev e lo p m en t p la tf or m th at al l ows w e b d ev e l o pers t o
c rea t e an d d e p loy f u l l - fe at ur ed w e b a pps . S t am p l ay is a lo w - c o d e p la tf or m th a t
ity
G ithub
m
Pr ic in g M o de l : P a id
Cod ek it
Co d ek i t is li tt l e m or e t ha n a c o m p l ier f or L es s a n d S as s c o mp i l er. I t a ls o c o l l at es
J av a Sc r i pt , M ar k do wn , a n d ot h er l an g ua g es , an d i t c o ns t a nt ly m o ni t ors fo r f i l e
c ha n ges . M o di f ie d f i le s ar e a ut o ma t ic a l ly ac c um u l at e d, a n d th e s e arc h en g i ne is
(c
re lo a de d . Co d ek i t is w e ll - d oc um e nt e d an d e a s y t o us e.
W ebs i te : h tt ps : //c o dek it a pp .c om /
Pr ic in g m o de l : F r e e
3. 1. 4 . Co mput e r Aid ed S of t w ar e E ngi ne e r ing (C A SE )
e
Co m pu te r a id e d s of tw ar e en g i ne er i ng (C A S E) is t h e us e of c o m pu t er - a i d ed t o ols
lin
an d m et h ods i n t he d e v e lo p me n t o f s of tw ar e . C A S E is us ed t o e ns ure t h at s of tw ar e
is of hi g h q ua l ity an d fr ee of f la ws . C A S E e ns u res a me th o d ic a l a nd d is c i p l in e d
ap pr o ac h a nd a l l ows des i g ner s , dev e l op ers , t es t ers , m a na g ers , a nd o th ers to s e e
proj ec t m il es to n es as t hey pr o gr es s .
On
bus i n es s p l a ns , r e qu ir em e nts , a n d des i gn s pec i f ic a t io ns . O n e of th e pr i mary
be n ef i ts of us i n g C A S E is t h e d el iv ery o f t h e f in a l pr od uc t, w h ic h is mor e lik e ly t o
me e t r e a l- w or ld r e qu ir em e nts bec a us e it k e eps c us t o mers i nv o lv e d th ro u gh o ut t h e
proc es s .
CA S E d e p ic ts a div er s e s et of l a bo r - s av i n g t oo ls us e d i n s o ft war e d ev e l op m e nt . It
ge n er at es a fr a m ew or k for pr oj ec t or g a n is a t io n a nd is us e f u l in inc r e as in g
ty
pro d uc t iv i ty . T h er e w a s mo r e i nt er es t i n t he c onc e pt of C A S E t oo l s y ears a go , bu t
l es s s o t o d ay , as t he t oo ls h av e ev o lv e d i nt o d if f ere n t f u nc t i ons , o f te n i n r es po ns e
to t h e ne e ds o f s of tw a r e d ev e l o pers . A ft er i t s re l e as e , th e C A S E c onc e pt w as a ls o
he av i ly c r i t ic is e d.
Ca s e T ool s
si
Th e f u nd a me nt a l i de a be h i nd C A S E t oo ls is t ha t bu i lt - i n pr ogr a m me s c an a i d in th e
an a ly s is of d ev e l o pi n g s y s t e ms i n or d er t o im pr ov e q u a l ity a n d prov i d e b e tt er
er
res u l ts . T hr o ug h ou t t he 1 99 0s , C A S E t oo l s bec a me p art of th e s of tw ar e l ex ic o n ,
an d lar g e c or p or a t io n s s uc h as I BM us e d t hes e t o ols to as s is t i n t he c r ea t io n of
s of tw ar e.
CA S E i nc lu d es a n u mb er of t oo ls , r ef err e d t o as C A S E to o ls , th at ar e us e d to
iv
s up p ort v a r i o us s ta g es a n d m il es to n es i n th e s o ft war e d ev e lo p me nt l i fe c y c le .
CA S E Too l Cat eg or ie s:
Un
1. Di a gr am m i ng To o ls : Th es e t oo ls a i d i n t he d i a gra m m at ic a nd g r ap h ic a l
rep r es e nt at i on o f d at a a n d s y s t e m pr oc e s s es . It gra p h ic a l ly rep res e nts
s y s te m e l em e nts , c o ntr o l f lo w, a n d d at a f lo w a m on g v ar i ous s o ft war e
c om p on e nts a n d s y s te m s truc t ure . F or ex a m p le , F l ow C h art M ak er is a t oo l
for c r ea t in g c u tt i ng - e d ge f l owc h art s .
2. Co m pu te r D is pl ay an d R e po rt G e ner at ors : T hes e a id i n c o m pre h e nd i n g t he
da t a r eq u ir e me nts an d t he r el a ti o ns hi ps i nv o lv ed .
3. A na ly tic a l T oo ls : It f o c us es on t h e d i agr a m 's an d d at a f l ow's i nc ons is te n t
ity
an d i nc or r ec t s p ec if ic at i ons . It a i ds i n t he c o l l ec t i on o f r e qu ir e me n ts by
au t om at ic a l ly c h ec k i n g for a ny i rre g u lar i t ie s , i mpr ec is io n i n d i ag ra ms , a n d
da t a r ed u n da nc ies . Fo r ex a mp l e,
• Ac c ep t 3 60 , Ac c o mp a , C as e C om p l et e for r eq u ire m en t a na ly s is .
• V is ib l e A n aly s t f or to t a l an a ly s is .
m
s erv ic i n g c os t ov er its ex p ec te d l i fe t im e is s i gn i f ic a nt ly r ed uc ed .
• As a n or g an is e d a pp r oac h is tak e n d ur in g t he dev e l op m e nt pr o c es s , t h e
ov er a l l q ua l i ty of t h e p r od uc t i mpr ov es .
• A c o m pu te r - a i d ed s o f tw ar e en g i ne er i ng ap pro ac h i nc r eas es t h e l ik e l ih o od
an d e as e of m e et i n g r ea l - w orl d re q u ire m en t s .
•
e
CA S E i nd ir ec t ly pr ov i des a c o m p et it iv e a d v an t ag e t o a n org a n i s at i on by
as s is t i ng in t h e dev e l o pm e nt o f h i gh - q ua l i ty pro d uc ts .
lin
Di sa dv ant ag e s of t h e C AS E app ro ac h
• Cos t: Us in g a c as e t o o l is ex t re m e ly ex p en s iv e. Mos t s ma l l - s c a le s of tw ar e
dev e l op m en t f ir ms d o no t i nv es t i n C A S E to o ls b ec aus e t h ey b e li ev e t ha t t he
be n ef i ts of C A S E ar e on ly j us t if i ab l e i n t he dev e l op m en t o f l arg e s y s te ms .
• Le ar n in g C ur v e: I n m os t c as es , pr o gra m m e r p ro d uc t iv ity may s uf fer dur i n g
On
th e in i ti a l p h as e of i mp l e me n ta t io n, as us ers re q u ire t im e t o l ear n t h e
tec h no l ogy . M a ny c o n s u lt an ts pr ov i de tra i n i ng an d on - s i te s erv ic es , w h ic h
c an he l p t o ac c el er at e th e le ar n in g c urv e as we l l as th e d ev el o pm e nt an d
us e of s o ft war e .
• To ol M ix : It is c r it ic a l to c r e at e a n a p pr opr i a te s e lec t io n t o o l m ix i n or d er t o
ga i n a c os t a dv a nt a g e. CA S E i nt eg ra t io n an d da ta i nt e gra t io n ac ros s a l l
p la tf or ms ar e c r i tic a l.
ty
3. 1. 5 . Jo int Ap pl ic at i on D e v elo pm ent (J A D)
si
JA D, o r Jo int Ap pl ic at i on D ev e lopm ent , is t he proc es s o f d es ig n i ng an d
dev e l op i ng c o mp u ter - bas e d s y s t ems /s ol u ti o ns . I t g a th ers r eq u ir e me n ts s i d e by s id e
as pe r bus i n es s ne e d s w h il e d ev el o p in g n e w in f or ma t io n s y s t ems f or a c o mp a ny ,
i mp ly i ng t ha t J AD i nv o lv es t he c l i en t or en d- us ers i n th e des i g n an d d ev e l op m e nt
er
proc es s . It a ls o i nc lu des ap pr oac h es for i mp rov i ng s pec i fic a ti o n q u al i ty a nd us er
par t ic ip a ti o n t hr o u gh a s er i es o f c o l l ab or at i v e w ork s h o ps k n ow n as J A D s es s i o ns .
B ec a us e th e c li e nt is i nv o lv ed thr o ug h ou t t he dev e l op m en t pr oc e s s , dev e l op m e nt
ti m es ar e s h or t e ne d a nd c l ie nt s at is f ac ti o n i s h i gh er .
iv
to prov e t h e pr oj ec t i n t he 19 8 0s , a n d i t h as s i nc e b ee n a p p li e d i n a v ar ie ty o f
i nd us try s ec t or s , pr o d uc in g ex c e ll e nt p ro d uc ts .
P art i cip ant s in J AD :
1. Th e J A D Pr oc es s i nv o lv es a l arg e nu m be r o f k ey s tak e ho l de rs . T h ey ar e as
fo l l ows :
2. 1. Ex ec u t io n Pr oc es s : T h is pr oc es s is fr om t h e c us to m er's p ers p ec t iv e a n d
i nc l u des t h e Pr oj ec t Ma n ag er , CIO , C EO , or CI SO w ho h as th e au t hor i ty t o
ity
mak e pr oj ec t d ec is io n s .
3. 2. F ac i li t at or : T h i s p e r s on is in c h arg e o f c rea t in g , m a na g in g , a n d c arry i n g
ou t th e J A D ac t iv i t ies , as w e l l as m i ni m is i ng d is a gre e m en ts , e n c our a g in g
en d- us er i nv o lv e me nt , m a in t ai n i ng f oc us , a n d tak i n g an un b ias e d a ppr o ac h.
4. IT R e pr es e nt at iv es : T h is i n d iv i d ua l fo r g iv i ng tec h n ic a l a dv ic e a nd to h e lp
th e t ea m t o d ev e lo p t ec hn ic a l m od e ls a n d t o b ui l d h e pro to ty pe of en d
m
J AD s es s i o n a nd pr ov i de r ef er enc es f or th e r ev ie w.
7. O bs erv er : T he o bs e r v er wi l l o bs erv e e ac h J A D s es s io n a nd g at h er k no w le d g e f or
en d- us er n ee ds a n d J AD s es s i o n d ec is i ons , as w e l l as in t erac t w it h J AD
e
par t ic ip a nts o n ly o uts i de of J A D s es s i ons .
The di ag r am b elo w d epi ct s t he va ri ou s st ag es of J AD .
lin
On
ty
si
er
iv
Un
JA D S es s ion s:
• Th e o bj ec t iv es an d a ge n da i te ms f or t h e J AD s es s io ns mus t b e c l e ar ly
de f in e d. I t mus t b e ens ur e d t h at k ey p er s on n e l f ro m t he t ec h n ic a l a nd
bus i n es s wor l ds , as w e ll as th os e wh o t ak e no t es , ar e pr es en t.
• Q u es t i ons a n d it e ms ar e t h e es s e nc e of th e d is c us s i o n f or dr iv i n g th e
me e ti n g, a n d w e s h o u ld n ot ex p ec t q u ic k a ns w ers . We s h o u ld a ls o as k
ity
qu es ti o ns , k e e p tr ac k of im p ort a nt d et a i ls , a nd as s i g n ac t i o n it e ms .
• Th e go a l of J AD s es s i ons is t o s t i mu l at e c rea t iv e t h i nk i n g, w h ic h l ea ds t o
c o ll a bo r a t iv e d is c us s i ons t h at re q u ire ex p er tis e fr o m mu l t ip l e d ep art m en ts .
• Te ams s h o ul d as s is t o ne a no t her i n m ak i ng d ec is i o ns . If t h e te a ms a re
un a b le t o r e ac h an a gr e e m en t, w e m us t c on d uc t s c h e du l e d J A D s es s io ns
m
k no w n as J A D wor k s h ops .
• W e ar e aw ar e t ha t t h e m aj or ity of J A D s es s i ons ar e s c h e du l e d dur i n g t he
dev e l op m en t p h as e ; ho wev er , t h is m a y oc c ur d ur in g t h e proj ec t 's
req u ir e me nts .
)A
e
Joi nt App li c at io n De ve lop me nt Ch al le ng e s:
lin
1. T ea m m e m ber s ' o p i ni o ns m ay d if f er at ti mes , f i nd i ng it c ha l l e ng i n g to c oi nc i de
obj ec t iv es a nd ac h i ev e foc us .
2. D ep e nd i n g o n th e s iz e of th e pr oj ec t, p eo p le i n J A D may hav e to s p e nd a
s i gn i fic a nt p er i od of t i me .
On
J o in t A pp l ic at i o n Dev e l op m en t ( J A D) m ay n o t be t h e s o lu t io n t ha t t he org a n is a t io n
req u ir es , b u t it pr ov i d es a m or e i nc l us iv e a n d f lu i d e nv i ro n me n t t h an ot hers . J A D is
a tec h n iq u e us e d i n t h e e ar ly s t a g es of a s y s te ms d ev e l o pm e nt p roj ec t t o d ev e l o p
bus i n es s s y s te m r e q u i r e me nts . O n e o f th e g oa ls o f J A D is t o br i ng M I S a nd e n d
us ers t o ge t her in a s tr uc t ur ed w or k s ho p , wh i c h is ac c o mp l is he d by ex p er i enc e d
J AD f ac i l it at or s a n d c u s to m is e d , s c h ed u le ag en d as to as s is t p art ic i pa n ts i n
ty
c om p l et i ng hi g h q ua l it y r e q ui r e m en ts . I t c a n a ls o b e s e e n th at t h e J AD proc es s
red uc es d ev e l o pm e nt t i me , c os ts , a nd err ors .
si
3. 1. 6 . R api d App li c at ion D ev e lo pm ent ( RA D)
Th at is no t t h e c as e wh e n d ev e lo p in g s of t war e. Y o u c an c h an g e t h e d es i gn , a d d
fu nc t i o na l ity , a nd r e mov e f ea t ur es y ou do n' t wa n t w it ho u t a ff ec t i ng t h e f in a l
pro d uc t .
iv
B ut h ow di d r a p id ap p l ic a t io n d ev el o p me nt c om e t o b e? Wh at are th e b en e fi ts of a
rap i d ap p l ic a t io n dev e lo p me n t m o de l ? H o w d oes o ne g o a b ou t dev e lo p i ng r a p id
ap p l ic a t io n d ev e lo p me nt s o ft w ar e ? An d h o w d id it c om e t o b e t he s ta n dar d m e th o d
ity
for d ev e lo p i ng s o ft w ar e?
Ra p id Ap p l ic at i on D ev e lo p me n t ( RA D) is a t er m t h at r ef ers to t h e d ev el o pm e nt o f
s of tw ar e ap p l ic at i ons i n a s h or t p er i od of
m
Ra p id A p p lic a ti o n D ev e lo p me n t ( R A D) is a d ev e l o pm e nt m od e l t h at pr ior i t is es r a p id
pro t oty p in g a n d i m me d ia te f e e db ac k ov er l e ng t hy d ev e l op m e nt a n d tes t in g c y c les .
)A
A m aj or f l aw in t he w at er f a l l m od e l is t ha t onc e t he pr o gr am m e i s i n th e t es t i ng
ph as e, c h an g i ng t he c or e f unc t io ns a nd f ea t ures o f t h e s o ft w are b ec o m es di ff ic u lt .
Th is e ff ec tiv e ly l eav es y ou w it h s of tw ar e t ha t m ay or m ay no t me e t y o ur c ha n gi n g
ne e ds .
e
lin
On
ty
si
Ra p id A pp l ic at i on D ev e lo p me n t ( R AD) w as i nv e n te d i n t he 19 8 0s , s o i t is n ot a ne w
er
c onc e pt . Ho w ev er , u n l ik e t h e wa t erf a ll mo d e l, i t is n ot un i qu e . It is a c on t in u ous
ev o l ut i o n of d ev e lo p m en t p h il os op h i es i n r es po ns e to t h e n ee ds o f th e t im e .
In i ti a l ly , B ar r y Bo e h m, J am es Mar t in , an d ot hers r ec o gn is ed th a t s of tw ar e w as n o t
iv
O ri g in a l ly , r a p i d ap p l i c at i on d ev e lo p m en t t ook t h e for m o f th e S pi ra l m o de l , i n
wh ic h o ne o r mo r e d ev e lo p me n t mo d e ls wer e us e d to w ork o n a s p e c if ic pr oj ec t .
A lt h ou g h R A D h as e v o lv e d ov er t im e, t h es e fo ur b as ic s te ps hav e r em a i ne d
c ons is te n t.
1. De f in e t he r eq u ir e m e n ts
m
2. Pr ot oty p e
3. Rec e iv e F e ed b ac k
4. Fi na l iz e S of tw ar e
)A
at v ar i o us s ta g es of t h e d ev e l op m e nt c y c l e .
2. C r eat e a p rot ot yp e
Th is is w he r e th e ac t u a l d ev el o p me nt oc c urs . I ns t ea d of a dh er i ng t o a s tr ic t s et o f
req u ir e me nts , d ev e l op e r s c r e at e pro t oty pes wi t h v ari o us fe at ur es an d fu nc t io ns as
e
qu ic k ly as pos s i b le . T hes e pr o to ty p es ar e t he n s h o wn t o c l i e nts , wh o d ec id e w h at
th ey l ik e a nd d is l ik e.
lin
Mos t o f t h e t im e , t hes e pr ot o ty p es ar e rus h ed t o c o mp l et i on in o rd er t o
de m ons tr at e s p ec if ic f ea t ur es w i th o ut pr o pe r p o l is h . T h is is n or m a l, a n d t h e f in a l
pro d uc t is o nly c r ea t e d d ur i n g t he f i na l is at i on s t a ge , w he n b ot h t he c l ie nt an d t he
dev e l op er a gr ee on t h e f in a l pr od uc t.
3. O bt ai n F e edb a ck
On
Fe ed b ac k o n w ha t's g oo d , w ha t's n o t, w h at w ork s a n d w h at d o e s n't is s h ar e d a t
th is s ta g e. F ee d bac k is g iv e n n ot o n ly on fu nc t i o na l ity , b ut a ls o o n v is u a ls a nd
i nt erf ac es .
Pr ot oty p i ng w il l c on t in ue w it h t h is f ee d bac k i n m i nd . T hes e t w o s t eps ar e re p ea t ed
un t i l a f i n a l pr o d uc t t ha t m ee ts th e n ee ds of b ot h t he d ev e lo p er s a nd t h e c l ie n t is
c rea t ed .
4. Fi na liz e S of t w ar e
ty
Her e, t he c l i e nt a nd t he s o ft war e's f ea t ure s , f unc t i ons , aes th e ti c s , a n d in t erf ac e
are fi n a lis e d. Be f or e d e liv er i ng t o t h e c l ie n t, s t ab i l ity , us a bi l i ty , a n d m a in ta i n ab i l ity
mus t b e pr i or it is ed .
si
Rap id Ap pl ic at ion D e ve lop me nt ' s Be nef it s an d Dr aw ba c ks (R A D)
er
W it h t h es e s t eps , it m ay a p pe ar th a t a p pl ic a ti o n d ev e lo p me n t is a go o d id e a f or al l
proj ec ts , b ut t h at's a b it o f a s tr etc h. R A D s of tw ar e is i d ea l f or s ma l l t ea ms a n d
s hor t- ter m pr oj ec ts . H ow ev er , i t is n ot a pa nac e a for al l pr o b le m s . H er e ar e s o me
of t h e be n ef i ts an d dr a wb ac k s o f us in g ra p id ap p l ic a t io n d ev e lo p me nt .
iv
Re q ui re m en ts c a n b e c ha n ge d a t a ny Ne e ds s tro n g te a m c o l l ab or at i on
Un
ti m e
E nc o ur ag es a n d pr io r i t i es c us t o mer Ca n no t wo rk wi t h l arg e te a ms
fe e db ac k
Dev e lo p m en t t im e is d r as t ic a ll y Ne e ds us e r r eq u ir e me nt t hr ou g ho u t t h e l i fe c y c l e of
r ed uc e d th e pr od uc t
Mo re pr o d uc t iv ity w i th fe wer pe o p le O n ly s u it a bl e f or pr oj e c ts wh ic h h av e a s ma l l
dev e l op m en t t im e
m
In te gr at i o n is n’ t a pr o b le m, s inc e it O n ly s y s te ms w h ic h c a n b e mo d u lar is e d c a n be
)A
O the r D ev el opm ent M ode ls vs . Ra pid A ppl i cat ion D e ve lop m ent
(c
O nc e c om p ar ed t o o th er s o ft wa re d e v e lo p me n t mo d e ls , rap i d a p pl ic at i o n
dev e l op m en t d i ff er s s i gn i fic a nt ly . Th e gl ar i ng d is t i nc t i on is th at rap i d ap p l ic a t io n
dev e l op m en t c o nc en tr at es o n s pe e d, as o p pos e d t o o th er m od e l s , w hic h ty p ic a lly
foc us o n d el iv er i ng a wor k i n g pr o d uc t t o t he c us to m er.
A no th er t hi n g t o k ee p i n m i n d is t h at r a pi d a pp l ic at i on d ev el o p me n t pr e fers a s i ng l e
te a m w i th a s ma l l n um ber o f m em b ers . T his a ll o ws f or q u ic k c om m un ic at i o n as w e l l
e
as q u ic k m e et i ngs for i nf or ma t io n tr a ns f er. O th er dev e l op m en t m od e ls s uc h as t he
wa ter f al l m o de l gr ea tly pr ef er h i gh ly c o h es iv e gr o ups s e par a t ed i n to v ar i ous
s pec i a l is a t io ns .
lin
B ec a us e th e R AD f r a m ew or k is f oc us e d o n s pe e d, d ev e lo p me n t ti m e is s h ort er t h an
i n ot h er m od e ls . H ow e v er , t h e d if fer e nc e is u s ua l ly m i n or bec a us e r ap i d a pp l ic at i o n
dev e l op m en t pr ef er s t o pr od uc e a l ar ge nu m ber of pr o to ty p es b ef o re th e f i na l is ed
pro d uc t .
On
Ra p id ap p l ic a t io n d ev e lo p me n t is a ls o he av i ly f oc us e d on inv o lv i n g th e e n d us e r at
ev ery s t a ge of t he dev e lo p me n t pr oc es s . O th er m od e ls ty pic a l ly o n l y rec e iv e us er
i np ut at t he s t ar t an d en d o f th e d ev el o p me n t c y c l e.
ty
A n e ff ic ac io us Sy s t e m D ev el o p me nt L if e Cy c l e ( S DL C) mus t c on tr ib u te to a h ig h
s o lu t io n t ha t i nc lu d es c us to m er r e qu ir e m en ts , is c o m p le t ed w i th i n ti m e a nd c os t
es t i ma t es , an d ef f ic ie nc y o f t h e o p er at i ons i n ex is ti n g a n d p l a n ne d i nf or ma t io n
si
tec h no l ogy in fr as tr u c t ur e .
Th e Sy s t em Dev e l op me n t L i fe Cy c le ( S DL C) is a c onc e pt ua l m od e l t h at i nc l u des
po l ic i es a nd pr oc e d ur es f or d ev e lo p in g an d mo d ify i n g s y s t ems th r ou g ho u t t he ir l if e
c y c l es .
er
A na ly s ts us e SD LC t o c r e a te a n i nf or m at i on s y s te m . SD LC ac t i v it i es inc l u de th e
fo l l ow i ng :
• req u ir e me nts
• des i g n
iv
• i mp l e me nt a ti o n
• tes t in g
• de p l oy m e nt
• op er at i o ns
Un
• ma i nt e n anc e
Ph a se s of S DLC
Th e Sy s te ms D ev e l o p me n t L if e Cy c le is a s y s te m at ic a p pro ac h th at ex p l ic it ly
bre ak s d o wn t h e wor k r eq u ir ed t o i m p le m e nt a n ew or mo d if i ed I n fo rm at i on Sy s t e m
i nt o p has es .
ity
m
)A
(c
Fe as ib ili ty St ud y or Pl an nin g
• S pec i fy th e pr o bl e m an d t he s c op e o f th e e x is t i n g s y s te m.
e
• Ex am i n e th e n ew s y s te m a nd de te rm i n e its go a ls .
• Co nf ir m t he f e as ib i l it y o f th e pr oj ec t a n d c r ea t e th e pr oj ec t s c h ed u le .
• T hr ea ts , c o ns tr a i nts , s y s t e m i nt e gra t io n , an d s ec ur ity a re a l l c ons i d ere d d ur in g
lin
th is p h as e .
• At t h e e nd o f t his ph as e , a f eas i b i li ty re p or t f or t h e en t ir e proj ec t is c r e at e d.
Sp e cif ic at ion an d an al y si s
On
• G at h er, a n a ly s e , a nd v a l i da te t h e d at a.
• De f in e t he s y s t e m's r eq u ir em e nts a n d pr ot o ty p es .
• As s es s th e o pt i o ns a nd pr i or i tis e t he r eq u ir em e nts .
• Ex am i n e th e e nd - i n fo r m at i on us er's ne e ds an d i m pr ov e t h e s y s te m g oa l .
• At t h e en d o f t h is p has e , a S of tw ar e R e q u ire m en t S p ec i f ic a t io n (S R S) d oc u m e nt
is p re p are d t h at s p ec i f i es t he s y s te m's s of tw are , har dw ar e, fu nc t io na l , a n d n et w ork
req u ir e me nts .
ty
S yst em De si gn
• Th is i nc l ud es t he d es i gn of a p p l ic a t io n, ne t work , a n d d at ab as e i nt erf ac es ,
si
as we l l as us er a n d s y s te m i nt er fac es .
• Co nv er t th e S R S d oc u me n t in to a l o gic a l s tr uc t u r e c o n ta i n in g a de ta i l ed a nd
c om pr e he ns iv e s e t of s pec i f ic a t io ns t h a t c a n b e i mp l e me nt ed i n a
pro gr a mm i n g l an g ua g e.
er
• Cre at e a p l a n for c on t i ng e nc y , tr a i ni n g, m a i n te n anc e, an d o pe ra t io n.
• Ex am i n e t h e pr op os e d des i g n. As s ur e t h at t he f i n al des i gn me e ts th e
req u ir e me nts ou t li n ed i n th e S R S d oc u m en t.
iv
• Fi na l ly , c r e at e a d es i gn d oc um e nt t h at w i l l be us e d i n th e s u bs e q ue n t
ph as es .
Un
Imp le me nt a t io n
• Co d in g is us e d t o tr a n s l at e th e d es ig n i n to s ourc e c o d e.
• Co m bi n e a l l o f t h e m od u l es t o c r e at e a tr a in i ng e nv ir o n me nt c ap a b le of
de t ec t i ng e r r or s an d d ef ec ts .
ity
• A t es t r e p or t w it h er r or s is c r ea te d us in g a t es t p l an t ha t inc l u des t es t -
re la te d t as k s s uc h a s tes t c as e g e ner a ti o n, t es t i ng c ri t eri a , an d t es ti n g
res o ur c e a l loc a ti o n.
• Ins ta l l t h e n ew s y s te m a ft er in t eg r at i n g t he i nf or ma t io n s y s t e m i n to its
env ir o nm e nt .
m
Ma int en an ce / S uppo r t
•
)A
e
des i g n ph as es .
lin
S yst em Ana l yst 's Ro l e
Th e s y s t e m an a ly s t is s o me o ne w ho is w e l l - v ers e d i n th e s y s te m an d wh o g u id es
th e s y s t e m d ev el o p m en t p r oj ec t by pr ov i d i ng c l ea r i ns t ruc t io ns . He is an ex p er t
wi t h t h e tec h n ic a l a n d i nt er p er s o n a l s k i l ls r e qu ir e d to c ar ry ou t d e v e lo p me n t t as k s
at e ac h s ta g e.
On
He s t riv es t o a l i gn t he i nf or ma t io n s y s t e m's o bj ec t iv es w it h t he or ga n iz a t io n's
go a ls .
ty
si
er
iv
Un
P rin c ip al Fun ct i on s
tec h ni q ues .
• O bt a i ni n g us er c o ns e ns us t o pr i or it i es r e qu i re me nts .
• G at h er in g f ac ts or in for m at i on an d s o l ic it i n g us er fe e db ac k .
m
qu a nt i fi es c os t a nd b e ne f its .
• I m p le m e nt ed t h e s y s te m's lo g ic a l d es i gn , w h ic h m us t be mo d u lar .
• Es t ab l is h a s c he d ul e f or ev al u at i n g t h e s y s te m af te r it h as b ee n i n us e f or a
wh i l e, a n d m od i fy it as n e ed e d.
e
Cha r a cte r ist i cs of a S yst em s An a ly st
Th e fo l l ow i ng di a gr am de p ic ts t h e q ua l it i es t ha t a s y s t ems an a ly s t s ho u l d hav e –
lin
• I n ter p ers on a l a bi l i t ie s
Co m mu n ic at e w it h us e r s a n d pr ogr a m mers .
• F ac i li t at e gr ou p d is c us s io ns a nd le a d s m a l l er te a ms .
On
• Co ntr o l l in g ex p ec t at i ons .
• Ex c el l e nt c o m pr eh e n s i on , c o mm u n ic a t io n, s e ll i n g, a n d te ac h in g s k i l ls .
• A m ot iv at or w h o is s e lf - as s u r e d i n t he ir a b i l ity t o s o lv e pr ob l ems .
ty
A bi l i ty to An a ly z e
• A n un d er s t a nd i n g of th e s y s t em as w e l l as org a n is a t io n a l k no w l e dg e
si
• I d e nt if ic at i o n, a n aly s is , an d r es o lu t io n o f pr ob l e ms
• Mak es p er fec t s e ns e
er
• T h e ab i l i ty t o m ak e t r ad e - of fs
• An ea g er n es s to le ar n ab o ut a ne w o rg a nis a ti o n
iv
Un
ity
m
)A
(c
Ma na ge me nt Ca pa bi li t ie s
e
• Le ar n th e j ar g on a n d pr ac t is es o f y ou r us e r s .
• Ma n ag e m en t of r es o ur c es an d pr oj ec ts .
lin
• Ma n ag e m en t of c ha n ge an d r is k .
• T h oro u gh ly u n d er s t a nd t h e m an a ge m en t f u nc t i ons .
On
Te chn ic al C ap ab il it i e s
• Co m pu te r an d s o ft wa r e k n ow l ed g e
ty
• St ay u p t o da t e on c ur r en t ev en ts .
• B e fa m i l iar w i th s y s t em des i g n t o o ls .
• Ex t e ns iv e k n o w le d ge o f n ew t ec h n o lo g i es .
si
er
3. 1. 8 . Soft w a r e d e ve l opm ent t ha t i s a gi le
it er at iv e s o ft w ar e d ev e lo p me n t a ppr o ac h. A g il e me t ho ds d iv i de t as k s i n to s m al l er
it er at i on s or par ts a nd d o n ot i nv o lv e lo ng - t erm pl a nn i n g d ire c tly . T h e pr oj ec t
s c op e a n d r e qu ir e m en ts ar e es t a b lis h ed at th e s t art o f t he dev e l op m en t pr oc es s .
Th e n um b er o f i t er a t i ons , d ur at i on , a n d s c op e o f e ac h i te ra t io n ar e al l c l ear ly
Un
de f in e d i n a dv a nc e.
e
lin
On
ty
si
er
iv
Fo l lo w in g ar e t he ph as es i n th e A g i l e mo d e l are as fo l l ows :
Un
1. Re q ui r e m en ts g at h er i n g
2. Des i gn t h e r e qu ir e me n ts
3. Co ns tr uc ti o n/ it er at i on
4. Tes t i n g/ Q u a l ity a s s ur anc e
5. De p loy m e nt
ity
6. Fe ed b ac k
th ey w i ll in t er a c t w it h y our ex is t i ng s y s t e m.
dev e l op m en t, s o it w i l l h av e s i mp l e, mi n i ma l fu nc t i o na l ity .
e
6. F e edb ac k: T h e f i n a l s t ep af te r re l eas i n g t he pr od uc t is fe e d bac k . T he te a m
rec e iv es a n d wor k s t hr ou g h pr od uc t fe e db ac k i n t h is proc es s .
lin
Agi le T e st in g M et hod s:
o Sc r um
o
On
Cry s t a l
o Dy n a mi c S of tw ar e Dev e lo p me n t Me t ho d (D S DM)
o Fe at ur e Dr iv e n D ev e l o pm e nt (F DD)
o Le a n S of tw ar e Dev e l o pm e nt
o e Xtr e me Pr o gr a mm i n g ( X P )
S cr um
ty
SC RU M is a n ag i l e gr ow th m et h o do l ogy t ha t re l i es on t as k ma n a ge m en t i n t e am -
bas e d d ev e l op m e nt e n v ir on m en ts .
It h as th re e r o l es , a n d t he ir r es p o ns i b i l it i es are as fo l l ows :
si
o Sc r u m M as ter : Th e s c r um c an for m t h e mas t er t ea m , or ga n is e m e et i ngs , a n d
re mov e r o a db l oc k s to th e pr oc es s .
o Pr o duc t o wn er : T h e pr o duc t o wn er c re a t es th e pr o duc t b ac k lo g, p ri or it is es t he
de l ay , an d is in c h ar g e of dis tr ib u ti n g f unc t i on a l ity o n e ac h r e pe t it i on .
er
o Sc ru m T e a m: T h e t e am m a na g es a n d or g a n is es i ts w ork in or d er to c o mp l et e th e
s pr in t or c y c l e .
e Xtr e me Pr og ra mm in g ( X P)
iv
Th is m et h od is c o mpr i s ed of t hr e e c o nc ep ts :
1. C h art er in g : T h is ph as e i nc lu d es a v a ri ety o f ac tiv i t ies s u c h as f orm i n g a
dev e l op m en t t ea m, c o nd uc ti n g fe as i bi l i ty a n a ly s is , d ev e l o pi n g p l a ns , a n d s o o n.
2. Cy c l ic d e liv er y : th is i nc l ud es tw o m or e c y c l es , w h ic h a re as f o l l ows :
o T h e te a m r ev is es th e r e le as e s c h ed u l e.
o A n i nt e gr a t ed p r o d u c t pr ov i d es s erv ic es t o us ers .
3. Co nc l ud i ng : D e pe n d i ng o n t he us er e nv ir on me n t, t h is ph as e p er fo rms d e p loy m en t
ity
an d p os t - d e pl oy m en t.
1. Ti m e B ox i n g
)A
2. Mo S C o W Ru l es
3. Pr ot oty p i ng
The D S DM p ro je ct co nt a ins se v en st ag es :
1. Pr e- p r oj ec t
(c
2. Fe as i b i l ity St udy
3. B us i n es s S tu dy
4. Fu nc t i on a l M od e l It er a ti o n
5. Des i gn an d b u i ld I ter a ti o n
e
6. Im p le m e nt at i on
7. P os t- pr oj ec t
lin
Fe atu re D r iv en D e ve l opm ent ( FD D):
On
for e ac h fu nc ti o n.
Th e l ea n s of tw ar e dev e l op m en t me t ho d o lo gy ad h er es t o t h e " j us t in t i me
pro d uc t i o n" pr i nc ip l e. Th e le a n m e th o d d e n ot es inc re as in g th e s pe e d o f s of tw ar e
dev e l op m en t wh i l e d e c r eas i n g c os ts . L e an dev e l op m en t c an b e d iv id e d in t o s ev e n
ty
s ta g es .
1. R e duc i ng w as te ;
2. En h anc i n g l ear n i ng ; a n d
si
3. Pos tp o n in g c o m m it me n t ( d ec i d i ng as l at e as p os s i bl e)
er
4. Pro m pt d e l iv er y
5. Em p ow er i ng t h e te a m; 6 . Es ta b l is hi n g In t e gr ity
iv
7. O pt i miz e t he en t ir e s y s te m
Un
Wh en s hou ld t he A gi l e Mod e l b e us ed ?
• W he n t her e i s a n ee d f or fr eq u en t c h an g es .
• W he n a t e am o f h i gh ly q u al i f ie d a nd ex p er i e nc e d pr of es s i on a ls is av a i l ab l e.
• W he n a c us t om er is al way s w i l l in g t o m ee t w it h a s o ft w are t e am .
• W he n t he pr oj ec t is s ma l l .
ity
1. C o ns is t en t De l iv er y
m
2. F ac e- t o- F ac e C o mm un ic at i o n wi t h Cus t om ers
4. Any t im e c h a ng es ar e p er m i tt e d.
5. I t s ho rt ens t h e to t al d ev el o p me nt t i m e.
Th e fo l l ow i ng ar e t h e d is a dv an ta g es (c o ns ) of t h e A gi l e M o de l :
(c
e
be di ff ic u lt .
lin
Che c k Yo ur U nd er st a nding
Fil l- U ps
1. __ _ __ _ _ is t he f ir s t s t ep in SD L C f ra m ew ork .
On
2. __ _ __ _ __ _ is n ot c or re c t mo d e l i n S of tw ar e D ev e l o pm e nt Par a d ig m .
3. B ui l d & F ix M o de l is s u it ab l e f or pr ogr a m mi n g ex erc is es o f
__ _ __ _ __ _ _ _ LO C ( Li ne of C od e) .
4. W at er f a l l m od e l is n o t s u it ab l e f or _ __ _ __ _ _.
5. __ _ __ _ __ _ _ is a f u nc t i on a l r e q uir e m en t.
Tru e/ Fa l se
ty
1. RA D s t an ds f or Ra p i d A pp l ic at i on D is p os i t io n.
2. Un d er In te gr at i o n tes t i ng , i n t he m a i nt e na nc e p has e t he p ro d uc t m us t b e
tes te d a g ai ns t pr ev i o u s t es t c as es .
3. A pr oc es s mo d e l d es c r i bes t h e l og ic us e d by pro gr a mm ers t o c r e at e c o d e
mo d u les .
si
4. Pr ot oty p i ng a l l ows y ou t o tes t s y s te m c o nc ep ts an d ex a mi n e i n pu t, ou t pu t,
an d us er i n ter fac es b e for e m ak in g f i na l d ec is i ons .
er
5. B ot to m- up - tes t in g ty p e of in t egr at i o n tes t in g us es s t ubs .
Su mm ar y
iv
• O n e d is a dv an ta g e of pr o t oty p in g is t h at im por t an t d ec is i o ns m ay b e m ad e
to o e ar ly , b ef or e b us i nes s or I T is s u es ar e th or ou g h ly u nd ers to o d . H ow ev er ,
a pr ot oty p e b as e d o n c ar e f ul f ac t - f i nd i n g an d m od e l l in g t ec h n iq u e s
• Co m pu te r - a i d ed s y s te ms e n gi n ee ri n g (C A S E ), a ls o k n ow n as c o mp ut er - a id e d
s of tw ar e en g i ne er i ng , is a pr oc es s th at ut i l i z es p ow erf u l s of tw ar e k n ow n as
CA S E T oo ls t o as s is t s y s te m a n aly s ts i n t h e d ev e l o pm e nt a n d m a in te n anc e
(c
of i nf or m at i on s y s t e m s . C A S E to o ls pr ov id e a n ov er a l l f ra m ew ork for s y s t em
dev e l op m en t a nd s up por t a w i de r an g e o f des i g n m et ho d o lo g i es , i nc l ud i n g
s truc tu r e d a n a ly s is a nd o bj ec t - or i e nt e d a n a ly s is . • CA S E to o ls inc r e as e
pro d uc t iv i ty a nd i m pr ov e th e qu a l ity of th e f i nis h ed pr o duc t by mak i n g i t
eas i er t o b ui l d a n i nf or ma t io n s y s t e m.
e
Act iv it y
lin
G et div i d ed in to gr o u p o f 5 a nd pr e p are a pr es e n ta t io n o n A g i le t e s ti n g m et ho ds .
Q ue sti on s & E xe r ci s e
On
1. De f in e t he Sy s t e m dev e lo p me n t me t ho d o lo g i es .
2. Dis c us s t he Sy s t e m d e v e lo p me n t t o o ls .
3. Ex pl a i n th e C om p ut er A id e d S of tw ar e E n gi n e er in g (C A S E) .
4. Dis c us s t he J oi n t A pp l ic at i on D ev el o p me nt ( J AD )
5. Dis c us s R ap i d A p p lic a ti o n Dev e l op m en t ( R A D) .
6. Des c r i b e t h e Sy s te m d ev e l o pm e nt li f e c y c l e
7. Ex pl a i n th e A g i le S of t war e d ev el o pm e nt
ty
G lo ss a ry
•
si
Agi le d e ve lop me nt met h odo log y: W h en ad d i ng n e w fu nc t i o na l ity , te a ms
us e th e a g i le d ev e l op me n t m et h od o lo gy t o red uc e ris k (s uc h as bu gs , c os t
ov er r u ns , an d c h a ng i n g r e qu ir e me n ts ). T ea ms d ev e l o p s of tw ar e i n i ter a ti o ns
er
th at inc l u de mi n i - i nc r em e nts o f n ew f u nc t i on a l ity in a l l a g i le me th o ds . Th e
ag i l e dev e lo p m en t me t ho d c o mes i n m any f la v ours , i nc l u d in g s c r u m , c ry s t a l,
ex tr e me pr o gr a mm i n g ( X P) , an d f ea t ure - dr iv en dev e lo p m en t ( FD D) .
• De vO p s dep lo ym ent me thodo log y : D e v O ps is m or e t h a n j us t a
iv
as s ur a nc e, a n d op er at i ons .
" Th is R AD pr oc es s a ll o ws ou r dev e l op er s t o qu ic k ly a dj us t t o s h if t in g
req u ir e me nts i n a f as t - p ac ed an d c o ns t a nt l y c h a ng i n g m ark e t," s a id Sc o tt
St i n er , C EO a n d pr es i de nt of U M T ec h no l o g ies , i n F or b es . T h e ab i l ity t o
qu ic k ly a d ap t is w h at a ll o ws for s uc h a lo w c os t .
)A
• Th e r e q ui r e m en ts p l a nn i n g, us er d es ig n, c ons tr uc t i on , a n d c u to v er p h as es
c om pr is e t he r ap i d a pp l ic at i on dev e l op m en t m et ho d . T h e us er d es ig n a n d
c ons tr uc t i on ph as es a r e r e p ea te d u n ti l t h e us er is s a t is f i ed t h at t he pro d uc t
me e ts a ll s pec i f ic a t io n s .
• Th er e a r e s ev er a l p has es t o a s y s te m dev e l op m en t pr oj ec t, i nc l ud i ng
fe as ib i l ity a n aly s is , r e qu ir e me n ts a n a ly s is , s of tw ar e d es i gn , s oft w a re c od i ng ,
(c
tes t in g an d d eb u gg i n g, i ns t a l la t io n a nd m a i nt en a nc e . T o k e ep tr ac k of th e
en t ir e pr oc es s , v ar io u s t oo ls c a n b e us ed .
• JA D, or jo int app li c at i on d e ve lop me nt, i s th e pr oc es s o f des i gn i n g a n d
dev e l op i ng c o mp u ter - bas e d s y s t ems /s ol u t io ns . I t c o l l ec ts r e qu ir e me n ts s i d e
by s id e i n ac c o r d a nc e w i th b us i nes s re q u ir em e n ts w h il e d ev e l op i n g n e w
i nf or ma t io n s y s t ems f o r a c om p any , w hic h m ea ns J AD i nc or por at es t he c l ie nt
e
or e n d- us er s i nt o t h e des i g n a n d d ev el o p me n t pr oc es s es . I t al s o inc l ud es
ap pr o ac h es fo r i mpr ov i ng s p ec if ic at i o n qu a l it y a nd us er p ar t ic i p at i o n thr o ug h
a s er ies o f c o ll a bo r a t iv e w ork s ho ps k n ow n as J A D s es s i o ns . Be c aus e t he
lin
c l ie n t is i nv o lv e d t hr o ug h ou t t h e dev e lo p m en t proc es s , d ev el o p me n t t i mes
are s hor t en e d an d c li e nt s a t is f ac t i o n is h i gh e r.
Furt he r R ea din g
On
1. Ho w t o D o Sy s t e ms A na ly s is , J o hn E . G i bs o n , W i l l i am T. Sc her er ,
W i l li a m F. G ibs o n, M ic ha e l C. S mi t h
2. Sy s t e ms A n aly s is an d Des i gn Pr in t ed Ac c es s C ard ), H arry J . R os e n b la tt
3. Th e Sy s t e ms T h ink er , A n aly t ic a l Sk i l ls : L ev e l U p Y ou r D ec is io n Mak i n g,
Pr ob l e m S o lv i n g, a n d De d uc t i on Sk il ls . No t ic e T h e De t ai ls O t h ers M is s .
4. Mo d er n Sy s te ms An a l y s is a n d Des i g n, J e ff rey A . H of fer , J o ey G eor g e,
ty
J os e p h S . V a lac ic h
5. Mo d e l in g an d A na ly s i s of Dy n a m ic Sy s t e m s , S ec on d E d it i on , R am i n S.
Es f a nd i ar i, B ei Lu
6. Sy s t e ms A n a ly s is a nd D es ig n , A n O bj ec t - O ri en te d Ap pr o ac h w i th U M L
si
A la n D e nn is , B ar b ar a W ix om , Dav i d Te g ar de n
7. Mo d er n Sy s t ems A n al y s is a n d D es ig n , G lo b a l E d it i o n, J os e p h S V a lac ic h,
J oey F . G e or g e
8. Sy s t e ms A n aly s is an d Des i gn , Sc ot t T il l ey , H arry J . R os e n bl a tt
er
9. Sy s t e ms A na ly s is a nd Des i g n in a C h an g in g W or ld J o h n W. Sa t z i ng er,
Ro b er t B. J ac k s o n, S t ep h en D . B ur d
10 . Sy s t e ms A n aly s is an d Des i gn , Sc ot t T il l ey
11 . B un d l e, Sy s t ems A n a ly s is an d D es ig n , Lo os e - le a f V ers io n , 12 t h +
iv
M in dT a p, 1 t er m Pr i nt ed Ac c es s C ar d, Sc ot t T il l ey
12 . Sy s t e ms A n aly s is an d D es i gn , J IJ U J O HN
13 . Sy s t e ms A na ly s is A n d D es i g n A Co m p le t e G u id e 2 02 0 E d it i on , G e rar dus
B lok dy k c h ec k
Un
Fil l- U ps
1. Co m mu n ic at i on
2. P m o de l
3. 10 0- 2 00
ity
4. Ac c om m od a t in g c h an g es
5. B us i n es s n ee ds
Tru e/ Fa l se
m
1. Fa ls e
2. Fa ls e
3. Tru e
)A
4. Tru e
5. Fa ls e
(c
e
Module III: Feasibility Study and Negotiation
lin
Unit - 1: Int r odu ct io n t o F ea s ibi lit y St ud y
Le ar nin g O b j ect i ve s:
On
• De f in e t he in tr od uc t i o n to t h e fe as i bi l i ty s tu dy .
• Dis c us s t he ne e d of f e as ib i l ity s t u dy .
• Ex pl a i n th e i m po r t anc e of f e as ib i l ity s t u dy .
• Dis c us s t he k ey c ons i der a ti o ns i n f eas i b il i ty s t udy .
• Dis c us s t he s t e ps fo r a fe as i bi l i ty s tu dy .
• Ex pl a i n th e ty pes of f e as ib i l ity s t u dy .
ty
Int rodu ct ion
si
er
iv
Un
ity
In t h is u ni t w e wi l l s t u dy a bo ut t h e fe as i bi l i t y s t udy an d i t ’s v ar io u s as p ec ts .
The importance of Feasibility Analysis to businesses when deciding on the viability of a proposed
business venture including the development or enhancement of an information system is examined in
this subject.
1.1.1 Introduction
(c
In software engineering, a feasibility study evaluates the feasibility of a proposed project or system.
One of the four critical stages of the Software Project Management Process is the feasibility study.
As the name implies, a feasibility study is a measurement of a software product in terms of how
useful product development will be for the business from a practical standpoint. Feasibility studies
are conducted for a variety of reasons, including determining whether a software product is
appropriate in terms of development, implementation, and project value to the business.
e
An examination and assessment of a proposed project to see if —
lin
• It is technically doable, within the predicted cost range, and financially viable.
• When considerable sums of money are at stake, feasibility studies are nearly often done.
Also known as a feasibility study.
Feasibility studies are broken down into four stages. Production, interview/focus group, full report
On
preparation, and report presentation are the steps involved.
ty
2) Benefits and Costs Analysis
si
The project specification contains all of the project's details and serves as a guideline for the project. It
provides valuable information to management regarding the type of expenditure required to complete
a project, as well as labour, hardware, software, and other aspects.
er
A cost-benefit analysis is a method for determining the net benefit of a new system's development
and implementation. In a nutshell, it shows the organization whether or not they are financially
prepared to take on the project.
iv
• Technical Feasibility
Un
• Economic Feasibility
• Operational Feasibility
• Social Feasibility
• Time Feasibility
• Management Feasibility
• And Legal Feasibility.
ity
A feasibility study is a preliminary evaluation that helps management determine whether or not a
system is viable for development.
• It acknowledges the potential for improving an existing system, developing a new system, and
revising estimates for continuing system development.
m
• It's used to draw out the problem and see if there's a feasible or acceptable answer.
• A feasibility study's main purpose is to confirm the problem's size rather than to solve it.
• A feasibility study results in a formal system proposal that serves as a decision document and
explains the proposed system's whole nature and scope.
)A
If you follow a feasibility study example for any project, there's a good chance you'll be able to cover
all of the necessary components and learn what you need to know. This is critical since a large
number of aspects of a project are dependent on this study in order for it to gain the partners'
(c
approval.
Every feasibility study example is unique, and these variations should be considered. The sections of
the sample will be highly useful as a reference, but the information for your record should be
e
exceptional.
The desired interest audience is one zone that might be comparable to your example of feasibility
lin
study and the report you're writing. A business's income stream might come from a wide range of
socioeconomic and age categories. As a result, the method by which they receive a favourable
response should be imitated or almost copied in the hopes of receiving a comparable positive
response.
On
The coordinations of offering the desired interest group are another piece of knowledge that may be
gleaned from a feasibility study example. In the event that the target audience is local, the costs are
minimal. If the audience is in a different place, the cost of providing the deliverable should be factored
into the overall financial cost of the project. One of the goals of this type of research is to determine
the venture's profitability. This must be kept in mind.
The concerns that arose throughout your case feasibility research should be understood and
analysed. If the challenges or obstructions cannot be overcome in a practical manner, then a different
ty
approach should be sought. Regardless of the information's outcome, it should all be archived so that
no questions arise throughout the study's audit process.
These are just a few of the benefits of doing a case feasibility study. The way you apply what you've
si
learned will determine whether your agreement is accepted or rejected.
Technical feasibility
it is the measure of the practicality of a specific technical solution and the availability of
technical resource and expertise.
Un
Schedule feasibility
it is a measure of , how reasonable the project timetable is.
Economic feasibility
it is measure of cost effectiveness of the system/project and its solution it is often called cost
benefit analysis.
Cultural Feasibility
ity
What will be the impact of particular thing on both local and general cultures? How they will
respond to that. What type of implications does the feasibility study have?
Legal/Ethical Feasibility
it is a measure of legal implications on the project, ethical considerations. We need to make
m
sure that project undertaken will meet all legal and ethical requirements.
Resource Feasibility
Do we have enough resources, what resources and facilities will be required for the project,
)A
etc.
Marketing Feasibility
Will anyone want the product once its done? What is the target demographic? Should there be
a test run? Is there enough buzz that can be created for the product?
Real Estate Feasibility
(c
What kind of land or property will be required to undertake the project? What is the market
like? What are the zoning laws? How will the business impact the area?
Managerial Feasibility Study
Managerial feasibility is measured by certain key elements like employee involvement,
e
demonstrated management availability & capability and commitment.
Financial Feasibility Study
lin
Validating that a project is possible within your financial constraints. For example, a
construction project that uses reference class forecasting as a sanity check for project budget.
On
Feasibility research is an important stage in the Software Project Management Process because it
determines whether to proceed with the proposed project because it is practically possible, or to halt
the proposed project because it is not right/feasible to develop or think/analyze about it again.
Feasibility studies also aid in identifying risk factors associated with developing and deploying
systems, as well as risk analysis planning. Feasibility studies also help to narrow business
ty
alternatives and improve success rates by analysing various parameters associated with proposed
project development.
A feasibility study is carried out to determine the project's success and to reduce the project's risks.
Only once it has been determined that a certain project can be completed profitably can it be
si
executed. The feasibility study is more than just a project analysis; it's also a framework or strategy
for establishing and running a long-term firm. Market research, financial research, management
research, schedule determination, and technical research are all vital components of a feasibility
study.
er
• Marketing study: Marketing research is carried out to see if the project is appropriate for
the current and future corporate culture. The consultants will search for data on the overall
impact on the business structure, workers, and organization during this process. One of the
iv
most important aspects of market research is forecasting sales. The primary goal of
marketing research is to identify target consumers, understand their needs, comprehend
market features, and assess the elements that have a significant impact on purchasing
decisions.
Un
• Financial study: Financial planning is critical for managing the organization's various
operations while staying within budget constraints. Financial research examines overall
capital requirements, sales and pricing, break-even outputs, and the quantity of sales
required to achieve profit in a corporation. It aids entrepreneurs in determining how much
money is required to effectively complete a company initiative.
• Management study: A management study is undertaken to assess the total resources
required to complete the project successfully. Some projects, such as manufacturing, will
ity
necessitate more physical resources, whilst some IT initiatives will necessitate a large
number of human resources. Make a study schedule. The schedule feasibility study is done
to see how much time and resources are needed to complete the project on time. Because
feasibility research is so important to the project's success, it's worth mentioning. To acquire
the proper and effective report, you should contact experienced management consulting
firms. Gulf Resources is a leading business management consulting organization in the UAE
m
that conducts feasibility studies for customers in a variety of industries, including healthcare,
food, engineering, cosmetics, and body care.
)A
The process of describing, identifying, and evaluating the proposed system, as well as selecting the
optimal system for proper operation, is referred to as feasibility. A feasibility study is carried out in
order to determine whether the system can be developed or not. Technical feasibility, economic
feasibility, and behavioural feasibility are the three categories of feasibility studies.Studying all of
(c
these aspects aids the user and developer in determining the foundations on which their system will
be built and the features that can be included in the software. The major goal of the feasibility study
is to determine why it is necessary to design software that is acceptable to all users and can be
easily updated to meet their needs (KENTON, 2018). The following are some of the feasibility
study's objectives:
e
• To see if the newly produced software can be merged with other software already on the market.
lin
• Determine whether the programme has the potential to be deployed using current technology and
within the time and budget constraints.
• To establish whether the programme can meet the needs of the company or a specific user.
On
The following are some of the advantages of performing a feasibility study:
1. Improves the project team's concentration
2. Assists in the identification of fresh opportunities
3. Provides useful data for decision-making
4. Narrows the range of business options
5. Improves the rate of success by examining a variety of factors (Mukund, 2017).
ty
The value of a feasibility study stems from the goal of an organization to "get it right" before investing
resources, time, or money. A feasibility study may unearth fresh ideas that totally alter the scope of a
project. It's preferable to make these decisions ahead of time rather than rushing into a project only
to discover that it won't work. A feasibility study is usually advantageous to a project since it provides
si
you and other stakeholders with a clear picture of what is being proposed.
The following are some of the most important advantages of doing a feasibility study:
er
• Improves the attention of project teams
• Discovers fresh possibilities
• Provides useful data for making a "go/no-go" judgement.
• Reduces the number of business options
iv
Aside from the approaches to feasibility research outlined above, some projects also necessitate the
examination of other limitations –
ity
2. Technical feasibility
3. Social feasibility
Economic Feasibility
This research is being carried out to determine the system's economic impact on the organization.
The amount of money the corporation has to invest in the system's research and development is
limited. It is necessary to justify the spending. As a result, the produced system came in under
ity
budget, which was made possible by the fact that the majority of the technologies used were freely
available. The customized products were the only ones that needed to be acquired.
Technical Feasibility
This research is being carried out to determine the technological viability of the system, i.e. the
system's technical requirements. Any system that is created should not place a large burden on the
m
available technical resources. As a result, the client will be subjected to severe demands. Because
very minor or no changes are necessary to implement this system, the designed system must have
a low requirement.
)A
Social Feasibility
The purpose of the study is to determine the level of user acceptance of the system. This includes
the process of instructing users on how to effectively use the system. Users must accept the system
as a need rather than feeling threatened by it. The approaches used to educate and familiarize users
with the system determine the amount of adoption by the users. Their self-esteem must be boosted
so that they can offer constructive criticism, which is encouraged because they are the system's final
(c
users.
When should you conduct research?
The relevance of a feasibility study stems from the company's goal to "get it right" before investing
e
time, money, and resources. A feasibility study may unearth fresh ideas that totally alter the scope of
a project. It is important not to take the choice to perform a feasibility study carelessly. It is a costly
and time-consuming procedure. However, failing to undertake a feasibility study can be much more
lin
costly in terms of the poor decisions you may make as a result of failing to do so.
To get the most out of a feasibility study, you must be far enough along in the development of your
business idea. You'll need a well-defined overview of one or more potential business models or
scenarios that you'd like to investigate. And you'll want to have done enough preliminary research on
On
these options to see if they have the potential to be viable. You don't want to waste your feasibility
money on ideas that you can quickly decide aren't possible by making a few phone calls.
This means that before you plan a full-fledged study, you'll need to have done a lot of preliminary
research and inquiry on your business idea. Members of your committee or a consultant can conduct
this preliminary study or pre-feasibility analysis. You may begin by conducting a marketing analysis
to see if the business concept is viable in the marketplace. If it doesn't, you've saved yourself time
and money by not conducting a thorough feasibility study. You can proceed with the feasibility
ty
analysis and use the market analysis in the feasibility study if the proposal has market viability.
• Compile a list of alternative solutions or potential candidate systems to satisfy your objectives.
• Determine the feasibility of each option in terms of technical, operational, and other factors.
Un
• Compare the other options and choose the best candidate system.
• Prepare a system proposal for the final project directive for approval by management.
ity
m
)A
(c
e
task is finished, an outside consultant and an information specialist are frequently added to the team.
Projects are scheduled for a specific period of time, ranging from a few weeks to several months. In
lin
most cases, the project leader is a senior systems analyst. The appointment is only for the duration
of the project. Regular meetings are held to keep the momentum going and to ensure that the
mission – the selection of the best candidate system – is completed. The progress made in each
meeting is recorded.
On
Prepare system flowcharts
Preparing generalized system flowcharts for the system is the next phase in the feasibility study. At
this point, the original investigation's information-oriented charts and data flow diagrams are reviewed.
The diagram emphasizes the significance of inputs, outputs, and data flow as crucial points in the
current system.
ty
Enumerate potential candidate systems.
The candidate systems capable of providing the outputs included in the generalized flowcharts are
identified in this step. This necessitates the conversion of logical to physical system models. Another
si
component of this process is to think about the hardware that will be needed to meet the overall
system requirements.
Describe and identify characteristics of candidate system.
er
The analysis in this step is mostly focused on what each potential system can and cannot perform.
Technical knowledge and skill in the hardware/software field are required to determine this.
Determine and evaluate performance and cost effectiveness of each candidate system.
iv
The analyst must now determine and evaluate the proposed system's performance and cost. This is
where design and implementation evaluations are carried out. It entails user training, improving
physical facilities, and documenting, among other things.
Un
Each system alternative is given a certain amount of weight based on the candidate system's
performance and cost. Following that, the candidate system with the greatest overall score is
chosen.
ity
The system with the highest overall score is considered the best. This presupposes that the
)A
weighting factors are reasonable and that each evaluation criterion's rating is correct.
Feasibility report
Following the feasibility research, a feasibility report is generated and sent to the management. The
report is a formal document for management; it should be concise and nontechnical enough to be
(c
understood.
e
and recommendations.
2. Table of Contents—defines the order in which the main sections of the report are presented.
lin
3. Overview- a narrative description of the project's objective and scope, the rationale for
conducting the feasibility study, and the departments involved or affected by the candidate
system.
On
4. Explain the procedures employed in the current system in detail. The effectiveness and
efficiency of the System, as well as its operational expenses, are highlighted. This part also
includes a description of the prospective system's aims and general operations.
5. Economic justification- includes point-by-point cost comparisons and preliminary cost projections
for the candidate system's development and operation.
ty
beneficial system. They are just written as a suggestion, not a demand. Any study conclusions
may be presented after the suggestions have been followed.
7. Appendixes - all memoranda and data gathered during the investigation are documented in the
si
appendices. They are included at the end of the report as a source of information.
er
Oral presentation
The project leader or analyst is expected to provide the end user an oral presentation.
iv
1. Communication skills and knowledge about the candidate system that can be translated into user-
friendly language,
2. Ability to answer questions, clarify issues, maintain credibility, and pick up on any new ideas or
suggestions are the most important requirements for the analyst who gives the oral presentation.
Un
The feasibility study is primarily focused on the five topics listed below. The most significant aspect
of the feasibility analysis is the economic feasibility study, while the legal feasibility study is less
crucial.
ity
• Economic Feasibility
• Technical Feasibility
• Operational Feasibility/Behavioral Feasibility
m
• Schedule Feasibility
• Legal Feasibility
)A
Economic Feasibility
The project's cost and benefit are examined in an Economic Feasibility study. That is, a detailed
examination of the project's development costs is carried out as part of this feasibility study, which
includes all required costs for final development, such as hardware and software resources, design
(c
and development costs, and operational costs, among other things. After that, it is determined
whether the initiative will be financially beneficial to the organization.
The potential of the required software to generate financial rewards for a corporation is determined
by its economic feasibility.
e
The cost of the software development team, the cost of the study needed in completing a feasibility
study, and the estimated cost of software and hardware are all factors to consider in this type of
lin
research.
• The cost of training, assembling a development team, purchasing software, and purchasing
On
hardware.
• The price of conducting software research tasks like requirements analysis and elicitation.
• The cost of building software that will benefit a corporation in the long run.
• It's also looked at if the programme can be developed within the budget constraints.
• Because some customers want a lot of features in their programme but are unwilling to
spend the money to get it.
ty
The cost of doing a full systems research (including the time of personnel you will be working with),
the cost of firm employee time, the estimated cost of hardware, and the projected cost of software or
software development are the primary resources to consider.
Before committing to a complete systems analysis, the company in question must be able to
comprehend the value of the investment.
si
The system is not commercially feasible, and the project is cancelled, if the short-term costs are not
er
compensated by long-term benefits, or if there is no immediate reduction in operating costs.
Technical Feasibility
ity
Current resources, both hardware and software, as well as required technologies, are
analyzed/assessed in Technical Feasibility in order to construct a project. This technical feasibility
analysis determines whether the necessary resources and technology are available for the project's
development. In addition, a feasibility study examines the technical skills and capabilities of the
technical team, whether existing technology can be used or not, whether maintenance and up-
m
Technical feasibility assists in acquiring access to existing resources as well as technology required
to fulfil the user's needs in the programme while staying within budget and time restrictions.
)A
• Examine the technical skills and abilities of individuals of the software development team.
Given the current technological resources, the analyst must decide whether the new system can be
constructed.
e
If not, is it possible to adapt or expand the system so that it satisfies the current request?
lin
If existing systems cannot be expanded or updated, the next step is to see if technology that meets
the criteria is available.
At the same time, the analyst can check to see if the company has people who are technically
competent of reaching the goals.
On
If not, they must decide whether to hire additional programmers, testers, specialists, or people with
programming skills other than their own, or whether to outsource the job.
Another factor to examine is whether there are software packages that can help them reach their
objectives or if the programme must be customised for the company.
ty
Importance of technical feasibility
•
•
•
si
It investigates and evaluates if the solution is supported by current technology.
To satisfy the new needs, the analyst determines if existing technology resources should be
updated or new ones deployed.
er
It ensures that the candidate system responds suitably to the technical upgrade to the extent
that it is capable of supporting it.
The degree of service to requirements is evaluated in Operational Feasibility, as well as how easy
the product will be to operate and maintain after deployment. Other operational scopes include
determining product usability, determining whether a software development team's offered solution is
Un
The behavioural feasibility is assessed to see if the people or employees of the company will use it.
Operational feasibility is determined by human resources and decides whether or not a programme
will operate after it has been properly developed.
ity
• The operational feasibility aids in determining whether or not the software development
team's solution is acceptable.
• Operational feasibility also helps determine whether the concerns identified in the user
m
Let's suppose for a moment that both technological and economic resources are sufficient.
The project's operational viability must still be examined by the systems analyst.
(c
The operational feasibility of a project is decided by the project's human resources, and it comprises
assessing whether or not the system will run and be used once it is developed.
If people are essentially wed to the current system, see no flaws in it, and are not participating in the
demand for a new system in general, there will be strong opposition to installing the new system.
e
It has a minimal likelihood of ever becoming operational.
lin
If, on the other hand, users have expressed a desire for a system that is operational more of the
time, in a more efficient and accessible manner, the likelihood of that system being used is higher.
A big part of the art of analysing operational feasibility is determining which user interfaces to use.
On
Importance of operational feasibility
• It determines whether or not the system is operational after it has been created and
implemented.
• It guarantees that management will support the proposed system and operate within a
modern organizational framework.
• It determines if users will be affected and whether they will accept changed or new business
processes that affect the system's potential benefits.
ty
• It also ensures that the computational resources and network architecture of the candidate
system are operational.
•
si
It evaluates and forecasts user attitudes and behaviours in relation to the development of a
new system.
er
It helps determine whether the system requires more work to educate, retrain, transfer, or
adjust employee employment status in order to implement new business processes.
Schedule Feasibility
iv
In a Schedule Feasibility Study, the proposed project's timelines/deadlines are assessed, which
includes how many times teams will take to complete the final product, which has a significant
impact on the organization because the project's goal may be lost if it is not completed on time.
Un
It is the most important research for assessing whether or not the project will succeed.
All of the projects will fail if they are not completed by the deadline.
Through scheduling feasibility, a company can estimate how long it will take to finish a project.
ity
Based on the criteria, the time required to create the system is computed.
When all of these elements are in place, manpower is assigned to their responsibilities, and every
attempt is made to finish the assignment before the deadline.
m
• It ensures that the project is completed within the stated time period or timeline.
• It also assesses and certifies whether the project's deadlines are realistic.
)A
Legal Feasibility
The project is examined from a legal standpoint in the Legal Feasibility study. This includes
(c
examining legal impediments to project implementation, such as data protection regulations or social
media legislation, project certificate, licensing, and copyright, among other things. Overall, a Legal
Feasibility Research is a study to determine whether a proposed project complies with legal and
ethical criteria.
e
lin
On
ty
si
er
iv
Un
ity
During the feasibility analysis, the stages listed below are followed.
• Information assessment
• Information collection
• Report writing
• General information
e
lin
Check your Understanding
On
3. Economic feasibility it is the measure of the practicality of a specific technical solution and
the availability of technical resource and expertise. State true or false.
4. _________ feasibility it is measure of, how well the solution will work in the organization. it is
also the measure of , what people feel about the project/system.
5. _________ feasibility is measured by certain key elements like employee involvement,
demonstrated management availability & capability and commitment.
6. In managerial feasibility the purpose of the study is to determine the level of user acceptance
ty
of the system. This includes the process of instructing users on how to effectively use the
system. Users must accept the system as a need rather than feeling threatened by it. State
true or false.
7. The system with the highest overall score is considered the best. This presupposes that the
si
weighting factors are reasonable and that each evaluation criterion's rating is correct. State
true or false.
8. Current resources, both hardware and software, as well as required technologies, are
analyzed/assessed in Technical Feasibility in order to construct a project. State true or false.
er
Summary
•
iv
Feasibility studies are conducted for a variety of reasons, including determining whether a
software product is appropriate in terms of development, implementation, and project value to the
business.
• Feasibility research is an important stage in the Software Project Management Process because
it determines whether to proceed with the proposed project because it is practically possible, or to
halt the proposed project because it is not right/feasible to develop or think/analyze about it again.
• The process of describing, identifying, and evaluating the proposed system, as well as selecting
ity
the optimal system for proper operation, is referred to as feasibility. A feasibility study is carried
out in order to determine whether the system can be developed or not. Technical feasibility,
economic feasibility, and behavioral feasibility are the three categories of feasibility
studies.Studying all of these aspects aids the user and developer in determining the foundations
on which their system will be built and the features that can be included in the software. The
major goal of the feasibility study is to determine why it is necessary to design software that is
m
acceptable to all users and can be easily updated to meet their needs (KENTON, 2018).
• When doing a feasibility analysis, the stages listed below should be followed:
iii. Determine the shortcomings of the current system and define objectives.
ur objectives.
v. Determine the feasibility of each option in terms of technical, operational, and ot
her factors.
e
vi. Each proposed system's performance and cost effectiveness are weighed.
lin
vii. Compare the other options and choose the best candidate system.
viii. Prepare a system proposal for the final project directive for approval by manage
ment.
On
• The feasibility study is primarily focused on the five topics listed below. The most significant aspect
of the feasibility analysis is the economic feasibility study, while the legal feasibility study is less
crucial.
The many forms of feasibility studies are as follows:
✓ Economic Feasibility
✓ Technical Feasibility
ty
✓ Operational Feasibility/Behavioral Feasibility
✓ Schedule Feasibility
✓ Legal Feasibility
•
si
A feasibility study aids the user and developer in deciding the foundation upon which their system
will be constructed and the features that will be included.
er
• The fundamental purpose of a feasibility study is to discover why a system should be developed
that is acceptable to all users and can easily be upgraded to meet their demands.
• A well-designed feasibility study should include information on the company's or project's history,
iv
objectivity is a crucial aspect in the research's credibility with possible investors and lenders. As a
result, it must be conducted objectively and unbiasedly in order to produce information on which
judgments can be made.
Activity
1. “Feasibility study” this is a vital aspect of system analysis and design. Comment.
ity
9. Discuss the feasibility study factors for Online Examination System in detail.
10. State the key considerations in feasibility study.
Glossary
e
fe as ib l e. A f e as ib i l ity s t udy tr i es t o o bj ec tiv e ly a nd l o g ic a l ly i de n ti fy th e
s tre n gt hs a n d we ak ne s s es o f a c urr e nt bus i nes s or n ew en t erpr is e, as we l l
lin
as t h e p os s i bi l i ti es a nd r is k s t ha t ex is t i n t h e n at ur a l env ir o n me n t, th e
res o ur c es ne e d ed t o c ar r y ou t th e pr oj ec t, a nd t he l ik e l ih o od o f s uc c es s . In
its m os t bas ic f or m, t he t wo f ac t ors f or d et er m in i ng f e as ib i l i ty are t h e
req u ir ed c os t a n d th e v a lu e t o be ob ta i n ed .
2. Tec hn ic a l F e as ib i l ity : C ur r en t r es o urc es , bo t h har d war e a n d s of tw ar e, as
On
we l l as r e qu ir e d t ec h no l o gi es , are a n a ly z e d/ as s es s e d to b u i ld a pr oj ec t i n
Tec hn ic a l F eas i b i l ity . Th is t ec h nic a l fe as i bi l ity a n aly s is d et er m in e s wh e th er
th e n ec es s ar y r es ou r c es an d t ec h n ol o gy are av a i l ab l e for t he pr oj ec t's
dev e l op m en t. In ad d it i on , a f e as i b i l ity s t u d y ex a m in es t he tec h n ic al s k i l ls
an d c a p ab i l it i es of t h e tec h n ic a l t ea m , wh e th er ex is t i n g tec h no l o gy c an be
us e d or n o t, w h et h er m a i nt e na nc e a n d up - gr a da t io n of t h e c h os en
tec h no l ogy is s i m pl e o r n ot , a nd s o on .
3. O p er a t io n a l F e as i b i l it y : T h e de gr ee of s u p p ly i n g s erv ic e t o re q u ir em e nts is
ty
ev a l u at ed , as we l l as ho w e as y t h e pr od uc t wi l l b e to o p era t e an d m a in ta i n
af ter de p l oy m e nt . O t her o per at i o na l s c op es i nc lu d e d et er m in i ng pr od uc t
us a b i l ity , de t er m i n in g w he th e r a s o ft w ar e dev e l op m en t t ea m 's o ff er ed
s o lu t io n is ac c e pt a b le , a n d s o o n.
si
4. Ec on o m ic F e as i b i l ity : I n an Ec o n om ic F ea s i bi l i ty s t u dy , t h e pro j ec t's c os t
an d b en e fi t ar e as s es s ed . T h at is , a d et a il ed ex a m in at i o n of t he pr oj ec t's
dev e l op m en t c os ts is c ar r i e d o u t as p ar t of t h is fe as i b il i ty s tu dy , w h ic h
i nc l u des a l l r e qu ir e d c os ts f or f i n al d ev e lo pm e nt , s uc h as h ar d war e a nd
er
s of tw ar e r es o ur c es , d es ig n a n d d ev e lo p me nt c os ts , a n d o p era t i on a l c os ts ,
am o ng o th er t hi n gs . A ft er t h at , it is d et er m i ne d wh e th er th e i n it i at iv e w i l l be
fi n anc i a l ly be n ef ic i a l t o th e or g an iz at i o n.
5. Le g a l F eas i b i li ty : Th e le g a li ty of a s t u dy pr oj ec t is ex a m in e d i n L e ga l
iv
Fe as i b i l ity . T h is i n c l ud es ex am i n i ng l eg a l i m pe d i me nts t o pr oj ec t
i mp l e me nt a ti o n, s uc h as d at a pr ot ec t i o n re g ul a ti o ns or s oc i a l me d i a
l eg is l at i on , pr oj ec t c er ti f ic a t e, l ic e ns i n g, a n d c o py r ig h t, a m on g o th er th i n gs .
O v er al l , a Le g a l F ea s i bi l i ty R es earc h is a s tu dy t o d e ter m i ne wh et h er a
Un
pro p os ed pr oj ec t c o m p l ies w i th le g a l a nd e t hi c a l c r it er i a.
6. Sc he d u le F eas i b i l ity : I n a Sc h e du l e Fe a s i b il i ty S tu dy , th e pr o pos e d pr oj ec t's
ti m e li n es / d ea d l in es ar e a na ly z e d, inc l u di n g ho w m a ny t i mes t e a m s w i l l t ak e
to c o m p le te t h e f i n a l pr oj ec t, w h ic h h as a s i g ni f ic an t i mp ac t on t he
org a n iz a t io n b ec aus e th e pr oj ec t's g o al may b e l os t if i t is n o t c o mp l et e d o n
ti m e.
ity
Further Readings
1. Diab, N. (2016). What are the main components of a feasibility study? - Bayt.com Specialties.
Retrieved from https://specialties.bayt.com/en/specialties/q/277098/what-are-the-main-
m
components-of-a-feasibility-study/
2. KENTON, W. (2018). Feasibility Study. Retrieved from
https://www.investopedia.com/terms/f/feasibility-study.asp
3. (2017). Why a Feasibility Study is Important in Project Management. Retrieved from
)A
https://www.simplilearn.com/feasibility-study-article
4. Palvia, P., & Palvia, S. (2004). The feasibility study in information systems: an analysis of
criteria and contents. Information & Management, 14(5), 211-224. doi: 10.1016/0378-
7206(88)90009-2
5. THAKUR, D. (2016). What is Feasibility Study? Types of Feasibility. Explain Feasibility Study
Process. Retrieved from http://ecomputernotes.com/software-engineering/feasibilitystudy.
(c
6. Kurt Lewin, “Frontiers in Group Dynamics,” Human Relations, 1947, 1:5–41; and Kurt Lewin,
“Group Decision and Social Change” in E. E. Maccoby, T. M. Newcomb, and E. L. Hartley,
eds., Readings in Social Psychology, New York: Holt, Rinehart & Winston, 1958, pp. 197–
211.
7. Christopher Koch, “When Bad Things Happen to Good Projects,” CIO Magazine, December
1, 2004.
e
8. Altschuld, J. W., & Zheng, H. Y. (1995). Assessing the effectiveness of research
organizations. Evaluation Review, 19(2), 197-216.
9. An, J. Y., Yom, Y. H., & Ruggiero, J. S. (2011). Organizational culture, quality of work life, and
lin
organizational effectiveness in Korean university hospitals. Journal of Transcultural Nursing,
22(1), 22-30.
10. Anderson, J. A. (2000). Explanatory roles of mission and culture: Organizational effectiveness
in Tennessee's community colleges. Unpublished PhD thesis. University of Mephis.
11. Baker, K., & Branch, K. M. (2002). Concepts underlying organizational effectiveness: Trends
On
in the organization and management science literature. Management Benchmark Study. USA:
Office of Planning & Analysis, Department of Energy
12. Cameron, K. (1978). Measuring organizational effectiveness in institutions of higher
education. Administrative Science Quarterly, 23, 604-632.
13. Cameron, K. (1981). Domains of organizational effectiveness in colleges and universities.
Academy of Management Journal, 24 (1), 25-47.
14. Cameron, K. (1986). A study of organizational effectiveness and its predictors. Management
Science, 32(1), 87-112.
ty
15. Dalton, T., & Dalton, L. (1988). The politics of measuring public sector performance.
Promoting Productivity in the Public Sector (Macmillan).
16. Federman, M. (2006). Essay: Towards an effect-ive theory of organizational effectiveness.
17. McCann, J. (2004). Organizational effectiveness: Changing concepts for changing
si
environments. Human Resource Planning, 27(1).
18. Mullins, L. J. (2008). Essentials of organizational behaviour: Pearson Education.
19. Pounder, J. (1999). Organizational effectiveness in higher education. Educational
Management Administration & Leadership, 27(4), 389-400.
er
20. Yildirim, V. and Kuşakcı, A.O., 2018. The critical success factors of erp selection and
implementation: A case study in logistics sector. Journal of International Trade, Logistics and
Law, 4(1), pp.138-146.
21. Osman, N., 2018. A software requirement engineering framework to enhance critical success
iv
1. feasibility study
2. Economic feasibility
3. False
4. Operational
)A
5. Managerial
6. False
7. True
8. True
(c
Unit-2: Und er st and ing Fe as ib ili t y A sp e cts
Le ar nin g O b j ect i ve s:
e
Afte r st ud yin g t h i s c hapt e r, y ou w il l be a ble to:
lin
• De f in e t he ec o no m ic f eas i b i li ty s t udy .
• Dis c us s t he c os t a n d b en e fi t a na ly s is .
• Ex pl a i n th e m ar k et a n a ly s is .
• Dis c us s t he t ec hn ic a l f eas i b i li ty a na ly s is .
•
On
Dis c us s t he i mp or t a nc e of t ec hn ic a l a na ly s is .
• Ex pl a i n as s es s i n g th e tec h nic a l f eas i b i li ty .
• Ex pl a i n th e o p er a t io n a l f eas i b il i ty s tu dy .
• Le ar n a bo u t th e u nd er s ta n di n g th e s y s t e m p erf or ma nc e as pec ts .
ty
a s p ec i f ic ac t iv i ty . Te c hn ic a l d ev e l o pm e nt a n d pr oj ec t i mp l e me n ta t i on are us u a l ly
prec e d ed by a fe as ib i l i ty s t u dy . I n o th er w or d s , a fe as i bi l i ty s tu dy is a n as s es s m e nt
or a na ly s is o f a pr op o s ed pr oj ec t 's pos s i b l e i mp ac t .
si
Wh y do Fe a sib il it y St udy?
• T o f in d a c os t - ef fec t i v e s o lu t io n fr o m a b us i nes s s t a nd p oi n t.
er
• T o c o m e up w i th a w e ll - k n ow n s o l ut i on .
• T o d et er m in e t he po t en t ia l m ar k et f or t h e p rod uc ts .
• T o f ig ur e o ut h o w m u c h m on ey t he proj ec t wi l l m ak e i n th e l o ng r un .
th i ngs .
• L im i ts th e n u mb er o f c om p any op t io ns .
ity
• Pr ov id es a d i ff er en t ou t l in e a nd mor e f oc u s f or pr oj ec t te a ms .
• I d e nt if i es a c o m pe l l i ng c as e f or p urs ui n g t he proj ec t .
• I nc r e as es t h e s uc c es s r a te by as s es s i n g v a ri ous v a ri a b les .
m
• As s is ts in p r oj ec t d e c is io n - m ak i n g.
The feasibility study is primarily focused on the five topics listed below. The most significant aspect
of the feasibility analysis is the economic feasibility study, while the legal feasibility study is less
)A
crucial.
• Economic Feasibility
• Technical Feasibility
(c
e
The most common method for evaluating the effectiveness of a new system is economic analysis.
The method is more frequently known as cost/benefit analysis, and it involves determining the
lin
predicted advantages and savings from a prospective system and comparing them to the expenses.
If the advantages outweigh the costs, the decision to develop and deploy the system is made.
Before taking action, an entrepreneur must carefully balance the costs and advantages.
The project's cost and benefit are examined in an Economic Feasibility study. That is, a detailed
On
examination of the project's development costs is carried out as part of this feasibility study, which
includes all required costs for final development, such as hardware and software resources, design
and development costs, and operational costs, among other things. After that, it is determined
whether the initiative will be financially beneficial to the organization.
The potential of the required software to generate financial rewards for a corporation is determined
by its economic feasibility.
ty
The cost of the software development team, the cost of the study needed in completing a feasibility
study, and the estimated cost of software and hardware are all factors to consider in this type of
research.
si
Only if software addresses the following issues will it be considered viable:
• The cost of training, assembling a development team, purchasing software, and purchasing
hardware.
er
• The price of conducting software research tasks like requirements analysis and elicitation.
• The cost of building software that will benefit a corporation in the long run.
• It's also looked at if the programme can be developed within the budget constraints.
• Because some customers want a lot of features in their programme but are unwilling to
iv
The cost of doing a full systems research (including the time of personnel you will be working with),
the cost of firm employee time, the estimated cost of hardware, and the projected cost of software or
Un
Before committing to a complete systems analysis, the company in question must be able to
comprehend the value of the investment.
The system is not commercially feasible, and the project is cancelled, if the short-term costs are not
compensated by long-term benefits, or if there is no immediate reduction in operating costs.
ity
It shows the candidate system's net benefit in terms of organizational benefits and costs.
• The primary purpose of an Economic Feasibility Study is to assess a candidate system's
economic needs before committing resources to a project.
• It chooses the option that optimizes the organization's net worth by repaying cash as quickly
)A
as feasible and with the least degree of risk associated with the candidate system's
construction.
Cost/benefit analysis is another term for economic analysis. It is the most common way for
determining a new system's effectiveness. The procedure in economic analysis is to evaluate the
projected advantages and savings from a prospective system and compare them to the costs. If the
(c
advantages outweigh the costs, the decision to develop and deploy the system is made. Before
taking action, an entrepreneur must carefully balance the costs and advantages.
e
• The cost of doing full system study
• The cost of business employee time
• Estimated cost of hardware
lin
• Estimated cost of software/software development
• Is the project possible, given the resource constraints?
• What are the savings that will result from the system?
• Cost of employees' time for study
• Cost of packaged software/software development
On
• Selection among alternative financing arrangements (rent/lease/purchase)
Before committing to a comprehensive system study, the concerned company must be able to
assess the benefit of the investment it is considering. If short-term costs aren't outweighed by long-
term benefits or don't result in an immediate decrease in running costs, the system isn't
economically viable, and the project should be abandoned. The system is considered economically
feasible if the predicted benefits equal or surpass the expenses. The suggested system's
ty
effectiveness is assessed using economic analysis.The project's economic feasibility will look at the
predicted costs to see if they are within budget or if the project has a good return on investment. The
predicted expenditures will only be a preliminary estimate at this time. To evaluate economic
feasibility, exact costs are not required. It is simply necessary to establish whether the project
si
expenditures will be able to stay within the goal budget or return on investment. To establish if the
systems project can be completed within the required timeframe, a rough estimate of the project
timeline is required. The organization would have to determine the required timescale.
er
Identifying & Forecasting Costs & Benefits
Since the costs and advantages of the proposed computer system are interrelated and often
iv
interdependent, they must always be considered together. Despite the fact that the systems analyst
is attempting to suggest a system that meets a variety of information requirements, the choice to
proceed with the proposed system will be based on a cost-benefit analysis rather than on
information requirements. Benefits are quantified in numerous ways by costs, as will be seen in the
Un
next section.
Forecasting
Before submitting a proposal to a client, systems analysts must predict some crucial variables. A
systems analyst will use a what-if analysis to some extent, such as "What if labour expenses climb
just 5% per year for the next three years, rather than 10%?" If the proposal is to be credible,
significant, and beneficial, the systems analyst must recognise that he or she cannot rely on what-if
analysis for everything.
ity
Many forecasting models are available to the systems analyst. The availability of historical data is
the most important consideration when selecting a model. If they aren't available, the analyst must
rely on one of the following judgement methods: sales force estimations, consumer demand surveys,
Delphi studies (a consensus forecast generated independently by a group of specialists through a
m
The second distinction between groups of approaches is whether the forecast is conditional or
unconditional, assuming historical data is available. Conditional suggests that there is a link between
)A
the model's variables or that a causal relationship exists. Correlation, regression, leading indicators,
econometrics, and input/output models are all common strategies in this group.
The analyst is not obliged to find or identify any causal linkages when using unconditioned
forecasting. As a result, systems analysts discover that these methods are low-cost and simple to
deploy. Graphical judgement, moving averages, and time-series data analysis are all part of this
(c
category. The remainder of this section concentrates on these procedures since they are
straightforward, dependable, and cost-effective.
Estimation of Trends
Trends can be calculated in a variety of methods. A moving average is one method of estimating
e
trends. Because some seasonal, cyclical, or random patterns can be smoothed out, leaving the
trend pattern, this method is valuable. Moving averages work by calculating the arithmetic mean of
data over a set number of periods; for example, a three-month moving average is just the average of
lin
the previous three months. The average sales for January, February, and March, for example, are
used to forecast sales for April. The average sales for February, March, and April are then used to
forecast sales for May and subsequent months.
When the data is graphed, it is clear that the highly erratic data has been smoothed. The moving
On
average method is useful for smoothing data, but it also has a number of drawbacks. Extreme
values have a greater impact on moving averages than they do on graphical judgment or other
estimation methods like least squares. Forecasting is a skill that the analyst should master because
it frequently gives information that is useful in justifying the overall endeavor.
ty
There are two types of benefits and costs: tangible and intangible. When considering systems, both
tangible and intangible advantages and costs must be evaluated.
Tangible Benefits
si
Tangible benefits are monetary advantages that accrue to the organization as a result of the
information system's utilisation. Increased processing speed, access to previously inaccessible
information, access to information on a timelier basis than was previously possible, the advantage of
the computer's superior calculating power, and reductions in the amount of employee time required
er
to complete specific tasks are examples of tangible benefits. There are a few more. Although
quantifying concrete benefits is not always straightforward, they can be measured in terms of dollars,
resources, or time saved.
iv
Intangible Benefits
Some of the benefits that accrue to the organization as a result of the information system's utilisation
are difficult to quantify, but they are nonetheless significant. Intangible advantages are what they're
called.
Un
Even though intangible benefits of an information system must be considered when considering
whether or not to proceed with a system, a system developed exclusively for its intangible benefits
would fail. In your proposal, you must address both concrete and intangible benefits, because
presenting both will assist corporate decision-makers to make an informed conclusion regarding the
suggested solution.
m
Tangible Costs
The concepts of tangible and intangible expenses are conceptually similar to the previously stated
tangible and intangible benefits. The costs that can be correctly forecasted by the systems analyst
and the business's accounting staff are known as tangible costs.
)A
The cost of equipment such as computers and terminals, the cost of resources, the cost of systems
analysts' time, the cost of programmers' time, and the pay of other staff are all included in tangible
expenses. These are the costs that will need a monetary spend from the firm and are usually well
established or easily recognized.
(c
Intangible Costs
Intangible expenses are difficult to calculate and are often unknown. They include losing a
competitive advantage, losing a reputation for being the first with an innovation or a field leader,
worsening business image due to rising consumer unhappiness, and ineffective decision making due
to delayed or inaccessible data. As you may expect, correctly projecting a dollar value for intangible
e
costs is nearly impossible. You must incorporate intangible costs, even if they are not quantifiable, to
assist decision-makers who want to analyse the proposed system and all of its ramifications.
lin
2.1.2 Cost and Benefit Analysis
On
to those of alternative approaches. The end product is a proposal for a project. The analysis'
conclusions are reported, and the design is suggested.
Data Analysis
Cost/benefit analysis requires data analysis as a prerequisite. An evaluation of current discoveries is
the result of system inquiry and data collection. The system design requirements are identified as a
result of the investigation, which could include:
1. Improving client service
ty
2. Information retrieval that is quicker
3. More timely reports
4. It takes less time.
5. Precision
si
6. Eliminate data duplication
7. Increased employee productivity
8. Processing and operating costs are reduced.
er
Several choices must be explored to meet these design objectives; there is rarely only one option.
The analyst chooses those that are financially, technically, and operationally feasible. Each method
has advantages and disadvantages. The decision procedure is guided by a cost-benefit analysis of
each option.
iv
We must consider various cost aspects when producing cost estimates for a system:
Un
• Hardware Costs
• Personnel Costs
• Facility Costs
• Operating Costs
• Supply Costs
ity
revenues are all examples of benefits. The function of cost/benefit analysis is to determine whether
the benefits outweigh the expenses.
A cost-benefit analysis is a method of determining the various costs, benefits, and rules connected
)A
with a system. The steps for calculating costs and benefits are as follows:
Some costs and advantages are easier to identify than others. Direct costs, such as the cost of a hard
disc, can be easily determined using corporate invoice payments or cancelled checks, for example.
(c
Direct benefits are frequently linked to direct costs, particularly savings from cost reductions in the
activity in question. Other direct costs and benefits, on the other hand, may be difficult to identify since
they are projected costs or benefits with some uncertainty. A reserve for bad debt is an example of
such costs. It is a discernible real expense, while the exact amount is not known right away.
Opportunity costs and benefits are a type of expense or benefit that is difficult to distinguish. These
e
are the expenses or benefits that are foregone when one option is chosen over another. They are
difficult to identify because they do not appear in the organization's finances.
lin
2. Sort the costs and benefits into categories for examination.
The classification of costs and benefits is the next step in cost and benefit analysis. They can be real
or virtual, direct or indirect, fixed or changing.
On
3. Decide on an evaluation approach.
The analyst must choose an evaluation approach when all financial data has been discovered and
broken down into cost categories. There are several evaluation systems to choose from, each with its
own set of advantages and disadvantages. The following are some of the most prevalent methods:
ty
• Present value analysis
• Net Present value
• Payback analysis
• Break- even analysis
• Cash-flow analysis
si
er
4. Analyze the results and interpret them.
The outcomes of the project evaluation must be analysed once it is completed. This requires
comparing actual results to a benchmark or the outcome of a different investment. The interpretation
phase, as well as the choice phase that follows, are both subjective and need judgement and intuition.
The analyst may be presented with a single known value or a range of values, depending on the level
iv
of uncertainty.Simpler methods, such as net benefit analysis, are easier to calculate and present than
other metrics in any instance, even though they do not discount future cash flows. The net benefit
approach would be analogous to the net present value method if it could be updated to include the
time worth of money. Complex measurements like net present value account for the temporal value of
Un
The analyst's or end user's trust in the predicted costs and benefits, as well as the scale of the
investment, can all influence the choice to choose an alternate candidate system.
In conclusion, cost-benefit analysis is a tool for analysing initiatives rather than a decision-maker
replacement. When making a decision between options in real-life business scenarios, cost/benefit
ity
analysis is a useful tool. However, it, like every tool, has flaws:
(i) Issues with valuation: It's difficult to quantify intangible costs and benefits, and tangible
expenses are usually more pronounced than tangible advantages. In most
circumstances, a project must have significant intangible advantages in order to be
approved.
m
(ii) Cost-benefit analysis distortion: There are two ways to distort the results of a cost-benefit
analysis. One is the deliberate political partiality of one alternative over another. The
second is when the data in the analysis is incomplete or missing.
(iii) Completeness issues: Occasionally, an alternative is overlooked, compromising the final
)A
choice's quality.
Furthermore, the expenses of doing a cost-benefit analysis may be excessive, or there
may not be enough costs to conduct a thorough study. In either situation, the final
decision's reliability is questioned.
5. Make a decision.
(c
Following a cost-benefit analysis, the user's final decision is to choose the most cost-effective and
helpful system. The analysts write a feasibility report based on the primary findings and
recommendations at this time. It lays out the possibilities and makes suggestions. It is presented to
management in order for them to decide whether or not a candidate system should be developed.
Effective reports are formatted in a way that management can comprehend and evaluate them
e
without having to read the entire document.
Everyone should perform a cost-benefit analysis in order to come up with a powerful or efficient
lin
system. However, in performing a cost-benefit analysis, we must also consider the elements that
have a direct impact on the system's benefits and costs. Some cost elements must be considered
when producing cost estimates for a system. Hardware, staff, facility, operating, and supply costs
are some of them. The cost factors are as follows:
On
Hardware cost: Hardware costs include the cost of the computer itself as well as peripherals
(external devices) that are attached to it. For instance, a printer, a hard drive, and so on. Actually,
determining the true cost of hardware is more challenging, especially when the system is used by
multiple users as opposed to a dedicated stand-alone system. In certain cases, the best course of
action is to treat it as an operating expense.
Personnel costs: Personnel costs include EDP employee salary and benefits, as well as
compensation for those involved in the system development process. Charges incurred during the
ty
creation of a system are one-time costs known as development costs. Once a system is installed,
the cost of operating and maintaining it becomes a recurring expense that must be paid on a regular
basis depending on the requirements.
si
Facility cost: Facility cost is the amount of money spent on preparing a physical facility where an
application or computer will be used. Wiring, flooring, lighting, and air conditioning are all included.
These expenses are classified as one-time expenses and are factored into the candidate system's
overall cost estimate.
er
Operating costs: These are the costs connected with the system's day-to-day (daily) operation, and
the amount varies depending on the number of shifts and the type of the applications. Operating
costs can be covered in a variety of ways. One strategy is to see running costs as an expense.
iv
Another option is to charge each authorised user money for the amount of processing they need
from the system. The amount charged is determined by the amount of time spent on the computer or
on the system, the time spent by the employees, and the volume of output produced.
Un
Supply costs: Supply costs are variable costs that rise as the amount of paper, discs, and other
materials used increases. They should be estimated and factored into the system's overall cost.
It is also believed that a system will give health benefits. To perform a cost-benefit analysis, the first
step is to identify each benefit and assign a value to it. Benefits might be direct or indirect, concrete
or intangible.
ity
Improving system performance and lowering system processing costs are two important
advantages. The accuracy of or access to information is improved, and authorised users have easier
access to the system, according to the performance category. Cost-cutting through an efficient
system – error control or staff reduction – is a benefit that should be quantified and factored into a
cost-benefit analysis.
m
e
for more and better jobs in agriculture, construction, tourism, and the garment industry.
lin
On
ty
si
er
The degree to which market systems in different geographical locations are connected is measured
by market integration. Critical products or food kinds of stuff will flow more freely from excess areas
to deficiency areas, from producers to consumers, and from ports and border crossings into more
iv
For EMMA's examination of appropriate actions, the degree of market integration is critical.
• In the baseline condition, a local market system that was strongly linked with wider markets is
considerably more likely to be able to expand trade to fulfil emergency needs.
• Critical commodities, services, or food are more easily available and pricing are more stable if local
markets are well integrated with bigger markets.
• Market integration, which will allow necessary commodities or food to flow from other excess
regions, is critical for local procurement and cash-based initiatives.
ity
• Prices tend to be more volatile in fragmented local markets that are poorly integrated with bigger
markets. Higher prices (lower income) will be experienced by target groups more frequently.
A market analysis is an evaluation that allows you to decide whether or not a given market is
appropriate for your industry. Market analysis can be used to assess your current market or to
investigate new markets.
m
A market analysis can assist you assess the desirability of a market, whether you're a startup,
wanting to grow, or reevaluating your current market. It also detects existing and prospective
dangers associated with operating in that area.
)A
Market analysis gives you a comprehensive, or all-encompassing, picture of the markets you want to
work in. Several evaluation tools are included in the report, as well as a discussion of your industry
and its market forecast. It also does a competitive analysis and discovers cultural and legal
regulations, as well as analysing the target market.
(c
When you undertake a market study, you will examine a number of characteristics of the market you
want to penetrate. You'll also figure out if your industry is a good fit for the market.
Industry Description and Outlook
Return to the coffee shop. You should perform an in-depth examination of your business and
e
analyse what the future of your sector looks like when preparing to expand. What does the coffee
shop sector look like, for example, and how big is the coffee industry? You should also consider the
industry's growth rate and the expected rate of growth over the following few years.
lin
In a nutshell, the industry description and outlook take into account the following factors:
On
• Average annual growth rate
• Potential for expansion
• Industry developments
• Industry long-term viability
• These metrics give you a broad picture of your industry's growth and profitability potential.
ty
Target Market
You'll want to determine your target market once you've got a general idea of what your sector looks
like and what it can do. The target market is the demographic to which you intend to promote your
si
goods.
You should delve into the nuances of who your target market is and what they want from the things
Un
you're selling.
When doing a target market analysis, you will want to learn as much about your target market
as possible.
Current resources, both hardware and software, as well as required technologies, are
analyzed/assessed in Technical Feasibility in order to construct a project. This technical feasibility
analysis determines whether the necessary resources and technology are available for the project's
development. In addition, a feasibility study examines the technical skills and capabilities of the
)A
technical team, whether existing technology can be used or not, whether maintenance and up-
gradation of the chosen technology is simple or not, and so on.
Technical feasibility assists in acquiring access to existing resources as well as technology required
to fulfil the user's needs in the programme while staying within budget and time restrictions.
(c
e
• Examine the technical skills and abilities of individuals of the software development team.
Given the current technological resources, the analyst must decide whether the new system can be
lin
constructed.
If not, is it possible to adapt or expand the system so that it satisfies the current request?
If existing systems cannot be expanded or updated, the next step is to see if technology that meets
On
the criteria is available.
At the same time, the analyst can check to see if the company has people who are technically
competent of reaching the goals.
If not, they must decide whether to hire additional programmers, testers, specialists, or people with
programming skills other than their own, or whether to outsource the job.
ty
Another factor to examine is whether there are software packages that can help them reach their
objectives or if the programme must be customised for the company.
•
•
•
si
It looks at the technical feasibility of each option for execution.
It examines the solution and assesses whether it can be supported by current technology.
er
The analyst decides if existing technological resources should be updated or new ones
introduced to meet the new needs.
• It assures that the candidate system responds appropriately to the technical enhancement to
the extent that it is capable of doing so.
iv
Examining the capabilities of computer hardware and software to handle workloads adequately is
Un
part of determining technological feasibility. The procedures taken by a systems analyst to determine
hardware and software requirements are depicted in the diagram below. To begin, the organization's
current computer gear must be inventoried to determine what is on hand and what is serviceable.
The systems analyst must collaborate with users to establish the hardware requirements. Only in
conjunction with determining human information requirements can hardware decisions be made. In
making hardware decisions, understanding the organizational structure and how users interact with
technology in an organizational setting can be beneficial. Hardware alternatives can only be
ity
evaluated if systems analysts, users, and management have a comprehensive understanding of the
types of jobs that must be completed.
m
)A
(c
e
lin
On
ty
si
er
iv
If an updated computer hardware inventory is not available, the systems analyst must immediately
create one and complete it. You should be aware of the following:
ity
When determining the current hardware available, much of the uncertainty about what exists will be
avoided, resulting in a more sound decision-making process when hardware options are finally
made. You will already know the amount of persons available for data processing, as well as their
skills and capabilities, based on your previous interviews with users, questionnaires polling them,
and research of archival data. Use this data to estimate how well new hardware staffing
requirements can be met.
(c
Estimating Workloads
Estimating workloads is the next stage in determining hardware requirements. As a result, systems
analysts create numbers that represent both current and future workloads for the system, ensuring
e
that any hardware purchased can handle both current and future workloads.
If forecasts are done correctly, the company should not have to replace hardware due to
lin
unanticipated system growth. (Other occurrences, such as greater technology breakthroughs, may
necessitate hardware change if the company wishes to stay competitive.) Workloads are sampled
rather than put via many computer systems due to necessity.
A comparison of the times required by an existing and proposed information system to manage a
On
given workload is shown in the table below. It's worth noting that the company is now preparing a
summary of shipments to its distribution warehouses using a vintage computer system, and a Web-
based dashboard is being recommended. The workload comparison examines when and how each
procedure is completed, as well as how much human and computer time is necessary. It's worth
noting that the newly proposed approach should drastically reduce the amount of time spent by
humans and computers.
ty
si
er
iv
Un
ity
m
)A
Management, users, and systems analysts are all responsible for evaluating computer hardware.
Although vendors will provide details about their specific solutions, analysts must directly oversee
the evaluation process because they will be looking out for the company's best interests. Users and
management may also need to be educated on the overall benefits and drawbacks of hardware
before systems analysts can properly evaluate it.
e
The next phase in the process is to assess the types of equipment available that appear to satisfy
predicted needs, based on the current inventory of computer equipment and reasonable estimates of
lin
current and forecasted workloads. At this point, vendor information on various systems and system
configurations becomes more important, and it should be discussed with management and users.
Workloads can also be simulated and executed on a variety of platforms, including those already in
use by the company. Benchmarking is the term for this procedure.
On
The following are some criteria that systems analysts and users should use to evaluate the
performance of various systems hardware:
• The time it takes to complete an average transaction (including how long it takes to input
data and how long it takes to receive output).
• The system's overall volume capacity (how much can be processed at the same time before
a problem arises).
• The CPU or network's idle time.
ty
• The amount of memory available.
Some requirements will be demonstrated in formal demonstrations; others will have to be gathered
from manufacturer specifications. Before getting too caught up in vendor claims during
si
demonstrations, it's critical to be clear on the required and desired functions.
After the functional needs have been identified and the existing products have been digested and
er
compared to what already exists in the organization, the systems analysts, in collaboration with
users and management, make a judgement on whether new hardware is required. Options can be
viewed of as a spectrum that ranges from using solely existing equipment in the firm to purchasing
fully new equipment. In the middle, there are possibilities for making little or large changes to the
existing computer system.
iv
Computers come in different shapes and sizes, from tiny cell phones to supercomputers the size of a
room. When deciding how to design a computer system, each has its own set of characteristics to
consider.
A successful project usually starts with a strategy that includes all of the necessary details to avoid
any unexpected problems during production. This strategy is essential for the successful execution
of a large-scale project and provides insight into what will be required for a successful launch and
)A
A technical feasibility study can provide relevant context to the various aspects of your project and
can also be used as a planning tool by providing an overhead view of how your project might evolve
during its development, as well as troubleshooting and tracking your project's progress from concept
to reality.
e
2.1.6 Assessing the Technical Feasibility
lin
What is the best way to do a technical feasibility study?
To begin your technical feasibility study, follow these steps:
On
A preliminary analysis can help you assess whether your project is worth investing time and money in
before beginning on potentially costly and time-consuming operations. The following are the two
primary branches of this analysis:
• Project outline: Describe the project's essential aspects in as much detail as feasible. These
can contain things like who your target markets will be, what demand you'll address, whether
your product or service already exists, and how you'll improve on what you already have.
ty
• Examine any potential hurdles to entry, as well as any other variables that could stifle
profitability. These can include a lack of availability or particularly expensive financing, an
inability to promote or refer your products, or production expenses that exceed expected
revenues.
si
Consider conducting a more in-depth feasibility study if your preliminary analysis appears to be
positive.
er
(ii) Create a projected income statement
iv
If your early investigation indicated that your product or service will meet a need, calculate the
potential revenue and compare it to the costs of creating your goods, paying your debts, and running
your organization. Continue to the next stage of your research if your expected net income is positive.
Un
A market survey will help you acquire a more accurate estimate of how much money your project will
bring in. The market survey will take numerous steps because this is an in-depth investigation,
including:
ity
• Consider population and demographic trends, cultural features, and the typical amount of
disposable income in your target market, as these factors will influence the success of your
project.
• Consider the strengths and limitations of similar or rival offerings in your target market,
including their location, products, pricing, marketing, quality, and client loyalty.
•
m
A business plan details your product or service offerings, lays out a production schedule, and
provides information on launch expenses, ongoing operations costs, and thorough planning for the
following:
•
(c
Organizational chart
• Materials, equipment and supplies
• Marketing and merchandising
• Facility location
• Labor costs
• Overhead such as insurance, taxes and utilities
e
(v) Prepare a balance sheet
lin
Before income is created, a day-one balance sheet should detail the undertaking's assets and
liabilities at the time of project completion, or opening day. The project's initial cash and financing
capital, as well as buildings, land, and equipment, are required assets, whereas liabilities comprise
projected investments, rent, finance payments, and account receivable allowance margins.
On
(vi) Review your data and make a decision
A final evaluation is required once you've completed all of your research and prepared your facts
and estimates. This final review is used to go over the preliminary analysis again and compare it to
the data you've gathered since then in order to see if your idea is still viable. This reflection will assist
you in assessing the risks and expenses involved with this project and making a final decision on
whether or not to proceed with production.
ty
The final stage in deciding whether or not to proceed with your project is to ask yourself the following
questions:
• Do the calculations demonstrate that this project will bring in the smallest amount of profit?
• Is there room for this initiative to expand?
si
• Is the potential benefit (revenue, growth, and market share) greater than the risks (time,
energy, and money)?
er
If you can answer yes to all three of these questions, your project has a decent probability of
succeeding.
Is the suggested product or service currently accessible on the market? If so, how would my
product improve on the concept, and if not, how feasible and/or dangerous is it to bring it to
market?
• What unmet need would this project address?
• What resources are required to complete this project, and do you have access to them?
• What are the legal or regulatory issues that this product or service raises?
ity
The degree of service to requirements is evaluated in Operational Feasibility, as well as how easy
the product will be to operate and maintain after deployment. Other operational scopes include
m
determining product usability, determining whether a software development team's offered solution is
acceptable, and so on.
Operational feasibility is determined by human resources and decides whether or not a programme
)A
• The operational feasibility aids in determining whether or not the software development
team's solution is acceptable.
(c
• Operational feasibility also helps determine whether the concerns identified in the user
requirements are of high priority.
• It establishes whether or not a programme is user-friendly.
• Its user interface should be basic enough for anyone to use.
• Assists in establishing whether the software development team's alternative solutions are
e
satisfactory to the organization.
lin
• It determines whether or not the system is operational after it has been created and
implemented.
• It guarantees that management will support the proposed system and operate within a
modern organizational framework.
On
• It determines if users will be affected and whether they will accept changed or new business
processes that affect the system's potential benefits.
• It also ensures that the computational resources and network architecture of the candidate
system are operational.
A feasibility study determines if a project or system is feasible. A feasibility study tries to objectively
and logically identify the strengths and weaknesses of a current business or new enterprise, as well
ty
as the possibilities and risks that exist in the natural environment, the resources needed to carry out
the project, and the likelihood of success. In its most basic form, the two factors for determining
feasibility are the required cost and the value to be obtained.
Operational feasibility is a metric for how well a proposed system solves problems and exploits
si
possibilities discovered during scope definition, as well as how well it meets the criteria identified
during the requirements analysis phase of system development.
er
In terms of development timetable, delivery date, corporate culture, and existing business
procedures, the operational feasibility study looks at how well the proposed project fits into the
existing business environment and objectives.
Desired operational results must be communicated during design and development to ensure
iv
proper application of engineering and management efforts. When a system's technical and operating
features are engineered into the design, it can best serve its intended purpose. As a result,
operational feasibility is an important feature of systems engineering that must be considered early
in the design process.
It's a metric for how well a proposed system will address the problem and take advantage of the
opportunities indicated during the scope definition process. It also defines how it will meet each of
ity
Operational feasibility is determined by the project's available human resources and decides whether
or not the system will be usable after it has been created and implemented. It assesses the
organization's readiness to support the proposed system. Operational feasibility, unlike technical and
m
To establish operational feasibility, however, you must first determine management's commitment to
the proposed initiative. Management would be more inclined to embrace and apply operational
)A
Here are some key questions to ask in order to guarantee that every project meets the requirement
of operational feasibility.
(c
e
current system?
• Is the system going to be used once it's finished?
• What will the system's manpower challenges be?
lin
• Will there be any labour protests?
• What policies and conflicts are likely to arise within the organization?
• What government restrictions might have an impact on the system?
On
When the operating and technical aspects of a project are integrated into the design, it may serve the
purpose for which it was created. As a result, operational feasibility is a critical component of systems
engineering that any company requires throughout the design phase of a project.
ty
Performance analysis is a collection of disparate computer-aided tools that assess a system's
performance at several levels of abstraction, making the task more difficult. We hope to make the
process of performance analysis easier by extracting a common object model. A design pattern can
be used to encapsulate this shared trait. At the system level of the performance modelling hierarchy,
si
several design patterns are found. These serve as a foundation for establishing the semantics and
composition features of the modelled data. The definition of design patterns for modelling such data
enables for the identification and addition of often recurring patterns to the system library. These
er
could be further enhanced by allowing users to change each design in a flexible and efficient manner
in order to model the exact design in question.
The amount of useful work done by a system is assessed by the pace at which goods of a
predetermined quality are produced. The competitiveness of high-tech Cyber-Physical Systems is
iv
frequently boosted by system performance. To meet market demands for product quality,
customisation, and total cost of ownership per product, systems must achieve ever-higher productivity
targets.
Un
Performance is intertwined with other system-level characteristics such as product quality, cost,
reliability, security, and customizability.
1. The term "_________" refers to the ability to use, support, and carry out necessary
ity
3. ________is the amount of useful work done by a system - measured by the production speed
of products of a predefined quality.
4. A market analysis is an assessment, which allows you to determine how suitable a particular
market is for your industry. You can use market analysis to evaluate your current market, or
)A
Summary
• A feasibility study is a preliminary evaluation that helps management determine whether or
not a system is viable for development.
•
e
The term "operational feasibility" refers to the ability to use, support, and carry out necessary
programme, system, or project duties. It refers to someone who designs or operates a
system. A project or system must meet particular criteria in order to be judged operationally
lin
practicable. These requirements take the form of questions with specific responses.
• Operational feasibility necessitates a thorough examination of the current system. When a
system's development costs are reduced without sacrificing its quality or product, it's
considered operationally feasible. Such an operation is viable, for example, if you can boost
worker efficiency in a new company by reducing working hours while maintaining product
On
quality.
• To take advantage of operational feasibility, everyone in the manufacturing industry needs to
understand how it works. Because it tends to fulfil one essential goal, an operational feasibility
study can be performed on both private and governmental enterprises.
• The most common method for evaluating the effectiveness of a new system is economic
analysis. The method is more frequently known as cost/benefit analysis, and it involves
determining the predicted advantages and savings from a prospective system and comparing
ty
them to the expenses. If the advantages outweigh the costs, the decision to develop and
deploy the system is made. Before taking action, an entrepreneur must carefully balance the
costs and advantages.
• Cost/benefit analysis is another term for economic analysis. It is the most common way for
determining a new system's effectiveness. The procedure in economic analysis is to evaluate
si
the projected advantages and savings from a prospective system and compare them to the
costs. If the advantages outweigh the costs, the decision to develop and deploy the system is
made. Before taking action, an entrepreneur must carefully balance the costs and
er
advantages.
• Many forecasting models are available to the systems analyst. The availability of historical
data is the most important consideration when selecting a model. If they aren't available, the
analyst must rely on one of the following judgement methods: sales force estimations,
consumer demand surveys, Delphi studies (a consensus forecast generated independently by
iv
satisfaction by removing boring chores. Intangible benefits are incredibly significant and can
have far-reaching repercussions for the business in terms of individuals both inside and
beyond the organization, as you can see from the list provided.
• If, after doing an operational feasibility study, the system, product, or end-users do not grasp
the programme, the aim of conducting the feasibility study has been defeated. The
m
Intangible advantages and expenses, as well as the impacts of a decision, such as staff
morale and customer satisfaction, might be included in a CBA.
Activity
(c
1. “Feasibility Aspects” this is a vital aspect of system analysis and design. Comment.
Questions & Exercises
e
2) Why is it necessary to conduct cost/benefit analysis?
3) What do you understand by system proposal?
lin
4) Compare the various evaluation methods.
5) What are the various cost benefit categories?
6) Define economic feasibility study.
7) What do you understand by cost benefit analysis?
8) Briefly discuss market analysis.
On
9) Write briefly about technical feasibility analysis.
10) State the importance of technical feasibility analysis.
11) What do you understand by the term assessing the technical analysis?
12) What do you understand by operational feasibility study?
13) Define operational feasibility study.
14) Write a short note on system performance aspects.
ty
Glossary
1. Operational Feasibility: The term "operational feasibility" refers to the ability to use, support,
si
and carry out necessary programme, system, or project duties. It refers to someone who
designs or operates a system. A project or system must meet particular criteria in order to be
judged operationally practicable. These requirements take the form of questions with specific
responses.
er
2. System performance: it is the amount of useful work done by a system - measured by the
production speed of products of a predefined quality. System performance often boosts the
competitiveness for high-tech Cyber-Physical Systems. To meet market demands for product
quality, product customization and total cost of ownership per product, systems need to meet
ever more ambitious performance targets relating to system productivity.
iv
3. Cost Benefit Analysis: A cost-benefit analysis (CBA) is the process used to measure the
benefits of a decision or taking action minus the costs associated with taking that action.
4. Market Analysis: A market analysis is an assessment, which allows you to determine how
Un
suitable a particular market is for your industry. You can use market analysis to evaluate your
current market, or look at new markets.
5. Technical Feasibility: Current resources, both hardware and software, as well as required
technologies, are analyzed/assessed to build a project in Technical Feasibility. This technical
feasibility analysis determines whether the necessary resources and technology are available
for the project's development. In addition, a feasibility study examines the technical skills and
capabilities of the technical team, whether existing technology can be used or not, whether
maintenance and up-gradation of the chosen technology is simple or not, and so on.
ity
Further Readings
1) Kurt Lewin, “Frontiers in Group Dynamics,” Human Relations, 1947, 1:5–41; and Kurt Lewin,
“Group Decision and Social Change” in E. E. Maccoby, T. M. Newcomb, and E. L. Hartley, eds.,
Readings in Social Psychology, New York: Holt, Rinehart & Winston, 1958, pp. 197–211.
m
2) Christopher Koch, “When Bad Things Happen to Good Projects,” CIO Magazine, December 1,
2004.
3) Altschuld, J. W., & Zheng, H. Y. (1995). Assessing the effectiveness of research organizations.
Evaluation Review, 19(2), 197-216.
)A
4) An, J. Y., Yom, Y. H., & Ruggiero, J. S. (2011). Organizational culture, quality of work life, and
organizational effectiveness in Korean university hospitals. Journal of Transcultural Nursing,
22(1), 22-30.
5) Anderson, J. A. (2000). Explanatory roles of mission and culture: Organizational effectiveness in
Tennessee's community colleges. Unpublished PhD thesis. University of Mephis.
6) Baker, K., & Branch, K. M. (2002). Concepts underlying organizational effectiveness: Trends in
(c
the organization and management science literature. Management Benchmark Study. USA:
Office of Planning & Analysis, Department of Energy
7) Cameron, K. (1978). Measuring organizational effectiveness in institutions of higher education.
Administrative Science Quarterly, 23, 604-632.
e
8) Cameron, K. (1981). Domains of organizational effectiveness in colleges and universities.
Academy of Management Journal, 24 (1), 25-47.
9) Cameron, K. (1986). A study of organizational effectiveness and its predictors. Management
lin
Science, 32(1), 87-112.
10) Dalton, T., & Dalton, L. (1988). The politics of measuring public sector performance. Promoting
Productivity in the Public Sector (Macmillan).
11) Federman, M. (2006). Essay: Towards an effect-ive theory of organizational effectiveness.
12) McCann, J. (2004). Organizational effectiveness: Changing concepts for changing
On
environments. Human Resource Planning, 27(1).
13) Mullins, L. J. (2008). Essentials of organizational behaviour: Pearson Education.
14) Pounder, J. (1999). Organizational effectiveness in higher education. Educational Management
Administration & Leadership, 27(4), 389-400.
15) Yildirim, V. and Kuşakcı, A.O., 2018. The critical success factors of erp selection and
implementation: A case study in logistics sector. Journal of International Trade, Logistics and
Law, 4(1), pp.138-146.
16) Osman, N., 2018. A software requirement engineering framework to enhance critical success
ty
factors for erp implementation. International Journal of Computer Applications, 180(10), pp.pp32.
17) Vicedo, P., Gil, H., Oltra-Badenes, R. and Merigó, J.M., 2018, January. Critical Success Factors
on ERP Implementations: A Bibliometric Analysis. In International Conference on Modelling and
Simulation in Management Sciences (pp. 169-181). Springer, Cham.
si
18) Barth, C. and Koch, S., 2019. Critical success factors in ERP upgrade projects. Industrial
Management & Data Systems.
19) Hentschel, R., Leyh, C. and Baumhauer, T., 2019, January. Critical success factors for the
implementation and adoption of cloud services in SMEs. In Proceedings of the 52nd Hawaii
er
International Conference on System Sciences.
20) Wolters, J., Eseryel, U.Y. and Eseryel, D., 2018. Identifying the Critical Success Factors for Low
Customized ERP System Implementations in SMEs.
21) Dr. Jawahar, “System Analysis and Design”, Study Material.
iv
22) Awad, Elias, M., “System Analysis and Design”, Richard D. Irwin.
23) Rajaraman, “Analysis and Design of Information Systems”, PHI.
Un
1. operational feasibility
2. cost-benefit analysis
3. System performance
4. True
5. True
ity
6. True
Le ar nin g O b j ect i ve s:
• De f in e d at a c e nt er a n d i ts k ey c h arac te ris t ic s .
• Dis c us s t he di ff er e nt t y pes of d at a c e nt er .
• Ex pl a i n th e tr ad i t io n a l HD D v ers es S SD .
• Dis c us s t he R e du n d an t Ar r ay of I n de p en d e nt D is k ( R AI D) .
• Dis c us s i n te gr at i on of har d war e a n d s of tw ar e m a in fr am e : F l i pk a rt .
•
(c
The growth of hardware and software technologies has aided the development of data management
e
and analysis systems. A computing system is made up of two major components: hardware and
software. Software performance may benefit directly from hardware advancements, but it is also
lin
constrained by hardware limitations. As a result, trade-offs must be made while designing software
frameworks and systems. Meanwhile, the demand for software performance encourages hardware
technology breakthroughs and innovations. The hardware limits the performance of data access and
query processing in data management and analysis systems. The software should optimise the
architecture of algorithms and data structures according to the hardware in order to fully utilize the
On
hardware. Traditional compute-intensive applications, as well as recent data-intensive applications,
have placed significant demands on hardware performance, including access latency, capacity,
bandwidth, energy consumption, and cost performance.
Traditional data management and analysis techniques are being tested to their limits by a variety of
application workloads. Big data difficulties are primarily created by a contradiction in which present
data processing infrastructures are unable to meet a wide range of data processing demands.
ty
The underlying hardware environment and the higher software system make up data processing
infrastructure. The higher software system's design ideas, architectural selection, fundamental
functions, strategy mode, and optimization approaches are all heavily influenced by the computer
hardware. Hardware technology and settings are changing dramatically today.
A data centre is a physical structure that enterprises utilize to house their vital applications and data
at the most basic level. The design of a data centre is built on a network of computer and storage
resources that allow shared applications and data to be delivered.
Un
Data centres nowadays are vastly different than they were only a few years ago. Virtual networks
that support applications and workloads across pools of physical infrastructure and into a multicloud
environment have replaced traditional on-premises physical servers.
Data exists and is networked across numerous data centres, the edge, as well as public and private
clouds in this era. The data centre must be able to communicate with all of these locations, on-
premises and in the cloud. Even the public cloud is made up of multiple data centres. When
ity
applications are hosted in the cloud, the cloud provider's data centre resources are used.
Routers, switches, firewalls, storage systems, servers, and application delivery controllers are all
part of the data centre design. Data centre security is crucial in data centre design because these
components hold and handle business-critical data and applications. They provide the following
services when combined:
m
Infrastructure for the network. This connects end-user locations to real and virtualized servers, data
centre services, storage, and external connectivity.
)A
Infrastructure for storing data. Data is the lifeblood of today's data centre. This valuable commodity is
kept in storage systems.
Resources for computing. A data center's engines are applications. Applications are driven by these
servers, which offer processing, memory, local storage, and network access.
(c
Investing in IT infrastructure needs significant thought, planning, and research to ensure that you
make the best decision possible. It's critical to choose a data centre that provides a comprehensive
suite of solutions that scales with your company, provides exceptional customer service, and
complements traditional colocation offerings with a hybrid mix of cloud, network, and managed
hosting solutions delivered over advanced networks. A few key characteristics of a data centre are
listed below: -
e
Manageability: The first point should be manageability. All of the pieces of a data centre should be
easy to manage and integrate. This can be accomplished by automating routine tasks and reducing
lin
human intervention.
To automate and decrease manual intervention for repeated processes, datacenters should enable
easy, flexible, and integrated management.
Availability: A data centre should ensure that information is available when it is needed. What does
On
this imply? It simply means that there will be no downtime. Unavailability of information can cost a
company a lot of money every hour.
Datacentres should make sure that their data and other IT resources are available to the business
24 hours a day, seven days a week. Information scarcity can have a significant impact on business
operations, resulting in financial losses and a bad reputation.
Security: All of the policies, procedures, and core element integration come together to prevent
unauthorised access to the data.
ty
To prevent unauthorised access, strict security policies and procedures should be implemented. To
prevent information from being tampered with, control mechanisms must be implemented.
si
Scalability: Datacenter resources and facilities (compute, storage, and network) should be scalable
to accommodate changing business requirements without disrupting business operations.
Simple scalability create a scalable infrastructure. Business expansion nearly usually necessitates
the deployment of more servers, new applications, and databases, among other things.
er
Performance: First and foremost, service levels must be established. The goal of performance
management is to ensure that all aspects of the DC operate at peak efficiency to meet the desired
service levels.
Based on the desired service levels, datacenter components should provide optimal performance.
iv
Data integrity: Ensure data integrity by storing and retrieving data exactly as it was received.
Datacenters should perform data integration checks such as error correction codes or parity bits to
verify that data is stored and retrieved exactly as it was received.
Un
Capacity: When capacity needs to be increased, the data centre must be able to do so without
disrupting availability or with minimal downtime.
The datacenter should be able to expand capacity and resources to efficiently store and process
huge and growing amounts of data, either without disrupting availability or with little downtime.
Monitoring: Monitoring is a continual process of acquiring data on the numerous elements and
ity
services that are active in the data centre. The rationale is self-evident: to forecast the unpredictable.
Reporting: A snapshot of resource performance, capacity, and utilisation at a specific point in time.
Provisioning: Provisioning is the process of supplying the necessary hardware, software, and other
resources.
m
There are many different types of data centres and service models to choose from. Their
classification is determined by whether they are owned by a single or multiple businesses, how they
fit (if at all) into the topology of other data centres, the computing and storage technologies they
employ, and even their energy efficiency. Data centres are divided into four categories:
Data centres come in a variety of sizes, ranging from a single server room to clusters of buildings
(c
spread across multiple locations, but they all have one thing in common: they are a critical business
asset where companies frequently invest in and deploy the latest advancements in data centre
networking, compute, and storage technologies.
The modern data centre has developed from a building that houses on-premises infrastructure to
e
one that connects on-premises systems to cloud infrastructures, with networks, applications, and
workloads virtualized across many private and public clouds.
lin
The types of data centres are as follows:
1. Enterprise data centres are often built and used for internal purposes by a single organization.
These are rather frequent among tech behemoths.
On
Enterprise data centres
Companies build, own, and run these, which are optimized for their end consumers.
The majority of the time, they are located on the company campus.
• An enterprise data centre is a facility that is owned and operated by the firm it serves. It is typically
built on-site, but it can also be built off-site in some situations.
ty
• Parts of the data centre may be gated off to keep different parts of the business distinct.
• Typically outsources M&E maintenance, but manages the white space through the IT department.
• Before being maintained internally, external businesses may be used for initial fit-outs and network
installation.
si
• Can have anything from 10 to 40 cabinets and be as large as 40MW+.
2. Colocation data centres are a type of rental property in which a data center's space and
er
resources are made available to those who are prepared to pay for them.
("colo") data centres. The infrastructure is hosted by the colocation data centre, which includes the
building, cooling, bandwidth, security, and so on, while the company provides and administers the
components, such as servers, storage, and firewalls.
Un
• In a colocation data centre, a single data centre owner sells space, electricity, and cooling to a
number of enterprise and hyperscale customers in a single location.
• For enterprises, interconnection is a major motivator. Interconnection to Software as a Service
(SaaS) like Salesforce and Platform as a Service (PaaS) like Azure is available through colocation
data centres.
• Colocation companies provide technical assistance to organizations who don't know what they
need or don't want to deal with the trouble of sourcing and delivering it.
ity
• Other colocation facilities follow a slightly different strategy, with selected integrators providing
technical design, guidance, and specifications for customers relocating.
• Depending on the size of your network, you can rent anywhere from one to one hundred cabinets;
in some circumstances, 14 or 12 cabinets are available.
• A colocation data centre can accommodate hundreds, if not thousands, of individual customers.
m
3. Managed service data centres: As a third party, data centres provide services such as data
storage, processing, and other services to clients directly.
On behalf of a firm, these data centres are maintained by a third party (or a managed services
provider). Instead of purchasing the equipment and infrastructure, the corporation leases it.
A managed data centre is typically obtained through data centre hosting, colocation, or a cloud-
based data centre as a service (DCaaS) platform.
Managed data centres can be managed in part or altogether. Organizations with a partially managed
(c
data centre have some administrative control over the data centre infrastructure and/or service. In a
totally managed data centre, the data centre provider handles the majority (if not all) of the back-end
data centre administration and management.
The service provider is normally responsible for:
• Upkeep and maintenance of all hardware and network equipment and services, as specified in the
e
service level agreement
• Operating system and other system-level software installation, upgrade, and patching
lin
• Data centre storage and backup maintenance
• Fault tolerance and data centre infrastructure redundancy in the event of a disaster or other
disrupting events
4. Cloud data centres are dispersed and are occasionally made available to consumers through a
On
third-party managed service provider.
ty
a virtual infrastructure that runs on cloud servers to run their apps and manage their data.
A cloud Data Center is not the same as a traditional Data Center; except from the fact that they both
store data, they are completely separate computer systems. A cloud Data Centre is not physically
si
placed in a company's office — everything is done online! When you put data on cloud servers, it is
split and duplicated across multiple locations for secure storage. In the event of a breakdown, your
cloud services provider will ensure that a backup of your backup is also available!
er
3.1.3 Traditional HDD verses SSD
The way data is stored and retrieved is the major difference between an SSD and a hard drive. A
iv
hard disc drive (HDD) is a type of storage device that accesses data using mechanical platters and a
moving read/write head. A solid state drive (SSD) is a newer, quicker form of storage device that
stores data on memory chips that are instantaneously accessible.
Un
ity
m
)A
(c
e
lin
On
ty
si
er
iv
Un
The hard disc drive technology is well-known and well-proven. Hard disc drives have been present
for more than 50 years, with storage capacity and physical size continually growing. To read and
write data, HDDs use rotating discs, or platters.
For several generations of personal computers, the classic rotating hard disc has been the standard.
Hard drive manufacturers have been able to store more storage space than ever before, at a cost
ity
per gigabyte that still makes hard drives the best bang for the buck.
Hard drives have been around since 1956, no matter how advanced they've become. Back then,
they were two feet across and could only hold a few gigabytes of data, but technology has
progressed to the point that you can now fit 10 terabytes into a space the size of a kitchen sponge.
m
A hard disc contains something that looks eerily similar to an antique record player: A platter, or
several platters, spins around a central axis—a spindle—at a rate of 5,400 to 7,200 revolutions per
minute. Some hard discs designed for performance work more quickly.
)A
Using a read-write head, information is written to and read from the drive by changing the magnetic
fields on the spinning platters. It resembles the arm of a record player in appearance, but instead of
a needle running in a physical groove on the record, the read-write head hovers just over the actual
surface of the disc.
Hard drives come in two sizes: 2.5 inch, which is frequent in laptops, and 3.5 inch, which is common
(c
in desktop computers. External drives with 2.5 inch and 3.5 inch drives are also available. When
something goes wrong, the size is standardised, making repair and replacement easier.
The vast majority of today's hard drives employ a common interface known as Serial ATA (or SATA).
Serial Attached SCSI (SAS), Fibre Channel, and other exotic interfaces built for special applications
e
are sometimes used in specialised storage systems.
lin
One or more magnetically sensitive platters, an actuator arm with a read/write head for each platter,
and a motor to spin the platters and move the arms make up a hard disc drive. There's also an I/O
controller and firmware that communicates with the rest of the system and informs the hardware
what to do.
On
Each platter is divided into tracks, which are concentric circles. Tracks are separated into sectors,
which are logical units. A unique address is generated for each track and sector number, which can
be used to organise and locate data. The data is written to the closest available storage location.
Before the data is written, an algorithm processes it, allowing the firmware to detect and repair
problems.
The platters are spinning at their current rates (4200 rpm to 7200 rpm for consumer computers). The
read/write rates are related to these speeds. The faster a hard disc can read and write data, the
ty
greater its current speed.
si
gathers the data by sensing the presence or absence of a charge in each address each time you ask
your computer to obtain or update data. The read/write head alters the charge on the concerned
track and sector if the request was to update the data.
er
Latency is the time it takes for the platter to spin and the actuator arm to locate the correct track and
sector.
Drawbacks
iv
The disadvantages of HDDs stem from the mechanical parts needed to read and write data, as
physically finding and retrieving data takes longer than finding and retrieving it electronically. If
mechanical parts are dropped or handled violently, they may skip or even fail. This is a problem with
laptops, but not so much with desktop computers. HDDs are also bulkier and consume more energy
Un
than SSDs.
Benefits
Hard disc drives have the advantage of being a tried and true technology that is typically less
expensive than solid state drives for the same amount of storage. HDDs are currently available with
larger storage capacity than SSDs.
ity
In recent years, solid-state drives (SSDs) have grown much more common. They're standard on
Apple's laptops; for example, SSDs come standard on the MacBook, MacBook Pro, and MacBook
Air. The Mac Pro is no exception.
)A
Solid state refers to an integrated circuit, and the main difference between an SSD and a hard disc
drive is that an SSD has no moving parts. Instead of discs, motors, and read-write heads, SSDs rely
on flash memory, which is made up of computer chips that keep their data even when the power is
switched off.
In theory, SSDs work in the same way that the storage on your smartphone or tablet does. However,
(c
SSDs in today's Macs and PCs are faster than the storage in your smartphone.
HDDs' total performance is limited by their mechanical nature. Hard drive manufacturers strive
relentlessly to improve data transfer speeds, minimize latency, and reduce idle time, but they can
e
only do so much. SSDs provide a significant performance advantage over hard drives, as they are
faster to boot up, shut down, and transfer data.
lin
If you're still using a PC with a SATA hard drive, upgrading to an SSD will significantly improve
performance.
On
drive technology uses NAND, which is a type of flash memory. Floating gate transistors, at their
most basic level, record a charge (or lack of charge) to store data. The gates are arranged in a grid
pattern that is then divided into blocks. The size of the blocks varies, but each row of the grid is
referred to as a page.
An SSD controller has numerous functions, one of which is to keep track of where data is stored.
ty
block must be refreshed. The data from the old block is copied to a new block, the old block is
erased, and the data is rewritten to a new block with the changes.
The SSD controller examines the address of the data sought and reads the charge status each time
si
you ask your computer to retrieve or update data.
When the drive is turned off, a procedure known as garbage collection takes place, ensuring that the
information in the old block is deleted and the block is ready to be written to again.
er
Another procedure, known as TRIM, tells the SSD that when it erases blocks, it can skip rewriting
some data. This is an important operation that prevents premature wear on the storage disc because
each block can only be rewritten a finite number of times.
iv
To further reduce drive wear, an algorithm ensures that each block in the drive receives an equal
number of read/write operations. Wear levelling is a process that occurs automatically as the drive
operates.
Un
SSDs are typically overprovisioned with storage since the read/write process necessitates data
migration; there is always a portion of the drive that is not reported to the operating system and is
not accessible to the user. This gives the drive more room to relocate and remove files without
reducing total store capacity.
Drawbacks
ity
SSDs are more expensive than HDDs because they are a newer technology. Large-capacity solid
state drives are becoming more common, yet they are still difficult to come by. HDDs can be 2.5
times larger than SSDs.
Benefits
Solid state SSDs allow games, programmes, and movies to load faster. SSDs are lighter and better
m
equipped to tolerate movement and page drops due to the technology they employ. Furthermore,
solid state discs consume less energy, allowing computers to operate at a lower temperature.
)A
Speed
SSDs are becoming increasingly popular due of their speed. SSDs outperform HDDs across the
board because they rely on electrical circuitry rather than physical mechanical parts. This results in
faster startup times and fewer delays while opening apps or performing intensive computing
(c
operations. The Intel SSD D5-P5316, for example, is a 15.36TB enterprise-grade SSD with a
bandwidth of over 7000 MB/s. The 14TB Seagate Exos 2x14, a compatible HDD, has a bandwidth of
just 500 MB/s.
These higher speeds assist users in a variety of ways, including when checking in and waiting for
e
apps and services to load, or when executing storage-intensive tasks like copying a large file.
Performance is substantially slowed by an HDD, however an SSD can continue to work on other
tasks.
lin
When moving data back and forth, the interface utilized by an SSD vs. HDD that interfaces to the
rest of the computer system has an impact on speed. SATA and PCI Express are two interfaces you
may be familiar with (PCIe). SATA is a legacy technology that is older and slower, whereas PCIe is
newer and faster. SSDs with PCIe interfaces are often much faster than HDDs with SATA interfaces
On
because PCIe has additional data transfer channels. Consider the difference in the number of cars
that can travel down a one-lane country road vs a four-lane freeway.
Although no one ever complains about their computer being too fast, an HDD can be useful at times.
If you need to store terabytes of data, HDDs are still the less expensive alternative, however this is
changing as SSD prices fall and emerging NAND technologies push bit densities higher per NAND
die. Consider data as either cold or hot when making computer storage decisions. Years of images
you want to save on your laptop but don't look at every day and don't need quick access to are
ty
examples of "cold" data. For cold data, HDDs can be an excellent and cost-effective option.On the
other hand, "hot" data is what you need if you're a company doing real-time transactions, editing
films and images, and need quick access to a database of files, video clips, or models, or even just
running the operating system. SSDs' high performance makes them an excellent choice when quick
si
access to your data is critical.
Endurance
er
Since data is written in pages but erased in blocks, the degree of write wear on a NAND SSD is
partly determined by the condition of data already on the disc. Data can be efficiently written to
successive, free pages on a relatively fresh SSD when writing sequential data. While small blocks of
iv
data must be modified (for example, when amending documents or numerical values), the old data is
read into memory, edited, and then re-written to a new disc page. The old page has been flagged as
invalid because it contains outdated information. When free pages become unavailable, "invalid"
pages are released for use in a background process known as "defragmentation" or "wear levelling."
Un
All valid pages in a given block must first be transferred to other free locations on the drive, leaving
only invalid, deprecated pages in the original block. After that, the original block can be removed to
make room for new data to be written.
Write amplification occurs when the total internal writes on an SSD exceed the writes required to
merely deposit fresh data on the disc, as a result of internal NAND housekeeping procedures like
ity
wear levelling. Because each write destroys individual NAND cells significantly, write amplification is
a major cause of wear. NAND SSDs have built-in technologies that help spread wear uniformly over
the drive. But the bottom line is that write-intensive workloads (particularly random writes) cause
NAND SSDs to wear out faster than other I/O patterns due to increased write amplification.
The good news is that SSD disc durability is always specified in terms of worst-case random write
m
patterns. When a drive says it can write one drive worth of data per day, for example, it implies you
may write at least one full drive worth of data every day over the drive's warranty period (typically 5
years).
)A
SSDs for PCs are available in capacities ranging from 120GB to 30.72TB, while HDDs are available
in capacities ranging from 250GB to 20TB. HDDs outperform SSDs in terms of cost per capacity,
although as SSD prices fall, this will become less of a distinction for HDDs. However, SSDs allow
(c
you to accomplish far more work per server, requiring fewer machines to provide the same output as
an HDD. What's the end result? SSDs have a lower total cost of ownership (total cost of ownership).
The term "reliability" refers to whether data is kept correctly and in an uncorrupted state. SSDs are
more dependable than HDDs in general, which is due to the absence of moving parts. SSDs aren't
e
affected by vibration or related heat issues because they don't move.
Because data access is much faster and the device is idle more often, SSDs often use less power
lin
and result in longer battery life. When compared to SSDs, HDDs require more power to start up due
to their spinning discs.
On
SSDs perform substantially better than HDDs, as is commonly known. The advantage of SSDs in
terms of reliability is almost as well acknowledged. SSDs do not require replication for performance,
and they often require significantly less replication for reliability, due to their inherent advantages. In
comparison to HDDs, SSD performance allows for far more efficient data reduction strategies. The
ratio of host data stored to physical storage required is known as data reduction; a 50 percent ratio is
similar to a 2:1 data-reduction ratio. The resulting effective capacity is improved because data
reduction allows the user to store more data than is available on the actual hardware. The raw
storage capacity required to achieve a "usable capacity" requirement can be considerably reduced
ty
using compression and deduplication technologies.
Modern methods are tailored for SSDs, allowing for a high data-reduction ratio (DRR) while
maintaining great application performance. For example, Facebook's Zstandard compression
si
algorithm compresses and decompresses data significantly quicker than HDDs can read/write,
allowing the methods to be used in real time on SSDs. 2 Another example is VMware vSAN, which
only supports all-flash setups for compression and deduplication.
er
3.1.4 Redundant Array of Independent Disk (RAID)
RAID, or "Redundant Arrays of Independent Drives," is a technique for increasing performance, data
iv
redundancy, or both by combining many discs instead of a single disc. David Patterson, Garth A.
Gibson, and Randy Katz of the University of California, Berkeley, created the phrase in 1987.
Although it takes up more space, data redundancy improves disc reliability. This means that if the
same data is backed up onto another disc in the event of a disc failure, we can retrieve the data and
continue with the operation. If the data is spread across numerous discs without the use of RAID, the
loss of a single disc might have a significant impact on the data.
• Availability: How much of a system's total session time is spent in uptime mode, i.e. how accessible
is it for actual use?
• Reaction time: How fast is the response time? What is the throughput (rate of work processing)?
It's important to note that performance is comprised of many variables, not just the two.
• Capacity: Given a set of N discs, each with B blocks, what is the user's useable capacity?
m
At the server level, a redundant array of independent discs (RAID) is a standard solution for high-
volume data storage. RAID systems store enormous volumes of data and provide greater reliability
and redundancy by combining multiple small-capacity disc drives. The computer sees such an array
as a single logical unit made up of numerous disc drives.
)A
There are several methods for storing RAID data. Some RAID kinds place a premium on
performance, while others place a premium on reliability, fault tolerance, or error correction. The type
you select is determined on the goal you're attempting to achieve.
The ability to "hot-swap" a damaged disc for a new one is a feature common to all RAID systems,
and it's what gives them their actual benefit. Data on a failing disc can be recreated automatically in
(c
most RAID kinds without requiring the server or system to be shut down.
Regular backups and mirroring software are slower and may entail shutting down the system if a
drive fails, so RAID isn't the only solution to protect big amounts of data.
Even if the disc does not cause the server to crash, IT professionals will need to shut down the
servers in order to replace the drive. Instead of requiring a shutdown, RAID rebuilds data from the
e
remaining discs using mirrored or parity information.
lin
The most basic form is RAID Level 0, which involves data striping. Data is stored on consecutive
sectors of the same disc on a conventional hard drive. RAID 0 uses at least two disc drives and
separates data into blocks ranging from 512 bytes to several gigabytes, which are written to the
discs in a random order. Disk 1 receives Segment 1, Disk 2 receives Segment 2, and so on. When
the system reaches the array's final drive, it writes to Drive 1's next available segment, and so on.
On
The I/O burden is distributed uniformly across all discs by striping the data. Because drives can be
written to and read from at the same time, performance improves substantially. However, there is no
data security. Data is lost when a disc fails. RAID 0 isn't designed for mission-critical scenarios, but
it's ideal for video production and editing, as well as image processing.
Data striping is included in RAID Level 3, however parity information is stored on one drive. This
provides some fault tolerance and is especially beneficial for accessing long sequential records in
ty
data-intensive or single-user scenarios. To avoid performance decrease with short records, RAID 3
requires synchronized-spindle discs.
RAID Level 5 is similar to Level 0, only it stripes the bits of each byte over many drives rather than
si
separating data into blocks. This byte-striping adds overhead, but if a drive fails, the data can be
recovered using parity and error-correcting codes if the drive is replaced. All read/write operations in
RAID 5 are overlapping. It requires three to five discs for the array and is best suited to multiuser
systems with low write operations and no major performance requirements.
er
Less Common RAID Types
Disk mirroring is RAID Level 1; everything written to Disk 1 is likewise written to Disk 2, and anything
iv
written to either disc can be read. This enables immediate backup, but it necessitates the most disc
drives and does not enhance performance. RAID 1 is the easiest configuration to establish in a
multiuser system, providing the best performance and fault tolerance. It's suitable for accounting,
payroll, financial, and high-availability data.
Un
For mainframes and supercomputers, RAID Level 2 was created. RAID 2 corrects data in real time,
however it has a high error-checking and correction ratio.
Large stripes are included in RAID Level 4 to allow records to be read from any single drive. It's
rarely used because it doesn't handle multiple write operations at the same time.
Commercially, RAID Level 6 is rarely used. It extends RAID 5 by distributing a second parity method
across many discs. It can withstand numerous drive failures at the same time, but performance is
poor, especially for write operations, and the system requires a highly complicated controller.
ity
Storage Computer Corp. in Nashua, N.H., offers RAID Level 7, which combines a real-time
embedded operating system as a controller and a high-speed bus for caching. It provides quick I/O,
but it is costly.
RAID Level 10 is made up of a series of stripes, each of which is a RAID 1 array of drives. This has
the same fault tolerance as RAID 1, and it's designed for database servers that need great
m
The most recent form, RAID Level 53, is implemented as a Level 0 striped array with each segment
being a RAID 3 array. It has the same fault tolerance and redundancy as RAID 3. This may be useful
)A
for IT systems that require a RAID 3 configuration with high data transmission rates, but it is both
costly and wasteful.
The Flipkart Marketplace Seller APIs allow a seller's applications to interact with the Flipkart
Marketplace programmatically and exchange data. They assist with the automation of all business
procedures related to selling on the Marketplace. These APIs allow a seller to search orders, print
shipping labels and invoices, and manage orders throughout the order life cycle.
e
You can register third-party applications that can contact APIs by logging into the Seller APIs -
Developer Admin page as a registered seller.
lin
• Before deploying the application integration in a live (production) environment, it must first be
tested in a sandbox environment. The OAuth framework is used in both installations.
• All seller API requests must be HTTPS. Requests through HTTP are not supported.
• Do not hard-code the Access Token value in the Authorization header because the token will
On
expire after a certain period of time, usually 60 days. API queries with an expired Access Token will
fail with a 401 HTTP status code. In this case, you must regenerate the access token and use the
new one in further queries.
1 Sandbox Environment
The sandbox is a controlled environment where you may create, programme, and test applications
before deploying them in the production environment. Although the items displayed in this
environment are not genuine, changing the base URL to the production environment allows the
ty
applications to go live with actual products and users.
2 Production Environment
The live Flipkart platform serves as the production environment. Real Flipkart consumers can buy
si
the products displayed in this environment. The Flipkart Marketplace terms of usage apply to the
information provided for this environment (TOU).
3 Application Registration
er
1. Log into the Seller APIs - Developer Admin portal.
other sellers’ resources (orders and listings) on their behalf using the APIs
• Scope: Pre-populated with the specific Seller API
• Redirect URL: The URL to which Flipkart will redirect the browser after authorization has
been granted by the seller. This field should be set if you selected third_party_application as
the application type above. Leave it black for self_access_application. Kindly refer
to Authorization Code Flow for more details on this.
m
4. Click Register application. The new application is now added to your applications list and a
unique Application ID (<appid>) and Application Secret (<app-secret>) pair is assigned.
)A
Application ID (appid) mentioned above and client_id used in the below mentioned OAuth APIs refers
to same thing.
e
Authorization Code Flow
If you're an aggregator or a vendor who'll be managing orders and listings on behalf of other Flipkart
lin
Marketplace merchants, this flow is for you.
API Integration
Once the Access Token has been received, it may be used to perform API calls by including it as a
Bearer Token in the HTTP request's Authorization header. You could browse through this API
On
documentation and design your own application to interface with the Flipkart Marketplace Seller
APIs offered in this documentation.
However, the recommended way to integrate is to use auto-generated client code by using
the Swagger spec. To ease the process, we are providing a sample java application which you
can download and start integration using the api client included in it. If you are using any other
language, you can use swagger-codegen to auto generate the client code for that language. Steps to
ty
install swagger-codegen can be followed from the official documentation page.
si
provided in the above linked sample Java application.
er
packagecom.flipkart.api.seller;
importcom.flipkart.api.seller.v3client.api.ShipmentV3Api;
iv
importcom.flipkart.api.seller.v3client.model.ShipmentResponse;
publicclassMyFlipkartOrdersApplication{
Un
publicstaticvoidmain(String[]args){
StringaccessToken=AccessTokenGenerator.getClientCredentialsAccessToken();// You need to write
custom code for token generation if you are using your own auto-generated client code.
ApiClientapiClient=newApiClient();
apiClient.setAccessToken(accessToken);
ShipmentV3ApishipmentV3Api=newShipmentV3Api(apiClient);
StringshipmentId="__SHIPMENT_ID__";
ity
try{
ShipmentResponseshipmentResponse=shipmentV3Api
.getShipmentDetailsByInternalId(shipmentId,null,null);
System.out.println("Order Id for shipment is
"+shipmentResponse.getShipments().get(0).getOrderItems().get(0).getOrderId());
m
}catch(ApiExceptione){
e.printStackTrace();
}
)A
}
}
Best Practices
(c
When creating client applications for the Flipkart MarketPlace, keep the following in mind:
• Before connecting your applications with the production environment, test them in the sandbox.
• Make sure your client apps can manage changes to the response structure and don't crash when
e
new fields are added.
• The access token for the client application should not be hardcoded because it expires after a set
lin
period of time.
• In your client application, keep a log of all Flipkart API queries and responses.
• It's worth noting that the answer elements and fields aren't returned in any specific order. The
samples in our documentation are only meant to be used as a guide.
On
3.1.6 Integration of hardware and Software and Mainframe: Google Services
Google provide a number of services and many of these are open for integration with other
applications. Google also provide hardware infrastructure for apps and services on Google Cloud's
scalable infrastructure. This can be used for reliable and high-performance cloud services. Google
provides official APIs for integration of hardware and software for most of Google services.
ty
The complete list of Google APIs is available at Google API Explorer at
https://developers.google.com/apis-explorer .
si
We will see in detail one core Google service – Google Analytics in the following section.
Companies cannot afford to rely on partial, erroneous, or otherwise mismatched data when using
Google Analytics as a decision-making tool. To suit enterprises' measurement needs and business
er
objectives, Google Analytics must be correctly configured.
This section will teach you how to take some of the most crucial actions to ensure that your data is
clean, organised, and accurate. The section is broken into five sections, each of which represents a
stage in properly integrating Google Analytics into a website or app:
iv
1. Understanding the web analytics process: Before you start using Google Analytics, you need know
how the data will be used and how data collecting and analysis link to other business sectors. This will
assist you in determining your company's data requirements and the criteria that will be used to
Un
assess performance.
2. Implementing and customizing codes: Once your data requirements and success metrics have
been established, you should begin exploring for Google Analytics adaptations to add to your website
or app.
3. Configuring the Google Analytics interface: After you've installed the code, you'll need to configure
ity
the Google Analytics interface to make sure it's processing your data the way you want it to.
4. Tagging inbound traffic: In order to effectively monitor all of your website or app traffic, particularly
marketing efforts, you'll need to use custom URL parameters known as UTMs to tag incoming links.
5. Managing the implementation: You should always keep track of changes in your Google Analytics
m
Please note that this section is not intended to be a thorough discussion of Google Analytics
installation methods and capabilities; rather, it concentrates on the most critical factors needed to
)A
Web analytics' goal is to improve online consumers' experiences while also assisting a firm in
achieving its goals; it is not a tool that generates reports and spills data. Web analytics is a virtuous
(c
loop that does not begin with data collection; data collection is merely a means to a goal.
Figure below depicts a procedure for implementing web analytics in your organization. It's not the
procedure; it's the procedure. Each business should figure out what procedure works best for them,
e
but here is a simple one that might work for you.
lin
2. Create a set of key performance indicators (KPIs) to monitor target progress.
On
5. Evaluate alternatives based on data analysis assumptions.
ty
si
er
iv
Un
This section focuses on steps three and four of the above-mentioned process: data collection and
analysis. Before we go into the bits and bytes of data, it's crucial to note that data shouldn't exist in a
ity
vacuum; it should be tightly related to business and customer demands. You'll learn a little more
about each of the processes in Figure above. Following this part, you'll go deeper into the technical
aspects of Google Analytics best practises implementation.
When it comes to analysing and improving a website or app, this is the first step: To develop your
business, you must first define your objectives. The answer to the following question will help you
define your objectives: What is the purpose of your website or app?
)A
Each website or application will have its own set of goals. For some, the goal will be to increase page
views in order to sell more advertising (increase engagement); for others, the goal will be to reduce
page views in order to help visitors discover answers (increase satisfaction). For some, the goal will
be to boost ecommerce transactions (and thus money), whereas for others, the goal will be to sell
only when the product meets the customer's demands (decrease products returns).
(c
The objectives are extremely necessary in order to begin the web analytics process, as shown in
Figure above. Only when they've been specified can you start working on the KPIs. It's also critical to
examine the goals on a regular basis in light of website analysis and optimization to fine-tune them.
Build Key Performance Indicators
e
You'll need to construct KPIs to track whether your website's results are improving or declining in
lin
order to track goal achievement. A KPI should be similar to an excellent piece of art in that it awakens
you up. It can make you happy or unhappy at times, but it should never leave you feeling unsatisfied,
because if it does, you aren't utilising the correct KPIs.
And decent art is in short supply. In each museum, there are just a few profoundly moving works of
art, and not every work of art affects the same people. The same may be said about KPIs. Each
On
person (or hierarchy level) will be interested in different KPIs—those that relate to their day-to-day
operations. The overall fulfilment of the website's aims will affect upper management; campaign and
site optimization outcomes will affect mid-management; and analysts will be affected by every single
measure in the globe!
• Simple: Decisions are made in businesses by people from various departments and backgrounds.
ty
Decision makers across the firm are unlikely to adopt KPIs if they are complex and difficult to
understand.
• Relevant: Since each firm has its own set of goals, it should have its own set of KPIs to track
progress.
si
• Reliable: Even the best KPIs are meaningless if they take a month to receive data, especially if your
industry changes every week.
er
You'll be in a much better position to collect the data you'll need if you stick to the specification of the
business objectives and the metrics that will be used to measure them.
iv
Collect Data
Un
When a corporation begins collecting data from a website or app, two questions should be asked:
• Is my information correct? It's like constructing a kingdom on sand if your data is inaccurate; your
foundations are too easily rocked.
• Am I gathering all of the information I require? You won't be able to analyse client behaviour
adequately if data isn't collected.
ity
I'll keep this step brief because you'll learn more about Google Analytics data collection techniques in
the subsequent sections.
Analyze Data
m
Data analysis is a broad field that encompasses anything from basic filtering, sorting, and grouping to
complex statistical analysis. You'll learn how to analyse data using a variety of Google Analytics
reports and capabilities throughout this book, but here are some broad principles to get you from data
)A
to insights:
• Segment or perish: When it comes to evaluating client behaviour, segmentation is a must. You'll be
able to optimise your customers' experiences more easily and efficiently if you segment them into
useful groups.
(c
• Focus on trends rather than data points: It's crucial to track your analytics over time to see if your
website's performance is increasing.
• Use visualisation techniques to explore your data: There are a plethora of graphs and tools available
to help you visualise numbers. Patterns and trends that are difficult to detect by crunching numbers
e
will be shown by examining data with charts.
lin
It's worth noting that data analysis can result in one of three outcomes:
• To find an implementation insight, such as a bug or a page that does not convert for no apparent
reason.
On
• To come up with a hypothesis for a low-converting customer interaction point that will result in a split
test.
• To determine the cause of a data gathering failure: Important information may be missing or
incorrect.
ty
Test Alternatives
"No one tests the depth of a river with both feet," according to an African proverb. In the same vein,
changing your website without first testing it on the tip of your toes is a bad idea. When you test, you
si
reduce the danger of a revenue loss due to a bad new design, and you introduce science into the
organization's decision-making process.
However, it is the learning experience about your customers—a chance to understand what they like
er
and dislike, which will ultimately lead to more or fewer conversions—that is the most exciting aspect
of experimenting.
The web analyst must try endlessly and fast learn to be incorrect, test everything, and recognise that
iv
the consumer, not the designer or the website manager, should make the final decision.
Experimenting and testing promotes idea democracy, which means that anyone in the business can
come up with a new concept, and the customers (the market) will choose the best one; the winner is
scientifically determined.
Un
• Landing page testing isn't the only option: It should be deployed across the board, wherever users
are fleeing the site and money is being left on the table.
• Conduct a little experiment to test your tools (and your abilities): It's sometimes a good idea to start
small and work your way up. Once you're comfortable with your tools, run a test on a key page for a
ity
tiny (but profitable) slice. Then make a beeline for the jackpot!
• Track several goals: While improving macro conversions, you may be reducing registrations or
newsletter signups, which could have a long-term detrimental impact.
• Run tests for multiple segments: Because different segments, such as countries and operating
m
systems, can have drastically different behaviours, the testing should be segregated as well.
Implement Insights
Web analytics is synonymous with no insight implementation. It's as if you done nothing if you go
through all of the preceding procedures but can't put the results into action on your website. Here are
(c
• Obtain C-level support: If you reach a stage where organizational priorities must be established and
resources given, this will be critical.
• Begin small: As previously stated, starting small helps to establish expectations; individuals are
aware of the tools and what is expected of them.
e
• Be friendly: Human nature dictates that being a pleasant person is always beneficial.
lin
2. Implementing and Customizing your Code
If you're new to Google Analytics, right after you create an account, you'll see a tutorial that will walk
you through retrieving the necessary tracking code to utilize. The first option is to choose between a
On
website and a mobile app for tracking. If you choose a website, you will be given JavaScript code to
use on it; if you choose an app, you will be given URLs to either the Android or iOS SDKs to
download.
You may locate this page by login into Google Analytics and clicking on Admin at the top of any page
if you missed the previous step or if you need to find your tracking information at a later time. This will
take you to the Administration panel, where you'll see a Tracking Info item.
ty
While implementing the default code on your website or app will provide you with important
information about customer behavior, other code customizations might be required to accommodate
your business needs. In the next section, I describe the customizations that I believe to be the most
si
important; for a comprehensive and detailed description of all customizations available.
Google Tag Manager is a sophisticated and scalable solution to organise your Google Analytics (and
other tools) installations, as you may already know. It will make updates simpler and clearer, and it
will elevate you to the status of hero. When using Google Tag Manager to build Google Analytics,
Un
It is necessary to change the code with Cross Domain Tracking if you want to measure many
websites that are linked together under a single Google Analytics property (tracking behaviour across
subdomains does not require additional configuration). When using Google Analytics, failing to
account for many domains might lead to considerable data inaccuracy. Ecommerce carts, which are
m
sometimes hosted on various domains, are a common example; if the tracking code is not set up
correctly, you may see a huge number of direct or self-referral sessions ending in a transaction.
Enhanced Ecommerce
)A
If your website or app sells items or conducts any other form of ecommerce transaction, you should
use Google Analytics Enhanced Ecommerce to better analyse your customers' journey. This tool will
help you gain a better knowledge of buying habits, campaign ROI, customer lifetime value, and other
critical data.
(c
Custom Dimensions
When trying to analyse and optimise client behaviour, creating audience segments is one of the most
significant approaches; it allows you to make your website or app more relevant to different groups of
people. Google Analytics comes with a robust segmentation feature by default, which allows you to
combine a variety of metrics and dimensions.
e
Custom Dimensions allow you to add attributes of a person, session, or activity to your data collection
in addition to the basic segments. A company that sells various types of memberships, for example,
lin
should be able to understand how each type of member behaves; a large publisher should be able to
understand how each of their authors is performing; and a travel website should be able to determine
which type of hotel their returning customers prefer.
Throughout the book, you'll learn more about Google Analytics Segments and Custom Reports.
Custom Dimensions, on the other hand, are particularly essential because they are not included in
On
any of the usual reports. As a result, the following are the best techniques to examine behaviour using
Custom Dimensions:
• Create a segment: You may use the Segment builder to create a segment that includes or
excludes specified user behaviour. For example, you might wish to use a segment to exclude
all of your existing clients (specified by a Custom Dimension) from your reports. When
reviewing client acquisition efforts, this might be prudent. You might also wish to include only
ty
people who are enrolled in your loyalty programme (as determined by a Custom Dimension)
in your reports to see what kind of material they are most interested in.
• Construct a Custom Report: Google Analytics customers can create Custom Reports using
the tool's metrics and dimensions to adapt their reports to their own company needs. This
si
feature may be used to create reports with Custom Dimensions and acquisition behaviour, as
well as conversion metrics, to better understand your users' activity.
er
Download Clicks
The objectives of various websites differ. You learned how to track ecommerce transactions
previously, and you'll learn how to measure advertising revenue with the AdSense integration shortly,
iv
but other websites' primary focus will be downloads. By default, Google Analytics does not track clicks
on download links, so if you want to encourage visitors to download any form of file, you'll need to add
a special code to your website.
Un
Every website owner should be aware of how their visitors consume content. However, people
occasionally behave in ways that a default implementation cannot account for. For example, if
someone visits a long post, reads it completely, and then leaves the site, Google Analytics considers
this person to have viewed only one page and not interacted with the material. When it comes to
content publishers, this is a concern.
ity
In response, Google Analytics Evangelist Justin Cutroni created a script that transmits events to
Google Analytics whenever a user scrolls down a page. In addition, the script uses Custom
Dimensions to divide people into "scanners," who scroll to the bottom of the content in less than 60
seconds, and "readers," who scroll to the bottom of the information in more than 60 seconds. This
approach is excellent for determining how users consume content.
m
If you run a website, it's vital to keep an eye on things at all times to ensure that everything is working
properly, especially while updating the website code. The Google Analytics team has produced a list
of tools to assist you with this task:
• Diagnostics (in-product feature): When you connect into your Google Analytics account and choose
(c
a view, you'll see a bell icon in the upper-right corner of your screen. You'll also note that there's a
notification number there on occasion. You'll find a variety of tailored notifications for your code
implementation and setup if you click the bell.
• Real Time (in-product feature): Google Analytics provides Real Time data for website activities,
allowing you to view exactly what is occurring on your website or app right now. This is particularly
e
handy for website debugging because it allows you to make changes to the code and see how they
affect the data in real time.
lin
• Tag Assistant (Chrome extension): Use this extension to check your Google Analytics tag (and other
Google tags) while surfing the page. It's a useful tool for quickly checking and troubleshooting
implementations.
• Google Analytics Debugger (Chrome Extension): When compared to the extension, this extension
delivers more detailed and technical details on what is being transmitted from a page to Google
On
Analytics.
In this part, you'll learn about some of the most crucial settings for setting up a clean Google Analytics
ty
account with accurate data.
Setting Up Goals
Goals are the lifeblood of a Google Analytics account; without them, no analysis would yield useful
si
information. Goals can be measured in a variety of ways, including an ecommerce purchase (see
previous section), a thank-you page for a newsletter subscription, a session that lasted a specific
amount of time, a visit with a specific number of pages visited, and so on. Google Analytics provides a
collection of templates to help website owners set up goals, as seen in Figure below.
er
iv
Un
ity
m
)A
If you want to construct a custom goal based on your own requirements, you can choose from four
(c
• Destination: When a web page or app screen loads (for example, when you reach a "thank you"
page), the destination is triggered.
• Duration: Triggered when a user spends more than a pre-determined length of time on a website or
app in a single session.
e
• Pages/Screens per Session: When a user visits more than a pre-determined number of pages or
screens in a single session, this event is triggered.
lin
• User-initiated event: Triggered when a user-initiated event occurs (e.g., clicking on a button or
playing a video).
On
Focusing on Potential Customers
Your website may be seen by a wide range of people; regrettably, this number includes workers of
your own company and service suppliers, neither of whom are the visitors you want to understand
and optimise for. As a result, it's critical to set up filters that exclude the IP ranges used by your
company and its service suppliers, such as web development and marketing firms.
ty
Google Analytics has a number of pre-defined filters, including one that allows you to "limit traffic from
IP addresses" (see Figure below). If you wish to use the "that begin with" or "that end with" choices to
exclude a simple range of addresses, this option is ideal.
si
er
iv
Un
Additionally, Google Analytics allows you to filter bot traffic. This filter will filter out any hits from IAB-
approved bots and spiders, allowing you to see the true number of visitors to your site. To use the
filter, go to your Administration panel and click the box labelled "Exclude all hits from recognised bots
and spiders" in the View Settings menu of the view you want to filter.
The navigation patterns between website pages are one of the interesting insights we may acquire
from Google Analytics; you can find this information in the Behavior section of Google Analytics
standard reports. However, websites can refer to the same page using several URL parameters, and
Google Analytics treats one page with multiple parameter values as multiple different pages by
default.
m
As a result, if your content for these criteria is not unique, you should remove the duplicate pages
from your reports.
)A
Google Analytics has a straightforward interface for excluding URL parameters from reports; look for
a field called "Exclude URL Query Parameters" under View Settings in the Administration Panel.
When you add a parameter to this field, GA ignores it, bringing together pages that were previously
considered independent.
e
what this filter would look like.
lin
On
ty
si
er
Filter to lowercase URLs
I also propose setting lowercase filters for the following fields because the same issue can influence
additional fields, particularly campaign data:
iv
Studying search keywords used on the internal site search (search boxes displayed on the website
that allow visitors to search the website content) is a good technique to understand visitor intent; they
show what your visitors are looking for on the website. The Google Analytics Site Search function,
when properly configured, can assist website owners discover which material is being searched for,
m
which searches are returning irrelevant results, and which searches are driving sales (or another goal)
on the site. You will be able to add up to five parameters to define a search and up to five parameters
to define a category, as illustrated in Figure below. You can also strip the parameters from this view
(tick the box underneath the text field), which works in the same way as eliminating the parameter.
)A
(c
e
lin
On
ty
si
Setting up site search
er
Enabling Display Advertising and Demographics Reports
Enabling both Display Advertising and Demographics and Interest Reports will provide your reports
with a wealth of useful information. Once you've enabled them, you'll be able to examine behaviour
data based on the user's age, gender, and hobbies. However, this information can also be utilized to
iv
The first step is to update Google Analytics to support Display Advertising, which enriches data with
Un
DoubleClick cookie information where it is present (for websites) or with the Advertiser ID when they
are collected (for apps). To enable this setting, log into Google Analytics and go to Admin at the top of
the page, select the property you want to enable, and then click "Property Settings." "Enable
Advertiser Features" is an item you'll find. Please keep in mind that enabling advertiser features may
require you to change your privacy policy.
The second step is to enable the Demographics and Interest Reports, which can also be done in the
Property Settings.
ity
Excluding Referrals
This option allows you to add URLs that Google Analytics would ignore as referrals. This means that
m
a visitor who visits your site from an excluded domain will be treated in the same way as Direct traffic.
The person will still be ascribed to Organic if he or she has previously visited the website via an
Organic Search.
)A
By default, Google Analytics will add your own domain to this list (the same domain that you added to
the Property settings). A third-party cart, where the user is led to your website after making a
purchase, or a sibling website that should not be counted as a Referral, is another typical purpose.
(c
Google Analytics, when properly installed, may assist you in measuring client acquisition initiatives,
which is a vital responsibility. Users that arrive at a website via an Organic Search or Referral are
immediately detected by Google Analytics, but it won't know whether they arrived via a newsletter
until you provide it a means to know. The same is true for AdWords campaigns: you won't see
e
accurate figures in your reports unless you link AdWords to Google Analytics; nevertheless, this is the
subject of a whole chapter. For the time being, I'll concentrate on other marketing channels.
lin
It's critical to use campaign tags appropriately whether sending emails, purchasing banner spots, or
even promoting offline. Users who come from a billboard or a TV commercial will be classified as
Direct traffic; visitors who come from newsletters will be classified as Direct, mail.google.com, or other
email provider traffic; and visitors who come from banner campaigns will be classified as Direct,
ad.doubleclick.net, or the website itself. When it comes to judging campaign effectiveness, these
On
habits are plainly suboptimal.
In such circumstances, Google Analytics has developed a technique called UTM parameters that
allows you to "inform" it if users came through a campaign. (UTM stands for Urchin Traffic Monitor, a
relic of Urchin, the technology Google bought to create Google Analytics.) In essence, the technology
enables you to create connections that carry precise information about how a visitor came at your
website.
ty
Tagging Custom Campaigns
Using UTM parameters, you can create links that include five variables that, taken together, help
Google Analytics “see” how users got to the website:
•
si
utm_source describes the origin of the visitor. Since every visitor must come from some
place, this is a required parameter. It is usually the URL of the website where the campaign is
running, such as theguardian.com, online-behavior.com, newsletter, or others.
er
• utm_medium describes the channel used by the visitor; it is also a required parameter. It
could be cpc, display, social, email, or others.
• utm_name describes the name of the campaign. It could be a special campaign such as
“Launch,” an ongoing campaign such as “Product X,” or a newsletter edition such as
iv
“newsletter-jan-2015.”
• utm_term describes the term clicked on in a campaign. It could be a search term or a term
used in a newsletter. For example, if you are advertising on a search platform for the search
terms “analytics” and “measurement,” you would have the source example.com, the
Un
medium cpc, the name “Analytics Campaign,” and the terms “analytics” and “measurement”
for each ad.
• utm_content describes the version of an advertisement on which a visitor clicked. It is often
used to analyze the effectiveness of banner design or copy in a campaign. For example, if
you advertise on cnn.com and use two different banners, you would use the same parameters
for source, medium, and name, but would add a unique value for each banner on the content
UTM; this would enable you to learn which banner is better.
ity
NOTE Google has developed a tool in order to build links using these campaign variables
called URL Builder. It can be accessed at http://goo.gl/yQycsq. In order to tag multiple URLs
once, use the following template, created by Cardinal Path, a Google Analytics Certified
Partner and Google Analytics Premium reseller: http://c05tdu.
m
If you have existing campaigns tagged with custom link parameters (different from the UTM),
there is a way to translate them into UTMs without physically changing the campaign links,
but this would require an addition to the GA tracking code. For technical implementation
)A
Really Simple Syndication (or RSS) is a typical mechanism for content publishers to notify users of
new posts/articles, from individual bloggers to huge content portals. FeedBurner is a Google service
(c
for creating (or burning) website feeds. RSS is a family of web feed formats used to distribute
regularly updated works, and FeedBurner is a tool given by Google for creating (or burning) website
feeds.
The FeedBurner team established a technique to ensure that feed links are properly labelled with
UTM parameters to help publishers better understand traffic received through RSS. This is necessary
e
in order to gain a better understanding of how and where your audience consumes your material.
In order to tag FeedBurner traffic, log in to your feed at http://goo.gl/SuI6rx. On the Analyze tab (the
lin
default), you will find a link on the left sidebar under Services named Configure Stats. Click on it and
you will reach the screen shown in figure below.
As indicated by number 3, you will be given the option to Track Clicks as a Traffic Source in Google
Analytics. Once you check the box to enable the tracking, click on Customize. You will see the screen
On
shown in figure below.
ty
si
er
iv
Un
ity
Here is a suggestion of how you can set up the parameters in order to understand FeedBurner
traffic in an effective way:
1. Source: feedburner
2. Medium: ${distributionChannel}
3. Campaign: ${feedName} Feed
ity
4. Content: ${distributionEndpoint}
Both Custom Campaigns and FeedBurner traffic discussed in this section can be found under the
Acquisition tab on Google Analytics; to analyze a campaign search for it on the All Traffic report.
m
Google Analytics setups are a continual process; new features necessitate adjustments to the
tracking code or account settings on a regular basis. You must be exceedingly structured in order
to maintain control over what is and is not implemented, as well as when it was configured. You'll
learn how to avoid losing data and context on Google Analytics reports in this section.
(c
NOTE If you are not acquainted with the definitions of accounts, properties, and views,
read http://goo.gl/TAv93N before proceeding. In addition, please note that when you create new
views, they will start being populated from their creation date, even if another view in the property has
been collecting data for longer than that.
e
Creating Raw Data and Staging Views
lin
A view that does not employ any filters is the best way to check for configuration issues. You may
immediately determine if you have a misplaced or malfunctioning filter by comparing it to your main
view. You should also put up the same goals in this view as you did in your main view. In the event
that you need to use the data, this will make it more relevant. You might want to utilize the Raw Data
view for a bit if you discover that your main view has a filter that affects your prior data.
On
Assume you decide to implement a filter to lowercase URLs (as suggested above), but you're not sure
how it would effect your data. The best approach to proceed is to create a separate view with the
same parameters as your main view and only apply the new filter to that view.
After you've applied the filter, go over the data and compare the numbers to see if anything went
wrong. (Tip: Wait at least one full day of data before using filters, as they may take up to 24 hours to
begin filtering data.)
ty
Creating an Analytics Staging Property
If you've spent enough time in the web analytics sector, you've probably seen data that has been
si
tainted by poor implementations. Changes to the code should be done with caution. However,
because code changes affect all views in a property, creating a new view is ineffective in this
scenario.
er
Because most websites include a staging site where changes are tested before going live, I
recommend using a distinct tracking code (that is, a new Google Analytics property) to test code
changes on the Google Analytics tracking code in those settings. Also, make sure that both properties
have the identical configurations.
iv
Users make changes to Google Analytics views all the time as they revise their website goals,
improve filters, employ new capabilities, and so on. Every change has the potential to affect data in
unforeseen ways. As a result, having a mechanism in place to manage code and view changes is
critical, especially in large businesses where multiple people are active with Google Analytics. This is
significant even if just one person is involved, because employees may go on leave, be promoted, or
depart the organization.
ity
Change History is an out-of-the-box tool in Google Analytics that tracks changes to your account
settings, such as objectives, filters, and user permissions. Apart from the modification itself, you can
see who made it and when in Figure below. To get this report, go to Google Analytics and choose
Admin at the top of the page; this setting will be under your account settings.
m
)A
It is recommended using a Google Docs form to centralise the collecting and distribution of changes
made to a Google Analytics account, including code changes. The form should be constructed so that
all parties involved are informed of any changes. These will then be archived for future reference by
the entire team (and future team members). An example of such a form with fields that you might
want to develop is shown in the diagram below.
e
lin
On
ty
si
er
iv
Un
ity
Google Analytics Annotations is a tool that allows you to annotate data points on the Google Analytics
user interface, allowing for richer analyses by providing context while evaluating data. Here are some
)A
• Marketing campaigns that are conducted offline (radio, TV, and billboards)
e
at a high level. If you include too much detail about your changes or annotate minor changes, the
annotations will become too dense to deliver significant information to readers.
lin
Summary
This section covered best practises for Google Analytics setups as well as suggestions for how to use
the tool to capture clean and reliable data. You learnt about the five primary steps for deploying
Google Analytics in a clean, organised, and accurate manner in your website or app.
On
1. Understand the web analytics process: Before deploying Google Analytics, it's critical to understand
how the data will be used and how data collecting and analysis relate to other aspects of the
organization.
2. Implement and customise codes: Once you've identified your data requirements, you can start
exploring for Google Analytics changes to add to your website or app.
ty
3. Configure the Google Analytics interface: After you've installed the code, you'll need to configure
the Google Analytics interface to make sure it's processing your data the way you want it to.
4. Track inbound traffic: In order to effectively track all of your website or app traffic, especially
connections.
si
marketing campaigns, you'll need to use custom URL parameters known as UTMs to tag inbound
5. Manage the implementation: You should always keep track of changes in your Google Analytics
er
account to ensure that your implementation is always neat.
iv
Summary
and storage resources that allow shared applications and data to be delivered.
• Investing in IT infrastructure needs significant thought, planning, and research to ensure that
you make the best decision possible. It's critical to choose a data centre that provides a
comprehensive suite of solutions that scales with your company, provides exceptional
customer service, and complements traditional colocation offerings with a hybrid mix of
cloud, network, and managed hosting solutions delivered over advanced networks.
(c
• There are many different types of data centres and service models to choose from. Their
classification is determined by whether they are owned by a single or multiple businesses,
how they fit (if at all) into the topology of other data centres, the computing and storage
technologies they employ, and even their energy efficiency. Data centres are divided into four
categories.
•
e
The way data is stored and retrieved is the major difference between an SSD and a hard
drive. A hard disc drive (HDD) is a type of storage device that accesses data using
mechanical platters and a moving read/write head. A solid state drive (SSD) is a newer,
lin
quicker form of storage device that stores data on memory chips that are instantaneously
accessible.
• RAID, or "Redundant Arrays of Independent Drives," is a technique for increasing
performance, data redundancy, or both by combining many discs instead of a single disc.
David Patterson, Garth A. Gibson, and Randy Katz of the University of California, Berkeley,
On
created the phrase in 1987.
• Although it takes up more space, data redundancy improves disc reliability. This means that if
the same data is backed up onto another disc in the event of a disc failure, we can retrieve
the data and continue with the operation. If the data is spread across numerous discs without
the use of RAID, the loss of a single disc might have a significant impact on the data.
• A market analysis is an evaluation that allows you to decide whether or not a given market is
appropriate for your industry. Market analysis can be used to assess your current market or to
ty
investigate new markets. Market analysis gives you a comprehensive, or all-encompassing,
picture of the markets you want to work in. Several evaluation tools are included in the report,
as well as a discussion of your industry and its market forecast. It also does a competitive
analysis and discovers cultural and legal regulations, as well as analysing the target market.
Activity
si
1) Formulate a presentation on the topic ‘Redundant Array of Independent Disk (RAID)’.
er
2) Prepare on a case study based on your knowledge on Integration of hardware and Software and
Mainframe: Flipkart.
iv
Glossary
1. Enterprise data centres: these are often built and used for internal purposes by a single
organization. These are rather frequent among tech behemoths.
m
2. Colocation data centres: these are a type of rental property in which a data center's space
and resources are made available to those who are prepared to pay for them.
3. Managed service data centres: As a third party, data centres provide services such as data
storage, processing, and other services to clients directly.
)A
4. Cloud data centres: these are dispersed and are occasionally made available to consumers
through a third-party managed service provider.
5. RAID: "Redundant Arrays of Independent Drives," is a technique for increasing performance,
data redundancy, or both by combining many discs instead of a single disc. David Patterson,
Garth A. Gibson, and Randy Katz of the University of California, Berkeley, created the phrase
in 1987.
(c
Further Readings
1) Kurt Lewin, “Frontiers in Group Dynamics,” Human Relations, 1947, 1:5–41; and Kurt Lewin,
e
“Group Decision and Social Change” in E. E. Maccoby, T. M. Newcomb, and E. L. Hartley, eds.,
Readings in Social Psychology, New York: Holt, Rinehart & Winston, 1958, pp. 197–211.
lin
2) Christopher Koch, “When Bad Things Happen to Good Projects,” CIO Magazine, December 1,
2004.
3) Altschuld, J. W., & Zheng, H. Y. (1995). Assessing the effectiveness of research organizations.
Evaluation Review, 19(2), 197-216.
4) An, J. Y., Yom, Y. H., & Ruggiero, J. S. (2011). Organizational culture, quality of work life, and
On
organizational effectiveness in Korean university hospitals. Journal of Transcultural Nursing,
22(1), 22-30.
5) Anderson, J. A. (2000). Explanatory roles of mission and culture: Organizational effectiveness in
Tennessee's community colleges. Unpublished PhD thesis. University of Mephis.
6) Baker, K., & Branch, K. M. (2002). Concepts underlying organizational effectiveness: Trends in
the organization and management science literature. Management Benchmark Study. USA:
Office of Planning & Analysis, Department of Energy
7) Cameron, K. (1978). Measuring organizational effectiveness in institutions of higher education.
ty
Administrative Science Quarterly, 23, 604-632.
8) Cameron, K. (1981). Domains of organizational effectiveness in colleges and universities.
Academy of Management Journal, 24 (1), 25-47.
9) Cameron, K. (1986). A study of organizational effectiveness and its predictors. Management
si
Science, 32(1), 87-112.
10) Dalton, T., & Dalton, L. (1988). The politics of measuring public sector performance. Promoting
Productivity in the Public Sector (Macmillan).
11) Federman, M. (2006). Essay: Towards an effect-ive theory of organizational effectiveness.
er
12) McCann, J. (2004). Organizational effectiveness: Changing concepts for changing
environments. Human Resource Planning, 27(1).
13) Mullins, L. J. (2008). Essentials of organizational behaviour: Pearson Education.
14) Pounder, J. (1999). Organizational effectiveness in higher education. Educational Management
iv
16) Osman, N., 2018. A software requirement engineering framework to enhance critical success
factors for erp implementation. International Journal of Computer Applications, 180(10), pp.pp32.
17) Vicedo, P., Gil, H., Oltra-Badenes, R. and Merigó, J.M., 2018, January. Critical Success Factors
on ERP Implementations: A Bibliometric Analysis. In International Conference on Modelling and
Simulation in Management Sciences (pp. 169-181). Springer, Cham.
18) Barth, C. and Koch, S., 2019. Critical success factors in ERP upgrade projects. Industrial
Management & Data Systems.
ity
19) Hentschel, R., Leyh, C. and Baumhauer, T., 2019, January. Critical success factors for the
implementation and adoption of cloud services in SMEs. In Proceedings of the 52nd Hawaii
International Conference on System Sciences.
20) Wolters, J., Eseryel, U.Y. and Eseryel, D., 2018. Identifying the Critical Success Factors for Low
Customized ERP System Implementations in SMEs.
m
1. data centre
2. Cloud
3. Managed service
4. Redundant Arrays of Independent Drives
5. False
(c
Unit - 4: F ea si bi lit y R e port
e
Le ar nin g O b j ect i ve s:
lin
Afte r st ud yin g t h i s c hapt e r, y ou w il l be a ble to:
• Dis c us s t he f e as ib i l ity r ep or t pr ep ar at i on .
• Ex pl a i n th e s y s t em pr op os a l ne g ot i at i o n s tr at e gy .
On
Int rodu ct ion
ty
prac t ic a b l e. T o pu t i t a no t her w ay , t h es e en t erp ris es or bus i nes s es ar e d ea l i n g wi t h
th e c h a ll e ng i n g q ues t i on of l o ng - t er m v i a b i l it y . T h is is t he mos t i m p ort a nt c h a l le n ge
or q ues t io n t ha t a ny b us in es s or e n de av or f ac es . I n th is i ns ta nc e, a f e as i b i l ity
s tu dy is re q u ir e d t o es ta b l is h t h e pr oj ec t's v i ab i l ity an d l o ng - t erm s us t a in a b il i ty . A
fe as ib i l ity s t u dy is a b l ue pr i nt f or d et er m in i n g th e v i a b il i ty of a pr o pos e d
c om m erc i al v en tur e or pr oj ec t.
si
In t h is u ni t w e wi l l s t u dy a bo ut f e as ib i l ity r e por t.
er
4.1.1 Feasibility Report Preparation
iv
A feasibility study is a methodical strategy and examination of a project's long-term viability, taking
into account factors such as marketing, production, and technological challenges, as well as
organizational and management issues and financial implications. In other terms, a feasibility study
is a process of evaluating and assessing a potential project or business. This is a crucial task that
Un
must be completed before any further action can be performed. On the other hand, it influences an
investor's, financier's, or an organization's management's decision or course of action.
Conducting a feasibility study has a number of advantages. A feasibility study identifies the virtues
and demerits of a project, which is one of the key advantages. In actuality, it is a cost-benefit
analysis of a certain activity, project, or commercial venture. As a result, a person can make an
educated decision regarding a certain activity or undertaking. At the same time, a feasibility study
ity
reduced risks by taking decisions without fully knowing the financial, legal, or reputational
consequences to an organization or a firm.As a result, a feasibility study gives you a thorough grasp
of a project or plan. A feasibility study also identifies potential hurdles and problems that may arise
during the execution of the plan or project. Furthermore, a feasibility assessment considers all
essential elements that must be considered during the project or plan's implementation.
m
• Introductory paragraph/Introduction - You must persuade the decision maker to consider any
option. You must first persuade them to read your report. Tell them how your work will benefit them
personally or as an organization.
• Criteria/Constraints - You must clearly define the criteria for the desired outcomes. You will be
able to make practical and rational decisions as a result of this. In your feasibility report, you have
(c
two options for presenting the criteria. To begin, divide the criteria into separate sections. When you
have a lengthy report and need to go into great detail with your explanation, this is the greatest
option. Second, when the criteria become more relevant, you can incorporate them throughout your
report.It's vital to remember, though, that whatever technique you use, the criteria must be
introduced early in the report. It's also crucial to sketch out the restrictions of your proposed
solutions. This demonstrates to the audience that you recognise and accept the fact that no solution
e
is perfect. This will also ensure that the audience takes the best decision possible.
• Method – It is critical to deliver accurate and timely information. You should list the trustworthy
sources you used and the process by which they were obtained (internet,interview, book, etc.). Your
lin
document will lack credibility if you don't use a reputable research strategy or use credible sources.
• Alternative Option Overview – You must highlight the essential elements of each alternative
option. Make sure they're simple to comprehend and presented in a user-friendly format. Remember
that your goal is to empower your audience to make the best decision possible.
On
• Evaluation - The majority of your report should be devoted to evaluating the possibilities using the
criteria you devised. Add graphs, charts, and other visual aids to demonstrate that you've
researched your options and compiled statistics to back up your arguments for why your alternative
is superior to the competition.
• Conclusions - You must state the conclusion that you have reached. What criteria did you use to
weigh the options? Then it's a matter of deciding which option is ideal for your company.
ty
• Recommendations – You must utilize your knowledge and experience to state which choice you
believe should be chosen.
si
Note: Depending on the audience, scenario, mission, and other factors, all seven elements listed
above may or may not need to be included in the feasibility study. Additionally, the pieces do not
have to be in the exact order listed above. The conclusion, in particular, should be mentioned more
than once in the report. It should be summarised at the start of the report, and if the feasibility report
er
is lengthy, it can also be addressed in the middle.
The preliminary analysis' main goal is to screen project ideas before investing a lot of time, effort,
and money into them. There are two types of activities involved.
Un
1. Describe or outline the proposed services, target audiences, and unique qualities of the
services as precisely as possible by answering the following questions:
• Does the practise fill a gap in the market? (For example, multicultural communities or
underserved age groups)
• Does the practise service an existing market where demand exceeds supply?
• Can the practise compete successfully with existing practises due to a "advantageous
situation," such as a better design, price, location, or availability (e.g., balance evaluation and
ity
Taking into account the estimated revenue growth curve, anticipated income must cover direct and
indirect costs. In order to construct a projected income statement, work backward from the
anticipated income to determine the revenue required to create that income.
Services supplied, pricing for services, volume of services, and revenue adjustments are all factors
(c
A thorough market analysis is essential. If the planner is unable to conduct the survey, a third-party
e
agency should be employed. A market survey's main goal is to generate a realistic revenue
forecast.
lin
The following are the primary steps:
• Examine the community's population trends, demographic characteristics, cultural influences, and
On
purchasing power.
• Compare and contrast rival community services to discover their primary strengths and
drawbacks. Pricing, product lines, referral sources, location, promotional activities, quality of
service, consumer loyalty and happiness, and sales are all factors to consider.
• Calculate total volume in the market area and forecast market share.
ty
• Assess market expansion prospects (e.g., receptivity to new/improved services).
si
Step Four: Plan Business Organization and Operations
At this time, the business's organization and operations should be thoroughly designed to establish
the technical feasibility and expenses of startup, fixed investment, and operations. It will take a lot of
er
time and effort to build thorough strategies for:
• Merchandising approaches
• Equipment
iv
The Opening Day Balance Sheet should precisely depict the practice's assets and liabilities at the
ity
It is also necessary to clarify the liabilities that will be incurred as well as the investment that will be
required by the practise.
These factors must be taken into account:
)A
e
and think about it again."
• Compare the Projected Income Statement to the list of desired assets and the Opening Day Balance
lin
Sheet once more. Does the Income Statement reflect reasonable expectations in light of all expenses
and liabilities?
• Assess risk and prepare for the worst-case scenario. Take into account the possibility of significant
changes in the current market, which could cause estimates to shift.
On
Step Seven: Make "Go/No Go" Decision
All of the processes before this one were designed to provide data and analysis for the "go/no go"
decision. A "go" option is appropriate if the study suggests that the firm should provide at least the
specified minimum income and has growth potential. Anything less is a "no go" situation.
ty
• Is there a willingness to make the necessary time, effort, and financial sacrifices?
This will happen after the specifications have been agreed upon. Although a proposal should be a
sales document, it should not appear to be one! Instead, it should provide subtle convincing that the
proposing team is capable of delivering the suggested system in the future. Credibility is its most
Un
crucial feature.
You'll need to form your own team to focus on key elements of the contract because the vendor will
be bringing their strongest team to the table. The members of this team will vary depending on the
)A
size and resources of your company; the table below lists the various emphasis areas and
considerations for each:
e
Request for proposal creation
• Price checklist
lin
• Contract development and review
• Legal terms and requirements
Legal and contracts • Terms and conditions checklist
On
• Contract review and database
ty
• Technology standards
• Project management
Application development
•
•
Build versus buy
Customization efforts si
er
• Budget
• Total cost of acquisition (TCA)
iv
• Relationship
Vendor management • Performance measurement
• IT security policy
• Data privacy
ity
Information security
• Regulatory compliance
m
Make a checklist for your team members using this table. Of course, not every organization has
individuals for each of these emphasis areas; if that's the case, choose the team members who are
most suited to handle numerous roles.
)A
You'll almost certainly spend more than the price mentioned on your favourite software's website, and
suppliers won't give you a detailed look at actual pricing until you ask. Ask inquiries about these
pricing issues ahead of time to go into a negotiation with an accurate cost assessment:
(c
Software Maintenance and support Services and training
e
• Fees: List and net price • Warranty: Length and • Options: Pricing and
expiration time/materials
•
lin
Type: License or subscription
• Options: All coverage • Rates: Blended or role-
• Metric: Per user vs. per types and prices based
month
• Descriptions: Coverage • Methods: On-site, remote,
• Delivery: Cloud or on- details or online
On
premise
• Discounts: Options for • Payment: Timing of
• Integration: Fees for vendor reduced prices payment and travel fees
assistance
ty
si
er
iv
Un
ity
The risks and benefits of your software agreement are described in the terms and conditions (T&Cs).
Because each software supplier has its own set of terminology, it's easier to create your own list of
m
Depending on whether you install the software on your computer or use it through a web browser,
these conditions will change.
)A
Here are some terms and criteria that are common in both types of software deployment:
e
Right to perform audits Clear data privacy and security terms
• Cost of changing hardware • Defined support services
lin
• Bundling and renaming protection • Rights to convert to on-premise
On
The seller will most likely ask about your budgetary constraints, how the software will be paid for,
which executive will authorise the purchase, and who will make the ultimate decision.
This provides the vendor with additional information to help them manipulate the deal in their favour,
but you can ask questions to uncover the vendors' objectives to ensure you have the same edge.
ty
• Do you get paid only on commission or on a salary plus commission basis?
• Do you get bonuses at any point during the year? When is your biggest bonus due?
si
• Are some products and services more highly compensated than others—which ones, and how does
the financial incentive programme work?
er
After you've gathered this information, see if the following elements can help you gain an advantage:
Consider the end of the fiscal year. Do any of your vendors press you to seal a contract as soon as
possible? Sales teams are always aggressive, but near the conclusion of the fiscal year, they should
boost the ante, and so should you.
iv
It's ideal to push software conversations to the end of a fiscal quarter or year to take advantage of the
vendor's urgency to secure a better deal—special pricing and discounts are easier to come by when
the sales team is pressed for time to seal the quarter's or year's final contract.
Un
February Dell
April Infor
)A
May Oracle
June Microsoft
(c
July Cisco
October Broadcom, HPE, Micro Focus
e
November Adobe
lin
Amazon, ASG, Citrix, Google, IBM, Informatica, SAP, SAS,
December
ServiceNow, Software AG, Tableau, Unisys
On
Is your seller a newcomer? Hundreds of tiny startup software providers have sprung up as a result of
the rapid growth of cloud-based software, allowing them to provide more flexible terms and contracts
than their larger enterprise competitors. A more flexible startup vendor can be the ideal match for your
feature requirements and budget.
This firm could also be getting ready to raise money—in this scenario, the vendor will want to boost
customer and revenue before a series fundraising round, giving your company an advantage in
ty
negotiating a better price.
Crunchbase has funding, acquisition, and investor facts that you can use during the negotiation
depending on the size and type of software company.
When determining winners, score the criteria on a scale of 1 to 5, and give key aspects more weight.
For your vendor selections, use as many or as few of these as you need:
iv
Un
• Pricing
o License fees
o Customization and implementation costs
o Maintenance fees
o Training costs
• Required (and nice-to-have) features and functionality
ity
You'll know whether you can afford to walk away from a feasible alternative after assessing
)A
each vendor, reviewing terms and conditions, and comprehending the implications for both the
vendor and your firm.
When negotiations with lower-scoring vendors do not continue in a positive direction, you can
abandon them using your list of needs and viable alternatives. If you have to leave a
negotiation, take some time to regroup with your team:
(c
Each conversation will teach you how to better utilize your research and respond to difficult
e
questions and approaches from vendors.
lin
Check your Understanding
On
advantages. State true or false.
3. A feasibility study also identifies potential hurdles and problems that may arise during the
execution of the plan or project. State true or false.
4. In order to construct a projected income statement, work backward from the anticipated
income to determine the revenue required to create that income. State true or false.
5. A Systems Proposal is typically delivered in the form of a written report and a PowerPoint
presentation. State true or false.
ty
Summary
si
• A feasibility study is a methodical strategy and examination of a project's long-term viability,
taking into account factors such as marketing, production, and technological challenges, as
well as organizational and management issues and financial implications.
• A Systems Proposal is typically delivered in the form of a written report and a PowerPoint
er
presentation. It frequently concludes the project's second phase and points to the next
steps, most notably the Design phase, which should ultimately specify the project's total
expenditures, which are still speculative.Its goal is to persuade the client's decision makers
to move forward with the project and secure their agreement on the best course of action. A
iv
proposal is not the same as a quotation! This will happen after the specifications have been
agreed upon. Although a proposal should be a sales document, it should not appear to be
one! Instead, it should provide subtle convincing that the proposing team is capable of
delivering the suggested system in the future. Credibility is its most crucial feature.
Un
Activity
Glossary
)A
Further Readings
1) Kurt Lewin, “Frontiers in Group Dynamics,” Human Relations, 1947, 1:5–41; and Kurt Lewin,
“Group Decision and Social Change” in E. E. Maccoby, T. M. Newcomb, and E. L. Hartley,
e
eds., Readings in Social Psychology, New York: Holt, Rinehart & Winston, 1958, pp. 197–
211.
2) Christopher Koch, “When Bad Things Happen to Good Projects,” CIO Magazine, December
lin
1, 2004.
3) Altschuld, J. W., & Zheng, H. Y. (1995). Assessing the effectiveness of research
organizations. Evaluation Review, 19(2), 197-216.
4) An, J. Y., Yom, Y. H., & Ruggiero, J. S. (2011). Organizational culture, quality of work life,
and organizational effectiveness in Korean university hospitals. Journal of Transcultural
On
Nursing, 22(1), 22-30.
5) Anderson, J. A. (2000). Explanatory roles of mission and culture: Organizational
effectiveness in Tennessee's community colleges. Unpublished PhD thesis. University of
Mephis.
6) Baker, K., & Branch, K. M. (2002). Concepts underlying organizational effectiveness: Trends
in the organization and management science literature. Management Benchmark Study.
USA: Office of Planning & Analysis, Department of Energy
7) Cameron, K. (1978). Measuring organizational effectiveness in institutions of higher
ty
education. Administrative Science Quarterly, 23, 604-632.
8) Cameron, K. (1981). Domains of organizational effectiveness in colleges and universities.
Academy of Management Journal, 24 (1), 25-47.
9) Cameron, K. (1986). A study of organizational effectiveness and its predictors. Management
si
Science, 32(1), 87-112.
10) Dalton, T., & Dalton, L. (1988). The politics of measuring public sector performance.
Promoting Productivity in the Public Sector (Macmillan).
11) Federman, M. (2006). Essay: Towards an effect-ive theory of organizational effectiveness.
er
12) McCann, J. (2004). Organizational effectiveness: Changing concepts for changing
environments. Human Resource Planning, 27(1).
13) Mullins, L. J. (2008). Essentials of organizational behaviour: Pearson Education.
14) Pounder, J. (1999). Organizational effectiveness in higher education. Educational
iv
16) Osman, N., 2018. A software requirement engineering framework to enhance critical
success factors for erp implementation. International Journal of Computer Applications,
180(10), pp.pp32.
17) Vicedo, P., Gil, H., Oltra-Badenes, R. and Merigó, J.M., 2018, January. Critical Success
Factors on ERP Implementations: A Bibliometric Analysis. In International Conference on
Modelling and Simulation in Management Sciences (pp. 169-181). Springer, Cham.
18) Barth, C. and Koch, S., 2019. Critical success factors in ERP upgrade projects. Industrial
ity
1. feasibility study
2. True
3. True
4. True
5. True
(c
Module IV: System Analysis, Design and Testing
e
Unit 1.1 Understanding Structured Analysis Tools
Learning Objectives:
lin
At the end of this unit, you will be able to:
On
• Explain the meaning of system flow chart, decision tables, decision trees and so on.
1.1.1 Introduction
You've probably heard the phrase "a picture is worth a thousand words." A process model is a visual
representation of how a business system should function. It depicts the processes or activities that
are carried out, as well as how data is exchanged between them. A process model can be used to
document an existing system (i.e., as-is system) or a new system in development (i.e., to-be system),
ty
whether or not it is computerised.
For many years, process models have been a part of structured systems analysis and design
methodologies. With use cases gaining popularity due to their ability to clearly communicate user
si
requirements, you may notice that organisations are putting less focus on process modelling than in
the past. Process models may not offer much to an organization's understanding of the system under
development if it seeks to produce fully clothed use cases like those shown in Figure 4-1. Process
modelling, on the other hand, may be a useful part of the analysis phase deliverables for some firms,
er
particularly those that produce more casual use cases. We've discovered that graphically depicting
the system that will be created in a series of well-organized diagrams is a really effective method.
Keep in mind that our goal is to be able to use a variety of tools and techniques to better understand
and explain what the new system needs to perform before it is built.
iv
Today, a variety of process modelling methodologies are in use. In this unit, we'll look at one of the
most popular methods: data flow diagramming. Data flow diagramming is a method of depicting
business processes and the data that flows between them. In this section, we'll go over the
Un
fundamental syntax rules and show you how to apply them to create simple one-page data flow
diagrams (DFDs). Then we'll go through how to make multipage diagrams that are more complicated.
The name data flow diagram (DFD) implies that it is focused on data, yet this is not the case. The
primary focus is on the processes or actions that are carried out. Data modelling depicts the
organisation of data generated and used by processes. One of the most critical abilities required by
systems analysts is process modelling, particularly the creation of DFDs.
ity
The focus of this unit is on logical process models, which are models that describe processes without
implying how they should be carried out. You won't be able to identify whether a process is
computerised or manual, whether data is collected on paper or via the Internet, or whether it is stored
in a filing cabinet or a huge database by reading a logical process model. These physical features are
defined during the design process, when logical models are developed into physical models, which
m
offer information needed to build the system in the end. Analysts can focus on how the business
should work without being sidetracked by implementation specifics by focusing on logical processes
first.
)A
First, we'll go through how to read DFDs and their basic syntax in this section. The procedure for
creating DFDs is then described, which incorporates information from the use cases as well as extra
requirements acquired from users.
e
you continue reading, take a look at the diagram. How well do you comprehend?
The majority of people in Western societies read schematics from top to bottom, from left to right. As a
lin
result, most analysts try to start the DFD here whenever possible. The "Lawn Chemical Applicator
(LCA)" external entity, which is a rectangle that symbolises individual employees that must request
the chemicals they will use for their lawn care tasks, is the first item on the left side of Figure 5-1.
Three arrows point away from this sign to rounded rectangular symbols. The external entity (LCA)
offers three "bundles" of data to processes that consume the data, as shown by these arrows.
On
Now look at the arrow on the right side of the "Determine Chemical Approval Status" process. The
process must obtain certain information from storage in order to assess if the chemical requested is
approved for use. A data store is the open-ended rectangle labelled "Lawn Chemical Supply," and it
represents a collection of stored data. The "Determine Chemical Approval Status" method finds the
requested chemical and determines if it is an approved or disapproved chemical using an identifier for
the chemical.
ty
Take a closer look at the use case's Major Steps Performed section.
The use case has a number of steps, as you can see. These phases have been arranged into five key
processes on the data flow diagram, each performing one main component of the interactions
si
outlined in the use case. Imagine the LCA specifying the chemical he needs for a work on the DFD
(Figure 5-1) as you follow the arrows starting with "Chemical needed" from the LCA to the "Determine
Chemical Approval Status" process. The system checks up the chemical and sends a message to the
LCA, either confirming that it is an allowed chemical or informing them that it cannot be used.
er
iv
Un
ity
m
)A
(c
e
lin
On
ty
si
er
iv
Un
ity
When a chemical is approved, the system checks up how much of it is accessible and notifies the
LCA. The LCA specifies the quantity he desires. Notice how the use case's "Information for Steps"
section lists the data pieces that each step uses or produces, matching to the inflows and outflows
m
from the process symbols (2.1, 2.2) on the data flow diagram (Figure 5-1).
Examine the flows into and out of each of the remaining three process symbols in the DFD. Try to
figure out what the process is doing based on the data coming in and going out. Examine the Major
)A
Steps Performed and Information for Steps sections of the use case to double-check your
comprehension.
The "Confirm Request" step (2.3), as you surely know, receives the LCA's chemical request
confirmation and produces and stores a new Chemical Request. The system also performs two more
operations, as you can see. By labelling the quantity sought as "reserved," the chemical's available
(c
quantity is changed (and no longer available to another LCA). Finally, the LCA is given the pickup
authorization, and the Chemical Supply Warehouse is informed of the approved pick-up. The flows
from process 2.3 to processes 2.4 and 2.5 show that a process can sometimes pass data directly to
another process.
Although the analyst will have to make some decisions about how much detail to portray in the DFD,
a well-constructed use case makes constructing a data flow diagram very simple. On a DFD, the
e
steps of a use case can be arranged into logical processes. The Major Inputs and Major Outputs
sections of the use case list the origins and destinations of the processes' inflows and outflows,
respectively. The data flows that enter or leave each process on the data flow diagram are shown in
lin
the Information for Steps section, which corresponds to the data flows that enter or leave each
process on the data flow diagram.
Now that you've seen a DFD, we'll go over the DFD language, which consists of a collection of
On
symbols, naming standards, and syntactic rules. Processes, data flows, data storage, and external
entities are the four symbols in the DFD language, each of which is represented by a separate
graphic symbol. There are two popular symbol styles: one created by Chris Gane and Trish Sarson,
and the other by Tom DeMarco and Ed Yourdon2 (Figure 5-2). The Gane and Sarson style of
symbols is used by some organisations, whereas the DeMarco/Yourdon style is used by others.
Process
ty
A process is a set of activities or functions that are carried out for a specified business purpose.
Processes can be either manual or automated. Every process should be titled with a verb at the
beginning and a noun at the conclusion (for example, "Determine request quantity"). Short names
si
should have enough information to allow the reader to grasp exactly what they perform. Because
each process usually only does one thing, most system analysts avoid using the word "and" in
process names because it implies that the process does multiple things. Furthermore, each process
must have at least one input data flow and one output data flow.
er
The essential aspects of a process are depicted in Figure 5-2, along with how they are typically
named in CASE tools. Every process has its own unique identifier, name, and description, which are
all recorded in the CASE repository. The phases and features of the processes are described clearly
and accurately in descriptions, which are then used to guide programmers who need to computerise
iv
the operations (or the writers of policy manuals for non computerised processes). As additional
information about the process is gained throughout the analysis phase, the process descriptions grow
more complex. Many process descriptions consist of basic text statements that describe what
happens.
Un
ity
m
)A
(c
e
lin
On
ty
si
er
iv
More formal strategies, such as structured English, decision tables, or decision trees, are used in
more sophisticated procedures, as mentioned in a subsequent section.
Un
Data Flow
A data flow is a logical grouping of numerous pieces of information (e.g., quantity available) or a
single piece of data (e.g., quantity available) (e.g., new chemical request). A noun should be used to
name each data flow. The data elements contained in a data flow are listed in the flow's description.
The data pieces in the pick-up notification data flow, for example, could include the LCA name,
chemical, and amount required.
ity
The glue that ties the processes together is data flows. Every data flow has one end that comes from
or goes to a process, with the arrow indicating the direction of flow into or out of the process. Data
flows explain what goes into each operation and what it creates as outputs. Every process must
generate at least one output data flow, because without one, the process will be rendered useless.
Similarly, any process has at least one input data flow since producing an output without any input is
m
Data Store
)A
A data store is a collection of data that is kept in some form of storage (which is determined later
when creating the physical model). Every data storage is given a word and a description, as well as
an identifying number. Data stores serve as the foundation for the data model and serve as the
primary link between the process and data models.
Data flows going out of a data storage show that the data store has been accessed. Process 2.1
(c
(Determine Chemical Approval Status) receives the Chemical Approval Status data flow from the
Lawn Chemicals Supply data store, as shown in Figure 5-1. The Quantity Available data flow is also
retrieved from the Lawn Chemicals Supply data storage by Process 2.2 (Determine Request
Quantity). When data flows into a data store, it means that data is being added to the data store.
Process 2.3, for example, populates the Chemical Requests data store with a New Chemical Request
data flow. Finally, data flows into and out of a data store indicate that information in the data store has
e
been modified (for example, by retrieving data from a data store, modifying it, and restoring it).
Process 2.4 (Update Available Chemical Quantity), as shown in Figure 5-1, retrieves the current
reserved quantity from the Lawn Chemical Supply data store, updates it, and publishes the new data
lin
back into the data store.
Unless they are produced and maintained by another information system or on a different page of the
DFD, all data stores must have at least one input data flow (otherwise they will never have any data).
On some pages of the DFD, they also have at least one output data flow. (Why save data if you're
On
never going to utilise it?) When a single process both stores and receives data from a data store, it's
tempting to draw a single data flow with an arrow on both ends. This practise, however, is erroneous.
Always show the data flow that saves data and the data flow that retrieves data as two independent
data flows.
External Entity
A person, organisation, organisational unit, or system that is external to the system but interacts with
ty
it is referred to as an external entity (e.g., customer, clearinghouse, government organization,
accounting system). The external entity is usually the same as the principal player in the use case.
External entities deliver data to or receive data from the system, and they also serve to define the
system's boundaries. There is a name and a description for every external entity. The most important
si
thing to understand about an external entity is that it is not a part of the organisation, rather it is
external to the system. External entities are those who use the information from the system to execute
other activities or who decide what information goes into the system (e.g., managers, staff ).
er
1.1.4 Creating the Context Diagrams
The context diagram is used to determine the context and limits of the system to be modelled, such
as what is inside and outside the system and how the system interacts with these other entities.
iv
A context diagram, also known as a level 0 data-flow diagram, is used to describe and illustrate the
software system's boundaries. It locates information flows between the system and external entities.
The complete software system is shown as a single process in this diagram.
Un
Below is a proposed context diagram for the Video-Rental LTD case study.
ity
m
Drawing and analysing the context diagram to develop the analytical framework unavoidably leads to
some first discussions with users about problems with the present system and the specific
)A
requirements for the new system. These, as well as any special system needs established in prior
investigations, are formally documented.
After the framework has been agreed upon, a full examination of the current system must be planned.
This entails figuring out how each of the areas covered by the scope will be explored. This could be
accomplished by user interviews, the distribution of questionnaires to users or clients, the examination
(c
of existing system documentation and procedures, observation, and so forth. The investigation's key
users are identified, and their precise duties are agreed upon.
Putting together a context diagram
The following must be identified in order to create the context diagram and agree on system scope:
e
• external entities
lin
• data-flows
• Identify data-flows by making a list of the system's primary documents and information flows,
such as forms, papers, reference material, and other structured and unstructured data
On
(emails, telephone conversations, information from external systems, etc.).
• Identify external entities by identifying data-flow sources and recipients that are not part of the
investigation system. External entities may frequently be actors in any use case models
you've produced.
• Create a process box that represents the entire system and label it.
• Outside of the process box, draw and label the external entities.
• Data-flows between external entities and the system box should be added. Documents and
ty
other packets of information that pass wholly within the system should be ignored from the
perspective of the context diagram — they are hidden within the process box at this level.
This system boundary, as well as the specifics indicated in the context diagram, should be reviewed
si
(and amended if required) with your clients until an agreement is reached.
The areas for research will be identified when the system boundary and scope have been defined,
and acceptable procedures for investigating each area will need to be determined.
er
1.1.5 Creating the level 0 Data Flow Diagrams
You assemble the DFD fragments (one for each of the primary use cases) into a single DFD drawing,
which becomes the level 0 DFD. There are no specific layout rules for DFDs, as previously stated.
iv
Most systems analysts try to start in the upper left corner of the diagram with the most recent process
and work their way down from top to bottom, left to right (e.g., Figure 5-1). Most analysts aim to
minimise the amount of times data flow lines cross or guarantee that when they do, they do so at right
angles to avoid misunderstanding. (Many add a small "hump" to one line to indicate that one data flow
Un
jumps over the other without touching it.) It's difficult to reduce the number of data flows that cross.
The cornerstone of excellent DFD design is iteration. Even the most seasoned analysts rarely sketch
a DFD precisely the first time around. They usually draw it once to understand the pattern of
processes, data flows, data stores, and external entities, and then they draw it again on a new sheet
of paper (or in a new file) to make it easier to understand and limit the number of data flows that
cross. A DFD is frequently redrawn before it is completed.
ity
As explained previously, context diagrams (level 0 DFDs) are diagrams where the whole system is
represented as a single process. A level 1 DFD lists all of the major sub-processes that make up the
entire system. A level 1 DFD can be thought of as a "exploded perspective" of the context diagram.
m
The following is a possible level 1 DFD for the Video-Rental LTD case study:
)A
(c
e
lin
On
ty
External entities have been put on this diagram, but they are outside of the rectangle that symbolises
the diagram's boundary (i.e., the system boundary). It's not necessary to show external entities on
level 1 (or below) DFDs all of the time, although it can help with clarity and understanding.
si
We can see that there are a lot of data stores and data-flows between processes and data stores on
this level 1 DFD.
er
It's worth noting that this level 1 diagram and the level 0 context diagram both show the identical data
flows to and from external entities. When a process is expanded to a lower level, the lower level
diagram must include all of the same data flows into and out of the upper level process.
Before attempting to construct the level 1 DFD, develop a context diagram if one does not exist (or
construct the context diagram and level 1 DFD simultaneously).
Un
To assist in the building of Level 1 DFD, the following procedures are suggested:
Processes should be identified. A process must receive each data flow into the system. Examine the
documentation for the system and speak with the users for each data-flow into the system to
determine a credible system process that receives the data-flow. At least one output data-flow is
required for each process. A process must have sent each system output data-flow; identify the
processes that send each system output.
ity
Determine where documents and data need to be stored within the system to identify data stores. To
the diagram, add the data storage and label them with their local names or descriptions.
m
Within the system, add data-flows between processes and data stores. There must be at least one
input data-flow and one output data-flow for each data store (otherwise data may be stored, and
never used, or a store of data must have come from nowhere). Ascertain that each data storage has
data-flows for input and output to system activities. Almost all processes are linked to at least one
)A
data store.
Examine the diagram. There should be an input and an output for each procedure. There should be
an input and an output for each data store. Examine the system's details to determine if any
processes appear to be occurring for no apparent reason (i.e., some "trigger" data-flow that would
cause the process to occur is missing).
(c
e
single diagram, so if you have a set of levelled data-flow diagrams, you'll need to run these tests for
each one.
lin
1. Is every data-flow associated with a process at the start or end of the arrow?
On
4. Is every process called logically (no phrases like "process" or "handle"), with an action and the
object of the action? (Do something to something is the template.)
5. Does every data store have a plural name for the sort of data it stores?
6. Do all instances of data stores and external entities that appear several times on one diagram have
a "diagonal" line?
ty
7. Are there any data flows that cross each other? If this is the case, try to avoid the crossing by
adding more duplicate external entities or data storage.
This second series of questions focuses on levelling and should be addressed to the entire collection
si
of diagrams.
1. Are all of the diagrams balanced? Are the inputs and outputs of the process identical to the inputs
and outputs on the extended, lower level diagram when a diagram expands a process to a higher
er
level?
2. Do both the context and level one diagrams show all foreign entities?
3. Have you numbered all of the processes and data stores correctly?
iv
All data-flow diagrams are meant to help software engineers and their clients communicate. A chaotic
or convoluted data-flow model will impede communication just as much as a long-winded text
Un
description, even if it is factual and accurate. To avoid this, repaint the diagrams anytime they become
cluttered or have multiple corrections as they evolve. A simple reorganisation of the components may
be all that is required to significantly improve a diagram.
A flow chart is a graphical or symbolic representation of a process that was first presented by Frank
Gilberth in 1921. Previously, they were known as "Process Flow Charts." Each phase in the process
ity
is represented by a different symbol, which is accompanied by a brief description of the step. The flow
chart icons are connected by arrows that indicate the direction of the process flow.
m
)A
(c
e
lin
On
ty
si
er
iv
Un
ity
m
)A
To assist in the creation of ERDs, a CASE tool is employed. A data dictionary is part of any CASE
tool, and it's where the analyst goes to define or seek up information about the entities,
characteristics, and relationships on the ERD. Even Visio 2010, which is largely recognised as a
drawing programme, includes some basic data dictionary features. Figures 6-6, 6-7, and 6-8 show
common data dictionary entries for an entity, an attribute, and a relationship; note the types of
information captured by the data dictionary for each element.
e
The information in the data dictionary is referred to as metadata, which is data about data. Metadata
is anything that specifies an entity, attribute, or relationship, such as entity names, attribute
lin
descriptions, and relationship cardinality, and it is captured to help designers and users better
understand the system they are constructing. Figure 6-9 shows a list of common metadata contained
in a data dictionary. It's worth noting that metadata can both describe an ERD element (such as entity
name) and provide information to the project team (like the user contact, the analyst contact, and
special notes)
On
ty
si
er
iv
The data dictionary stores metadata so that it may be shared and accessed by developers and users
at any time during the SDLC. The data dictionary helps you to keep track of the common pieces of
information about your elements in one location and make that information available to several areas
of a project. The data characteristics in a data model, for example, appear as elements of data stores
Un
and data flows in process models, as well as fields on an input screen in the user interface.
ity
m
)A
(c
e
lin
On
ty
si
er
iv
Un
ity
m
)A
When you make a modification to the data dictionary, it has an impact on all of the project's relevant
parts.
When metadata is complete, clear, and shared, it can be utilised to connect the many elements of the
analysis phase, resulting in a far better design. As the project progresses through the SDLC, it
becomes progressively more thorough.
(c
Let us learn about different Structured Analysis tools with the aid of a question.
e
lin
On
Decision Trees
ty
specifics of user dialogues. It aids in demonstrating the path that can be taken in a design as a result
of a user action or decision. As a result, it aids the designer in visualising how the user would navigate
the design to achieve a desired destination. In simple terms, a decision tree depicts the control flow
that will be implemented in the computer programme.
si
er
iv
Un
ity
m
)A
Decision Tables are a type of non-procedural decision rule definition. They've been widely employed
in the systematic development of information systems. They've also been utilised for documenting
(c
and communicating complex decision-making processes. A decision table is a set of conditions and
actions that define a logical procedure. As a result, it's a tool for representing complex processing
decisions in a concise manner.
Components of decision table:
• Condition Stub lists all the conditions to be verified in the decision table.
e
• The Action Stub lays forth all of the steps that must be taken to meet the condition.
lin
• Answers to queries posed in the condition stub quadrant are provided by Condition Entry.
• Action Entry is the appropriate action taken as a result of the responses to the conditions in the
condition entry quadrant.
On
ty
si
er
Rules
e
conditions in this form of decision table is higher.
o The question is written in the condition stub, and the answer is written in the decision table's
lin
condition entry portion.
On
ty
si
• Extended Entry Decision Table (EEDT) o It can have several answers depending on the type of
question asked, which is extended into the decision table's condition entry section. It should be noted
er
that each question is created by combining the statement from the condition stub with the statement
from the condition entry of the EEDT decision table.
• MEDT - Mixed Entrance Decision Table o The identical question that is dealt with in LEDT and
EEDT can also be shown in a different manner, with one query extending to the entry portion and the
ity
other being limited to the condition stub. In the condition entry, this table can have 'YES' or 'NO,' as
well as different answers to the question in the condition stub.
o It is a combination of LEDT and EEDT. As a result, the manner in which a decision table is
expressed is determined by the problem, available software system, and other factors.
m
Structured English is analogous to a computer language like Pascal, which, unlike other programming
e
languages, does not have rigorous grammar constraints. The goal is to provide a detailed description
of a procedure in plain English that the user can understand. In the context of structured English, the
lin
following conventions are followed when describing a structured English process:
On
(LT stands for less than, LE stands for less than equal to, GT stands for greater than, GE stands for
greater than equal To, EQ stands for equal to, and NE stands for not equal to)
The important thing to remember is to keep individual procedures simple enough that anyone who
ty
isn't a computer expert can read and comprehend them.
si
er
iv
1. A __________ is a set of activities or functions that are carried out for a specified business
purpose.
3. A context diagram, also known as a_______________ , is used to describe and illustrate the
software system's boundaries.
4. A flow chart is a graphical or symbolic representation of a process that was first presented by
)A
____________________.
5. The data dictionary stores ___________ so that it may be shared and accessed by developers and
users at any time during the SDLC.
e
Different elements of data flow diagrams are: process, data flow, data store and external
entity.
• The context diagram is used to determine the context and limits of the system to be modelled,
lin
such as what is inside and outside the system and how the system interacts with these other
entities.
• A context diagram, also known as a level 0 data-flow diagram, is used to describe and
illustrate the software system's boundaries. It locates information flows between the system
and external entities.
•
On
A level 1 DFD lists all of the major sub-processes that make up the entire system. A level 1
DFD can be thought of as a "exploded perspective" of the context diagram.
• A flow chart is a graphical or symbolic representation of a process that was first presented by
Frank Gilberth in 1921. Previously, they were known as "Process Flow Charts." Each phase
in the process is represented by a different symbol, which is accompanied by a brief
description of the step. The flow chart icons are connected by arrows that indicate the
direction of the process flow.
•
ty
To assist in the creation of ERDs, a CASE tool is employed. A data dictionary is part of any
CASE tool, and it's where the analyst goes to define or seek up information about the entities,
characteristics, and relationships on the ERD.
• Metadata is anything that specifies an entity, attribute, or relationship, such as entity names,
attribute descriptions, and relationship cardinality, and it is captured to help designers and
•
si
users better understand the system they are constructing.
Decision Trees provides a non-technical person with an easy-to-understand graphical
depiction of decision reasoning.
er
Decision Tables are a type of non-procedural decision rule definition. They've been widely
employed in the systematic development of information systems. They've also been utilised
for documenting and communicating complex decision-making processes. A decision table is
a set of conditions and actions that define a logical procedure. As a result, it's a tool for
representing complex processing decisions in a concise manner.
iv
• Structured English is analogous to a computer language like Pascal, which, unlike other
programming languages, does not have rigorous grammar constraints. The goal is to provide
a detailed description of a procedure in plain English that the user can understand.
Un
Activity
Glossary
• Data flow diagram- A data-flow diagram is a way of representing a flow of data through a
process or a system
• Context diagram- Context diagrams show the interactions between a system and other actors
(external factors) with which the system is designed to interface
)A
• Data flow- Dataflow is the movement of data through a system comprised of software,
hardware or a combination of both
• Data store- A data store is a repository for persistently storing and managing collections of
data which include not just repositories like databases, but also simpler store types such as
simple files, emails etc
• Entity- a thing with distinct and independent existence
(c
e
manipulation of the database.
• Meta data - a set of data that describes and gives information about other data.
lin
Questions and Exercises
1. What you do understand by the term data flow diagrams? Explain in detail.
On
2. What are the different elements of data flow diagrams?
ty
a) decision tables
b) decision trees
si
c) data dictionary and meta data
er
Further Readings
Author: Goyal A
Publisher: Wiley
ity
1. process
2. data store
m
5. metadata
6. Condition Stub
(c
Unit 2.1 System Design
Learning Objectives:
e
After studying this chapter, you will be able to:
lin
• Analyze the transition from requirement to design
• Understand system acquisition strategies
• Comprehend entity relationship model
• Understand the different types of system design
•
On
Explain the factors affecting system complexity
2.1.1 Introduction
The operation of the new system is decided during the design process. As the development team
creates the system requirements, many actions will be involved. This unit outlines the actions involved
in the design phase, which culminate in the preparation of the system specification. We also go over
three different acquisition tactics that the development team can use to get the system.
ty
2.1.2 Transition from Requirement to Design
The goal of the analysis phase is to determine what the company need. The design phase's goal is to
si
figure out how to construct it. System design is the process of determining the overall system
architecture—a collection of physical processing components, hardware, software, people, and their
interactions—that will meet the system's key needs.
er
The project team turns the business needs for the system into system requirements, which describe
the technical specifications for developing the system, during the first phase of design. System
requirements are expressed through a set of design documents and physical process and data
models, as opposed to business needs, which are stated in the requirements definition and presented
through use cases and logical process and data models. The blueprint for the new system is made up
iv
It's important to remember that our focus is on creating a technical system blueprint that meets the
system's needs. However, altered work flows and procedures that users will follow when utilising the
Un
new system will be a significant part of the final, full information system. At this stage of the project,
business analysts often focus on the design of these components, while systems analysts
concentrate on more technical design features. User documentation and training materials will
eventually describe the new business processes and procedures.
There are several actions in the design process that lead to the system blueprint. (For a visual
representation, see Figure 7-1.) Examining multiple system acquisition strategies to determine which
ity
will be used to meet the system's needs is an important first step in the design phase. System
development can be done from the ground up, purchased and customised, or outsourced to others,
and the project team must weigh the pros and cons of each option. The design tasks undertaken
throughout the rest of the phase are influenced by the decision to make, buy, or outsource.
m
)A
(c
e
lin
On
ty
si
During the analysis, the project team carefully evaluates the nonfunctional business needs that were
er
discovered. The system requirements that drive the design of the system's architecture are influenced
by nonfunctional business needs. Operational, performance, security, cultural, and political factors all
play a role in the "how" of a system. The project team, for example, must plan for the new system's
performance, including how quickly it will work, its capacity, and its availability and reliability. The
iv
team must establish a secure system by defining access controls and determining the requirement for
encryption, authentication, and virus protection. The nonfunctional criteria are rewritten as system
requirements in the architectural design document.
Un
Simultaneously, decisions are made about the hardware and software that will be purchased to
support the new system's architecture. The hardware and software specification, which is a document
that outlines what hardware and software are required to enable the new application, documents
these decisions. The project team uses the hardware and software specification to communicate the
hardware and software needs to the appropriate people. The purchasing department or the area in
the organisation that handles capital procurement is sometimes in charge of the actual acquisition of
hardware and software; however, the purchasing department or the area in the organisation that
ity
handles capital procurement is sometimes in charge of the actual acquisition of hardware and
software.
Interactions between the user and the system must also be planned. The system's inputs and outputs
will be designed, as well as a plan or roadmap for navigating the system's features. Techniques that
aid the project team in designing a system that satisfies the needs of its users and is enjoyable to use,
m
such as storyboarding and prototyping. The interface design is a design document that communicates
design decisions made about the interface.
The logical process model describes the processes that underpin the system's functionality. These
)A
logical DFDs are then transformed into physical DFDs, which detail the system's physical design
decisions. As technological decisions are made, the CASE repository entries are updated to reflect
them. Program specifications are created to offer final design details and ensure that programmers
have enough information to efficiently develop the correct system. All of the information regarding the
new system's programmes is contained in the programme design document.
(c
Prior to implementation, the data component of the system, as specified in the logical data model,
must also be designed. The construction of the physical data model, modifications to the CASE
repository, and how to update the CRUD matrix to ensure that the process and data models are
consistent. Data storage design decisions are documented in the data storage design document.
The design phase's several operations are intricately linked. Analysts frequently switch back and forth
between these processes, as they do with the steps in the analysis phase. Prototyping in the interface
e
design phase, for example, frequently reveals new information that is required in the system,
necessitating a revision of the physical DFDs or ERDs. If the project team decides to switch to a
system that distributes all processing, a system that was created for an organisation with centralised
lin
systems may require significant hardware and software investments.
On
ty
si
er
iv
Un
The project team generates the final deliverable for the phase, known as the system specification, at
the end of the design phase. Physical process models, physical data models, architectural design,
hardware and software specification, interface design, data storage design, and programme design
are all contained in this paper. The system definition, taken as a whole, specifies exactly what system
the project team will develop throughout the SDLC's implementation phase. The content of the system
ity
We have carefully avoided committing ourselves to a certain method of attaining the new system in
the units assigned to the SDLC's analysis phase. We've emphasised that during the analysis phase,
m
the team should concentrate on identifying the system's logical requirements, deferring the question
of how the system should be obtained until the design phase.
Until now, we've taken it for granted that the project team will design, build, and deploy the system.
)A
This isn't a completely reasonable assumption. In many projects, the team may realise that some or
all of the new system's software will be purchased from a third party. Some companies have adopted
software acquisition strategies that substantially favour purchased software. This section explains why
this decision is justified for a variety of reasons. The work done in the analysis phase, particularly the
tools and techniques used to establish, define, and explain the business and user requirements, is still
critical to the project's success, in our opinion. Before looking for a product that fits us perfectly, we
(c
must first figure out what we need. Otherwise, we risk having a software vendor tell us what we need,
resulting in software that does not meet our real-world business and user needs.
However, there are three main approaches to approach the design of a new system: (1) create a
custom application in-house; (2) purchase a packaged system and (potentially) customise it; or (3)
e
have the system built or provided by an external vendor, developer, or service provider. Each of these
options has its own set of advantages and disadvantages, and each is better suited to certain
scenarios. There may be clear project characteristics that point to the best acquisition method.
lin
Personalized Development
Many project teams believe that custom development, or creating a new system from the ground up,
is the best way to go. For starters, teams have complete control over the system's appearance and
functionality. Let's take a look at the Tune Source purchase process. The project may require a costly,
On
highly specialised application if the organisation wants a Web-based component that is tightly
integrated with its existing CD sales system. Tune Source could, on the other hand, have a technical
environment in which all information systems are designed using standard technologies and interface
designs, making them consistent and easier to maintain and support. In both circumstances, building
a new system from the ground up to fulfill these extremely specialised requirements might be very
beneficial.
ty
In certain cases, the difficulties that the new system is addressing are so substantial and demanding
that they require serious systems engineering to solve. In certain circumstances, the developers are
unable to discover a packaged solution capable of satisfying the project criteria, leaving only a
bespoke development project as a viable option.
si
Custom development also allows developers to handle business difficulties in a more flexible and
innovative manner. The Web interface that accepts client digital music sales could be a key strategic
enabler for Tune Source. The corporation may wish to use the system's data to better understand its
er
clients who buy digital music over the Internet, and it may want the freedom to evolve the system to
include data-mining tools and geographic information systems for marketing research. It would be
easier to modify a custom programme to include components that take advantage of existing
technology that can support such strategic endeavours.
iv
Building a system in-house also improves the company's technical and functional knowledge.
Developers gain a greater grasp of the business when they interact with business users, and they are
better equipped to connect information systems with strategies and needs. These same developers
are climbing the technological learning curve, making future projects that use similar technologies
Un
much easier.
Custom application development, on the other hand, necessitates a focused effort involving long
hours and hard work. Many businesses already have an overburdened development team. The staff
just does not have time for another project due to massive backlogs of system requests. In order for
the project to move forward successfully, a number of skills—technical, interpersonal, functional,
project management, modeling—must be in place. IT experts, especially those with advanced
ity
Building a system from the ground up comes with a lot of risks, and there's no certainty that the
project will succeed. Developers may be drawn away to work on other projects, technological issues
may create delays, and business customers may become frustrated as the deadline lengthens.
m
Packaged Software
Since it makes little sense to recreate the wheel for many business needs, many firms opt to
purchase pre-written packaged software rather than developing their own custom solution. Indeed,
)A
thousands of commercially available software programmes have previously been produced to suit a
wide range of objectives. Consider your own need for a word processor: have you ever considered
writing your own software? That would be ridiculous, given the abundance of competent software
products available at reasonable prices.
Similarly, most businesses have needs, such as payroll or accounts receivable, that bundled software
(c
can easily meet. Buying programmes that have already been written, tested, and proved can be
considerably more efficient, and a packaged system can be purchased and installed much faster than
a custom system. Furthermore, packaged systems incorporate the skills and experience of the
software's creator.
e
Consider the requirements Tune Source will have for its Digital Music Download system. One
necessity is that the purchased tunes be delivered to the customer via the Internet in an easy, quick,
lin
and flexible manner. There are server-side download management software applications available
that are aimed to optimise file download delivery. Some of these items are free, and others include
these tools as part of a larger shopping-cart capability. As it analyses alternatives for the Digital Music
Download system, Tune Source will undoubtedly have to evaluate this type of possibility.
Small single-function tools, such as the server-side download manager, to large all-encompassing
On
systems, such as enterprise resource planning (ERP) solutions that are installed to automate a whole
corporation, are all examples of packaged software. ERP system implementation is a common
procedure in which huge corporations spend millions of dollars to install software from companies like
SAP, Oracle, and Infor, and then adjust their operations accordingly. ERP software is more difficult to
deploy than small application packages since the benefits are more difficult to achieve and the
difficulties are more serious.
ty
One issue is that firms that use packaged systems must accept the capabilities that the system
provides, which is rarely flawless. If the packaged system has a vast scope, its adoption could result
in a significant shift in the company's operations. Allowing technology to drive the business might be a
risky move.
si
Most packaged apps allow for some modification or system parameter manipulation to change how
particular features work. For example, the package may include a feature that allows you to submit
company information or a logo, which would subsequently appear on input forms. To support the
er
accounting practises in different organisations, an accounting software package could offer a variety
of ways to handle cash flow or inventory control. If the level of customization is insufficient and the
software package contains a few features that do not function as expected, the project team can
devise a workaround. A custom-built add-on programme that interfaces with the bundled application
to fulfil particular demands is a workaround. It can be a convenient approach to add functionality that
iv
isn't included in the programme package. Workarounds, on the other hand, should only be used as a
last resort for a variety of reasons. First, because the vendor who provided the packaged software
does not offer workarounds, changes to the main system may render the workaround worthless. In
Un
addition, if difficulties develop, vendors are prone to blaming the workaround and refusing to provide
help.
Although picking a packaged software system is easier than custom development, it can still benefit
from following a rigorous process, much like when developing a custom application. The software
package should be chosen based on the detailed requirements discovered throughout the
investigation.
ity
Systems integration is the process of merging packaged software, existing legacy systems, and new
software designed to integrate them to create new systems. Many consulting organisations specialise
in systems integration, therefore it's not uncommon for businesses to choose packaged software and
then hire a consulting firm to integrate the various packages.
Finding solutions to integrate the data supplied by various packages and legacy systems is a major
m
difficulty in systems integration. Integration frequently entails reformatting data produced by one
package or system for use in another programme or system. The project team begins by reviewing
the data generated by and required by the various packages and systems, as well as the
transformations that must take place in order to move the data from one to the other. In many
)A
circumstances, this entails deceiving the various packages or systems into believing that the data was
generated by an existing programme module that the package or system expects to generate the
data, rather than the new package or system that is being integrated.
Tune Source, for example, may seek to combine its new Digital Music Download system with its
existing Web-based CD sales system. Customers can buy CDs over the Internet, and the system
(c
integrates with Tune Source's accounting and inventory management systems. The new Digital Music
Download system will not require interaction with the inventory management system, but it will need
to communicate with the accounting system and may be able to share consumer information with the
CD sales system. As it examines its development possibilities, the Digital Music Download project
team will need to address these areas of system integration.
e
Outsourcing
lin
Outsourcing, which entails contracting an external vendor, developer, or service provider to design or
provide the system, is the acquisition option that requires the fewest in-house resources. In recent
years, outsourcing has grown in popularity, with both domestic and non-domestic (offshore) service
providers available.
Outsourcing has expanded to encompass a wide range of methods for obtaining IT services and
On
products. Application service providers (ASPs) are outsourcing companies that provide software
applications and/or software-related services across wide area networks or the Internet. The ASP
hosts and administers a software programme, as well as owns, runs, and maintains the servers that
run the application, under this method of receiving software. The ASP also hires the individuals who
will keep the application running.
Organizations that want to use a software programme hire an ASP, who then makes it available to
ty
them across a wide area network or the Internet, either on client computers or through a browser. The
ASP bills the consumer either on a per-use basis or on a monthly or annual charge basis for the
application.
The term "Software as a Service" (SaaS) refers to a popular expansion of the ASP paradigm. This
si
term refers to circumstances in which SaaS vendors develop and manage their own software rather
than managing and hosting the software of a third-party independent software vendor (the more
traditional ASP model). Salesforce.com was one of the first companies to offer a SaaS version of its
er
customer relationship management (CRM) software, and it helped popularise the concept of web-
based software that just requires a browser to utilise.
There are numerous application service providers to choose from. Some companies provide
enterprise-wide high-end business apps. Some are more interested in serving small and medium-
iv
sized businesses. Some ASPs are focused on specific business needs (such as CRM), while others
are focused on specific industries (e.g., healthcare).
Using an application service provider to get access to a software package provides a lot of benefits.
Un
There is a modest entrance cost and, in most circumstances, a very quick setup time. For all save the
most frequent users of the service, the pay-as-you-go model is generally substantially less expensive.
IT staffing costs can be cut, and specialist IT infrastructure purchases can typically be avoided.
There are other companies that will design a custom system on the customer's behalf. Having others
design your system can be really beneficial. They may have more technological experience or
resources, such as experienced programmers. Many businesses enter into outsourcing agreements
ity
to save money, while others see it as an opportunity to add value to their operations. Tune Source, for
example, may elect to let a Web service provider provide commercial services for them rather than
writing a programme to manage the purchasing process or purchasing a pre-existing package.
Outsourcing can be a good solution for a new system for a variety of reasons; however, it does not
come without price. You risk compromising secret information or losing control over future
m
development if you delegate the design of a new system to someone else. The abilities that could be
learnt from the project are not benefiting in-house personnel; instead, the expertise is transferred to
an outside organisation. Important abilities can, in the end, walk out the door at the end of a contract.
)A
Most risks can be mitigated by outsourcing, but two are particularly critical. First, thoroughly examine
the project's requirements—you should never outsource what you don't understand. If you've done
your homework and done your research, you should have a good idea of what you need. Second,
pick a vendor, developer, or service that has experience with the type of system and technology your
system requires.
(c
There are three basic types of contracts that can be used to manage an outsourcing agreement.
Because you agree to pay for whatever time and expenses are required to complete the project, a
time and arrangements agreement is incredibly flexible. This arrangement, of course, could result in a
big bill that exceeds original predictions. This arrangement works best when both you and the
outsourcer are unsure about how long it will take to complete the task.
e
With a fixed-price contract, you'll spend no more than you expected because the outsourcer will have
to bear any expenditures that exceed the agreed-upon price. Outsourcers are meticulous about
lin
specifying needs in advance, and there is minimal room for adjustment.
The value-added contract, in which the outsourcer receives a portion of the advantages of the
completed system, is gaining popularity. In this situation, there is very little danger, but you should
expect to share the wealth once the system is in place.
On
Fair contracts are an art form because they require a delicate balance of flexibility and clearly
specified parameters. Because needs vary over time, you don't want the contract to be too explicit
and restrictive, preventing changes. Consider how quickly technology, such as the World Wide Web,
evolves. It's impossible to predict how a project will develop over time. Short-term contracts allow for
reevaluation if needs alter or if partnerships aren't working out as planned for both sides. The
relationship with the outsourcer should be considered as a partnership in which both parties profit and
communicate openly in all instances.
ty
si
er
It takes a full-time job to manage an outsourcing relationship. As a result, someone must be
iv
appointed full-time to oversee the outsourcer, and that person's level should be adequate for the job's
size. (A high-level executive should handle a multimillion-dollar outsourcing project.) Progress should
be tracked and measured against defined goals throughout the relationship. If you decide to
outsource your design work, make careful to gather more information. Some outsourcing rules are
Un
Each of the aforementioned system acquisition tactics has its own set of advantages and
ity
disadvantages, and no one strategy is necessarily superior to the others. As a result, it's critical to
grasp the benefits and drawbacks of each method, as well as when to employ them. The project
characteristics that influence acquisition approach selection are summarised in Figure 7-4.
Business Requirement
m
It is usually appropriate to choose a packaged software solution if the business need for the system is
common and technological solutions already exist in the marketplace that can meet the system
requirements. Packaged systems are a suitable option for common business requirements. Because
of the ubiquitous availability and utility of packaged software, many larger organisations have
)A
developed a recommended list of packaged solutions for use across the board. The organisation is
able to ensure consistency across organisational units, streamline decision-making, and ultimately
reduce costs by limiting the selection of software packages from a list of standard options.
Packaged software, on the other hand, isn't appropriate for every situation. When the business need
is unique, when there are particularly difficult or demanding requirements that cannot be met with a
(c
package, or when the organisation is unable to change quickly enough to adapt to the way of doing
business embodied in a software package, a custom solution should be considered.
Outsourcing can help a corporation with custom development initiatives as well as software
acquisition. The specialty and knowledge of an outsourcing firm can be quite helpful. Because
e
outsourcing involves bringing in a third party into the development process, it is typically done when a
business need isn't a crucial part of the company's strategy. If the business necessity is critical to the
firm's strategy, it's usually best if the company can keep complete control of the project.
lin
On
ty
si
er
Many companies are employing, or considering using, offshore outsourcing to "export" IT-related work
to nations with lower labour costs. Offshore IT outsourcing is used by two-thirds of organisations on
the InformationWeek 500 list of business technology pioneers. Although good quality IT talents are
iv
accessible in a number of countries, businesses adopting this option to save money must carefully
handle the dangers associated with this method of obtaining IT services.
In-House Training
Un
It will be easier to design a custom application if all of the functional and technical needs of the
system are met in-house rather than if these abilities are lacking. A packaged system may be a
preferable solution for companies who do not have the technical skills to develop the needed system.
A project team that lacks Web commerce technical skills, for example, could choose to invest in a
Web commerce package that can be setup quickly. Outsourcing is a good way to bring in outside
experience that isn't available in-house, allowing qualified people to take responsibility of the system's
ity
development.
Technical (e.g., Java, Structured Query Language [SQL]) or functional (e.g., electronic commerce)
abilities are used in projects, and different design options are more viable depending on how vital the
m
skills are to the company's strategy. For example, if the company needs certain functional and
technical expertise in Internet sales applications and Web commerce application development
because it expects the Internet to play an increasingly important role in sales over time, it makes
sense to develop Web commerce applications in-house, using company employees, so that the skills
)A
can be developed and improved. On the other hand, some talents, like as network security, may be
beyond the technical knowledge of employees or irrelevant to the company's strategists—it is simply a
business issue that must be addressed. Packaged systems or outsourcing should be considered in
this case so that internal employees can concentrate on more business-critical applications and skills.
Management of Projects
(c
Custom apps necessitate good project management and a tried-and-true approach. Many factors
might throw a project off schedule, including finance issues, staffing shortages, and overly demanding
business customers. As a result, the project team should only develop a custom application if the
underlying coordination and control mechanisms are certain to be in place. Packaged and outsourcing
options must also be handled, but they are less vulnerable to internal impediments because the
e
external parties have their own goals and ambitions (e.g., it may be easier for an outside contractor to
say no to a user than for a person within the company to do so). Companies who do not have an
acceptable technique to utilise can benefit from the later options, which often have their own
lin
methodologies.
Time Limits
When time is of the essence, the project team should opt for a system that has already been
constructed and tested. As a consequence, the organisation will have a decent notion of how long it
On
will take to install the software and what the ultimate result will be. Of course, this implies that the
package can be installed as-is and that integrating it into existing business processes and technical
environments does not need numerous workarounds. Custom applications take a long time to
develop, especially when you consider how often projects miss crucial deadlines. If you have no
choice but to go with bespoke development and you have a short time frame, try adopting timeboxing
approaches to solve the problem. The time it takes to develop a system through outsourcing is mostly
determined by the system and the resources available to the outsourcer. A business need could be
ty
handled swiftly if a service provider has services in place that can satisfy the company's needs. An
outsourcing solution could otherwise take as long as a custom development project.
si
After the project team has a strong knowledge of how well each acquisition strategy fits the project's
er
requirements, it must start thinking about how to put these strategies into action. What tools and
technologies, for example, would be employed if a bespoke option was chosen? What vendors
produce packaged solutions that meet the project's requirements? If the application were to be
outsourced, which service providers would be able to construct it? This information can be gathered
by talking to employees working in the IS Department and collecting recommendations from business
iv
users by contacting other organisations with comparable needs and researching the types of systems
that they have put in place. Brochures, product demos, and information seminars are common ways
for vendors and consultants to deliver information about various tools and solutions.
Un
To obtain the additional information that is required, project teams use a variety of methods. One
helpful tool is the request for proposal (RFP), a document that solicits a formal proposal from a
possible vendor, developer, or service provider. RFPs specify the system or service that is required,
and suppliers reply by describing how they would meet those requirements.
Although there is no set format for an RFP, it should include critical information that the vendor
requires, such as a clear explanation of the needs, any particular technical requirements or
ity
conditions, evaluation criteria, procedures to follow, and a timeframe. The RFP for a large project
might be hundreds of pages long since all relevant project details must be provided.
The RFP is more than just a tool for gathering data. Instead, it produces a vendor proposal, which is a
legally binding offer to complete the tasks outlined in the RFP. A schedule and a price for the work to
be done are included in the vendor proposal. A contract for the job is signed once the winning vendor
m
proposal is chosen.
The request for information (RFI) may be sufficient for smaller projects with smaller expenditures. An
RFI is a shorter, less thorough request for broad information on potential vendors' products and
)A
services that is delivered to them. The RFI is sometimes used to identify which vendors are capable
of performing a service. It is frequently followed up with a request for proposal (RFP) to qualified
vendors.
The request for quote (RFQ) can be used when a list of equipment is sufficiently comprehensive that
the seller merely needs to submit a price without any analysis or description of what is required. The
(c
RFQ can be used, for example, if the manufacturer needs 20 long-range RFID tag readers on a
specific day and at a specific place. If an item is specified but no specific manufacturer's product is
mentioned, thorough testing will be necessary to ensure that the specifications are met.
The design team will most likely have multiple plausible options for obtaining the system after
assessing the acquisition plan options and gathering additional information. For example, the project
e
team might find three vendors who make packaged systems that could meet the project's
requirements; or the team might be debating whether to develop a system using Visual Basic as a
development tool and Sybase's database management system; or the team might decide that
lin
outsourcing the development effort to a consulting firm like Accenture or American Management
Systems is worthwhile. Each option will have advantages and disadvantages that must be weighed,
and only one answer may be chosen in the end.
On
Matrix of Alternatives
An alternative matrix can be used to organise the benefits and drawbacks of design options so that
the best option is chosen in the end. (For more information, see Figure 7-5.) The same methods as
the feasibility analysis are used to produce this matrix. The only distinction is that the alternative
matrix integrates numerous feasibility evaluations into a single matrix, making it easier to compare the
options. The alternative matrix is a grid that lists the technical, economic, and organisational feasibility
ty
of each system candidate, as well as the benefits and drawbacks of selecting each solution and other
relevant data. Weights are sometimes assigned to different portions of the matrix to indicate when
certain criteria are more crucial to the final decision.
si
Draw a grid with the alternatives across the top and other criteria (e.g., feasibilities, pros, drawbacks,
and other miscellaneous criteria) along the sides to produce the option matrix. Next, fill up the grid
with descriptive explanations about each choice. Because it clearly provides the choices under
consideration and compares their attributes, this document becomes a useful conversation tool.
er
Weights and scores are sometimes applied to the alternative matrix to form a weighted alternative
matrix that communicates the project's most essential criteria and the best solutions. A scorecard is
created by including a "weight" column with a number indicating how important each criterion is to the
final choice. Analysts often take 100 points and distribute them evenly across the criteria. Each
iv
criterion would be given a weight of 20 if five criteria were employed and they all mattered equally. If
cost were the most essential criterion for selecting an option, it might receive 60 points, whereas the
other four criteria might only get 10 points each.
Un
The analysts then add a "Score" column to the matrix, which indicates how well each solution satisfies
the requirements. To grade the acceptability of the alternatives by the criteria, numerical ranges such
as 1 to 5 or 1 to 10 are commonly employed. As a result, the least expensive option may score a 5 on
a 1-to-5 scale, while the most expensive option may receive a 1. Weighted scores are calculated by
multiplying each criterion's weight by the score assigned to it for each choice. The weighted scores
are then added together for each option. Our requirements are best met when the highest weighted
score is obtained. When numbers are employed in the alternative matrix, project teams can make
ity
Of course, the ultimate stage is to choose which solution to design and implement. The decision
should be made by the approval committee after all of the issues associated with the various
possibilities have been thoroughly investigated. Keep in mind that the distinction between analysis
Un
and design is hazy. Alternatives are sometimes outlined and chosen towards the end of analysis, and
other times they are done before the start of design. The bottom line is that, before moving into the
heart of the design phase, the project team and approval committee must understand all of the
possible approaches to develop the system and choose the one that makes the most sense for the
company. Many of the subsequent tasks in the design phase will be influenced by the acquisition
approach chosen.
ity
Jason Wells, senior systems analyst and project manager for Tune Source's Digital Music Download
system, had three options for developing the new system: he could develop the entire system himself
m
using Tune Source's development resources; he could buy a packaged software programme (or a
collection of different packages and integrate them); or he could hire a consulting firm or service
provider to do it for him. Jason ruled out the third option right away. Tune Source's business approach
included the development of Internet applications, particularly e-commerce platforms. Tune Source
)A
would not foster Internet application development capabilities or business skills within the corporation
if the Internet system was outsourced.
Jason concluded that for Tune Source, a custom development project employing the company's
normal Web development tools would be the best option. The corporation would be able to build
important technical and business skills in-house, and the project team would have a lot of freedom
and control over the end product. Jason also wanted the new music download system to link with the
(c
existing Internet-based CD sales system, and a packaged solution might not fit into the Tune Source
environment as well. Finally, Jason was aware that new features were planned for future versions of
the system, so he understood the importance of maintaining control over each one.
The purchasing section of the programme was one component of the project that could be handled by
packaged software. Jason recognised that a variety of applications for handling client transactions
e
over the Internet have been built and are available (at affordable prices). Customers can usually
select goods for an order form, provide basic information, and complete the purchase transaction
using these systems, which are known as shopping-cart applications. Jason said the project team
lin
should at least investigate some of these packaged options so that they could spend less time
creating a software to handle basic Web functions and more time on novel marketing concepts and
specialised CD sales system interfaces.
Jason produced a weighted alternative matrix that contrasted three distinct shopping-cart
On
programmes against one another to help better understand some of the shopping cart programmes
that were available on the market and how their adoption could benefit the project (Figure 7-6). Jason
considered choice 2 (WebShop) as the greatest option for handling the shopping cart functionality for
the new music download system, despite the fact that all three alternatives had advantages.
ty
si
er
iv
Un
ity
WebShop was written in Java, which Tune Source had chosen as its main Web development
language; the cost was affordable, with no hidden or recurring fees; and there was an in-house expert
with some prior expertise with the application. Jason made a mental note to check into purchasing
WebShop as the Digital Music Download system's shopping cart programme.
m
e
A data schema, which is usually a relational schema.
➢ Tables/files and columns/data-items are defined using metadata.
➢ A diagram that graphically depicts the programme structure, such as a function hierarchy
lin
diagram or a web page map.
➢ For each module in the programme, actual or pseudocode is used.
➢ The suggested system's prototype.
On
2.1.5 Types of System Design
Logical Design
The term "logical design" refers to an abstract representation of a system's data flow, inputs, and
outputs. It describes the inputs (sources), outputs (destinations), databases (data storage), and
procedures (data flows) in a user-friendly format.
ty
The system analyst specifies the user demands at a degree of detail that virtually determines the
information flow into and out of the system, as well as the required data sources, while developing the
logical architecture of a system. E-R diagram modelling and data flow diagrams are employed.
Physical Design
si
Physical design refers to the system's real input and output operations. It focuses on how data is
entered into a system, validated, processed, and outputted.
er
It creates the working system by creating the design specification, which details the candidate
system's functionality. It is involved with the design of user interfaces, processes, and data.
iv
• Creating a test and implementation strategy, as well as identifying any additional hardware or
software requirements.
• Costs, benefits, conversion dates, and system constraints are all being updated.
Architectural Design
It's also known as high-level design, and it focuses on system architecture design. It explains the
system's structure and behaviour. It establishes the structure of the system development process and
ity
Detailed Design
A logical design is abstract and conceptual. You haven't yet addressed the physical implementation
aspects. You're just concerned with defining the types of information you require.
(c
Entity-relationship modelling is one method for modelling your organization's logical information
requirements. Entity-relationship modelling is the process of identifying important items (entities), their
properties (attributes), and how they are connected to one another (relationships).
The logical design method entails organising data into a set of logical relationships known as entities
and attributes. A block of data is represented by an entity. An entity frequently maps to a table in
e
relational databases. An attribute is a component of an entity that aids in defining the entity's
uniqueness. An attribute in a relational database corresponds to a column.
lin
You must use unique IDs to ensure that your data is consistent. A unique identifier is a field that you
may add to tables to help you distinguish between the same item when it appears in many places.
This is frequently a primary key in a physical design.
While entity-relationship diagramming is most commonly associated with fully normalised models like
OLTP applications, it is also beneficial for data warehouse architecture in the form of dimensional
On
modelling. Instead than attempting to uncover atomic units of information (such as entities and
attributes) and all of the relationships between them, dimensional modelling focuses on determining
which data belongs in a core fact table and which data belongs in its associated dimension tables.
You name the attributes for each topic after identifying business subjects or areas of data, defining
links between business subjects, and naming business subjects.
Your logical design should produce (1) a collection of entities and characteristics that correspond to
ty
fact and dimension tables, and (2) a model of operational data from your source into subject-oriented
data in your target data warehouse schema.
You can use a pen and paper to develop the logical design, or you can use a design tool like Oracle
si
Warehouse Builder (specifically designed to support modelling the ETL process).
The data warehouse schema is designed using the model of your source data and the requirements
iv
of your users. You can often obtain the source model from your company's corporate data model and
use it to reverse-engineer the logical data model for the data warehouse. The physical implementation
of the logical data warehouse model may need to be tweaked to fit your system's parameters—
machine size, user count, storage capacity, network type, and software.
Un
The simplest data warehouse schema is the star schema. Because the diagram resembles a star,
with points radiating from a core, it is termed a star schema. As shown in Figure 2-1, the centre of the
star consists of one or more fact tables, while the points of the star are the dimension tables.
ity
m
)A
(c
Additional Schemas
In data warehousing environments, third normal form schemas are used instead of star schemas in
some cases. The snowflake schema, which is a star schema with normalised dimensions in a tree
e
structure, is another effective template.
lin
The two types of objects usually utilised in dimensional data warehouse schemas are fact tables and
dimension tables.
The large tables in your data warehouse schema that record business measures are known as fact
tables. Fact tables usually include facts as well as foreign keys to dimension tables. Data that may be
On
analysed and examined is represented using fact tables, which are usually quantitative and additive.
Sales, cost, and profit are some examples.
Dimension tables, often known as lookup or reference tables, house the data warehouse's generally
static data. Dimension tables are used to store the data that is generally used to contain queries.
Dimension tables are often textual and descriptive, and they can be used as the result set's row
headers. Customers and merchandise are two examples.
ty
Tables of Contents
There are two types of columns in a fact table: those that hold numeric facts (commonly referred to as
measurements) and those that are foreign keys to dimension tables. A fact table can contain either
si
detail-level facts or aggregated facts. Summary tables are fact tables that provide summarised
information. Facts with the same level of aggregation are frequently found in a fact table. Although the
majority of facts are additive, some are semi-additive or non-additive. Simple arithmetical addition can
er
be used to aggregate additive data. Sales is a good example of this. Non-additive facts can't be
combined in any way. Averages are a good example of this. Facts that are semi-additive can be
aggregated along certain dimensions but not others. Inventory levels are an example of this, as you
can't know what a level means by by looking at it.
iv
For each star schema, you must define a fact table. In terms of modelling, the fact table's main key is
frequently a composite key made up of all of its foreign keys.
Un
Tables of Dimensions
Dimension data is often collected at the most basic level before being aggregated into higher-level
totals that are more valuable for analysis. Hierarchies are the natural rollups or aggregations within a
dimension table.
Hierarchies
m
Hierarchies are logical structures that organise facts by using ordered levels. Data aggregation can be
defined using a hierarchy. A hierarchy might aggregate data from the month level to the quarter level
to the year level in a time dimension, for example. A hierarchy can also be used to build a family
)A
Each level in a hierarchy is logically linked to the layers above and below it. Lower-level data values
combine to form higher-level data values. A dimension can be made up of many hierarchies. For
example, there could be two hierarchies in the product dimension: one for product categories and one
for product suppliers.
(c
Dimension hierarchies also divide levels into general and detailed categories. Hierarchies are used by
query tools to allow you to drill down into your data and observe different levels of granularity. This is
one of the most important advantages of a data warehouse.
You must consider the relationships in company structures while creating hierarchies. A divisional
multilevel sales organisation, for example.
e
Dimension values are given a family structure through hierarchies. A value at the next higher level is
its parent, and values at the next lower level are its children for a given level value. Analysts can
lin
readily obtain data because to these familial ties.
Levels
In a hierarchy, a level denotes a position. A time dimension, for example, might include a hierarchy
that depicts data at month, quarter, and year levels. The root level is the highest or most general
On
level, and it ranges from general to particular. A dimension's levels are divided into one or more
hierarchies.
From the most broad (the root) to the most precise information, level relationships establish a top-to-
bottom ordering of levels. They establish the parent-child link between hierarchy levels.
ty
Hierarchies are also necessary for more complicated rewrites to be possible. When the dimensional
dependencies between quarter and year are understood, the database can aggregate previous sales
revenue on a quarterly basis to a yearly aggregation.
In a dimension table, unique identifiers are supplied for each separate record. Artificial unique
identifiers are frequently used to circumvent the difficulty of changing unique identifiers. The #
character is used to indicate unique identifiers. #customer id, for example.
)A
Relationships
Business integrity is ensured via relationships. If a company sells anything, for example, there must
be a customer and a product. The business rules in databases are enforced by designing a
relationship between the sales information in the fact table and the dimension tables products and
(c
customers.
e
lin
On
ty
si
2.1.7 Physical Design
The physical design is concerned with the system's real input and output processes. This is described
in terms of how data is entered into a system, how it is verified/authenticated, processed, and
er
displayed. The following system needs are decided during physical design.
Input, output, storage, processing, system control, and backup or recovery are all things that must be
considered.
iv
To put it another way, the physical aspect of system design can be divided into three sub-tasks:
Data Design
Process Design
User Interface Design is concerned with how users input data into a system and how that data is
presented to them by the system. The way data is expressed and stored within a system is called
data design. Finally, Process Design is concerned with how data is vetted, secured, and/or altered as
ity
it flows into, through, and out of the system. Documentation defining the three sub-tasks is developed
and made available for usage in the following phase at the end of the system design phase.
Physical design does not refer to the physical appearance of an information system in this sense. To
draw an analogy, the physical design of a personal computer includes input via a keyboard,
processing by the CPU, and output via a display, printer, and other devices. It would not affect the
m
physical layout of the hardware, which in the case of a PC would include a monitor, CPU,
motherboard, hard drive, modems, video/graphics cards, USB slots, and so on. It entails the creation
of a detailed user and product database structure processor, as well as a control processor. For the
proposed system, the H/S personal specification is created.
)A
Input mechanisms make it easier to enter data into a computer system, whether it's highly structured
data like order information (item numbers, quantities, and costs) or unstructured data like text (e.g.,
comments). Input design include the creation of displays for entering data as well as any forms on
(c
which users write or type data (e.g., time cards, expense claims).
Basic Concepts
The purpose of input design is to quickly and readily acquire reliable data for the system. The basic
input design concepts reflect the nature of the inputs (whether batch or online) and strategies to make
e
their collecting easier.
lin
Online processing and batch processing are the two main methods for entering data into a computer
system. Each input item (e.g., a client order, a purchase order) is entered into the system separately
with online processing (also known as transaction processing), usually at the same time as the event
or transaction generating the input. When you borrow a book from the library, buy something at the
store, or make an airline reservation, for example, the computer system that supports each activity
On
employs online processing to record the transaction in the proper database almost instantly (s). When
having real-time information regarding a business process is critical, online processing is most
typically used. When you reserve an airline seat, for example, that seat is no longer accessible for
anyone else to use, thus that information must be recorded right away.
With batch processing, all of the data collected over a period of time is gathered and fed into the
system all at once. Some business processes create data in batches by default. Because time cards
ty
are acquired in batches and processed all at once, batch processing is used for most hourly payrolls.
Batch processing is also employed in transaction processing systems that do not necessitate real-
time data. Most retailers, for example, report sales data to district offices in order to order new
replacement goods. This information might be delivered in real time as it is taken in the store, allowing
si
district offices to be notified of a product sale within a second or two. If retailers do not require real-
time data, they will collect sales data throughout the day and send it to the district office in batches
every evening. Batching data transmissions streamlines the process and often lowers communication
expenses. It does, however, imply that inventories are not accurate in real time, but only after the
er
batch has been processed at the end of the day.
Data should be captured at the source. The collection of data in an electronic format at the original
source, or as close to the original source as feasible, is perhaps the most essential principle of input
design. Computer systems superseded old manual systems based on paper forms in the early days
iv
of computing. Many of the original paper forms persisted after these business operations were
automated, either because no one thought to change them or because it was too expensive to do so.
Instead, the business process continued to use manual forms that were delivered in batches to the
Un
computer centre and written into the computer system by a data-entry operator.
Many corporate processes are still carried out in this manner today. Many organisations, for example,
have expense claim forms that are filled out by hand and submitted to an accounting department,
which authorises them and batches them into the system. There are three issues with this strategy.
To begin with, it is costly because it duplicates work. (The form is completed twice: once by hand and
once by typing.) Second, because the paper forms must be physically transported through the
process, it lengthens the processing time. Third, because it separates data entering from data
ity
processing, it raises the cost and risk of mistake; someone could misunderstand the handwriting on
the input form, data could be entered improperly, or the original input could contain an error that
invalidates the data.
The majority of today's transaction processing systems are built to capture data at its source. The
term "source data automation" refers to the use of special hardware devices to capture data
m
automatically without the need for someone to type it in. Bar code readers are routinely used in stores
to scan products and enter data directly into the computer system. There are no intermediate formats
used, such as paper forms. Optical character recognition (OCR) can read printed numbers and text
(e.g., on checks); magnetic stripe readers (e.g., credit cards) can read information encoded on a
)A
stripe of magnetic material similar to a diskette; and smart cards (which contain microprocessors,
memory chips, and batteries) are all similar technologies (much like credit card-size calculators). The
RFID (radio frequency identification) tag, which combines a microprocessor chip with an antenna to
broadcast information to electronic readers, is a recent breakthrough. The RFID tag can be used to
read or write information. These systems eliminate errors by lowering the time and expense of data
entering. They are also less likely to record data inaccurately. Data may now be gathered at the
(c
source, even in mobile settings, thanks to portable computers and scanners (e.g., air courier
deliveries, use of rental cars)
However, these automated methods are unable to capture a significant amount of data. With the
growing usage of the Internet, much data is being collected directly from customers. As a result, forms
e
for capturing information on-screen should follow a logical sequence and allow the user to simply fill
out and double-check their entries before submitting them. Validation checks (see Figure 9-15) should
be implemented wherever possible since data submitted by the user is prone to inaccuracies.
lin
Reduce the number of keystrokes you use Another crucial guideline is to use as few keystrokes as
possible. Whether conducted by a client, a user, or a skilled data-entry operator, keystrokes cost time
and money. Information that can be obtained in another means should never be requested by the
system (e.g., by retrieving it from a database or by performing a calculation). Similarly, a system
On
should not force a user to type data that may be selected from a list; picking reduces errors and
speeds up entry.
Data frequently repeats values in various circumstances. These frequently occurring values should be
used as the data's default value, so that the user may just accept the value rather than having to
retype it over and over. The current date, the area code used by the majority of a company's clients,
and a billing address based on the customer's domicile are all examples of default settings. To handle
data entry exceptions as they occur, most systems allow adjustments to default values.
ty
Inputs of Various Types
Each data item that needs to be entered has a field on the form that its value is typed into. Each field
si
also has a field label, which is the text that appears beside, above, or below the field and informs the
user of the sort of data that should be entered. The field label is frequently comparable to the data
element's name, although the two do not have to be identical. In some circumstances, a template will
appear over the entry box to demonstrate the user how data should be entered. In the same way that
er
there are many distinct sorts of fields, there are many different types of inputs. (See Fig. 9-13 for more
information.)
iv
Un
ity
m
)A
(c
Text
A text box is used to enter text, as the name implies. Text boxes can be set to be a fixed length or
scrollable, allowing for nearly infinite text to be entered. Boxes can hold one or more lines of textual
e
content in each situation. If a selection box is available, use that instead of a text box.
Field labels should be located to the left of the entry area, and their size should be clearly restricted
lin
by a box (or a set of underlines in a non-GUI interface). The field labels and the left borders of the
entry boxes should be aligned if there are numerous text boxes. Standard GUI capabilities like cut,
copy, and paste should be available in text boxes.
Numbers
On
To enter numbers, a number box is needed. Some applications can format numbers automatically as
they are entered, so 3452478 becomes $34,524.78. Dates are a unique type of number that may or
may not have their own number box. If a selection box is available, use it instead of a number box.
Box of Choices
A selection box allows the user to choose a value from a list of options. The list's entries should be
ty
organised in a meaningful order, such as alphabetical order for big lists or most commonly used order
for short lists. It's important to choose the default selection value carefully. A selection box can be set
to "unselected" by default or, better yet, with the most frequently used item already selected.
Check boxes, radio buttons, on-screen list boxes, drop-down list boxes, combo boxes, and scroll bars
si
are the six most frequent types of selection boxes (Figs. 9-13, 9-14). The selection of text selection
boxes is usually limited by screen space and the amount of options available to the user. A drop-down
list box is the best solution if screen space is limited and just one item can be selected, because not
er
all list items need to be displayed on the screen. An on-screen list box that displays only a few items
can be utilised if screen space is restricted but the user can pick several items. Both check boxes (for
multiple selections) and radio buttons (for single selections) require all list items to be displayed at all
times, which takes up more screen space, but they are typically easier for inexperienced users
because they display all options.
iv
Un
ity
m
)A
(c
e
lin
On
ty
si
er
iv
Un
Validation of Input
ity
To ensure correctness, all data entered into the system must be checked. Input validation (also
known as edit checks) comes in a variety of shapes and sizes. Computer systems should not accept
input that fails any important validation check, ideally, to prevent invalid information from entering the
system. However, this can be challenging, because erroneous data is frequently overlooked by data-
entry operators and the consumers who provide the data. It is up to the system to detect incorrect
m
data and either correct it or tell someone who can fix the situation.
Validation checks are divided into six categories: completeness, format, range, check digit check,
consistency check, and database check. (For more information, see Figure 9-15.) Every system
)A
should execute at least one validation check on all entered data, and ideally, it should do all
necessary checks.
(c
e
lin
On
ty
si
er
iv
Un
The reports that the system generates, whether on the screen, on paper, or in other media such as
the Web, are known as outputs. Because one of the key reasons for utilising an information system is
to access the information it creates, outputs are likely the most apparent aspect of any system.
m
Basic Concepts
The output mechanism's purpose is to convey information to users in such a way that they can
interpret it accurately with the least amount of effort. The output design essential principles represent
)A
how the outputs are used and how to make them easier to grasp for consumers.
Understanding how reports are used is the fundamental rule of report design. Reports can be used for
a variety of reasons. Reports are read cover to cover in some circumstances, but not very often,
because all information is required. The order in which items are sorted on the report or classified
(c
inside categories is crucial in most circumstances since reports are used to identify specific items or
as references to find information. This is especially true when creating electronic or Web-based
reporting. Web reports that are meant to be read from beginning to end should be provided in one
long scrollable page, but reports that are primarily used to find specific information should be split into
many pages, each with its own link. For reference reports, page numbers and the date the report was
e
written are also crucial.
The report's frequency may also have an impact on its design and delivery. Real-time reports deliver
lin
data that is precise to the second or minute in which it was generated (e.g., stock market quotes).
Batch reports report historical data that may be months, days, or hours old, and they frequently
include supplementary information in addition to the reported data (e.g., totals, summaries, historical
averages).
Real-time reports have no intrinsic advantages over batch reports. The only benefit is the
On
information's value in terms of time. Realtime reports are useful when the information in a report is
time sensitive (for example, market prices or air traffic control information). This is especially
significant because real-time reports can be costly to create; unless they provide demonstrable
commercial value, they may not be worth the additional expense.
ty
Not too little, but too much information is received by most managers (i.e., the information load
confronting the manager is too great). A well-designed report should give all of the information
required to complete the task for which it was created. This does not imply that the report should
include all accessible information on the issue; rather, it should only include the information that the
si
users determine they require to execute their duties. Because they are used in different ways, this
may result in the production of numerous different reports on the same topic for the same users. This
isn't a horrible design at all.
er
The most significant information should be provided first to consumers in Westernized countries, in
the top left corner of the screen or paper report. Information should be presented in a format that may
be used straight away. The user should not be required to re-sort the report's data, highlight essential
information to make it easier to identify in a sea of information, or conduct additional mathematical
calculations.
iv
No analyst intends to create a skewed report. The difficulty with bias is that it can be undetectable;
Un
analysts can unwittingly introduce it. Because entries that show first in a list may receive more
attention than those appearing later in the list, bias can be introduced by the way data lists are sorted.
Data is frequently arranged alphabetically, highlighting entries beginning with the letter A. Data can be
sorted in chronological (or reverse chronological) order, with older (or most recent) entries taking
precedence. Data can be sorted by numeric value, with greater or lower values being prioritised.
Consider a monthly sales report broken down by state. Should the report be organised alphabetically
by state name, numerically by quantity sold, or in some other way (e.g., by geographic region)? There
ity
are no simple answers to this, save to state that the sequence in which the information is presented
should correspond to how the information is used.
Graphic presentations and reports can be particularly difficult to create. In graphs, the scale on the
axes is particularly susceptible to bias. The scale should always start at zero for most types of graphs;
otherwise, comparisons between data can be deceptive. Have sales increased significantly since
m
2006, as shown in Fig. 9-16? Both charts have the same data, yet the visual images they convey are
very different. A quick glance at Fig. 9-16a suggests fairly slight changes, but a quick glance at Fig. 9-
16b suggests some large increases. In reality, sales have climbed by 15%, or 3% each year, over the
last five years. Fig. 9-16a is the most accurate representation; Fig. 9-16b is skewed because the
)A
scale begins extremely close to the graph's lowest value, deceiving the eye into thinking there have
been significant changes (i.e., from "two lines" in 2006 to "five lines" in 2011). The default graph
created by Microsoft Excel is Fig. 9-16b, so be aware of how easy it is to introduce bias in graphs
unintentionally.
Detail reports, summary reports, exception reports, turnaround documents, and graphs are among the
numerous types of reports available (Fig. 9-17). It's difficult to categorise reports because many of
them have traits from multiple different types. Some detail reports, for example, also generate
summary totals, making them summary reports.
e
lin
On
ty
si
er
iv
Un
ity
m
Media
Reports can be created using a variety of different media. Paper and electronic media are today's
)A
dominating media. Paper is a more traditional media that is durable, easy to use, and available in
most settings. It's also quite portable, at least for quick reporting.
Paper, on the other hand, has a number of important disadvantages. It is unyielding. The report
cannot be filtered or restructured after it has been produced to offer a different view of the data.
Similarly, if the report's information changes, the complete report must be reissued. Paper reports are
(c
costly, difficult to duplicate, and necessitate a lot of supplies (paper, ink) and storage space. Paper
reports are also difficult to transport across large distances (e.g., from a head office in Toronto to a
regional office in Bermuda).
As a result, many organisations are shifting to electronic report production, in which reports are
"produced" but saved in electronic format on file servers or Web servers for easy access by users.
e
Because the expense of producing and storing numerous forms is inexpensive, the reports are
frequently available in more predesigned versions than their paper-based equivalents. Electronic
reports can also be printed on demand as needed, and they make it easier for the user to search for
lin
specific words.
On
ty
si
er
iv
Un
Furthermore, when users customise the contents of the report at the time it is prepared, electronic
reports can give a way to provide ad hoc reports. Some users may still use their own printers to print
the electronic report. The cost of local printing is usually offset by the cost of electronic delivery over
ity
Most modern information systems consist of two or more computers. For example, a Web-based
system can run in your browser on your desktop computer, but it will communicate with the Web
m
server (and presumably other computers) through the Internet. A Visual Basic programme may be
installed on your computer for a system that functions entirely within a company's network, but it
interacts with a database server located elsewhere on the network. The creation of the architecture
design, which is the strategy for how the information system components will be distributed among
)A
several computers and what hardware, operating system software, and application software will be
utilised on each computer, is an important step in the design phase (e.g., Windows or Linux operating
system software)
Because designing the system architecture can be challenging, many firms rely on the expertise of
experienced, professional system architects (consultants or employees) who specialise in the field.
(c
Anything's crucial to remember that doing it well takes a lot of practise. The architecture design is
heavily influenced by the nonfunctional requirements determined early in the analytical process.
These needs are revisited and developed into more specific requirements that affect the architecture
of the system.
e
DESIGN ELEMENTS FOR ARCHITECTURE
lin
The goal of architecture design is to figure out how the information system software components will
be assigned to the system's hardware units. To understand how the software might be divided into
different pieces, we first discuss the key functions of the software in this section. The major types of
hardware onto which the programme can be installed are then briefly discussed. Although there are
other ways to arrange software components on hardware components, the client–server architecture
is the most prevalent, therefore we will concentrate on it here.
On
Components of Architecture
The software and hardware are the two most important architectural components of any system. The
primary software components of the system under development must be identified and then assigned
to the various hardware components that the system will run on. Each of these elements can be
mixed and matched in a variety of ways.
ty
There are four basic functions that all software systems have. The first is the storing of data. Whether
it's a little file like a list of lawn chemicals that are no longer permitted for residential usage or a large
database like an organization's human resources records, most information systems require data to
be stored and accessed. These are the data entities that ERDs document. The second role is data
si
access logic, which is the processing necessary to access data, which is frequently represented by
database queries written in Structured Query Language (SQL) (SQL). The application logic, which is
described in DFDs, use cases, and functional requirements, is the third function. The fourth function is
er
presentation logic, which involves displaying information to the user and accepting commands from
the user (the user interface). Any information system's essential building blocks are these four
functions (data storage, data access logic, application logic, and display logic).
Client computers, servers, and the network that connects them are the three main hardware
iv
components of a system. Client computers are the user's input–output devices. They are often
desktop or laptop computers, but they can also be mobile devices, smartphones, special-purpose
terminals, and other devices. Servers are often larger multi-user computers that contain software and
data that anyone with authorization can access. The network that connects the computers can range
Un
in speed from dial-up modems and cell phones to medium-speed always-on frame relay networks,
fast always-on broadband connections like cable modems, DSL, or T1 circuits, and high-speed
always-on Ethernet, T3, or ATM circuits.
Client–Server Architectures
Client–server designs, which try to balance processing between client devices and one or more
ity
server devices, are used or being used by the majority of enterprises today. The client is in charge of
the presentation logic in these systems, whereas the server is in charge of the data access logic and
data storage. The application logic can be on the client, on the server, or divided between the two
(Figure 8-1).
m
)A
(c
A thick or fat client is one that contains all or most of the application logic, as seen in Figure 8-1. Thin
clients, which include only a small fraction of the application logic, are now popular due to their
e
decreased overhead and ease of maintenance. Many Web-based systems, for example, are built with
the Web browser doing display and only little application logic using programming languages like
JavaScript, while the server side handles the majority of the application logic, data access logic, and
lin
data storage.
Client–server architectures offer four significant advantages. They are, first and foremost, scalable.
That implies the storage and processing capabilities of the servers can be easily increased or
decreased. If one server becomes overburdened, just add another such that the application logic,
On
data access logic, and data storage are distributed over multiple servers. The cost of upgrading is
gradually increasing, and you can upgrade in modest steps.
Second, client–server architectures may accommodate a wide range of client and server types. It is
feasible to link computers with multiple operating systems in order to avoid being tied to a single
vendor. Users can select their preferred computer type (e.g., combining both Windows computers and
Apple Macintoshes on the same network). Middleware is a sort of system software that is used to
translate between the software of different suppliers. On both the client and server computers,
ty
middleware is deployed. The client software talks with the middleware, which can reformat the
message into a standard language that the middleware can understand and use to help the server
software.
si
Third, it is straightforward to clearly segregate the presentation logic, the application logic, and the
data access logic in thin client–server architectures that employ Internet standards, and design each
to be fairly independent. To indicate how the page will appear on the screen (e.g., colours, fonts,
order of items, specific phrases used, command buttons, kind of selection lists, and so on), the
er
presentation logic can be designed in HTML or XML. Parts of the interface are linked to individual
application logic modules that perform various functions using simple programme expressions. The
interface's HTML or XML files can be modified without affecting the application functionality. Similarly,
the application logic can be changed without affecting the display logic or the data, which is stored in
iv
Finally, with a client–server architecture, if a server fails, only the apps that rely on it will fail. The apps
can be restored if the failing server is swapped out and replaced.
Un
Client–server designs have a number of drawbacks, the most significant of which is their complexity.
Client–server computing programmes are made up of two parts: client-side software and server-side
software. It's more difficult to write this software than it is to write standard all-in-one software for
server-based architectures. It's also more difficult to update the entire system with a new version of
the software. You must update all clients and servers in client–server architectures, and you must
verify that the updates are applied to all devices.
ity
Tiers of Client–Server
The application functionality can be partitioned between the client and the server in a variety of ways.
The layout shown in Figure 8-1 is a common one.
m
)A
(c
The server is in charge of the data in this situation, while the client is in charge of the application and
presentation. Because it only employs two types of computers—clients and servers—this is referred
e
to as a two-tiered architecture.
Figure 8-2 shows a three-tiered design with three sets of computers. In this arrangement,
lin
presentation logic is handled by the client computer's software, application logic is handled by an
application server(s), and data access logic and storage are handled by a separate database
server(s). The user interface is often installed on a desktop PC or workstation and employs a
standard graphical user interface. One or more independent modules operating on a workstation or
application server may make up the application logic. Finally, the data access logic and data storage
On
are handled by a relational DBMS operating on a database server. The intermediate tier can be
broken into tier as well, resulting in a "n-tier architecture" as a result.
The work of the application (the middle tier) is distributed over numerous tiers of more specialised
server computers in an n-tiered architecture. In today's Web-based e-commerce platforms, this type
of architecture is common. See Figure 8-3 for more information. The browser software on client
computers sends HTTP requests to the Web server(s) to see pages, and the Web server(s) react with
HTML documents, allowing the user to view products for sale. While the user is shopping,
ty
components on the application server(s) are called as needed to allow the user to add products to a
shopping cart, determine item pricing and availability, compute purchase costs, sales tax, and
shipping charges, authorise payments, and so on. These business logic parts, also known as detailed
processing, are kept on the application server(s) and are available to any application. For example,
si
the price determination business logic utilised by the e-commerce Web site could be used by the cash
register application that requires item price look-ups. Multiple, independent applications that require
that particular business logic can use the modular business logic. The data components of the system
are managed by the database server(s). Each of these four components is distinct, making it simple
er
to distribute the various components across multiple servers and divide the application functionality
between a Web-oriented and a business-oriented server.
The main benefit of an n-tiered client–server architecture over a two-tiered architecture (or a three-
iv
tiered with a two-tiered) is that it breaks out the processing to better balance the load on the various
servers; it is more scalable. We have three different server types in Figure 8-3, a design that delivers
more power than a two-tiered architecture with only one server. If we find that the application server is
overburdened, we can either replace it with a more powerful server or add more application servers to
Un
distribute the load. On the other hand, if we find that the database server is underutilised, we can use
it to store data from another application.
ity
m
)A
When opposed to a two-tiered design, an n-tiered architecture has two major drawbacks (or a three-
tiered with a two-tiered). For starters, the setup increases the network's burden. Figures 8-1, 8-2, and
8-3 show that the n-tiered approach necessitates greater communication between servers and
generates more network traffic, necessitating a higher-capacity network. Second, because more
devices must communicate successfully to complete a user's transaction, n-tiered architectures are
substantially more complicated to build and test than two-tiered structures.
(c
e
Architectures based on servers
lin
The original computing designs were server-based, with a single server (typically a central mainframe
computer) handling all four application functions. Users could send and receive messages to and from
the server computer via the clients (typically terminals). The clients did little more than record
keystrokes and send them to the server for processing, accepting the server's instructions on what to
display (Figure 8-4).
On
ty
si
er
This very basic construction frequently works extremely well. All data is saved on the same computer,
and application software is produced and stored on the server. Because all messages pass through a
iv
single central server, there is only one point of control. Because the entire system is hosted on a
single computer, software development and management are simplified (operating system and
application software).
Un
The server-based design was the first in information systems, but as technology and software
improved, it was no longer the only option. Early server-based systems had a basic flaw in that the
server handled all of the work in the system. As the number of users and the number of applications
demanded increased, server computers became overburdened and unable to process all of the
requests in a timely manner. Response times slowed, and IT administrators found themselves having
to pay more money to improve the server computer. Upgrading to a larger server computer (typically
a mainframe) required a significant financial investment in the early days. Increased capacity was only
ity
The server-based architecture is still a viable architecture option today. Zero client, also known as
ultrathin client, is a server-based computing approach commonly employed in today's virtual desktop
infrastructure (VDI). A common zero client device is a small box that connects to a remote server via a
m
keyboard, mouse, monitor, and Ethernet connection. Everything is hosted on the server, including the
client's operating system and software applications. The server can be accessed wirelessly or over a
wired connection.
There are several advantages to zero client computing. When compared to fat client configurations,
)A
power consumption can be greatly decreased. As more businesses look at green computing, this
benefit is becoming more important. The gadgets are significantly less expensive than PCs or thin
client devices. There is no malware vulnerability because there is no software on the client device.
The zero client computing architecture allows software to be delivered to end users in a quick and
secure manner. Multiple virtual PCs can be run on server class hardware in VDI setups, reducing the
number of physical PCs that must be purchased and maintained dramatically. Furthermore, the
(c
server-based zero-client model restricts the usage of the client computer for non-business purposes
(e.g., no Facebook; no Farmville, etc.).
Architectures based on clients
Client-based architectures have microcomputers on a local area network as clients and a server
e
computer on the same network as the server. The display logic, application logic, and data access
logic are all handled by the application software on the client PCs; the server just stores the data
lin
(Figure 8-5)
On
ty
si
In circumstances when there are a small number of users or data access requirements, this simplistic
er
architecture frequently works well. The fundamental problem with a client-based architecture is that all
server data must be sent to the client for processing. Assume the user wants to see a list of all
employees who have life insurance through the company. All of the data in the employee database
must travel across the network from the server to the client, which then runs the query to find each
record that matches the information requested by the user. The data access function would be
iv
conducted on the server in the previous computing models we've studied, with only the query results
being sent to the client. The data access logic is executed on the client system in the client-based
computing model. As a result, before processing can begin, the full database must be sent to the
client. This might cause the network as well as the client PCs to become overloaded.
Un
Virtualization
This phrase refers to the development of a virtual device or resource, such as a server or storage
device, in the computing realm. If you've partitioned your computer's hard disc into more than one
individual hard drive, you're probably familiar with this notion. Even while your system only has one
actual hard drive, you consider each partitioned, "virtual" drive as if it were a separate physical hard
m
drive. As we hear about server virtualization, storage virtualization, network virtualization, and other
forms of virtualization, this term has become a common buzz word.
The division of a physical server into smaller virtual servers is known as server virtualization. Virtual or
)A
private servers are created by dividing a physical server into many virtual environments using
software. This capacity eliminates the main drawback of earlier server-based designs, which relied on
single, huge, expensive monolithic machines. Today, a physical server device can be used to provide
a large number of virtual servers that are all independent of one another yet share the same physical
server. Each virtual server has its own operating system and may be rebooted separately from the
others. When compared to equivalent physical servers, less hardware is required to offer a set of
(c
virtual servers, lowering expenses. This configuration can help maximise the use of the physical
server, lowering operational costs.
According to a recent Gartner poll of midsized enterprises, over 75% of midsized businesses plan to
employ server virtualization extensively by 2012. These companies claim to be aggressively looking
e
for methods to reduce costs, enhance utilisation, and increase availability, and server virtualization
has shown to be a valuable tool in achieving those objectives.
lin
Storage virtualization refers to the process of merging numerous network storage devices into a
single storage unit. Storage virtualization is used to build a high-speed subnetwork of shared storage
devices in a storage area network (SAN). Backup, archiving, and recovery are all easier and faster in
this context.
Cloud Computing
On
Organizations no longer need to own, maintain, and operate their own computing infrastructure.
Everything from computing power to computing infrastructure, apps, business processes, and human
collaboration may now be supplied as a service wherever and whenever needed. The "cloud" in cloud
computing refers to the combination of hardware, networks, storage, services, and interfaces that
enable computing as a service to be delivered. Software, infrastructure, and storage are delivered
through the Internet (either as discrete components or as a whole platform) based on user demand.
ty
There are three types of cloud computing: private cloud, public cloud, and hybrid cloud. Services are
delivered "as a service" over the Internet with little or no control over the underlying technology
infrastructure with public clouds. Private clouds provide activities and functions "as a service," but
si
they're delivered through an intranet or a hosted data centre. Hybrid clouds bring the best of both
public and private clouds together. Activities and tasks are assigned to private or public clouds as
needed in this situation.
er
Cloud computing is still in the early stages of development. The cloud computing approach has a
variety of advantages, according to proponents. First, while using the cloud, the available resources
can be scaled up or down dependent on demand. The cloud is scalable because of this capacity,
known as elasticity, which allows it to scale up during moments of high demand and scale down
during periods of low demand. Cloud-based applications may scale up when more users are added
iv
and the application's requirements alter. Second, cloud consumers can access cloud resources in a
simple manner. The cloud service provider is contracted for a specific amount of compute, storage,
software, process, or other resources.
Un
In many cases, the application architecture is simply defined by the technological environment needs
as dictated by the business requirements. In this example, the option is clear: Other concerns take a
back seat to business needs. The business requirements may, for example, state that the system
must work via the Internet, using the customer's Web browser. The application architecture in this
situation must be thin client–server. These kind of business needs are most commonly found in
ity
systems that service external clients. Internal systems may enforce business requirements as well,
but they are usually less stringent.
If the technical environment does not necessitate the selection of a specific architecture, the
nonfunctional criteria become more essential. Even though the architecture is driven by business
requirements, it is still necessary to work through and refine the remaining nonfunctional requirements
m
because they are crucial in the design and implementation phases. The link between needs and
recommended architectures is summarised in Figure 8-10.
)A
(c
e
lin
On
ty
si
er
iv
Depending on the architecture and design of the system(s) with which the system must integrate,
system integration requirements may lead to one architecture over another. If the system must
interface with a desktop system (e.g., Excel), a thin or thick client–server architecture may be stated,
or if it must integrate with a server-based system, a server–based design may be suggested. Because
it is easier to write for Web-based standards (e.g., HTML, XML) that extend the reach of the system to
other platforms than it is to write and rewrite extensive presentation logic for different platforms in the
server-based, client-based, or thick client–server architectures, thin client–server architectures are
ity
best suited for systems with extensive portability requirements. Because of the necessity to reinstall
software on the desktops, client-based or thick client–server architectures may not be well suited to
systems with high maintainability needs.
Performance Expectations
m
Client–server architectures are ideally suited to information systems with high performance needs in
general. Client–server architectures are more scalable, which means they can adapt to changing
capacity requirements and allow the business to better adjust the hardware to the system's speed
requirements. Client–server designs with several servers in each tier should be more dependable and
)A
available, as requests are simply transferred to other servers if one fails, and users may not even
notice (although response time may be worse) However, in actuality, reliability and availability are
highly dependent on the hardware and operating system, and Windows-based computers are less
reliable and available than Linux or mainframe computers.
Security Prerequisites
(c
In general, server-based designs are more secure than microcomputer-based architectures since all
software is stored in one area and mainframe operating systems are more secure than
microcomputer operating systems. As a result, even if the mainframe is employed as a server in a
client–server architecture, high-value systems are more likely to be found on mainframe computers.
Authentication and encryption technologies for Internet-based client–server architectures are more
e
advanced than those for mainframe-based server–based systems in today's Internet-dominated
world. Viruses pose a threat to all architectures due to their ease of spread on desktop computers.
However, the server-based zero client computing architecture eliminates software on the client
lin
device, resulting in a malware-free environment.
The ability to segregate presentation logic from application logic and data becomes increasingly vital
as cultural and political requirements grow more relevant. It's easier to develop display logic in
On
different languages while keeping the application logic and data the same with this separation. It also
allows customising the presentation logic for different users and changing it to better fit cultural
conventions much easier. The presentation logic makes it easier to develop alternative versions that
enable or disable different capabilities required by laws and regulations in different countries to the
extent that it offers access to the application and data. Thin client–server designs make this
separation the easiest, thus systems with a lot of cultural and political needs frequently adopt them.
Legal requirements, like system integration requirements, have varying degrees of influence
ty
depending on the nature of the needs, but client-based systems are generally less adaptable.
si
It is a database design strategy that aids in describing the relationship between distinct organisational
components.
The symbols used in the E-R model and their meanings are listed in the table below:
er
iv
Un
ity
m
)A
(c
e
lin
On
ty
si
er
iv
Un
ity
m
)A
ENTITY: It identifies different real-world objects in a programme. Vendor, item, student, course,
(c
e
is established.
ATTRIBUTES: It defines the characteristics of a relationship. Vendor code, for example, or student
lin
name.
One-to-one, one-to-many, and many-to-many relationships can occur between two collections of data.
On
During the design phase, you can start selecting and purchasing the hardware and software that will
be required for the future system. In many circumstances, the new system will simply run on the
organization's existing equipment. New hardware and software (typically for servers) must be
purchased at other times. The hardware and software specification is a document that outlines the
hardware and software requirements for running the application. The document's creation entails a
number of processes. A sample hardware and software specification is shown in Figure 8-11.
ty
To begin, you'll need to identify the programme that will be installed on each component. The
operating system (e.g., Windows, Linux) is usually the first step, followed by any special purpose
software on the client and server (e.g., Oracle database). Any additional expenditures, such as
technical training, maintenance, extended warranties, and licencing agreements, should be factored
in here (e.g., a site licence for a software package). Again, decisions made throughout the previous
si
design phase tasks have an impact on the needs you identify.
The next step is to make a list of the hardware that will be required to support the future system.
er
Database servers, network servers, peripheral devices (e.g., printers, scanners), backup devices,
storage components, and any other hardware component required to support an application are all on
the list. You should also make a note of the quantity of each item that will be required at this time.
Finally, you must specify the minimal requirements for each piece of hardware in as much detail as
iv
feasible. Because many businesses have standard lists of permitted hardware and software that must
be utilised, this step is often as simple as selecting items from the lists. When the team is working in
unfamiliar area, however, they are not limited to selecting from a pre-approved list. The project team
must communicate needs such as processing capacity, storage space, and any particular features
Un
With practice, this stage will get easier; however, there are certain pointers that can assist you in
describing hardware requirements (see Figure 8-12). Consider the hardware standards in place inside
the company or those advised by vendors. Consult with experienced system developers or firms that
have developed similar systems. Finally, consider the elements that influence hardware performance,
such as user reaction times, data volumes, software memory needs, the number of people accessing
the system, the number of external connections, and future growth estimates.
e
lin
On
ty
si
er
The project team collaborates with the purchasing department to obtain the hardware and software
after preparing the hardware and software requirements. The project team creates an RFP based on
iv
the purchasing department's legal and organisational policies, which is subsequently issued. On the
basis of the proposals obtained, the project team selects the most suitable vendor for the hardware
and software, possibly utilising a weighted alternative matrix. This review might take months on a
large project and requires comprehensive testing and benchmarking of the vendors' projects. The
Un
buying department is involved in the vendor selection process, ensuring that company policies are
followed once again. Finally, subject to project team approval, the buying department negotiates final
terms with the vendor, issues a contract, and accepts delivery of the items.
Database design refers to a set of procedures that make it easier to plan, create, implement, and
maintain enterprise data management systems. A well-designed database is simple to manage,
ity
increases data consistency, and saves money on disc storage space. The database designer
determines how data items relate to one another and what information must be saved.
The primary goals of database design in DBMS are to create logical and physical models of the
database system under consideration.
m
The logical model focuses on the data requirements and data to be stored without regard to physical
constraints. It is unconcerned with how the data will be saved or where it will be physically stored.
)A
The physical data design approach entails converting the database's logical DB design to physical
media utilising hardware and software such as database management systems (DBMS).
It's worth noting that a database's genius lies in its design. SQL data operations are straightforward.
e
The life cycle of a database
lin
On
ty
When designing database systems, the database development life cycle comprises a number of
stages that must be followed.
The steps in the development life cycle do not have to be followed in a strict chronological order.
si
On small database systems, the database design process is usually extremely straightforward and
does not require many phases.
er
Let's take a closer look at the various components provided in each phase to get a better
understanding of the design process in DBMS.
Planning - The planning of the complete Database Development Life Cycle is the focus of this stage
of database design concepts. It takes into account the organization's Information Systems strategy.
The scope and boundaries of the proposed database system are defined in this step.
Un
Creating a database
The logical model is involved with the creation of a database model based on needs. The entire
design is based on paper, with no physical implementations or database management system
considerations.
Physical model — Taking into account the DBMS and physical implementation elements, this stage
ity
Implementation
This step of relational database architecture is focused with importing and translating data from the
old system into the new database.
m
Testing - this stage focuses on identifying faults in the newly installed system. It compares the
database to the set of requirements.
)A
Normalization
Modeling of ER
(c
e
design is one that reduces the amount of complexity and money spent on software development.
Coupling and cohesion are two essential ideas in system development that aid in defining the
lin
complexity of a system.
Coupling
The measure of component independence is coupling. It specifies the degree to which each system
development module is dependent on the others. In practise, this means that the more tightly a
On
system's components are coupled, the more difficult it is to implement and maintain the system.
Each module should have simple, clean interface with other modules, and that the minimum number
of data elements should be shared between modules.
High Coupling
ty
These type of systems have interconnections with program units dependent on each other. Changes
to one subsystem leads to high impact on the other subsystem.
si
er
iv
Un
Low Coupling
ity
These systems are made up of components that are self-contained or almost self-contained. A
change in one subsystem has no impact on the others.
m
)A
(c
e
lin
On
Coupling Measures
ty
Content Coupling − When one component genuinely modifies another, the modified component is
fully reliant on the modifying one.
Common Coupling − When the degree of coupling is decreased by structuring system design so that
si
data is available from a common data store, this is referred to as common coupling.
Control Coupling − When one component passes parameters to influence the activity of another
component, this is known as control coupling.
er
Stamp Coupling − When data structures are utilised to convey information from one component to
another, this is known as stamp coupling.
iv
Data Coupling When only data is transmitted, this coupling connects the components.
Cohesion
Un
The term "cohesion" refers to the closeness of a system's components' relationships. It specifies the
degree to which the components of a module are interdependent. In reality, this means that the
systems designer must avoid dividing critical processes into fragmented modules.
They don't group unrelated processes into useless modules that are shown as processes on the DFD.
Modules that are functionally coherent are the best. The modules that are coincidentally coherent are
the worst.
ity
A component with coincidental cohesiveness has elements that are unconnected to one another.
When numerous conceptually linked functions or data pieces are placed in the same component, it is
m
When a component used to establish a system or set variables performs numerous functions in a
sequence, but the functions are related by the timing involved, this is known as temporal cohesion.
)A
When functions are placed together in a component solely to ensure this order, this is known as
procedural cohesion.
When the output of one portion of a component is used as the input for the next section of the
component, this is known as sequential cohesion.
(c
Check your Understanding
e
1. _______________ is the process of merging packaged software, existing legacy systems, and new
software designed to integrate them to create new systems.
lin
2. The term ___________ refers to an abstract representation of a system's data flow, inputs, and
outputs.
3. ____________ are logical structures that organise facts by using ordered levels.
On
4. The purpose of ___________ is to quickly and readily acquire reliable data for the system.
6. The software and _________ are the two most important architectural components of any system.
7. _______________ have microcomputers on a local area network as clients and a server computer
on the same network as the server.
ty
8. Database design refers to a set of procedures that make it easier to plan, create, implement, and
maintain enterprise ____________ systems.
si
9. __________ specifies the degree to which the components of a module are interdependent.
Summary
er
• There are three main approaches to approach the design of a new system: (1) create a
custom application in-house; (2) purchase a packaged system and (potentially) customise it;
or (3) have the system built or provided by an external vendor, developer, or service provider.
iv
• The term "logical design" refers to an abstract representation of a system's data flow, inputs,
and outputs. It describes the inputs (sources), outputs (destinations), databases (data
storage), and procedures (data flows) in a user-friendly format.
Un
• Physical design refers to the system's real input and output operations. It focuses on how
data is entered into a system, validated, processed, and outputted.
• Input mechanisms make it easier to enter data into a computer system, whether it's highly
structured data like order information (item numbers, quantities, and costs) or unstructured
data like text (e.g., comments). Input design include the creation of displays for entering data
as well as any forms on which users write or type data (e.g., time cards, expense claims).
• Check boxes, radio buttons, on-screen list boxes, drop-down list boxes, combo boxes, and
ity
scroll bars are the six most frequent types of selection boxes.
• The reports that the system generates, whether on the screen, on paper, or in other media
such as the Web, are known as outputs. Because one of the key reasons for utilising an
information system is to access the information it creates, outputs are likely the most apparent
aspect of any system.
•
m
The goal of architecture design is to figure out how the information system software
components will be assigned to the system's hardware units.
• There are four basic functions that all software systems have. The first is the storing of data,
the second role is data access logic, the application logic, which is described in DFDs, use
)A
cases, and functional requirements, is the third function and the fourth function is presentation
logic.
• There are three types of cloud computing: private cloud, public cloud, and hybrid cloud.
• Entity Relationship Model is a database design strategy that aids in describing the
relationship between distinct organisational components.
• The hardware and software specification is a document that outlines the hardware and
(c
e
saved.
• Coupling and cohesion are two essential ideas in system development that aid in defining the
complexity of a system.
lin
Activity
On
1. Explain the role of entity relationship diagrams.
2. Prepare a report on different types of system design and how logical design differs from physical
design.
Glossary
ty
• System design- Systems design is the process of defining the architecture, product design,
modules, interfaces, and data for a system to satisfy specified requirements. Systems design
could be seen as the application of systems theory to product development
• si
Packaged software- Packaged software that is often called software package is a commercial
program that's obtainable to the general public and sold to them at explicit costs.
Outsourcing- obtain (goods or a service) by contract from an outside supplier.
er
• Logical design- A logical design is a conceptual, abstract design. ... The process of logical
design involves arranging data into a series of logical relationships called entities and
attributes.
• Physical design- In integrated circuit design, physical design is a step in the standard design
iv
• Input design- Input Design is the process of converting a user-oriented description of the input
into a computer-based system.
Un
• Output design- Design outputs are the work produced at the end of design efforts, such as
drawings, material specifications, or manufacturing instructions
• Architectural design- Architectural design is a discipline that focuses on covering and meeting
the needs and demands, to create living spaces, using certain tools and especially, creativity.
ity
• Warehouse- a large building where raw materials or manufactured goods may be stored prior
to their distribution for sale.
• Cloud computing- the practice of using a network of remote servers hosted on the internet to
store, manage, and process data, rather than a local server or a personal computer.
version of something, including virtual computer hardware platforms, storage devices, and
computer network resources.
e
managed, modified, updated, controlled, and organized.
lin
Questions and Exercises
On
2. Explain the input and output for the system design.
ty
6. What are the various factors affecting system complexity?
Further Readings
• si
Bentley, Lonnie D., Kevin C. Dittman, and Jeffrey L. Whitten. System analysis and design
er
methods. (1986, 1997, 2004).
• Hawryszkiewycz, Igor T. Introduction to system analysis and design. Prentice-Hall PTR, 1994
iv
1. Systems integration
Un
2. "logical design"
3. Hierarchies
4. input design
ity
5. selection box
6. hardware
7. Client-based architectures
m
8. data management
9. Cohesion
)A
Learning Objectives:
(c
e
• Comprehend the meaning of system test
• Know about acceptance test
lin
3.1.1 Understanding the Role of Testing
Writing programmes is a creative and enjoyable activity. Novice programmers are more likely to
become engrossed in the development of the programmes themselves, than than the tasks of testing
and documenting their work. Because testing and documenting aren't as enjoyable as building
On
programmes, they get less attention.
Programming and testing, on the other hand, are extremely comparable to writing and editing. After
the first draught, no professional writer (or serious student preparing an essential term paper) would
stop. The characteristic of successful writing is rereading, editing, and rewriting the initial draught into
a strong paper. Professional software developers, too, are known for their meticulous testing. Most
professional organisations spend more time and money on testing (as well as editing and retesting)
than they do on actually building the programmes.
ty
The substantial expenses associated with downtime and failures caused by software vulnerabilities
justify the attention paid to testing. It is estimated that software problems cost the US economy $59.5
billion each year. A significant issue that causes an hour of downtime can cost more than a
si
programmer's annual salary—yet how often are bugs discovered and corrected in an hour? As a
result, testing is a type of insurance. Organizations are ready to invest a significant amount of effort
and money to avoid serious system failures once the system has been established. Figure 12-1
shows some predicted revenue losses for a variety of companies that would be unable to run without
er
computer technology.
A software is not deemed complete until it has successfully completed its testing. As a result,
programming and testing are inextricably linked. As the system is being built, the systems analysts'
major focus is typically testing. Analysts must, however, avoid the desire to jump right into testing
iv
after the first programme module is finished. Spontaneously testing different events and possibilities
without spending time to develop a comprehensive test plan is dangerous, because important tests
may be overlooked. If an error does occur, it may be difficult to reproduce the exact sequence of
Un
events that cause it. Instead, testing must be performed and documented systematically so that the
project team always knows what has and has not been tested.
ity
m
)A
The sections that follow detail a variety of tests that must be completed before the new system may
be installed. Until the system is finally tested for user approval, each sort of test verifies distinct
features and/or scope of the system.
(c
e
for each test in the plan. Each test has a distinct aim, describes a set of very precise test scenarios to
investigate, and specifies the expected and observed findings. The test objective is derived from the
programme specification or the source code of the programme. Assume that the order quantity must
lin
be between 10 and 100 cases, as specified in the programme specification. Before the system
accepts the quantity, the tester would create a set of test cases to confirm that it is legitimate.
There are simply too many different possibilities to test every single combination of input and
situation. The test requires a minimum of three test cases in this example of an order quantity that
On
must be between 10 and 100 examples: one with a valid value (e.g., 15), one with an invalid value
that is too low (e.g., 7) and one with an invalid value that is too high (e.g., 10). (e.g., 110). To verify
that the data types were validated, most tests would contain a test case with a non-numeric value
(e.g., ABCD). A truly effective test would include a nonsensical but perhaps valid data example (e.g.,
21.4).
In some circumstances, test cases cannot be completed by entering data values; instead, they must
be completed by selecting specific commands or menu options. For this form of test, the script field on
ty
the test plan is used to define the sequence of keystrokes or mouse clicks and movements.
Because not all software modules are likely to be completed at the same time, the programmer
frequently creates stubs for the unfinished modules in order to test the modules around them. A stub
si
is a placeholder for a module that, when selected, usually displays a short test message on the
screen or returns a hardcoded value5. Consider an application system that offers the following five
standard functions for data items like customers, automobiles, or employees: creating, changing,
deleting, finding, and printing (whether on the screen or on a printer). Each of these functions might
er
be a separate module that needs to be tested, and printing itself could be split into two modules, one
for an on-screen list and the other for the printer (Figure 12-3).
Assume the main menu module in Figure 12-3 is finished. Because the main menu's job is to browse
to the other modules, it would be hard to test it properly without them. A stub would be written for
iv
each of the other modules in this situation. When these stubs were triggered, they would merely
display a message on the screen (e.g., "Delete item module reached"). As a result, before the other
modules were finished, the main menu module could pass module testing.
Un
ity
m
)A
(c
e
lin
On
ty
si
er
iv
Un
Unit tests, integration tests, system tests, and acceptance tests are the four stages of testing. Despite
the fact that each application system is unique, the majority of faults are discovered during integration
and system testing (Figure 12-4).
ity
m
)A
(c
e
lin
On
ty
si
er
iv
Un
ity
m
Unit tests focus on a single unit—a programme or a software module that can be tested and performs
a specified function. A unit test's goal is to confirm that the module or programme does what it's
supposed to do according to the programme specification. After the programmer has developed and
tested the code and believes it is error-free, unit testing is undertaken. These tests are solely
dependent on the programme specification, and they may uncover problems caused by a
programmer's misreading of the specifications. The systems analyst or, in certain cases, the
(c
e
this case: Each item in the programme specification is turned into a test, with multiple test cases
created for it. White-box testing is used when the tester wishes to look at the actual computer code,
which is frequently the case when the complexity is considerable.
lin
3.1.4 Integration Tests
Integration tests determine if a group of modules or programmes that must function together are able
to do so without errors. They make sure that all of the system's interfaces and linkages are working
properly. The modules have passed their respective unit tests at this point, so the focus is now on the
On
flow of control and data exchanged among them. Integration testing is similar to unit testing in that the
tester creates a test plan that includes a sequence of tests. A group of programmers and/or systems
analysts is often in charge of integration testing.
User interface testing, use scenario testing, data flow testing, and system interface testing are the four
techniques of integration testing. (See Figure 12-5 for further information.) All four methodologies are
used in the majority of projects.
ty
3.1.5 System Tests
Systems analysts typically conduct system tests to ensure that all modules and programmes function
together flawlessly. System testing is comparable to integration testing, however it covers a much
si
larger area. System tests look at how well the system meets business requirements, as well as its
usability, security, and performance under heavy load. Whereas integration testing looks at whether
the modules work together without errors, system testing looks at how well the system meets
er
business requirements, as well as its usability, security, and performance under heavy load (see
Figure 12-5). It also checks the documentation for the system.
iv
Un
ity
m
)A
(c
e
lin
On
ty
si
er
iv
Un
ity
m
)A
Acceptance testing is primarily done by users, with assistance from the project team. The purpose is
(c
to ensure that the system is complete, that it fits the business needs that inspired its development,
and that it is acceptable to the users. Acceptance testing is divided into two stages: alpha testing, in
which users test the system with fictitious data, and beta testing, in which users start using the system
with real data while closely monitoring it for faults. (See Figure 12-5 for further information.)
The acceptance testing experiences will have a considerable impact on the users' opinions of the new
technology. Because first impressions are difficult to change, analysts should make every effort to
e
guarantee that acceptance testing takes place only after thorough (and successful) system testing.
Furthermore, it will be critical to listen to and respond to user feedback in order to shape a favourable
reaction to and adoption of the new system by users.
lin
Check your Understanding
On
2._______________ , use scenario testing, data flow testing, and system interface testing are the four
techniques of integration testing.
3. Acceptance testing is divided into two stages:_____________ , in which users test the system with
fictitious data, and_______________ , in which users start using the system with real data while
closely monitoring it for faults.
ty
4. Unit tests, integration tests, _____________ , and acceptance tests are the four stages of testing.
5. ______________ determine if a group of modules or programmes that must function together are
able to do so without errors.
Summary si
er
• Testing begins with the tester creating a test plan that outlines a sequence of tests to be
carried out.
• A test plan typically has 20 to 30 pages, with one page for each test in the plan. Each test has
iv
a distinct aim, describes a set of very precise test scenarios to investigate, and specifies the
expected and observed findings. The test objective is derived from the programme
specification or the source code of the programme.
• Unit tests, integration tests, system tests, and acceptance tests are the four stages of testing.
Un
• Unit tests focus on a single unit—a programme or a software module that can be tested and
performs a specified function. A unit test's goal is to confirm that the module or programme
does what it's supposed to do according to the programme specification. After the
programmer has developed and tested the code and believes it is error-free, unit testing is
undertaken.
• Integration tests determine if a group of modules or programmes that must function together
are able to do so without errors. They make sure that all of the system's interfaces and
ity
Activity
)A
Glossary
(c
System test- System testing is testing conducted on a complete integrated system to evaluate the
system's compliance with its specified requirements
Acceptance tests- In engineering and its various subdisciplines, acceptance testing is a test
conducted to determine if the requirements of a specification or contract are met
e
Integration tests- Integration testing is the phase in software testing in which individual software
modules are combined and tested as a group.
lin
Unit tests- In computer programming, unit testing is a software testing method by which individual
units of source code—sets of one or more computer program modules together with associated
control data, usage procedures, and operating procedures—are tested to determine whether they are
fit for use.
On
Analyst- a person who conducts analysis.
Interface- a point where two systems, subjects, organizations, etc. meet and interact.
ty
1. What do you understand by test planning?
si
3. Define integration test briefly.
1. white-box
ity
4. system tests
m
5. Integration tests
)A
Learning Objectives:
(c
e
4.1.1 What is Software Quality
lin
Software quality does not have a common definition. This is due to the complexity created by the
three or more parties who are influenced by software quality, namely the client, the developer, and the
stakeholders. Whose opinions, expectations, and desires are to be deemed ultimate is the question.
Customer happiness, according to the majority, should be the benchmark for judging software quality.
However, the consumer may be satisfied with software that isn't up to par by other standards.
On
The following criteria are used to define software quality:
ty
.• Compliance with development criteria
Customer satisfaction is mostly determined by the ability to meet functional and performance
objectives as well as the ease with which activities may be carried out. Following development
si
standards guarantees that these objectives are met to a large extent.
Software quality is described as the ability to satisfy customers by providing all client deliverables in
terms of performance, standards, and ease of use. The definition can be used to both software and a
er
generic software product.
We would expect all manufacturers of goods and services to be concerned about quality. However,
software's unique properties, particularly its intangibility and complexity, necessitate special
considerations.
Un
Increasing software criticality: The end user or customer is naturally concerned about the overall
quality of software, particularly its dependability. This is becoming more of a problem as businesses
become more reliant on their computer systems, and software is more used in safety-critical areas. To
control aircraft, for example.
The intangibility of software makes it difficult to determine whether a project's task has been done
satisfactorily. The outcomes of these tasks can be made tangible by requiring developers to create
'deliverables' that can be checked for quality.
ity
Accumulating errors during software development: Since computer system development is a series of
processes in which the output from one level is fed into the next, errors in earlier?deliverables? will be
added to errors in subsequent levels, resulting in cumulative determinable impacts. In general, the
later in a project an error is discovered, the more costly it is to correct. Furthermore, because the
m
quantity of mistakes in the system is unpredictable, controlling the debugging phases of a project is
extremely difficult.
Software quality assurance is a planned and systematic set of operations that ensures that an item or
product complies with established technical specifications.
A series of actions aimed at calculating the development or manufacturing process for products.
e
• Control over the documentation of software and the changes that are made to it.
• A technique for ensuring that software development standards are followed.
• Mechanisms for measuring and reporting
lin
SQA-related activities
Software quality assurance is made up of a number of functions that are divided into two groups.
Software engineers who perform technical work, as well as a SQA group in charge of quality
On
assurance planning, record keeping, analysis, and reporting.
➢ Prepares a project's SQA plan: During project planning, the programme is created and
reviewed by all stakeholders. The plan oversees the software engineering team and the SQA
group's quality assurance actions.
➢ The plan specifies the calculations to be carried out, audits and reviews to be carried out,
ty
project-specific standards, error reporting and tracking methodologies, documentation to be
created by the SQA team, and the quantity of feedback to be given to the software project
team.
➢ Participates in the development of the software process description for the project: For the
si
task to be done, the software team chooses a procedure. The SQA team examines the
process description for conformance to organisational policy, internal software standards,
externally enforced standards (such as ISO-9001), and other aspects of the software project
plan.
er
➢ Examines software engineering activities to ensure adherence to the software process: The
SQA team detects, reports, and tracks process irregularities, as well as ensuring that
remedies have been made.
➢ Verifies conformity with those defined as part of the software process by auditing designated
iv
software work products: The SQA team examines selected work items, detects, documents,
and tracks deviations, verifies that changes have been made, and delivers its findings to the
project manager on a regular basis.
➢ Ensures that variations in software work and work products are documented and dealt with in
Un
Software testing is the process of validating and verifying the artefacts and behaviour of the software
under test. Software testing can also give a corporation with an objective, unbiased picture of the
software, allowing them to grasp and comprehend the risks associated with software implementation.
➢ Analyzing product requirements for completeness and correctness in many settings such as
industry perspective, business perspective, feasibility and viability of implementation,
usability, performance, security, infrastructure considerations, and so on are examples of test
approaches.
ity
➢ working with product developers on improving coding techniques, design patterns, and tests
that can be produced as part of code based on various techniques such as boundary
conditions, etc. reviewing the product architecture and general design of the product
➢ evaluating behaviour by running a programme or application
➢ reviewing the deployment infrastructure and accompanying scripts & automation, and
m
Software testing can give users or sponsors with objective, impartial information about the quality of
software and the risk of failure.
)A
In software testing, there are a variety of ways to choose from. Static testing is defined as reviews,
walkthroughs, or inspections, whereas dynamic testing is defined as the execution of programmed
(c
e
software is run, dynamic testing takes place. Dynamic testing can start before the programme is
completely finished to test specific pieces of code, and it is applied to discrete functions or modules.
Stubs/drivers or execution from a debugger environment are common techniques for these.
lin
Verification is part of static testing, while validation is part of dynamic testing.
Passive testing entails observing system behaviour without having to engage with the software. In
contrast to active testing, testers examine system logs and traces rather than providing test data. In
order to make decisions, they look for patterns and specific behaviour. This is related to log analysis
On
and offline runtime verification.
Exploratory testing is a method of software testing that entails learning, designing, and executing tests
all at the same time. "A style of software testing that emphasises the personal freedom and
responsibility of the individual tester to continually optimise the quality of his/her work by treating test-
ty
related learning, test design, test execution, and test result interpretation as mutually supportive
activities that run in parallel throughout the project," according to Cem Kaner, who coined the term in
1984.
si
White-box and black-box testing are two types of software testing approaches. These two ways are
used to explain the tester's point of view when creating test cases. Grey-box testing is a hybrid
er
approach to software testing methodology that can be used. This "arbitrary distinction" between black-
and white-box testing has diminished considerably as the concept of grey-box testing—which derives
tests from specific design elements—has gained traction.
White-box testing (also known as clear box testing, glass box testing, transparent box testing, and
structural testing) evaluates a program's internal structures or workings rather than the functionality
that is visible to the end user. In white-box testing, test cases are created using an internal
Un
perspective of the system (the source code) and programming skills. The tester selects inputs in order
to exercise code routes and find appropriate outcomes. In-circuit testing, for example, is similar to
testing nodes in a circuit (ICT).
White-box testing can be used at the unit, integration, and system stages of the software testing
process, but it is most commonly used at the unit level. [21] During a system–level test, it can test
paths within a unit, paths between units during integration, and paths between subsystems. Though
ity
this technique of test design can find numerous faults or problems, it may miss elements of the
specification that haven't been implemented or criteria that haven't been met.
• API testing is putting the app through its paces utilising public and private APIs (application
m
programming interfaces)
• Code coverage — writing tests to meet certain code coverage criteria (e.g., the test designer
can create tests to cause all statements in the programme to be executed at least once)
• Intentionally introducing defects to test the usefulness of testing procedures is known as fault
)A
injection.
• Methods of mutation testing
• Methods of static testing
Code coverage tools can assess the completeness of any test suite, including black-box testing, using
any approach. This allows the software team to analyse aspects of a system that are rarely tested
(c
while also ensuring that the most critical functions are tested. As a software metric, code coverage
can be expressed as a percentage for:
➢ Function coverage is a metric that measures how many times a function has been executed.
➢ The number of lines executed to fulfil the test is reported as statement coverage.
➢ Decision coverage is a metric that shows whether both the True and False branches of a test
e
have been run.
lin
In terms of control flow, 100% statement coverage assures that all code routes or branches are
executed at least once. This is helpful in assuring proper operation, but it isn't enough because the
same code can handle various inputs appropriately or badly. Functions and methods that are covered
but not specified are known as pseudo-tested (it is possible to remove their body without breaking any
test case).
On
Black-box testing
Black-box testing (also known as functional testing) examines software functionality without knowing
how it is implemented internally and without seeing the source code. The testers only know what the
software should do, not how it should do it. Equivalence partitioning, boundary value analysis, all-
pairs testing, state transition tables, decision table testing, fuzz testing, model-based testing, use case
ty
testing, exploratory testing, and specification-based testing are all examples of black-box testing
techniques.
The goal of specification-based testing is to ensure that software meets the applicable requirements.
This level of testing typically necessitates providing detailed test cases to the tester, who may then
si
simply check that the output value (or behaviour) for a given input "is" or "is not" the same as the
expected value indicated in the test case. Specifications and requirements, or what the application is
supposed to do, are used to create test cases. It derives test cases from external descriptions of the
er
software, such as specifications, requirements, and designs. These tests might be functional or non-
functional, however functional tests are more common.
The black box technique has the advantage of requiring minimal programming experience. The tester
is likely to have a different set of biases than the programmers and may focus on various aspects of
functionality. Black-box testing, on the other hand, has been described as "walking through a dark
Un
maze without a flashlight." Because they don't look at the source code, a tester may write a lot of test
cases to verify something that could have been checked with just one, or they may leave some
aspects of the programme untested.
This test method can be used at all stages of software testing, including unit, integration, system, and
acceptability testing. It often encompasses most, if not all, higher-level testing, although it can also
dominate unit testing.
ity
Component interface testing is a type of black-box testing that focuses on data values rather than just
the subsystem component's operations. Beyond comprehensive integration testing between those
units, component interface testing can be used to evaluate the handling of data sent between distinct
m
units, or subsystem components. The data being transmitted can be thought of as "message
packets," and the range or data types can be examined and tested for authenticity before being
passed into another unit for data generated by one unit. One approach for interface testing is to keep
a separate log file of data items exchanged, frequently with a timestamp noted, to allow examination
)A
of thousands of cases of data passed between units over the course of days or weeks. Checking the
processing of some extreme data values when other interface variables are supplied as regular
values is one example of a test. Unusual data values in an interface can assist explain why the next
unit performed poorly.
Visual evaluation
(c
The goal of visual testing is to give developers the ability to investigate what happened at the time of
software failure by displaying the data in such a way that they can readily discover the information
they need and that it is expressed clearly.
The premise behind visual testing is that showing someone an issue (or a test failure) rather than
simply articulating it boosts clarity and understanding significantly. As a result, visual testing
necessitates filming the whole test process — capturing everything that happens on the test system in
e
video format. Real-time tester input via picture-in-picture camera and audio commentary from
microphones are augmented by output videos.
lin
Visual assessment has a variety of benefits. Because testers can show the developer the problem
(and the events leading up to it) rather than just describe it, the quality of communication improves
dramatically, and the need to reproduce test failures disappears in many circumstances. The
developer will have all of the proof she or he needs of a test failure, allowing them to focus on the root
On
of the problem and how to remedy it.
Ad hoc testing and exploratory testing are key approaches for ensuring software integrity since they
involve less setup time and allow for faster detection of critical defects. The capacity of the tester(s) to
base testing on defined techniques and then invent versions of those tests might result in a more
thorough investigation of defect solutions in ad hoc testing, where testing takes place in an
improvised, spontaneous manner. One of the limitations of ad hoc testing is its lack of reproducibility
unless adequate documentation of the methods is maintained.
ty
Grey-box testing
Grey-box testing (American spelling: gray-box testing) entails understanding internal data structures
si
and algorithms in order to build tests that are executed at the user, or black-box, level. "The source
code and the executable binary" are frequently available to the tester. Reverse engineering (using
dynamic code analysis) may also be used in grey-box testing to discover boundary values or error
messages, for example. Manipulation of input data and output formatting do not qualify as grey-
er
boxing because the input and output are obviously outside the "black box" that we are referring to as
the system under test. When conducting integration testing between two modules of code authored by
two different developers, where just the interfaces are exposed, this distinction is especially essential.
The tester makes better-informed testing choices when testing the software from the outside by
iv
understanding the fundamental concepts of how the software works. A grey-box tester is usually
allowed to set up an isolated testing environment and do tasks like seeding a database. After taking
particular operations, such as executing SQL statements against the database and then conducting
queries to check that the intended changes have been reflected, the tester can examine the state of
Un
the product being tested. Grey-box testing uses minimal information to create intelligent test
scenarios. This will be especially true when dealing with data types, exceptions, and other similar
issues.
Testing kinds, software testing methodologies, and approaches are all designations and ways of
ity
organising testing.
Before they may be utilised for their intended purpose, most software systems require installation
procedures. Installation testing is the process of putting these methods to the test in order to have a
m
A lack of compatibility with other application software, operating systems (or operating system
versions, old or new), or target environments that differ considerably from the original is a typical
cause of software failure (actual or perceived) (such as a terminal or GUI application intended to be
run on the desktop now being required to become a Web application, which must render in a Web
browser). For example, a lack of backward compatibility might occur when programmers exclusively
write and test software on the most recent version of the target environment, which not all users may
(c
be operating.
As a result, the latest work may not work on older versions of the target environment, or on older
technology that previous versions of the target environment could use. Such problems can
occasionally be resolved by separating operating system functions into a distinct application module
or library.
e
Testing for sanity and smoke
lin
Sanity testing determines whether or not further testing is appropriate.
Smoke testing is making only rudimentary attempts to use the software in order to see whether there
are any fundamental issues that will prohibit it from operating at all. These tests can be used to verify
the build.
On
Regression testing
After a big code change, regression testing focuses on detecting problems. It aims to find software
regressions, such as deteriorated or missing functionalities, as well as existing bugs that have
reappeared. When software functionality that was previously working correctly ceases working as
planned, a regression occurs. Regressions typically emerge as an unintentional consequence of
software modifications, when freshly developed code collides with previously existing code. Due to
ty
the countless intricacies in earlier software features, regression testing is often the largest test effort in
commercial software development, and even new software can be built while leveraging certain old
test cases to test parts of the new design to guarantee prior functionality is still maintained.
Regression testing commonly entails re-running prior sets of test cases to see if previously corrected
si
flaws have reappeared. The extent of testing is determined by the stage of the release process as
well as the risk of the new features. They can be thorough, consisting of positive tests on each
feature, if the changes are made late in the release or are regarded to be high risk, or they can be
er
very shallow, consisting of only positive tests on each feature, if the changes are made early in the
release or are deemed to be low risk. It's critical to establish strong assertions on existing behaviour
when performing regression testing. Automatic test amplification can be used to generate and add
new assertions to existing test cases for this purpose.
iv
Acceptance testing
Prior to further testing, such as integration or regression, a smoke test is used as a build acceptance
test.
User acceptability testing is customer acceptance testing that takes place in their lab environment on
their own gear (UAT). Acceptance testing can be done throughout the hand-off procedure between
any two development phases.
Alpha testing
ity
At the developers' location, alpha testing is simulated or genuine operational testing by future
users/customers or an independent test team. Before going to beta testing, off-the-shelf software is
frequently put through alpha testing as a type of internal acceptance testing.
m
Beta testing
Beta testing is a type of external user acceptance testing that occurs after alpha testing. Beta versions
of software are distributed to a select group of people who are not part of the programming team and
are known as beta testers. The programme is sent to groups of people in order to ensure that there
)A
are minimal flaws or defects in the final product. Beta versions can be made available to the general
public to expand the number of future consumers who can provide input and to give value sooner, for
a longer or even unlimited amount of time (perpetual beta)
Functional testing is a set of actions that check a code's ability to perform a certain activity or function.
Although some development techniques work from use cases or user stories, these are frequently
found in the coding requirements documentation. Functional tests are used to answer questions like
"can the user do this?" and "does this feature work?"
e
Non-functional testing covers features of software that aren't directly tied to a specific function or user
action, such as scalability or other performance, behaviour under limitations, or security. Testing will
lin
identify the breaking point, or the point at which extremes of scalability or performance result in
insecure execution. Non-functional requirements are those that represent the product's quality,
particularly in terms of its acceptability from the standpoint of its consumers.
Continuous testing
On
Continuous testing is the technique of running automated tests as part of the software delivery
pipeline to get instant feedback on the business risks posed by a software release candidate.
Continuous testing encompasses both functional and non-functional needs, and the breadth of testing
ranges from confirming bottom-up requirements or user stories to assessing system requirements
linked to overarching business objectives.
Destructive testing
ty
Destructive testing aims to break a piece of software or a subsystem. It establishes the resilience of
input validation and error-management algorithms by ensuring that the software runs successfully
even when it receives erroneous or unexpected inputs. Fault injection in software, often known as
fuzzing, is an example of failure testing. The software fault injection page links to a number of
si
commercial non-functional testing tools; there are also a number of open-source and free destructive
testing tools available.
er
Performance testing
Performance testing is used to see how well a system or subsystem performs in terms of
responsiveness and stability when subjected to a specific workload. Other quality features of the
system, such as scalability, dependability, and resource utilisation, can also be investigated,
iv
Load testing is concerned with ensuring that the system can continue to function under a given load,
such as significant amounts of data or a big number of users. Software scalability is the term used to
Un
describe this. When performed as a non-functional activity, the associated load testing activity is
referred to as endurance testing. Volume testing allows you to check how well software works even
when certain components (such a file or database) grow dramatically in size. Stress testing is a
method of determining reliability under unusual or unusual workloads. Stability testing (also known as
load or endurance testing) determines if software can function reliably for an extended length of time.
There is limited consensus on what performance testing's precise goals should be. Load testing,
ity
performance testing, scalability testing, and volume testing are all phrases that are frequently
interchanged.
Real-time software systems must adhere to rigorous deadlines. Real-time testing is performed to see
if timing limitations are met.
m
The purpose of usability testing is to see if the user interface is simple to use and comprehend. It is
mostly concerned with the application's use. This is not a type of testing that can be automated;
)A
Compliance with standards such as the Americans with Disabilities Act of 1990
Web Accessibility Initiative (WAI) of the World Wide Web Consortium are examples of accessibility
testing (W3C)
Testing for security
To prevent hackers from breaking into a system, security testing is required for software that
e
processes confidential data.
lin
This is a "type of testing conducted to evaluate the degree to which a test item, and associated data
and information, are protected so that unauthorised persons or systems cannot use, read, or modify
them, and authorised persons or systems are not denied access to them," according to the
International Organization for Standardization (ISO).
On
Development testing is a software development process that entails the coordinated use of a wide
range of fault prevention and detection tactics to decrease software development risks, time, and
costs. During the construction phase of the software development lifecycle, it is carried out by a
software developer or engineer. Before code is promoted to additional testing, Development Testing
seeks to eliminate construction errors; this method is designed to improve the quality of the resultant
product as well as the overall development process' efficiency.
ty
Development Testing may include static code analysis, data flow analysis, metrics analysis, peer
code reviews, unit testing, code coverage analysis, traceability, and other software testing
procedures, depending on the organization's expectations for software development.
A/B testing
si
A/B testing is a technique for conducting a controlled experiment to see if a proposed modification is
more effective than the current strategy. Customers are directed to either a current (control) or a
er
changed (treatment) version of a feature, and data is collected to evaluate which version is better at
achieving the desired result.
Simultaneous testing
iv
Concurrent or concurrency testing evaluates the behaviour and performance of software and systems
that use concurrent computing in real-world settings. Deadlocks, race situations, and issues with
shared memory/resource handling are common issues that this style of testing may reveal.
Un
Conformance testing is used in software testing to ensure that a product meets its specifications.
Compilers, for example, are thoroughly examined to ensure that they meet the language's accepted
standard.
ity
Snapshot testing, also known as Golden Master testing, is the process of creating a display expected
output, such as data comparisons of text or images of the user interface. Unlike many other types of
testing, this does not automatically discover failures and instead requires a human to review the
m
Property testing
)A
Instead of stating that certain inputs create specific predicted outcomes, the practitioner generates a
large number of inputs at random, runs the programme on all of them, and asserts the validity of
some "quality" that should be true for every pair of input and output. Every input to a sort function, for
example, should be the same length as the output. A monotonically expanding list should be the
output of every sort function.
(c
Property testing libraries give the user control over how random inputs are generated, ensuring that
degenerate instances and inputs with specific patterns are covered, as well as other features of the
implementation under test.
Since it was created and popularised by the Haskell library, property testing is also known as
"generative testing" or "QuickCheck testing."
e
VCR evaluation
lin
VCR testing, also known as "playback testing" or "record/replay" testing, is a regression testing
technique that improves the reliability and speed of regression tests using a component that is
sluggish or unreliable to connect with, usually a third-party API outside the tester's control. It entails
recording ("cassetteing") the system's interactions with the external component and then replaying the
recorded interactions in place of connecting with the external system on subsequent test runs.
On
The Ruby library popularised the technique in web development.
1. ____________ is mostly determined by the ability to meet functional and performance objectives
ty
as well as the ease with which activities may be carried out.
2. ___________ is a planned and systematic set of operations that ensures that an item or product
complies with established technical specifications.
si
3. _____________ is a hybrid approach to software testing methodology that can be used.
4. Component _______________ is a type of black-box testing that focuses on data values rather
than just the subsystem component's operations.
er
5. _________________ commonly entails re-running prior sets of test cases to see if previously
corrected flaws have reappeared.
7. The purpose of usability testing is to see if the _________________ is simple to use and
comprehend.
Un
Summary
• Software quality is described as the ability to satisfy customers by providing all client
deliverables in terms of performance, standards, and ease of use. The definition can be used
to both software and a generic software product.
ity
• Software quality assurance is a planned and systematic set of operations that ensures that an
item or product complies with established technical specifications.
• Software testing is the process of validating and verifying the artefacts and behaviour of the
software under test. Software testing can also give a corporation with an objective, unbiased
picture of the software, allowing them to grasp and comprehend the risks associated with
software implementation.
m
• In software testing, there are a variety of ways to choose from. Static testing is defined as
reviews, walkthroughs, or inspections, whereas dynamic testing is defined as the execution of
programmed code with a collection of test cases.
•
)A
Dynamic testing can start before the programme is completely finished to test specific pieces
of code, and it is applied to discrete functions or modules.
• Passive testing entails observing system behaviour without having to engage with the
software.
• White-box and black-box testing are two types of software testing approaches.
• White-box testing (also known as clear box testing, glass box testing, transparent box testing,
(c
and structural testing) evaluates a program's internal structures or workings rather than the
functionality that is visible to the end user.
• Black-box testing (also known as functional testing) examines software functionality without
knowing how it is implemented internally and without seeing the source code.
• Grey-box testing (American spelling: gray-box testing) entails understanding internal data
structures and algorithms in order to build tests that are executed at the user, or black-box,
e
level.
• There are many different types of testing like:
lin
• Acceptance testing
• Black box testing
• End to end testing
• Functional testing
• Interactive testing
On
• Integration testing
• Load testing
• Non functional testing
• Performance testing
• Regression testing
• Sanity testing
• Security testing
ty
• Single user performance testing
• Smoke testing
• Stress testing
• Unit testing
si
• White-box testing
er
Activity
Glossary
•
Un
Software quality- Software quality is defined as a field of study and practice that describes the
desirable attributes of software products. There are two main approaches to software quality:
defect management and quality attributes.
• Intangibility- Intangibility refers to the lack of palpable or tactile property making it difficult to
assess service quality.
• Software quality assurance- Software quality assurance (SQA) is a means and practice of
monitoring the software engineering processes and methods used in a project to ensure
proper quality of the software.
ity
• Passive- accepting or allowing what happens or what others do, without active response or
resistance.
• Dynamic- of a process or system) characterized by constant change, activity, or progress.
• Code coverage- In computer science, test coverage is a measure of the degree to which the
)A
e
2. Why is software quality important? Explain briefly.
lin
3. Explain the meaning of software quality assurance.
On
Further Readings
ty
• Software Quality Assurance: From Theory to Implementation
Book by Daniel Galin
Learning Objectives: si
er
At the end of this unit, you will be able to:
5.1.1 Introduction
There are two sorts of documentation that are essentially different. The purpose of system
documentation is to assist programmers and systems analysts in understanding the application
Un
software so that they can build or maintain it once it has been installed. System documentation is
developed as the project progresses as a byproduct of the systems analysis and design process.
Each stage and phase generates documents that are critical to comprehending how the system is
constructed or will be built, and these documents are kept in the project binder (s).
The purpose of user documentation (such as user manuals, training manuals, and online help
services) is to assist the user in using the system. Although most project teams anticipate that users
ity
will have received training and read the user guides before using the system, this is not always the
case. Users are more likely to begin using software without training or reading the user manuals
today, especially in the case of commercial software packages for microcomputers. We'll concentrate
on user documentation in this part.
User documentation is frequently postponed until the very end of a project, which is a risky tactic.
m
Many people underestimate how long it takes to create decent documentation since it entails much
more than simply writing a few pages. Documentation creation necessitates the creation of
documents (on paper or online), the writing of text, the editing of the text, and the testing of the
documents. This procedure takes roughly 3 hours per page (single-spaced) for paper-based
)A
documentation and 2 hours each screen for online content to produce good-quality material. As a
result, a "basic" set of documentation, such as a 10-page user manual and 20 help screens, takes 7
hours to complete. Naturally, lower-quality documentation can be created more quickly.
The time it will take to create and test user documentation should be factored into the project
schedule. When the interface design and programme specifications are finished, most organisations
(c
expect to start developing documentation. Following the completion of the unit tests, the first draught
of documentation is normally scheduled for completion. This decreases—but does not eliminate—the
likelihood that the documentation will need to be updated as a result of software changes, while still
allowing enough time for the documentation to be tested and altered before the acceptance tests
begin.
e
Although paper-based manuals are still useful, online documentation is increasingly becoming the
standard. Because users, especially novices with little computer knowledge, are more comfortable
lin
with paper-based documentation, it is easier to use; online documentation needs users to learn yet
another set of commands. Paper-based documentation is also easier to thumb through to get a
general sense of its arrangement and themes, and it may be used away from the computer.
However, there are four significant advantages of online documentation that almost guarantee its
dominance for the foreseeable future. For starters, finding information is frequently easier (provided
On
that the help search index is well designed). Instead of needing to search through an index or table of
contents in a paper publication, the user can enter in a range of keywords to get information almost
instantly. Second, the same information can be provided in a variety of formats, allowing the user to
find and understand the information in the most informative manner possible. (In paper
documentation, such redundancy is conceivable, but the cost and scary size of the resulting manual
make it impracticable.) Third, online documentation allows users to interact with it in a variety of
innovative ways that aren't feasible with static print documentation. For example, links or "tool tips"
ty
can be used to explain unfamiliar concepts, and programmers can create "show me" routines that
indicate exactly which buttons to click and what text to type on the screen. Finally, maintaining and
disseminating online documentation is substantially less expensive than maintaining and
disseminating print documentation.
si
User documentation is divided into three categories: reference documents, procedures manuals, and
er
tutorials. When a user wants to understand how to perform a given operation, reference papers (also
known as the help system) are created to be used (e.g., updating a field, adding a new record).
People usually study reference information after they have attempted and failed to execute a task.
Because users are sometimes impatient or frustrated when reading reference papers, additional care
must be taken when writing them.
iv
Procedures guides explain how to carry out specific company operations (for example, producing a
monthly report or taking a customer order). Each item in the procedures handbook usually walks the
user through a job that involves numerous system operations or processes. As a result, each entry is
Un
Tutorials show people how to use main system components (for example, an introduction to the
system's basic operations). Each entry in the tutorial is usually longer than entries in procedures
manuals, and the entries are normally designed to be read in order, whereas entries in reference
papers and procedures manuals are designed to be read separately.
ity
The overall method for generating user documentation is identical to the process for developing
interfaces, regardless of the type of user documentation. The developer creates the overall structure
of the documentation before working on the individual components.
We concentrate on the development of online documentation in this part since we believe it is the
most popular type of user documentation. Developing a set of documentation navigation controls that
bring the user to documentation subjects is the general structure utilised in most online
documentation, whether reference pages, procedures manuals, or tutorials. The navigation controls
)A
are how users locate and access a certain topic, whereas the documentation topics are the material
that users wish to read.
Identifying the various sorts of subjects and navigation controls that must be included in the
documentation is the first step in designing the structure. A popular structure for online reference
documents is shown in Figure 12-6. (i.e., the help system). The documentation topics are typically
(c
derived from three different sources. The user interface's set of commands and menus is the first and
most evident source of subjects. This series of subjects is highly helpful if the user wants to learn how
to utilise a specific command or menu.
Users, on the other hand, frequently don't know where to seek for commands or where they are in the
system's menu structure. Users instead have jobs to complete, and instead of thinking in terms of
e
orders, they think in terms of their business tasks. As a result, the second and frequently more helpful
group of subjects concentrates on how to do certain actions, typically those in the user interface
design's usage scenarios. These topics guide the user through the steps required to complete a task
lin
(sometimes including numerous keystrokes or mouse clicks).
The definitions of key phrases are the third group of topics. These terms primarily refer to the
system's entities and data pieces, but they can also refer to commands.
There are five different types of subject navigation controls, however not all systems employ all of
On
them. (For more information, see Figure 12-6.) The table of contents, for example, organises the
information in a logical order, as if the users were reading the reference documentation from
beginning to end. The second, the index, allows access to the themes by key phrases, similar to how
the index at the back of a book aids in topic discovery.
ty
si
er
iv
Un
ity
m
)A
(c
Third, text search allows users to search across subjects for any text they input or for words that
match a developer-specified set of words that is far bigger than the index's list of words. Text search,
unlike the index, usually does not organise the terms (other than alphabetic). Fourth, certain systems
allow you to use an intelligent agent to assist you in your search. The Web-like links between topics,
e
which allow the user to click and move between subjects, are the fifth and final navigation control for
topics.
lin
Procedure manuals and tutorials are similar in structure, however they are often shorter. These
resources are critical when the new system fundamentally alters how things are done. The use
scenarios generated during interface design and other basic actions that users must accomplish are
frequently the sources of topics for procedures manuals. Tutorial topics are usually grouped around
important system areas and the user's level of experience. Most lessons begin with the most basic,
On
frequently used commands and progress to more complicated, less often used ones.
ty
si
er
iv
Un
ity
m
Across application systems and operating systems, the general format for themes is very consistent
(Figure 12-7). Topics usually begin with a distinct title, followed by some introduction language that
describes the topic, and then thorough, step-by-step directions on how to do the task at hand (where
)A
appropriate). Many subjects feature screen graphics to assist the user in finding items on the screen;
others offer "show me" examples that display the sequence of keystrokes and/or mouse movements
and clicks required to perform the function. Most contain navigation options for moving between
subjects, which are normally located at the top of the window, as well as links to other topics. Some
offer connections to similar topics with options or additional commands and actions that the user
might want to do in conjunction with the item being read.
(c
It can be difficult to come up with topic content. It necessitates a thorough awareness of the users (or,
more precisely, the spectrum of users) as well as a comprehension of the abilities the users presently
possess and can be expected to import from other systems and tools they use or have used
(including the system the new system is replacing). Topics should always be written from the user's
e
perspective, describing what the user wants to achieve rather than what the system can do. Some
general suggestions for improving the quality of documentation text are shown in Figure 12-8.
lin
Identifying Terms for Navigation
You start identifying the terms that will be used to help users find subjects as you write the
documentation topics. Because it is derived from the logical structure of the documentation themes,
whether reference topics, process topics, or tutorial topics, the table of contents is usually the
simplest. Because they are produced from the key sections of the system and the users' business
On
operations, the items for the index and search engine demand extra care. When you write a topic, you
must also include a list of the terms that will be used to find it. There are four different types of terms
that can be used in the index and search engine.
The user interface actions such as open file, modify customer, and print open orders are the first
place to look for index phrases. There are two elements to every command (action and object). It's
critical to create an index for both portions because consumers can use either to search for
ty
information. A person looking for information on saving files, for example, would enter the terms save
or files in their search.
The second source is the system's major concepts, which are commonly represented in data flow
si
diagrams as entities, data stores, and data components. For example, in the instance of Tune Source,
this may comprise music genre, artist, and tune.
The user's collection of business tasks, such as buying replacement units or booking an appointment,
er
is a third source. These are frequently included in the command set, but they can also require many
commands and involve terminology that aren't necessarily found in the system. The usage scenarios
produced by interface design are a good source for these phrases.
iv
Un
ity
m
)A
(c
e
lin
On
ty
si
er
iv
Un
ity
m
The set of synonyms for the three categories of objects listed above provides a fourth, and frequently
)A
contentious, source. Users don't always think in terms of the system's clearly defined concepts. They
might look for advice on how to halt or quit instead of exiting, or how to erase rather than delete.
Including synonyms in the index increases the documentation system's complexity and size, but it can
considerably improve the system's usefulness to users.
(c
e
2. ______________ guides explain how to carry out specific company operations.
lin
3. Tutorials show people how to use main system ____________.
4. Identifying the various sorts of subjects and _______________ that must be included in the
documentation is the first step in designing the structure.
On
Summary
ty
User documentation is frequently postponed until the very end of a project, which is a risky
tactic. The purpose of user documentation (such as user manuals, training manuals, and
online help services) is to assist the user in using the system.
• User documentation is divided into three categories: reference documents, procedures
manuals, and tutorials.
•
si
There are five different types of subject navigation controls, however not all systems employ
all of them. The table of contents, for example, organises the information in a logical order, as
if the users were reading the reference documentation from beginning to end. The second,
er
the index, allows access to the themes by key phrases, similar to how the index at the back of
a book aids in topic discovery. Third, text search allows users to search across subjects for
any text they input or for words that match a developer-specified set of words that is far bigger
than the index's list of words. Text search, unlike the index, usually does not organise the
terms (other than alphabetic). Fourth, certain systems allow you to use an intelligent agent to
iv
assist you in your search. The Web-like links between topics, which allow the user to click and
move between subjects, are the fifth and final navigation control for topics.
Un
Activity
Glossary
e
Check your Understanding (Answers)
lin
1. System documentation
2. Procedures
3. components
On
4. navigation control
ty
Module V: System Implementation/Maintenance
Unit - 1: Sy st em I mpl e ment at ion
Le ar nin g O b j ect i ve s:
• Dis c us s us er tr a in i n g .
• Ex pl a i n th e tr a in i n g m et h ods .
Th e pr oc es s o f s y s t em i m p le m en t at i on e n ta i l s :
• De ter m i n in g h ow t h e i nf or ma t io n s y s t e m s ho u ld b e c o ns t ruc te d (i . e .,
phy s ic a l s y s te m d es i g n) , e ns ur in g t ha t t he i nf or ma t io n s y s t e m is o per a ti o n al
e
an d i n us e, an d e ns ur i ng t h at t h e i nf or ma t io n s y s t em f u lf i ls q u a li ty s ta n dar ds
(i. e ., q u al i ty as s ur a nc e) .
lin
Sy s t e m I mp l e me nt a ti o n b ui l ds s y s t em el e m e nts t h at m e et s t ak e h o l der an d s y s t em
req u ir e me nts de f in e d i n th e e ar ly l if e c y c le p has es us i ng t h e s tr uc t ure c r ea t ed
dur i n g arc hi t ec t ur al de s i gn a n d th e res u lts of s y s t em an a ly s is . T he s e s y s te m
p iec es ar e t he n c o mb i ne d t o pr od uc e i nt er m ed i at e a g gre g at es , w h i c h ar e u lt i ma t ely
c om b i ne d t o m ak e t h e wh o le s y s t e m - of- i nt er e s t ( S oI) . S e e Sy s t e m I nt e gra t io n f or
On
mo re in for m at i o n.
Us ers c a n t ak e ov er t h e o per at i o n of t h e s y s t em f or us e a n d a s s es s me n t af te r it
has be e n i mp l e me n te d . I t i nc l ud e t eac h in g u s ers h ow t o ut i l is e th e s y s t em an d
p la n ni n g fo r a s m oo t h tr a ns it i o n.
W e'v e fi n is he d t he s y s te ms a na ly s is s t e p of t he SD LC at t h is p oi n t (th e s y s t em
s s urv ey an d s tr uc t ur e d s y s te ms a n a ly s is ) . W e'v e a ls o f i n is h e d th e s y s te ms d es i gn
ty
proc es s , wh ic h i nc lu d e d p ic k in g h ar dw ar e an d s of tw ar e (s y s t ems s e lec t io n) a n d
pro d uc in g t he s y s t e ms d es ig n a n d i mp l e me n t at i on pl a n (s tr uc t ur ed s y s te ms
des i g n). I t's t im e t o p u t our ne w or m o d if i ed s y s te m i n p l ac e an d s t ar t us i n g it .
si
Sy s t e ms i m pl e m en ta t i on r ef er s t o th e s t eps tak e n to f i n is h t h e des i gn ( if n e ed e d) i n
th e a ut h or iz e d s y s t em s d es ig n d oc um e nt , as w e ll as tes t, ins ta l l , a nd s t ar t us in g
th e n ew or up gr ad e d I nf or ma t io n S y s t em .
er
1.1.1 Introduction
Implementation is the process of producing the system hierarchy's lowest-level system parts (system
breakdown structure). System components are handcrafted, purchased, or repurposed. The
hardware fabrication operations of forming, removing, joining, and finishing, the software realization
iv
processes of coding and testing, and the operational procedures development processes for
operators' responsibilities all fall under the category of production. If a production process is
involved, a manufacturing system that follows established technical and management procedures
Un
may be required.
The implementation process' goal is to design and build (or fabricate) a system element that
complies with its design attributes and/or requirements. The element is built using industry-standard
technology and procedures. This procedure connects the system definition and integration
processes. The diagram below shows how the outputs of system definition are related to system
implementation, which results in the implemented (system) pieces needed to generate aggregates
and the SoI.
ity
m
)A
Simplification of How the Outputs of System Definition Relate to System Implementation, which
(c
e
Purpose and Principle of the Approach
Engineers use the design properties and/or requirements assigned to a system element to create
lin
and produce a full description during the implementation process. They then fabricate, code, or
construct each individual element based on precise descriptions of materials, processes, physical or
logical arrangements, standards, technologies, and/or information flows (drawings or other design
documentation). A system element's properties will be checked against the thorough description and
its requirements will be validated.
On
Recursive interactions occur if subsequent verification and validation (V&V) operations or
configuration audits reveal disparities, requiring predecessor activities or processes to mitigate the
differences and change, repair, or fix the system element in question. From the standpoint of the
United States Defense Acquisition University, Figure below depicts the context for the
implementation process (DAU).
ty
si
er
iv
Un
Such diagrams provide a valuable overview of the perspectives of the systems engineering (SE)
community on what is necessary for implementation and what the general outcomes of
implementation might be. These are backed up by the National Aeronautics and Space
Administration's (NASA) Systems Engineering Handbook's explanation of implementation inputs,
ity
outputs, and activities (NASA 2007). It's critical to recognize that these viewpoints are process-
oriented. While this is a valuable concept, merely looking at implementation in terms of process can
be restrictive.
The implementation process outcomes may generate constraints to be applied on the architecture of
the higher-level system, depending on the technologies and systems chosen when a decision is
m
made to produce a system element; those constraints are normally identified as derived system
requirements and added to the set of system requirements applicable to this higher-level system.
Those limits must be considered in the architectural design.
)A
Depending on the technologies involved and when or when the system requirement needs to be
(c
integrated into a higher-level aggregate, implementation also includes packaging, handling, and
storage. The implementation process also includes creating supporting documentation for a system
requirement, such as manuals for operation, maintenance, and/or installation; these artefacts are
used during the system deployment and usage phase. The requirements for system elements, as
well as the accompanying verification and validation criteria, are inputs to this phase; these inputs
e
come from the detailed outputs of the architectural design process.
Industrial and government standards, as well as the conditions of all applicable agreements,
lin
determine the implementation process. This could involve packing and storage conditions, as well as
activities that prepare the product for usage, such as operator training. In addition, considerations for
packaging, handling, storage, and transportation (PHS&T) will limit the implementation activities.
Refer to the PHS&T section of the System Deployment and Use document for more details.
Enterprise-level safety standards and guidelines must also be considered by the developing or
On
integrating organization.
• Define the implementation strategy - The implementation process starts with detailed design
and includes creating an implementation strategy that specifies fabrication and coding
procedures, tools and equipment to be used, implementation tolerances, and the means and
ty
criteria for auditing the configuration of resulting elements against the detailed design
documentation. The implementation strategy is created and refined in the case of repeated
system element implementations (such as for mass manufacturing or replacement elements)
in order to achieve consistent and repeatable element production; it is saved in the project
•
si
decision database for future use. The arrangements for packing, storing, and supplying the
implemented element are included in the implementation strategy.
Realize the system element - Using the implementation strategy components listed above,
er
realise, adapt, and produce the relevant system element. Standards that regulate applicable
safety, security, privacy, and environmental rules or legislation, as well as the practises of the
relevant implementation technology, are followed during implementation or adaptation.
Fabrication of hardware pieces, software development, specification of training capabilities,
iv
production of training documents, and first operator and maintainer training are all required.
• Record evidence that the system element complies with its requirements, as well as the
associated verification and validation standards and the law policy. Peer reviews and unit
Un
testing, as well as scrutiny of operation and maintenance manuals, are all required. Acquire
attributes that characterise the implemented element that can be measured (weight,
capacities, effectiveness, level of performance, reliability, availability, etc.).
• The implementation strategy should specify how to package, store, and supply the
implemented piece.
ity
satisfactorily.
)A
e
Determine whether the system meets the users' requirements by thoroughly testing it with
them.
• Plan, control, and execute an orderly installation of the new system to ensure a successful
lin
conversion.
On
ty
si
One of a company's most difficult operations is software implementation. Especially when the new
programme is extensive and is being implemented across numerous locations.
er
Is it true that you've made your purchasing decision and are about to put it into action? You and your
team are now faced with a complicated set of tasks with various opportunities for errors and
stumbling obstacles. The launch of new software is on shaky ground without strong planning, well-
thought-out training, smooth data movement, and a well-planned deployment.
iv
You and your team are the most important part of a well-executed software deployment. The IT
department's early involvement is critical to the project's success.
Early on, all project participants must be informed and brought on board, and they must not be
Un
overburdened with new tasks. Only if every team member is focused on the task at hand can
implementation be properly managed. Avoid worker turnover during the software implementation
unless absolutely essential. Your judgments should be documented, justified, and communicated to
your team. If you're stuck, seek help from a professional.
In your software implementation strategy, your vendor is an important player. The degree to which
your vendor will support your implementation (and at what cost) varies, but that doesn't mean you
shouldn't try to get as much help as possible from them.
)A
According to our findings, getting the most out of your vendor and new system begins throughout the
selection process. The process begins by involving employees who will be using the new system on
a regular basis in order to create a needs document to share with vendors.
Make a list of everyone who will use the new tool, including individuals, teams, and departments:
(c
• Include any day-to-day users as well as leaders who will consume the data generated by the
platform.
• Make a list of who your stakeholders are.
• Examine how those stakeholders will be affected and when they will be affected.
• Work together to create a list of features that the programme must have in order to meet the
demand for which it is being purchased.
e
Gather all of this information from your stakeholders and compile it into a needs document to share
with suppliers so that the new system meets all of your requirements.
lin
After then, this document should be used again throughout the implementation phase. Your vendor
will know which features your system champions (workers picked to pilot and become comfortable
with the system before everyone else) will need the most experience with based on the identified
pain points.
On
Control your scope, or it will control you
Your needs document identifies the capabilities that your new system requires so that you may
concentrate on the most critical aspects of the selection process.
Your needs paper also aids you in avoiding scope creep during the implementation and training
stages.
Scope creep is the danger of adding requirements and objectives to a project until it becomes an
ty
unmanageable jumble that you can't reasonably deliver on.
Scope creep will occur in your software implementation strategy if you decide to build up and
personalise all of the features of each capability at the same time. There's no doubting that the bells
Start by prioritising the skills that need to be learned initially to support the long-term implementation
er
of your new system. This will have an impact on training and serve as a standard for regular check-
ins.
You'll want to incorporate certain project management tools and best practises into your software
iv
deployment plan to avoid scope creep. There are a few possibilities available here:
• Larger companies (those with 50 or more staff) may consider implementing formal project
management systems (which, ironically, you'd also have to do).
Un
• Free project management tools could undoubtedly help midsize enterprises (11-50
employees) coordinate and assign implementation responsibilities.
• Google Sheets, Calendars, and other manual digital approaches can help small
organizations (10 or less people) stay organised.
Make sure your capabilities contain the top project management features that our project
ity
These collaborative tools will eventually assist implementation team members in collaborating to
Un
Assembling the team(s) required for success is the next essential step in your implementation
journey. The composition of an implementation team will differ for each company, depending on the
specific demands of the company and the scope of the project.
ity
Establish how many business units will be using the new system and the overall number of users to
determine your requirements. The larger your installation team, the more business units/users who
will be using the product.
m
•
)A
Acting administrator for the new system: Most likely an IT administrator who has previously
collaborated with the vendor. If you don't have somebody in IT on staff, choose someone
who spent time talking to vendors or testing software throughout the selection process.
Anyone with past expertise managing vendor integrations/relationships is a fantastic fit.
• For the new system, the training lead is: The new software's point person. Probably leads
the/a team that will utilize the system on a regular basis and has been a driving force behind
(c
This could be the size of your implementation team, depending on the size of your company. If
you're a solopreneur, you'll be working on your own.
Larger companies may require a larger staff to push the new system for their specific business unit.
e
An IT lead should be part of the extended team to manage demands and concerns about
configuration and integration with other systems, as well as a small group of end users (e.g.,
lin
employees, customers, and channel partners) for testing and feedback.
Each member of this extended team should take on the role of system champion for their business
unit, serving as the go-to person for system questions, training on new features, and onboarding
new employees.
On
These champions must also be in sync with one another and with the system administrator.
Consider holding workshops to guarantee alignment and to keep everyone up to date on the
software implementation plan's modifications and revisions.
Implementation does not equal adoption, no matter how fantastic and intuitive the new system and
ty
tools you've chosen are. You'll need to devise techniques for gaining user approval and adoption of
the new system.
You run the danger of the adoption falling flat if there isn't positive engagement with the product. You
si
may fall behind on your implementation schedule, or you may see that staff are not using the product
as intended.
There are a few basic phases to achieving successful organizational changes, such as the
er
implementation of new software, that you may repeat time and time again:
have one, now is an excellent moment to start. This technique outlines the measures that must be
taken to achieve long-term user acceptance of the newly established system.
The ADKAR model's steps aid in the transition, drawing on both hard skills and emotional appeals to
facilitate a smooth transfer to a new way of thinking.
m
ADKAR can assist you manage other organizational changes while also increasing user
engagement for your software implementation.
)A
Define clear goals that the newly implemented software will help achieve
This phase requires you to return to your needs document.
• The goal that this programme will assist in achieving should be whatever the best case
scenario is.
• Instead of saying "lower the average backlog of work orders by 50% within six months,"
challenge your business to "reduce the average backlog of work orders by 50% within six
e
months." Be specific once more.
Users are held accountable when they have a defined purpose in mind, and it gives them a reason
lin
to use the new product efficiently.
Personalize messaging and communication about the implementation for each team
You've gone through the bother of identifying pain areas, developing a change process, and creating
a list of implementation objectives.
On
These must be appropriately communicated to the teams that will be using the new software, as well
as the rest of the business.
At the team level, it's best to personalize messaging. Each team will most likely have its own set of
objectives that the new system will aid in achieving. When engaging with individual teams, focus on
those team-specific goals. This sense of individuality will go a long way toward encouraging
adoption.
ty
Focus on continuous improvement
Though you may be eager to go sprinting with your new programme, you must first master walking
Continuous improvement relies heavily on training. The idea is to avoid one-size-fits-all training and
er
instead personalize each session to the needs of your stakeholders, much like vendor demos.
Consider that not every user group will be able to devote the same amount of time to training, and as
a result, offer stakeholders a variety of training options.
iv
Experiment with various types of training to use throughout your software implementation strategy:
• Introduce workshop-style instruction in a casual setting with lunch and learns. This is best
suited for group learning.
Un
• Open house: Facilitate brainstorming sessions in which users share their successes and
collaborate to address problems.
• Peer-to-peer: Request one-on-one coaching from your power users and champions to
describe how the tool has improved their productivity.
• Self-training: Encourage users to take use of the vendor's free webinars and reference
materials to gain a better grasp of the product.
ity
You can track the training that resonates the best with specific teams in your business, just like you
can track actual adoption and usage rates. Remember that the goal is to make the biggest difference
possible.
m
The process of ensuring that the information system is functioning is known as implementation. It
has to do with
)A
Users can take over the operation of the system for use and assessment after it has been
implemented. It include teaching users how to utilize the system and planning for a smooth
(c
transition.
Training
Personnel in the system must understand their jobs, how to utilize the system, and what the system
will and will not do in detail. The way well-designed and technically elegant systems are operated
e
and used can determine their success or failure.
lin
Operators of systems must be thoroughly trained so that they can handle all types of operations,
both routine and spectacular. Operators should be taught how to identify common malfunctions, how
to recognize them, and what to do if they occur.
Creating troubleshooting lists to identify potential problems and solutions, as well as the names and
phone numbers of people to call when unexpected or unusual difficulties develop, is part of training.
On
Training also includes familiarization with run procedures, which is going over the steps required to
operate a new system.
User Training
ty
si
er
• End-user training is a crucial aspect of the development of computer-based information systems,
and it must be provided to employees so that they can solve problems on their own.
• User training entails learning how to use the equipment, diagnosing system issues, and evaluating
iv
Training Guidelines
The following guidelines should be followed during the training process:
• Setting quantifiable goals
• Using appropriate training methods
• Choosing appropriate training locations
• Using easily understood training materials
ity
There are a variety of training strategies that can be applied. The following are a few of them:
1) Instructor-led training
It entails both trainers and trainees meeting at the same time, but not always in the same location. A
one-on-one or group training session is possible. There are two types:
e
Virtual Classroom
Trainers must meet the learners at the same time in this programme, although they are not obliged to
lin
be in the same location. Video conferencing, text-based Internet relay chat tools, or virtual reality
packages, among other things, are the principal technologies utilized here.
Normal Classroom
Trainers and trainees must meet at the same time and at the same location. Blackboards, overhead
On
projectors, LCD projectors, and other similar items are commonly utilized in this setting.
2) Self-Paced Training
It involves both trainers and trainees, who are not required to meet at the same time or in the same
location. The trainees gain the abilities on their own time by taking the courses at their leisure. There
are two types of it.
ty
Multimedia Training
Courses are given in multimedia format and preserved on CD-ROM in this training. It reduces the
si
expense of creating an in-house training course without the need for outside programmers.
Web-based Training
er
Courses are frequently given in hypermedia format and built to complement the internet and intranet
in this training. It allows organizations to adjust training requirements and provides just–in–time
training for end users.
iv
1. __________ is the process of producing the system hierarchy's lowest-level system parts
Un
Blackboards, overhead projectors, LCD projectors, and other similar items are commonly
utilized in this setting.
)A
Summary
• System Implementation builds system elements that meet stakeholder and system
requirements defined in the early life cycle phases using the structure created during
architectural design and the results of system analysis.
•
(c
Systems implementation refers to the steps taken to finish the design (if needed) in the
authorized systems design document, as well as test, install, and start using the new or
upgraded Information System.
• Implementation is the process of producing the system hierarchy's lowest-level system parts
(system breakdown structure). System components are handcrafted, purchased, or
e
repurposed. The hardware fabrication operations of forming, removing, joining, and finishing,
the software realization processes of coding and testing, and the operational procedures
development processes for operators' responsibilities all fall under the category of production.
lin
• The implementation process outcomes may generate constraints to be applied on the
architecture of the higher-level system, depending on the technologies and systems chosen
when a decision is made to produce a system element; those constraints are normally
identified as derived system requirements and added to the set of system requirements
applicable to this higher-level system. Those limits must be considered in the architectural
On
design.
• Personnel in the system must understand their jobs, how to utilize the system, and what the
system will and will not do in detail. The way well-designed and technically elegant systems
are operated and used can determine their success or failure.
• Coding, testing, installation, and user training are all part of the system's implementation.
• The specifications for the system are translated into computer programmes, and database
structures are built. The applications are put to the test through a code walkthrough and the
ty
creation of several test cases. After individual modules have been evaluated, system testing
is used to test the software as a whole. Various conversion plans, such as software and
hardware installation, are described. Moving from an old system to a new system is
commonly referred to as system installation.
• For conversion/installation, different methodologies are used, such as direct conversion,
si
parallel conversion, phased conversion, and single location conversion. A user manual is a
written document that contains both visual and textual information about an application and
how to use it. The cost of training can be reduced if user documentation is well-designed.
er
User training is critical to the success of any technology. After any significant changes to the
system, training should be provided.
iv
Activity
1. “System Implementation” this is a vital aspect of system analysis and design. Comment.
Un
Glossary
1. Implementation: it is the process that actually yields the lowest-level system elements in the
system hierarchy (system breakdown structure).
2. Systems implementation: it is a set of procedures performed to complete the design (as
necessary) contained in the approved systems design document and to test, install, and begin
to use the new or revised Information System.
(c
3. Instructor-led training: It entails both trainers and trainees meeting at the same time, but not
always in the same location. A one-on-one or group training session is possible.
4. Virtual Classroom: Trainers must meet the learners at the same time in this programme,
although they are not obliged to be in the same location. Video conferencing, text-based
e
Internet relay chat tools, or virtual reality packages, among other things, are the principal
technologies utilized here.
5. Normal Classroom: Trainers and trainees must meet at the same time and at the same
lin
location. Blackboards, overhead projectors, LCD projectors, and other similar items are
commonly utilized in this setting.
6. Self-Paced Training: It involves both trainers and trainees, who are not required to meet at the
same time or in the same location. The trainees gain the abilities on their own time by taking
the courses at their leisure.
On
7. Multimedia Training: Courses are given in multimedia format and preserved on CD-ROM in
this training. It reduces the expense of creating an in-house training course without the need
for outside programmers.
8. Web-based Training: Courses are frequently given in hypermedia format and built to
complement the internet and intranet in this training. It allows organizations to adjust training
requirements and provides just–in–time training for end users.
ty
Further Readings
1. DAU. 2010. Defense Acquisition Guidebook (DAG). Ft. Belvoir, VA, USA: Defense Acquisition
University (DAU)/U.S. Department of Defense (DoD). February 19, 2010.
si
2. Grady, J.O. 1994. System Integration. Boca Raton, FL, USA: CRC Press, Inc.
3. Faisandier, A. 2012. Systems Architecture and Design. Belberaud, France: Sinergy'Com.
4. Gary B. Shelly, Thomas J. Cashman and Harry J. Rosenblatt; System Analysis and Design,
Sixth Edition, Publisher: shelly cashman sewies.
er
5. Senn; Analysis and Design of Information Systems, TMH.
6. Alan Dennis, Barbara Haley Wixom; Systems Analysis and Design, 2002, John Wiley & Sons.
7. Awad: System Analysis and Design.
8. Whitten, Bentley; System Analysis and Design Methods
iv
9. Joey George, J. Hoffer and Joseph Valacich; Modern Systems Analysis and Design, Third
Edition, 2001, Pearson Education.
Un
1. Implementation
2. True
3. True
4. Instructor-led training
5. Virtual Classroom
ity
6. Normal Classroom
m
Unit - 2: Sy st em M a int en an ce
Le ar nin g O b j ect i ve s:
)A
• De f in e t he in tr od uc t i o n of ma i nt e na nc e .
• Dis c us s t he ne e d for ma i nt e n anc e .
• Ex pl a i n th e c a te g or ies o f m ai n te n anc e .
• Dis c us s r ev er s e e ng i n eer i n g.
(c
e
lin
On
ty
The next step is to manage the information system once it has been successfully implemented and is
si
producing results. The importance of system maintenance is demonstrated by the fact that it accounts
for more than 80% of the total life of a software product. The task of monitoring, reviewing, and
modifying an information system in order to make essential and desirable changes during the
software's entire life cycle is known as system maintenance. Changes in organizational requirements
er
as perceived during the analysis phase must be accommodated by the system in order for it to remain
current and valuable to the organization. System maintenance also addresses failures and flaws that
develop during end-user use of the information system. During the implementation phase, a member
of the system maintenance group is designated to collect data from users for maintenance purposes.
iv
Collecting requests for changes, translating these requests into changes, designing the changes to be
implemented, and implementing the changes in the system are all part of the maintenance activity.
Un
2.1.1 Introduction
The establishment of a maintenance concept kicks off system maintenance planning early in the
acquisition process. Maintenance planning is carried out to evolve and establish requirements and
tasks that must be completed in order to achieve, restore, and maintain operational capability during
the system's lifetime. The maintenance process must run concurrently with the operations process
for a system to be supported throughout its life cycle.
ity
The next step is to manage the information system once it has been successfully implemented and is
producing results. The importance of system maintenance is demonstrated by the fact that it accounts
for more than 80% of the total life of a software product. The task of monitoring, reviewing, and
modifying an information system in order to make essential and desirable changes during the
software's entire life cycle is known as system maintenance. Changes in organizational requirements
m
as perceived during the analysis phase must be accommodated by the system in order for it to remain
current and valuable to the organization. System maintenance also addresses failures and flaws that
develop during end-user use of the information system. During the implementation phase, a member
of the system maintenance group is designated to collect data from users for maintenance purposes.
)A
Collecting requests for changes, translating these requests into changes, designing the changes to be
implemented, and implementing the changes in the system are all part of the maintenance activity.
The process of upgrading, modifying, and updating software to stay up with client needs is known as
software maintenance. After a product has been released, software maintenance is performed for a
variety of purposes, including improving the software overall, addressing faults or bugs, increasing
(c
The SDLC includes software maintenance as a natural element of the process (software
development life cycle). Software developers don't have the luxury of releasing a product and then
leaving it alone; they must constantly correct and enhance their code in order to be competitive and
relevant.
e
The appropriate software maintenance procedures and tactics are essential for keeping any
software running for a long time and keeping customers and users satisfied.
lin
The four important stages of any maintenance effort are as follows:
• Help Desk: A formal change request is submitted by the user with the problem. The change
request will be subjected to a preliminary analysis, and if the issue is reasonable, it will be accepted.
• Analysis: Managerial and technical assessments of the problems are carried out in order to
On
determine cost variables and other possible solutions. The purpose of a feasibility analysis is to
determine the impact of a change, research alternative alternatives, analyse immediate and long-
term costs, and calculate the value of making the change.
• Implementation: The maintenance team will put the chosen change/solution into action and test it.
All affected components must be identified and included in the change's scope. There are
methodologies for unit testing, integration testing, user-oriented functional acceptance testing, and
regression testing.
• Release: The modifications are made available to the customer, together with a release note and
ty
any necessary documentation.
Overview
si
er
iv
Un
The initial maintenance requirements must be defined throughout the stakeholder needs and
requirement definition process, and they must continue to evolve during the system's development
and operation. Consider the following:
• Increasing system availability in order to satisfy operational needs. This must take into
account the system's built-in reliability and maintainability, as well as the available
ity
resources.
• Maintaining the system's operating potential through adequate maintenance planning. This
necessitates a reliability-centered maintenance strategy that includes preventative
maintenance to avoid failures, hence prolonging the mean time between corrective
m
• Maintenance activities are being segmented for possible outsourcing of non-critical tasks to
approved maintenance subcontractors in order to maximize finite technical labor resources
)A
The preparation and revision of maintenance plans, as well as procuring and managing resources
such as budget, service parts procurement, and management of supporting tasks, are all part of
maintenance management (e.g., contract administration, engineering support, and quality assurance).
As part of the system acquisition process, maintenance planning is based on level of repair analysis
(LORA). Initial planning focuses on the actions and support needed to keep life cycle costs to a
e
minimal (LCC).
lin
2.1.2 Need for Maintenance
Developing new software and releasing it to the public is an exciting step for any business. There's a
lot that goes into developing and launching software, including the actual building and coding,
On
licencing models, marketing, and so on. Any excellent piece of software, on the other hand, must be
able to evolve with the times.
This entails adequate monitoring and upkeep. Software must keep up with market changes and
needs as technology evolves at the speed of light.
The goal of the maintenance process is to keep a system's ability to offer service intact. This process
keeps track of the system's ability to deliver services, logs issues for later study, implements
ty
corrective, adaptive, perfective, and preventative actions, and verifies that capability has been
restored. As a result of the maintenance process's successful implementation:
•
•
si
Maintenance limitations are offered as requirements inputs, and replacement system
Elements are made available. Services that meet stakeholder needs are maintained.
Corrective design improvements are required, according to the assessment.
er
Data on failure and lifetime are kept track of.
In terms of the maintenance process, the project shall carry out the following actions and tasks in
compliance with appropriate organization policies and procedures:
iv
The maintenance plan covers both regular and unscheduled servicing jobs and intervals (preventive
maintenance) (adaptive or corrective maintenance). The many maintenance agencies are assigned
tasks under the maintenance plan. The maintenance jobs are assigned to the appropriate
m
maintenance agencies using a maintenance allocation table. In-service or in-house work centres,
approved contractors, affiliated maintenance or repair facilities, original equipment manufacturers
(OEMs), and so on are examples of these. The maintenance plan also specifies the support
resource requirements.
)A
The availability of support resources, such as support and test equipment (STE), technical data and
documentation, employees, spares, and facilities, is critical for proper system maintenance
(including maintenance-free system designs). These must be taken into account during the
negotiation of the acquisition agreement.
e
Training and Certification
The technical workers who maintain the system must have enough training. While initial training may
lin
have been provided during the deployment phase, additional workers may be required to deal with
the increased number of systems deployed as well as staff turnover. As part of system upgrades and
evolution, timely changes to training materials and trained staff may be required. As part of the
supply agreement, it's critical to set certification criteria and contract for training materials.
On
Practical Considerations
Clear thresholds should be established by the organisation responsible for maintaining the system to
determine whether a change requested by end users, changes to correct latent defects, or changes
required to fulfil the evolving mission are maintenance changes or require a more formal project to
step through the entire systems engineering life-cycle. Cost, time, risk, and criticality features all all
be used as reasons for making such a selection.
ty
2.1.3 Categories of Maintenance
si
er
iv
Un
The four types of software maintenance are carried out for a variety of causes and purposes.
Throughout its lifetime, a piece of software may require one, two, or all sorts of maintenance.
The maintenance phase begins once the system is fully implemented and operational. The initial
m
complexity of operating the system decreases as the user becomes more familiar with it.
Modifications to the system may be necessary owing to changes in the business environment,
government legislation, new company endeavors, and the enhancement of functionalities.
)A
e
arises soon after the system is put in place. This type of issue requires rapid response because it
interferes with the end user's day-to-day operations.Corrective Maintenance can be reduced with
proper planning and contact with the end user during the system development process. Despite all
lin
of these types of maintenance, they account for more than 60% of overall maintenance effort.
Corrective maintenance is something that no one wants to do. It adds no further value to the
software. It must be ensured that routine business operations are not disrupted as a result.
On
database management system necessitate updates. Because business functions in a social setting,
adaptive maintenance is required when the organization's needs alter as it expands into new areas,
changes in government regulation policy, and so on. Adaptive maintenance refers to software
maintenance that adapts to these types of changes. This type of action, unlike corrective
maintenance, adds value to the information system and affects just a tiny portion of the company.
This operation is not as urgent as corrective maintenance because the modifications are gradual and
provide the system group enough time to implement software updates.
ty
• Perfective Maintenance: This type of maintenance entails adding new features and functionalities
to the software in order to make it more versatile and user-friendly. Changes are occasionally
performed to improve the software's performance.
This maintenance can be regarded of as a fresh development activity in some ways.
si
This improves the information system's value and is necessary to stay competitive.
er
iv
Un
The maintenance efforts to be put in during each maintenance activity are depicted in the diagram
above (Comparative figures of maintenance effort).
m
si
The goal of reverse engineering is to make maintenance easier by making a system more
understandable and producing the essential papers for a legacy system.
er
The act of deconstructing a thing to see how it works is known as reverse engineering. It is done
mostly to examine and learn how something works, but it is also frequently used to reproduce or
improve the object. Software, physical machinery, military technologies, and even biological
iv
Reverse engineering is a technique used in older industries to improve computer hardware and
software. The machine code of a programme — the string of 0s and 1s transmitted to the logic
Un
processor — is the focus of software reverse engineering. To convert the machine code back to the
original source code, programme language statements are employed.
Reverse-engineering expertise can be used to repurpose old objects, do a security analysis, obtain a
competitive advantage, or just teach someone how something works, depending on the technology.
Reverse-engineering is the process of extracting knowledge from a completed product, regardless of
how it is utilized or what it pertains to.
ity
Nowadays, software maintenance is a generally accepted aspect of the SDLC. It refers to all
changes and updates made to a software product after it has been delivered. Modifications are
required for a variety of reasons, some of which are briefly listed below:
• Market Conditions - Policies that change over time, such as taxation, and newly presented
constraints, such as how to keep track of bookkeeping, may necessitate modifications.
(c
• Client Requirements - Customers may request new features or functions in the product over
time.
• Modifications to the Target Host's Hardware and/or Platform (such as the Operating System)
e
- If the target host's hardware and/or platform (such as the operating system) change,
software adjustments are required to maintain flexibility.
lin
• Organizational Changes - Any business level change at the client end, such as a reduction
in organisation strength, the acquisition of another company, or the organisation entering a
new business, may need changes to the original programme.
On
Program Restructuring
ty
It is a method of reorganising and reconstructing existing software. It's all about rearranging source
code, either inside the same computer language or between programming languages. Restructuring
can include source code reorganisation, data reorganisation, or both.
si
Restructuring has no effect on the software's operation, but it does improve its dependability and
maintainability. Program components that commonly generate mistakes can be modified or updated
by re-structuring.
er
Restructuring can be used to remove software's reliance on outmoded hardware platforms.
Forward Engineering
Forward engineering is the process of creating desirable software using existing specifications that
iv
have been reduced through reverse engineering. It is assumed that some software engineering has
previously been completed in the past.
Forward engineering is similar to software engineering, with the exception that it is always done after
Un
reverse engineering.
ity
m
Overview
Reverse engineering is used for a variety of purposes in many fields. The beginnings of reverse
engineering can be traced back to the investigation of hardware for commercial or military purposes.
The reverse engineering technique, on the other hand, isn't concerned with making a copy or
)A
altering the artefact in any manner. It's just a process of deducing design elements from items with
little or no prior knowledge of the techniques used in their manufacture.
The purpose of the reverse engineering process might often be as simple as redocumenting legacy
systems. Even if the reverse-engineered product is that of a competitor, the purpose may be to
undertake competition analysis rather than to imitate it. Reverse engineering can also be used to
(c
create interoperable products, and the legality of using specific reverse engineering techniques for
that purpose has been hotly debated in courts around the world for more than two decades, despite
some narrowly tailored United States and European Union legislation.
Software reverse engineering can aid in the understanding of the underlying source code for the
purposes of software maintenance and improvement, relevant information can be extracted to aid in
e
software development decisions, and graphical representations of the code can provide alternate
views of the source code, which can aid in the detection and correction of a software bug or
vulnerability. As software evolves, design information and enhancements are frequently lost;
lin
however, this information can typically be recovered by reverse engineering. The procedure can also
help to reduce the amount of time it takes to understand the source code, lowering the overall cost of
software development. With stronger code detectors, reverse engineering can also help discover
and delete harmful code written to software. Reversing source code can be used to discover
alternative uses for the code, such as discovering illicit replication of the code in places where it was
On
not meant to be used or showing how a competitor's product was constructed. That method is widely
used to "crack" software and media in order to remove copy protection, generate a potentially better
copy, or even a copycat, which is normally the goal of a rival or a hacker.
Malware developers frequently employ reverse engineering techniques to identify operating system
flaws in order to create a computer virus that can take advantage of those flaws. In cryptanalysis,
reverse engineering is also used to uncover flaws in substitution cyphers, symmetric-key algorithms,
and public-key cryptography.
ty
Reverse engineering has various applications:
• Interfacing. When a system must connect with another system, reverse engineering can be
• si
done to determine how the two systems will communicate. Interoperability often has such
requirements.
Either military or commercial espionage is possible. By stealing or capturing a prototype and
disassembling it, you can learn about an enemy's or competitor's newest research, which
er
could lead to the development of a similar product or a stronger countermeasure.
• Obsolescence. Integrated circuits are frequently designed on proprietary technologies and
manufactured on assembly lines that become obsolete in a few of years. When those parts
are no longer manufactured, the only option to incorporate the capability into new
iv
technology is to reverse-engineer the previous chip and then redesign it using modern tools,
utilizing the knowledge obtained as a guide. Another obsolescence-related concern that
reverse engineering can handle is the necessity to support existing legacy devices that are
no longer serviced by their original equipment manufacturer (maintenance and supplies for
Un
e
• Identify potential adverse effects.
• Higher abstraction should be synthesised.
• Reuse should be made easier.
lin
On
ty
si
er
iv
Un
ity
m
)A
(c
Purpose of Reverse-Engineering
e
The goal of reverse engineering is to figure out how something or someone functions. There are
numerous reasons to do so. Reverse engineering is a technique for figuring out how something
works and then recreating it or creating a similar object with improvements.
lin
Reverse-engineering software or hardware is frequently done to find a cheaper alternative to make a
similar product or because the original product is no longer available. In information technology,
reverse-engineering is also used to solve compatibility issues and make hardware or software
operate with other hardware, software, or operating systems that it wasn't designed to work with.
On
A good example is Apple's Logic Pro software, which allows musicians to compose, record, arrange,
edit, and mix music. Logic Pro is only available on Mac computers and is somewhat pricey. Several
proprietary digital instruments are included in the programme. A programmer might reverse-engineer
those digital instruments, figure out how they function, and tweak them for usage in Logic Pro or to
make them interoperable with other Windows-compatible music applications with a little
investigation.
ty
How does the reverse-engineering process work?
The reverse-engineering procedure is unique to the object being reverse-engineered. Regardless of
the context, all reverse-engineering attempts follow the same three general processes. They are as
follows:
•
si
Extraction of information: The reverse-engineered object is inspected, design information is
taken, and that information is reviewed to see how the pieces fit together. This may
necessitate obtaining source code and related design papers for analysis in software
er
reverse engineering. It could also entail the use of tools like a disassembler to disassemble
the software into its component elements.
• Modeling: The gathered data is abstracted into a conceptual model, with each component
describing its role in the broader framework. The goal of this step is to abstract specific
iv
information from the original into a general model that may be used to guide the creation of
new objects or systems. This could be a data flow diagram or a structure chart in software
reverse engineering.
• Review: This entails looking at the model and putting it through its paces in various settings
Un
to ensure that it is a true representation of the original object or system. This could take the
shape of software testing in software engineering. The model can then be used to
reengineer the original thing once it has been tested.
ity
m
)A
e
3. Extracting the structure: This stage entails determining the programme structure in the form of
a structure chart, with each node corresponding to a certain procedure.
lin
4. Processing information of each module of the structure, charts are documented using
structured language such as decision tables, etc. during this step.
5. Data flow recording: A collection of data flow diagrams is created using the information
On
extracted in steps 3 and 4 to show the flow of data among the operations.
7. Review the extracted design: The extracted design document is checked numerous times to
guarantee consistency and accuracy. It also ensures that the design accurately reflects the
content of the programme.
ty
8. Finally, in this step, the entire documentation, including the SRS, design document, history,
overview, and so on, is documented for future use.
si
Reverse engineering, if done manually, would take a long time and require a lot of human labour,
hence it must be aided by automated technologies. The following are some of the tools:
er
• CIAO and CIA: A graphical navigator for software and web repositories along with a
collection of Reverse Engineering tools.
• Rigi: A visual software understanding tool.
• Bunch: A software clustering/modularization tool.
iv
• GEN++: An application generator to support development of analysis tools for the C++
language.
• PBS: Software Bookshelf tools for extracting and visualizing the architecture of programs.
Un
ity
m
)A
(c
e
deteriorate into a poorly documented and ill-kept system if software is not adequately maintained.
During the maintenance process, further venerability may be introduced. A defect in a network
environment has consequences that go beyond poor performance or functionality. A bug can provide
lin
an entry point for a malicious attacker.
It is critical that the software be simple to maintain. Maintainability is influenced by factors like as
source code availability, system manual availability, and so on. The cost of software maintenance is
one of the most critical considerations. The cost of maintenance is influenced by a number of things.
On
While performing maintenance, it is possible that new bugs will emerge.
The following are some of the factors that influence maintenance ease:
• Number of Defects: The number of problems or bugs discovered in the system after it has been
installed. The cost of maintenance rises as the number of problems rises.
• Number of Customers: A larger customer base equals more requests for system adjustments after
installation.
• System Documentation Availability: The quality and availability of system documentation are critical
ty
for performing maintenance. The cost of maintenance rises when system documentation is poorly
written. Most of the time, the development team differs from the maintenance team, and the latter
frequently finds it difficult to comprehend a programme built by the former.
Structured programming and software documentation are extremely helpful in keeping the system
si
running smoothly.
The following are some of the challenges that arise during software maintenance:
er
1. Organizational Concerns
• The maintenance activity must be in line with the organization's goals.
• The majority of Software Maintenance is resource-intensive and provides no apparent quantitative
benefit to the enterprise.
iv
process. The importance of impact assessments and regression tests for software modifications
cannot be overstated.
3. Technical Challenges
The question of how to build software that is simple to understand is a huge one, and the technology
to do so is still unavailable. However, the following are some guidelines to follow:
• Convert the problem into software terms to see if it's feasible.
ity
• Identify the source of the change request and offer possible remedies.
• All remedies are examined to ensure that they are applied to all affected software components.
• Choose the optimal implementation path or make no changes at all.
• Ripple effect propagation is a phenomena in which modifications to a software component have a
tendency to be felt in other components across the software life cycle.
m
Legacy System
A legacy system is usually a very old and huge system that has been substantially updated after it
was first implemented. Legacy systems rely on outdated technology with scant or no documentation.
Working with a legacy system might be challenging.
)A
• Reverse engineer the legacy system and build a new software suite
• Replace software with a package
• Re-implement from scratch
• Discard software and discontinue
(c
lin
On
ty
si
er
The software maintenance process entails a variety of software maintenance procedures, which vary
depending on the type of maintenance and the software maintenance strategy in place.
iv
The following steps are included in most software maintenance process models:
1. Identification and Tracing - This is the process of figuring out which element of the software has
Un
to be changed (or maintained). Depending on the situation and individual issue, this can be user-
generated or discovered by the programme developer.
2. Analysis - The process of studying the proposed change, which includes determining the
probable implications of the change. This step usually involves a cost analysis to determine
whether or not the modification is financially viable.
3. Design – Using need specifications, create new adjustments.
4. Implementation - The process of programmers putting new modules into place.
ity
5. System Testing - The software and system must be thoroughly tested before being released.
This applies to the module itself, the system as a whole, and the entire system.
6. Acceptance Testing: Users evaluate the changes to see if they are acceptable. Users can detect
ongoing concerns and provide recommendations for more effective implementation and
adjustments in this step.
7. Delivery — Software updates or, in some situations, a new software installation. This is the point
m
The expense of software upkeep might be rather substantial. This isn't to say that software
maintenance isn't important. Software maintenance can cost up to two-thirds of the entire software
process cycle, or more than half of the SDLC processes, in some situations.
Un
The expenses of software maintenance are determined by a variety of factors and vary based on the
circumstance. Because technology (and coding languages) develop over time, the older the software
is, the more upkeep it will cost. In some cases, updating an old piece of software to fit today's
technology can be an extremely costly procedure.
Furthermore, while attempting to upgrade or maintain a certain piece of software, engineers may not
always be able to pinpoint the exact flaws. This forces them to utilise a trial-and-error approach,
ity
There are a few things you may take to reduce software maintenance costs. These include
optimising the software's top-level programming, strong typing, and functional programming.
Software firms must consider software maintenance costs when developing new software and
m
undertaking maintenance operations for older models. Any programme that is not maintained will
become obsolete and ultimately worthless over time.
if the documentation is out of current. The documentation should include details on how the code
works, as well as answers to any potential issues.
A software maintenance strategy should include QA as well. While quality assurance is essential
Un
prior to a software launch, it may also be incorporated far earlier in the process (as early as the
design stage) to ensure that the programme is produced appropriately and to provide insight into
making modifications as needed.
• Any programme can be considered old if it has been around for 10 to 15 years.
iv
• Older softwares, which were designed to run on slow machines with limited memory and
storage, are unable to compete with freshly released upgraded software on current
technology.
•
Un
• Non-Technical Factors
• Technical Factors
(c
Non-Technical Factors
e
lin
On
ty
si
er
iv
1. Application Domain
• The system requirements may be final and maintenance due to changing demands reduced if
the program's application is defined and thoroughly understood.
Un
• If the form is brand new, the initial conditions are likely to be changed regularly as users gain
familiarity with the system.
2. Staff Stability
• It is easier for a program's original author to understand and update a programme than it is for
someone who must learn the programme by studying reports and code listings.
•
ity
3. Program Lifetime
m
• When a programme or its original hardware becomes obsolete, conversion costs outweigh
rewrite expenses, the programme becomes obsolete.
)A
e
No maintenance charges will be required if an application is built to run on a specified
hardware configuration and that configuration does not change during the program's lifetime.
• This is a rare occurrence due to the rapid advancement of hardware.
lin
• The application must be updated to make use of new hardware that replaces outdated
hardware.
Technical Factors
On
Following are the technical factors:
ty
si
er
iv
Un
ity
m
Independency of modules
A system's programme unit should be able to be changed without affecting the others.
)A
Programming Language
High-level programming languages are often easier to understand than low-level programming
languages.
(c
Programming Style
The way a programme is written influences its readability and, as a result, the ease with which it may
be updated.
e
lin
Validation and Testing of Programs
• In general, the more time and effort spent on design validation and programme testing, the
fewer defects in the programme and, as a result, the cheaper the maintenance costs
associated with bug rectification.
• The cost of bug fixes is determined by the sort of defect that needs to be fixed.
On
• While coding faults are often inexpensive to fix, design flaws are more costly because they
may necessitate the rewriting of one or more software units.
• Because of the drastic design that is normally involved, bugs in software requirements are
frequently the most expensive to fix.
Documentation
ty
• The functions of knowing the application can be associatively straight-forward if a programme
is accompanied by clear, full, yet brief documentation.
• Maintenance expenses for well-documented systems are often lower than for systems with
little or incomplete documentation.
• si
Keeping track of all system documentation and ensuring that they are kept constant is one of
er
the most important costs of maintenance.
• Configuration management can help you keep these costs under control.
iv
1. At _________, the problem is received from the user through a formal change request, a
preliminary analysis is done, and if the request is sensible, it is accepted.
Un
2. _________ is performed to rectify problems in design, coding etc. detected after the
implementation of the System.
3. A _________, is typically a very old and large system which has been modified heavily since
it started operation.
4. The importance of system maintenance is demonstrated by the fact that it accounts for more
than 80% of the total life of a software product. State true or false.
5. The maintenance process must run concurrently with the operations process for a system to
ity
implementation issues that arise after the System has been installed.
9. _______ is the upgraded versions or modifications in the operating system, hardware, or
database management system necessitate updates.
10. A _________ is usually a very old and huge system that has been substantially updated after
)A
Summary
• Software maintenance is the process of altering software after it has been given to the client
in order to meet the customer's needs or to add new functionalities to the software. In
(c
general, software maintenance does not give a measurable advantage to the firm. Adaptive
maintenance, corrective maintenance, perfective maintenance, and preventive maintenance
are examples of different maintenance operations. Corrective maintenance accounts for more
than 60 percent of total maintenance work. Technical, organizational, and procedural
challenges all affect software maintenance.
•
e
The process of recovering a product's design, required specifications, and functionality from
an analysis of its code is known as software reverse engineering. It creates a software
database and uses it to generate data.
lin
• The goal of reverse engineering is to make maintenance easier by making a system more
understandable and producing the essential papers for a legacy system.
• Reverse engineering is a technique used in older industries to improve computer hardware
and software. The machine code of a programme — the string of 0s and 1s transmitted to the
logic processor — is the focus of software reverse engineering. To convert the machine code
On
back to the original source code, programme language statements are employed.
• Developing new software and releasing it to the public is an exciting step for any business.
There's a lot that goes into developing and launching software, including the actual building
and coding, licencing models, marketing, and so on. Any excellent piece of software, on the
other hand, must be able to evolve with the times.
Activity
ty
1. Formulate a presentation on the topic ‘System Maintenance’.
Glossary
1. System Maintenance: planning begins with the creation of a maintenance concept early in the
acquisition process. Maintenance planning is carried out to evolve and establish requirements
and tasks that must be completed in order to achieve, restore, and maintain operational
capability during the system's lifetime. The maintenance process must run concurrently with
the operations process for a system to be supported throughout its life cycle.
ity
becoming important, since several existing software products, lack proper documentation, are
highly unstructured, or their structure has degraded through a series of maintenance efforts.
)A
Further Readings
1. Blanchard, B.S. and W.J. Fabrycky. 2011. Systems Engineering and Analysis, 5th Edition.
Upper Saddle River, NJ, USA: Prentice Hall.
2. DAU. 2010. Defense Acquisition Guidebook (DAG). Ft. Belvoir, VA, USA: Defense Acquisition
(c
e
5. IISO/IEC/IEEE. 2015.Systems and Software Engineering - System Life Cycle
Processes. Geneva, Switzerland: International Organization for Standardization
(ISO)/International Electrotechnical Commission (IEC), Institute of Electrical and Electronics
lin
Engineers (IEEE).ISO/IEC/IEEE 15288:2015.
6. Thayer, Ken. "How Does Reverse Engineering Work?". globalspec. IEEE Global Spec.
Retrieved 26 February 2018.
7. Andrea Gilli and Mauro Gilli, "Why China Has Not Caught Up Yet: Military-Technological
Superiority and the Limits of Imitation, Reverse Engineering, and Cyber Espionage,
On
International Security 43:3 (2019 141-189.
8. Karwowski, Waldemar; Trzcielinski, Stefan; Mrugalsk, Beata; DiNicolantonio, Massimo; Rossi,
Emilio (2018). Advances in Manufacturing, Production Management and Process Control.
pp. 287–288.
9. W. Cui, J. Kannan, and H. J. Wang. Discoverer: Automatic protocol reverse engineering from
network traces. In Proceedings of 16th USENIX Security Symposium on USENIX Security
Symposium, pp. 1–14.
10. Lee, Newton (2013). Counterterrorism and Cybersecurity: Total Information
ty
Awareness (2nd ed.). Springer Science+Business Media. p. 110.
11. Eilam, Eldad (2005). Reversing: Secrets of Reverse Engineering. Wiley Publishing.
p. 595. ISBN 978-0-7645-7481-8.
12. Elvidge, Julia, "Using Reverse Engineering to Discover Patent Infringement," Chipworks,
si
Sept. 2010.
13. Hausi A. Müller and Holger M. Kienle, "A Small Primer on Software Reverse Engineering,"
Technical Report, University of Victoria, 17 pages, March 2009.
14. Messler, Robert (2013). Reverse Engineering: Mechanisms, Structures, Systems &
er
Materials. McGraw Hill.
15. Raja, Vinesh; Fernandes, Kiran J. (2008). Reverse Engineering – An Industrial
Perspective. Springer.
16. Samuelson, Pamela and Scotchmer, Suzanne, "The Law and Economics of Reverse
iv
19. Joey George, J. Hoffer and Joseph Valacich; Modern Systems Analysis and Design, Third
Edition, 2001, Pearson Education.
20. Alan Dennis, Barbara Haley Wixom; Systems Analysis and Design, 2002, John Wiley & Sons
1. Help Desk
2. Corrective Maintenance
3. Legacy System
4. True
5. True
m
6. software maintenance
7. False
8. Corrective Maintenance
9. Adaptive Maintenance
)A
Le ar nin g O b j ect i ve s:
e
Afte r st ud yin g t h i s c hapt e r, y ou w il l be a ble to:
lin
• De f in e t he in tr od uc t i o n to tr a ns it i on t o t he n ew s y s t e m .
• Dis c us s t he m igr at i o n p la n .
• Ex pl a i n th e p os t - i m p le me n ta t io n ac t iv i t ies .
• Dis c us s t he c onv er s i o n m et ho ds .
•
On
Dis c us s i n te gr at i ng ol d s y s te m i n to n e w s y s t em .
• Ex pl a i n th e A M C r ev i e w of or g an iz a ti o na l e ff ec t iv en es s .
• Ex pl a i n th e r e as ons f o r E R P f ai l ur e a nd s uc c es s .
ty
si
er
iv
Un
The activities required to establish the information system and successfully convert the organization
to its use are examined in this chapter. It also goes into post-implementation tasks like system
support, system maintenance, and project evaluation. From a technological standpoint, installing the
system and making it available for use is relatively simple. The training and organizational challenges
surrounding the installation, on the other hand, are more complex and difficult since they concern
humans rather than technology.
ity
“It must be remembered that there is nothing more difficult to plan, more doubtful of success, nor
more dangerous to manage than the creation of a new system. For the initiator has the animosity of
all who would profit by the preservation of the old institution and merely lukewarm defenders in those
who would gain by the new”.
m
Machiavelli's observations are still relevant today, despite the fact that they were penned
)A
approximately 500 years ago. Managing the transition to a new system, whether computerised or
not, is one of the most difficult responsibilities in any company. In order to prepare for and
successfully adapt to the change, there are business, technical, and personnel challenges that must
be addressed. Because of these difficulties, the transfer from old to new systems is planned while
the programmers are still working on the software. It's a recipe for disaster if you wait until the last
minute to plan.
(c
This chapter explains how to make the transition from the current system to the desired system and
how to do so successfully. The migration plan outlines the activities that will be carried out in order to
prepare for the technological and commercial transitions, as well as the transition of people. We also
go over a few critical support and follow-up tasks that should be completed after the new system is
installed.
e
3.1.1 Introduction
lin
On
ty
si
Using a computer system or set of work processes is similar to driving on a gravel road in many
er
ways. The road develops ruts in the most frequently used portions of the road over time as a result
of regular use. These ruts indicate where to drive, but also make change difficult. When people
utilise a computer system or a set of work procedures, those systems/work processes become
habits or norms; people learn and become accustomed to them. These systems or work processes
iv
then begin to restrict people's activities and make it difficult for them to change since they learn to
think of their occupations in terms of these processes rather than the end aim of serving clients.
Kurt Lewin created one of the first frameworks for managing organizational transformation. Change,
Un
according to Lewin, is a three-step process: unfreeze, move, and refreeze. To begin, the project
team must unfreeze current habits and conventions (the as-is system) in order to allow for change.
To this point in the SDLC, the majority of the work has been done to lay the groundwork for
unfreezing. Users are aware of the new system in development; some have participated in an
analysis of the present system (and so are aware of its flaws), and some have assisted in the design
of the new system (and thus have some idea of the new system's potential benefits). These activities
have aided in the defrosting of existing habits and conventions.
ity
m
)A
(c
Source:www.saigontech.edu.vn/faculty/huynq/SAD/Systems_Analysis_Design_UML_5th%20ed.pdf
Implementing Change
The transition from the old to the new system is the second step in Lewin's three-step paradigm.
Many difficulties must be addressed as part of the migration plan in order to make the shift go
e
smoothly. First, determine the manner of the transition from the old to the new system, as well as
which portions of the organization, will be converted when and how much of the system will be
converted at a time. The business contingency plan should include plans for dealing with the
lin
anticipated business disruption caused by technological issues during the conversion.
The hardware and software installation should be completed, and decisions should be made
regarding how the data will be translated into the new system. The migration plan's final significant
part entails assisting those who will be affected by the new system in comprehending the change
and motivating them to embrace it. These parts of the migration plan are discussed in the next
On
section of this chapter.
The new system is referred as the habitual manner of doing work processes in Lewin's third stage,
ensuring that the new system becomes the usual way of performing the business operations it
supports. The refreezing procedure is one of the main goals of the post-implementation activities
outlined in the chapter's last section. The organization helps consolidate the new system as the new
habitual method of doing business by providing continuing support and immediately starts to identify
improvements for the next version of the system.System support, which entails providing help desk
ty
and telephone support to users with issues; system maintenance, which entails fixing bugs and
improving the system after it has been installed; and project assessment, which entails evaluating
the project to determine what went well and what could be improved for the next system
development project.
Source: www.saigontech.edu.vn/faculty/huynq/SAD/Systems_Analysis_Design_UML_5th%20ed.pdf
The project team must establish the optimal conversion plan to employ once the new system is
)A
introduced to the organization in order to ensure that the business is ready to make the change.
Also, strategies should be created to ensure that the business can continue to operate even if the
new system experiences technical difficulties. Business contingency plans are the name given to
these measures.
Technical preparedness is achieved through procuring and installing any necessary hardware and
(c
software, as well as transforming data to the new system's specifications. While necessary, these
arrangements are frequently the easiest of all the concerns addressed in the migration strategy.
The most difficult aspect of the migration plan is ensuring that the people who will be affected by the
new system are ready and able to utilize it. Understanding the possibility for resistance to the new
system, developing organizational support and encouragement for the change, and preparing the
users through suitable training activities are all part of managing the "people" side of change.
e
Selecting the Conversion Strategy
lin
The conversion strategy is the method by which a new system is introduced into an organization.
Those using this method must examine three characteristics of the system's introduction: the
abruptness with which the change is made (conversion style), the organizational span of the
introduction (conversion locations), and the scope of the system that is introduced (conversion
On
modules). As discussed in the sections that follow, the choices taken in these three dimensions will
affect the cost, time, and risk associated with the shift.
Conversion Style - The transition from the old to the new system might be performed quickly or
slowly. Direct conversion is an abrupt shift that entails the immediate replacement of the old system
with the new one, as the name implies.
In essence, the old system is switched off and the new one is turned on, which frequently occurs in
conjunction with a fiscal year change or another calendar event.
ty
Direct conversion is straightforward and simple, but it is also hazardous. Any issues with the new
system that aren't discovered during testing could have a major impact on the organization's
capacity to function.
si
Parallel conversion, in which both the old and new systems are used simultaneously for a period of
time, allows for a more progressive introduction. Users must work with both the old and new systems
because they are operated side by side. If a new accounting system with a parallel conversion style
is introduced, data must be entered into both systems. To confirm that the new system is working
er
correctly, the output from both systems is carefully compared. The old system is turned off after a
time of parallel operation and thorough comparison between the two systems (usually one to two
months).
iv
Parallel conversion decreases risk by giving the business a backup plan in case the new system
fails. However, it increases cost because users must repeat their job responsibilities twice: once with
each system that performs the same function.
Un
ity
m
)A
(c
e
lin
On
ty
si
er
iv
Conversion Strategies
Source: www.saigontech.edu.vn/faculty/huynq/SAD/Systems_Analysis_Design_UML_5th%20ed.pdf
Un
Conversion Locations - The new system can be rolled out to different portions of the business at
different periods, or it can be rolled out to the entire organization at once. As part of a pilot test, a
pilot conversion selects one or more locations (or units or work groups within a site) to be converted
initially. If the pilot location's conversion is successful, the system will be installed at the remaining
locations.
The benefit of pilot conversion is that it limits the impact of the new system to only the pilot location.
ity
In other words, before the new system is implemented across the organization, it undergoes extra
testing. Only organizations that can tolerate different locations employing different technologies and
business processes for a period of time can execute this type of conversion. It will also take some
time until the system is installed in all of the organization's sites.
m
In some cases, it is advantageous to introduce the technology in stages to different places. A first set
of locations is converted, followed by a second set, a third set, and so on, until all locations have
been transformed. There is sometimes a purposeful lag between phases so that any system flaws
are discovered before too much of the organization is impacted. In some cases, the project team
)A
may immediately begin a new phase after the preceding one has been completed.
Pilot conversion provides the same benefits and drawbacks as phased conversion. It also requires
fewer workers to complete the conversion (and any associated training) than if all locations were
converted at the same time.
It's possible that all locations will need to be converted at the same time, implying the requirement
(c
for simultaneous conversion. The new system is implemented at all sites at the same time, removing
the issue of separate organizational units employing distinct systems and processes. The
disadvantage of this strategy is that adequate people must be available to execute the conversion
and teach users at all sites at the same time.
e
Conversion Modules - While we usually expect whole systems to be installed, this is not always the
case. It may be necessary to determine how much of the new system will be implemented in the
organization at a given moment. When the system's modules are independent and unique,
lin
organizations can use modular conversion to migrate to the new system one module at a time.
Because each module must be developed to work with both the old and new systems, modular
conversion necessitates extra effort and expense while building the system. This is difficult to
achieve when modules are tightly connected, hence it is rarely done. It becomes easier, though,
when the software is developed with loose associations between components.
On
Since users only need to be trained for the new module being installed, modular conversion
decreases the amount of training required for people to begin utilizing the new system. Modular
conversion takes a long time because each module of the system must be introduced in order.
The most frequent method is whole-system conversion, which entails installing the entire system at
once. If the system comprises of tightly integrated modules, this approach is easy and
uncomplicated. However, if the system is vast and/or exceedingly complicated (for example, an
enterprise resource planning system like SAP or Oracle), users may find the entire system too
ty
challenging to understand in one conversion step.
Taking a Closer Look at the Strategy Options - since each of the segments in Figure (Conversion
Strategies) is self-contained, a conversion strategy can be devised by combining any of the
si
previously described possibilities.
er
iv
Un
Risk - The implementation of the new system exposes the company to the danger of difficulties and
faults that could stymie corporate operations. After passing a battery of unit, integration, system, and
acceptance tests, the system should be bug-free—maybe. Undiscovered bugs may exist as a result
of human error. The conversion process provides a last step in which issues can be found and
m
repaired before the system is widely used, depending on the choices taken.Since the old system can
continue to function, the parallel conversion technique is less dangerous than direct conversion. If
bugs are found, the new system can be turned off and addressed while the old one continues to
work.
)A
Since the impact of bugs are limited to the pilot location, converting a pilot location is less dangerous
than phased or simultaneous conversion. Those participating anticipate bugs because the
installation is a pilot test. Finally, converting in modules is less dangerous than converting all at
once.When a few modules at a time are converted, the number of bugs encountered at any given
moment should be lower, making it easier to deal with issues as they arise. When multiple flaws are
found at the same time during conversion, the overall effect may be more disruptive than if the bugs
(c
e
the risks of those undetected bugs. The likelihood of undetected flaws is lower if the system has
undergone extensive methodical testing, including alpha and beta testing, than if testing was less
rigorous. However, there is still a potential that mistakes were made during the study and that the
lin
new system will fail to meet the business requirements.
It's difficult to estimate the repercussions (or expense) of a problem. Most analysts and senior
managers, on the other hand, can make a decent judgement about the severity of a bug. The
significance of negative repercussions of a flaw in an automated stock market trading system or a
On
medical life-support system, for example, is obviously far bigger than in a computer game or word
processing programme.As a result, if the system has undergone minimal testing and/or the impact of
flaws is large, risk is likely to play a big role in deciding on a conversion method. Risk becomes less
essential in the conversion strategy decision if the system has been properly tested and/or the cost
of bugs is not too great.
Cost - The expenses of various conversion processes vary. Salaries for system users, trainers,
system administrators, and external consultants, as well as travel fees, operating expenses,
ty
communication costs, and hardware leases, are all examples of these costs. Parallel conversion is
more expensive than direct cutover since it necessitates the simultaneous operation of two systems
(the old and the new). Employees are now required to do twice as much work as before, as well as
cross-check the outcomes of the two systems.
si
The costs of a pilot conversion and a phased conversion are similar. Simultaneous conversion
involves higher expenses since it requires more employees to support all of the sites when they
convert from the old to the new system at the same time.
er
Because modular conversion takes more programming, it is more expensive than whole-system
conversion. Modules in the new system must be programmed to work with selected modules in both
the old and new systems, and the old system must be modified to function with selected modules in
the new system.
iv
Time - The time it takes to switch from the old to the new system is the final consideration. Because
it is instantaneous, direct conversion is the fastest. Because the full benefits of the new system do
not become available until the old system is shut off, parallel conversion takes longer. Because all
Un
locations are converted at the same time, simultaneous conversion is the fastest.Phased conversion
takes longer than pilot conversion because, once the pilot test is completed (although not always),
all remaining locations are converted at the same time. Conversion is done in stages, and it can take
months for all of the places to be converted. Similarly, because the modules are introduced one after
the other, modular conversion takes longer than whole-system conversion.
It's tempting to imagine that rigorous research and design, as well as proper IT project management,
will result in a successful system deployment. It is usual for the squad to be upbeat about their
chances of success.
However, with new systems, it may be more prudent to constantly assume the worse.
m
Company contingency planning is the process of preventing minor technological problems in the
new system from becoming big business disasters. Contingency plans assist the company deal with
minor issues with the new technology in order to avoid large business disruptions.
Some may argue that because corporate disasters can be avoided by proper project management
)A
and migration planning, building disaster contingency plans is unnecessary. Large projects covering
several business processes and using large quantities of code, on the other hand, provide a plethora
of seemingly minor technical issues that, when combined, might have disastrous
implications.Projects involving enterprise resource planning software are ideal examples.
When a $30 million SAP project in Hewlett-Industry Packard's Standard Server division ran into
minor programming difficulties in 2004, the company lost an estimated $160 million. Nike suffered
(c
minor IT issues in a SAP installation in 2001, which cost the corporation $100 million in missed
revenue. It may be less dangerous to plan for how to deal with system failure (contingency plan)
rather than relying just on project management strategies to avoid failure.
One method of contingency planning is to use parallel conversion. When the old and new systems
are used together for a period of time, a fallback system is provided in case the new system fails.
e
However, parallel conversion is not always possible. As a result, the worst-case scenario—no
system at all—should be anticipated and planned for, with the possibility of reverting to manual
methods.
lin
The ongoing pressure of money limits and restricted time that most projects experience is one of the
limitations of problem prevention through ideal project management strategies. It may be possible to
avoid problems if there is no financial or time constraint, but this is rarely the case.
As a result, the project team should devote some time during the development of the migration plan
On
to identifying the project's worst-case scenarios, understanding the total business impact of those
worst-case scenarios, and developing procedures and workarounds that will enable the business to
withstand those events. Because the contingency plan's goal is to keep the business running in the
event of an IT outage, it'll be crucial to include key business managers and users in the planning
process.
ty
Installing the hardware, installing the software, and converting the data are the three key processes
in preparing the technical parts of the new system for operations. Although some of these stages
might be completed in concurrently, they must normally be completed in order at each location.
si
The first step is to purchase and install any hardware that is required. In many circumstances, no
new hardware is required, although new servers, client PCs, printers, and networking equipment
may be required. During design, the new hardware needs should have been defined in the hardware
and software specifications and leveraged to obtain the resources required. Working closely with
er
vendors who supply needed hardware and software to ensure that deliveries are coordinated with
the conversion timetable so that the equipment is accessible when it is needed is now critical.
Nothing can put a conversion strategy on hold as quickly as a vendor's failure to provide necessary
equipment.
iv
The second stage is to install the software after the hardware has been installed, tested, and
certified as functioning. This comprises the to-be system in development, as well as any additional
software that may be required to get the system up and running. The Tune Source Digital Music
Un
Download system, for example, requires Web server software. The system is usually checked again
at this point to ensure that it is working properly.
The data must be converted from the as-is system to the to-be system in the third stage.
The most technically difficult stage in a migration plan is usually data conversion. Separate
programmes are frequently required to convert data from the existing system to the new forms
required in the to-be system, as well as to store it in the to-be system files and databases.
ity
The fact that the files and databases in the to-be system do not perfectly match the files and
databases in the as-is system makes this procedure difficult (e.g., the to-be system may use several
tables in a database to store customer data that was contained in one file in the as-is system). For
data conversion projects, formal test strategies are always required.
m
People who will utilize the new system in the context of a systems development project will require
)A
assistance in adopting and adapting to the new system. Change management is the process of
assisting them in adjusting to the new system and its new work practices without undue stress. Any
big organizational change involves three critical functions.
The first is the change sponsor, or the individual who desires the change. This is the corporate
sponsor who requested the new system in the first place.
(c
Typically, the sponsor is a senior executive from the department that will be responsible for
implementing and using the new system. Because a change that is clearly led by the sponsor, rather
than the project team or the IS organization, has greater validity in the eyes of the users, it is vital
that the sponsor be active in the change management process. The sponsor has direct control over
those who will implement the scheme.
e
The second role is that of the change agent, or the individual or people in charge of the change
initiative. The change agent, who is in charge of actually planning and implementing the change, is
lin
usually from outside the business unit that will be using the technology, and hence has no direct
management control over the potential adopters. The change agent lacks the confidence of the
sponsor and other members of the business unit since he or she is an outsider from a distinct
corporate culture. After all, the change agent normally leaves after the system is installed and thus
has no ongoing impact.
On
The third function is that of a potential adopter or change target—those who must actually change.
These are the people for whom the new system was created, and they are the ones who will
ultimately decide whether or not to use it.
Many project teams in the early days of computing simply assumed that their job was done once the
old system was converted to the new system on a technical level.
"Build it and they will come," was the thinking. Regrettably, that only happens in movies. In most
organizations, resistance to change is frequent. As a result, the change management plan is an
ty
essential component of the entire migration strategy, as it connects the main elements in the change
management process.
People must want to change and be able to change in order for change to be successful. The four
si
main steps in the change management plan are: changing management policies, assessing potential
adopters' cost and benefit models, inspiring adoption, and allowing individuals to adopt through
training. However, before we can explore the change management strategy, we must first
comprehend why people are resistant to change.
er
Understanding Resistance to Change
For very good reasons, people resist change, even if it is for the benefit. What's beneficial for the
iv
company isn't always good for the people who work there. Consider an order-processing clerk who
used to receive orders to be dispatched on paper shipping documents but now receives the same
information through a computer. Instead of typing shipping labels on a typewriter, the clerk now
presses the computer's print button, and the label is printed automatically.The clerk can now mail a
Un
lot more orders each day, which is obviously beneficial to the company. The clerk, on the other
hand, is unlikely to care how many packages are delivered. His or her compensation remains
unchanged; the only difference is whether the employee decides to type on a computer or a
typewriter. Even if the change is minimal, learning to utilise the new system and work processes
takes more effort than continuing to use the previous, well-understood system and work processes.
So, why do individuals embrace change in the first place? Simply said, every shift comes with its
ity
own set of costs and advantages. People change when the benefits of accepting the change
outweigh the costs of the change. And, in some cases, the advantage of change is the avoidance of
the suffering that would occur if you did not embrace the change (for example, if you do not change,
you will be fired, hence one of the benefits of embracing the change is that you will keep your job).
When people are presented with a change opportunity, they typically undertake a cost–benefit
m
analysis (sometimes consciously, sometimes subconsciously) to determine how much of the change
they will embrace and implement. They assess the system's costs and advantages before deciding if
the change is worthwhile.
However, it is not so straightforward because the majority of costs and benefits are unknown.
)A
Because there is some uncertainty about whether a particular benefit or cost will occur, both the
costs and benefits of the new system will need to be weighed according to the degree of confidence
associated with them. Unfortunately, most people have a tendency to overestimate the likelihood of
expenses while underestimating the likelihood of rewards.
In addition, there are expenses and benefits associated with the transformation process itself.
(c
Assume you've found a nicer house or apartment than the one you're in now. Even if you preferred
it, you may decide not to relocate since the cost of relocation outweighs the benefits of the new
home or apartment. Similarly, adopting a new computer system may necessitate the acquisition of
new skills, which may be perceived as a cost by some but as a gain by others who believe that such
abilities will give further benefits beyond the system's use. Any costs and advantages associated
e
with the transition process must be weighed against the likelihood of their occurrence.
While these two sets of costs and benefits (and their relative certainty) are combined, they have an
lin
impact on project teams' acceptance of change or resistance to change when implementing new
systems in organizations. Understanding the elements that stymie change—the factors that
influence the perception of costs and benefits, as well as the certainty that they will be provided by
the new system—is the first step in change management. It's crucial to recognize that "actual" costs
and benefits are significantly less relevant than perceived costs and benefits.People act based on
On
their beliefs, not on what is factual. As a result, any knowledge of how to encourage change must be
established from the perspective of individuals who will be affected, not from the perspective of
those who will be leading the change.
The first significant stage in the change management strategy is to switch from the as-is system's
management policies to new management policies that will support the to-be system. Management
ty
policies establish objectives, specify how work procedures should be carried out, and regulate how
organizational members should be compensated. No computer system will be deployed successfully
unless management policies encourage it. Many new computer systems alter corporate processes
and enable new modes of operation. Potential adopters will be unable to use the system until the
si
policies that give the rules and rewards for those procedures are altered to reflect the new
opportunities that the system provides.
For structuring labour processes in companies, management uses three main instruments. The first
er
are standard operating procedures (SOPs), which have become routines for how work is done. Both
formal and informal SOPs exist. Formal SOPs spell out what is and is not acceptable behaviour.
Informal SOPs are the established guidelines for how processes are really carried out over time. The
formal SOPs must be changed to meet the to-be system, according to management. The informal
iv
SOPs will then develop to polish and fill in the specifics that are missing from the formal SOPs.
The second component of management policy is determining how people interpret events. What
does "success" or "doing good work" imply? By specifying measurements and rewards, policies
Un
assist people in comprehending meaning. Because they provide clear and concrete evidence about
what is significant to the organization, measurements expressly establish meaning. Because "what
gets measured gets done," rewards reinforce measurements (an overused, but accurate, saying). To
drive desired behaviour, measurements must be carefully constructed. The IBM credit example
exemplifies the issue that arises when inaccurate measurements lead to inappropriate conduct.
(When credit analysts were too busy to answer credit requests, they would "discover" nonexistent
faults so that the requests could be returned unprocessed.)
ity
The allocation of resources is a third part of management policy. Allocating resources allows
managers to have a direct and immediate impact on behaviour. They can move money and people
from one project to another, build a new system's infrastructure, and invest in training programmes.
Each of these actions has a direct as well as a symbolic impact. The actual reallocation of resources
has a direct effect. The symbolic impact demonstrates that management is serious about its goals.
m
When potential adopters see resources being committed to support a new system, there is less
uncertainty about management's long-term commitment to it.
The next step in creating a change management plan is to create two lists of expenses and
advantages given by the new system (and the transition to it) vs the current system. The first list is
based on the organization's perspective, and it should flow naturally from the business case created
during the feasibility study and refined throughout the project's life cycle.
This list of organizational costs and advantages should be widely published so that everyone who is
(c
expected to embrace the new system understands why it is beneficial to the company.The second
set of costs and benefits is derived from the perspectives of the various potential adopters, or
stakeholders, who are expected to change. One group of potential adopters could be front-line
employees, another could be first-line supervisors, and still another could be middle management.
e
Each of these potential adopters or stakeholders may have a unique set of costs and advantages
connected with the change, which may differ significantly from the organization's costs and benefits.
Unions may be significant stakeholders in particular contexts, with the ability to make or break
lin
effective change.
Many systems analysts assume that front-line workers are the ones whose costs and benefits are
most likely to differ from those of the company, and hence are the most resistant to change.
However, these employees are frequently the ones that suffer the most from the current system's
On
flaws. When difficulties arise, kids frequently witness them personally. Middle managers and first-line
supervisors are the most likely to have conflicting costs and advantages; as a result, they resist
change because new computer systems often reduce the amount of control they have. A new
computer system, for example, may improve the organization's control over a work process (a
benefit to the organization), but it may limit middle management's decision-making ability (a clear
cost to middle managers).
An examination of the costs and advantages for each group of possible adopters or stakeholders will
ty
aid in identifying those who are likely to support the change and those who are more likely to fight it.
At this point, the issue is to try to rebalance the costs and advantages for people who are predicted
to resist change so that they support it (or at least do not actively resist it).
This examination may reveal some severe issues that could stymie the system's successful
si
implementation. To ensure that the balance of costs and benefits is such that important potential
adopters are encouraged to use the system, it may be required to reevaluate management policies
and make significant adjustments.
er
The diagram below illustrates some of the key elements of successful transition. The first and most
significant reason to change is a strong personal motive. Individuals, not organizations, are the
agents of change. If the primary groups of individual stakeholders have strong reasons to want the
change, the change is more likely to succeed. Increased pay, less uncomfortable working conditions,
iv
and — depending on the individual — prospects for advancement and personal growth can all be
powerful motivators. Individuals may resist change if it reduces the value of current skills because
they have invested a lot of time and energy in gaining those talents, and anything that reduces the
value of those skills may be regarded as reducing the individual (because important skills bring
Un
There must also be a compelling reason for the company to need the change; otherwise, people will
question whether the change is necessary and will be less confident that it will take place. The most
m
difficult organization to change is one that has been successful, because people come to assume
that what has worked in the past will continue to work in the future. In an organization on the verge
of bankruptcy, on the other hand, it is easier to persuade people that change is required. Credible
corporate sponsors and top management commitment and support are also critical in improving the
)A
When the cost of the transition to those who must change is low, the likelihood of successful
transformation increases. Resistance may arise as a result of the demand for considerably different
new abilities or disturbances in operations and work routines. A detailed migration strategy
established by a competent change agent with the help of the business sponsor is a key aspect in
(c
Motivating Adoption
Providing clear and convincing proof of the need for change is the single most critical aspect in
driving a change. Simply said, everyone who will be required to accept the new system must be
e
convinced that the benefits of the new system outweigh the costs of change.
Informational and political initiatives are the two most common ways to encourage adoption. Both
tactics are frequently used in tandem. The purpose of an informational strategy is to persuade
lin
potential adopters that the change will be beneficial. This method succeeds when the target
adopters' cost–benefit set contains more advantages than costs. To put it another way, there are
compelling reasons for potential adopters to embrace the change.
The project team uses this method to present clear and convincing evidence of the costs and
benefits of switching to the to-be system. The project team creates memos and presentations that
On
detail the costs and benefits of adopting the system from both the organization's and the target
group of potential adopters' perspectives. Similar to an advertising or public relations campaign, this
material is broadly disseminated among the target demographic.It must underline the advantages
while also increasing the likelihood that these advantages will be realised in the minds of potential
adopters. In our opinion, selling painkillers is usually simpler than selling vitamins; that is, convincing
potential adopters that a new system will solve a severe problem (or other cause of pain) is easier
than convincing them that it will give new benefits (e.g., increase sales).
As a result, educational campaigns that emphasise the reduction or eradication of issues rather than
ty
the creation of new opportunities are more likely to be successful.
A political strategy is another way to inspire change. Organizational power, not information, is
utilised to motivate change in a political approach. When the target adopters' cost–benefit set
contains more costs than benefits, this strategy is frequently adopted. To put it another way, while
si
the change may benefit the company, there are no compelling reasons for potential adopters to
embrace it.
The political strategy is frequently beyond of the project team's control. It takes someone with
legitimate control over the target group in the organization to persuade them to accept the change.
er
This can be done in a coercive fashion (e.g., "accept the system or you'll be fired") or in a negotiated
manner (e.g., "adopt the system or you'll be fired"), or in a negotiated manner (e.g., "adopt the
system or you'll be fired") (e.g., linking system adoption to increased training opportunities).
By connecting income to certain behaviours required under the new system, management policies
iv
simply refuse to accept the change and resist it, either because the new system has more costs than
advantages for them individually or because they place such a high value on the transition process
that no amount of new system benefits can exceed the transition costs.
The remaining 40% to 60% of people are hesitant to adopt. They are apathetic and will go with the
flow to support or oppose the system, depending on how the project progresses and how their
coworkers react to it. The actors participating in the change management process are depicted in
the diagram below.
ity
m
)A
The purpose of change management is to actively promote and encourage ready adopters while
also assisting them in winning over hesitant adopters. Because their expenses and advantages may
differ from those of the company, there is usually nothing that can be done about the resistive
adopters. It is frequently advisable to overlook this tiny minority of resistant adopters and focus on
(c
the bigger majority of ready and hesitant adopters unless there are easy steps that can be made to
counterbalance their costs and benefits or the organization chooses to embrace a strong political
strategy.
Enabling Adoption: Training
e
Potential adopters may wish to make the shift, but unless they are capable of doing so, they will not
be able to.
lin
They will not adopt it. Providing employees with the necessary expertise facilitates adoption.
required rigorous training to adapt the shift Training is most likely the most important factor.
Any change management initiative's most self-evident component. How can a company expect its
employees to adopt a new system if they haven't been trained?
However, we've discovered that training is one of the most frequently disregarded aspects of the
On
process. Many companies and project managers just assume that future adopters will find the
technology simple to understand. Because the system is assumed to be so basic, it is assumed that
future adopters will be able to pick it up quickly. Regrettably, this is sometimes an unnecessarily
pessimistic assumption.
Every new system necessitates the acquisition of new abilities, either because the core work is
different.
Procedures have evolved (in the case of business processes, sometimes dramatically).
The more fundamental the changes to the business, the more reengineering [BPR]; or because the
ty
computer system utilised to support the operations is different.
The more important it is to ensure that the organization has the new skills required to operate the
new business processes and supporting information system, the more important it is to ensure that
the organization has the new skills required to operate the new business processes and supporting
si
information system. In general, there are three ways to obtain these new skills: one is to hire new
employees who have the needed skills that the existing staff does not.
Another option is to outsource the processes to a company that possesses the skills that the current
personnel lacks. Both of these approaches are contentious, and they are often considered only in
er
the situation of BPR, when the new talents required are expected to be the most dissimilar from the
current staff's skill set. Most businesses opt for the third option, which entails retraining existing
employees in the new business processes and the to-be system. Every training strategy must
address what to teach and how to teach it.
iv
What to Train
What kind of training should you give system users? It's self-evident: how to operate the system.
Isn't it true that the training should cover all of the new system's capabilities so that users understand
Un
The system's utilisation must be considered in the context of both manual and computerised
business operations, as well as the new management rules that came with the new computer
system.
Second, rather than focusing on what the system can accomplish, the training should focus on what
the user needs to perform. This is a subtle—but critical—difference. Most systems will offer many
m
more features than users will require (for example, when was the last time you developed a macro in
Microsoft Word?).
Rather of aiming to teach users all of the system's functions, training should concentrate on a much
smaller set of tasks that users conduct on a daily basis, ensuring that users are true experts in
)A
those. Users gain confidence in their abilities to utilise the system when the focus is on the 20% of
features that they will use 80% of the time (rather than trying to cover all functions). Other little-used
functionalities should be mentioned in training, but just enough that users are aware of their
existence and know how to learn about them when they are needed.
Usage cases and use scenarios are one source of inspiration for creating training materials. Users'
common behaviours are outlined in use cases and use scenarios, which can aid in understanding
(c
the business processes and system functions that are most likely to be essential to them.
How to Train
Training can be delivered in a variety of methods. Classroom training is the most popular method.
This provides the advantage of training a large number of users at once with only one instructor,
e
resulting in a shared experience among them.
One-on-one training, in which one trainer works closely with one user at a time, is also conceivable.
This is clearly more expensive, but it allows the trainer to tailor the training programme to the needs
lin
of individual users, ensuring that they truly get the subject. This method is usually employed only
when the users are really important or when there are a small number of them.
Another increasingly popular method is to employ computer-based training (CBT), in which the
training programme is given through computer, either on DVD or via the Internet. Text presentations,
music, and even video and animation can be used in CBT sessions. CBT is often more expensive to
On
produce, but it is less expensive to provide because no instructor is required to conduct the training.
ty
si
Selecting a Training Method
er
Four crucial aspects to consider while choosing a training strategy are summarised in the diagram
above. CBT costs more to produce than one-on-one or classroom training, but it costs less to
deliver. Because it can be tailored to the user's specific needs, knowledge, and abilities, one-on-one
training has the greatest impact, whereas CBT has the least. However, because it is so much easier
iv
to spread than classroom and one-on-one training, CBT has the largest reach—the potential to train
the most users over the widest distance in the shortest time—it has the greatest reach.
For the most part, the figure shows a clear pattern. One-on-one training is most effective when there
Un
are only a few users to train. Many organizations employ CBT when there are a large number of
users to train. We anticipate that CBT will become more popular in the future. Large firms frequently
utilise a combination of all three strategies. Regardless of the method utilised, it is critical to provide
users with a set of easily accessible materials that can be referred to long after the training is
completed (often a quick reference guide and a set of manuals, whether printed or electronic).
ity
The purpose of postimplementation activities is to institutionalise the new system's use—that is, to
make it the standard, recognised, and usual means of carrying out business procedures. After a
successful transfer to the new system, postimplementation efforts seek to refreeze the organization.
Although the project team's work naturally slows after implementation, the business sponsor and, in
m
some cases, the project manager are actively involved in the refreezing process. These two—and,
ideally, a large number of additional stakeholders—promote the new system and keep track of its
adoption and use. They normally give a continual stream of system information and encourage users
to contact them with questions or concerns.
)A
In this section, we look at three key post-implementation activities: support (helping users with the
system), maintenance (continuing to refine and improve the system), and project assessment
(looking at the project to see what activities worked well and should be repeated, as well as what
activities need to be improved in future projects).
(c
System Support
The system is officially turned over to the operations group once the project team has installed it and
completed the change management tasks. This group is in charge of the system's operation,
whereas the project team is in charge of the system's development. Because they are the ones who
must ensure that the system actually works, members of the operations group are frequently heavily
e
involved in the installation activities. The project team departs after the system is installed, while the
operations group remains.
lin
Providing system assistance entails assisting users in their use of the system. Typically, this is
answering questions and assisting users in understanding how to do a specific job; this can be
thought of as on-demand training.
The most prevalent type of on-demand training is online support. This includes the system's
On
documentation and help screens, as well as independent Web sites that answer commonly asked
questions (FAQs), allowing users to discover answers without having to contact a human. Obviously,
the goal of most systems is to give adequate online help so that the user does not need to contact a
human, because providing online support is significantly less expensive than providing human
support.
Most businesses provide a help desk where customers can speak with someone who can address
their questions (usually over the phone, but sometimes in person). Because the help desk serves all
ty
systems rather than just one, it gets calls about a wide range of software and hardware. The help
desk is staffed by level 1 support employees that have a broad variety of computer abilities and can
handle a wide range of requests, from network and hardware issues to issues with commercial
software and in-house built business application software.
si
Most help desks aim for their level 1 support workers to resolve 80% of the help requests they
receive on the first call. If level 1 support personnel is unable to remedy the issue, a problem report
is created (typically using a special computer system designed to manage problem reports) and
er
forwarded to a level 2 support staff member.
Level 2 support personnel are well-versed in the application system and can offer expert guidance.
They are frequently chosen during the implementation phase of a new system and become familiar
iv
with it while it is being tested. During the change management process, level 2 support staff
members may be required to attend training in order to gain a better understanding of the system,
new business processes, and the users themselves.
Un
The level 2 support team assists users in resolving issues. The majority of issues are successfully
resolved by level 2 personnel. However, the problem may turn out to be a software bug that needs to
be repaired in the first few months after the system is installed. In this situation, the problem report is
converted into a change request, which is forwarded to the system maintenance team.
ity
m
)A
System Maintenance
The practise of refining a system to ensure that it continues to satisfy business needs is known as
system maintenance. Because a system continues to alter and evolve as it is utilised, more money
and effort is spent on system maintenance over the course of its lifespan than on its initial
construction. Most new systems analysts and programmers start with maintenance projects and are
e
only assigned to new development projects after they have earned some expertise.
A project manager in the IS group "owns" each system (Figure below).
This person is in charge of coordinating that system's system maintenance effort. A change request
lin
is produced and delivered to the project manager whenever a potential change to the system is
detected.
On
ty
si
er
iv
Un
ity
Changes can be minor or significant. Change requests that are expected to necessitate a large
amount of effort are usually handled in the same way that system requests are:
A "smaller" version of this process usually follows minor adjustments. The change proposal is
m
prioritised after an initial review of feasibility, costs, and benefits. Then, before programming begins,
a systems analyst (or a programmer/analyst) performs the study, which may include interviewing
users, and develops an initial design. After then, the new (or changed) programme is thoroughly
tested before going into production.
)A
Change requests usually come from five different places. Problem reports from the operations
group, which identify system bugs that need to be rectified, are the most typical source. Because a
defect can cause major problems, these are normally given top priority. Even a little bug can cause
huge issues by agitating users and lowering their acceptance and trust in the system.
(c
Users' enhancements to the system are the second most prevalent source of modification requests.
Users frequently identify modest design improvements that can make the system easier to use or
extra functions that are required as they interact with the system. These innovations are critical in
pleasing users and in ensuring that the system adapts to changing business requirements.
Enhancements are frequently pushed to the back burner in favour of bug fixes.
e
Other system development initiatives are a third source of modification requests. Tune Source, for
example, may have had to make small changes to its current Web-based CD sales system as part of
its Digital Music Download effort to ensure that the two systems would work together. These
lin
changes, which are usually necessitated by the need to combine two systems, are becoming more
typical as system integration initiatives grow more common.
Change requests that occur as a result of changes to the underlying software or networks are a
fourth source of change requests. A new version of Windows, for example, may necessitate an
application changing how it interacts with Windows or enabling application systems to take
On
advantage of new capabilities that increase efficiency.While most changes are internal to the system
and have no impact on the user interface or functionality, they can be among the most difficult to
implement because analysts and programmers must learn about the new system characteristics,
understand how application systems use (or can use) those characteristics, and then make the
necessary programming changes.
Senior management is the fifth source of change requests. These modifications are made.
Major changes in the organization's strategy (e.g., the Tune Source Digital Music Download project)
ty
or operations are frequently the source of demands. These major changes are usually considered as
different projects, but the project manager in charge of the original system is frequently assigned to
the new project.
si
Project Assessment
The purpose of project evaluation is to determine what aspects of the system and project activities
were successful (and so should be continued in the next system or project) and what aspects need
to be improved. Most organizations do not do project evaluations on a regular basis, with the
er
exception of military organizations, which are used to writing after-action reports. Assessment, on
the other hand, can be a crucial part of organizational learning since it helps people and
organizations understand how to better their job. It is especially crucial for junior employees since it
facilitates faster learning. Project evaluation is divided into two parts: project team review and
iv
system review.
writes a two- to three-page report that summarises and assesses his or her work. The emphasis is
on improving performance rather than imposing punishments for faults incurred. Project team
members will, it is hoped, be better prepared for the next time they encounter a similar situation—
and less likely to repeat the same mistakes—by openly identifying faults and understanding their
causes. Team members will also be able to understand why their actions worked successfully and
how to duplicate them in future projects by identifying great performance.
The project manager evaluates the documents generated by each team member and meets with
ity
them to help them understand how to enhance their performance. The project manager then creates
a summary paper that summarises the project's important takeaways. This summary highlights what
activities should be taken to improve performance in future projects, but it is not designed to identify
team members who made mistakes. The summary is extensively distributed to all project managers
in order to assist them in better understanding how to manage their projects. It's frequently shared
with ordinary staff employees who weren't involved in the project so that they, too, can learn from
m
System Review
The goal of the system review is to determine how well the proposed costs and advantages of the
)A
new system that were established at the start of the project were recognised in the implemented
system. While project team reviews are typically held shortly after the system is deployed, while
major events are still fresh in team members' thoughts, system reviews are frequently conducted
many months after the system is established, as it takes time to thoroughly examine the system.
The system request and feasibility study performed at the start of the project serve as the foundation
for the system review. After the system has been deployed, the extensive studies conducted for
(c
predicted business value (both tangible and intangible), as well as the economic feasibility analysis,
are reexamined, and a fresh analysis is prepared. The goal is to compare the expected business
value to the actual business value realised by the system. This aids the organization in determining if
the system delivered the value it was intended to deliver. Whether or not the technology delivers the
projected value, a better understanding of the underlying costs and benefits can help future projects.
e
In addition to behavioural effects, a formal system review has major behavioural implications for
project initiation. Everyone involved in the project has an incentive to be conservative in their
assessments because they know that all assertions about business value and financial estimations
lin
provided during project start will be assessed at the end of the project. No one wants to be the
project sponsor or manager for a project that goes much over budget or doesn't deliver on its
promises.
On
3.1.4 Conversion Methods
• Parallel Conversion
• Direct Cutover Conversion
ty
• Pilot Approach
• Phase-In Method
Method
Parallel Conversion
Description
Old and new systems
si
Advantages Disadvantages
er
Provides fall back Causes cost overruns.
are used
when new system
simultaneously. New system may not
fails.
get fair trail.
Offers greatest
iv
installation without
implement system whether conversion
unnecessary use of
across all users goes well or not.
resources.
Avoid large
contingencies from
m
risk management.
Phase-In Method Working version of Gives impression that
Provides experience
system implemented in old system is
and line test before
)A
performance.
File Conversion
It is the conversion of one file format to another. A WordPerfect file, for example, can be converted to
Microsoft Word.
e
A conversion plan, which comprises the following elements, is essential for effective conversion.
lin
• Understanding of the current system and knowledge of the target system
• Teamwork
• Parallel operations, testing, and automated methods
• Continuous assistance in resolving issues
• System/user documentation updates, etc.
On
Many popular programmes can open and save files in other file formats of the same type. Microsoft
Word, for example, can open and save files in a variety of alternative word processing formats.
ty
PIER is a tool or standard approach for assessing a project's result and determining whether it is
delivering the intended benefits to processes, products, or services. It allows the user to check that
the project or system met its objectives within the stated time frame and budget.
si
PIER evaluates the project's development and management procedures to ensure that it has attained
its objectives.
Objectives of PIER
er
The following are the goals of having a PIER:
System integration, or SI for short, is the process of installing a new system that can still connect
and interact with the previous system or systems, whether they are basic or complex. System
integration is a time-consuming procedure that needs extensive setup and development, as well as
m
an implementation and optimization phase. System integration has only one goal: to solve problems
that can't be solved by current systems. Management system integration, business system
integration, and even software system integration are examples of distinct types of System
integration.
)A
When attempting to implement software system integration, the job that the existing system does,
that is, the problems that the current system addresses, must first be established. When the
system's flaws in the problem-solving area are uncovered, the new system's designers must explain
how the system they want to implement will help and whether it is financially viable. The new system
must either generate profits for the company or at the very least prevent losses.
(c
Integration of management systems reveals new techniques for achieving goals and makes use of
previously untapped possibilities that the prior system could not exploit. For example, giving wifi
connections to field employees allows for timely responses, such as when conducting a survey in a
remote location. As a result, decision-makers will be able to make swift decisions about which path
e
to take. This method of system integration is effective as well as efficient.
To have your business's system upgraded, simply submit a proposal to a system integration firm,
lin
which will perform research to aid them in the system integration process. They may conduct
surveys regarding the challenges that those who come into contact with the system face after
dissecting the existing system. This is because underlying issues may exist that even the system
owners are unaware of.Additionally, newer ways might be brought to the notice of the firm,
particularly for organizations that do not support research into new technical breakthroughs. The
On
results of the survey will be used to determine the direction in which the new system should go. If the
survey is not conducted, the business will be required to undergo new system integration activities
on a regular basis. Because the system integration procedure is time-consuming, it should only be
done when absolutely necessary and at the organization's earliest convenience.
As a business, system integration will always have a lot of potential, and any company will never run
out of projects to work on. New, faster, and sharper approaches will constantly be invented to
produce the same result as science, technology, and even business and economic models advance.
ty
So, rather than reinventing the wheel and developing a whole new system, which is rather
expensive, one can just tweak the existing system to meet the new requirements. This method can
save a significant amount of money.
si
Following Lewin's three-step model of organizational change: unfreeze, move, and refreeze, the
transition to the new system is made easier. Attachment to the present system will be unfrozen
through activities performed during systems analysis and design.
The migration plan directs the transition from the current system to the future system.
er
The support and maintenance offered for the new system aid in the integration of the new system
into the organization's daily operations.
Equipment, employees, data, and financial resources are all used in the conversion process.
iv
Depending on the criticality of the system and other connected difficulties, the conversion from the
old system (manual or automated) to the newly built system can be done in a variety of methods.
• Direct Conversion: This is a jarring method. The old system is turned off, and the new one
begins. Although this type of conversion is cost-effective, users are at the mercy of the new
Un
system, therefore direct installation can be dangerous. This type of conversion is sometimes
the only choice due to procedural factors that prevent two systems from running in parallel.
Because the old system has been shut down, there is no way to restart it as a backup if the
new system fails. For key business applications, this type of conversion plan is frequently
the least recommended.
• Pilot Conversion: This is the approach that takes the centre ground. Rather of converting
ity
the entire organisation at once, this type of pilot installation entails the conversion/installation
of the system at a single pre-determined location. It's possible that the location is a company
branch office. The pilot site must be able to undertake a true conversion process in order to
evaluate all of the new system's features, so it must be chosen carefully. The pilot
conversion has the advantage of limiting the possible harm in the event of system failure to
a single area.Once the user has determined that the system's implementation has been
m
successful in one site, it is suggested that the system be replicated in other locations.
Although this type of trial conversion plan benefits the user, it causes a significant burden on
the implementation team because it must run two systems at the same time.
)A
• Parallel Conversion: it is the safest option. The old system is permitted to continue
alongside the new system in this type of conversion until management and the end user are
pleased with the new system's results. It is compared to the new system to see if the old
system's functionalities are adequately covered in the new system by comparing the
outputs. The new system's errors and flaws are not disruptive to the organization's normal
operation because the new system is replaced and the old system resumes normal
(c
functions. Because two systems are performed in parallel, but only one system's findings are
used for business operations, parallel conversion is expensive.
• Phased Conversion: it is a method of transitioning to a new system in stages. Various sub-
systems of the new system are employed in tandem until the entire new system has been
e
transformed. This type of conversion strategy reduces the likelihood of the new system
failing. Actual results are visible in a phased installation as each subsystem is made
functional before the entire new system is made functional.
lin
Each conversion plan requires not just data and software, but also humans, hardware, and other
resources. Before beginning the conversion, it's critical to think about which hardware and software
you'll need.
On
3.1.6 AMC Review of organizational effectiveness
The efficiency with which an organization is able to fulfill its objectives can be defined as
organizational effectiveness. This refers to a company that achieves a targeted result or is
productive without wasting resources. Organizational effectiveness is defined as each employee
doing everything they know how to do and doing it effectively; in other words, organizational
efficiency is defined as an organization's ability to achieve its goals with the least amount of energy,
ty
time, money, and human and material resources.The desired effect will be determined by the
organization's objectives, which could include creating a profit by producing and selling a product, for
example. If a company performs efficiently, it will generate a product that is waste-free. The
organization will fulfill its goal of creating a profit by manufacturing and selling a waste-free product if
The main metric of a company's organizational effectiveness is how well its net profitability compares
er
to its desired profitability. Data on growth and the outcomes of customer satisfaction surveys could
be used as additional indicators.
Leadership, decision-making and structure, people, work processes and systems, and culture are all
areas where highly productive businesses excel. An organization must adapt to its changing
iv
environment in order to achieve and maintain success. One technique for ensuring an organization's
continuing growth and development is to evaluate and improve its effectiveness and efficiency.
Measuring organizational success is an inexact science because each institution has its own set of
Un
criteria and priorities to weigh and examine during self-evaluation. Understanding a company's
organizational effectiveness is important for several reasons: it serves as a check-in to see how well
internal procedures are meeting an initial vision, it gives investors, donors, or employees a sense of
the company's strengths, and it highlights areas of ineffectiveness that can be improved.
In many circumstances, a company's success or failure cannot be determined just by its financial
performance. Even a profitable company might be unproductive if it fails to match the mission
ity
statement's basic principles, attract and retain talented employees, and plan for the next generation
of initiatives.
It is critical to construct a precise set of criteria to examine in order to gain a clear picture of an
organization's effectiveness. Because no two organizations have the same set of criteria, many for-
profit and non-profit organizations use self-assessment to determine their effectiveness. Employees
)A
and company personnel are frequently in the best position to understand their organization's needs,
goals, and performance. Self-evaluation of effectiveness can also assist employees in reconnecting
with the organization's original objective. Workers may create a better sense of loyalty, purpose, and
passion to the workplace by working imaginatively to invent new business strategies for areas of
ineffectiveness.
(c
e
flaws as a springboard for future improvements is a wonderful strategy to boost efficiency.
Organizational effectiveness grew more significant in the 1980s, and it transitioned from a construct
lin
to a concept (Henry, 2011). This idea is related to difficulties such as an organization's ability to
access and absorb resources and, as a result, fulfil its objectives (Federman, 2006). A unit that is
individually unsuccessful in terms of interaction with the rest of the organization, as Gigliotti (1987)
put it, is doomed to fail. According to Cameron (1978), organizational effectiveness is defined as the
organization's ability to obtain critical resources. McCann (2004), on the other hand, identified it as a
On
criterion for an organization's success in achieving its goals through key strategies.
ty
perceive themselves first as scientists, then as managers, despite their desire to increase their
effectiveness.
They must, however, cope with organizational and system effectiveness issues. They must be
creative in their research, conduct, sponsorship, as well as the design and management of their
si
businesses.
The goal method is the most often utilised strategy in organizational success. Its focus is on the
iv
output in order to determine the most important operational goals, such as profit, innovation, and,
lastly, product quality (Schermerhorn, Hunt, R. N. Osborn, & R. Osborn, 2004). The goal approach is
predicated on a few fundamental assumptions.
One of them is that the exact goals should be agreed upon by all parties involved, and everyone
Un
should be dedicated to achieving them.The next assumption is that the number of goals is restricted,
and that fulfilling them necessitates the use of specific resources that are required (Robbins, 2003).
The diminished significance of the goal-based strategy for evaluating the performance of research
organizations and academic establishments is depicted in the accurate and unambiguous
measurement of the results, according to Altschuld and Zheng (1995).It is, in fact, critical to the clarity
of the goals and output metrics. Only when these requirements are met is the goal model appropriate.
However, this is not frequently the case for educational research institutions, particularly in situations
ity
where they are accountable to goals and must justify their large-scale societal roles. Furthermore, any
research is exploratory in character, and independence is necessary for the work of inquiry. These
are realities that should not be constrained by narrow objectives. The goal-oriented approach will only
be partially appropriate in this scenario.
The second strategy is known as the system resource approach, and it focuses on the figure's input. It
defines effectiveness in terms of the ability to gather necessary resources from settings outside of the
company (Schermerhorn et. al., 2004). The use of system resources can be beneficial if there is a
)A
clear link between the resources received by an organization and the commodities or services it
provides (Cameron, 1981). Managers are encouraged to regard the organization not only as a whole,
but also as a part of a wider group. The dominant viewpoint is that any aspect of an organization's
operations has an impact on all other aspects (Mullins, 2008).In addition, the use of input and output
measures of effectiveness in the system resource approach appears desirable due to its quantitative
qualities. They will not, however, show the complete storey of the performance because new ideas
(c
and discoveries do not always have an immediate and direct observable influence. Even after a long
period of support, it is possible that academic and research organizations would not produce
spectacular outcomes. Founders may continue to contribute support if they believe they can make
significant contributions in the future, even if there is no adequate evidence of effectiveness (Altschuld
& Zheng, 1995).
e
3. The Process Approach
lin
The third approach, known as the process approach, focuses on the transformation process and
examines the extent to which resources are formally used to provide services or manufacture things
(Schermerhorn et al., 2004). When an organization is effective, it means that it is internally healthy
and efficient, and that its internal processes and procedures are well-oiled. There is no evidence of
On
stress or strain in an effective company. The members are fully integrated into the system, which
functions well.The members' connection is built on trust, honesty, and good will. Finally, information
flows both horizontally and vertically (Cameron, 1981). The current tendency in higher educational
institutions is to achieve objectives by giving timely and adequate information to students and
academicians. Information gathering and communication management are critical in this case
(Kleijnen, Dolmans, Muijtjens, Willems, & Van Hout, 2009).
ty
4. The Strategic Constituency Approach
The strategic constituency approach is the fourth strategy. It is concerned with the organization's
impact on key stakeholders and their interests (Schermerhorn et. al., 2004). Effectiveness, according
si
to this perspective, is defined as the minimal satisfaction of all of the organization's strategic
constituents. The strategic constituency includes everyone who is connected to the organization in
some way.These people can play a variety of roles, including customers of the organization's services
or goods, resource providers, facilitators of the organization's output, primary supporters, and
er
organization dependents (Cameron, 1981). The strategic constituency method, according to T. Dalton
and L. Dalton (1988), is useful in academic and research institutions where cost-benefit relationships
are difficult to identify.
iv
This method implies a thorough approach to effectiveness and assesses aspects in the environment
as well as within the business. The concept of social responsibility is taken into account in this
perspective. This is a concept that was not formally addressed in traditional techniques, but it is
critical for academic and research institutions that are financially supported by public funds. Because
Un
the resources available for research and development have been shrinking at all levels of
organizations, policymakers continue to pay attention to social responsibility. As a result, in order to
assess how accountable an institution is to society, the subject of research activities and outputs in
connection to public expectations must be addressed.
Aside from these approaches, the legitimacy and ineffectiveness models are also engaged, each
dealing with a different aspect of the overall issue of organizational effectiveness (Altschuld & Zheng,
ity
1995). Although many various effectiveness models and approaches have evolved based on
Cameron's (1978) formulation, there have been few studies on organizational effectiveness in higher
education settings. Similarly, Karagoz and Oz (2008) pointed out that there is a research gap in this
area.
m
ERP (Enterprise Resource Planning) software automates fundamental business processes such as
)A
finance/accounting, supply chain, sales & marketing, and human resource management. ERP data
makes it easier for businesses to analyse data and make data-driven choices. Many businesses
implement ERP because of its benefits, yet they fail miserably to use it efficiently and obtain a return
on investment (ROI). The processes of ERP adoption are examined in this section, as well as
possible failure/success situations.
(c
e
length of the process is determined by the modules, the complexity and experience of the
implementer, and the resources available.
lin
The following are the steps in an ERP implementation:
On
• Support
ty
smoothly. Planning identifies the types of activities that take place at each stage of the process, as
well as their duration, budget, and risk considerations.
si
2. Design and Development
They can develop a more efficient system if they have a thorough grasp and analysis of the current
business workflow. Customizing software to support the new process, setting the system, and
integrating with it are all part of the development step.
er
3. Testing
Examine the new features that have been introduced to the system to see if they are working
iv
properly. This method greatly decreases the chances of making a mistake. Businesses must conduct
multiple tests to ensure the system's many functional features and performance, including
functionality tests, integration tests, performance tests, and validation tests.
Un
4. Deployment
Go live, load your final data, and validate your business process are all part of the deployment
process. Companies are often encouraged to hire implementation partners who are well-versed in
ERP implementation and can assist you in adopting ERP at your corporation that is precisely aligned
with your business processes.
ity
5. Support
Businesses may find it difficult to adjust to the new system after it goes online. Post-implementation
support alleviates their concerns, allowing them to have a better user experience and reap the
greatest benefits.
m
People frequently inquire about how they may secure a successful ERP adoption. The truth is, with
the introduction of cloud ERP, ERP deployment methodologies and best practises have evolved. It's
critical to develop and evolve your process as industries change in order to achieve a successful go-
live. In this article, we'll provide some of our exclusive tips for implementing ERP successfully.
)A
To get a new system up and operating, it takes a lot of hard effort from a lot of dedicated people. You
may have noted that we have yet to discuss software. That's because we recognise that ERP
initiatives aren't just about installing software; they're also about people, and how employees accept
or reject a company's new ERP system can determine whether the project succeeds or fails.
(c
e
• Proactive change management
• Project management tools
• A partner that knows your industry
lin
Technology plays a critical role in boosting an organization's effectiveness. There are a variety of
project data programming bundles available all over the world. ERP is one of the most significant.
ERP stands for enterprise resource planning software, which enables a company to manage its
operations through the use of a set of coordinated applications. ERP unifies all parts of a company's
On
operations, including product planning, development, manufacturing processes, sales, and
marketing. ERP, for the most part, provides firms with three important benefits: business process
automation, easy access to board data, and production and supply chain enhancement through the
use of electronic communication/commerce.
ty
implementation are responsible for the successful implementation of ERP. These stage methods can
be extremely complex.
B. Implementation Strategies
• Create a framework for client requirements and input for social events.
Un
• Set up an observation and critique system for social event-controlled data at each stage of
the execution technique.
• Prepare to deal with crises that are predicted or unexpected, as well as deviations from
plans.
• Provide a strong authority with stipulations for government support in the form of personnel
and assets.
• Create a professional working environment.
• Obtain top-level support for the project and make plans for a well-resourced and well-
ity
executed dispatch.
• Encourage client interviews and customer support, and solicit support from interested
individuals throughout the project.
• Use professional unique correspondence to organize levelheaded suspicions about the
inventive restrictions and send them on to each division or unit in a custom-tailored manner.
m
C. Post-Implementation Strategies
The validation (gathering) of ERP frameworks requires post-implementation processes. After
e
completing an assignment, the need for IT framework and architecture will almost always change. A
post-execution review technique could be utilized to analyse the reasonableness of ERP
frameworks, with the addresses listed below being used for further improvement:
lin
Whether the ERP structure's objectives were fully acknowledged; whether the arrangement decision
was appropriately studied; whether the assessments and errand information were accurate; whether
or not the agreed methods and approaches were consented to; and any other reasonable factor.
On
Quotes against real and the aim behind varieties could be the focus of such evaluations.
Furthermore, the evaluation may suggest any potential advancements in the IT framework. Finally,
the level of staff satisfaction and meeting might be examined, with suggestions for improvement.
Finally, post-execution evaluation can offer better frameworks for maintaining a critical good way
from unhappiness in relative affiliation exercises.
ty
ERP implementations can fail totally or partially in some cases. Lack of internal planning, restricted
implementation design and requirements, and unprofessional implementation are all factors for ERP
implementation failures.
• Insufficient Requirements
si
Companies frequently make mistakes when gathering requirements; it is the implementation team's
obligation to have a clear picture of the internal and external resources required to complete the
er
project and avoid implementation failure.
decision-making, stress among team members, and failure to accomplish the desired goal.
• Lack of Training
Training is frequently overlooked by businesses. To avoid wasting time, you must train your key
Un
stakeholders and staff on the new system. Because an ERP encompasses all functional areas,
users must have a basic understanding of how the system works.
• Unrealistic Customization
Customization of ERP suits a firm's individual needs in a Gap-fit scenario. Unrealistic customization,
on the other hand, leads to complex processes and misaligned business processes.
)A
• Unprofessional Implementation
System failures are frequently caused by sloppy implementation. The first step in deploying an ERP
is to assemble a knowledgeable team. One of the most typical reasons for failed ERP installations is
e
that corporations dare to form an internal team to handle the project. Members of the team may not
have firsthand experience with implementation. They have experience with the business process,
but not with implementation.
lin
The cost of implementing an ERP system is both time and money for the company. Each phase of
ERP deployment should be given equal weight. As even a minor modification can have a significant
impact.
On
Check your Understanding
ty
3. According to ______________ (1998) research, organizational effectiveness should focus on
human resources and organizations, as well as assisting individuals in developing skills and
self-esteem in order to gain control over their new surroundings and find security and support.
4. According to _________ (2002), scientific research organizations, laboratories, and
si
universities suffer the most since they must display effective management, behave more
responsibly, and complete tasks with limited resources in order to increase their
efficacy.Managers in these businesses perceive themselves first as scientists, then as
managers, despite their desire to increase their effectiveness.
er
5. The goal method is the most often utilized strategy in organizational success. Its focus is on
the output in order to determine the most important operational goals, such as profit,
innovation, and, lastly, product quality. The goal approach is predicated on a few fundamental
assumptions. State true or false.
iv
conversion.
Summary
the transition to the new system is made easier. Attachment to the present system will be
unfrozen through activities performed during systems analysis and design.
• The migration plan directs the transition from the current system to the future system.
• The support and maintenance offered for the new system aids in the integration of the new
system into the organization's daily operations.
m
help to develop the organization's readiness. Installation of hardware and software, as well as
data conversion, are used to prepare the technology. Many channels, including management
policies, adoption motivation strategies, and training, have been used to prepare individuals to
embrace and operate the new system. Analysts will be able to build a successful migration
plan if they understand the drivers of change resistance as well as the costs and benefits that
users perceive.
(c
Post-implementation Activities
• The operations group is in charge of system support, which includes online and help-desk
support for users. Level 1 support staff answers the phone and answers the majority of
e
questions, whereas level 2 support staff follows up on difficult situations and occasionally
generates change requests for bug solutions. System maintenance responds to requests for
changes (from system support employees, users, other development project teams, and
lin
senior management) in order to fix bugs and improve the system's business value.The
purpose of project evaluation is to determine what aspects of the system and project activities
were successful (and so should be continued in the next system or project) and what aspects
need to be improved. The focus of a project team review is on how the project team carried
out its tasks, and it usually results in the documentation of critical lessons learned. The goal of
On
a system review is to determine how well the proposed expenses and advantages from the
new system that were established at the start of the project were acknowledged in the
implemented system.
Activity
ty
1. Suppose that you are leading the conversion from one word processor to another at your
university. Develop a conversion strategy. You have also been asked to develop a conversion
strategy for the university’s new Web-based course registration system. How would the
second conversion strategy be similar to or different from the one you developed for the word
si
processor?
2. COMPARING CONVERSION STRATEGIES:
• Develop the combination of conversion strategy dimensions that produces the least
risk; the most risk.
er
• Develop the combination of conversion strategy dimensions that produces the least
cost; the most cost.
• Develop the combination of conversion strategy dimensions that requires the least
time; the most time.
iv
Now, compare these strategies. Do you see any relationships? Based on your
analysis, what advice might you give a team selecting a conversion strategy?
3. Identify and explain three standard operating procedures for the course in which you are
using this book. Discuss whether they are formal or informal.
Un
4. Suppose that you are leading the conversion from one word processor to another in your
organization. Develop an outline of topics that would be included in the training. Develop a
plan for training delivery.
5. How would you motivate adoption if you were the developer of a new executive information
system designed to provide your organization’s top executives with key performance
measures and economic trend information?
ity
4. Compare and contrast pilot conversion, phased conversion, and simultaneous conversion.
)A
6. Explain the trade-offs among selecting between the types of conversion in Questions 3, 4, and 5.
7. What are the three key roles in any change management initiative?
(c
8. Why do people resist change? Explain the basic model for understanding why people accept or
resist change.
9. What are the three major elements of management policies that must be considered when
implementing a new system?
e
10. Compare and contrast an information change management strategy with a political change
management strategy. Is one better than the other?
lin
11. Explain the three categories of adopters you are likely to encounter in any change management
initiative.
12. How should you decide what items to include in your training plan?
On
13. Compare and contrast three basic approaches to training.
14. What is the role of the operations group in the systems development life cycle (SDLC)?
15. Compare and contrast two major ways to provide system support.
ty
17. What are the major sources of change requests?
si
19. How is project team review different from system review?
20. What do you think are three common mistakes that novice analysts make in migrating from the
as-is to the to-be system?
er
21. Some experts argue that change management is more important than any other part of the SDLC.
Do you agree or not? Explain.
22. In our experience, change management planning often receives less attention than conversion
iv
Glossary
1. Conversion Style: The switch from the old system to the new system can be made abruptly or
gradually. An abrupt change is called direct conversion, and, as the name implies, involves
the instant replacement of the old system with the new system. In essence, the old system is
turned off and the new is turned on, often coinciding with a fiscal-year change or other
calendar event.
ity
2. Conversion Locations: The new system can be introduced to different parts of the
organization at different times, or it can be introduced throughout the organization at the same
time. A pilot conversion selects one or more locations (or units or work groups within a
location) to be converted first as a part of a pilot test. If the conversion at the pilot location is
successful, then the system is installed at the remaining locations.
3. Conversion Modules: Although we typically expect that systems are installed in their entirety,
m
this is not always the case. It may be desirable to decide how much of the new system will be
introduced into the organization at a time. When the modules within the system are separate
and distinct, organizations may convert to the new system one module at a time, using
modular conversion. Modular conversion requires special care in developing the system (and
)A
usually adds extra cost), because each module must be written to work with both the old and
the new systems. When modules are tightly integrated, this is very challenging and is
therefore seldom done. When the software is written with loose association between modules,
however, it becomes easier.
(c
Further Readings
1. Kurt Lewin, “Frontiers in Group Dynamics,” Human Relations, 1947, 1:5–41; and Kurt Lewin,
“Group Decision and Social Change” in E. E. Maccoby, T. M. Newcomb, and E. L. Hartley,
e
eds., Readings in Social Psychology, New York: Holt, Rinehart & Winston, 1958, pp. 197–
211.
2. Christopher Koch, “When Bad Things Happen to Good Projects,” CIO Magazine, December
lin
1, 2004.
3. Altschuld, J. W., & Zheng, H. Y. (1995). Assessing the effectiveness of research
organizations. Evaluation Review, 19(2), 197-216.
4. An, J. Y., Yom, Y. H., & Ruggiero, J. S. (2011). Organizational culture, quality of work life,
and organizational effectiveness in Korean university hospitals. Journal of Transcultural
On
Nursing, 22(1), 22-30.
5. Anderson, J. A. (2000). Explanatory roles of mission and culture: Organizational
effectiveness in Tennessee's community colleges. Unpublished PhD thesis. University of
Mephis.
6. Baker, K., & Branch, K. M. (2002). Concepts underlying organizational effectiveness: Trends
in the organization and management science literature. Management Benchmark Study.
USA: Office of Planning & Analysis, Department of Energy
7. Cameron, K. (1978). Measuring organizational effectiveness in institutions of higher
ty
education. Administrative Science Quarterly, 23, 604-632.
8. Cameron, K. (1981). Domains of organizational effectiveness in colleges and universities.
Academy of Management Journal, 24 (1), 25-47.
9. Cameron, K. (1986). A study of organizational effectiveness and its predictors. Management
si
Science, 32(1), 87-112.
10. Dalton, T., & Dalton, L. (1988). The politics of measuring public sector performance.
Promoting Productivity in the Public Sector (Macmillan).
11. Federman, M. (2006). Essay: Towards an effect-ive theory of organizational effectiveness.
er
12. McCann, J. (2004). Organizational effectiveness: Changing concepts for changing
environments. Human Resource Planning, 27(1).
13. Mullins, L. J. (2008). Essentials of organizational behaviour: Pearson Education.
14. Pounder, J. (1999). Organizational effectiveness in higher education. Educational
iv
16. Osman, N., 2018. A software requirement engineering framework to enhance critical
success factors for erp implementation. International Journal of Computer Applications,
180(10), pp.pp32.
17. Vicedo, P., Gil, H., Oltra-Badenes, R. and Merigó, J.M., 2018, January. Critical Success
Factors on ERP Implementations: A Bibliometric Analysis. In International Conference on
Modelling and Simulation in Management Sciences (pp. 169-181). Springer, Cham.
18. Barth, C. and Koch, S., 2019. Critical success factors in ERP upgrade projects. Industrial
ity
6. Phased Conversion
7. Installation Database
8. Conversion Plan