BUSINESS CASE2 BUSINESS CASE2 Business Case Connie Farris Robert Whisehunt Colorado Technical University IT Capstone I (IT487-1904A-01) Maria Thomas Running head: BUSINESS CASE2 Business Case Table of Contents Table of Contents Table of Contents2 Unit 1: Overview of Company and Client Business Case3 Introduction3 .4 Unit 25 Application Requirement Elicitation Strategy5 Unit 36 System Components and Design Requirements6 Unit 47 Methodology for Application Development Process7 Unit 58 Complete Features and Trade-off Analysis8 Unit 69 Milestones and Deliverables based on Date and Dependencies9 Unit 710 - System Architecture Aligned with System Requirements10 Unit 811 Technical Design Document11 Unit 912 Design Review Checklist12 Unit 1013 Testing and Deployment13 References:14 Unit 1: Overview of Company and Client Business CaseIntroduction The business case we have chosen is a customer service application for a jewelry store called Unique Creations. We will design on online architecture for them at the request of the owner who would like a modern up to date Network Architecture that will enable them to better serve the customers and communicate with existing vendors and to expand search for material need for Unique Creations. They use platinum, titanium, gold, silver and stainless steel for all the custom and original jewelry pieces. They also have plans to open a few more businesses soon.Expertise Choctaw Innovations has worked in the IT realm for over 3 years they work in with many different methodologies in order to do their best work. Holding a CMMI score of level 3 conducing relatively working to improve themselves for success. Our company has the expertise to provide Unique Creations with the requirements desired for this Network Architecture. Solution s The goal will be to develop the appropriate network, the key to these goals will depend on the network structure implemented with reliability and security design for this company with the ability to expand and grow in the future and cost effective. The main objective of this design is to provide the very best practice for implementing a secure network. We also need to develop a time frame and budget analysis. The solution to this is to ensure that the network architecture will perform as expected and meet the needs of the stakeholder. We will consider a cloud based along with the LAN. In conclusion, requirements management streamline its phase using the capability maturity model integration (CMMI) to blend the define best practices throughout the process. Various set of practices are defined by CMMI and they support to improve the quality of a system. Both approaches define proper processes for eliciting, analyzing, specifying and validating requirements.. Unit 2Application Requirement Elicitation Strategy TBD ...