The document discusses various topics related to system implementation and operation (system management). It covers activities involved in implementing a system like coding, testing, installation, documentation, training, support and maintenance. It describes different types of testing including unit testing, integration testing and system testing. It also discusses various approaches to system installation like direct, parallel, single location and phased installation. The document emphasizes the importance of system documentation, training users and providing ongoing support. It highlights reasons for system implementation failures and types of system maintenance.
Attendance management system project report.Manoj Kumar
Attendance management system project report is a document in PDF file. If you have any confusion in your document then you can clear your concepts here.
Program slicing and testing in software engineering.
- It summarized static slicing and dynamic slicing
- Also, it summarized white and black box testing
The main aim of SMART ATTENDANCE SYSTEM project is to record the Attendance based on Fingerprint. In this project we are using microcontroller for attendance based on Fingerprint which is stored in Fingerprint module itself so that only authorized person will attendance to this system .
In the early days there was only one way to assess the student about their performance during their academic year or test was to take exam yearly, quarterly, monthly or weekly by making them sit at one place and distributing the question paper to give there answer on a sheet of paper . The whole process of assigning test and evaluating their scores after the test was done manually. Processing the test paper i.e. checking and distributing respective scores used to take time and effort.
To counter this problem a new system have been developed which is called “Online Examination System”.
Fraud Detection Using Signature RecognitionTejraj Thakor
The signature of person is an important bio metric of a human being which can be used to authenticate human identity. The problem arises when someone decide to imitate our signature and steal our identity.
The Image of human signature is collected by camera of mobile phone which can extract dynamic and spatial information of the signature based on Image processing techniques like Convert to gray scale, Noise Removal, Normalization, Border Elimination and Feature Extraction techniques.
The signature matching is depending on SVM. The SVM classifier is trained with sample images in database obtained from those individuals whose signatures have to be authenticated by the system. In our proposed system SQLite database as a back-end and Android platform as a front-end.
Attendance management system project report.Manoj Kumar
Attendance management system project report is a document in PDF file. If you have any confusion in your document then you can clear your concepts here.
Program slicing and testing in software engineering.
- It summarized static slicing and dynamic slicing
- Also, it summarized white and black box testing
The main aim of SMART ATTENDANCE SYSTEM project is to record the Attendance based on Fingerprint. In this project we are using microcontroller for attendance based on Fingerprint which is stored in Fingerprint module itself so that only authorized person will attendance to this system .
In the early days there was only one way to assess the student about their performance during their academic year or test was to take exam yearly, quarterly, monthly or weekly by making them sit at one place and distributing the question paper to give there answer on a sheet of paper . The whole process of assigning test and evaluating their scores after the test was done manually. Processing the test paper i.e. checking and distributing respective scores used to take time and effort.
To counter this problem a new system have been developed which is called “Online Examination System”.
Fraud Detection Using Signature RecognitionTejraj Thakor
The signature of person is an important bio metric of a human being which can be used to authenticate human identity. The problem arises when someone decide to imitate our signature and steal our identity.
The Image of human signature is collected by camera of mobile phone which can extract dynamic and spatial information of the signature based on Image processing techniques like Convert to gray scale, Noise Removal, Normalization, Border Elimination and Feature Extraction techniques.
The signature matching is depending on SVM. The SVM classifier is trained with sample images in database obtained from those individuals whose signatures have to be authenticated by the system. In our proposed system SQLite database as a back-end and Android platform as a front-end.
Slides about different types of testing including verification, validation and calibration. It is not same as regular PPT. I don't have conclusion part, because there's not always a hero in the story.
This ppt covers the following
A strategic approach to testing
Test strategies for conventional software
Test strategies for object-oriented software
Validation testing
System testing
The art of debugging
Continuous Delivery presents a compelling vision of builds that are automatically deployed and tested until ready for production.
Most teams aren't there yet. Some never want to go that far. Others want to push the envelope further.
This deck presents a model for scoring yourself on the continuum and examples of how companies can decide what parts of CD to adopt first, later and not at all.
What is Load, Stress and Endurance Testing?ONE BCG
Software bugs can be hazardous and expensive. A developer may have to bear lots of monetary losses because of the errors and bugs in the software. Software testing is one of the most critical and essential parts of the software development cycle. Testing ensures to detect the possible defects in the functionality of a software.
Testing throughout the software life cycle - Testing & Implementationyogi syafrialdi
The development process adopted for a project will depend on the project aims and goals. There are numerous development life cycles that have been developed in order to achieve different required objectives.
A PPT about A Strategic approach to testing, Validation and verfication, Criteria for Completion of testing, STRATEGIC ISSUES, Unit testing,Unit testing considerations and procedures, Unit-test environment,Integration testing,Non-incremental
Integration Testing,Incremental Integration Testing,Top-down Integration,Bottom-up Integration,Regression Testing,Smoke testing
A strategy for software testing integrates the design of software test cases into a well-planned series of steps that result in successful development of the software.
IIoT uses the power of smart
machines and real-time analytics to take advantage of the data that "dumb machines" have produced in industrial settings for years. The driving the philosophy behind IIoT is that intelligent machines are not only better than humans at
capturing and analyzing data in real-time, but they're also better at communicating important information that can be used to drive business decisions faster and
more accurately.
Artificial Intelligence and Internet of Things.pptxJitendra Tomar
Today’s business world is changing with the adoption of IoT (Internet of Things).
IoT is helping in prominently capturing a tremendous amount of data from
multiple sources. However, wrapping around the multitude of data coming
from countless of IoT devices, makes it complex to collect, process, and
analyze the data.
Realizing the future and full potential of IoT devices will require an investment
in new technologies. The convergence of AI (Artificial Intelligence) and IoT can
redefine the way industries, business, and economies functions. AI-enabled
IoT creates intelligent machines that simulate smart behavior and supports in
decision-making with little or no human interference.
Business intelligence and analytics (BI&A) and the related field of big data analytics have become increasingly important in both the academic and the business communities over the past two decades. Industry studies have highlighted this significant development.
Reshaping Business with Artificial IntelligenceJitendra Tomar
Disruption from artificial intelligence (AI) is here, but many company leaders aren’t sure what to expect from AI or how it fits into their business model.
Yet with change coming at breakneck speed, the time to identify the company’s AI strategy is now.
Here is the baseline information on the strategies used by companies leading in AI, the prospects for its growth, and the steps executives need to take to develop a strategy for their business.
Managers at all levels will have to adapt to the world of smart machines. The fact is, artificial intelligence will soon be able to do the administrative tasks that consume much of managers’ time, and that too in a faster and better way, and at a lower cost.
AI - Rise of Big Data in Business PlanningJitendra Tomar
The current podcast deliberates on Big Data and its utility in Business Planning, Business Intelligence. The Show focuses on how organizations develop business intelligence through various technologies.
The current podcast is on Effect of A I on Economics and Business Management.
It will help us explore how Artificial Intelligence impacts the World Economy.
4. Internet of Things - Reference Model and ArchitectureJitendra Tomar
Architecture Reference Model Introduction, Reference Model and architecture, IoT reference Model, Functional View, Information View, Deployment and Operational View, Real World Design Constraints- Introduction, Technical Design constraints, Data representation and visualization
Devices and gateways, Local and wide area networking, Data Management, Business processes in IoT, Everything as a Service(XaaS), M2M and IoT Analytics, Knowledge Management, Architecture Reference Model Introduction, Reference Model and architecture, IoT reference Model
2. Internet of Things - A Market PerspectiveJitendra Tomar
Introduction, Some Definitions, M2M Value Chains, IoT Value Chains,
An emerging industrial structure for IoT - The information-driven global value chain and global information monopolies.
M2M to IoT-An Architectural Overview– Building an architecture, Main design principles and needed capabilities, An IoT architecture outline, standards considerations
The slideshow will help the learners to relate the code of ethics with the appropriate profession, Comprehend the concept of professional ethics, Analyse various ethical issues at the workplace, and Interpret theories of ethics and their implications.
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
Executive Directors Chat Leveraging AI for Diversity, Equity, and InclusionTechSoup
Let’s explore the intersection of technology and equity in the final session of our DEI series. Discover how AI tools, like ChatGPT, can be used to support and enhance your nonprofit's DEI initiatives. Participants will gain insights into practical AI applications and get tips for leveraging technology to advance their DEI goals.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
Analysis & Design of Business Systems - 5
1. Amity School of Business
Module- V
System Implementation &
Operation
(System Management)
1
2. Topics Amity School of Business
• Activities in implementing a system
• Testing and types of testing
• Installation Approaches
• Direct
• Parallel
• Single Location
• Phased
• Training and supporting users
• Types of Training Methods
• Reason of system implementation failures
• Maintenance and types of maintenance
• Effective Maintenance
• System Enhancement
• Quality Assurance
3. Activities in implementing
system Amity School of Business
System implementation and operation is
made up of seven major activities:
• Coding
• Testing
• Installation
• Documentation
• Training
• Support
• Maintenance
3
4. Amity School of Business
The purpose of these steps is to convert the
final physical system specifications into
working and reliable software and hardware,
document the work that has been done, and
provide help for current and future users and
caretakers of the system.
4
5. 3 group of Activities Amity School of Business
• Activities that lead to the system going into
operation-
– coding, testing, and installation.
• Activities that are necessary for successful
system operation-
– documenting the system and training and supporting
users.
• Activities that make system ongoing and needed
to keep the system working and up-to-date-
– maintenance
5
6. Testing Amity School of Business
• Testing is process of executing system with the intent of
finding errors to ensure that all aspects of newly
designed system are in working order and meeting user
requirements.
• Theoretically a newly designed system should have all
the pieces in working order, but in reality, each piece
works independently. Now is the time to put all the
pieces into one system and test it to determine whether it
meets the user’s requirements.
6
7. Why System Testing? Amity School of Business
• System testing makes a logical assumption that
if all the parts of the system are correct, the goal
will be successfully achieved.
• Cost factor is the driving force behind testing a
system.
• Inadequate testing or non testing leads to
errors that may not appear until months later.
7
8. Amity School of Business
• Inadequate testing may lead two problems:
– The time lag between the cause and the appearance
of the problem.
– The effects of system errors on files and records
within the system.
– System may not be able to meet user’s all
requirement.
8
9. What is test case? Amity School of Business
• It describes an input description and an expected output
description.
• During testing, conditions are set, required input is given
to system and observed output is compared with
expected output to know the outcome of test case.
• If expected and observed outputs are different, then,
there is a failure and it must be recorded properly to find
out the reason of failure.
• If both are same then there is no failure and program
behaved in expected manner.
• A good test case has high probability of finding errors.
9
10. Types of System TestingAmity School of Business
• Unit testing
• Integration testing
• System testing
• User Acceptance Testing
10
11. Unit Testing Amity School of Business
• It is the process of taking a module and
running it in isolation from rest of the
software product by using prepared test
cases and comparing actual results with
the predicted results.
11
12. Reasons for Unit testing Amity School of Business
• The size of single module is small enough
that we can locate the errors fairly easily.
• Confusing interactions of multiple errors in
widely different parts of the software are
eliminated.
12
13. Integration Testing Amity School of Business
When independent module of software are linked together
to form a complete system, integration testing is done to
determine that the interface between modules is also
correct.
• One specific target of integration testing is the interface:
whether the parameters match on both sides as to type,
permissible ranges, meaning and utilization.
• Each time a new module is added as a part of integration
testing, the software changes. New data flow paths are
established, new I/O occur, and new control logic is
invoked. These changes may cause problems with the
functions that previously worked flawlessly and to solve
these problems integration testing is done.
13
14. System Testing Amity School of Business
• Software is one component of large
computer based system. Ultimatly
software is incorporated with other system
components and thus, a series of special
tests are to be conducted to ensure whole
system is working correctly.
• Software should actually be tested on
many different hardware set-ups, memory,
processor, operating system, and
peripheral 14
15. Amity School of Business
• Response time under various loads and
operating conditions.
• Measurement of main and disk memory
usage.
• Time and effort needed to recover from
failure should also be noted and compared
with specifications.
15
16. Amity School of Business
During system testing, number of attributes
of the software are evaluated that are vital to
users:
•Security
•Compatibility
•Dependability
•Documentation
16
17. User acceptance Testing Amity School of Business
When a software is developed for users,
it’s put under series of tests to enable a
user to validate all requirements. The
discovered errors are then fixed and better
quality software will be delivered to the
customers.
17
18. Installation Amity School of Business
• The process of moving from the current
information system to the new one is
called installation.
18
19. Approaches to Installation Amity School of Business
Four approaches of installation are there:
• Direct Installation
• Parallel Installation
• Single Location
• Phased Installation
19
20. Direct Installation Amity School of Business
• Abrupt
• “Cold turkey”
Advantage
• Low cost
• High interest in making installation a
success.
• May be the only possible approach if new
and existing systems cannot coexist in
some form. 20
22. Direct Installation-Risks Amity School of Business
• Operational error have direct impact on
users and organization.
• It may take too long to restore old system,
if necessary.
• Time-consuming and benefits may be
delayed until whole system is installed.
22
23. Parallel Installation Amity School of Business
• Old and new system coexist.
• Safe
Advantage
• New system can be checked against old
systems.
• Impact of operational errors are minimized
because old system is also processing all
data.
23
25. Parallel-Risks Amity School of Business
• Not all aspects of new system can be
compared to old system.
• Very expensive due to duplication of effort
to run and maintain two systems.
• Can be confusing to users.
• May be delay until benefits result.
• May not be feasible due to costs or
system size.
25
26. Single Location Install
Amity School of Business
• Pilot approach.
• Middle-of-the road approach
• May involve series of single location
installations.
• Each location may be branch office,
factory or department.
26
28. Advantage-Single Location Amity School of Business
• Learning can occur and problems fixed by
concentrating on one site.
• Limits potential harm and costs from
system errors or failure to selected pilot
sites.
• Can use early success to convince others
to convert to new system.
28
29. Single Location-Risks Amity School of Business
• Burden on IS staff to maintain old and new
systems.
• If different sites require data sharing, extra
programs need to be written to “bridge”
the two systems.
• Some parts of organization get benefits
earlier than other parts.
29
30. Phased Installation Amity School of Business
• Staged, incremental, gradual, based on
system functional components.
• Similar to bringing system out via multiple
releases.
30
32. Advantage-Phased Amity School of Business
• Allows for system development also to be
phased.
• Limits potential harm and costs from
system error or failure to certain business
activities/functions.
• Risk spread over time.
• Some benefits can be achieved early.
• Each phase is small and more
manageable.
32
33. Disadvantage-Phased Amity School of Business
• Old and new systems must be able to
work together and share data, which likely
will require extra programming to “bridge”
the two systems.
• Conversion is constant and may extend
over a long period, causing frustration and
confusion for users.
33
34. Documentation Amity School of Business
Two Audiences for the Final
Documentation
IS Personnel Users
35. System Documentation Amity School of Business
• Detailed information about a
system’s design specifications, its
internal workings, and its
functionality.
• System Documentation is further
divided into internal, external.
36. Internal Documentation Amity School of Business
• It is a part of program source code.
36
37. External Documentation Amity School of Business
• It includes the outcome of all of the
structured diagramming techniques such
as DFD, ER Diagram.
37
38. User Documentation Amity School of Business
• Written or visual information about an
application system, how it works, and
how to use it.
39. Amity School of Business
• System Documentation is intended
primarily for maintenance programmers,
user documentation is intended mainly for
users.
39
40. Amity School of Business
What Makes Good
Documentation?
• Contains an overview, index, getting
started instructions, I.e. – very
structured
• Describes functionalities
• Contains task-based documentation
– “How to’s…”
– Frequently Asked Questions
– Messages & their meanings
41. Training the end-users Amity School of Business
• Training and support help people
adequately use computer systems to do
their primary work.
• Without proper training and the
opportunity to ask questions and gain
assistance/consultation when needed,
users will misuse, underuse, or not use
the information system that has been
developed.
42. Training the end-users Amity School of Business
• The term training refers to the acquisition
of knowledge, skills, and competencies as
a result of the teaching of practical skills
and knowledge that relate to specific
useful competencies.
• Support is providing ongoing educational
and problem solving assistance to
information users.
42
43. Training Methodologies Amity School of Business
• Resident Expert
• Computer based instruction
• Formal courses-several people taught at
the same time.
• Software help components.
• Tutorials-one person taught at a time.
• Interactive training manuals-combinations
of tutorials and computer aided instruction
• External sources, such as vendor.
44. Supporting the End-user Amity School of Business
• Automated Issue Tracking
• Automating support
• Providing support through a Help Desk
• Other things to consider:
– Providing recovery and backup
– Disaster recovery
– PC maintenance
45. Why Implementation sometimes Amity School of Business
FAIL?
Two conditions are necessary for a
successful implementation effort:
•Management support of the system
•Involvement of users in the development
process.
Despite the support and active participation
of users and management, information
systems implementation still sometimes
fails.
45
46. Insight for Successful
Implementation process Amity School of Business
• Risk
• Commitment to project
• Commitment to change
• Extension of project definition and
planning
• Realistic user expectation
46
47. Amity School of Business
Two most common and trusted ways of
determining system implementation
success are:
•The extent to which the system is used and
the user’s satisfaction with the system.
•Political Factors should be well addressed.
47
48. Amity School of Business
What is System Maintenance?
• Software maintenance is a very broad activity that
includes error corrections, enhancements of
capabilities, deletion of obsolete capabilities, and
optimization.
• So, any work done to change the software after it is
operational is considered to be a maintenance work.
• The purpose of maintenance is to preserve the value
of software over time.
48
49. Amity School of Business
• System maintenance is a very important activity of
software life cycle which may span for more than 20
years and constitute the highest cost incurred in
SDLC.
• Maintenance accounts for 50-80% of total system
development as shown in following figure.
49
50. Amity School of Business
Code
20%
Development
Cost Design Test
40% 40%
Code
Design 8% Test
Total life cycle 11% 11%
of software
Maintenance
70%
50
51. Primary activities of Maintenance Amity School of Business
Request for
system service
1
System and
Request program
program & documentation Submit test
system doc results for
user approval
Specify
Modification
required Return
requirements
modification modified
documentation
Make required to library
changes to
programs & Project
Notify user Completion
systems of project notice
completion
Test changes
1
52. Types of Maintenance Amity School of Business
Three types of maintenance are:
• Corrective Maintenance
• Adaptive Maintenance
• Perfective Maintenance
52
53. Corrective Maintenance of Business
Amity School
• It means repairing processing or performance
failures or making changes because of
previously uncorrected problems or false
assumptions.
• Corrective maintenance is initiated by the
defect in the system.
• The defect can result from design errors,
logic errors, coding errors, performance or
processing failure.
54. Adaptive Maintenance
Amity School of Business
• It includes modifying the software to match
the changes in the ever changing
environment.
• The term environment includes totality of
all conditions and influences which act from
outside upon the software, for e.g.,
business rules, government policies, work
pattern, software and hardware operating
platforms.
• A change in the whole or part of the
environment will require a corresponding
modification of the software.
55. Perfective Maintenance School of Business
Amity
It involves making enhancements to improve
processing performance, interface usability, or to add
desired, but not necessarily required, system features.
It means enhancing the performance or modifying the
programs to respond to the user’s additional or
changing needs. Of these types, more time and money
are spent on perfective than corrective and adaptive
maintenance together.
Perfective maintenance refers to enhancements making
the product better, faster, smaller, better documented,
cleaner structured, with more functions and reports.
56. Amity School of Business
Adaptive
25% Perfective
50%
Corrective
25%
Fig: Distribution of Maintenance Efforts
56
57. Measuring Maintenance Amity School of Business
Effectiveness
• Because maintenance can be costly, it is
important to measure its effectiveness
which is measured in terms of following
factors:
• No. of failures
• Time between failures
• Type of failure
57
58. System Maintenance Vs Amity School of Business
Enhancement
• If the changes are made in existing
functionalities of a system, after it is
operational ,then these changes are categorized
as system maintenance.
• However when new functionality is added
onto a existing system then this activity is
termed as system enhancement.
59. Quality Assurance Amity School of Business
• It is to certify that the program or software
package is current and confirms to
standards.
• With a growing trend toward purchasing
ready to use software, certification has
become more important.
• A package that is certified goes through a
team of specialists who test, review, and
determine how well it meets the vendor’s
claims. 59