SlideShare a Scribd company logo
1 of 9
Business Case for Investment Outline Prototypes/Environment
Processes
1Business Case for Investment Outline
Prototypes/Environment Processes
2Business Case for Investment Outline Introduction
Different Prototyping Processes
Creating a dynamic process will allow for multiple devices and
operating machines to access the information. This process will
include secure access for all employees and software developers
for source code applications. Housing the source code on an
internal server will add to the security that we will provide for
our customers. This will also develop more clients by having a
reward program to receive the benefits of Batman Island
Resorts.
Frequent Flyer Program
Browser
Internet
Customer Access
Book Flights
Baterman Island
Resorts Server
Employee Access
Firewall
Firewall
Baterman Island
Resorts
Frequent Flyer
Customer
Information/
Reward Points
Interface
Quiry
Interface
Quiry
Airline Information
Customer Air Miles
Database
Database
Database
Conclusion
References
_1471127865.vsd
�
�
�
�
�
�
�
�
�
�
�
�
�
�
�
�
Frequent Flyer Program
Business Case for Investment Outline
1Business Case for Investment Outline
9Business Case for Investment Outline Introduction
In today’s economy families are trying to save in every way
possible when it comes to vacationing. Baterman Island Resorts
is looking to compete with other big chain resorts to retain their
customer base while saving them as much money as possible.
With some research and investigating Baterman Island Resorts
became interested in creating a “Frequent Flyer Program.” With
Baterman Island Resorts creating a “Frequent Flyer Program”,
they will be able to award their loyal customers with loyalty
points. The points provide certain discounts and certain prizes
redeemable at the resort for reaching a certain statues on their
Frequent Flyer Program. Customers are rewarded for booking
multiple visits in a row in the Frequent Flyer Program. Loyalty
points are earned by visiting the Baterman Island Resorts
locations. Great benefits are available for customers but it will
also benefits the venders selling at the resort and also Baterman
Island Resorts. Automated tracking on a computer base
operating system that tracks what items are the biggest seller.
The biggest priority for Baterman Island Resorts will be to keep
their current customers and to gain new ones with this Frequent
Flyer Program there going to start.
Prototyping environments and processes
Baterman Island Resorts handles a series of small cottages and
local hotels in the Northwest Valley (Boardman Management
Group, 2012). Idealy Baterman Island Resorts is managed by
Boardman management group. The efficient management of
Baterman Island Resorts relies on a surplus of sales. The
surplus of sales will heavily be devoted to effectively
implementing a frequent shoppers program. To effectively
implement an frequent shoppers program, Baterman Island
Resorts it is emparitive to have a clear understanding of
software and hardware prototyping enviroments and processes.
Effective and efficient enviroments require the proper allocation
of CPU space and disk space. These requirements will come
from one enhanced power edge T620 tower server. Since
Baterman Island Resorts is medium size business, the useof
these servers will be efficient for operations. The servers will
include a E5-2620 processor, 8GB memory, and 500GB hard
drive space. Since baterman Island Resort’s customer count is
adequate, will be important to have pleanty of hardrive space to
allocate to the database. Since the use of the mobile
applications and web features will put a significant load on the
servers, it highly important to allocate at least 4GB of memory,
and 4GB of backup memory.
The processes included heavily deal with how the program is
developed. There will be three major UIs’. The first UI will
will be for desktop/laptop end users. The UI will allow user to
login into a priopriatary ecryped account, that stores
information such as points rewarded, days earned, and previous
lodging. All of this information will be parsed to the user from
the data using PHP and MySQL code. The user credentials will
be stored within a data using the customers product key, such as
the customer number. The development of the web interfaces
will use WAMP stack and Apache open SSL to ensure
information is secure. The second UI will also be for the end
users, but for end user that use mobile devises. The mobile app
will also allow the end user to login into a priopriatary ecryped
account, that stores information such as points rewarded, days
earned, and previous lodging. The development of the mobile
will require the use of Java and styling languages. The mobile
app will also have the ability to connect to a database that
parses information to the end user in regards to points rewarded,
days earned, and previous lodging. The third UI will be for
Baderman Island Resort’s employees. This UI will allow
employee to reference customers credentials using the database.
The database will parse the information to the employee with
the use of an GUI. The employee can ultimately read and write
to a database using a simplified GUI.
The overall algorithm of the frequent shoppers program will be
based on several variables. These variables will be
implemented into the program, to add and subtract rewards
points. The rewards points will be automatically added when a
customer checks out the resort. The program will first check to
see if the customer has paid, if the customer has paid, the
program will then check the database for amount of
accoumadation days. Depending on the amount of
accoumadation days, the program will add the specified amount
of rewards points that the programmer instructs. Testing design
to include procedures and standards
The design will be testing all procedures and standards that will
need to be implemented. This will include all software
applications that will have to be created or designed to be
incorporated into the main CRM system or equivalent to.
Testing this software will come more alterations to coding
further securing or maintaining the flow of the system and
follow the business standards. Software standards.
(1989). These provide the framework from which the software
evolves.Design standards specify the form and content of the
design product. They provide rules and methods for translating
the software requirements into the software design and for
representing it in the design documentation. Standards and
procedures establish the prescribed methods for developing
software; the role is to ensure their existence and adequacy.
Proper documentation of standards and procedures is necessary
since the activities of process monitoring, product evaluation
and auditing rely upon definitions to measure project
compliance.In addressing the information security procedures
and standards for the development of the rewards program for
Baterman Island Resorts, the process known as System
Development Life Cycle (SDLC) is seen as the most effective
approach to identify components needed for security roles and
responsibilities. The Baterman Island Resorts approach to
implementing SDLC throughout the system developmental
controls should focus on a variety of goals and strategies.
According to the National Institute of Standards and
Technology, the multistep process of SDLC, starts with
initiation, analysis, design, and implementation, maintenance
and disposal will require security activities associated with each
step (Kissel, et al., 2008). Code standards specify the language
in which the code is to be written and define any restrictions on
use of language features. They define legal language structures,
style conventions, rules for data structures and interfaces, and
internal code documentation.Sources of accessibility
The main interface our customers will use to check on their
rewards, and to book stays will be through the use of their cell
phone. Therefore, we will ensure that we have a robust and
efficient web server that can process the universal mobile
interface (UMI). Although the UMI will be the most used
interface for our consumers, we must not neglect our traditional
desktop or laptop customers as well. According to Strom
(2010), “The computer screen size, image and sound quality is
well suited for large, multi-sensory, brand communications,
while keyboard and mouse facilitate more extensive search,
comparison and evaluation of information for purchasing
decisions”. To that end, we will have to accommodate legacy
users with the new mobile and tablet generation. The UMI is
also the medium that customers who provision tablets can use to
navigate our website.
Lastly, we will have customers who do not use mobile, laptop,
desktop, or tablets. For these valued customers, we will have to
provision a call center. To keep resource use down and bottom
line up, there will have to be hours of operation, so it will not
be 24 hours seven days a week. The customer service
representatives will use the same mediums for accessibility as
the customers who chose to not call the center and use the
technology at their fingertips. Integration
For the software to function properly and ensure that none of
the business’ activities are negatively affected, it should be
integrated to the activities of the business to make it effective
and benefit the business in its operations. The software shall be
built in a manner that it benefits the business one hundred per
cent. All activities that the business provides to its consumers,
including the additional activities that the business is willing to
provide in future, shall be incorporated during the software
preparation. The activities offered by the business shall provide
the steps in which the software shall be created. Further, these
activities shall be tested before the software is provided for
consumers to use. All activities that the business intends to
provide through the software shall be tested to ensure that they
work properly, which will aid in preventing future negative
impacts or failures.
The business shall integrate its activities into the system
through a step by step method. This method shall include a
process that involves integrating one activity at a time. We shall
ensure that one activity is properly functioning before moving
to the integration of another activity. Once all activities are all
integrated, the management shall then test the integration for
proper functionality. Since this is a long term project, the
software shall provide for integration of more activities by
providing an option of integrating activities that shall be
developed in future by the business.
As the business tools continue evolving and entering new areas
of the management of programs, the business shall constantly
seek various ways of integrating the list of tools properly
functioning. We shall make it mandatory to leverage the output
and the input abilities of the software as well as the ability to
satisfy consumers. The software shall be properly maintained to
ensure that it performs competently for the longest time
possible. Conclusion
Everyone dreams of that perfect vacation out on a tropical
island, what this reward program is giving the customer the
chance to go on their vacation and save some money, while
boosting sales for Baterman Island Resorts. With the frequent
shoppers program, Baterman Resorts will have to install new
software and hard with upgraded processor’s, more memory and
a tower server to handle the mobile app and website. The
rewards program will be accessible through the mobile phone,
desktops and laptops, tablets and for individuals that do not use
the up to date technology, a call center will be available during
operating hours. The I.T. team will incorporate three UI’s; the
first is focused on end users, which includes personal
information and encryption for security. The Second UI is for
the mobile application end users, to login in and check their
points and status updates. The third and final UI will be for the
employees at the resort, so they can check the status of the
customer’s credentials. Testing will be accomplished by
following the System Development Life Cycle process, to
ensure the best possible product with little to no errors. Before
all of the software and hardware is deployed and installed, it
will be thoroughly tested by the “step by step” method, to
ensure the program has minimal flaws and glitches. This new
program will be a great advantage not only for the frequent
customers, but will give new customers the reason to sign up for
the benefits program and visit the resort.
References
Boardman Management Group. (2012). About bmg. Retrieved
from
https://ecampus.phoenix.edu/secure/aapd/CIST/VOP/Business/B
oardmanManagementGroup//internet/index.asp
Gates, B, & Collins, H. (2009). Business @ the speed of
thought: using a digital system. New
York, NY: Warner Books.
Hechter, M. (2009). Technology in Organizations. New York:
Russell Sage Foundation.
Kissel, R., Stine, K., Scholl, M., Rossman, H., Fahlsing, J., &
Gulick, J. (2008). National Instititute of Standards and
Technology - Information Security. Gathersburg, MD: National
Institute of Standards and Technology Computer Security
Division.
Software standards. (1989). IEEE Software, 6(2), 84.
doi:http://dx.doi.org/10.1109/MS.1989.10013
Strom, R. (2010). WordPress.com. Universal Mobile Interface.
Retrieved from:
http://universalmobileinterface.wordpress.com/

More Related Content

Similar to Business Case for Investment Outline PrototypesEnvironment Proc.docx

APM Talk
APM TalkAPM Talk
APM TalkMongoDB
 
Software Asset Management Datasheet
Software Asset Management DatasheetSoftware Asset Management Datasheet
Software Asset Management DatasheetJade Global
 
Promisec - ROI Calculator - Wireframes
Promisec - ROI Calculator - WireframesPromisec - ROI Calculator - Wireframes
Promisec - ROI Calculator - Wireframesscubeuser31
 
Challenges of Mobile HR framework and program
Challenges of Mobile HR framework and programChallenges of Mobile HR framework and program
Challenges of Mobile HR framework and programJinen Dedhia
 
SAS 70 in a Post-Sarbanes, SaaS World: Quest Session 52070
SAS 70 in a Post-Sarbanes, SaaS World: Quest Session 52070SAS 70 in a Post-Sarbanes, SaaS World: Quest Session 52070
SAS 70 in a Post-Sarbanes, SaaS World: Quest Session 52070retheauditors
 
Paywings - Payroll Software
Paywings - Payroll SoftwarePaywings - Payroll Software
Paywings - Payroll SoftwareSchool Time
 
CA Management Cloud - Enterprise Mobility
CA Management Cloud - Enterprise MobilityCA Management Cloud - Enterprise Mobility
CA Management Cloud - Enterprise MobilityCA Technologies
 
Hostel Mess Attendance Management System using Wifi
Hostel Mess Attendance Management System using WifiHostel Mess Attendance Management System using Wifi
Hostel Mess Attendance Management System using WifiIRJET Journal
 
Cepoke Product eng
Cepoke Product engCepoke Product eng
Cepoke Product engincubusen
 
Peppercan Apicta in Melbourne
Peppercan Apicta in MelbournePeppercan Apicta in Melbourne
Peppercan Apicta in MelbourneWanida_Natt
 
Essential Guide to Becoming A Mobile App Rock Star - part II - Enterprise Apps
Essential Guide to Becoming A Mobile App Rock Star - part II - Enterprise AppsEssential Guide to Becoming A Mobile App Rock Star - part II - Enterprise Apps
Essential Guide to Becoming A Mobile App Rock Star - part II - Enterprise AppsDMIMarketing
 
Metakortex Presentation
Metakortex PresentationMetakortex Presentation
Metakortex Presentationguest0df6b0
 
Creating a mobile enterprise application business case.
Creating a mobile enterprise application business case.Creating a mobile enterprise application business case.
Creating a mobile enterprise application business case.DMI
 
Guilford grou p leveraging the web 7 31
Guilford grou p leveraging the web 7 31Guilford grou p leveraging the web 7 31
Guilford grou p leveraging the web 7 31GuilfordGroup
 
Why not let apm do all the heavy lifting beyond the basics of monitoring | Sw...
Why not let apm do all the heavy lifting beyond the basics of monitoring | Sw...Why not let apm do all the heavy lifting beyond the basics of monitoring | Sw...
Why not let apm do all the heavy lifting beyond the basics of monitoring | Sw...Swatantra Kumar
 

Similar to Business Case for Investment Outline PrototypesEnvironment Proc.docx (20)

SRRK IT Limited
SRRK IT LimitedSRRK IT Limited
SRRK IT Limited
 
Power Systems Client References
Power Systems Client ReferencesPower Systems Client References
Power Systems Client References
 
APM Talk
APM TalkAPM Talk
APM Talk
 
Software Asset Management Datasheet
Software Asset Management DatasheetSoftware Asset Management Datasheet
Software Asset Management Datasheet
 
venki 2.7
venki 2.7venki 2.7
venki 2.7
 
Resume
ResumeResume
Resume
 
Promisec - ROI Calculator - Wireframes
Promisec - ROI Calculator - WireframesPromisec - ROI Calculator - Wireframes
Promisec - ROI Calculator - Wireframes
 
Challenges of Mobile HR framework and program
Challenges of Mobile HR framework and programChallenges of Mobile HR framework and program
Challenges of Mobile HR framework and program
 
SAS 70 in a Post-Sarbanes, SaaS World: Quest Session 52070
SAS 70 in a Post-Sarbanes, SaaS World: Quest Session 52070SAS 70 in a Post-Sarbanes, SaaS World: Quest Session 52070
SAS 70 in a Post-Sarbanes, SaaS World: Quest Session 52070
 
Paywings - Payroll Software
Paywings - Payroll SoftwarePaywings - Payroll Software
Paywings - Payroll Software
 
CA Management Cloud - Enterprise Mobility
CA Management Cloud - Enterprise MobilityCA Management Cloud - Enterprise Mobility
CA Management Cloud - Enterprise Mobility
 
Hostel Mess Attendance Management System using Wifi
Hostel Mess Attendance Management System using WifiHostel Mess Attendance Management System using Wifi
Hostel Mess Attendance Management System using Wifi
 
brainmagic-profile
brainmagic-profilebrainmagic-profile
brainmagic-profile
 
Cepoke Product eng
Cepoke Product engCepoke Product eng
Cepoke Product eng
 
Peppercan Apicta in Melbourne
Peppercan Apicta in MelbournePeppercan Apicta in Melbourne
Peppercan Apicta in Melbourne
 
Essential Guide to Becoming A Mobile App Rock Star - part II - Enterprise Apps
Essential Guide to Becoming A Mobile App Rock Star - part II - Enterprise AppsEssential Guide to Becoming A Mobile App Rock Star - part II - Enterprise Apps
Essential Guide to Becoming A Mobile App Rock Star - part II - Enterprise Apps
 
Metakortex Presentation
Metakortex PresentationMetakortex Presentation
Metakortex Presentation
 
Creating a mobile enterprise application business case.
Creating a mobile enterprise application business case.Creating a mobile enterprise application business case.
Creating a mobile enterprise application business case.
 
Guilford grou p leveraging the web 7 31
Guilford grou p leveraging the web 7 31Guilford grou p leveraging the web 7 31
Guilford grou p leveraging the web 7 31
 
Why not let apm do all the heavy lifting beyond the basics of monitoring | Sw...
Why not let apm do all the heavy lifting beyond the basics of monitoring | Sw...Why not let apm do all the heavy lifting beyond the basics of monitoring | Sw...
Why not let apm do all the heavy lifting beyond the basics of monitoring | Sw...
 

More from humphrieskalyn

Evaluate the role of leadership on organizational behaviorProv.docx
Evaluate the role of leadership on organizational behaviorProv.docxEvaluate the role of leadership on organizational behaviorProv.docx
Evaluate the role of leadership on organizational behaviorProv.docxhumphrieskalyn
 
Evaluate the role that PKI plays in cryptography.Ensure that you.docx
Evaluate the role that PKI plays in cryptography.Ensure that you.docxEvaluate the role that PKI plays in cryptography.Ensure that you.docx
Evaluate the role that PKI plays in cryptography.Ensure that you.docxhumphrieskalyn
 
Evaluate the presence and effects of alteration in the homeostatic s.docx
Evaluate the presence and effects of alteration in the homeostatic s.docxEvaluate the presence and effects of alteration in the homeostatic s.docx
Evaluate the presence and effects of alteration in the homeostatic s.docxhumphrieskalyn
 
Evaluate the role of a digital certificate in cryptography.  How doe.docx
Evaluate the role of a digital certificate in cryptography.  How doe.docxEvaluate the role of a digital certificate in cryptography.  How doe.docx
Evaluate the role of a digital certificate in cryptography.  How doe.docxhumphrieskalyn
 
Evaluate the merits of Piaget’s stage theory for explaining cognitiv.docx
Evaluate the merits of Piaget’s stage theory for explaining cognitiv.docxEvaluate the merits of Piaget’s stage theory for explaining cognitiv.docx
Evaluate the merits of Piaget’s stage theory for explaining cognitiv.docxhumphrieskalyn
 
Evaluate the notion that white collar offenders are intrinsically di.docx
Evaluate the notion that white collar offenders are intrinsically di.docxEvaluate the notion that white collar offenders are intrinsically di.docx
Evaluate the notion that white collar offenders are intrinsically di.docxhumphrieskalyn
 
EV 551 Hazardous Materials Assessment – Summer2020Homework 1 – 4.docx
EV 551 Hazardous Materials Assessment – Summer2020Homework 1 – 4.docxEV 551 Hazardous Materials Assessment – Summer2020Homework 1 – 4.docx
EV 551 Hazardous Materials Assessment – Summer2020Homework 1 – 4.docxhumphrieskalyn
 
Evaluate the history of cryptography from its origins.  Analyze how .docx
Evaluate the history of cryptography from its origins.  Analyze how .docxEvaluate the history of cryptography from its origins.  Analyze how .docx
Evaluate the history of cryptography from its origins.  Analyze how .docxhumphrieskalyn
 
Evaluate the evidence provided by Apollo Shoes.Decide how to s.docx
Evaluate the evidence provided by Apollo Shoes.Decide how to s.docxEvaluate the evidence provided by Apollo Shoes.Decide how to s.docx
Evaluate the evidence provided by Apollo Shoes.Decide how to s.docxhumphrieskalyn
 
Evaluate the Health History and Medical Information for Mrs. J.,.docx
Evaluate the Health History and Medical Information for Mrs. J.,.docxEvaluate the Health History and Medical Information for Mrs. J.,.docx
Evaluate the Health History and Medical Information for Mrs. J.,.docxhumphrieskalyn
 
Evaluate the current state of the health care system in Sacramento. .docx
Evaluate the current state of the health care system in Sacramento. .docxEvaluate the current state of the health care system in Sacramento. .docx
Evaluate the current state of the health care system in Sacramento. .docxhumphrieskalyn
 
Evaluate the advantages and disadvantages of the various decis.docx
Evaluate the advantages and disadvantages of the various decis.docxEvaluate the advantages and disadvantages of the various decis.docx
Evaluate the advantages and disadvantages of the various decis.docxhumphrieskalyn
 
Evaluate some technologies that can help with continuous monitoring..docx
Evaluate some technologies that can help with continuous monitoring..docxEvaluate some technologies that can help with continuous monitoring..docx
Evaluate some technologies that can help with continuous monitoring..docxhumphrieskalyn
 
Evaluate progress on certification plansReport your prog.docx
Evaluate progress on certification plansReport your prog.docxEvaluate progress on certification plansReport your prog.docx
Evaluate progress on certification plansReport your prog.docxhumphrieskalyn
 
Evaluate how you have achieved course competencies and your plans to.docx
Evaluate how you have achieved course competencies and your plans to.docxEvaluate how you have achieved course competencies and your plans to.docx
Evaluate how you have achieved course competencies and your plans to.docxhumphrieskalyn
 
Evaluate how information privacy and security relates to the Interne.docx
Evaluate how information privacy and security relates to the Interne.docxEvaluate how information privacy and security relates to the Interne.docx
Evaluate how information privacy and security relates to the Interne.docxhumphrieskalyn
 
Evaluate assessment of suicide in forensic settings andor cri.docx
Evaluate assessment of suicide in forensic settings andor cri.docxEvaluate assessment of suicide in forensic settings andor cri.docx
Evaluate assessment of suicide in forensic settings andor cri.docxhumphrieskalyn
 
Evaluate different approaches to ethical decision making. Then, choo.docx
Evaluate different approaches to ethical decision making. Then, choo.docxEvaluate different approaches to ethical decision making. Then, choo.docx
Evaluate different approaches to ethical decision making. Then, choo.docxhumphrieskalyn
 
Evaluate and grade websites in terms of their compliance with PL pri.docx
Evaluate and grade websites in terms of their compliance with PL pri.docxEvaluate and grade websites in terms of their compliance with PL pri.docx
Evaluate and grade websites in terms of their compliance with PL pri.docxhumphrieskalyn
 
Evaluate at least (2) factors that make financial statement analys.docx
Evaluate at least (2) factors that make financial statement analys.docxEvaluate at least (2) factors that make financial statement analys.docx
Evaluate at least (2) factors that make financial statement analys.docxhumphrieskalyn
 

More from humphrieskalyn (20)

Evaluate the role of leadership on organizational behaviorProv.docx
Evaluate the role of leadership on organizational behaviorProv.docxEvaluate the role of leadership on organizational behaviorProv.docx
Evaluate the role of leadership on organizational behaviorProv.docx
 
Evaluate the role that PKI plays in cryptography.Ensure that you.docx
Evaluate the role that PKI plays in cryptography.Ensure that you.docxEvaluate the role that PKI plays in cryptography.Ensure that you.docx
Evaluate the role that PKI plays in cryptography.Ensure that you.docx
 
Evaluate the presence and effects of alteration in the homeostatic s.docx
Evaluate the presence and effects of alteration in the homeostatic s.docxEvaluate the presence and effects of alteration in the homeostatic s.docx
Evaluate the presence and effects of alteration in the homeostatic s.docx
 
Evaluate the role of a digital certificate in cryptography.  How doe.docx
Evaluate the role of a digital certificate in cryptography.  How doe.docxEvaluate the role of a digital certificate in cryptography.  How doe.docx
Evaluate the role of a digital certificate in cryptography.  How doe.docx
 
Evaluate the merits of Piaget’s stage theory for explaining cognitiv.docx
Evaluate the merits of Piaget’s stage theory for explaining cognitiv.docxEvaluate the merits of Piaget’s stage theory for explaining cognitiv.docx
Evaluate the merits of Piaget’s stage theory for explaining cognitiv.docx
 
Evaluate the notion that white collar offenders are intrinsically di.docx
Evaluate the notion that white collar offenders are intrinsically di.docxEvaluate the notion that white collar offenders are intrinsically di.docx
Evaluate the notion that white collar offenders are intrinsically di.docx
 
EV 551 Hazardous Materials Assessment – Summer2020Homework 1 – 4.docx
EV 551 Hazardous Materials Assessment – Summer2020Homework 1 – 4.docxEV 551 Hazardous Materials Assessment – Summer2020Homework 1 – 4.docx
EV 551 Hazardous Materials Assessment – Summer2020Homework 1 – 4.docx
 
Evaluate the history of cryptography from its origins.  Analyze how .docx
Evaluate the history of cryptography from its origins.  Analyze how .docxEvaluate the history of cryptography from its origins.  Analyze how .docx
Evaluate the history of cryptography from its origins.  Analyze how .docx
 
Evaluate the evidence provided by Apollo Shoes.Decide how to s.docx
Evaluate the evidence provided by Apollo Shoes.Decide how to s.docxEvaluate the evidence provided by Apollo Shoes.Decide how to s.docx
Evaluate the evidence provided by Apollo Shoes.Decide how to s.docx
 
Evaluate the Health History and Medical Information for Mrs. J.,.docx
Evaluate the Health History and Medical Information for Mrs. J.,.docxEvaluate the Health History and Medical Information for Mrs. J.,.docx
Evaluate the Health History and Medical Information for Mrs. J.,.docx
 
Evaluate the current state of the health care system in Sacramento. .docx
Evaluate the current state of the health care system in Sacramento. .docxEvaluate the current state of the health care system in Sacramento. .docx
Evaluate the current state of the health care system in Sacramento. .docx
 
Evaluate the advantages and disadvantages of the various decis.docx
Evaluate the advantages and disadvantages of the various decis.docxEvaluate the advantages and disadvantages of the various decis.docx
Evaluate the advantages and disadvantages of the various decis.docx
 
Evaluate some technologies that can help with continuous monitoring..docx
Evaluate some technologies that can help with continuous monitoring..docxEvaluate some technologies that can help with continuous monitoring..docx
Evaluate some technologies that can help with continuous monitoring..docx
 
Evaluate progress on certification plansReport your prog.docx
Evaluate progress on certification plansReport your prog.docxEvaluate progress on certification plansReport your prog.docx
Evaluate progress on certification plansReport your prog.docx
 
Evaluate how you have achieved course competencies and your plans to.docx
Evaluate how you have achieved course competencies and your plans to.docxEvaluate how you have achieved course competencies and your plans to.docx
Evaluate how you have achieved course competencies and your plans to.docx
 
Evaluate how information privacy and security relates to the Interne.docx
Evaluate how information privacy and security relates to the Interne.docxEvaluate how information privacy and security relates to the Interne.docx
Evaluate how information privacy and security relates to the Interne.docx
 
Evaluate assessment of suicide in forensic settings andor cri.docx
Evaluate assessment of suicide in forensic settings andor cri.docxEvaluate assessment of suicide in forensic settings andor cri.docx
Evaluate assessment of suicide in forensic settings andor cri.docx
 
Evaluate different approaches to ethical decision making. Then, choo.docx
Evaluate different approaches to ethical decision making. Then, choo.docxEvaluate different approaches to ethical decision making. Then, choo.docx
Evaluate different approaches to ethical decision making. Then, choo.docx
 
Evaluate and grade websites in terms of their compliance with PL pri.docx
Evaluate and grade websites in terms of their compliance with PL pri.docxEvaluate and grade websites in terms of their compliance with PL pri.docx
Evaluate and grade websites in terms of their compliance with PL pri.docx
 
Evaluate at least (2) factors that make financial statement analys.docx
Evaluate at least (2) factors that make financial statement analys.docxEvaluate at least (2) factors that make financial statement analys.docx
Evaluate at least (2) factors that make financial statement analys.docx
 

Recently uploaded

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 

Recently uploaded (20)

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 

Business Case for Investment Outline PrototypesEnvironment Proc.docx

  • 1. Business Case for Investment Outline Prototypes/Environment Processes 1Business Case for Investment Outline Prototypes/Environment Processes 2Business Case for Investment Outline Introduction Different Prototyping Processes Creating a dynamic process will allow for multiple devices and operating machines to access the information. This process will include secure access for all employees and software developers for source code applications. Housing the source code on an internal server will add to the security that we will provide for our customers. This will also develop more clients by having a reward program to receive the benefits of Batman Island Resorts. Frequent Flyer Program Browser Internet Customer Access Book Flights Baterman Island Resorts Server Employee Access Firewall Firewall Baterman Island
  • 2. Resorts Frequent Flyer Customer Information/ Reward Points Interface Quiry Interface Quiry Airline Information Customer Air Miles Database Database Database Conclusion References _1471127865.vsd � � � � � � � � � � � � � � � � Frequent Flyer Program
  • 3. Business Case for Investment Outline 1Business Case for Investment Outline 9Business Case for Investment Outline Introduction In today’s economy families are trying to save in every way possible when it comes to vacationing. Baterman Island Resorts is looking to compete with other big chain resorts to retain their customer base while saving them as much money as possible. With some research and investigating Baterman Island Resorts became interested in creating a “Frequent Flyer Program.” With Baterman Island Resorts creating a “Frequent Flyer Program”, they will be able to award their loyal customers with loyalty points. The points provide certain discounts and certain prizes redeemable at the resort for reaching a certain statues on their Frequent Flyer Program. Customers are rewarded for booking multiple visits in a row in the Frequent Flyer Program. Loyalty points are earned by visiting the Baterman Island Resorts locations. Great benefits are available for customers but it will also benefits the venders selling at the resort and also Baterman Island Resorts. Automated tracking on a computer base operating system that tracks what items are the biggest seller. The biggest priority for Baterman Island Resorts will be to keep their current customers and to gain new ones with this Frequent Flyer Program there going to start. Prototyping environments and processes Baterman Island Resorts handles a series of small cottages and
  • 4. local hotels in the Northwest Valley (Boardman Management Group, 2012). Idealy Baterman Island Resorts is managed by Boardman management group. The efficient management of Baterman Island Resorts relies on a surplus of sales. The surplus of sales will heavily be devoted to effectively implementing a frequent shoppers program. To effectively implement an frequent shoppers program, Baterman Island Resorts it is emparitive to have a clear understanding of software and hardware prototyping enviroments and processes. Effective and efficient enviroments require the proper allocation of CPU space and disk space. These requirements will come from one enhanced power edge T620 tower server. Since Baterman Island Resorts is medium size business, the useof these servers will be efficient for operations. The servers will include a E5-2620 processor, 8GB memory, and 500GB hard drive space. Since baterman Island Resort’s customer count is adequate, will be important to have pleanty of hardrive space to allocate to the database. Since the use of the mobile applications and web features will put a significant load on the servers, it highly important to allocate at least 4GB of memory, and 4GB of backup memory. The processes included heavily deal with how the program is developed. There will be three major UIs’. The first UI will will be for desktop/laptop end users. The UI will allow user to login into a priopriatary ecryped account, that stores information such as points rewarded, days earned, and previous lodging. All of this information will be parsed to the user from the data using PHP and MySQL code. The user credentials will be stored within a data using the customers product key, such as the customer number. The development of the web interfaces will use WAMP stack and Apache open SSL to ensure information is secure. The second UI will also be for the end users, but for end user that use mobile devises. The mobile app will also allow the end user to login into a priopriatary ecryped account, that stores information such as points rewarded, days earned, and previous lodging. The development of the mobile
  • 5. will require the use of Java and styling languages. The mobile app will also have the ability to connect to a database that parses information to the end user in regards to points rewarded, days earned, and previous lodging. The third UI will be for Baderman Island Resort’s employees. This UI will allow employee to reference customers credentials using the database. The database will parse the information to the employee with the use of an GUI. The employee can ultimately read and write to a database using a simplified GUI. The overall algorithm of the frequent shoppers program will be based on several variables. These variables will be implemented into the program, to add and subtract rewards points. The rewards points will be automatically added when a customer checks out the resort. The program will first check to see if the customer has paid, if the customer has paid, the program will then check the database for amount of accoumadation days. Depending on the amount of accoumadation days, the program will add the specified amount of rewards points that the programmer instructs. Testing design to include procedures and standards The design will be testing all procedures and standards that will need to be implemented. This will include all software applications that will have to be created or designed to be incorporated into the main CRM system or equivalent to. Testing this software will come more alterations to coding further securing or maintaining the flow of the system and follow the business standards. Software standards. (1989). These provide the framework from which the software evolves.Design standards specify the form and content of the design product. They provide rules and methods for translating the software requirements into the software design and for representing it in the design documentation. Standards and procedures establish the prescribed methods for developing software; the role is to ensure their existence and adequacy. Proper documentation of standards and procedures is necessary
  • 6. since the activities of process monitoring, product evaluation and auditing rely upon definitions to measure project compliance.In addressing the information security procedures and standards for the development of the rewards program for Baterman Island Resorts, the process known as System Development Life Cycle (SDLC) is seen as the most effective approach to identify components needed for security roles and responsibilities. The Baterman Island Resorts approach to implementing SDLC throughout the system developmental controls should focus on a variety of goals and strategies. According to the National Institute of Standards and Technology, the multistep process of SDLC, starts with initiation, analysis, design, and implementation, maintenance and disposal will require security activities associated with each step (Kissel, et al., 2008). Code standards specify the language in which the code is to be written and define any restrictions on use of language features. They define legal language structures, style conventions, rules for data structures and interfaces, and internal code documentation.Sources of accessibility The main interface our customers will use to check on their rewards, and to book stays will be through the use of their cell phone. Therefore, we will ensure that we have a robust and efficient web server that can process the universal mobile interface (UMI). Although the UMI will be the most used interface for our consumers, we must not neglect our traditional desktop or laptop customers as well. According to Strom (2010), “The computer screen size, image and sound quality is well suited for large, multi-sensory, brand communications, while keyboard and mouse facilitate more extensive search, comparison and evaluation of information for purchasing decisions”. To that end, we will have to accommodate legacy users with the new mobile and tablet generation. The UMI is also the medium that customers who provision tablets can use to navigate our website. Lastly, we will have customers who do not use mobile, laptop,
  • 7. desktop, or tablets. For these valued customers, we will have to provision a call center. To keep resource use down and bottom line up, there will have to be hours of operation, so it will not be 24 hours seven days a week. The customer service representatives will use the same mediums for accessibility as the customers who chose to not call the center and use the technology at their fingertips. Integration For the software to function properly and ensure that none of the business’ activities are negatively affected, it should be integrated to the activities of the business to make it effective and benefit the business in its operations. The software shall be built in a manner that it benefits the business one hundred per cent. All activities that the business provides to its consumers, including the additional activities that the business is willing to provide in future, shall be incorporated during the software preparation. The activities offered by the business shall provide the steps in which the software shall be created. Further, these activities shall be tested before the software is provided for consumers to use. All activities that the business intends to provide through the software shall be tested to ensure that they work properly, which will aid in preventing future negative impacts or failures. The business shall integrate its activities into the system through a step by step method. This method shall include a process that involves integrating one activity at a time. We shall ensure that one activity is properly functioning before moving to the integration of another activity. Once all activities are all integrated, the management shall then test the integration for proper functionality. Since this is a long term project, the software shall provide for integration of more activities by providing an option of integrating activities that shall be developed in future by the business. As the business tools continue evolving and entering new areas of the management of programs, the business shall constantly seek various ways of integrating the list of tools properly functioning. We shall make it mandatory to leverage the output
  • 8. and the input abilities of the software as well as the ability to satisfy consumers. The software shall be properly maintained to ensure that it performs competently for the longest time possible. Conclusion Everyone dreams of that perfect vacation out on a tropical island, what this reward program is giving the customer the chance to go on their vacation and save some money, while boosting sales for Baterman Island Resorts. With the frequent shoppers program, Baterman Resorts will have to install new software and hard with upgraded processor’s, more memory and a tower server to handle the mobile app and website. The rewards program will be accessible through the mobile phone, desktops and laptops, tablets and for individuals that do not use the up to date technology, a call center will be available during operating hours. The I.T. team will incorporate three UI’s; the first is focused on end users, which includes personal information and encryption for security. The Second UI is for the mobile application end users, to login in and check their points and status updates. The third and final UI will be for the employees at the resort, so they can check the status of the customer’s credentials. Testing will be accomplished by following the System Development Life Cycle process, to ensure the best possible product with little to no errors. Before all of the software and hardware is deployed and installed, it will be thoroughly tested by the “step by step” method, to ensure the program has minimal flaws and glitches. This new program will be a great advantage not only for the frequent customers, but will give new customers the reason to sign up for the benefits program and visit the resort. References Boardman Management Group. (2012). About bmg. Retrieved from https://ecampus.phoenix.edu/secure/aapd/CIST/VOP/Business/B oardmanManagementGroup//internet/index.asp
  • 9. Gates, B, & Collins, H. (2009). Business @ the speed of thought: using a digital system. New York, NY: Warner Books. Hechter, M. (2009). Technology in Organizations. New York: Russell Sage Foundation. Kissel, R., Stine, K., Scholl, M., Rossman, H., Fahlsing, J., & Gulick, J. (2008). National Instititute of Standards and Technology - Information Security. Gathersburg, MD: National Institute of Standards and Technology Computer Security Division. Software standards. (1989). IEEE Software, 6(2), 84. doi:http://dx.doi.org/10.1109/MS.1989.10013 Strom, R. (2010). WordPress.com. Universal Mobile Interface. Retrieved from: http://universalmobileinterface.wordpress.com/