The document discusses various approaches to creating information systems, including custom development, off-the-shelf software selection, and end user development. It describes the system development life cycle (SDLC) methodology, including definition, build, and implementation phases. Alternative approaches like prototyping are also covered. The benefits and risks of different creation methods are outlined.
https://www.learntek.org/blog/sdlc-phases/
https://www.learntek.org/
Learntek is global online training provider on Big Data Analytics, Hadoop, Machine Learning, Deep Learning, IOT, AI, Cloud Technology, DEVOPS, Digital Marketing and other IT and Management courses.
https://www.learntek.org/blog/sdlc-phases/
https://www.learntek.org/
Learntek is global online training provider on Big Data Analytics, Hadoop, Machine Learning, Deep Learning, IOT, AI, Cloud Technology, DEVOPS, Digital Marketing and other IT and Management courses.
software engineering , its characteristic ,changing nature of software,evolving nature of software,legacy software,generic view of software,process flow ,umbrella activity,CMMI,PROCESS ASSESSMENT ,team and personal software process
https://www.learntek.org/blog/sdlc-phases/
https://www.learntek.org/
Learntek is global online training provider on Big Data Analytics, Hadoop, Machine Learning, Deep Learning, IOT, AI, Cloud Technology, DEVOPS, Digital Marketing and other IT and Management courses.
https://www.learntek.org/blog/sdlc-phases/
https://www.learntek.org/
Learntek is global online training provider on Big Data Analytics, Hadoop, Machine Learning, Deep Learning, IOT, AI, Cloud Technology, DEVOPS, Digital Marketing and other IT and Management courses.
software engineering , its characteristic ,changing nature of software,evolving nature of software,legacy software,generic view of software,process flow ,umbrella activity,CMMI,PROCESS ASSESSMENT ,team and personal software process
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
ch11.ppt
1. Chapter 11
Creating Information Systems
What managers need to know about the process by which
organizational information systems come to be
Chapter 11
1
2. Course Roadmap
• Part I: Foundations
• Part II: Competing in the Internet Age
• Part III: The Strategic use of Information Systems
• Part IV: Getting IT Done
– Chapter 10: Funding Information Systems
– Chapter 11: Creating Information Systems
– Chapter 12: Information System Trends
– Chapter 13: Security, Privacy and Ethics
2
3. Learning Objectives
1. To appreciate how complex it is to design and implement information systems and
the stable, robust, secure technology at their core.
2. To articulate the advantages and disadvantages of custom software design and
development versus acquisition of an off-the-shelf product.
3. To describe and be able to use the main methodologies for custom software
design and development. Specifically, you will be able to identify the major phases
of the system development life cycle (SDLC) and discuss its advantages and
disadvantages. You will also become familiar with the prototyping approach and
will be able to identify its principal advantages and disadvantages.
4. To describe the systems selection methodology and be able to use it to choose a
pre-packaged software program for a specific organization.
5. To describe the reasons for the increasing prominence of end-user development in
modern organizations and to articulate the benefits and risks of this approach to
software development.
3
4. Introduction
• Whether the information systems rely on custom-developed technology or
off-the-shelf software, it is critical that you as a general or functional
manager understand how information systems come to be.
• While general and functional managers need not be concerned with
hardware decisions, they must take part in the software design,
acquisition, and implementation processes.
• Involvement in information systems funding and design is essential
because never before has a firm’s success depended so much on the use
of the right software applications.
• Deciding what the characteristics of the “right” applications are is a
business decision that is based more on the business case and the
understanding of the business processes the software will enable (or
constrain!) than on any technical consideration
4
6. How Hard Can IT Be?
• Challenge: The U.S. subsidiary of one of the major food
producers in the world inked a deal to implement SAP
(the leading enterprise system application), in an effort
to centralize and rationalize operations across its nine
divisions. The project required streamlining processes,
standardizing software applications, and implementing
the same organizational structure across the units
• Question: How much time and how much money
would you budget for this project?
• Answer: six years and over $200 million
6
7. How Hard Can IT Be?
• Challenge: A large hospitality company with over 2,000
branded hotels developed a customer information
system to enable its customer relationship
management (CRM) strategy. The custom-developed
functionalities of the software application at the heart
of the information system included a property-
management system, the loyalty and CRM applications,
and the reporting modules.
• Question: How much time and how much money
would you budget for this project?
• Answer: Two years and about $120 million.
7
8. Information Systems Development
• Technology Development
– The process of creating the core IT
– IT can be acquired and integrated into existing
infrastructure
– IT can be custom-built by (or for) the
organization
• Information System Development
– Successfully integrating the technology with the
other components to achieve a working system
8
9. Three Approaches
• Custom design and development
• Implementing software that is expressly made to
fit the unique needs of the organization
• System selection and acquisition
• Implement an off-the-shelf application that is
mass produced by a vendor
• End-user development
• Implement a software application that is created
by an end users, rather than the firms IS
professionals
9
10. Advantages of Custom
Development
• Unique Tailoring
– Molded to fit the unique features, characteristics,
and needs of the firm that commissions them.
– Off-the-shelf software may require adjustment
(customization) to fit the organization
• Flexibility and Control
– Building from scratch allows the software to be
molded into any form and modified at a later time
10
11. Advantages of Purchasing
• Faster Roll-Out
– Purchased software dramatically reduce the time it takes
to obtain the software and to begin the implementation
process
• Knowledge Infusion
– Software developers proactively seek out best practices in
order to code their applications
• Economically Attractive
– The firm can capitalize on economies of scale created by
the vendor
• Software Quality
– Mature off-the-shelf products have been heavily tested
11
12. Make and Buy
• Modern firms are blending the custom
development and selection approaches
– First firms acquire off-the-shelf systems, then they
modify them extensively
– Few firms modify off-the-shelf applications slightly
or not at all
– Off-the-shelf applications are becoming larger and
more complex, and require some modification to
fit the purchasing firm
12
14. Systems Development Life Cycle
• The SDLC approach is predicated on the
notion that detailed justification and planning
will reduce risk and uncertainty in systems
development
– Critical: Involvement from end-users and
functional managers
– Requires considerable time analyzing
requirements up front
– Requires that changes after the project has
started be kept to a minimum
14
15. Principal Phases of the SDLC
• Definition
– Investigation
– Feasibility Analysis
– System Analysis
• Build
– System Design
– Programming
– Testing
• Implementation
– Installation
– Operations
– Maintenance
15
16. Principal Phases of the SDLC
• Definition
– Investigation
– Feasibility Analysis
– System Analysis
• Build
– System Design
– Programming
– Testing
• Implementation
– Installation
– Operations
– Maintenance
16
17. The Definition Phase
• Concerned with clearly identifying the
features of the proposed information system
• Critical is the involvement of end-users and
functional managers at this time
• Resources (systems analysts) during this phase
will identify and articulate the system
requirements
17
18. The Definition Phase
• Investigation Stage
– Identify the business issues the system will pertain
to
– Formulate:
• Main goals of the system
• Scope of the design
• Value proposition of the new system
– Typically a very informal stage
18
19. The Definition Phase
• Feasibility Analysis Stage
– Used to ensure that organizational resources are put to the
best use
– Technical Feasibility: Evaluate whether the proposed
system is viable from a technology standpoint
– Operational Feasibility: Evaluate whether the Information
System as planned will work in the organization
– Economic Feasibility: Evaluation of the financial viability of
the system
• Perform a cost/benefit analysis in order to ensure the money
spent will meet the firm’s financial hurdles.
19
20. The Definition Phase
• Systems Analysis Stage
– The process of identifying and articulating the system
requirements
– Systems analysts play a major role at this stage
– Systems analysts must seek out and value the input of end-
users and other stakeholders
– The systems requirements document
• Details the inputs the systems will accept
• Details the outputs the system will produce
• Once approved (client sign-off), the requirements are “frozen”
• In a strict waterfall approach no further changes are allowed
20
22. The Build Phase
• The most technical phase
• The one by which people picture when they
imagine how software is designed and
developed
• Key resources involved includes systems
architects and programmers
• The objective is to take the system
requirements document and produce a
robust, secure, and efficient application.
22
23. The Build Phase
• Systems Design Stage
– Using the results from the definition phase, systems architects create the overall structure of
the system
– The output of this stage is a precise set of documents that programmers will employ to write
code
• Programming Stage
– The process of translating the abstract software design into a set of
instructions that can be executed by the hardware
– Thorough and clear documentation is essential for support, maintenance, and
upgrades
• Testing
– Programmers are constantly engaged in testing as they develop the system
– Formalized testing of the completed application is an essential stage of the
SDLC
– The objective it to release the application when it is good enough, not when it
is flawless
23
26. The Implementation Phase
• The process of ensuring that the technology is
properly integrated with the other
components of the information system
• Extremely delicate time
• Success at this stage requires:
– Project management skills
– Executive involvement
26
27. The Implementation Phase
• Installation Stage
– The software is loaded
on the production
hardware and the
databases are
populated
– Typically occurs during
slow periods for the
organization
– Four major
implementation
approaches
27
28. Installation Approaches
• Parallel Installation
– Old and new systems are run for a time together,
in parallel
• Offers insurance against failure of new application
• Most costly as it requires redundancy of efforts
Old System
New System
28
29. Installation Approaches
• Direct (Cutover) Installation
– The old system is discontinued and the firm cuts
over to the new one.
– Most radical approach
– Unavoidable in some cases (e.g., Y2K)
Old System
New System
29
30. Installation Approaches
• Phased Installation
– The new system progressively replaces the
functionalities of the old one
– Best suited for componentized or modular
applications that can be rolled out in stages
New System
Old System
30
31. Installation Approaches
• Pilot Implementation
– Allows the firm to run the new system in one
business unit or one of the firm’s departments
before rolling it out completely
– Well suited for multi-unit operations
Old System
New System
31
32. The Implementation Phase
• End-user training
– Occurs during the installation phase
– Typically occurs in formal settings, such as
classrooms or make-shift computer labs
• Change Management
– Process of smoothing the transition from the old
system to the new work practices
– User resistance and inertia are the biggest dangers
32
33. The Implementation Phase
• Operations Stage
– At this stage the system is up and running and the firm
begins to use it
– The system becomes a permanent asset of the
organization
• Maintenance Stage
– Compiling errors requests
– Prioritizing them
– Implementing fixes and improvements
• Functionality gaps may arise and can be closed by way
of upgrades and additions
33
34. Advantages of SLDC Approach
• Provides a systematic approach to software
development
• Identifies roles and expectations of team
members
• Best-suited for large-scale projects
• Designed for cost control
• Enforces a means of communication between
the project team and the project stakeholders
34
35. Prototyping
• Rooted in the notion that it is impossible to
clearly estimate and plan complex information
systems projects
• Allows for flexibility and iteration in the design
process
• Enabled by tools that speed up the
development process
• Can be used internally within the SDLC as a
way to seek input user input
35
36. Prototyping Life Cycle
• Requirements Definitions
– Process of determining basic requirements
– Degree of precision is less than with SDLC because
requirements are not frozen
• Initial Prototype
– The first iteration of the software
– At this point, the software can take many forms
and can evolve in many directions
36
37. Prototyping Life Cycle
• Evaluation
– Stakeholders review the prototype and provide
feedback on the current design
– Offer requests for enhancements and new
functionality
• Revision
– Design and coding of the requested changes
– New prototype is developed and is submitted for
review
37
38. Prototyping Life Cycle
• Completion
– Occurs after multiple iterations
– The iterative evaluation and revision cycle stops
– The development team finalizes the system
– Documentation and testing occur prior to the
formal release of the software
38
39. Advantages of the Prototyping
Approach
• Speed
• Closer to the users expectations:
– The process require more user involvement
– Multiple iterations structure user feedback
• Enables the firm to experiment with new
technologies
• Best suited to smaller-scale projects
39
40. Limitations to the Prototyping
Approach
• The software is more likely to be lacking from a:
– Security
– Robustness
– Reliability
• Often less thoroughly tested and documented
• May lead to unreasonable expectations
• May lead to scope creep
40
41. Agile Development
• A new breed of software
development approaches has taken
hold recently, in part due to the
increasing popularity of
prototyping.
• The software development
approaches are collectively labeled
as agile software development
methodologies
– Individuals and interactions over
processes and tools
– Working software over
comprehensive documentation
– Customer collaboration over contract
negotiation
– Responding to change over following
a plan
The State of Use for Agile Methodologies
41
42. CMM
• Capability Maturity Model (CMM)
ranks software development
organizations according to their
ability to produce quality
software by evaluating a set of
standard processes thought to
determine software quality.
• The CMM is based on the core
notion that reliable and
consistent implementation of a
specific set of processes
represents a higher level of
software development maturity
and, as a consequence, ensures
higher quality software products
42
43. Outsourced Development
• Custom-designed software programs are
increasingly outsourced
• Virtual Development Teams
– Teams that work together but are not physically
located together
• Superior cost/quality ratio
– Superior quality products at a fraction of the cost
of internal development
43
44. Purchasing Off-the-Shelf SW
• The process of:
– Identifying
– Purchasing
– Implementing
suitable off-the-shelf
software programs
• Typically spearheaded by
management interest
44
45. The Definition Phase
• Investigation Stage
– Identify the business issues the system will be designed to
address
– Formulate goals and the scope of design
• Feasibility Analysis Stage
– Technical Feasibility: Evaluate whether the proposed
system is viable from a technology standpoint
– Operational Feasibility: Evaluate whether the Information
System as planned will work in the organization
– Economic Feasibility: Evaluation of the financial viability of
the system
45
46. The Definition Phase
• Systems Analysis Stage
– Focus on determining the specific functionalities
required of the proposed system
• Formulate Evaluation Criteria Stage
– Determine essential features & capabilities the
system must have
– Value adding features:
• Capabilities that offer significant advantages for which
the firm will pay a premium
46
47. The Definition Phase
• Compile Short List of Vendors Stage
– Identify potential vendors that meet the Request
For Proposal (RFP) requirements
• Compile and Distribute the RFP Stage
– RFP identifies critical system requirements and
expectations
– Interested firms will respond to the RFP
– An internal selection committee is formed
47
48. The Definition Phase
• Evaluate Alternatives Stage
– Determine a list of top vendors based upon the criteria
developed earlier
• Negotiate Contract Stage
– Object is to draft and sign a contract that provides the
needed solution and insulates the firm from future risk
– Focus on cost, eventual liabilities, and control of
intellectual property
48
49. The Build Phase
• System Design (Configuration) Stage
– The process of modifying through parameters, if necessary
• Programming (Customization) Stage
– The process of modifying the application by designing new
functionality
– Follows the system design and development approach
– Necessary to accommodate specific needs of the organization
• Testing Stage
– Concerned with system performance rather than with the
identification and correction of bugs
49
50. The Implementation Phase
• Similar to SDLC implementation phase
• Process change requirements are typically
greater for off-the-shelf applications than
custom software
• Users are trained to operate the software
• Change management may be substantial
• The organization should plan to invest
considerable resources
50
51. End-User Development
• An umbrella term capturing the many ways in
which knowledge workers, not IT
professionals, create software
• Examples:
– Spreadsheet models (written in MS Excel)
– Personal databases (MS Access)
– Software programs built with user-friendly
computer languages (Visual Basic for Application)
51
52. The Benefits of End-User Development
• Increased Speed of Development
– Projects can be completed independently by the
end-user
• End-user Satisfaction
– When a user creates their own applications, they
are more likely to be satisfied with the result
• Reduced Pressure on the IS Function
52
53. The Risks of End-user Development
• Unreliable Quality Standards
– Because of the limited skill set and knowledge of most end
users, the quality of their work varies dramatically
• High Incidence of Errors
– The focus on outcomes and rapid development increase
the likelihood of errors
• Continuity Risks
– Often difficult for anyone but the individual who wrote the
program to understand it, enhance it, or support it
53
54. The Recap
• Introducing an organizational information system is a two-
step process requiring technology development and the
implementation process.
• Modern firms introduce new information systems using
one of the following approaches: custom design and
development, system selection and acquisition, or end-user
development.
– In the first approach, IT professionals within the organization or
who are contracted develop uniquely tailored software for the
firm’s needs.
– In the second approach, the selection committee chooses an
off-the-shelf application.
– In the third approach, it is the firm’s end users, rather than the
IT professionals, who create the software
54
55. The Recap
• The main methodology for custom system development is the
system development life cycle (SDLC).
– The SDLC is articulated over three main phases—definition, build, and
implementation—and nine stages. The primary limitation of the SDLC
is the creation of substantial overhead and rigidity that limit the
project team’s ability to address the inevitable changes.
• The prototyping methodology has emerged as a viable alternative
to the SDLC.
– Prototyping is rooted in the notion that it impossible to clearly
estimate and plan in detail such complex endeavors as information
systems design and development projects.
– Instead the team is better served by staying nimble and iterating
quickly through multiple designs to zero in on the optimal one.
55
56. What we Learned
1. To appreciate how complex it is to design and implement information systems and
the stable, robust, secure technology at their core.
2. To articulate the advantages and disadvantages of custom software design and
development versus acquisition of an off-the-shelf product.
3. To describe and be able to use the main methodologies for custom software
design and development. Specifically, you will be able to identify the major phases
of the system development life cycle (SDLC) and discuss its advantages and
disadvantages. You will also become familiar with the prototyping approach and
will be able to identify its principal advantages and disadvantages.
4. To describe the systems selection methodology and be able to use it to choose a
pre-packaged software program for a specific organization.
5. To describe the reasons for the increasing prominence of end-user development in
modern organizations and to articulate the benefits and risks of this approach to
software development.
56