SlideShare a Scribd company logo
8
Systems Analysis and Design in a
Changing World, Fourth Edition
8
2
Learning Objectives
Prioritize the system requirements based on the
desired scope and level of automation for the
new system
Describe the strategic decisions that integrate the
application deployment environment and the
design approach for the new system
Determine alternative approaches for system
implementation
8
3
Learning Objectives (continued)
Evaluate and select an implementation approach
based on the needs and resources of the
organization
Describe key elements of a request for proposal
(RFP) and evaluate vendors’ proposals for
outsourced alternatives
Develop a professional presentation of findings to
management
8
4
Overview
Chapter explains last three activities of analysis
Prioritize systems requirements
Generate and evaluate alternatives
Review recommendation with management
Refocus project direction
Transition from discovery and analysis to
solutions and design
Set direction for design and implementation of
solution system
8
5
Project Management Perspective
Project manager and senior technical members
of project team work together
Eight areas of project management
Human resources
Procurement
Communications
Risk
Scope
Time
Cost
Quality
8
6
Deciding on Scope and Level of Automation
Scope determines which business functions will
be included in system
Level of automation is how much computer
support exists for functions included in scope
Scope creep
Requests for addition of system functions after
requirements have been defined and decision has
been made
Users typically request more business functions
than budget allows
8
7
Determining the Level of Automation
Low level
Functions automated for simple computer record keeping
Medium level
Midrange point that combines features from low and high
alternatives
High level
System automates most processing of business functions
8
8
RMO Customer Support System Functions, Priority, and
Three Levels of Automation (Partial Figure 8-1)
8
9
Selecting Alternatives
Entire group of alternatives is evaluated together
to provide “big picture” view of proposed system
Key criteria that are used
Strategic plan
Economic feasibility
Schedule and resource feasibility
Technological feasibility
Operational, organizational, and cultural feasibility
8
10
Defining the Application
Deployment Environment
Configuration of
Computer hardware
System software
Networks
Development tools
Existing environment generally considered and
compared with proposed environment
8
11
Range of Application Types
Stand-alone applications on mini- and personal
computers
Online interactive applications
Distributed applications
Web-based applications
8
12
Hardware, System Software, and
Networks
Computers range from handheld to super
computers
Operating systems range from Windows to Unix
Database management systems range from
Oracle to SQL Server to IBM DB2
Software components and standards range from
Java 2 Enterprise (J2EE) to Microsoft .NET
Web servers range from IIS to Apache
8
13
Deployment Environment Characteristics
to Consider
Compatibility with system requirements
Compatibility among hardware and system
software
Required interfaces to external systems
Conformity with IT strategic plan and architecture
plans
Cost and schedule
8
14
Development Tools
Development environment – programming
languages, CASE tools, and other software used
to develop application software
Java and Visual Studio .NET are examples
Application deployment environment decisions
limit development tool choices
Operating system environment
Database management system (DBMS)
Distributed software standard
8
15
Existing Processing Environment at RMO
(Figure 8-3)
8
16
Processing Environment Alternatives
(Figure 8-4)
8
17
Strategic Directions for RMO Processing
Environment (Figure 8-5)
8
18
Choosing Implementation Alternatives
Variations on obtaining system
Facilities management – outsource all IS support
Packaged software, turnkey system, ERP system
Custom-built software systems
In-house development
Selection dimensions
Buy vs. build
In-house vs. outsource
8
19
Implementation Alternatives (Figure 8-6)
8
20
Selecting an Implementation Alternative
Identifying criteria for selection
Comparisons can be difficult
Different proposed systems have strengths in
different areas
Three major areas to consider
General requirements
Technical requirements
Functional requirements
8
21
Partial Matrix of General Requirements, Weights,
and Scores for Alternatives (Figure 8-7)
8
22
Partial Matrix of Functional Requirements,
Weights, and Scores for Alternatives (Figure 8-8)
8
23
Partial Matrix of Technical Requirements,
Weights, and Scores for Alternatives (Figure 8-9)
8
24
Making the Selection
First, rate each alternative with raw score
Weighted scores are then tabulated and
compared to make a choice
RMO decided on in-house development for most
CSS development to keep expertise within RMO
RMO wants to hire some new technical
specialists
RMO feasibility review showed no serious
problems – after specialists are added
8
25
Contracting with Vendors
Generate request for proposal (RFP)
Formal document sent to vendors if in-house
development is not selected
States requirements and solicits proposed
solutions
Considered a competitive contract offer
Bid on supplying hardware, software, and/or
support services
8
26
I. Introduction and Background
II. Overview of Need
III. Description of Technical Requirements
IV. Description of Functional Requirements
Sample RFP Table of Contents (Figure 8-10)
8
27
V. Description of General Requirements
VI. Requested Provider and Project Information
VII. Details for Submitting Proposal
IV. Evaluation Criteria and Process
Sample RFP Table of Contents (continued)
8
28
Sample RFP
Table of
Contents
(continued)
8
29
Benchmarking and Choosing a Vendor
Observe in use or install trial version
Benchmark – evaluate the system against a
standard
Visit another company using a particular system
Develop a contract
Fixed-dollar – risk is on vendor
Cost-plus-percentage – risk is on purchaser
Cost-plus-fixed-fee – risk is shared by both
8
30
Presenting Results and Making Decisions
Compile and organize documentation
Present alternatives and critical issues in easy-to-
understand but complete manner
Final choice generally made by executive
steering committee
Format of documentation and presentation style
varies with organization
8
31
Summary
These activities are primarily project manager
responsibilities with support from project team
Focus of project changes from discovering
requirements to developing solution system
Prioritize requirements based on scope and level
of automation
Scope of new system determines functions it will
support
Level of automation is a measure of how
automated the selected functions will be
8
32
Summary (continued)
Application deployment environment
Computer hardware, systems software, and
networks in which new system will operate
Determines constraints imposed on system
development alternatives
Analyst must define environment to match
Application requirements
Organization’s strategic application plans
Organization’s technology architecture plans
8
33
Summary (continued)
Determine what alternatives are possible for
developing solution
Implementation alternatives include
Building system in-house
Buying packaged or turnkey solution
Contracting with developer to build system
(outsource)
Develop recommendations and present to
management to make funding decisions

More Related Content

What's hot

Operating system security
Operating system securityOperating system security
Operating system security
Ramesh Ogania
 
Mis 8
Mis 8Mis 8
Chap13 Security and Ethical Challenges
Chap13 Security and Ethical ChallengesChap13 Security and Ethical Challenges
Chap13 Security and Ethical Challenges
Aqib Syed
 
Stock Maintenance System-Problem Statement, SRS, ERD, DFD, Structured Chart
Stock Maintenance System-Problem Statement, SRS, ERD, DFD, Structured ChartStock Maintenance System-Problem Statement, SRS, ERD, DFD, Structured Chart
Stock Maintenance System-Problem Statement, SRS, ERD, DFD, Structured Chart
grandhiprasuna
 
Information security management
Information security managementInformation security management
Information security managementUMaine
 
Security & protection in operating system
Security & protection in operating systemSecurity & protection in operating system
Security & protection in operating system
Abou Bakr Ashraf
 
The Security Vulnerability Assessment Process & Best Practices
The Security Vulnerability Assessment Process & Best PracticesThe Security Vulnerability Assessment Process & Best Practices
The Security Vulnerability Assessment Process & Best Practices
Kellep Charles
 
System development approaches
System development approachesSystem development approaches
System development approaches
Jaipal Dhobale
 
Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9koolkampus
 
Banking Management System SRS
Banking Management System SRSBanking Management System SRS
Banking Management System SRS
Mr. Moms
 
Information Security Blueprint
Information Security BlueprintInformation Security Blueprint
Information Security Blueprint
Zefren Edior
 
Library mangement system project srs documentation.doc
Library mangement system project srs documentation.docLibrary mangement system project srs documentation.doc
Library mangement system project srs documentation.docjimmykhan
 
Thesis on Library Management System | LMS | Project Report
Thesis on Library Management System | LMS | Project ReportThesis on Library Management System | LMS | Project Report
Thesis on Library Management System | LMS | Project Report
Manish Sahani
 
Fundamentals of Network security
Fundamentals of Network securityFundamentals of Network security
Fundamentals of Network security
APNIC
 
Threats to information security
Threats to information securityThreats to information security
Threats to information securityswapneel07
 
Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1
whitehat 'People'
 
Internet security protocol
Internet security protocolInternet security protocol
Internet security protocolMousmi Pawar
 
library management system
library management systemlibrary management system
library management system
aniket chauhan
 
Hostel Management System(HMS)
Hostel Management  System(HMS)Hostel Management  System(HMS)
Hostel Management System(HMS)
Omkar Walavalkar
 

What's hot (20)

Operating system security
Operating system securityOperating system security
Operating system security
 
Mis 8
Mis 8Mis 8
Mis 8
 
Chap13 Security and Ethical Challenges
Chap13 Security and Ethical ChallengesChap13 Security and Ethical Challenges
Chap13 Security and Ethical Challenges
 
Stock Maintenance System-Problem Statement, SRS, ERD, DFD, Structured Chart
Stock Maintenance System-Problem Statement, SRS, ERD, DFD, Structured ChartStock Maintenance System-Problem Statement, SRS, ERD, DFD, Structured Chart
Stock Maintenance System-Problem Statement, SRS, ERD, DFD, Structured Chart
 
Information security management
Information security managementInformation security management
Information security management
 
Security & protection in operating system
Security & protection in operating systemSecurity & protection in operating system
Security & protection in operating system
 
The Security Vulnerability Assessment Process & Best Practices
The Security Vulnerability Assessment Process & Best PracticesThe Security Vulnerability Assessment Process & Best Practices
The Security Vulnerability Assessment Process & Best Practices
 
Securing information systems
Securing information systemsSecuring information systems
Securing information systems
 
System development approaches
System development approachesSystem development approaches
System development approaches
 
Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9
 
Banking Management System SRS
Banking Management System SRSBanking Management System SRS
Banking Management System SRS
 
Information Security Blueprint
Information Security BlueprintInformation Security Blueprint
Information Security Blueprint
 
Library mangement system project srs documentation.doc
Library mangement system project srs documentation.docLibrary mangement system project srs documentation.doc
Library mangement system project srs documentation.doc
 
Thesis on Library Management System | LMS | Project Report
Thesis on Library Management System | LMS | Project ReportThesis on Library Management System | LMS | Project Report
Thesis on Library Management System | LMS | Project Report
 
Fundamentals of Network security
Fundamentals of Network securityFundamentals of Network security
Fundamentals of Network security
 
Threats to information security
Threats to information securityThreats to information security
Threats to information security
 
Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1
 
Internet security protocol
Internet security protocolInternet security protocol
Internet security protocol
 
library management system
library management systemlibrary management system
library management system
 
Hostel Management System(HMS)
Hostel Management  System(HMS)Hostel Management  System(HMS)
Hostel Management System(HMS)
 

Similar to Evaluating Alternatives for Requirements, Envireonment, and Implemetation

08 si(systems analysis and design )
08 si(systems analysis and design )08 si(systems analysis and design )
08 si(systems analysis and design )
Nurdin Al-Azies
 
Chap05
Chap05Chap05
Chap05
Anne Badong
 
James hall ch 14
James hall ch 14James hall ch 14
James hall ch 14
David Julian
 
09 si(systems analysis and design )
09 si(systems analysis and design )09 si(systems analysis and design )
09 si(systems analysis and design )
Nurdin Al-Azies
 
Chapter 7 Development StrategiesInformation Technology Project Management .pptx
Chapter 7 Development StrategiesInformation Technology Project Management  .pptxChapter 7 Development StrategiesInformation Technology Project Management  .pptx
Chapter 7 Development StrategiesInformation Technology Project Management .pptx
AxmedMaxamuudYoonis
 
chapter07-120827115403-phpapp01.pdf
chapter07-120827115403-phpapp01.pdfchapter07-120827115403-phpapp01.pdf
chapter07-120827115403-phpapp01.pdf
AxmedMaxamuud6
 
SYSTEMS PRESENTATION to help you in design
SYSTEMS PRESENTATION to help you  in designSYSTEMS PRESENTATION to help you  in design
SYSTEMS PRESENTATION to help you in design
rhesusfactor848
 
SE2.ppt
SE2.pptSE2.ppt
SE2.ppt
AaMir519591
 
SA Chapter 7
SA Chapter 7SA Chapter 7
SA Chapter 7
Nuth Otanasap
 
Software selection and implementation in the real world
Software selection and implementation in the real worldSoftware selection and implementation in the real world
Software selection and implementation in the real world
Softworld
 
Acquisition of IT Service Management tools
Acquisition of IT Service Management toolsAcquisition of IT Service Management tools
Acquisition of IT Service Management tools
Christian F. Nissen
 
Se lec-uosl-8
Se lec-uosl-8Se lec-uosl-8
Se lec-uosl-8
Shahzad Zaman
 
Presentation Master thesis defense
Presentation Master thesis defensePresentation Master thesis defense
Presentation Master thesis defense
vdegraaff
 
BSA425 v1.3Supporting Research ReportBSA425 v1.3Page 2 of
BSA425 v1.3Supporting Research ReportBSA425 v1.3Page 2 of BSA425 v1.3Supporting Research ReportBSA425 v1.3Page 2 of
BSA425 v1.3Supporting Research ReportBSA425 v1.3Page 2 of
VannaSchrader3
 
Chapter06 initiating and planning systems development projects
Chapter06 initiating and planning systems development projectsChapter06 initiating and planning systems development projects
Chapter06 initiating and planning systems development projects
Dhani Ahmad
 
Lecture 7 - System Design (Data Modelling) (1).pdf
Lecture 7 - System Design (Data Modelling) (1).pdfLecture 7 - System Design (Data Modelling) (1).pdf
Lecture 7 - System Design (Data Modelling) (1).pdf
DelishiaScott
 
Unit2 Software engineering UPTU
Unit2 Software engineering UPTUUnit2 Software engineering UPTU
Unit2 Software engineering UPTU
Mohammad Faizan
 
BIS Ch 4.ppt
BIS Ch 4.pptBIS Ch 4.ppt
BIS Ch 4.ppt
biruktesfaye27
 
Model-Driven Architecture for Cloud Applications Development, A survey
Model-Driven Architecture for Cloud Applications Development, A surveyModel-Driven Architecture for Cloud Applications Development, A survey
Model-Driven Architecture for Cloud Applications Development, A survey
Editor IJCATR
 
Model-Driven Architecture for Cloud Applications Development, A survey
Model-Driven Architecture for Cloud Applications Development, A surveyModel-Driven Architecture for Cloud Applications Development, A survey
Model-Driven Architecture for Cloud Applications Development, A survey
Editor IJCATR
 

Similar to Evaluating Alternatives for Requirements, Envireonment, and Implemetation (20)

08 si(systems analysis and design )
08 si(systems analysis and design )08 si(systems analysis and design )
08 si(systems analysis and design )
 
Chap05
Chap05Chap05
Chap05
 
James hall ch 14
James hall ch 14James hall ch 14
James hall ch 14
 
09 si(systems analysis and design )
09 si(systems analysis and design )09 si(systems analysis and design )
09 si(systems analysis and design )
 
Chapter 7 Development StrategiesInformation Technology Project Management .pptx
Chapter 7 Development StrategiesInformation Technology Project Management  .pptxChapter 7 Development StrategiesInformation Technology Project Management  .pptx
Chapter 7 Development StrategiesInformation Technology Project Management .pptx
 
chapter07-120827115403-phpapp01.pdf
chapter07-120827115403-phpapp01.pdfchapter07-120827115403-phpapp01.pdf
chapter07-120827115403-phpapp01.pdf
 
SYSTEMS PRESENTATION to help you in design
SYSTEMS PRESENTATION to help you  in designSYSTEMS PRESENTATION to help you  in design
SYSTEMS PRESENTATION to help you in design
 
SE2.ppt
SE2.pptSE2.ppt
SE2.ppt
 
SA Chapter 7
SA Chapter 7SA Chapter 7
SA Chapter 7
 
Software selection and implementation in the real world
Software selection and implementation in the real worldSoftware selection and implementation in the real world
Software selection and implementation in the real world
 
Acquisition of IT Service Management tools
Acquisition of IT Service Management toolsAcquisition of IT Service Management tools
Acquisition of IT Service Management tools
 
Se lec-uosl-8
Se lec-uosl-8Se lec-uosl-8
Se lec-uosl-8
 
Presentation Master thesis defense
Presentation Master thesis defensePresentation Master thesis defense
Presentation Master thesis defense
 
BSA425 v1.3Supporting Research ReportBSA425 v1.3Page 2 of
BSA425 v1.3Supporting Research ReportBSA425 v1.3Page 2 of BSA425 v1.3Supporting Research ReportBSA425 v1.3Page 2 of
BSA425 v1.3Supporting Research ReportBSA425 v1.3Page 2 of
 
Chapter06 initiating and planning systems development projects
Chapter06 initiating and planning systems development projectsChapter06 initiating and planning systems development projects
Chapter06 initiating and planning systems development projects
 
Lecture 7 - System Design (Data Modelling) (1).pdf
Lecture 7 - System Design (Data Modelling) (1).pdfLecture 7 - System Design (Data Modelling) (1).pdf
Lecture 7 - System Design (Data Modelling) (1).pdf
 
Unit2 Software engineering UPTU
Unit2 Software engineering UPTUUnit2 Software engineering UPTU
Unit2 Software engineering UPTU
 
BIS Ch 4.ppt
BIS Ch 4.pptBIS Ch 4.ppt
BIS Ch 4.ppt
 
Model-Driven Architecture for Cloud Applications Development, A survey
Model-Driven Architecture for Cloud Applications Development, A surveyModel-Driven Architecture for Cloud Applications Development, A survey
Model-Driven Architecture for Cloud Applications Development, A survey
 
Model-Driven Architecture for Cloud Applications Development, A survey
Model-Driven Architecture for Cloud Applications Development, A surveyModel-Driven Architecture for Cloud Applications Development, A survey
Model-Driven Architecture for Cloud Applications Development, A survey
 

More from Henhen Lukmana

Moving to Design
Moving to DesignMoving to Design
Moving to Design
Henhen Lukmana
 
The Object-Oriented Approach to Requirements
The Object-Oriented Approach to RequirementsThe Object-Oriented Approach to Requirements
The Object-Oriented Approach to Requirements
Henhen Lukmana
 
The Traditional Approach to Requirement
The Traditional Approach to RequirementThe Traditional Approach to Requirement
The Traditional Approach to Requirement
Henhen Lukmana
 
Modeling System Requirement
Modeling System RequirementModeling System Requirement
Modeling System Requirement
Henhen Lukmana
 
Begining The Analysys Invetigating System Requirement
Begining The Analysys Invetigating System RequirementBegining The Analysys Invetigating System Requirement
Begining The Analysys Invetigating System Requirement
Henhen Lukmana
 
The Analysyst As A Project Manager
The Analysyst As A Project ManagerThe Analysyst As A Project Manager
The Analysyst As A Project Manager
Henhen Lukmana
 
Approaches To System Development
Approaches To System DevelopmentApproaches To System Development
Approaches To System Development
Henhen Lukmana
 
probability theory
probability theoryprobability theory
probability theory
Henhen Lukmana
 

More from Henhen Lukmana (8)

Moving to Design
Moving to DesignMoving to Design
Moving to Design
 
The Object-Oriented Approach to Requirements
The Object-Oriented Approach to RequirementsThe Object-Oriented Approach to Requirements
The Object-Oriented Approach to Requirements
 
The Traditional Approach to Requirement
The Traditional Approach to RequirementThe Traditional Approach to Requirement
The Traditional Approach to Requirement
 
Modeling System Requirement
Modeling System RequirementModeling System Requirement
Modeling System Requirement
 
Begining The Analysys Invetigating System Requirement
Begining The Analysys Invetigating System RequirementBegining The Analysys Invetigating System Requirement
Begining The Analysys Invetigating System Requirement
 
The Analysyst As A Project Manager
The Analysyst As A Project ManagerThe Analysyst As A Project Manager
The Analysyst As A Project Manager
 
Approaches To System Development
Approaches To System DevelopmentApproaches To System Development
Approaches To System Development
 
probability theory
probability theoryprobability theory
probability theory
 

Recently uploaded

GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 

Recently uploaded (20)

GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 

Evaluating Alternatives for Requirements, Envireonment, and Implemetation

  • 1. 8 Systems Analysis and Design in a Changing World, Fourth Edition
  • 2. 8 2 Learning Objectives Prioritize the system requirements based on the desired scope and level of automation for the new system Describe the strategic decisions that integrate the application deployment environment and the design approach for the new system Determine alternative approaches for system implementation
  • 3. 8 3 Learning Objectives (continued) Evaluate and select an implementation approach based on the needs and resources of the organization Describe key elements of a request for proposal (RFP) and evaluate vendors’ proposals for outsourced alternatives Develop a professional presentation of findings to management
  • 4. 8 4 Overview Chapter explains last three activities of analysis Prioritize systems requirements Generate and evaluate alternatives Review recommendation with management Refocus project direction Transition from discovery and analysis to solutions and design Set direction for design and implementation of solution system
  • 5. 8 5 Project Management Perspective Project manager and senior technical members of project team work together Eight areas of project management Human resources Procurement Communications Risk Scope Time Cost Quality
  • 6. 8 6 Deciding on Scope and Level of Automation Scope determines which business functions will be included in system Level of automation is how much computer support exists for functions included in scope Scope creep Requests for addition of system functions after requirements have been defined and decision has been made Users typically request more business functions than budget allows
  • 7. 8 7 Determining the Level of Automation Low level Functions automated for simple computer record keeping Medium level Midrange point that combines features from low and high alternatives High level System automates most processing of business functions
  • 8. 8 8 RMO Customer Support System Functions, Priority, and Three Levels of Automation (Partial Figure 8-1)
  • 9. 8 9 Selecting Alternatives Entire group of alternatives is evaluated together to provide “big picture” view of proposed system Key criteria that are used Strategic plan Economic feasibility Schedule and resource feasibility Technological feasibility Operational, organizational, and cultural feasibility
  • 10. 8 10 Defining the Application Deployment Environment Configuration of Computer hardware System software Networks Development tools Existing environment generally considered and compared with proposed environment
  • 11. 8 11 Range of Application Types Stand-alone applications on mini- and personal computers Online interactive applications Distributed applications Web-based applications
  • 12. 8 12 Hardware, System Software, and Networks Computers range from handheld to super computers Operating systems range from Windows to Unix Database management systems range from Oracle to SQL Server to IBM DB2 Software components and standards range from Java 2 Enterprise (J2EE) to Microsoft .NET Web servers range from IIS to Apache
  • 13. 8 13 Deployment Environment Characteristics to Consider Compatibility with system requirements Compatibility among hardware and system software Required interfaces to external systems Conformity with IT strategic plan and architecture plans Cost and schedule
  • 14. 8 14 Development Tools Development environment – programming languages, CASE tools, and other software used to develop application software Java and Visual Studio .NET are examples Application deployment environment decisions limit development tool choices Operating system environment Database management system (DBMS) Distributed software standard
  • 17. 8 17 Strategic Directions for RMO Processing Environment (Figure 8-5)
  • 18. 8 18 Choosing Implementation Alternatives Variations on obtaining system Facilities management – outsource all IS support Packaged software, turnkey system, ERP system Custom-built software systems In-house development Selection dimensions Buy vs. build In-house vs. outsource
  • 20. 8 20 Selecting an Implementation Alternative Identifying criteria for selection Comparisons can be difficult Different proposed systems have strengths in different areas Three major areas to consider General requirements Technical requirements Functional requirements
  • 21. 8 21 Partial Matrix of General Requirements, Weights, and Scores for Alternatives (Figure 8-7)
  • 22. 8 22 Partial Matrix of Functional Requirements, Weights, and Scores for Alternatives (Figure 8-8)
  • 23. 8 23 Partial Matrix of Technical Requirements, Weights, and Scores for Alternatives (Figure 8-9)
  • 24. 8 24 Making the Selection First, rate each alternative with raw score Weighted scores are then tabulated and compared to make a choice RMO decided on in-house development for most CSS development to keep expertise within RMO RMO wants to hire some new technical specialists RMO feasibility review showed no serious problems – after specialists are added
  • 25. 8 25 Contracting with Vendors Generate request for proposal (RFP) Formal document sent to vendors if in-house development is not selected States requirements and solicits proposed solutions Considered a competitive contract offer Bid on supplying hardware, software, and/or support services
  • 26. 8 26 I. Introduction and Background II. Overview of Need III. Description of Technical Requirements IV. Description of Functional Requirements Sample RFP Table of Contents (Figure 8-10)
  • 27. 8 27 V. Description of General Requirements VI. Requested Provider and Project Information VII. Details for Submitting Proposal IV. Evaluation Criteria and Process Sample RFP Table of Contents (continued)
  • 29. 8 29 Benchmarking and Choosing a Vendor Observe in use or install trial version Benchmark – evaluate the system against a standard Visit another company using a particular system Develop a contract Fixed-dollar – risk is on vendor Cost-plus-percentage – risk is on purchaser Cost-plus-fixed-fee – risk is shared by both
  • 30. 8 30 Presenting Results and Making Decisions Compile and organize documentation Present alternatives and critical issues in easy-to- understand but complete manner Final choice generally made by executive steering committee Format of documentation and presentation style varies with organization
  • 31. 8 31 Summary These activities are primarily project manager responsibilities with support from project team Focus of project changes from discovering requirements to developing solution system Prioritize requirements based on scope and level of automation Scope of new system determines functions it will support Level of automation is a measure of how automated the selected functions will be
  • 32. 8 32 Summary (continued) Application deployment environment Computer hardware, systems software, and networks in which new system will operate Determines constraints imposed on system development alternatives Analyst must define environment to match Application requirements Organization’s strategic application plans Organization’s technology architecture plans
  • 33. 8 33 Summary (continued) Determine what alternatives are possible for developing solution Implementation alternatives include Building system in-house Buying packaged or turnkey solution Contracting with developer to build system (outsource) Develop recommendations and present to management to make funding decisions