This document provides information about the INF4015W course, including:
- The course covers system delivery methods, relevant technologies, strategic IT management, and project management.
- It is intended for students with work experience in IT and aims to impart current knowledge in key IT areas.
- The course content is delivered through lectures, assignments, presentations, and exams over several modules covering topics such as object-oriented systems, technologies, project management, and strategic IT management.
This document discusses requirements engineering for software systems. It covers topics such as functional and non-functional requirements, the software requirements document, requirements specification processes, and requirements elicitation, validation, and management. It describes requirements engineering as establishing customer needs and operational constraints. Requirements can range from abstract to detailed and serve different purposes. Both functional and non-functional requirements are important, and natural language, structured, and other techniques can be used for specification.
The document discusses data indexing, which is a data structure added to files to provide faster data access. Indexing reduces the number of blocks a database management system must check when performing operations like reading, modifying, updating, and deleting data. An index contains a search key and pointer, where the search key is used to look up records and the pointer contains the address of stored data. Common indexing techniques include ordered/primary indexes that access sorted data and hash indexes that uniformly distribute data across buckets. When choosing an indexing technique, factors like access type, time, space overhead are considered. B-trees are commonly used indexing data structures that can grow and shrink dynamically with root, branch and leaf nodes.
This document discusses activity planning for projects. It explains that a detailed project plan should include a schedule showing the start and finish times of each activity. This is important to ensure resources are available when needed, avoid conflicts over shared resources, monitor progress against milestones, and manage cash flow. The document outlines different approaches to identifying activities, including activity-based, product-based, and hybrid structures. It also discusses sequencing activities and using precedence requirements in scheduling.
Ian Sommerville, Software Engineering, 9th Edition Ch 4Mohammed Romi
The document discusses requirements engineering and summarizes key topics covered in Chapter 4, including:
- The importance of specifying both functional and non-functional requirements. Non-functional requirements place constraints on system functions and development process.
- The software requirements specification document defines what the system must do and includes both user and system requirements. It should not describe how the system will be implemented.
- Requirements engineering involves eliciting, analyzing, validating and managing requirements throughout the development lifecycle. Precise, complete and consistent requirements are important for development.
SOUL 2.0 is an integrated library management software developed by INFLIBNET Centre to support the requirements of university and college libraries. It is a user-friendly, standards-compliant software that can be used to manage acquisitions, cataloguing, circulation, serials control and other library operations and resources. SOUL 2.0 provides reports, barcode generation, customization and other features to help library staff manage operations and resources effectively. Technical support and training is available from INFLIBNET Centre.
This document summarizes a seminar on parallel computing. It defines parallel computing as performing multiple calculations simultaneously rather than consecutively. A parallel computer is described as a large collection of processing elements that can communicate and cooperate to solve problems fast. The document then discusses parallel architectures like shared memory, distributed memory, and shared distributed memory. It compares parallel computing to distributed computing and cluster computing. Finally, it discusses challenges in parallel computing like power constraints and programmability and provides examples of parallel applications like GPU processing and remote sensing.
Automation and Integrated Library SystemsJulie Goldman
Simmons LIS 489: Technology Foundations for Information Science
Social and Professional Aspects Final Presentation: Automation and Integrated Library Systems. Focuses on two different automation systems used by libraries.
Here are the steps to add the new folder:
1. Add a new <c02> element within <c01 level="series">Series II: Addenda</c01>
2. Add a <did> element within the new <c02>
3. Add appropriate elements within <did> like <container>, <unittitle>, <unitdate> to describe the new folder
4. Make any other changes needed to fully integrate and describe the new folder within the finding aid.
Let me know if any part needs more explanation!
IV. Exercises
79
Exercise 4a:
Adding the Folder
<c01 level="series">
<unittitle id="
This document discusses requirements engineering for software systems. It covers topics such as functional and non-functional requirements, the software requirements document, requirements specification processes, and requirements elicitation, validation, and management. It describes requirements engineering as establishing customer needs and operational constraints. Requirements can range from abstract to detailed and serve different purposes. Both functional and non-functional requirements are important, and natural language, structured, and other techniques can be used for specification.
The document discusses data indexing, which is a data structure added to files to provide faster data access. Indexing reduces the number of blocks a database management system must check when performing operations like reading, modifying, updating, and deleting data. An index contains a search key and pointer, where the search key is used to look up records and the pointer contains the address of stored data. Common indexing techniques include ordered/primary indexes that access sorted data and hash indexes that uniformly distribute data across buckets. When choosing an indexing technique, factors like access type, time, space overhead are considered. B-trees are commonly used indexing data structures that can grow and shrink dynamically with root, branch and leaf nodes.
This document discusses activity planning for projects. It explains that a detailed project plan should include a schedule showing the start and finish times of each activity. This is important to ensure resources are available when needed, avoid conflicts over shared resources, monitor progress against milestones, and manage cash flow. The document outlines different approaches to identifying activities, including activity-based, product-based, and hybrid structures. It also discusses sequencing activities and using precedence requirements in scheduling.
Ian Sommerville, Software Engineering, 9th Edition Ch 4Mohammed Romi
The document discusses requirements engineering and summarizes key topics covered in Chapter 4, including:
- The importance of specifying both functional and non-functional requirements. Non-functional requirements place constraints on system functions and development process.
- The software requirements specification document defines what the system must do and includes both user and system requirements. It should not describe how the system will be implemented.
- Requirements engineering involves eliciting, analyzing, validating and managing requirements throughout the development lifecycle. Precise, complete and consistent requirements are important for development.
SOUL 2.0 is an integrated library management software developed by INFLIBNET Centre to support the requirements of university and college libraries. It is a user-friendly, standards-compliant software that can be used to manage acquisitions, cataloguing, circulation, serials control and other library operations and resources. SOUL 2.0 provides reports, barcode generation, customization and other features to help library staff manage operations and resources effectively. Technical support and training is available from INFLIBNET Centre.
This document summarizes a seminar on parallel computing. It defines parallel computing as performing multiple calculations simultaneously rather than consecutively. A parallel computer is described as a large collection of processing elements that can communicate and cooperate to solve problems fast. The document then discusses parallel architectures like shared memory, distributed memory, and shared distributed memory. It compares parallel computing to distributed computing and cluster computing. Finally, it discusses challenges in parallel computing like power constraints and programmability and provides examples of parallel applications like GPU processing and remote sensing.
Automation and Integrated Library SystemsJulie Goldman
Simmons LIS 489: Technology Foundations for Information Science
Social and Professional Aspects Final Presentation: Automation and Integrated Library Systems. Focuses on two different automation systems used by libraries.
Here are the steps to add the new folder:
1. Add a new <c02> element within <c01 level="series">Series II: Addenda</c01>
2. Add a <did> element within the new <c02>
3. Add appropriate elements within <did> like <container>, <unittitle>, <unitdate> to describe the new folder
4. Make any other changes needed to fully integrate and describe the new folder within the finding aid.
Let me know if any part needs more explanation!
IV. Exercises
79
Exercise 4a:
Adding the Folder
<c01 level="series">
<unittitle id="
The document discusses the history and development of open access initiatives for scholarly publications. It notes several important declarations from 2002-2005 that supported open access, including making publications freely available online. It describes how open access initiatives aim to unite organizations in supporting free and unrestricted access to peer-reviewed research. The document also discusses definitions of open access, copyright considerations, launching open access journals, and the Budapest Open Access Initiative of 2002.
Libraries play an important role in society by disseminating knowledge and supporting education. They do this by providing access to knowledge resources and materials, as well as referrals that support teaching, research, and training. Additionally, libraries build good reading habits, encourage lifelong learning, and promote the spread of knowledge, information, education, and culture throughout communities. Overall, libraries democratize information and link people to knowledge sources, which is important for the progress and development of society.
1. DESIDOC is the Defence Scientific Information and Documentation Centre of India, established in 1970 as the information resource center of the Defence Research and Development Organisation (DRDO).
2. It provides scientific and technical information to DRDO through its library, databases, and other resources.
3. In addition to information services, DESIDOC is also responsible for publishing various periodicals on Indian defence research and development.
Best practices in library and information services a case presentation (1)avantiarsh
The document outlines several best practices adopted by academic libraries in India related to library management and administration. It describes 10 specific practices, including observation of other libraries, in-service training programs for staff, transparent promotion policies for staff, maintenance of clean library spaces, special membership programs, generating revenue through internet services, student internship programs, involving students in library upkeep, and employing students part-time in the library. The goal is to identify and share exemplary practices to help strengthen library services at academic institutions.
The document introduces ontologies and discusses their role in the Semantic Web. It defines an ontology as an explicit specification of a conceptualization that is shared between people or software agents. Ontologies allow concepts and relationships between concepts to be formally defined so that software applications can interpret data in the same way. The document outlines different types of ontologies including upper ontologies that define common concepts across domains, and domain ontologies that define the terms and relationships within a specific knowledge domain. Formal ontology languages are also discussed as a way to represent ontologies in a machine-readable format.
Requirements Engineering Processes in Software Engineering SE6koolkampus
The document describes key requirements engineering processes including feasibility studies, requirements elicitation and analysis, requirements validation, and requirements management. It discusses techniques like elicitation from stakeholders, modeling system requirements, and validating requirements match customer needs. Scenarios and use cases are presented as ways to add detail to requirements descriptions.
This document discusses consistency models in distributed systems with replication. It describes reasons for replication including reliability and performance. Various consistency models are covered, including: strict consistency where reads always return the most recent write; sequential consistency where operations appear in a consistent order across processes; weak consistency which enforces consistency on groups of operations; and release consistency which separates acquiring and releasing locks to selectively guard shared data. Client-centric models like eventual consistency are also discussed, where updates gradually propagate to all replicas.
The document discusses various types of information products provided by libraries and information centers. It describes newsletters, in-house journals, trend reports, state-of-the-art reports, technical reports, patents, standards, bibliographies, indexes, abstracts, reviews, directories, and union catalogs. These information products consolidate and repackage information from various sources into succinct formats to facilitate access and use by specialists in different fields. They help overcome barriers created by the vast amount of information available.
Predatory publishing is a relatively recent phenomenon that seems to be exploiting some key features of the open access publishing model, sustained by collecting APCs that are far less than those found in legitimate open access journals. This CME aims to introduce to the participants on the phenomenon of predatory journals, why they continue to thrive, characteristics that are suggestive of a predatory journal, and how one can take step to minimize the risk of faling into predatory journal publication
Here in these slides I have included some Digital Educational Programmes. Initiatives of Indian government for school and higher education. The basic purpose of these programmes is to bridge the digital devide and provide access, equity and equality for all.
These programmes are very helpful for teachers and students and some are very helpful for the research scholors, you may visit the programmes via your mobile phone and laptop.
I have prepared these slides for my ppt presentation purpose. I hope these slides would be helpful to you.
Thank You!
Five laws of Library Science by S R RanganathanMunesh Kumar
The document outlines the Five Laws of Library Science according to S.R. Ranganathan. The first law states that books are for use. The second law says that every book has a reader. The third law is that every reader has their book. The fourth law is to save the time of the user. And the fifth law is that a library is a growing organism. The document was presented by Munesh Kumar on February 12, 2011.
A presentation on select international digital library initiatives by Rupesh Kumar A, Assistant Professor, Department of Studies and Research in Library and Information Science, Tumkur University, Karnataka, India.
This document provides an arrangement of sections for the Karnataka Public Libraries Act of 1965. It outlines 8 chapters that establish: 1) the Karnataka State Library Authority to oversee public libraries, 2) the Department of Public Libraries, 3) Local Library Authorities in cities and districts, 4) financing through a library cess, and 5) the Karnataka State Central Library. The Act aims to establish and maintain public libraries and provide comprehensive rural and urban library services across Karnataka.
The document discusses the Metadata Encoding and Transmission Standard (METS), which is an XML schema for encoding descriptive, administrative, and structural metadata regarding objects within a digital library. It describes the characteristics and sections of a METS file, including the header, descriptive and administrative metadata, file and structural map sections. Current users of METS are also listed, such as libraries and universities. The purpose of METS is to provide a flexible structure for linking metadata and content about digital objects.
Ontology and Ontology Libraries: a critical studyDebashisnaskar
This document provides an overview of ontology and ontology libraries. It discusses what ontologies are, languages for expressing ontologies like OWL, and tools for building ontologies such as Protégé. It also examines several ontology libraries including BioPortal for biomedical ontologies, OBO Foundry, oeGov for e-government, and TONES for general ontologies. Evaluation criteria for comparing ontology libraries and future challenges and opportunities are also reviewed.
Indexing Techniques: Their Usage in Search Engines for Information RetrievalVikas Bhushan
1. The document discusses indexing techniques and their usage in modern search engines. It covers the transition from manual to automated indexing and different indexing methods.
2. Current trends in indexing and information retrieval are discussed such as XML indexing and its components. Future applications for indexers are also mentioned.
3. The conclusion emphasizes enhancements to indexing procedures like weighted indexing and linking of terms to improve retrieval of accurate information.
Object Relational Database Management System(ORDBMS)Rabin BK
The document discusses Object Relational Database Management Systems (ORDBMS). It defines an ORDBMS as a system that attempts to extend relational database systems with functionality to support a broader class of applications by providing a bridge between relational and object-oriented paradigms. This allows objects, classes and inheritance in database schemas and query languages. The document outlines some advantages of ORDBMS like reusability and preserving relational application knowledge, but also disadvantages like increased complexity. It also describes common OR operations like create, retrieve, update and delete objects, as well as Object-Relational Mapping (ORM) which converts data between incompatible type systems.
Data mining involves extracting hidden patterns from large amounts of data. It has various applications in library and information science for analyzing user data to determine customer preferences, predict user behavior, and identify frequently used resources. The document outlines the data mining process, which includes data selection, cleaning, transformation, mining, and interpretation. Data mining techniques can be used to analyze citation patterns, formulate statistical models of library services, and facilitate knowledge organization on the web.
Altmetrics are alternative metrics for measuring the impact of scholarly work that use social media and online mentions. They provide a more comprehensive view of impact across different sectors. Altmetric tools track how often research is mentioned online, including the number of tweets, likes, shares and saves. This provides a more timely measure of impact than traditional citations alone. While altmetrics don't tell the whole story, they can help understand broader impacts beyond academia. Librarians can help researchers understand and use altmetrics to track engagement and influence.
Concurrency: Mutual Exclusion and SynchronizationAnas Ebrahim
This document discusses concurrency and synchronization in operating systems. It covers mutual exclusion and how it must be enforced to prevent interference between concurrent processes accessing shared resources. Various synchronization mechanisms are described, including semaphores, mutexes, monitors and event flags. The producer-consumer problem is presented and solutions shown using semaphores to ensure processes can access shared resources like buffers safely. Implementation of semaphores also discussed, needing atomic operations.
The document provides a summary of Loeve C. Aduca's work experience and qualifications. It summarizes her most recent role as an Environmental Researcher for Woodfields Consultants Inc., where she assists with various environmental projects. It also lists her previous roles in pollution control, laboratory analysis, and water quality monitoring. The document outlines her education credentials, including a Bachelor's degree in Environmental Science, and relevant skills in laboratory techniques, chemical analysis, and field sampling. It provides details of projects and responsibilities held in each role to demonstrate her experience in environmental consulting.
The document discusses the history and development of open access initiatives for scholarly publications. It notes several important declarations from 2002-2005 that supported open access, including making publications freely available online. It describes how open access initiatives aim to unite organizations in supporting free and unrestricted access to peer-reviewed research. The document also discusses definitions of open access, copyright considerations, launching open access journals, and the Budapest Open Access Initiative of 2002.
Libraries play an important role in society by disseminating knowledge and supporting education. They do this by providing access to knowledge resources and materials, as well as referrals that support teaching, research, and training. Additionally, libraries build good reading habits, encourage lifelong learning, and promote the spread of knowledge, information, education, and culture throughout communities. Overall, libraries democratize information and link people to knowledge sources, which is important for the progress and development of society.
1. DESIDOC is the Defence Scientific Information and Documentation Centre of India, established in 1970 as the information resource center of the Defence Research and Development Organisation (DRDO).
2. It provides scientific and technical information to DRDO through its library, databases, and other resources.
3. In addition to information services, DESIDOC is also responsible for publishing various periodicals on Indian defence research and development.
Best practices in library and information services a case presentation (1)avantiarsh
The document outlines several best practices adopted by academic libraries in India related to library management and administration. It describes 10 specific practices, including observation of other libraries, in-service training programs for staff, transparent promotion policies for staff, maintenance of clean library spaces, special membership programs, generating revenue through internet services, student internship programs, involving students in library upkeep, and employing students part-time in the library. The goal is to identify and share exemplary practices to help strengthen library services at academic institutions.
The document introduces ontologies and discusses their role in the Semantic Web. It defines an ontology as an explicit specification of a conceptualization that is shared between people or software agents. Ontologies allow concepts and relationships between concepts to be formally defined so that software applications can interpret data in the same way. The document outlines different types of ontologies including upper ontologies that define common concepts across domains, and domain ontologies that define the terms and relationships within a specific knowledge domain. Formal ontology languages are also discussed as a way to represent ontologies in a machine-readable format.
Requirements Engineering Processes in Software Engineering SE6koolkampus
The document describes key requirements engineering processes including feasibility studies, requirements elicitation and analysis, requirements validation, and requirements management. It discusses techniques like elicitation from stakeholders, modeling system requirements, and validating requirements match customer needs. Scenarios and use cases are presented as ways to add detail to requirements descriptions.
This document discusses consistency models in distributed systems with replication. It describes reasons for replication including reliability and performance. Various consistency models are covered, including: strict consistency where reads always return the most recent write; sequential consistency where operations appear in a consistent order across processes; weak consistency which enforces consistency on groups of operations; and release consistency which separates acquiring and releasing locks to selectively guard shared data. Client-centric models like eventual consistency are also discussed, where updates gradually propagate to all replicas.
The document discusses various types of information products provided by libraries and information centers. It describes newsletters, in-house journals, trend reports, state-of-the-art reports, technical reports, patents, standards, bibliographies, indexes, abstracts, reviews, directories, and union catalogs. These information products consolidate and repackage information from various sources into succinct formats to facilitate access and use by specialists in different fields. They help overcome barriers created by the vast amount of information available.
Predatory publishing is a relatively recent phenomenon that seems to be exploiting some key features of the open access publishing model, sustained by collecting APCs that are far less than those found in legitimate open access journals. This CME aims to introduce to the participants on the phenomenon of predatory journals, why they continue to thrive, characteristics that are suggestive of a predatory journal, and how one can take step to minimize the risk of faling into predatory journal publication
Here in these slides I have included some Digital Educational Programmes. Initiatives of Indian government for school and higher education. The basic purpose of these programmes is to bridge the digital devide and provide access, equity and equality for all.
These programmes are very helpful for teachers and students and some are very helpful for the research scholors, you may visit the programmes via your mobile phone and laptop.
I have prepared these slides for my ppt presentation purpose. I hope these slides would be helpful to you.
Thank You!
Five laws of Library Science by S R RanganathanMunesh Kumar
The document outlines the Five Laws of Library Science according to S.R. Ranganathan. The first law states that books are for use. The second law says that every book has a reader. The third law is that every reader has their book. The fourth law is to save the time of the user. And the fifth law is that a library is a growing organism. The document was presented by Munesh Kumar on February 12, 2011.
A presentation on select international digital library initiatives by Rupesh Kumar A, Assistant Professor, Department of Studies and Research in Library and Information Science, Tumkur University, Karnataka, India.
This document provides an arrangement of sections for the Karnataka Public Libraries Act of 1965. It outlines 8 chapters that establish: 1) the Karnataka State Library Authority to oversee public libraries, 2) the Department of Public Libraries, 3) Local Library Authorities in cities and districts, 4) financing through a library cess, and 5) the Karnataka State Central Library. The Act aims to establish and maintain public libraries and provide comprehensive rural and urban library services across Karnataka.
The document discusses the Metadata Encoding and Transmission Standard (METS), which is an XML schema for encoding descriptive, administrative, and structural metadata regarding objects within a digital library. It describes the characteristics and sections of a METS file, including the header, descriptive and administrative metadata, file and structural map sections. Current users of METS are also listed, such as libraries and universities. The purpose of METS is to provide a flexible structure for linking metadata and content about digital objects.
Ontology and Ontology Libraries: a critical studyDebashisnaskar
This document provides an overview of ontology and ontology libraries. It discusses what ontologies are, languages for expressing ontologies like OWL, and tools for building ontologies such as Protégé. It also examines several ontology libraries including BioPortal for biomedical ontologies, OBO Foundry, oeGov for e-government, and TONES for general ontologies. Evaluation criteria for comparing ontology libraries and future challenges and opportunities are also reviewed.
Indexing Techniques: Their Usage in Search Engines for Information RetrievalVikas Bhushan
1. The document discusses indexing techniques and their usage in modern search engines. It covers the transition from manual to automated indexing and different indexing methods.
2. Current trends in indexing and information retrieval are discussed such as XML indexing and its components. Future applications for indexers are also mentioned.
3. The conclusion emphasizes enhancements to indexing procedures like weighted indexing and linking of terms to improve retrieval of accurate information.
Object Relational Database Management System(ORDBMS)Rabin BK
The document discusses Object Relational Database Management Systems (ORDBMS). It defines an ORDBMS as a system that attempts to extend relational database systems with functionality to support a broader class of applications by providing a bridge between relational and object-oriented paradigms. This allows objects, classes and inheritance in database schemas and query languages. The document outlines some advantages of ORDBMS like reusability and preserving relational application knowledge, but also disadvantages like increased complexity. It also describes common OR operations like create, retrieve, update and delete objects, as well as Object-Relational Mapping (ORM) which converts data between incompatible type systems.
Data mining involves extracting hidden patterns from large amounts of data. It has various applications in library and information science for analyzing user data to determine customer preferences, predict user behavior, and identify frequently used resources. The document outlines the data mining process, which includes data selection, cleaning, transformation, mining, and interpretation. Data mining techniques can be used to analyze citation patterns, formulate statistical models of library services, and facilitate knowledge organization on the web.
Altmetrics are alternative metrics for measuring the impact of scholarly work that use social media and online mentions. They provide a more comprehensive view of impact across different sectors. Altmetric tools track how often research is mentioned online, including the number of tweets, likes, shares and saves. This provides a more timely measure of impact than traditional citations alone. While altmetrics don't tell the whole story, they can help understand broader impacts beyond academia. Librarians can help researchers understand and use altmetrics to track engagement and influence.
Concurrency: Mutual Exclusion and SynchronizationAnas Ebrahim
This document discusses concurrency and synchronization in operating systems. It covers mutual exclusion and how it must be enforced to prevent interference between concurrent processes accessing shared resources. Various synchronization mechanisms are described, including semaphores, mutexes, monitors and event flags. The producer-consumer problem is presented and solutions shown using semaphores to ensure processes can access shared resources like buffers safely. Implementation of semaphores also discussed, needing atomic operations.
The document provides a summary of Loeve C. Aduca's work experience and qualifications. It summarizes her most recent role as an Environmental Researcher for Woodfields Consultants Inc., where she assists with various environmental projects. It also lists her previous roles in pollution control, laboratory analysis, and water quality monitoring. The document outlines her education credentials, including a Bachelor's degree in Environmental Science, and relevant skills in laboratory techniques, chemical analysis, and field sampling. It provides details of projects and responsibilities held in each role to demonstrate her experience in environmental consulting.
Exploration of how the London Mathematical Society celebrated 150 years including both successes and challenges, presented by Dr John Johnston, Society Communications Officer, at the Science Council Marketing & Communications Network event on 10 May 2016.
IFX is a leading foreign exchange consultancy that provides premium services to corporate and private clients globally. They offer a tailored, dedicated service including specialized expertise, market insights, and preferential exchange rates. Clients are assigned a dedicated consultant to understand their needs and priorities and help execute strategies to optimize positions and reduce costs and risks.
The document discusses several problems with asthma management in Pakistan, including lack of knowledge about the disease among patients and doctors, poor compliance with treatment, misdiagnosis, misuse of medications like steroids, and high treatment costs. It notes that while asthma prevalence is high in Pakistan, the magnitude of the problem is not clearly known. Guidelines for asthma treatment exist but are not always followed in practice.
Snapshots of how the Migraine Trust celebrated 50 years, presented by Wendy Thomas, Chief Executive, at the Science Council Marketing & Communications Network event on 10 May 2016.
ACA Year 2 Open Enrollment Orientation Power Point Feb 2015Cary Quinones
The document discusses important dates and details about open enrollment periods, reporting life changes, exemptions, appeals, the shared responsibility payment, and health insurance terminology. It provides information on open enrollment periods for 2015-2016, how and when to report life changes or qualify for exemptions, the details on calculating the shared responsibility payment, and definitions of important insurance terms. Key contacts are also listed for getting in-person assistance during the open enrollment period.
G. Babu is seeking a challenging job that utilizes his skills and experience in quality assurance. He has over 10 years of experience in quality roles, most recently as a Senior Engineer of Quality Assurance at Unique Autoplastic from 2010 to 2014. Prior to that, he held engineering roles focused on planning and quality assurance at Ganges International from 2004 to 2010. He is skilled in quality tools like PPAP, SPC, FMEA and has a degree in Mechanical Engineering.
This document compares the concepts of parrhesia and doxa as discussed by Foucault and Arendt. Parrhesia refers to speaking one's own private truth, and involves an individual reflecting privately before speaking to select interlocutors. In contrast, doxa refers to truth that unfolds publicly through collective action and public discourse. While parrhesia focuses on individual ethical improvement, doxa views truth as a product of public interactions and the human world. The document examines key differences between these concepts of truth and their implications for democracy.
This document provides an introduction to a module on Introduction to Computing. It outlines three parts to the module: 1) introduction to computing including history, ACM requirements, computing professions and industry; 2) computer system organization including hardware, software, security and internet protocols; and 3) HTML and CSS basics. It provides guidance for students on passing requirements, evaluation activities, and guidelines for the lecture-laboratory course. An outline of topics, schedule, policies and value focus is also included.
This document provides information about a CIS 170 Introduction to Computer Information Systems course at Valley City State University. The course will introduce students to basic computer concepts like file management, software applications, computer ethics, and Microsoft Office programs. Students will learn to use Word, PowerPoint, and Excel through completing assignments. The final project will incorporate work from individual units into a comprehensive project to demonstrate skills learned throughout the course. The course aims to help students advance their technology knowledge and abilities.
This document provides an overview of the ITEC N453 Information Technology Practices course. It introduces the lecturer, Dr. Ahmad Ammari, and outlines topics like consultation etiquette, plagiarism policies, attendance, and mobile phone policies. It describes three learning outcomes covering analyzing emerging technologies, managerial issues related to developing IT systems, and evaluating an organization's IT portfolio. Assessments include an emerging technology presentation, research report, industry project, and final exam. Students are expected to understand graduate outcomes and policies regarding attendance, cheating, and plagiarism. The course aims to help students understand the impact of technologies and issues in managing IT development and implementation.
Running Header: PROJECT PHASE 1 1
PROJECT PHASE 1 4
Final Project Phase 1: Business-Related Research Premise
Aaron Bryant
Shorter University
Final Project Phase 1: Business-Related Research Premise
Background
Executive compensation is the financial and non-financial awards given to executives and other high ranking officials with in corporations. These awards typical come in the form of base salary, annual incentives, and long-term incentives, and perquisites such as personal use of corporate aircraft, company cars, and business expense accounts (Cormany, 2017). Compensation for executives has steadily increased over the years but there has been dramatic jumps in pay since the 1970s. The latest dramatic increase was in 2010, when executive compensation increased 11% (Cormany, 2017).
The board of directors are legally and morally responsible for monitoring and awarding executives and company leaders. In many cases they help decide what compensation is given to executives. To help with the contract decisions about executive pay, a compensation consultant firm may be hired.
Managerial Relevance
Many corporations use compensation consultants to help figure out how much to compensate there executives. If a consultant firm helps an executive increase his/her compensation, they can be later hired for more billable hours as compensation in return. So intern, does the hiring of compensation firms increase executive compensation.
Theoretical Framework
The hiring of compensation consultants and the increase in compensation of executives are related
Research Methodology and Design
A non-contrived case study using minimal interference will be used in this study.
References
Cormany, D. L. . P. candidate. (2017). Executive Compensation. Salem Press Encyclopedia. Retrieved from http://proxygsu-sho1.galileo.usg.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=ers&AN=89550569&site=eds-live&scope=site
Syllabus Page 1 of 12
Business Analytics and Research
Methods
Online Syllabus
Shorter University
Instructor Information
See link in Canvas.
Course Information
• Course: Business Analytics and Research Methods
• Course Number: BUS 5250
• Credit Hours: 3
• Prerequisites: Undergraduate Statistics Course
Course Description
Today’s business environment requires managers to be able to make decisions based on data
and draw inferences through the use of software and other analytical tools. This Business
Analytics and Research Methods course will introduce the students to business research
methodology and the analytical tools used to collect and assess different types of data. This
course will include a review of the basics .
Internet Explorer 6 is no longer supported. Please use a newer bro.docxmariuse18nolet
Internet Explorer 6 is no longer supported. Please use a newer browser.
Internet Explorer 7 is no longer supported. Please consider a newer browser.
Concourse works best with JavaScript enabled.
Toggle navigation
· Syllabus
· View
· Print
· Info
CMIT 451 6380 Implementing Cisco IP Routing (2162)
University of Maryland University College • Adelphi • Syllabus •
CMIT 451 6380 Implementing Cisco IP Routing (2162) CMIT-451
· Spring 2016
· Section 6380
· 3 Credits
· 01/11/2016 to 03/06/2016
Faculty Contact
Robert Chubbuck [email protected]
Course Description
Designed to help students prepare for the Cisco 300-101 ROUTE [Implementing Cisco IP Routing] Exams.) Prerequisite: CMIT 350. A comprehensive study of the implementation of a routed network using Cisco Systems Technologies. The goal is to use advanced IP routing and scalability solutions to increase the number of routers and sites without redesigning the LAN or WAN. Topics include configuration of secure routing solutions, configuration and troubleshooting of various routed environments (access, distributed, and core), and management of access and control. Students may receive credit for only one of the following: CMIT 451 or CMIT 499E.
Course Introduction
This course covers the requirements for one of the qualifying exams for the Cisco Certified Network Professional (CCNP), Cisco Certified Internetwork Professional (CCIP), and Cisco Certified Design Professional (CCDP) certifications.
Projects include configuring and implementing EIGRP, OSPF, and BGP routing protocols, implementing teleworking support services, configuring basic broadband connections, and using GRE tunnels for implementing VPNs.
UMUC does not guarantee that by completing this course you will pass the exam, nor does it provide the exam to you. The cost of the exam is not included in registration fees for the course. Registration for the exam can be done online at www.prometric.com or www.vue.com
Course Outcomes
After completing this course, students should be able to
· analyze network requirements to determine appropriate routing solutions for an organization's needs
· develop valid and reliable implementation, verification, and proactive monitoring plans based on industry standards
· configure and implement appropriate routing solutions that are scalable and secure
Course Materials
Click to access your course materials information
Class Guidelines
Students with Questions or Concerns
If you have questions related to the course content or any of the graded deliverables, contact me. For questions and concerns related to advising, e-mail [email protected] or call 301-985-7000 (toll-free: 800-888-8682).
For other questions and concerns, you can contact your academic director by writing to [email protected] or calling (240) 684-2882. Be sure to mention the course name, course number, and your section number in the subject field of your e-mail. Your e-mail will be treated confidentially.
Writing and Research
Effective w.
This document provides instructions for a coursework assignment assessing research methods. Students must complete an academic poster presentation summarizing their literature review on an approved topic. The 10-minute presentation will be delivered to two academics, one an expert in the topic. Instructions include poster content and structure, assessment criteria, submission details, and important policies on plagiarism, late penalties, and reassessments.
This document is a syllabus for an English technical writing course. It outlines the course objectives, which are to teach students to communicate technical information to non-expert audiences through various media formats. It describes 5 projects students will complete, including analyzing readability, creating technical documentation, designing data visualizations, performing usability tests, and preparing job application materials. It also provides policies on technology requirements, file formats, deadlines, submitting work, disabilities, plagiarism, and contacting the instructor.
This document provides information about the Btec Core Business and ICT 90 credit diploma course offered at All Saints School to current year 11 students. It includes details about the course structure and content over the two years, including the units covered in each subject area. Information is also provided about career paths, university degrees, and grades for the course. The presentation aims to introduce students to the course and its benefits in providing a foundation for further education and careers in business and ICT fields.
Course Presentation: Electronic & Computer EngineeringBrunel University
This document provides information about the Electronic and Computer Engineering department at Brunel University London. It details the staff and student numbers, undergraduate and postgraduate degree programs offered, course structures and content, teaching methods, final year project examples, student satisfaction ratings, placement salary data, and reasons to study engineering at Brunel.
Final draft csci 1070 crn__60348 1230 tt syllabus_spring 2014Isa Wilson
This document provides information about a hybrid computer literacy course offered at ULM College of Business in spring 2014. The course will cover computer concepts and practical use of Microsoft Office programs including Word, Excel, PowerPoint and Access. It will be taught hybrid style with some online and some in-person components. Students will complete graded assignments and exams in MyITLab, an online training and assessment platform. The course aims to help students develop fundamental computer skills and understand the importance of technology in personal and professional life. Upon completing the course, students will be able to utilize key Microsoft Office and Windows features at an intermediate level.
This document provides information about an introductory management information systems course taught in the fall of 2016. It includes the course description, objectives, instructor information, required materials, important dates, policies, and a weekly course outline. The course introduces students to management issues related to contemporary technology-mediated business environments and assists in developing management skills. It covers topics such as IT in business, management, leadership, ethics, and global issues.
This document contains the syllabus for the third year Database Management Systems (DBMS) course offered by Savitribai Phule Pune University. The syllabus outlines the course objectives, outcomes, contents, and textbook references. The course aims to provide students with fundamental concepts of database design, languages, and implementation. Key topics covered include entity relationship modeling, relational modeling and normalization, SQL and PL/SQL, database architecture, transaction management, and database applications. The syllabus is intended to equip students with skills in database design, development and programming.
This document provides information about a class orientation at Universidad De Manila for the BSDS 21 course. It includes the course schedule, institutional vision and goals, information about the College of Engineering and Technology, and details about the specific ITE212 Fundamentals of Database Management course. The course objectives, requirements, grading system, textbook, and class policies are outlined. Students will work in groups to design a database, which is a major course requirement. Attendance and following proper online etiquette are emphasized.
WILMINGTON UNIVERSITYCOLLEGE OF TECHNOLOGYSYLLABUSFACULTY ME.docxambersalomon88660
WILMINGTON UNIVERSITY
COLLEGE OF TECHNOLOGYSYLLABUS
FACULTY MEMBER: Greg Hughes TERM: Summer 2016 Block 2
COURSE TITLE: IT Policy & Strategy
COURSE NUMBER: IST.7100
TEXTBOOK: TITLE:
AUTHOR:
If you would like more precise information regarding the textbook(s) for this class, please visit the bookstore website at http://www.wilmcoll.edu/bookstore
METHOD OF CONTACT:
PREREQUISITE: IST7000, IST7020, IST7040, IST7060
All courses are open to students from all divisions. Only where a course is preceded by an introduction course is there a need to observe a prerequisite. However, students might benefit from prior knowledge on some of the courses, and this is given as the content found in your course catalogue by course code.
I. COURSE DESCRIPTION
The focus of this course includes: 1) The top management’s strategic perspective for aligning competitive strategy, core competencies, and information systems; 2) The development and implementation of policies and plans to achieve organizational goals; 3) Defining the systems that support the operational, administrative, and strategic needs of the organization, its business units, and individual employees; 4) Approaches to managing the information systems’ function in organizations, including examination of the dual challenges of effectively controlling the use of well-established information technologies, while experimenting with selected emerging technologies; and 5) The role of the CIO.
II. RATIONALE
Students develop an understanding of the strategic use of information technology from a business perspective at the enterprise level. They are expected to understand the internal management of information systems services from the point of view of the CIO and to examine alternative strategies and tactics available to management to achieve goals. Working students and students with post-baccalaureate experience will be able to examine the current and potential impact of information and information technology on all aspects of their position, firm, and industry.
III. MAJOR INSTRUCTIONAL GOALS
Goal A. Understand the role of IT in reaching business objectives
Learning Outcomes: The student will be able to:
A-1 Differentiate between strategy, vision and strategic objectives
A-2 Differentiate between effective business strategies based on a company’s vision, strategy, and mission statements
A-3 Identify the significance of the five levels of Strategic Alignment Maturity
A-4 Identify the primary differences between strategic, tactical and operational processes
Goal B. Understand the role of governance and communication in the selection and use of organizational processes to make decisions about how to obtain and deploy IT resources
Learning Outcome:The student will be able to:
B-1 Understand the components of a strategic plan
B-2 Identify organizational types and use in case study application
B-3 Identify the components of IT architecture
B-4 Identify .
This document outlines the module Building | Services | One, which provides an introduction to common building services including water supply, sewage disposal, storm water management, telecommunications, and ventilation systems. The module objectives are to create awareness of building services principles, introduce various available systems and their limitations, and prepare students to apply their knowledge. Students will be assessed through a midterm test, group assignment, final exam, and portfolio focusing on key module learning outcomes and graduate capabilities.
Te computer syllabus 2015 course 3-4-17 3-5-17VishalButkar2
This document contains the syllabus for the third year of the Bachelor of Computer Engineering program offered by Savitribai Phule Pune University. It outlines the courses offered in the third year, including course codes, credit hours, teaching schemes, and examination schemes. It also provides details of individual course contents and learning outcomes. The courses cover topics such as theory of computation, databases, software engineering, computer networks, algorithms, operating systems, embedded systems, and web technologies. Case studies and labs are included across various courses to help students apply concepts in real-world scenarios.
This document provides information about the course "New Media, Entrepreneurship and Innovation (1ZM80)" including general information, content and objectives, working formats, assignments and presentations, attendance, and exam information. The course is optional for various master's programs and aims to focus on the role of new media in entrepreneurship and innovation processes. Key assignments include a group case assignment worth 60% of the final grade and a final exam worth 40%. Students must form assignment groups, complete the assignment, and take the final exam to pass the course.
This document provides information about the course "New Media, Entrepreneurship and Innovation (1ZM80)" including general information, content and objectives, working formats, assignments and presentations, attendance, and exam information. The course is optional for various master's programs and aims to focus on the role of new media in entrepreneurship and innovation processes. Students will develop an understanding of new media concepts and complete a group assignment, presentations, and final exam to assess their learning. Attendance is compulsory and both the assignment and exam are required to pass the course.
This document summarizes an opportunity analysis project for a collaborative learning cloud called SkillOut. It includes sections on the project overview, application mockups, market size estimation and assumptions, market potential, interviews and surveys conducted, lessons learned, and introductions of team members. The project aims to create a new innovative education system using today's technologies and learning about neuroscience to meet tomorrow's needs by tearing down walls of the current system. Market size estimates 500 universities with 4.5 million students subscribing and paying monthly and annual fees, with additional revenue from customization, hosting, and other knowledge providers. Surveys found students want better syllabi and reputable providers, while providers want increased motivation and easy to use platforms.
1. 9
INF4015W
Course
Outline
2015
POSTGRADUATE DIPLOMA IN
MANAGEMENT (INFORMATION SYSTEMS)
INF4015W: INFORMATION SYSTEMS COURSEWORK
This part-time coursework component covers system delivery methods and techniques such as
prototyping, event driven systems, object orientation; technology overview from an IT
architecture perspective including hardware and software architectures, system architectures
including client server, multi-tier and service-oriented architectures, application and
information architectures, and security; against the deeper enduring principles of strategic IT
management, and project management.
2. 9
Overview
This course is part of a modular postgraduate programme offered by the Department of
Information Systems within the Faculty of Commerce. It is intended for students who have had
significant commercial work experience and are currently working in Information Technology
(IT), or intend to work in IT in a professional capacity. It aims to impart state of the art
knowledge and appreciation in the areas of system delivery, project management, relevant
technologies and strategic IT management. It is highly relevant for the roles of Systems
Analysts, Business Analysts, Architects, Project Managers, System Development Managers, IT
Strategists and IT Entrepreneurs.
Content
The world of the IT professional is changing rapidly. Intended for candidates with business work
experience, this programme addresses developments like graphical user interfaces, prototyping,
event driven systems, object orientation, components, middleware, client server, web based
systems and electronic commerce against the deeper enduring principles of strategic IT
management, system delivery methods and techniques, and project management. A central
principle is that of linking business and IT architectures. The course includes the following
major modules:
• System Delivery/Development Methods and Techniques: Object Orientated Systems
Analysis using UML, Patterns, Architectures, Iterative Methodologies, Agile Methods
• Technology Landscape: An architectural look at current and emerging information and
communication technologies for organisations including: Database, Communications,
System and Application Architectures, Operating Systems, LANs, WANs, Internet,
XML, Service Oriented Architecture, Middleware, Agents, Security
• Project Management: Evolution of PM practice and PMBOK, complexity in PM,
PMBOK overview, language and communication, systems thinking, rethinking PM,
benefits realisation, role of methodology in PM.
• Strategic Management of IT: Challenges facing CIO today, Business and IT alignment,
Business Intelligence and Analytics, Corporate & IT governance, Privacy & IS security,
IT Risk Management, IS Evaluation/ Corporate Performance Management (CPM) &
XBRL, Project Portfolio Management, IT/IS Profession from a Management perspective
and managing people, PMO, Leveraging Emerging Technologies for competitive
Advantage, Strategic Technology Trends, Using Technology for Innovation..
Following the course work, the students who do not enrol in the PT Honours programme are
required to complete and report on a work-related project which demonstrates clearly how the
knowledge gained in the course has been applied in their day-to-day work environment. This is
normally done in the year following the coursework. The nature of the project is very flexible
but a written project report of no less than 50 pages, as well as a presentation of the report is
expected on completion. The report will be treated confidential if necessary. Students who have
3. 9
demonstrated a solid academic performance (usually by obtaining a coursework mark of 65% or
very close to it) will be invited to enrol in next year’s part-time honours programme where they
will be taught on research methodologies and expected to do an empirical research project.
Format
Commencing in Jan 2015, successful candidates will complete the coursework in November. In
the following year, student will do their work-related project, or may continue on to Honours
study subject to entrance requirements and other prerequisites.
From February to November, there are two evening sessions per week (Mondays and
Thursdays). Thursday evenings are plenary sessions with all candidates present and include a
taught component (lecture/workshop/demonstration etc.) and student presentations of work
assigned. Duration is normally three hours. Guests from industry or within the University may
be present or critique at these sessions to add richness. Monday evening sessions involve
students in groups of about four working on assignments and research topics. Students are
assigned to new groups for each module to provide wide exposure and variety.
There are two full time weeks, the first one runs from 26 to 30 January 2015 and the second
one from 6 to 10 July. These are intensive and candidates will attend Monday through Friday
from 09h00 till late. If you cannot ensure your attendance at the full-time weeks, you are
advised to delay your registration for this program to a future year.
A variety of assignments, papers and presentations will be required of students throughout the
program. Some of this work will be completed in groups.
Three examinations will be written (check course outline):
• An examination on the first module as soon as possible after its completion (i.e. end
Feb/early March) – weight = 25% of exam mark.
• An examination on the second module in June – weight = 25% of exam mark.
• An examination on the third and fourth modules in November – weight = 50% of exam
mark.
Candidates are also assessed continuously for their attendance, participation and contribution
during the year.
Evaluation
Students will be evaluated on multiple deliverables and overall participation. The provisional
mark allocations are as follows
Written papers and essays 21%
Written Examinations 50%
Student Presentations which includes class & group contribution 19%
Assignments 10%
4. 9
Students missing more than 20% of the classes may be asked to leave the programme. (Missing
a full-time week represents 20% of classes!)
In order to pass the course students must obtain:
• An average course mark of at least 50% for the entire year; and
• An average (i.e. overall) examination mark of 50%; and
• No supplementary examinations will be given.
Guests
During the programme, we may on occasion invite guests from industry and other institutions to
participate in the Thursday evening plenary sessions. They may be vendors, IT professionals
within commercial organizations, or independent experts/consultants. They add richness to the
sessions by offering information, critiquing staff and student presentations, participation in
discussions and occasional presentations or demonstrations.
Prescribed Books
The prescribed textbooks will be confirmed at the start of the course. Last year the following
books were used:
• System Delivery Module: Bennett, Simon ; McRobb, Steve & Farmer, Ray. Object-
oriented Systems Analysis and Design Using UML (McGrawHill, 4th
(or 3rd
) Edition,
2010).
• Technology Module: Readings will be given during the course. A recommended
background reading for those new to the IT Architecture landscape is: IT Architecture for
Dummies, Kalani Hausman & Susan Cook (Wiley, Hoboken (NJ), 2011).
• Project Management Module: Readings/e-book will be given. Recommended
additional text: Right-Brain Project Management: A complementary approach by
Michael Aucoin (Management Concepts, Vienna (VA), 2007).
• Strategic Management Module: Readings will be given.
Learning Management System
All course notes, lecture presentations, announcements, schedules and other relevant information
will be posted on UCT’s learning management system Vula. This is also the site where you
upload your own materials, submissions, essays etc. You will be added automatically as a
student to the site on registration.
Please note that up-/downloads using a dial-up or low-bandwidth may be problematic for larger
documents. Although the Vula system is generally very reliable and has a high up-time, it is not
perfect. Allow for slower access in periods of heavy use and occasional downtime.
5. 9
UCT Staff Involved with the Course
Role Name Room Tel: 021- email
Course Convenor Jean-Paul Van Belle 3.41 6504256 Jean-Paul.VanBelle@uct.ac.za
Other Lecturers Maureen Tanner
Ulrike Rivett
Michael Kyobe
Mike Hart
Sumarie Roodt
3.42
3.48
3.44
3.10
3.35
6504860
6504218
6502597
6502286
6502286
Maureen.Tanner@uct.ac.za
Ulrike.Rivett@uct.ac.za
Michael.Kyobe@uct.ac.za
Mike.Hart@uct.ac.za
Sumarie.Roodt@uct.ac.za
Course
Administrator
Nocky Bobo 3.01.3 6504670 Nocky.Bobo@uct.ac.za
Provisional Lecture Schedule
This is the current INF4015W lecture outline for 2015.
Relevant updates are made continuously.
Full-time week lectures are scheduled 9:00-18:00 but allow for evening group work
Thursday evening lectures scheduled 17:30-20:30 in IS Seminar Room LC3.12
1st Module System Delivery Module
(Maureen Tanner)
Full Time Week - System Delivery (Venue: IS Seminar Room Leslie Commerce
LC3.12)
9:00 till late evening; Monday, Tuesday & Wednesday may have evening group
work
26-Jan 9:00 Welcome & Course overview [JP] & Q&A
10:00 Registration
11:00 Changing the paradigms - Object Orientation and Iterative Development
27-Jan Modelling User Requirements
28-Jan Modelling Structure and Behavior
29-Jan Scrum Bootcamp
15:00-17:00 Library Tour (TBC)
30-Jan Scrum Bootcamp
Mon 2-Feb Academic skills: writing & presentation skills and assignments [JP]
05-Feb Object Oriented Concepts: Components, Patterns and Model Driven Architecture
Mon 9-Feb Group presentation exercise (Handin by 5-Mar)
12-Feb Agile Methodologies: XP, Kanban and Lean + Exam Prep
Prep for SD Examination in your own groups
Thu 26-
Feb
17:30-20:00 Examination: SD Module
(the paper is 2 hours + 20 minutes reading time)
2nd
Module
Technology Module
(Jean-Paul Van Belle)
Mondays: Student Group Sessions (not listed below)
Thursdays 17:30-21:30: Lecture Sessions (topic list below)
05-Mar S1 Building Blocks for Better Information Systems: The What Why Who and
How of Architectural Thinking in IS
(JP) Architectural frameworks e.g. Zachman and TOGAF.
6. 9
12-Mar S2 Hardware Architectures: Do you want Moore chips with that?
- Chip architectures: More from Moore’s Law. (History and evolution of CPU, CPU
architectures, vendors, RAM, future trends)
- Who’s there? Biometric input/output devices. (Types of biometrics, use cases &
models of deployment, issues)
- Mass storage architectures: SAN, RAID and clouds. (Storage technologies,
architecture and governance/management of SAN, RAID and cloud storage, use
cases)
- Emerging technologies: 3D printing, Wearable Technologies, Virtual Reality,
Quantum Computing, ...
19-Mar S3 Software Architectures: From OSS to OSs, the tale of Open Source Software
and Operating Systems
- Operating systems for desktop computing: Gates, Apples and Penguins.
(Architecture and distinguishing features of MS-Windows, OS X and Linux. Current
status and future trends)
- The battle for the mobile market: the ecosystems of mobile devices. (Smartphones,
e-readers and tablets: standards, business and societal impacts, use cases, trends)
- Punching in the heavy league: the role and nature of server operating systems.
(How are they different from desktop OS, architecture, components, bundled app
server options, Windows vs Unix)
- System Virtualization (what, architectures, products) & Storage Virtualization
- Open Source Software vs Proprietary Software (from a corporate perspective):
History, Philosophy, Issues, Current Status, Quo Vadis.
26-Mar S4 Computer Network Architectures: LANs, WANs and MANs.
- Wired LANs: topologies and technologies
- Wireless LAN technology: from Bluetooth to WiFi
- WAN concepts, technologies and architectural options
- WWANs Mobile Commerce: architectures, technical platforms, supporting tools,
mobile services and business models.
- Telkom: Welcome or Hellkom? Telecom services available from Telkom (and
Neotel, MTN, Vodacom, etc.)
- Unified Communications
- Network diagnostics, monitoring, optimization and management tools.
02-Apr S5 System and Integration Architectures: High-Availability, Cloud Computing,
SaaS, SOA, Middleware
- From mission-critical, High-availability systems (e.g mainframe operating systems,
Himalaya ServerNet, Compaq VMS, IBM Sysplex etc.) to architectures for High
Performance systems; Distributed Systems and Massively Parallel Clusters.
- Client-server and multi-tier application architectures
- Middleware: Types, RPC, Messaging, TPM, ORBs
- Web Service Architectures and Technologies: the .NET view vs the Java view
- Cloud Computing: concepts, types, architectures, benefits & issues, current status,
vendors, case study or demo
09-Apr S6 The Architecture of the Internet: Building the Web 3.0
- HTML and its short-comings. Overview of common server-side and client-side
technologies. (Brief introduction to Internet 2) [Ryan Carty & Igetia Themba]
- Web servers (software eg IIS, Apache) & Web CMS (eg Joomla, Drupal,
WordPress). Comparison of the leading three packages/systems (at least on OSS) in
each of the categories by feature, vendor, market share, mind share, performance,
requirements etc.
- Web 2.0 What, who, why, why not? Technologies & applications with businesss
opportunities/uses (including blogosphere, podcasting, wikis, RSS and social
computing networks such as Facebook, MySpace, YouTube)
7. 9
16-Apr S6 The Architecture of the Internet: Building the Web 3.0
- HTML and its short-comings. Overview of common server-side and client-side
technologies. (Brief introduction to Internet 2)
- Web servers (software eg IIS, Apache) & Web CMS (eg Joomla, Drupal,
WordPress). Comparison of the leading three packages/systems (at least on OSS) in
each of the categories by feature, vendor, market share, mind share, performance,
requirements etc.
- Web 2.0 What, who, why, why not? Technologies & applications with businesss
opportunities/uses (including blogosphere, podcasting, wikis, RSS and social
computing networks such as Facebook, MySpace, YouTube)
23-Apr S7 Information System and Application Architectures
- SaaS: types, concepts, benefits & issues, current market status, vendors. [B-Abee
Toperesu]
- Typical enterprise-wide systems: ERP, CRM, DMS [Richard Russman & Tiaan de
Jager].
- Content Management Systems and Web CMS: What, why, typical architectures,
market overview (including OSS)
30-Apr S8 Information Architectures: from databases to business intelligence and
knowledge management.
- Relational Database Architectures, products and SQL
- BI: OLAP, data cubes, data mining: overview, tools and vendors
- The What and How of Knowledge Management
- Other (non-relational) Database Models: NoSQL, Object Orientation, XML,
Semantic Databases
- Big data
- Data Vizualization
07-May no lecture
14-May S9 Security Architectures: Security, Malware & Identity Management
- Malware technologies and architectures: viruses, trojan horses, common web-
hacking techniques
- Security, encryption & cryptography: principles and Internet applications:
- Identity Management. Give an overview of some important needs not addressed by
the network operating system and how these are being met by a selection of add-on
commercial products.Includes tools for enterprise security management (tools),
identity management, risk identification, authentication
- Enterprise Security Management
21-May S10 Capita Selecta & Make-up Session & Exam Prep
choose your own technology topic in consultation with JP - sample topics include:
- Semantic technologies
- Artificial Intelligence paradigms, techniques and real world business applications
- Complex Event processing technologies.
- Green IT
04-Jun 17:30 - 20:00 Examination: Technology Module
(the paper is 2 hours + 20 minutes reading time)
Venue: TBA
5June-
5July
mid-year break
3rd Module Project Management Module
(Prof Ulrike Rivett)
Full Time Week - Project Management [9:00-late] [venue TBC]
06-Jul Day 1 - Evolution of PM practice and PMBOK, complexity in PM
07-Jul Day 2 - PMBOK overview, language and communication
08-Jul Day 3 - PMBOK overview (ctd), systems thinking, rethinking PM
8. 9
09-Jul Day 4 - Benefits realisation, role of methodology in PM
10-Jul Day 5 - Class debate/presentations
Strategic Management of IT
4th Module Mondays: Group Sessions (not listed below)
Thursdays: Plenary Sessions (tentative topic list below)
16-Jul Challenges facing CIO today (MH)
23-Jul Business and IT alignment (MH)
30-Jul Managing Business Intelligence and Analytics (MH)
06-Aug Corporate & IT governance (MK)
13-Aug Privacy & IS security (MK)
20-Aug IT Risk Management (MK)
27-Aug IS Evaluation/ Corporate Performance Management (CPM) & XBRL (MK)
03-Sep Project Portfolio Management (DS)
10-Sep Project Management Office (DS)
17-Sep Managing IT talent (DS)
24-Sep Heritage Day
01-Oct Leveraging Emerging Technologies for competitive Advantage I (SR)
08-Oct Leveraging Emerging Technologies for competitive Advantage II (SR)
15-Oct Strategic Technology Trends (SR)
22-Oct Using Technology for Innovation (SR)
29-Oct Make-up / TBA / Exam prep
05-Nov 10:00 - 13:00 Examination: Project Management + Strategic
Management
Venue: LS2B
9. 9
University Regulations
Your attention is drawn to the University regulations, which govern academic progress. In particular your
attention is drawn to:
“All forms of cheating, plagiarism, collusion or interference with other students’ academic work and
performance will be reported to the Head of Department who will:
(a) impose a penalty with respect to the assessment of the course, or
(b) if considered an act of grave misconduct, refer the case to the Tribunal.”
Plagiarism
The Department of Information Systems considers plagiarism to be the deliberate passing off
of another person’s work as though it was your own, and will NOT be tolerated. At the
very least, you would get zero for your work, and we would request that you withdraw
from the Information Systems major.
Since so much of the course mark is awarded for work done outside of our direct control, a great
deal of trust is involved. We therefore view plagiarism in the same way as we do cheating in
examinations. Similar rules apply to all student work such as projects, essays and other
assignments.
Some examples of what we would consider to be plagiarism are:
• You downloaded material from the Internet and submitted it as your own work
• You downloaded material from the Internet and copied whole paragraphs or pages of
text into your assignment, but you edited them slightly so they fitted in. You might have
written other parts of the assignment yourself, but chunks of it are made up of copied
material.
• You found a few articles or books that really say everything you need. You designed the
structure of the assignment yourself and wrote quite a bit of it. But one or two sections
are almost word-for-word from the articles or books you used. You did this because
they said things in a way you felt you could not improve upon.
• You acquired assignments from previous year’s students and used them in the manner
described above.
• Someone else wrote all (or part of) the assignment or project for you, either as a favour
or for some kind of reward.
The Senate policy on plagiarism is accessible at
http://www.uct.ac.za/uct/policies/plagiarism_students.pdf
So what would the consequences of plagiarism be?
At the very least, you would get zero for your assignment, you will have to appear before the
Head of Department, and we would request that you withdraw from the Information
Systems major. In cases where blatant copying has taken place, we would take disciplinary
action, which could result in suspension or expulsion from the University.
10. 9
What is acceptable to the Department of Information Systems?
Part of the objective of the course is for you to find lots of other material. All we ask is that you
use it in an ethical, honest and scholarly way. This requires you to be able to analyse and discuss
a broad selection of the material you found, and that you reference the material you use!
Acceptable use of another person’s material at undergraduate level means that the assignment
structure, layout and contents are all your own work. AND
• You used no more than one directly quoted paragraph per page, and you referenced the
author in the manner described in the Departmental Writing Guide
• You used ideas, phrases, concepts, diagrams and statements already stated by others, but
you rewrote them in your own words AND you referenced them
• You have quite a lot of references on each page, but they are taken from several different
sources. (If they are all from the same source, then you have relied too heavily on that
source!)
Plagiarism Declaration
Students are required to submit a signed copy of the following declaration.
Declaration
1. I know that plagiarism is wrong. Plagiarism is to use another’s work and pretend that it is one’s own.
2. I have used the APA convention for citation and referencing. Each contribution to, and quotation in,
this publication……...............................…………........................................... from the work(s) of other
people has been attributed, and has been clearly cited and referenced.
3. This publication………………….. ....................................................................is my own work.
4. I have not allowed, and will not allow, anyone to copy our work with the intention of passing it off as
his or her own work.
5. I acknowledge that copying someone else’s assignment or essay, or part of it, is wrong, and declare
that this is my own work.
6. I hereby release my publication (excepting the contributions from others as
indicated under 2.) under the Creative Commons Attribution-Non-Commercial-
Share Alike 2.5 South Africa Licence
Signature:……………............................................................……….. Date …/…/…..
Full Name of Student
Notes:
• TurnItIn will rate the amount of plagiarism detected in the work but a low percentage does not
necessarily absolve you from plagiarism: any plagiarism whether detected by or not TurnItIn is
wrong and renders you liable to disciplinary action.
11. 9
• More information on the Creative Commons licenses on http://creativecommons.org.
• If the publication is written by more than one student, substitute “we” for “I” and “our” for “my”.